Skip to main content
Log in

Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper a new speech encryption method using Fast Fourier Transform (FFT) and multiple chaotic maps has been developed for secured speech communication. In order to improve the drawbacks namely residual intelligibility in encrypted signal, poor quality in decrypted signal, low key space and high computational complexity that prevail in the exist speech encryption methods, a novel speech encryption algorithm based on a three dimension (3D) Lorenz-Logistic map has been developed. A new 3D Lorenz-Logistic map has been introduced by feeding Logistic map in 3D Lorenz map to obtain three different random number sequences. Totally eight initial and controlling parameters of 3D Lorenz-Logistic map are used as key values. The behavior of chaotic map is totally changed by changing the key values which generates highly randomized number sequence. Permutation and substitution plays vital role in this method. The input speech is applied to FFT to obtain real as well as imaginary values. Two random number sequences of the 3D Lorenz-Logistic map are used to permute the real and imaginary values of input speech signal. Remaining one random number sequence is used to permute a reference speech sample which is used for substitution of permuted real values of speech signal. The reverse process of permutation and substitution is used for recovering the desired signal. The Inverse Fast Fourier Transform (IFFT) is applied to reconstruct the original signal. The performance of the proposed method is verified using histogram analysis, spectrogram analysis, correlation analysis, signal to noise ratio analysis, NSCR (Number of Samples Changing Rate) and UACI (Unified Averaged Changed Intensity) analysis, key space and key sensitivity analysis, computational complexity measure, Perceptual Evaluation of Speech Quality (PESQ) analysis and subjective evaluation of speech quality. The results evidence that the proposed speech encryption method provides better security system with robust decryption quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Abd AA, El-Latif LL, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70(3):1559–1584

    Google Scholar 

  2. Al Saad SN, Hato E (2014) A speech encryption based on chaotic maps. Int J Comput Appl 93(4):19–28

    Google Scholar 

  3. Al-Saad SN, Hashim EH (2013) A speech scrambler algorithm based on chaotic system. Al- Mustansiriyah J. Sci. 24(5):357–372

    Google Scholar 

  4. Amin M, Abd El-Latif AA (2010) Efficient modified RC5 based on chaos adapted to image encryption. J Electron Imaging 19(1):013012 (1–10)

    Google Scholar 

  5. Anto Steffi A, Sharma D (2013) An image encryption algorithm based on 3D Lorenz map. Int J Adv Res Comput Sci 4(2):312–316

    Google Scholar 

  6. Azzaz MS, Tanougast C, Sadoudi S, Bouridane A (2013) Synchronized hybrid chaotic generators: application to real time wireless speech encryption. Commun Nonlinear Sci Numer Simul 18(8):2035–2047. https://doi.org/10.1016/j.cnsns.2012.12.018

    Article  MathSciNet  MATH  Google Scholar 

  7. Baptista MS (1998) Cryptography with chaos. Physics Letter A 240:50

    MathSciNet  MATH  Google Scholar 

  8. Belazi A, Abd AA, El-Latif SB (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170

    Google Scholar 

  9. Belazi A, Abd AA, El-Latif A-VD, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50

    Google Scholar 

  10. Benrhouma O, Hermassi H, Abd AA, El-Latif SB (2013) Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain signal. Image Video Process 9(6):1281–1286

    Google Scholar 

  11. Benrhouma O, Hermassi H, Abd AA, El-Latif SB (2015) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695–8718

    Google Scholar 

  12. Boccaletti S, Kurths J, Osipov G, Valladares DL, Zhou CS (2002) The synchronization of chaotic systems. Phys Rep 366(1–2):1–101

    MathSciNet  MATH  Google Scholar 

  13. Brown R, Rulkov NF, Tracy ER (1994) Modeling and synchronizing chaotic systems from time-series data. Phys Rev E 49(5):3784–3800

    Google Scholar 

  14. Cambareri V, Mangia M, Pareschi F, Rovatti R, Setti G (2015) Low-complexity multiclass encryption by compressed sensing. IEEE Trans Signal Process 63(9):1–26. https://doi.org/10.1109/TSP.2015.2407315

    Article  MathSciNet  MATH  Google Scholar 

  15. Xiangyong Chen, Jinde Cao, Jianlong Qiu, Ahmed Alsaedi and Fuad E Alsaadi (2016) Adaptive control of multiple chaotic systems with unknown parameters in two different synchronization modes. Advances in Difference Equations-Springer 231:1–17

  16. Correa MV, Aguirre LA, Menues EMAM (2000) Modeling chaotic dynamics with discrete nonlinear rational models. International Journal of Bifurcation and Chaos 10(5):1019–1032

    Google Scholar 

  17. Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Trans Circ Syst 48:12–18

    MathSciNet  MATH  Google Scholar 

  18. El-Latif AA, Abd-El-Atty B, Talha M (2018) Robust encryption of quantum medical images. IEEE Access: Practical Innovations, Open Solutions 6:1073–1081

    Google Scholar 

  19. J. Gleick (1988) Choas: making a New science. Penguin Book Corp.

    MATH  Google Scholar 

  20. Gopalakrishnan T, Ramakrishnan S (2017) Chaotic image encryption with hash keying as key generator. IETE J Res 63(2):172–187

    Google Scholar 

  21. Hamza R, Muhammad K, Arunkumar N, Ramirez-Gonzalez G (2017) Hash based encryption for key frames of diagnostic hysteroscopy. IEEE Access- Recent Advances in Computational Intelligence paradigms for Security and Privacy for Fog and Mobile Edge Computing 6:60160–60170. https://doi.org/10.1109/ACCESS.2017.2762405

    Article  Google Scholar 

  22. Hasan FS (2016) Speech encryption using fixed point chaos based stream cipher. Eng. Tech.J 34(11):2152–2166

    Google Scholar 

  23. Kanso A, Smaoui N (2009) Logistic chaotic maps for binary numbers generations. Chaos, Solitons Fractals 40(5):2557–2568

    MATH  Google Scholar 

  24. Kaur H, Sekhon GS (2012) A four level speech signal encryption algorithm. IJCSC 3(1):151–153

    Google Scholar 

  25. Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circ Syst Mag 1(3):6–21. https://doi.org/10.1109/7384.963463

    Article  Google Scholar 

  26. Kocarev L, Lian S (2011) Chaos-based cryptography theory, algorithms and applications. Springer, Berlin

    MATH  Google Scholar 

  27. Kocarev LJ, Halle KS, Eckert K, Parlitz U, Chua LO (1992) Experimental demonstration of secure communications via chaotic synchronization. International Journal on Bifurcation Chaos 2:709–713

    MATH  Google Scholar 

  28. Kwon OW, Lee TW (2004) Phoneme recognition using ICA-based feature extraction and transformation. IEEE Trans Signal Process 84(6):1005–1019

    MATH  Google Scholar 

  29. Lima JB, da Silva Neto EF (2016) Audio encryption based on the cosine number transform. Multimed Tools Appl 75:8403–8418

    Google Scholar 

  30. Lin QH, Yin FL, Mie TM, Liang HL (2004) A speech encryption algorithm based on blind source separation. IEEE International Conference on Communications, Circuits and Systems 2:1013–1017. https://doi.org/10.1109/ICCCAS.2004.1346350

    Article  Google Scholar 

  31. Lin QH, Yin FL, Mei TM, Liang H (2006) A blind source separation based method for speech encryption. IEEE Trans Circ Systems-I 53(6):1320–1328

    MathSciNet  MATH  Google Scholar 

  32. Mosa E, Messiha NW, Zahran O, Abd El-Samie FE (2010) Encryption of speech signal with multiple secret keys in time and transform domains. Int J Speech Technol 13:231–242

    Google Scholar 

  33. E. Mosa, N. W. Messiha, Z. Zahran, Fathi E. Abd El-Samie (2011) Chaotic encryption of speech signals. Int J Speech Technol 14:285–296

  34. IIT New Delhi (2004) A device for preventing hacking of digital information. Indian Patent No: 0158–0104

  35. Rix AW, Beerends JG, Hollier MP, Hekstra AP (2001) Perceptual evaluation of speech quality (PESQ)-a new method for speech quality assessment of telephone networks and codecs. IEEE International Conference on Acoustics, Speech and Signal Processing. https://doi.org/10.1109/ICASSP.2001.941023

  36. Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, SanVo (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology (NIST) Gaithersburg

  37. Salamon M (2012) Chaotic electronic circuits in cryptography. Applied Cryptography and Network Security, InTech 13:295–320

    Google Scholar 

  38. Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio, Speech Music Process 2017:1–11. https://doi.org/10.1186/s13636-017-0118-0

    Article  Google Scholar 

  39. Sathiyamurthi P, Ramakrishnan S (2019) Testing and analysis of Chen chaotic mapping for speech cryptography. J Test Eval 47(4):3028–3040

    Google Scholar 

  40. Satti M, Kak S (2009) Multilevel Indexed Quasi group Encryption for Data and Speech. IEEE Transaction on Broadcasting 55(2):270 281

    Google Scholar 

  41. Sayed WS, Tolba MF, Radwan AG, Salwa K, Abd-El-Hafiz (2018) FPGA realization of a speech encryption system based on a generalized modified chaotic transition map and bit permutation. Multimed Tools Appl 78:16097–16127. https://doi.org/10.1007/s11042-018-6946-9

    Article  Google Scholar 

  42. Song X-H, Shen W, Liu S, Abd AA, El-Latif X-MN (2013) A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf Process 12(12):3689–3706

    MathSciNet  MATH  Google Scholar 

  43. Strogatz S (1994) Non-linear dynamics and Chaos. Perseus, Massachusetts

    Google Scholar 

  44. Sun Y, Wang G (2009) A study on relations between loops in sequences generated by the logistic map over integers and real numbers. IEEE Fourth Int Work Signal Des Appl Commun. https://doi.org/10.1109/IWSDA.2009.5346421

  45. Tao H, Zhang J-y, Yu L (2006) Adaptive blind source separation using temporal predictability. Commun Circ Syst Proc 1:280–283

    Google Scholar 

  46. TIMIT. Acoustic-Phonetic Continuous Speech Corpus: https://catalog.ldc.upenn.edu/LDC93S1

  47. Venkat M, Satti K (2006) A quasi group based cryptographic system. Int J Netw Secur 7(1):15–24

    Google Scholar 

  48. Yan X, Shen W, Abd El-Latif AA, Niu X New approaches for efficient information hiding-based secret image sharing schemes. Signal, Image and Video Processing 9(3):499–510

  49. Jui-Cheng Yen, Jiun-In Guo (1999) A new image encryption algorithm and its VLSI architecture. IEEE Workshop on Signal Processing Systems (SiPS 99) Design and Implementation 430–437

  50. Yilmaz O, Rickard S (2004) Blind separation of speech mixtures via time frequency masking. IEEE Trans Signal Process 52(7):1830–1847

    MathSciNet  MATH  Google Scholar 

  51. Yuan H-M, Liu Y, Lin T, Hu T, Gong L-H (2017) A new parallel image cryptosystem based on 5D hyper-chaotic system. Signal Process Image Commun 52:87–96

    Google Scholar 

  52. Zeng L, Zhang X, Chen L, Fan Z, Yonggang Wang M (2012) Scrambling based speech encryption via compressed sensing. EURASIP J Adv Signal Process 2012:257–212. https://doi.org/10.1186/1687-6180-2012-257

    Article  Google Scholar 

  53. Zhang T, Abd El-Latif AA, Amin M, Zaghloul A (2014) Diffusion-substitution mechanism for color image encryption based on multiple chaotic systems. Adv Mater Res 98:327–330

    Google Scholar 

  54. Zhanga T, El-Fatyany A, Li L, Amin M, Abd El-Latif AA (2015) Secret sharing-based chaotic image encryption. International Journal of Security and its Applications 9(7):217–224

    Google Scholar 

  55. Zhao H, He S, Chen Z, Zhang X (2014) Dual key speech encryption algorithm based underdetermined BSS. Sci World J 2014:1–7

    Google Scholar 

  56. Zheng Y, Singh SH (1997) Adaptive control of chaos in Lorenz system. Dyn Control 7:143–154. https://doi.org/10.1023/A:1008275800168

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Sathiyamurthi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sathiyamurthi, P., Ramakrishnan, S. Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimed Tools Appl 79, 17817–17835 (2020). https://doi.org/10.1007/s11042-020-08729-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08729-5

Keywords

Navigation