Secure speech communication algorithm via DCT and TD-ERCS chaotic map

Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have an essential privacy for speech transmission in the telephone networks, radio communication and in the emerging cellular mobile radio systems. In this paper, we present a highly secure speech encryption algorithm based on amplitude scrambling and Discrete Cosine Transform (DCT) coefficients scrambling. The permutation is performed using TD-ERCS chaotic map. The proposed scheme has been implemented successfully on software framework which yielded zero residual intelligibility and high quality of recovered speech. Simulation results reveal that the anticipated algorithm is secure enough and resistant against various security attacks. The authors are reasonably confident of their contribution which can eventually be exploited as software, hardware-software and an integral part of any embedded secure communication system.

[1]  Yuan Wu,et al.  Speech scrambling with Hadamard transform in frequency domain , 2002, 6th International Conference on Signal Processing, 2002..

[2]  Vladimir Trajkovik,et al.  Secure Transport of Electronic Payment over GPRS , 2011, ICT Innovations.

[3]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[4]  Nagy W. Messiha,et al.  Chaotic encryption of speech signals in transform domains , 2009, 2009 International Conference on Computer Engineering & Systems.

[5]  Seong Oun Hwang,et al.  Chaos-based diffusion for highly autocorrelated data in encryption algorithms , 2015, Nonlinear Dynamics.

[6]  Seong Oun Hwang,et al.  A secure image encryption scheme based on chaotic maps and affine transformation , 2015, Multimedia Tools and Applications.

[7]  Jan Sher Khan,et al.  A new chaos-based secure image encryption scheme using multiple substitution boxes , 2015, 2015 Conference on Information Assurance and Cyber Security (CIACS).

[8]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[9]  Liang Chen,et al.  Scrambling-based speech encryption via compressed sensing , 2012, EURASIP J. Adv. Signal Process..

[10]  Jawad Ahmad,et al.  Efficiency Analysis and Security Evaluation of Image Encryption Schemes , 2012 .

[11]  Xiaojun Tong,et al.  Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator , 2009, Signal Process..

[12]  D.C. Tseng,et al.  An OFDM speech scrambler without residual intelligibility , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[13]  Seong Oun Hwang,et al.  A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices , 2016, Neural Computing and Applications.

[14]  Jan Sher Khan,et al.  A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps , 2016 .

[15]  Ed Dawson,et al.  Design and Cryptanalysis of Transform-Based Analog Speech Scamblers , 1993, IEEE J. Sel. Areas Commun..

[16]  Seong Oun Hwang,et al.  An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes , 2015, Wirel. Pers. Commun..

[17]  John H. L. Hansen,et al.  An effective quality evaluation protocol for speech enhancement algorithms , 1998, ICSLP.

[18]  Vinod Patidar,et al.  A new substitution–diffusion based image cipher using chaotic standard and logistic maps , 2009 .

[19]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[20]  Sheng Liyuan,et al.  Study of a discrete chaotic system based on tangent-delay for elliptic reflecting cavity and its properties , 2005 .

[21]  Seong Oun Hwang,et al.  An efficient image encryption scheme based on: Henon map, skew tent map and S-Box , 2015, 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO).

[22]  Jan Sher Khan,et al.  TD-ERCS map-based confusion and diffusion of autocorrelated data , 2016, Nonlinear Dynamics.

[23]  Roger J. Sutton Secure Communications: Applications and Management , 2002 .

[24]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[25]  Min Wu,et al.  A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.

[26]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[27]  Nazar Abbas Saqib,et al.  An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box , 2017 .