A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids

Next-generation audio-visual (AV) hearing aids stand as a major enabler to realize more intelligible audio. However, high data rate, low latency, low computational complexity, and privacy are some of the major bottlenecks to the successful deployment of such advanced hearing aids. To address these challenges, we propose an integration of 5G Cloud-Radio Access Network (C-RAN), Internet of Things (IoT), and strong privacy algorithms to fully benefit from the possibilities these technologies have to offer. Existing audio-only hearing aids are known to perform poorly in noisy situations where overwhelming noise is present. Current devices make the signal more audible but remain deficient in restoring intelligibility. Thus, there is a need for hearing aids that can selectively amplify the attended talker or filter out acoustic clutter. The proposed 5G IoT-enabled AV hearing-aid framework transmits the encrypted compressed AV information and receives encrypted enhanced reconstructed speech in real time to address cybersecurity attacks such as location privacy and eavesdropping. For security implementation, a real-time lightweight AV encryption is proposed, based on a piece-wise linear chaotic map (PWLSM), Chebyshev map, and a secure hash and S-Box algorithm. For speech enhancement, the received secure AV (including lip-reading) information in the cloud is used to filter noisy audio using both deep learning and analytical acoustic modelling. To offload the computational complexity and real-time optimization issues, the framework runs deep learning and big data optimization processes in the background, on the cloud. The effectiveness and security of the proposed 5G-IoT-enabled AV hearing-aid framework are extensively evaluated using widely known security metrics. Our newly reported, deep learning-driven lip-reading approach for speech enhancement is evaluated under four different dynamic real-world scenarios (cafe, street, public transport, pedestrian area) using benchmark Grid and ChiME3 corpora. Comparative critical analysis in terms of both speech enhancement and AV encryption demonstrates the potential of the envisioned technology to deliver high-quality speech reconstruction and secure mobile AV hearing aid communication. We believe our proposed 5G IoT enabled AV hearing aid framework is an effective and feasible solution and represents a step change in the development of next-generation multimodal digital hearing aids. The ongoing and future work includes more extensive evaluation and comparison with benchmark lightweight encryption algorithms and hardware prototype implementation.

[1]  S. Ramakrishnan,et al.  Speech encryption using chaotic shift keying for secured speech communication , 2017, EURASIP J. Audio Speech Music. Process..

[2]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[3]  Fadi Al-Turjman,et al.  Small Cells in the Forthcoming 5G/IoT: Traffic Modelling and Deployment Overview , 2019, IEEE Communications Surveys & Tutorials.

[4]  Junyi Li,et al.  Network densification: the dominant theme for wireless evolution into 5G , 2014, IEEE Communications Magazine.

[5]  Jon Barker,et al.  An audio-visual corpus for speech perception and automatic speech recognition. , 2006, The Journal of the Acoustical Society of America.

[6]  Fadi Al-Turjman,et al.  Fog-based caching in software-defined information-centric networks , 2018, Comput. Electr. Eng..

[7]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[8]  Xingyuan Wang,et al.  Cryptanalysis of an image encryption algorithm using Chebyshev generator , 2014, Digit. Signal Process..

[9]  Q Summerfield,et al.  Use of Visual Information for Phonetic Perception , 1979, Phonetica.

[10]  Seong Oun Hwang,et al.  Chaos-based diffusion for highly autocorrelated data in encryption algorithms , 2015, Nonlinear Dynamics.

[11]  Muhammad Tariq,et al.  Cognitively Inspired Feature Extraction and Speech Recognition for Automated Hearing Loss Testing , 2019, Cognitive Computation.

[12]  Fadi Al-Turjman,et al.  Confidential smart-sensing framework in the IoT era , 2018, The Journal of Supercomputing.

[13]  Min Chen,et al.  A 5G Cognitive System for Healthcare , 2017, Big Data Cogn. Comput..

[14]  Richard Einhorn,et al.  Hearing Aid Technology for the 21st Century: A Proposal for Universal Wireless Connectivity and Improved Sound Quality , 2017, IEEE Pulse.

[15]  Isaac Ekoto,et al.  Ignitability and mixing of underexpanded hydrogen jets , 2012 .

[16]  Amir Hussain,et al.  Contextual Audio-Visual Switching For Speech Enhancement in Real-World Environments , 2018, Inf. Fusion.

[17]  Yicong Zhou,et al.  A new 1D chaotic system for image encryption , 2014, Signal Process..

[18]  Fadi Al-Turjman,et al.  Analysis of Cross-Layer Design of Quality-of-Service Forward Geographic Wireless Sensor Network Routing Strategies in Green Internet of Things , 2018, IEEE Access.

[19]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[20]  Noureddine Ellouze,et al.  A New Biologically Inspired Fuzzy Expert System-Based Voiced/Unvoiced Decision Algorithm for Speech Enhancement , 2015, Cognitive Computation.

[21]  R. Watt,et al.  Towards Multi-modal Hearing Aid Design and Evaluation in Realistic Audio-Visual Settings : Challenges and Opportunities , 2017 .

[22]  H. McGurk,et al.  Hearing lips and seeing voices , 1976, Nature.

[23]  Navrati Saxena,et al.  Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.

[24]  Navrati Saxena,et al.  Efficient IoT Gateway over 5G Wireless: A New Design with Prototype and Implementation Results , 2017, IEEE Communications Magazine.

[25]  William J Buchanan,et al.  Lightweight cryptography methods , 2017 .

[26]  W. H. Sumby,et al.  Visual contribution to speech intelligibility in noise , 1954 .

[27]  Fadi Al-Turjman,et al.  Cognitive caching for the future sensors in fog networking , 2017, Pervasive Mob. Comput..

[28]  Francisco J. Valverde-Albacete,et al.  Auditory-Inspired Morphological Processing of Speech Spectrograms: Applications in Automatic Speech Recognition and Speech Enhancement , 2013, Cognitive Computation.

[29]  Ben P. Milner,et al.  Visually Derived Wiener Filters for Speech Enhancement , 2007, IEEE Transactions on Audio, Speech, and Language Processing.

[30]  Björn W. Schuller,et al.  A Real-Time Speech Enhancement Framework in Noisy and Reverberated Acoustic Scenarios , 2012, Cognitive Computation.

[31]  Venkata Subbaiah Potluri,et al.  Speech enhancement using MMSE estimation of amplitude and complex speech spectral coefficients under phase-uncertainty , 2018, Speech Commun..

[32]  Hadi Larijani,et al.  Random neural network based novel decision making framework for optimized and autonomous power control in LTE uplink system , 2016, Phys. Commun..

[33]  Fathi E. Abd El-Samie,et al.  A Novel Speech Enhancement Method Using Fourier Series Decomposition and Spectral Subtraction for Robust Speaker Identification , 2019, Wirel. Pers. Commun..

[34]  Ming-Hsuan Yang,et al.  Incremental Learning for Robust Visual Tracking , 2008, International Journal of Computer Vision.

[35]  Jon Barker,et al.  The third ‘CHiME’ speech separation and recognition challenge: Dataset, task and baselines , 2015, 2015 IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU).

[36]  Jan Sher Khan,et al.  TD-ERCS map-based confusion and diffusion of autocorrelated data , 2016, Nonlinear Dynamics.

[37]  Fadia Ali Khan,et al.  A novel substitution box for encryption based on Lorenz equations , 2017, 2017 International Conference on Circuits, System and Simulation (ICCSS).

[38]  Amir Hussain,et al.  Lip-Reading Driven Deep Learning Approach for Speech Enhancement , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[39]  Adil Masood Siddiqui,et al.  Chaotic substitution for highly autocorrelated data in encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..

[40]  Xiaoling Huang,et al.  Image encryption algorithm using chaotic Chebyshev generator , 2011, Nonlinear Dynamics.

[41]  Seong Oun Hwang,et al.  A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices , 2016, Neural Computing and Applications.

[42]  J. Werker,et al.  Two-month-old infants match phonetic information in lips and voice , 2003 .