On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties

We analyze the effectivity of different pseudo noise (PN) and orthogonal sequences for encrypting speech signals in terms of perceptual intelligence. Speech signal can be viewed as sequence of correlated samples and each sample as sequence of bits. The residual intelligibility of the speech signal can be reduced by removing the correlation among the speech samples. PN sequences have random like properties that help in reducing the correlation among speech samples. The mean square aperiodic auto-correlation (MSAAC) and the mean square aperiodic cross-correlation (MSACC) measures are used to test the randomness of the PN sequences. Results of the investigation show the effectivity of large Kasami sequences for this purpose among many PN sequences. Keywords—Speech encryption, pseudo-noise codes, maximal length, Gold, Barker, Kasami, Walsh-Hadamard, autocorrelation, crosscorrelation, figure of merit.

[1]  William Stallings,et al.  Cryptography and network security , 1998 .

[2]  Tadeusz A. Wysocki,et al.  Modified Walsh‐Hadamard sequences for DS CDMA wireless systems , 2002 .

[3]  Nuggehally Sampath Jayant,et al.  A Comparison of Four Methods for Analog Speech Privacy , 1981, IEEE Trans. Commun..

[4]  David G. Luenberger On Barker codes of even length , 1963 .

[5]  S. W. GOLOMB,et al.  Generalized Barker sequences , 1965, IEEE Trans. Inf. Theory.

[6]  Ian Oppermann,et al.  Complex spreading sequences with a wide range of correlation properties , 1997, IEEE Trans. Commun..

[7]  Tai-Kuo Woo,et al.  Orthogonal variable spreading codes for wideband CDMA , 2002, IEEE Trans. Veh. Technol..

[8]  Bijan Jabbari,et al.  Spreading codes for direct sequence CDMA and wideband CDMA cellular networks , 1998, IEEE Commun. Mag..

[9]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[10]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[11]  C.-K. Chan,et al.  Generalised Barker-like PN sequences for quasisynchronous spread-spectrum multiple-access communication systems , 1995 .

[12]  Edward J. McCluskey,et al.  Linear Feedback Shift Register Design Using Cyclic Codes , 1988, IEEE Trans. Computers.

[13]  V. Milosevic,et al.  Hadamard transform application in speech scrambling , 1997, Proceedings of 13th International Conference on Digital Signal Processing.

[14]  James H. Lindholm An analysis of the pseudo-randomness properties of subsequences of long m -sequences , 1968, IEEE Trans. Inf. Theory.

[15]  L. Javier García-Villalba,et al.  An efficient algorithm to generate binary sequences for cryptographic purposes , 2001, Theor. Comput. Sci..

[16]  Abhijit Mitra,et al.  On Pseudo-Random and Orthogonal Binary Spreading Sequences , 2008 .

[17]  Fred Piper,et al.  Secure Speech Communications , 1985 .

[18]  Xianbin Wang,et al.  Transmitter identification using embedded pseudo random sequences , 2004, IEEE Transactions on Broadcasting.