Skip to main content
Log in

An audio encryption based on distinct key blocks along with PWLCM and ECA

  • Original paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

This paper presents a robust audio encryption scheme based on three consecutive phases, accomplished as cyclic shift followed by ciphering and wound up by shuffling, to break the high correlation amongst the neighbouring region of a plain audio. To encrypt a plain audio, the entire audio is split into different blocks of 64 bytes each and distinct key blocks are used for those audio blocks in the foregoing three phases. At first, the correlation of each audio block is reduced by the cyclic shift; thereafter, these shifted blocks are ciphered with piecewise linear chaotic map (PWLCM) along with elementary cellular automata (ECA) and finally, turns up with shuffling of ciphered bytes for better diffusion. The significant feature of this scheme is to generate distinct key blocks, which are highly sensitive to the secret key, a combination of the 64-byte external key along with the plain audio-dependent value. Moreover, these key blocks are derived using PWLCM from the secret key along with the preceding key block and previous encrypted block to achieve resistance against the known plain-text attack. It uses key space as large as \(2^{576}\) to resist brute-force attacks. The robustness as well as competence of this scheme is established with statistical analyses, cryptanalysis, randomness analysis and comparisons with existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Mazurczyk, W., Szczypiorski, K.: Advances in digital media security and right management. Multimed. Syst. 20, 101–103 (2014)

    Google Scholar 

  2. Thorwirth, N.J., Horvatic, P., Weis, R., Zhao, J.: Security methods for MP3 music delivery. In: Thirty-Fourth Asilomar Conference on Signal, Systems and Computers, pp. 1831–1835 (2000)

  3. Torrubia, A., Mora, F.: Perceptual cryptography on MPEG-1 Layer III bit-streams. In: International Conference on IEEE Consumer Electronics, pp. 324–325 (2002)

  4. Peng, X., Cui, Z., Cai, L., Yu, L.: Digital audio signal encryption with a virtual optics scheme. Optik 114(2), 69–75 (2003)

    Google Scholar 

  5. Servetti, A., De Martin, J.C.D.: Perception-based partial encryption of compressed speech. IEEE Trans. Speech Audio Process. 10(8), 637–643 (2002)

    Google Scholar 

  6. Servetti, A., Testa, C., De Martin, J.C.: Frequency-selective partial encryption of compressed audio. In: IEEE International Conference on Acoustics, Speech and Signal Process. pp. 668–671 (2003)

  7. Bhargava, B., Shi, C., Wang, S.-Y.: MPEG video encryption algorithms. Multimed. Tools Appl. 24(1), 57–79 (2004)

    Google Scholar 

  8. Grangetto, M., Magli, E., Olmo, G.: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans. Multimed. 8(5), 905–917 (2006)

    Google Scholar 

  9. Xie, D., Kuo, C.-C.J.: Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream. EURASIP J. Inf. Secur. 35262, 1–18 (2007)

    Google Scholar 

  10. Yan., W.Q., Fu, W.G., Kankanhalli, M.S.: Progressive audio scrambling in compressed domain. IEEE Trans. Multimed. 10(6), 960–968 (2008)

    Google Scholar 

  11. Zhou, J., Au, O.C.: Security and efficiency analysis of progressive audio scrambling in compressed domain. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1802–1805 (2010)

  12. Naskar, P.K., Khan, H.N., Roy, U., Chaudhuri, A., Chaudhuri, A.: Secret image sharing with embedded session key. Int. Conf. CISIM 245, 289–294 (2011)

    Google Scholar 

  13. Yakubu, M.A., Maddage, N.C., Atrey, P.K.: Audio secret management scheme using shamir’s secret sharing. Int. Conf. Multimed. Model. 8935, 396–407 (2015)

    Google Scholar 

  14. Naskar, P.K., Khan, H.N., Roy, U., Chaudhuri, A., Chaudhuri, A.: Shared cryptography with embedded session key for secret audio. Int. J. Comput. Appl. 26(8), 5–9 (2011)

    Google Scholar 

  15. Sahari, M.L., Boukemara, I.: A pseudo-random numbers generator based on a novel 3d chaotic map with an application to color image encryption. Nonlinear Dyn. 94(1), 723–744 (2018)

    Google Scholar 

  16. Liu, Y., Qin, Z., Liao, X., Wu, J.: Cryptanalysis and enhancement of an image encryption scheme based on a 1-D coupled Sine map. Nonlinear Dyn. 100, 2917–2931 (2020)

    Google Scholar 

  17. Mirzaei, O., Yaghoobi, M., Irani, H.: A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 67, 557–566 (2012)

    MathSciNet  Google Scholar 

  18. Huang, X.: Image encryption algorithm using chaotic chebyshev generator. Nonlinear Dyn. 67(4), 2411–2417 (2012)

    MathSciNet  Google Scholar 

  19. Ye, G.: A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn. 75(3), 417–427 (2014)

    Google Scholar 

  20. Wang, X., Wang, Q.: A novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlinear Dyn. 75, 567–576 (2014)

    Google Scholar 

  21. Li, C., Luo, G., Qin, K., Li, C.: An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 87(1), 127–133 (2017)

    Google Scholar 

  22. Zhu, H., Zhang, X., Yu, H., Zhao, C., Zhu, Z.: An image encryption algorithm based on compound homogeneous hyper-chaotic system. Nonlinear Dyn. 89(1), 61–79 (2017)

    Google Scholar 

  23. Ye, G., Pan, C., Huang, X., Mei, Q.: An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn. 94(1), 745–756 (2018)

    Google Scholar 

  24. Naskar, P.K., Chaudhuri, A.: A robust image encryption technique using dual chaotic map. Int. J. Electron. Secur. Digital For. 7(4), 358–380 (2015)

    Google Scholar 

  25. Naskar, P.K., Chaudhuri, A.: Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image. Imaging Sci. J. 94(8), 460–470 (2016)

    Google Scholar 

  26. Dutta, M.K., Gupta, P., Pathak, V.: A perceptible watermarking algorithm for audio signals. Multimed. Tools Appl. 73, 691–713 (2014)

    Google Scholar 

  27. Jamal, S.S., Shah, T., Hussain, I.: An efficient scheme for digital watermarking using chaotic map. Nonlinear Dyn. 73, 1469–1474 (2013)

    MathSciNet  Google Scholar 

  28. Ali, A.H., George, L.E., Zaidan, A.A., Mokhtar, M.R.: High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed. Tools Appl. 77, 31487–31516 (2018)

    Google Scholar 

  29. Sheu, L.J.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65, 103–108 (2010)

    MathSciNet  MATH  Google Scholar 

  30. Mosa, E., Messiha, N.W., Zahran, O., El-Samie, E.A.: Chaotic encryption of speech signals. Int. J. Speech Technol. 14, 285–296 (2011)

    Google Scholar 

  31. Madain, A., Dalhoum, A.L.A., Hiary, H., Ortega, A., Alfonseca, M.: Audio scrambling technique based on cellular automata. Multimed. Tools Appl. 71(3), 1803–1822 (2012)

    Google Scholar 

  32. George, S.N., Augustine, N., Pattathil, D.P.: Audio security through compressive sampling and cellular automata. Multimed. Tools Appl. 74(23), 10393–10417 (2014)

    Google Scholar 

  33. Datta, K., Gupta, I.S.: Partial encryption and watermarking scheme for audio files with controlled degradation of quality. Multimed. Tools Appl. 64, 649–669 (2013)

    Google Scholar 

  34. Yang, Y.-G., Tian, J., Sun, S.-J., Xu, P.: Quantum-assisted encryption for digital audio signals. Optik 126(21), 3221–3226 (2015)

    Google Scholar 

  35. Augustine, N., George, S.N., Pattathil, D.P.: An audio encryption technique through compressive sensing and Arnold transform. Int. J. Trust Manag. Comput. Commun. 3(1), 74–92 (2015)

    Google Scholar 

  36. Lima, J.B., da Silva Neto, E.F.: Audio encryption based on the cosine number transform. Multimed. Tools Appl. 75(14), 8403–8418 (2016)

    Google Scholar 

  37. Liu, H., Kadir, A., Li, Y.: Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik - Int. J. Light Electron. Opt. 127(19), 7431–7438 (2016)

    Google Scholar 

  38. Sathiyamurthi, P., Ramakrishnan, S.: Speech encryption using chaotic shift keying for secured speech communication. EURASIP J. Audio, Speech, Music Process 20, 1–11 (2017)

    Google Scholar 

  39. Belmeguenai, A., Ahmida, Z., Ouchtati, S.: A novel approach based on stream cipher for selective speech encryption. Int. J. Speech Technol. 20, 685–698 (2017)

    Google Scholar 

  40. Roy, A., Misra, A.P.: Audio signal encryption using chaotic Hènon map and lifting wavelet transforms. Eur. Phys. J. Plus 132, 1–12 (2017)

    Google Scholar 

  41. Ghasemzadeh, A., Esmaeili, E.: A novel method in audio message encryption based on a mixture of chaos function. Int. J. Speech Technol. 20(4), 829–837 (2017)

    Google Scholar 

  42. Sheela, S.J., Suresh, K.V., Tandur, D.: A novel audio cryptosystem using chaotic maps and DNA encoding. J. Comput. Netw. Commun. 2017, 1–12 (2017)

    Google Scholar 

  43. Faragallah, O.S.: Secure audio cryptosystem using hashed image LSB watermarking and encryption. Wirel. Pers. Commun. 98, 2009–2023 (2017)

    Google Scholar 

  44. Kalpana, M., Ratnavelu, K., Balasubramaniam, P.: An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimed. Tools Appl. 78, 5969–5988 (2019)

    Google Scholar 

  45. Sasikaladevi, N., Geetha, K., Srinivas, K.N.V.: A multi-tier security system (SAIL) for protecting audio signals from malicious exploits. Int. J. Speech Technol. 21(2), 319–332 (2018)

    Google Scholar 

  46. Kate, H.K., Razmara, J., Isazadeh, A.: A novel fast and secure approach for voice encryption based on DNA computing. 3D Res. 9(17), 1–11 (2018)

    Google Scholar 

  47. Farsana, F.J., Devi, V.R., Gopakumar, K.: An audio encryption scheme based on fast walsh hadamard transform and mixed chaotic keystreams. Appl. Comput. Inform. (2019). https://doi.org/10.1016/j.aci.2019.10.001

    Article  Google Scholar 

  48. Renza, D., Mendoza, S., Ballesteros, L.D.M.: High-uncertainty audio signal encryption based on the Collatz conjecture. J. Inf. Secur. Appl. 46, 62–69 (2019)

    Google Scholar 

  49. Shah, D., Shah, T., Jamal, S.S.: Digital audio signals encryption by Mobius transformation and Hènon map. Multimed. Syst. 26, 235–245 (2019)

    Google Scholar 

  50. Kordov, K.: A novel audio encryption algorithm with permutation–substitution architecture. Electronics 8(5), 530(1–15) (2019)

  51. Naskar, P.K., Paul, S., Nandy, D., Chaudhuri, A.: DNA encoding and channel shuffling for secured encryption of audio data. Multimed. Tools Appl. 78(17), 25019–25042 (2019)

    Google Scholar 

  52. Wang, X., Su, Y.: An audio encryption algorithm based on DNA coding and chaotic system. IEEE Access 6, 9260–9270 (2020)

    Google Scholar 

  53. Abdelfatah, R.I.: Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8, 69894–69907 (2020)

    Google Scholar 

  54. Wang, X., Sun, H.: A chaotic image encryption algorithm based on improved Joseph traversal and cyclic shift function. Optics and Laser Technol. 122, 105854(1–12) (2020)

  55. Özkaynak, F.: Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn. 92, 305–313 (2018)

    Google Scholar 

  56. Luo, Y., Zhou, R., Liu, J., Cao, Y., Ding, X.: A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonliner Dyn. 93, 1165–1181 (2018)

    Google Scholar 

  57. Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)

    Google Scholar 

  58. Hasheminejad, A., Rostami, M.J.: A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Optik 184, 205–213 (2019)

    Google Scholar 

  59. Li, C., Lin, D., Feng, B., Lu, J., Hao, F.: Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6, 75834–75842 (2018)

    Google Scholar 

  60. Li, C., Lin, D., Lu, J., Hao, F.: Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimed. 25(4), 46–56 (2018)

    Google Scholar 

  61. Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos. 15(10), 3119–3151 (2005)

    MathSciNet  MATH  Google Scholar 

  62. Li, C., Feng, B., Li, S., Kurths, J., Chen, G.: Dynamic analysis of digital chaotic maps via state-mapping networks. IEEE Trans. Circuits Syst.-I: Regul. Pap. 66(6), 2322–2335 (2019)

    MathSciNet  Google Scholar 

  63. Li, C., Zhang, Y., Xie, E.Y.: When an attacker meets a cipher-image in 2018: A year in review. J. Inf. Secur. Appl. 48, 1–9 (2019)

    Google Scholar 

  64. Lin, T., Chua, L.O.: On chaos of digital filters in the real world. IEEE Trans. Circuits Syst. 38(5), 557–558 (1991)

    Google Scholar 

  65. Cernak, J.: Digital generators of chaos. Phys. Lett. A. 214(3–4), 151–160 (1996)

    MathSciNet  MATH  Google Scholar 

  66. Li, C.-Y., Chen, Y.-H., Chang, T.-Y., Deng, L.-Y., To, K.: Period extension and randomness enhancement using high throughput reseeding mixing PRNG. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 20(2), 385–389 (2012)

    Google Scholar 

  67. Hua, H., Zhou, Y.: One-dimensional nonlinear model for producing chaos. IEEE Trans. Circuits Syst. I 65(1), 235–246 (2018)

    Google Scholar 

  68. Nagaraj, N., Shastry, M.C., Vaidya, P.G.: Increasing average period lengths by switching of robust chaos maps in finite precision. Eur. Phys. J. Spec. Top. 165(1), 73–83 (2008)

    Google Scholar 

  69. Addabbo, T., Alioto, M., Fort, A., Rocchi, S., Vignoli, V.: A feedback strategy to improve the entropy of a chaos-based random bit generator. IEEE Trans. Circuits Syst. I 53(2), 326–337 (2006)

    MathSciNet  MATH  Google Scholar 

  70. Patro, K.A.K., Acharya, B.: An efficient colour image encryption scheme based on 1-d chaotic maps. J. Inf. Secur. Appl. 46, 23–41 (2019)

    Google Scholar 

  71. Naskar, P.K., Bhattacharyya, S., Nandy, D., Chaudhuri, A.: A robust image encryption scheme using chaotic tent map and cellular automata. Nonlinear Dyn. 100(3), 2877–2898 (2020)

    Google Scholar 

  72. Wolfram, S.: Statistical mechanics of cellular automata. Rev. Mod. Phys. 55(3), 601–644 (1983)

    MathSciNet  MATH  Google Scholar 

  73. Jin, J.: An image encryption based on elementary cellular automata. Opt. Lasers Eng. 50(12), 1836–1843 (2012)

    Google Scholar 

  74. Abdo, A.A., Lian, S., Ismail, I.A., Amin, M., Diab, H.: A cryptosystem based on elemetary cellular automata. Commun. Nonlinear Sci. Numer. Simul. 18, 136–147 (2013)

    MathSciNet  MATH  Google Scholar 

  75. Fatès, N.: A tutorial on elementary cellular automata with fully asynchronous updating. Nat. Comput. 19, 179–197 (2020)

    MathSciNet  Google Scholar 

  76. Chai, X.L., Gan, Z.H., Yang, K., Chen, Y.R., Liu, X.X.: An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process-Image 52, 6–19 (2017)

    Google Scholar 

  77. Flajolet, P., Poblete, P., Viola, A.: On the analysis of linear probing hashing. Algorithmica 22(4), 490–515 (1998)

    MathSciNet  MATH  Google Scholar 

  78. Muhammad, Z.M.Z., Özkaynak, F.: An image encryption algorithm based on chaotic selection of robust cryptographic primitives. IEEE Access 8, 56581–56589 (2020)

    Google Scholar 

  79. Zeng, Y., Mao, H., Peng, D., Yi, Z.: Spectrogram based multi-task audio classification. Multimed. Tools Appl. 78, 3705–3722 (2017)

    Google Scholar 

  80. Broumandnia, A.: Designing digital image encryption using 2D and 3D reversible modular chaotic maps. J. Inf. Secur. Appl. 47, 188–198 (2019)

    Google Scholar 

Download references

Acknowledgements

We are thankful to the Department of Computer Science and Engineering, Government College of Engineering and Textile Technology, Serampore, Hooghly, W.B., India, and MCKV Institute of Engineering, Howrah, W.B., India, for giving us the platform for planning and developing this work using all departmental facilities. We are deeply grateful to the editors for smooth and fast handling of the manuscript. We would also like to thank the anonymous reviewers for their valuable advices and suggestions to improve the quality of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prabir Kumar Naskar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Naskar, P.K., Bhattacharyya, S. & Chaudhuri, A. An audio encryption based on distinct key blocks along with PWLCM and ECA. Nonlinear Dyn 103, 2019–2042 (2021). https://doi.org/10.1007/s11071-020-06164-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-020-06164-7

Keywords

Navigation