CFP last date
22 April 2024
Reseach Article

Securing Modern Voice Communication Systems using Multilevel Chaotic Approach

by Mahmoud F. Abd Elzaher, Mohamed Shalaby, Salwa H. El Ramly
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 135 - Number 9
Year of Publication: 2016
Authors: Mahmoud F. Abd Elzaher, Mohamed Shalaby, Salwa H. El Ramly
10.5120/ijca2016908497

Mahmoud F. Abd Elzaher, Mohamed Shalaby, Salwa H. El Ramly . Securing Modern Voice Communication Systems using Multilevel Chaotic Approach. International Journal of Computer Applications. 135, 9 ( February 2016), 17-21. DOI=10.5120/ijca2016908497

@article{ 10.5120/ijca2016908497,
author = { Mahmoud F. Abd Elzaher, Mohamed Shalaby, Salwa H. El Ramly },
title = { Securing Modern Voice Communication Systems using Multilevel Chaotic Approach },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 135 },
number = { 9 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume135/number9/24077-2016908497/ },
doi = { 10.5120/ijca2016908497 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:35:19.402189+05:30
%A Mahmoud F. Abd Elzaher
%A Mohamed Shalaby
%A Salwa H. El Ramly
%T Securing Modern Voice Communication Systems using Multilevel Chaotic Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 135
%N 9
%P 17-21
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we present a new voice encryption for voice communication system. It is based on permutation and substitution of voice samples using transform domains and secret keys in time. To increase the security we design the system such that it is multilevel in the sense that two chaotic maps are used. This provides the encrypted signal with a high degree of confidence. The Arnold cat map is applied to a permutation of the samples, The Henon map is employed in key generation to generate mask keys to be used in the substitution process. The results show that the encryption system provides the speech signal with a high degree of confidence, key sensitivity and high quality recovered signal. Total key space for the proposed encryption system is larger than (2425), which is large enough to protect the encrypted signal against attack.

References
  1. E.Mosa, O.Zahran,” Chaotic Encryption of Speech Signals in Transform Domains” Computer Engineering & Systems, 2009. ICCES 2009. International Conference, PP. 300 - 305 (Dec. 2009).
  2. Saad Najim Al Saad, Eman Hato , “ A Speech Encryption on Chaotic Maps” International Journal of Computer Application (0975-8887) volume 93-No 4 ,PP. 19 – 28 (May 2014).
  3. Hala B.Abdul Wahab , Sundus I. Mahdi “Modify Speech Cryptosystem Based on Shuffling Overlapping Blocks Technique” International Journal of Emerging Trends & Technology in Computer Science Volume 4, No.2, PP. 70 - 75 (2015).
  4. Akif Akgül, Sezgin Kaçar, İhsan Pehlivan “An Audio Data Encryption with Single and Double Dimension Discrete-Time” Journal of Science and Technology Volume 5, Issue 3, PP. 14-23 (July 2015).
  5. Mona F. M. Mursi, H Eldin H. Ahmedand Ayman H. Abd El-aziem” Image Encryption Based on Development of Henon Chaotic Maps Using Fractional Fourier Transform”  International Journal of Strategic Information Technology and Applications (IJSITA) Volume 5, Issue 3, PP. 62-77 (2014).
  6. Elsayed M. Elshamy, Sayed El -Rabaie, Osama S. Faragalla h, Osama Elshakankiry ” Efficient audio cryptosystem based on chaotic maps and double random phase encoding” International Journal of Speech Technology, Volume 18,Issue 4, PP. 619-631 (December 2015).
  7. E.Mosa, O.Zahran“Chaotic encryption of speech signals” International Journal of Speech Technology Volume 14, Issue 4, pp 285-296 (December 2011).
  8. Sattar B. Sadkhan, Rana Saad Mohammed “A Proposed Voice Encryption Based on Random Lorenz Map with DCT Permutation”International Journal of Advancements in Computing Technology, Vol. 7 Issue 3, PP. 90-101 (May, 2015).
  9. Musheer Ahmad, Bashir Alam, Omar Farooq “Chaos Based Mixed Keystream Generation for Voice Data Encryption” International Journal on Cryptography and Information Security, Vol. 2, No. 1, pp. 36-45, (2012).
  10. M. Ashtiyani, P. Moradi Birgani , S. S. Karimi Madahi “Speech Signal Encryption Using Chaotic Symmetric Cryptography” Journal of Basic and Applied Scientific Research, vol. 2, No.2, pp. 1678-1684,( 2012).
  11. osama faragallah , Elsayed Elshamy , Sayed El-Rabaie “Voice Encryption Based on Arnold Cat Cap and Double Random Phase Encoding” International Journal of Speech Technology. No. 14, pp. 14-24, (2013).
  12. Sattar B. Sadkhan, Rana Saad Mohammed” Proposed random unified chaotic map as PRBG for voice encryption in wireless communication” International Conference on Communication, Management and Information Technology (ICCMIT),Vol. 65, pp. 314- 323(2015).
Index Terms

Computer Science
Information Sciences

Keywords

Voice encryption Henon map Arnold cat map Permutation Substitution.