Con(dif)fused voice to convey secret: a dual-domain approach

Owing to the rapid development and advancements in the field of networks and communication, sharing of multimedia contents over insecure networks has become vital. The confidentiality of audio signals is predominantly needed in military and intelligence bureau applications. The proposed algorithm addresses this issue by encrypting audio signal using chaotic maps in spatial and transform domain. Discrete Fourier transform (DFT), discrete cosine transform (DCT) and integer wavelet transform (IWT) approaches are considered for the experiment. The algorithm involves three-layer security of confusion and diffusion in the spatial domain, and confusion in the transform domain. The confusion in the transform domain is equivalent to diffusion in the spatial domain. Different sizes of audio samples are considered to validate the effectiveness of the proposed scheme. Experimental results prove that the DFT-assisted encryption scheme is more efficient than the DCT- and IWT-based methods because the DFT scheme employs effective diffusion through reversible phase coding. Effectiveness of the proposed method is substantiated using various metrics. Correlation coefficients arrive significantly closer to zero; number of samples changes rate (NSCR) value is at 100% and scrambling degree close to 1. Besides, the proposed scheme has a larger keyspace higher than 2 128 . Thus, the proposed algorithm has the potency to withstand the statistical, differential and brute force attacks.

[1]  S. Ramakrishnan,et al.  Speech encryption using chaotic shift keying for secured speech communication , 2017, EURASIP J. Audio Speech Music. Process..

[2]  Aïssa Belmeguenaï,et al.  A novel approach based on stream cipher for selective speech encryption , 2017, Int. J. Speech Technol..

[3]  Yong Wang,et al.  A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..

[4]  David Megías,et al.  Secure logarithmic audio watermarking scheme based on the human auditory system , 2013, Multimedia Systems.

[5]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[6]  Diego Renza,et al.  High Scrambling Degree in Audio Through Imitation of an Unintelligible Signal , 2016, MCPR.

[7]  Borko Furht,et al.  Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations , 2007, EURASIP J. Inf. Secur..

[8]  Safya Belghith,et al.  Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption , 2016, Nonlinear Dynamics.

[9]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[10]  Eihab B. M. Bashier,et al.  Speech scrambling based on chaotic maps and one time pad , 2013, 2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE).

[11]  Alfonso Ortega,et al.  Audio scrambling technique based on cellular automata , 2012, Multimedia Tools and Applications.

[12]  Guodong Ye,et al.  Image scrambling encryption algorithm of pixel bit based on chaos map , 2010, Pattern Recognit. Lett..

[13]  Fathi E. Abd El-Samie,et al.  Chaotic encryption of speech signals , 2011, Int. J. Speech Technol..

[14]  Radhakrishna Dodmane,et al.  Efficient Audio Encryption Algorithm For Online Applications Using Transposition And Multiplicative Non-Binary System , 2013 .

[15]  Stanley R. Sandler,et al.  Preface to the First Edition , 2020, The Elements of Teaching.

[16]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[17]  Elaine B. Barker,et al.  Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.

[18]  Ardalan Ghasemzadeh,et al.  A novel method in audio message encryption based on a mixture of chaos function , 2017, Int. J. Speech Technol..

[19]  K. Prasadh,et al.  Audio encryption using higher dimensional chaotic map , 2009 .

[20]  Muhammad Rafiq Abuturab,et al.  Color image security system based on discrete Hartley transform in gyrator transform domain , 2013 .

[21]  Juliano B. Lima,et al.  Audio encryption based on the cosine number transform , 2016, Multimedia Tools and Applications.

[22]  Hamid Sharif,et al.  Index-Based Selective Audio Encryption for Wireless Multimedia Sensor Networks , 2010, IEEE Transactions on Multimedia.

[23]  Salwa M. Serag Eldin,et al.  New audio encryption package for TV cloud computing , 2015, Int. J. Speech Technol..

[24]  Thomas Stütz,et al.  A survey on JPEG2000 encryption , 2009, Multimedia Systems.

[25]  Peng Xu,et al.  Quantum-assisted encryption for digital audio signals , 2015 .

[26]  K. Gopakumar,et al.  An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams , 2020, Applied Computing and Informatics.

[27]  Goo-Rak Kwon,et al.  Advanced partial encryption using watermarking and scrambling in MP3 , 2011, Multimedia Tools and Applications.

[28]  Amal Said Khalifa,et al.  Video steganography: a comprehensive review , 2015, Multimedia Tools and Applications.

[29]  Hongjun Liu,et al.  Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys , 2016 .

[30]  Li-Hua Gong,et al.  Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing , 2014 .

[31]  Jie Zhu,et al.  Steganography for MP3 audio by exploiting the rule of window switching , 2012, Comput. Secur..

[32]  Zhijun Li,et al.  A novel digital programmable multi-scroll chaotic system and its application in FPGA-based audio secure communication , 2018 .

[33]  Deepaknath Tandur,et al.  A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding , 2017, J. Comput. Networks Commun..

[34]  Tom Leap,et al.  Multimedia Cryptology , 2009, Cryptologia.

[35]  James F. Dray,et al.  Advanced Encryption Standard (AES) , 2001 .

[36]  K. Gopakumar,et al.  A Novel Approach for Speech Encryption: Zaslavsky Map as Pseudo Random Number Generator☆ , 2016 .

[37]  David Megías,et al.  High capacity audio watermarking using FFT amplitude interpolation , 2009, IEICE Electron. Express.