Abstract
This paper presents an efficient audio cryptosystem based on combining chaotic maps with optical encryption. The proposed audio cryptosystem is designed with the potential of enforcing the security level for digital speech communication via shared networks. The proposed audio cryptosystem is built using two security phases. In the first phase, it utilizes a chaotic system using either Baker map or cat map for providing the first security level. In the second phase, it utilizes optical encryption using double random phase encoding (DRPE) for providing the second security level. This second security level represented with DRPE is a physical security that is very hard to attack. The proposed audio cryptosystem is implemented and its performance is evaluated using different audio encryption/decryption quality metrics. The results demonstrated that the proposed audio cryptosystem increases the level of voice security with high degree of confidentiality.
Similar content being viewed by others
References
Ahmad, M., Alam, B., & Farooq, O. (2012). Chaos based mixed keystream generation for voice data encryption. International Journal on Cryptography and Information Security (IJCIS), 2(1), 39–48.
Al Saad, S.N., Hato, E. (2014). A speech encryption based on chaotic maps. In Int. J. of Computer Applications (Vol. 93, pp. 19–28).
Barni, M., Bartolini, F., & Piva, A. (2001). Improved wavelet based watermarking through pixel-wise masking. IEEE Transactions on Image Processing, 10, 783–791.
Chen, L. H., & Lin, J. J. (2003). Mean quantization based image watermarking. Image and Vision Computing, 21, 717–727.
Chen, J.-X., Zhu, Z.-L., Fu, C., Zhang, L.-B., & Zhang, Y. (2014). Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding. Journal of Optics, 16, 125403.
Del Re, E., Fantacci, R., & Maffucci, D. (1989). A new speech signal scrambling method for secure communications: theory, implementation, and security evaluation. IEEE Journal, 7, 474–480.
Elshamy, A. M., Rashed, A. N. Z., Mohamed, A. A., Faragalla, O. S., Mu, Y., Alshebeili, S. A., & El-Samie, F. A. (2013). Optical image encryption based on chaotic baker map and double random phase encoding. Journal of Lightwave Technology, 31(15), 2533–2539.
Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.
Goodman, J. W. (1996). Introduction to Fourier optics (2nd ed.). New York: McGraw-Hill.
Hedelin, P., Norden, F., Skoglund, J. (1999). SD optimization of spectral coders. In IEEE Workshop on Speech Coding Proc (pp. 28–30).
Javidi, B., Sergent, A., Zhang, G., & Guibert, L. (1997). Fault tolerance properties of a double phase encoding encryption technique. Optical Engineering, 36, 992–998.
Kohad, H., Ingle, V.R., Gaikwad, M.A. (2012). An overview of speech encryption techniques. In Int. J. of Engineering Research and Development (Vol. 3, pp. 29–32).
Kwon, J.S.K, Park, S., Sung, D.K. (2006) Collision mitigation by log-likelihood ratio (LLR) conversion in orthogonal code-hopping multiplexing. In IEEE Transactions on Vehicular Technology (Vol. 55, pp. 709–717).
Langelaar, G. C., Setyawan, I., & Lagendijk, R. I. (2000). Watermarking digital image and video data. IEEE Signal Processing Magazine, 17(5), 20–46.
Li, H., Qin, Z., Shao, L., Wang, B. (2009). A novel audio scrambling algorithm in variable dimension space. In 11th Int. Con. on Advanced Communication Technology ICACT 2009 (Vol. 03, pp. 1647–1651).
Lin, C. Y., & Chang, S. F. (2001). A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE Transactions on Circuits and Systems of Video Technology, 11, 153–168.
Manjunath, G., & Anand, G. V. (2002) Speech encryption using circulant transformations, In Proc. IEEE, Int. Conf. Multimedia and Exp (Vol. 1, pp. 553–556).
Maysaa, A. A. J., & Qays, I. (2013). Speech encryption using chaotic map and blow fish algorithms. Journal of Basrah Researches, 39(2), 68–76.
Mermoul, A., Belouchrani, A. (2010). A Subspace-based method for speech encryption. In Proc. of IEEE 10th Int. Conference on Information Science, Signal Processing and their Applications (ISSPA 2010) (pp. 351–541).
Pande, A., & Zambreno, J. (2011). A chaotic encryption scheme for real-time embedded systems: design and implementation. New York: Springer.
Pascal, J. (2005). Statistical cryptanalysis of block ciphers, Ph. D. Thesis.
Petitcolas, F. A., Anderson, R., & Kuhn, M. (1999). Information hiding: A survey. Proceedings of the IEEE, 87, 1062–1078.
Refregier, P., & Javidi, B. (1995). Optical image encryption based on input plane and Fourier plane random encoding. Optics Letters, 20, 767–769.
Sang, W.K., Young, G.K., Simon, M.K. (2003). Generalized selection combining based on the log-likelihood ratio. In IEEE Int. Con. on Communications ICC 2003 (Vol. 4, pp. 2789–2794).
Sharma, D. (2012). Five level cryptography in speech processing using multi hash and repositioning of speech elements. In Int. J. of Emerging Technology and Advanced Engineering (Vol. 2).
Sheu, L.-J. (2011). A speech encryption using fractional chaotic systems”. Nonlinear Dynamics, 65, 103–108.
Shumei, W., Yong Fan, F., Ping, Y. (2009). A watermarking algorithm of gray image based on histogram. In 2nd International Congress on Image and Signal Processing CISP 2009 (pp. 1–5).
Wu, Y., Ng, B.P. (2002). Speech scrambling with Hadamard transform in frequency domain. In Proc. 6th Int. Conf. on Signal Processing (Vol. 2, pp. 1560–1563).
Yang, W., Benbouchta, M., Yantorno, R. (1998). Performance of the modified bark spectral distortion as an objective speech quality measure. In Proc. IEEE International Conference on Acoustic, Speech and Signal Processing (Vol. 1, pp. 541–544), Washington, USA.
Zeng, L., Zhang, X., Chen, L., Fan, Z., & Wang, Y. (2012). Scrambling-based speech encryption via compressed sensing. EURASIP Journal on Advances in Signal Processing, 257, 1–12.
Zhai, Y., Lin, S., Zhang, Q. (2008). Improving image encryption using multi-chaotic map. In Workshop on Power Electronics and Intelligent Transportation System, 2008. PEITS ‘08 (pp. 143–148), August 2–3, 2008.
Zhang, C. et al. (2008). Digital image watermarking with double encryption by Arnold transform and logistic. In 4th Int. Con. on networked computing & advanced information management (pp. 329–334).
Zhao, H., He, S., Chen, Z., Zhang, X. (2014). Dual key speech encryption algorithm based underdetermined BSS. In The Scientific World Journal (pp. 1–7).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Elshamy, E.M., El-Rabaie, ES.M., Faragallah, O.S. et al. Efficient audio cryptosystem based on chaotic maps and double random phase encoding. Int J Speech Technol 18, 619–631 (2015). https://doi.org/10.1007/s10772-015-9279-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10772-015-9279-3