CFP last date
22 April 2024
Reseach Article

Lorenz and Rossler Chaotic System for Speech Signal Encryption

by Eman Hato, Dalya Shihab
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 11
Year of Publication: 2015
Authors: Eman Hato, Dalya Shihab
10.5120/ijca2015906670

Eman Hato, Dalya Shihab . Lorenz and Rossler Chaotic System for Speech Signal Encryption. International Journal of Computer Applications. 128, 11 ( October 2015), 25-33. DOI=10.5120/ijca2015906670

@article{ 10.5120/ijca2015906670,
author = { Eman Hato, Dalya Shihab },
title = { Lorenz and Rossler Chaotic System for Speech Signal Encryption },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 11 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 25-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number11/22919-2015906670/ },
doi = { 10.5120/ijca2015906670 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:21:22.904128+05:30
%A Eman Hato
%A Dalya Shihab
%T Lorenz and Rossler Chaotic System for Speech Signal Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 11
%P 25-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper an algorithm for speech encryption based on three dimension chaotic maps is proposed. The proposed algorithm consists of three main units: generation of keys, samples substitution and samples permutation process. In order to maximize the benefits of the substitution process, it is performed in two stages with cipher feedback, for the system. Moreover bit-level permutation for sample is introduced as substitution mechanism in the permutation stage. The Lorenz and Rossler chaotic system are employed as generation of keystream used for substitution and permutation process respectively. From the experimental results, it is concluded that the proposed algorithm has the advantages of very low residual intelligibility, key sensitivity and high quality recovered signal, and moreover the proposed algorithm can resist known- plaintext attacks and supports large key space make brute-force attacks infeasible.

References
  1. Sadkhan Sattar B. and Abbas Nidaa A., "Performance Evaluation of Speech Scrambling Methods Based on Statistical Approach" ATTI DELLA “Fonazione Giorgio Ronchi” Anno Lxvi, No. 5 PP. 601-6014 (2011).
  2. Ambika D. and Radha V., "Secure Speech communication – A Review” International Journal of Engineering Research and Applications (IJERA), Vol.2 Issue 5 PP. 1044-1049 (2012).
  3. Mosa E.; Messiha N.W.; Zahran O. and Abd El-Samie F.E. "Encryption of Speech Signal with Multiple Secret Keys in Time Transform Domains " Int. J Speech Technol., Vol. 13 PP. 231-242 (2010).
  4. Musheer Ahmad; Bashir Alam and Omar Farooq, "Chaos Based Mixed Keystream Generation for Voice Data Encryption” International Journal on Cryptography and Information Security (IJCIS), Vol. 2 No. 1 PP. 39-48 (2012).
  5. Prabu A.V.; Srinivasarao S.;Tholada Apparao, Jaganmohan Rao M. and Babu Rao K., "Audio Encryption in Handsets" International Journal of Computer Applications (0975 - 8887), Vol. 40 No. 6 PP. 40-45 (2012).
  6. Amit Pande and Joseph Zambreno, "A Chaotic Encryption Scheme for Real-Time Embedded Systems: Design and Implementation" Springer Science-Business Media, LLC (2011).
  7. Swati Rastogi and Sanjeev Thakur," Security Analysis of Multimedia Data Encryption Technique Using Piecewise Linear Chaotic Maps", International Journal on Recent and Innovation Trends in Computing and Communication Vol. 1 Issue 5 PP. 458 – 461 (2013).
  8. Osama S. Faragallah, "An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Multimedia Applications" Information Security Journal: A Global Perspective, Vol.20 PP.135–147 (2011).
  9. Ashtiyani M.; Moradi Birgani P. and Karimi Madahi S. S., "Speech Signal Encryption Using Chaotic Symmetric Cryptography" J. Basic. Appl. Sci. Res., Vol. 2 No. 2 PP. 1678-1684 (2012).
  10. Bin Muhaya Fahad T., " Chaotic and AES Cryptosystem for Satellite Imagery" Telecommun Syst, Vol. 52 PP. 573–581 (2013).
  11. Sadkhan Sattar B. and Abbas Nidaa A., "Speech Scrambling Based on Wavelet Transform," in , "Advances in Wavelet Theory and Their Applications in Engineering" Physics and Technology, edited by: Dumitru Baleanu, InTech, (2012).
  12. Kondo, K., "Subjective Quality Measurement of Speech its Evaluation, Estimation and Application" Springer (2012).
Index Terms

Computer Science
Information Sciences

Keywords

Speech encryption Residual intelligibility Lorenz system Rossler system Permutation Substitution Residual intelligibility.