Abstract
In this paper a new speech encryption method using Fast Fourier Transform (FFT) and multiple chaotic maps has been developed for secured speech communication. In order to improve the drawbacks namely residual intelligibility in encrypted signal, poor quality in decrypted signal, low key space and high computational complexity that prevail in the exist speech encryption methods, a novel speech encryption algorithm based on a three dimension (3D) Lorenz-Logistic map has been developed. A new 3D Lorenz-Logistic map has been introduced by feeding Logistic map in 3D Lorenz map to obtain three different random number sequences. Totally eight initial and controlling parameters of 3D Lorenz-Logistic map are used as key values. The behavior of chaotic map is totally changed by changing the key values which generates highly randomized number sequence. Permutation and substitution plays vital role in this method. The input speech is applied to FFT to obtain real as well as imaginary values. Two random number sequences of the 3D Lorenz-Logistic map are used to permute the real and imaginary values of input speech signal. Remaining one random number sequence is used to permute a reference speech sample which is used for substitution of permuted real values of speech signal. The reverse process of permutation and substitution is used for recovering the desired signal. The Inverse Fast Fourier Transform (IFFT) is applied to reconstruct the original signal. The performance of the proposed method is verified using histogram analysis, spectrogram analysis, correlation analysis, signal to noise ratio analysis, NSCR (Number of Samples Changing Rate) and UACI (Unified Averaged Changed Intensity) analysis, key space and key sensitivity analysis, computational complexity measure, Perceptual Evaluation of Speech Quality (PESQ) analysis and subjective evaluation of speech quality. The results evidence that the proposed speech encryption method provides better security system with robust decryption quality.
Similar content being viewed by others
References
Abd AA, El-Latif LL, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70(3):1559–1584
Al Saad SN, Hato E (2014) A speech encryption based on chaotic maps. Int J Comput Appl 93(4):19–28
Al-Saad SN, Hashim EH (2013) A speech scrambler algorithm based on chaotic system. Al- Mustansiriyah J. Sci. 24(5):357–372
Amin M, Abd El-Latif AA (2010) Efficient modified RC5 based on chaos adapted to image encryption. J Electron Imaging 19(1):013012 (1–10)
Anto Steffi A, Sharma D (2013) An image encryption algorithm based on 3D Lorenz map. Int J Adv Res Comput Sci 4(2):312–316
Azzaz MS, Tanougast C, Sadoudi S, Bouridane A (2013) Synchronized hybrid chaotic generators: application to real time wireless speech encryption. Commun Nonlinear Sci Numer Simul 18(8):2035–2047. https://doi.org/10.1016/j.cnsns.2012.12.018
Baptista MS (1998) Cryptography with chaos. Physics Letter A 240:50
Belazi A, Abd AA, El-Latif SB (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170
Belazi A, Abd AA, El-Latif A-VD, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50
Benrhouma O, Hermassi H, Abd AA, El-Latif SB (2013) Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain signal. Image Video Process 9(6):1281–1286
Benrhouma O, Hermassi H, Abd AA, El-Latif SB (2015) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695–8718
Boccaletti S, Kurths J, Osipov G, Valladares DL, Zhou CS (2002) The synchronization of chaotic systems. Phys Rep 366(1–2):1–101
Brown R, Rulkov NF, Tracy ER (1994) Modeling and synchronizing chaotic systems from time-series data. Phys Rev E 49(5):3784–3800
Cambareri V, Mangia M, Pareschi F, Rovatti R, Setti G (2015) Low-complexity multiclass encryption by compressed sensing. IEEE Trans Signal Process 63(9):1–26. https://doi.org/10.1109/TSP.2015.2407315
Xiangyong Chen, Jinde Cao, Jianlong Qiu, Ahmed Alsaedi and Fuad E Alsaadi (2016) Adaptive control of multiple chaotic systems with unknown parameters in two different synchronization modes. Advances in Difference Equations-Springer 231:1–17
Correa MV, Aguirre LA, Menues EMAM (2000) Modeling chaotic dynamics with discrete nonlinear rational models. International Journal of Bifurcation and Chaos 10(5):1019–1032
Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Trans Circ Syst 48:12–18
El-Latif AA, Abd-El-Atty B, Talha M (2018) Robust encryption of quantum medical images. IEEE Access: Practical Innovations, Open Solutions 6:1073–1081
J. Gleick (1988) Choas: making a New science. Penguin Book Corp.
Gopalakrishnan T, Ramakrishnan S (2017) Chaotic image encryption with hash keying as key generator. IETE J Res 63(2):172–187
Hamza R, Muhammad K, Arunkumar N, Ramirez-Gonzalez G (2017) Hash based encryption for key frames of diagnostic hysteroscopy. IEEE Access- Recent Advances in Computational Intelligence paradigms for Security and Privacy for Fog and Mobile Edge Computing 6:60160–60170. https://doi.org/10.1109/ACCESS.2017.2762405
Hasan FS (2016) Speech encryption using fixed point chaos based stream cipher. Eng. Tech.J 34(11):2152–2166
Kanso A, Smaoui N (2009) Logistic chaotic maps for binary numbers generations. Chaos, Solitons Fractals 40(5):2557–2568
Kaur H, Sekhon GS (2012) A four level speech signal encryption algorithm. IJCSC 3(1):151–153
Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circ Syst Mag 1(3):6–21. https://doi.org/10.1109/7384.963463
Kocarev L, Lian S (2011) Chaos-based cryptography theory, algorithms and applications. Springer, Berlin
Kocarev LJ, Halle KS, Eckert K, Parlitz U, Chua LO (1992) Experimental demonstration of secure communications via chaotic synchronization. International Journal on Bifurcation Chaos 2:709–713
Kwon OW, Lee TW (2004) Phoneme recognition using ICA-based feature extraction and transformation. IEEE Trans Signal Process 84(6):1005–1019
Lima JB, da Silva Neto EF (2016) Audio encryption based on the cosine number transform. Multimed Tools Appl 75:8403–8418
Lin QH, Yin FL, Mie TM, Liang HL (2004) A speech encryption algorithm based on blind source separation. IEEE International Conference on Communications, Circuits and Systems 2:1013–1017. https://doi.org/10.1109/ICCCAS.2004.1346350
Lin QH, Yin FL, Mei TM, Liang H (2006) A blind source separation based method for speech encryption. IEEE Trans Circ Systems-I 53(6):1320–1328
Mosa E, Messiha NW, Zahran O, Abd El-Samie FE (2010) Encryption of speech signal with multiple secret keys in time and transform domains. Int J Speech Technol 13:231–242
E. Mosa, N. W. Messiha, Z. Zahran, Fathi E. Abd El-Samie (2011) Chaotic encryption of speech signals. Int J Speech Technol 14:285–296
IIT New Delhi (2004) A device for preventing hacking of digital information. Indian Patent No: 0158–0104
Rix AW, Beerends JG, Hollier MP, Hekstra AP (2001) Perceptual evaluation of speech quality (PESQ)-a new method for speech quality assessment of telephone networks and codecs. IEEE International Conference on Acoustics, Speech and Signal Processing. https://doi.org/10.1109/ICASSP.2001.941023
Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, SanVo (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology (NIST) Gaithersburg
Salamon M (2012) Chaotic electronic circuits in cryptography. Applied Cryptography and Network Security, InTech 13:295–320
Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio, Speech Music Process 2017:1–11. https://doi.org/10.1186/s13636-017-0118-0
Sathiyamurthi P, Ramakrishnan S (2019) Testing and analysis of Chen chaotic mapping for speech cryptography. J Test Eval 47(4):3028–3040
Satti M, Kak S (2009) Multilevel Indexed Quasi group Encryption for Data and Speech. IEEE Transaction on Broadcasting 55(2):270 281
Sayed WS, Tolba MF, Radwan AG, Salwa K, Abd-El-Hafiz (2018) FPGA realization of a speech encryption system based on a generalized modified chaotic transition map and bit permutation. Multimed Tools Appl 78:16097–16127. https://doi.org/10.1007/s11042-018-6946-9
Song X-H, Shen W, Liu S, Abd AA, El-Latif X-MN (2013) A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf Process 12(12):3689–3706
Strogatz S (1994) Non-linear dynamics and Chaos. Perseus, Massachusetts
Sun Y, Wang G (2009) A study on relations between loops in sequences generated by the logistic map over integers and real numbers. IEEE Fourth Int Work Signal Des Appl Commun. https://doi.org/10.1109/IWSDA.2009.5346421
Tao H, Zhang J-y, Yu L (2006) Adaptive blind source separation using temporal predictability. Commun Circ Syst Proc 1:280–283
TIMIT. Acoustic-Phonetic Continuous Speech Corpus: https://catalog.ldc.upenn.edu/LDC93S1
Venkat M, Satti K (2006) A quasi group based cryptographic system. Int J Netw Secur 7(1):15–24
Yan X, Shen W, Abd El-Latif AA, Niu X New approaches for efficient information hiding-based secret image sharing schemes. Signal, Image and Video Processing 9(3):499–510
Jui-Cheng Yen, Jiun-In Guo (1999) A new image encryption algorithm and its VLSI architecture. IEEE Workshop on Signal Processing Systems (SiPS 99) Design and Implementation 430–437
Yilmaz O, Rickard S (2004) Blind separation of speech mixtures via time frequency masking. IEEE Trans Signal Process 52(7):1830–1847
Yuan H-M, Liu Y, Lin T, Hu T, Gong L-H (2017) A new parallel image cryptosystem based on 5D hyper-chaotic system. Signal Process Image Commun 52:87–96
Zeng L, Zhang X, Chen L, Fan Z, Yonggang Wang M (2012) Scrambling based speech encryption via compressed sensing. EURASIP J Adv Signal Process 2012:257–212. https://doi.org/10.1186/1687-6180-2012-257
Zhang T, Abd El-Latif AA, Amin M, Zaghloul A (2014) Diffusion-substitution mechanism for color image encryption based on multiple chaotic systems. Adv Mater Res 98:327–330
Zhanga T, El-Fatyany A, Li L, Amin M, Abd El-Latif AA (2015) Secret sharing-based chaotic image encryption. International Journal of Security and its Applications 9(7):217–224
Zhao H, He S, Chen Z, Zhang X (2014) Dual key speech encryption algorithm based underdetermined BSS. Sci World J 2014:1–7
Zheng Y, Singh SH (1997) Adaptive control of chaos in Lorenz system. Dyn Control 7:143–154. https://doi.org/10.1023/A:1008275800168
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sathiyamurthi, P., Ramakrishnan, S. Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimed Tools Appl 79, 17817–17835 (2020). https://doi.org/10.1007/s11042-020-08729-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08729-5