Enhanced Audio Cryptosystem Using Multiple Secret Keys and Permutations in Time and Transform Domains

Document Type : Original Article

Authors

1 Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University

2 Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University 2 Dept. of Information Technology, College of Computers and Information Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University 2 Dept. of Information Technology, College of Computers and Information

3 Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University 2 Dept. of Information Technology, College of Computers and Information Technology, Taif University, Al-Hawiya 21974, Kingdom of Saudi Arabia.

4 Dept. of Electrical Engineering, Faculty of Engineering, Menoufia University.

Abstract

This paper presents an enhanced audio speech cryptosystem based on three enhancements for permutation and substitution of speech segments using multiple secret keys and permutations in time and transform domains. The first enhancement method is based on repeating the first and last permutation steps in both encryption/decryption procedures for several times to enhance the security level. The second and third enhancement methods are based on adding two additional secret keys generated from the original key besides the utilized three keys. This adds another security layer for the modified developed audio cryptosystem. Simulation experiments demonstrated that these modifications enhance the security level and quality for the audio cryptosystem compared with a recent audio cryptosystem.

0px; "> [1] National Bureau of Standards, "Data Encryption Standard", Federal
Information Processing Standards Publication no.46, U.S. Government
Printing Office, Washington, DC (1977).
[2] Anoop, "Public Key Cryptography-Applications algorithm and
mathematical explanations", 2007.
[3] T. Thongpon and K. Sinchai, "Accelerating Asymmetric-key
Cryptography using Parallel-key Cryptographic Algorithm (PCA)", 6th
International Conference on computer and Information Technology,
vol. 2, pp. 812 815, 2009.
[4] J. Fridrich, "Symmetric Ciphers Based on Two-dimensional Chaotic
Maps," Int.J. Bifurcation and Chaos, vol. 8, no. 6, pp. 12591284, 1998.
[5] Mosa, E., et al. "Encryption of speech signal with multiple secret keys
in time and transform domains." International Journal of Speech
Technology 13.4 (2010): 231-242.
[6] "Advanced Encryption System", Federal Information Processing
Standards Publication 197, 2001.
[7] J. Daemen and V. R. Rijndael, "The advanced encryption standard", Dr.
Dobb’s J. vol. 26, no. 3, pp. 137139, 2001.
[8] Fu, Chong, et al. "An efficient and secure medical image protection
scheme based on chaotic maps." Computers in biology and medicine
43.8 (2013): 1000-1010.
[9] Elshamy, Ahmed M., et al. "Optical image encryption based on chaotic
baker map and double random phase encoding." Journal of Lightwave
Technology 31.15 (2013): 2533-2539.
; "> [10] Elgazar, Safaa, et al. "Efficient Watermarking of Audio Signals."
Digital Signal Processing 5.12 (2013): 412.
[11] Elshamy, Ahmed M., et al. "Optical image encryption based on chaotic
baker map and double random phase encoding." Journal of Lightwave
Technology 31.15 (2013): 2533-2539.
[12] Y. Zhai, S. Lin and Q. Zhang, "Improving Image Encryption Using
Multi-Chaotic Map", Workshop on Power Electronics and Intelligent
Transportation System, 2008. PEITS '08, pp. 143 148, 2-3 August,
2008.
[13] Nassar, S. S., et al. "Multi-level Security Technique Using
Steganography with Chaotic Encryption." Digital Image Processing 6.3
(2014): 142-148.
[14] Chen, Jun-Xin, et al. "Cryptanalysis and improvement of an optical
image encryption scheme using a chaotic Baker map and double
random phase encoding." Journal of Optics 16.12 (2014): 125403.
[15] Wang, Xingyuan, and Dapeng Luan. "A novel image encryption
algorithm using chaos and reversible cellular automata."
Communications in Nonlinear Science and Numerical Simulation 18.11
(2013): 3075-3085.
[16] Elhoseny, Heba M., et al. "Chaotic encryption of images in the
fractional Fourier transform domain using different modes of
operation." Signal, Image and Video Processing (2013): 1-12.
[17] G. Manjunath and G. V. Anand, "Speech encryption using circulant
transformations, " Proc. IEEE, Int. Conf. Multimedia and Exp, Vol. 1,
pp. 553-556, August, 2002.
[18] P. Hedelin, F. Norden, F and J. Skoglund, "SD optimization of spectral
coders", IEEE Workshop on Speech Coding Proceedings, pp. 28 30,
1999.
[19] S. Wang, A. Sekey, A. Gersho, "An objective measure for predicting
subjective quality of speech coders", IEEE Journal on selected areas in
communication, Vol. 10, No. 5, pp. 819-829, June 1992.
[20] W. Yang, M. Benbouchta, R. Yantorno, "Performance of the modified
bark spectral distortion as an objective speech quality measure", Proc.
IEEE International Conference on Acoustic, Speech and Signal
Processing, Vol. 1, Washington, USA , pp. 541-544. May 1998.
[21] W. K. Sang, G. K. Young and M. K. Simon, "Generalized selection
combining based on the log-likelihood ratio", IEEE International
Conference on Communications ICC 2003, vol. 4, pp. 2789-2794,
2003.
[22] J. K. Kwon, S. Park, D. K. Sung, "Collision mitigation by loglikelihood ratio (LLR) conversion in orthogonal code-hopping