Skip to main content
Log in

Audio encryption based on the cosine number transform

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we introduce an audio encryption scheme based on the cosine number transform (CNT). The transform, which is defined over a finite field, is recursively applied to blocks of samples of a noncompressed digital audio signal. The blocks are selected using a simple overlapping rule, which provides diffusion of the ciphered data to all processed blocks. A secret-key is used to specify the number of times the transform is applied to each one of such blocks. Computer experiments are carried out and security aspects of the proposed scheme are discussed. Our analysis indicates that the method meets the main security requirements of secret-key cryptography. More specifically, after the encryption of 16-bit audio signals, correlation coefficients significantly close to 0 and entropy values close to 16 were obtained. Furthermore, the flexibility of the method easily allows key space sizes greater than 2256 and provides robustness against differential, known-plaintext and chosen-plaintext attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. The multiplicative order of an element ζ in the finite field GF(p) is the least positive integer l such that ζ l≡1 (mod p).

  2. The index of the component selected in the secret-key has to be reduced modulo K because the number of audio blocks to be processed throughout the encryption procedure is usually greater than the key-length K. In this sense, the K-th block is processed using the component of index K (mod K)≡0 (mod K) of the secret-key; the (K+1)-th block is processed using the component of index K+1 (mod K)≡1 (mod K) of the secret-key and so on.

References

  1. Abuturab MR (2013) Color image security system based on discrete hartley transform in gyrator transform domain. Opt Lasers Eng 51(3):317–324

    Article  Google Scholar 

  2. Birtwistle DT (1982) The eigenstructure of the number theoretic transforms. Signal Process 4(4):287–294

    Article  MathSciNet  Google Scholar 

  3. Blahut RE (2010) Fast algorithms for signal processing. Cambridge University Press

  4. Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727–752

    Article  MATH  Google Scholar 

  5. Cintra RJ, Dimitrov VS, Campello de Souza RM, de Oliveira HM (2009) Fragile watermarking using finite field trigonometrical transforms. Signal Process Image Commun 24:587–597

    Article  Google Scholar 

  6. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography, 2nd edn. The Morgan Kaufmann series in multimedia information and systems. Morgan Kaufmann

  7. Fallahpour M, Megias D (2009) High capacity audio watermarking using FFT amplitude interpolation. IEICE Electron Express 6(14):1057–1063

    Article  MATH  Google Scholar 

  8. Gnanajeyaraman R, Prasadh K, Ramar D (2009) Audio encryption using higher dimensional chaotic map. Int J Recent Trends Eng 1(2):103–107

    Google Scholar 

  9. Gong L, Liu X, Zheng F, Zhou N (2013) Flexible multiple-image encryption algorithm based on log-polar transform and double random phase encoding technique. J Modern Opt 60(13):1074–1082

    Article  Google Scholar 

  10. Kok CW (1997) Fast algorithm for computing discrete cosine transform. IEEE Trans Signal Process 45(3):757–760

    Article  Google Scholar 

  11. Kwon GR, Wang C, Lian S, Hwang SS (2012) Advanced partial encryption using watermarking and scrambling in MP3. Multimed Tools Appl 59(3):885–895

    Article  Google Scholar 

  12. Lian S (2008) Multimedia content encryption: techniques and applications, 7th edn. Auerbach Publications

  13. Lima JB, Lima EAO, Madeiro F (2013) Image encryption based on the finite field cosine transform. Signal Process Image Commun 28(10):1537–1547

    Article  Google Scholar 

  14. Lima JB, Campello de Souza RM (2011) Finite field trigonometric transforms. Appl Algebra Eng Commun Comput 22(5-6):393–411

    Article  MathSciNet  MATH  Google Scholar 

  15. Madain A, Abu Dalhoum AL, Hiary H, Ortega A, Alfonseca M (2014) Audio scrambling technique based on cellular automata. Multimed Tools Appl 71(3):1803–1822

    Article  Google Scholar 

  16. Nibouche O, Boussakta S, Darnell M (2009) Pipeline architectures for radix-2 new Mersenne number transform. IEEE Trans Circ Syst–I: Regular Papers 56 (8):1668–1680

    Article  MathSciNet  Google Scholar 

  17. Peng X, Cui Z, Cai L, Yu L (2003) Digital audio signal encryption with a virtual optics scheme. Optik - Int J Light Electron Opt 114(2):69–75

    Article  Google Scholar 

  18. Raghunandhan kR, Radhakrishna D, Sudeepa KB, Ganesh A (2013) Efficient audio encryption algorithm for online applications using transposition and multiplicative non-binary system. Int J Eng Res Technol 2(6):472–477

    Google Scholar 

  19. Rubanov NS, Bovbel EI, Kukharchik PD, Bodrov VJ (1998) The modified number theoretic transform over the direct sum of finite fields to compute the linear convolution. IEEE Trans Signal Process 46(3):813–817

    Article  MathSciNet  Google Scholar 

  20. Sadek MM, Khalifa AS, Mostafa MGM (2014) Video steganography: a comprehensive review. Multimed Tools Appl. 1–32. doi:10.1007/s11042-014-1952-z

  21. Serag Eldin SM, Khamis SA, Mahmoud Hassanin AAI, Alsharqawy MA (2015) New audio encryption package for TV cloud computing. Int J Speech Technol 18(1):131–142

    Article  Google Scholar 

  22. Shih FY (2012) Multimedia security: watermarking, steganography and forensics. CRC Press

  23. Smart N (2011) ECRYPT II yearly report on algorithms and keysizes (2010-2011). Tech. rep., European Network of Excellence in Cryptology II

  24. Sui L, Duan K, Liang J, Zhang Z, Meng H (2014) Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain. Opt Lasers Eng 62:139–152

    Article  Google Scholar 

  25. Tamori H, Yamamoto T (2009) Asymetric fragile watermarking using a number theoretic transform. IEICE Trans Fundament Electron Commun Comput Sci E92-A (3):836–838

    Article  Google Scholar 

  26. Wang H, Hempel M, Peng D, Sharif H, Chen HH (2010) Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Trans Multimed 12(3):215–223

    Article  Google Scholar 

  27. Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522

    Article  Google Scholar 

  28. Yan D, Wang R, Yu X, Zhu J (2012) Steganography for MP3 audio by exploiting the rule of window switching. Comput Secur 31(5):704–716

    Article  Google Scholar 

  29. Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recog Lett 31(5):347–354

    Article  Google Scholar 

  30. Zhou N, Zhang A, Zheng F, Gong L (2014) Image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152–160

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq) under Grants 307686/2014-0 and 456744/2014-2.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juliano B. Lima.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lima, J.B., da Silva Neto, E.F. Audio encryption based on the cosine number transform. Multimed Tools Appl 75, 8403–8418 (2016). https://doi.org/10.1007/s11042-015-2755-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2755-6

Keywords

Navigation