Comparison of Audio Speech Cryptosystem Using 2-D Chaotic Map Algorithms
Mathematics and Computer Science
Volume 1, Issue 4, November 2016, Pages: 66-81
Received: Aug. 30, 2016; Accepted: Sep. 8, 2016; Published: Oct. 10, 2016
Views 2835      Downloads 121
Authors
Mahmoud Farouk, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University, Menouf, Egypt
Osama Faragallah, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University, Menouf, Egypt; Department of Information Technology, College of Computers and Information Technology, Taif University, Al-Hawiya, Kingdom of Saudi Arabia
Osama Elshakankiry, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University, Menouf, Egypt; Department of Information Technology, College of Computers and Information Technology, Taif University, Al-Hawiya, Kingdom of Saudi Arabia
Ahmed Elmhalaway, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University, Menouf, Egypt
Article Tools
Follow on us
Abstract
This paper presents a comparison between different audio speech encryption and decryption techniques for audio speech signals based on 2-D chaotic map algorithms with time and transform domains in a search for best of them and study advantages and disadvantages for each of them. Chaotic algorithms will be used because they have advantages of its casual Conduct and sensitivity to values of parameters and primary conditions that enable chaotic algorithms to fulfill the cryptographic systems. We consider doing simulation tests using MATLAB codes for logistic 2D map, Henon map, Standard map and baker map. Real simulation results show that baker map with TD exhibits best quality for both encryption and decryption and has a well balance between its advantages and disadvantages among other algorithms in comparison.
Keywords
Audio Speech Encryption, Chaotic Map, Speech Communication, Logistic 2D Map, Henon Map, Standard Map, Chaotic Baker Map
To cite this article
Mahmoud Farouk, Osama Faragallah, Osama Elshakankiry, Ahmed Elmhalaway, Comparison of Audio Speech Cryptosystem Using 2-D Chaotic Map Algorithms, Mathematics and Computer Science. Vol. 1, No. 4, 2016, pp. 66-81. doi: 10.11648/j.mcs.20160104.11
Copyright
Copyright © 2016 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Li, T. and Jiang, J. Digital signal processing: fundamentals and applications. Academic Press, 2013.
[2]
Azriel, R. and Kak, A. Digital picture processing. Vol. 1. Elsevier, 2014.‏
[3]
Badih, G., et al. "Sample-optimal average-case sparse fourier transform in two dimensions." arXiv preprint arXiv: 1303.1209 (2013).‏
[4]
Ehsan, V., Wong, V. and Blake, I. "An Overview of Cryptography." Crisis Management: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications (2013): 102.‏
[5]
Zhongyun, H., et al. "2D Sine Logistic modulation map for image encryption." Information Sciences 297 (2015): 80-94
[6]
Kunal Kumar, k., et al. "Comparative study of image encryption using 2D chaotic map." Information Systems and Computer Networks (ISCON), 2014 International Conference on. IEEE, 2014.
[7]
Lin, Q., et al. "A blind source separation based method for speech encryption", IEEE Trans. On Circuits and Systems-I, vol. 53, no. 6, pp. 1320-1328, 2006.
[8]
Wu, Y. and Ng, B.P. "Speech scrambling with Hadamard transform in frequency domain", Proc. 6th Int. Conf. on Signal Processing, vol. 2, pp. 1560-1563, 2002.
[9]
Manjunath, G. and Anand, G. V. "Speech encryption using circulate transformations", Proc. IEEE, Int. Conf. Multimedia and Exp, vol. 1, pp. 553-556, 2002.
[10]
"Advanced Encryption System", Federal Information Processing Standards Publication, 197, 2001
[11]
Ghada, Z., et al. "Efficient and secure chaotic S‐Box for wireless sensor network." Security and Communication Networks 7.2 (2014): 279-292.‏
[12]
Ahmed, A., et al. "Defense against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard." (2014): 1-1.‏
[13]
Prempratap, S. Gosawi, G. and Dubey, S. "Genetic Algorithms: A Technique For Cryptography Real Time Data Transmission." Binary Journal of Data Mining & Networking 4.2 (2014): 37-40.‏
[14]
Mosa E., et al "Encryption of Speech Signal with Multiple Secret Keys in Time Transform Domains " Int. J Speech Technol., Vol. 13 PP. 231-242 (2010).
[15]
Yicong, Z., Bao, L. and Philip Chen, CL. "A new 1D chaotic system for image encryption." Signal processing 97 (2014): 172-182.‏
[16]
Xiong, W. and Chen, G. "Constructing a chaotic system with any number of equilibria." Nonlinear Dynamics 71.3 (2013): 429-436.
[17]
Chittaranjan, P., et al. "Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Cryptosystem in Wavelets." International Journal on Recent Trends in Engineering and Technology 10.2 (2014): 70-77.‏
[18]
Rajinder, K. and Singh, Er. "Comparative Analysis and Implementation of Image Encryption Algorithms." International Journal of Computer Science and Mobile Computing (IJCSMC) 2.4 (2013): 170-176.‏
[19]
Samuel, S. and Takahasi, H. "Equilibrium measures for the Hénon map at the first bifurcation." Nonlinearity 26.6 (2013): 1719.‏
[20]
Narcís, M., Simó, C. and Vieiro, A. "From the Hénon conservative map to the Chirikov standard map for large parameter values." Regular and Chaotic Dynamics 18.5 (2013): 469-489.‏
[21]
Yushu, Z. and Xiao, Di. "Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform." Optics and Lasers in Engineering 51.4 (2013): 472-480.‏
[22]
Wei, Z., et al. "An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion." Communications in Nonlinear Science and Numerical Simulation 18.8 (2013): 2066-2080.
[23]
Iqtadar, H., et al. "Efficient method for designing chaotic S-boxes based on generalized Baker’s map and TDERC chaotic sequence." Nonlinear Dynamics 74.1-2 (2013): 271-275.‏
[24]
Xiao-Jun, T. "Design of an image encryption scheme based on a multiple chaotic map." Communications in Nonlinear Science and Numerical Simulation 18.7 (2013): 1725-1733.‏
[25]
Wang, X. and Lin-Tao, L. "Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices." Chinese Physics B 22.5 (2013): 050503.‏
[26]
Reza, D. and Gottemukkula, V. "Quality metrics for biometric authentication." U.S. Patent No. 8,724,857. 13 May 2014.‏
[27]
Sang Yeob, O. and Chung, K. "Target speech feature extraction using non-parametric correlation coefficient." Cluster Computing 17.3 (2014): 893-899.‏
[28]
El-Samie, F., et al. Image Encryption: A Communication Perspective. CRC Press, 2013.‏
[29]
Abdul Hamid, R., et al. "Encryption Quality Evaluation of Robust Chaotic Block Cipher for Digital Imaging." International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878.‏
[30]
Mona, M., et al. "A New Image Encryption Scheme Based on Multiple Chaotic Systems in Different Modes of Operation."‏
[31]
Ahmed, E., et al. "Optical image encryption based on chaotic baker map and double random phase encoding." Journal of Lightwave Technology 31.15 (2013): 2533-2539.‏
[32]
ON, EFFICIENT VISUAL QUALITY INDEX BASED. "An Effective and Efficient Visual Quality Index based on Local Edge Gradients." Visual Evaluation, Scaling and Transport of Secure Videos (2013): 53.‏
[33]
Gilbert, M. and Peng, D. Introduction. Springer International Publishing, 2014.‏
[34]
Leeuwen, V., David A., and Brümmer, N. "The distribution of calibrated likelihood-ratios in speaker recognition." arXiv preprint arXiv:1304.1199 (2013).‏
[35]
Navjot, K, and Kaur, U. "Audio Watermarking using Arnold transformation with DWT-DCT." Issues 1.1: 286-294.‏
[36]
Cheng, L. "On computing the two-dimensional (2-D) type IV discrete cosine transform (2-D DCT-IV)", IEEE Signal Processing Letters, vol. 8, Issue. 8, pp. 239 – 241, August 2001.
[37]
Jyoti, R. and Ahmad, T. "Performance Optimized DCT Domain Watermarking Technique with JPEG." International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075.‏
[38]
Kekre, H. B., et al. "Comparative Performance of Image Scrambling in Transform Domain using Sinusoidal Transforms." International Journal of Image Processing (IJIP) 8.2 (2014): 49.‏
[39]
Ehab H., et al. "Robust and secure fractional wavelet image watermarking." Signal, Image and Video Processing (2014): 1-10.‏
[40]
Kekre, H. B., Sarode, T. and Natu, S. "Robust Watermarking Technique using Hybrid Wavelet Transform Generated from Kekre Transform and Discrete Cosine Transform." International Journal of Scientific and Research Publications: 152.‏
[41]
Xueyao, L. Hua, X. and Bailing, C. "Noisy Speech Enhancement Based on Discrete Sine Transform", First International Multi-Symposiums on Computer and Computational Sciences, IMSCCS 2006, vol. 1, pp. 199 – 202, 2006.
[42]
Bernadin, S. L. and Foo, S. Y. "Wavelet Processing for Pitch Period Estimation", Proceedings of the 38th Southeastern Symposium on System Theory Tennessee Technological University Cookeville, TN, USA, 5-7 March, 2006.
[43]
Krishnan, V. and Jayakumar, A. "Speech Recognition of Isolated Malayalam Words Using Wavelet Features and Artificial Neural Network", 4th IEEE International Symposium on Electronic Design, Test & Applications, DELTA2008, PP. 240- 243, 23-25 January, 2008.
[44]
Tufekci Z. and Gowdy J. N, “Feature Extraction Using Discrete Wavelet Transform for Speech Recognition”, Southeastcon 2000. Proceedings of the IEEE, pp. 116 – 123, 7-9 April 2000.
[45]
Malik, S. and Afsar, F. A. "Wavelet Transform Based Automatic Speaker Recognition", IEEE 13th International Multitopic Conference (INMIC2009), PP. 1-4, 14-15 December, 2009.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186