Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

Securing Modern Voice Communication Systems using Multilevel Chaotic Approach

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Mahmoud F. Abd Elzaher, Mohamed Shalaby, Salwa H. El Ramly

Mahmoud Abd F Elzaher, Mohamed Shalaby and Salwa El H Ramly. Article: Securing Modern Voice Communication Systems using Multilevel Chaotic Approach. International Journal of Computer Applications 135(9):17-21, February 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Mahmoud F. Abd Elzaher and Mohamed Shalaby and Salwa H. El Ramly},
	title = {Article: Securing Modern Voice Communication Systems using Multilevel Chaotic Approach},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {135},
	number = {9},
	pages = {17-21},
	month = {February},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


In this paper, we present a new voice encryption for voice communication system. It is based on permutation and substitution of voice samples using transform domains and secret keys in time. To increase the security we design the system such that it is multilevel in the sense that two chaotic maps are used. This provides the encrypted signal with a high degree of confidence. The Arnold cat map is applied to a permutation of the samples, The Henon map is employed in key generation to generate mask keys to be used in the substitution process. The results show that the encryption system provides the speech signal with a high degree of confidence, key sensitivity and high quality recovered signal. Total key space for the proposed encryption system is larger than (2425), which is large enough to protect the encrypted signal against attack.


  1. E.Mosa, O.Zahran,” Chaotic Encryption of Speech Signals in Transform Domains” Computer Engineering & Systems, 2009. ICCES 2009. International Conference, PP. 300 - 305 (Dec. 2009).
  2. Saad Najim Al Saad, Eman Hato , “ A Speech Encryption on Chaotic Maps” International Journal of Computer Application (0975-8887) volume 93-No 4 ,PP. 19 – 28 (May 2014).
  3. Hala B.Abdul Wahab , Sundus I. Mahdi “Modify Speech Cryptosystem Based on Shuffling Overlapping Blocks Technique” International Journal of Emerging Trends & Technology in Computer Science Volume 4, No.2, PP. 70 - 75 (2015).
  4. Akif Akgül, Sezgin Kaçar, İhsan Pehlivan “An Audio Data Encryption with Single and Double Dimension Discrete-Time” Journal of Science and Technology Volume 5, Issue 3, PP. 14-23 (July 2015).
  5. Mona F. M. Mursi, H Eldin H. Ahmedand Ayman H. Abd El-aziem” Image Encryption Based on Development of Henon Chaotic Maps Using Fractional Fourier Transform”  International Journal of Strategic Information Technology and Applications (IJSITA) Volume 5, Issue 3, PP. 62-77 (2014).
  6. Elsayed M. Elshamy, Sayed El -Rabaie, Osama S. Faragalla h, Osama Elshakankiry ” Efficient audio cryptosystem based on chaotic maps and double random phase encoding” International Journal of Speech Technology, Volume 18,Issue 4, PP. 619-631 (December 2015).
  7. E.Mosa, O.Zahran“Chaotic encryption of speech signals” International Journal of Speech Technology Volume 14, Issue 4, pp 285-296 (December 2011).
  8. Sattar B. Sadkhan, Rana Saad Mohammed “A Proposed Voice Encryption Based on Random Lorenz Map with DCT Permutation”International Journal of Advancements in Computing Technology, Vol. 7 Issue 3, PP. 90-101 (May, 2015).
  9. Musheer Ahmad, Bashir Alam, Omar Farooq “Chaos Based Mixed Keystream Generation for Voice Data Encryption” International Journal on Cryptography and Information Security, Vol. 2, No. 1, pp. 36-45, (2012).
  10. M. Ashtiyani, P. Moradi Birgani , S. S. Karimi Madahi “Speech Signal Encryption Using Chaotic Symmetric Cryptography” Journal of Basic and Applied Scientific Research, vol. 2, No.2, pp. 1678-1684,( 2012).
  11. osama faragallah , Elsayed Elshamy , Sayed El-Rabaie “Voice Encryption Based on Arnold Cat Cap and Double Random Phase Encoding” International Journal of Speech Technology. No. 14, pp. 14-24, (2013).
  12. Sattar B. Sadkhan, Rana Saad Mohammed” Proposed random unified chaotic map as PRBG for voice encryption in wireless communication” International Conference on Communication, Management and Information Technology (ICCMIT),Vol. 65, pp. 314- 323(2015).


Voice encryption, Henon map, Arnold cat map, Permutation, Substitution.