Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Call for Paper
January Edition
IJCA solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 20 December 2024

Submit your paper
Know more
Reseach Article

Audio Encryption in Hand sets

by A. V. Prabu, S. Srinivasarao, Tholada Apparao, M. Jaganmohan Rao, K. Babu Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 40 - Number 6
Year of Publication: 2012
Authors: A. V. Prabu, S. Srinivasarao, Tholada Apparao, M. Jaganmohan Rao, K. Babu Rao
10.5120/4964-7227

A. V. Prabu, S. Srinivasarao, Tholada Apparao, M. Jaganmohan Rao, K. Babu Rao . Audio Encryption in Hand sets. International Journal of Computer Applications. 40, 6 ( February 2012), 40-45. DOI=10.5120/4964-7227

@article{ 10.5120/4964-7227,
author = { A. V. Prabu, S. Srinivasarao, Tholada Apparao, M. Jaganmohan Rao, K. Babu Rao },
title = { Audio Encryption in Hand sets },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 40 },
number = { 6 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 40-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume40/number6/4964-7227/ },
doi = { 10.5120/4964-7227 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:27:24.375057+05:30
%A A. V. Prabu
%A S. Srinivasarao
%A Tholada Apparao
%A M. Jaganmohan Rao
%A K. Babu Rao
%T Audio Encryption in Hand sets
%J International Journal of Computer Applications
%@ 0975-8887
%V 40
%N 6
%P 40-45
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A novel method to encrypt audio(sound) stream of data by applying chaos is discussed. A pair of one-dimensional logistic maps is used for generating a chaotic sequence. The routine tests of encryption are performed and the results are observed. The proposed scheme is then implemented in real time on a mobile phone and the robustness of the idea is established.

References
  1. K. Ganesan. K. Murali, R. Muthukumar, “Look-Up Table Based Chaotic Encryption of Audio Files”, IEEE Asia Pacific Conference on Circuits and Systems, 2006, pp. 1951-1954, APCCAS 2006.
  2. M.S.Baptista, “Cryptography with chaos”, Physics Letters A, Vol. 240, pp. 50–54, 1998.
  3. T. Yang, C.W. Wu and L.O. Chua, "Cryptography based on chaotic systems, “IEEE Transactions On Circuits & Sysems - I, Vol. 44, pp. 469-472, 1997.
  4. Su Yong; Han Zhen; Luo Siwei; “A new method of the chaos encryption”, ICSP '98, Fourth International Conference on Signal Processing Proceedings, 1998, Vol.1, 12-16, pp. 233 – 236, Oct. 1998.
  5. Luo, J.; Shi, H., “Research of Chaos Encryption Algorithm Based on Logistic Mapping”, IIH-MSP '06, International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2006, pp. 381-383, Dec 2006.
  6. FIPS PUB 140-1 “Security requirements for cryptographic modules”, Federal Information Processing Standards Publication, 1994.
  7. M.I. Sobhy and A.E.R. Shehata, “Methods of attacking chaotic encryption and Countermeasures”, IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 2, pp. 1001 – 1004, 7-11 May 2001.
  8. Chin Yi Chee and Daolin Xu, “Secure digital communication using controlled projective synchronisation of chaos”, Chaos, Solitons & Fractals, Vol. 23, Issue 3, pp. 1063-1070, February 2005.
  9. Xiaogang Wu, Hanping Hu and Baoliang Zhang, “Analyzing and improving a chaotic encryption method”, Chaos, Solitons & Fractals, Vol. 22, Issue 2, pp. 367-373, October 2004.
  10. Kocarev, L., “Chaos-based cryptography: a brief overview”, IEEE Circuits and Systems Magazine, Vol. 1, Issue 3, pp. 6 – 21, 2001.
  11. Nawal El-Fishawy and Osama Abu Zaid, “Quality of Encryption Measurement of Bitmap Images with RC6, MRC6 and Rijndael Block Cipher Algorithms”, International Journal of Network Security, Vol. 5, No. 3, pp. 241-251, Nov. 2007.
  12. Ahmet Eskicioglu and Edward Delp, “An overview of multimedia content protection in consumer electronics devices”, Signal Processing Image Communication, Vol.16, pp.-681 – 699, 2001.
  13. Ahmet Eskicioglu, John Town and Edward Delp, “Security of digital entertainment content from creation to consumption”, Signal Processing Image Communication, Vol.18, pp.-237 – 262, 2003.
  14. M. Delgado-Restituto, M. Linan and A. Rodriguez-Vazquez, “CMOS 2.4pm chaotic oscillator: experimental verification of chaotic encryption of audio”, Electronics Letters, Vol. 32, Issue 9, pp.795-796, 1996.
  15. Wenwu Yu and Jinde Cao, “Cryptography based on delayed chaotic neural networks”, Physics Letters A, Vol. 356, Issues 4-5, pp. 333-338, August 2006.
  16. Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou and Yuanlong Cai, “Baptista-type chaotic cryptosystems: problems and countermeasures”, Physics Letters A, Vol. 332, Issue 5-6, pp 368-375, November 2004.
  17. Yong Wang, Xiaofeng Liao, Tao Xiang, Kwok-Wo Wong and Degang Yang, “Cryptanalysis and improvement on a block cryptosystem based on iteration of a chaotic map”, Physics Letters A, Volume 363, Issue 4, pp 277-281, April 2007.
Index Terms

Computer Science
Information Sciences

Keywords

chaotic System cipher-block chaining (CBC) mode Mean squared error (MSE) Peak signal to noise ratio cryptography Audio encryption & Output Feedback Mode