Skip to main content
Log in

Efficient audio cryptosystem based on chaotic maps and double random phase encoding

  • Published:
International Journal of Speech Technology Aims and scope Submit manuscript

Abstract

This paper presents an efficient audio cryptosystem based on combining chaotic maps with optical encryption. The proposed audio cryptosystem is designed with the potential of enforcing the security level for digital speech communication via shared networks. The proposed audio cryptosystem is built using two security phases. In the first phase, it utilizes a chaotic system using either Baker map or cat map for providing the first security level. In the second phase, it utilizes optical encryption using double random phase encoding (DRPE) for providing the second security level. This second security level represented with DRPE is a physical security that is very hard to attack. The proposed audio cryptosystem is implemented and its performance is evaluated using different audio encryption/decryption quality metrics. The results demonstrated that the proposed audio cryptosystem increases the level of voice security with high degree of confidentiality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Ahmad, M., Alam, B., & Farooq, O. (2012). Chaos based mixed keystream generation for voice data encryption. International Journal on Cryptography and Information Security (IJCIS), 2(1), 39–48.

    Article  Google Scholar 

  • Al Saad, S.N., Hato, E. (2014). A speech encryption based on chaotic maps. In Int. J. of Computer Applications (Vol. 93, pp. 19–28).

  • Barni, M., Bartolini, F., & Piva, A. (2001). Improved wavelet based watermarking through pixel-wise masking. IEEE Transactions on Image Processing, 10, 783–791.

    Article  MATH  Google Scholar 

  • Chen, L. H., & Lin, J. J. (2003). Mean quantization based image watermarking. Image and Vision Computing, 21, 717–727.

    Article  Google Scholar 

  • Chen, J.-X., Zhu, Z.-L., Fu, C., Zhang, L.-B., & Zhang, Y. (2014). Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding. Journal of Optics, 16, 125403.

    Article  Google Scholar 

  • Del Re, E., Fantacci, R., & Maffucci, D. (1989). A new speech signal scrambling method for secure communications: theory, implementation, and security evaluation. IEEE Journal, 7, 474–480.

    Google Scholar 

  • Elshamy, A. M., Rashed, A. N. Z., Mohamed, A. A., Faragalla, O. S., Mu, Y., Alshebeili, S. A., & El-Samie, F. A. (2013). Optical image encryption based on chaotic baker map and double random phase encoding. Journal of Lightwave Technology, 31(15), 2533–2539.

    Article  Google Scholar 

  • Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.

    Article  MATH  MathSciNet  Google Scholar 

  • Goodman, J. W. (1996). Introduction to Fourier optics (2nd ed.). New York: McGraw-Hill.

    Google Scholar 

  • Hedelin, P., Norden, F., Skoglund, J. (1999). SD optimization of spectral coders. In IEEE Workshop on Speech Coding Proc (pp. 28–30).

  • Javidi, B., Sergent, A., Zhang, G., & Guibert, L. (1997). Fault tolerance properties of a double phase encoding encryption technique. Optical Engineering, 36, 992–998.

    Article  Google Scholar 

  • Kohad, H., Ingle, V.R., Gaikwad, M.A. (2012). An overview of speech encryption techniques. In Int. J. of Engineering Research and Development (Vol. 3, pp. 29–32).

  • Kwon, J.S.K, Park, S., Sung, D.K. (2006) Collision mitigation by log-likelihood ratio (LLR) conversion in orthogonal code-hopping multiplexing. In IEEE Transactions on Vehicular Technology (Vol. 55, pp. 709–717).

  • Langelaar, G. C., Setyawan, I., & Lagendijk, R. I. (2000). Watermarking digital image and video data. IEEE Signal Processing Magazine, 17(5), 20–46.

    Article  Google Scholar 

  • Li, H., Qin, Z., Shao, L., Wang, B. (2009). A novel audio scrambling algorithm in variable dimension space. In 11th Int. Con. on Advanced Communication Technology ICACT 2009 (Vol. 03, pp. 1647–1651).

  • Lin, C. Y., & Chang, S. F. (2001). A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE Transactions on Circuits and Systems of Video Technology, 11, 153–168.

    Article  Google Scholar 

  • Manjunath, G., & Anand, G. V. (2002) Speech encryption using circulant transformations, In Proc. IEEE, Int. Conf. Multimedia and Exp (Vol. 1, pp. 553–556).

  • Maysaa, A. A. J., & Qays, I. (2013). Speech encryption using chaotic map and blow fish algorithms. Journal of Basrah Researches, 39(2), 68–76.

    Google Scholar 

  • Mermoul, A., Belouchrani, A. (2010). A Subspace-based method for speech encryption. In Proc. of IEEE 10th Int. Conference on Information Science, Signal Processing and their Applications (ISSPA 2010) (pp. 351–541).

  • Pande, A., & Zambreno, J. (2011). A chaotic encryption scheme for real-time embedded systems: design and implementation. New York: Springer.

    Google Scholar 

  • Pascal, J. (2005). Statistical cryptanalysis of block ciphers, Ph. D. Thesis.

  • Petitcolas, F. A., Anderson, R., & Kuhn, M. (1999). Information hiding: A survey. Proceedings of the IEEE, 87, 1062–1078.

    Article  Google Scholar 

  • Refregier, P., & Javidi, B. (1995). Optical image encryption based on input plane and Fourier plane random encoding. Optics Letters, 20, 767–769.

    Article  Google Scholar 

  • Sang, W.K., Young, G.K., Simon, M.K. (2003). Generalized selection combining based on the log-likelihood ratio. In IEEE Int. Con. on Communications ICC 2003 (Vol. 4, pp. 2789–2794).

  • Sharma, D. (2012). Five level cryptography in speech processing using multi hash and repositioning of speech elements. In Int. J. of Emerging Technology and Advanced Engineering (Vol. 2).

  • Sheu, L.-J. (2011). A speech encryption using fractional chaotic systems”. Nonlinear Dynamics, 65, 103–108.

    Article  MATH  MathSciNet  Google Scholar 

  • Shumei, W., Yong Fan, F., Ping, Y. (2009). A watermarking algorithm of gray image based on histogram. In 2nd International Congress on Image and Signal Processing CISP 2009 (pp. 1–5).

  • Wu, Y., Ng, B.P. (2002). Speech scrambling with Hadamard transform in frequency domain. In Proc. 6th Int. Conf. on Signal Processing (Vol. 2, pp. 1560–1563).

  • Yang, W., Benbouchta, M., Yantorno, R. (1998). Performance of the modified bark spectral distortion as an objective speech quality measure. In Proc. IEEE International Conference on Acoustic, Speech and Signal Processing (Vol. 1, pp. 541–544), Washington, USA.

  • Zeng, L., Zhang, X., Chen, L., Fan, Z., & Wang, Y. (2012). Scrambling-based speech encryption via compressed sensing. EURASIP Journal on Advances in Signal Processing, 257, 1–12.

    Article  Google Scholar 

  • Zhai, Y., Lin, S., Zhang, Q. (2008). Improving image encryption using multi-chaotic map. In Workshop on Power Electronics and Intelligent Transportation System, 2008. PEITS ‘08 (pp. 143–148), August 2–3, 2008.

  • Zhang, C. et al. (2008). Digital image watermarking with double encryption by Arnold transform and logistic. In 4th Int. Con. on networked computing & advanced information management (pp. 329–334).

  • Zhao, H., He, S., Chen, Z., Zhang, X. (2014). Dual key speech encryption algorithm based underdetermined BSS. In The Scientific World Journal (pp. 1–7).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama S. Faragallah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elshamy, E.M., El-Rabaie, ES.M., Faragallah, O.S. et al. Efficient audio cryptosystem based on chaotic maps and double random phase encoding. Int J Speech Technol 18, 619–631 (2015). https://doi.org/10.1007/s10772-015-9279-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10772-015-9279-3

Keywords

Navigation