We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Speech Encryption based on Chaotic Maps

by Saad Najim Al Saad, Eman Hato
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 4
Year of Publication: 2014
Authors: Saad Najim Al Saad, Eman Hato
10.5120/16203-5488

Saad Najim Al Saad, Eman Hato . A Speech Encryption based on Chaotic Maps. International Journal of Computer Applications. 93, 4 ( May 2014), 19-28. DOI=10.5120/16203-5488

@article{ 10.5120/16203-5488,
author = { Saad Najim Al Saad, Eman Hato },
title = { A Speech Encryption based on Chaotic Maps },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 4 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 19-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number4/16203-5488/ },
doi = { 10.5120/16203-5488 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:14:57.215887+05:30
%A Saad Najim Al Saad
%A Eman Hato
%T A Speech Encryption based on Chaotic Maps
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 4
%P 19-28
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper a new speech encryption system is presented. It is based on permutation and substitution of speech samples using secret keys in time and transform domains. The system is with multilevel to increase the security and to present an encrypted signal with low residual intelligibility. The logistic map is employed in keys generation to generate permutation and mask keys to be used in the permutation and substitution process. In order to maximize the benefits of the permutation process for the system, Arnold cat map is applied to permute the samples in the last level of encryption system. Simulations results are presented in the paper indicate that the encryption system provides encryption speech signal of low residual intelligibility, key sensitivity and high quality recovered signal. Total key space for the proposed encryption system is (2^348), which is large enough to protect the encryption signal against brute-force attack.

References
  1. Sadkhan Sattar B. and Abbas Nidaa A. , "Performance Evaluation of Speech Scrambling Methods Based on Statistical Approach" ATTI DELLA "Fonazione Giorgio Ronchi" Anno Lxvi, No. 5 PP. 601-6014 (2011).
  2. Ambika D. and Radha V. , "Secure Speech communication – A Review" International Journal of Engineering Research and Applications (IJERA), Vol. 2 Issue 5 PP. 1044-1049 (2012).
  3. Mosa E. ; Messiha N. W. ; Zahran O. and Abd El-Samie F. E. "Encryption of Speech Signal with Multiple Secret Keys in Time Transform Domains " Int. J Speech Technol. , Vol. 13 PP. 231-242 (2010).
  4. Musheer Ahmad; Bashir Alam and Omar Farooq, "Chaos Based Mixed Keystream Generation for Voice Data Encryption" International Journal on Cryptography and Information Security (IJCIS), Vol. 2 No. 1 PP. 39-48 (2012).
  5. Prabu A. V. ; Srinivasarao S. ;Tholada Apparao, Jaganmohan Rao M. and Babu Rao K. , "Audio Encryption in Handsets" International Journal of Computer Applications (0975 - 8887), Vol. 40 No. 6 PP. 40-45 (2012).
  6. Amit Pande and Joseph Zambreno, "A Chaotic Encryption Scheme for Real-Time Embedded Systems: Design and Implementation" Springer Science-Business Media, LLC (2011).
  7. Swati Rastogi and Sanjeev Thakur," Security Analysis of Multimedia Data Encryption Technique Using Piecewise Linear Chaotic Maps", International Journal on Recent and Innovation Trends in Computing and Communication Vol. 1 Issue 5 PP. 458 – 461 (2013).
  8. Osama S. Faragallah, "An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Multimedia Applications" Information Security Journal: A Global Perspective, Vol. 20 PP. 135–147 (2011).
  9. Ashtiyani M. ; Moradi Birgani P. and Karimi Madahi S. S. , "Speech Signal Encryption Using Chaotic Symmetric Cryptography" J. Basic. Appl. Sci. Res. , Vol. 2 No. 2 PP. 1678-1684 (2012).
  10. Bin Muhaya Fahad T. , " Chaotic and AES Cryptosystem for Satellite Imagery" Telecommun Syst, Vol. 52 PP. 573–581 (2013).
  11. Sadkhan Sattar B. and Abbas Nidaa A. , "Speech Scrambling Based on Wavelet Transform," in , "Advances in Wavelet Theory and Their Applications in Engineering" Physics and Technology, edited by: Dumitru Baleanu, InTech, (2012).
  12. Kondo, K. , "Subjective Quality Measurement of Speech its Evaluation, Estimation and Application" Springer (2012).
Index Terms

Computer Science
Information Sciences

Keywords

Speech encryption Logistic map Arnold cat map Permutation Substitution Residual intelligibility.