Security in the speech cryptosystem based on blind sources separation

In this paper, an appropriate selection for the key is investigated to enhance the security level of the speech cryptosystem based on blind sources separation. In fact, if an appropriate key is not selected, the cryptosystem may be attacked and therefore each confidential signal can be recovered only from the encrypted ones. Two important conditions which are studied in this paper are the number of quantized levels for a digital key and also non-sparsity in time-frequency domain. In the case of the first condition, simulation results show that with smaller coefficient for the confidential signal in comparison with the key, the number of quantized levels for the key should be more to guarantee the security. In the case of the second condition, an algorithm is proposed to recover the confidential signal only from the encrypted signal when the key is sparse in time-frequency domain.

[1]  Shiguo Lian,et al.  Security Analysis of A Chaos-based Image Encryption Algorithm , 2005, ArXiv.

[2]  Gonzalo Alvarez,et al.  Security analysis of communication system based on the synchronization of different order chaotic systems , 2005, nlin/0506056.

[3]  Yannick Deville,et al.  Differential Fast Fixed-Point Algorithms for Underdetermined Instantaneous and Convolutive Partial Blind Source Separation , 2007, IEEE Transactions on Signal Processing.

[4]  Hualou Liang,et al.  A blind source separation based method for speech encryption , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[5]  Rabab Kreidieh Ward,et al.  Robust Image Watermarking Based on Multiscale Gradient Direction Quantization , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Sheng-He Sun,et al.  Multipurpose image watermarking algorithm based on multistage vector quantization , 2005, IEEE Transactions on Image Processing.

[7]  Hualou Liang,et al.  A Fast Decryption Algorithm for BSS-Based Image Encryption , 2006, ISNN.

[8]  Anil Kumar,et al.  An extended secure data communication using blind source separation and HC-128 , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).

[9]  Chun-Mei Yang,et al.  Cryptanalyzing chaotic secure communications using return maps , 1998 .

[10]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[11]  Anil Kumar,et al.  An Improved Secure Data Communication Using Blind Source Separation and Chaos , 2009, 2009 11th IEEE International Symposium on Multimedia.

[12]  Guanrong Chen,et al.  Cryptanalyzing an Encryption Scheme Based on Blind Source Separation , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[13]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[14]  A. Albagul,et al.  Secure data communication using blind source separation , 2008, 2008 International Conference on Computer and Communication Engineering.

[15]  Lahouari Ghouti,et al.  Digital image watermarking using balanced multiwavelets , 2006, IEEE Transactions on Signal Processing.

[16]  Guanrong Chen,et al.  Cryptanalysis of an Encryption Scheme Based on Blind Source Separation , 2006, ArXiv.

[17]  Ali Hassan,et al.  Crypt analysis of two time pads in case of compressed speech , 2011, Comput. Electr. Eng..

[18]  Hualou Liang,et al.  Blind Source Separation-Based Encryption of Images and Speeches , 2005, ISNN.

[19]  Zhenwei Shi,et al.  Blind source separation of more sources than mixtures using sparse mixture models , 2005, Pattern Recognit. Lett..

[20]  Lin Qiuhua,et al.  Image cryptosystems based on blind source separation , 2003, International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003.

[21]  Yong Wang,et al.  Comments on, ''A blind source separation-based method for multiple images encryption" , 2011 .

[22]  Scott T. Rickard,et al.  A general framework for extending classic array processing techniques to the underdetermined blind source separation problem , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.

[23]  Takeshi Koshiba,et al.  More on Security of Public-Key Cryptosystems Based on Chebyshev Polynomials , 2007, IEEE Transactions on Circuits and Systems II: Express Briefs.

[24]  Adel Belouchrani,et al.  A subspace-based method for speech encryption , 2010, 10th International Conference on Information Science, Signal Processing and their Applications (ISSPA 2010).

[25]  Hualou Liang,et al.  A blind source separation-based method for multiple images encryption , 2008, Image Vis. Comput..

[26]  Daniel W. C. Ho,et al.  Underdetermined blind source separation based on sparse representation , 2006, IEEE Transactions on Signal Processing.

[27]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[28]  Jiwu Huang,et al.  Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition , 2007, IEEE Transactions on Image Processing.

[29]  Qiu-Hua Lin,et al.  Fast decryption utilizing correlation calculation for BSS-based speech encryption system , 2010, 2010 Sixth International Conference on Natural Computation.

[30]  Scott Rickard,et al.  Blind separation of speech mixtures via time-frequency masking , 2004, IEEE Transactions on Signal Processing.

[31]  Özgür Yilmaz,et al.  Blind separation of disjoint orthogonal signals: demixing N sources from 2 mixtures , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[32]  Yiwei Wang,et al.  A wavelet-based watermarking algorithm for ownership verification of digital images , 2002, IEEE Trans. Image Process..

[33]  R. Gil-Pita,et al.  Energy-weighted Mean Shift algorithm for speech source separation , 2011, 2011 IEEE Statistical Signal Processing Workshop (SSP).