International Journal of Information and Communication Sciences
Volume 1, Issue 2, October 2016, Pages: 16-21
Received: Jun. 15, 2016;
Accepted: Jun. 18, 2016;
Published: Aug. 26, 2016
Views 4347 Downloads 178
Amina Mahdi, Electrical Engineering Department, College of Engineering, University of Babylon, Babylon, Iraq
Ameer K. Jawad, Computer Engineering Department, Islamic University College, Najaf -Iraq
Saad S. Hreshee, Electrical Engineering Department, College of Engineering, University of Babylon, Babylon, Iraq
With the significant development in communication systems especially in the public channels through which our information travels, there are more increasing in the channels problems. The information security is the important one that should be enhanced. This paper presents a chaos-based speech scrambling system. Chaotic maps have been successfully used for large-scale data encryption such as image, audio and video data, due to their good properties such as pseudo-randomness, sensitivity to changes in initial conditions and system parameters and a periodicity. In this paper a security model based on chaotic system has been designed to be used to encrypt voice signal, chaotic duffing map used for digital Scrambling, each samples of the speech are divided into 8 bits. The simulation results show that the Cpestral Distance Measure (CD) in the proposed system is increased by (4.559) by comparing with the time domain scrambling which is about four times that gives from the analog scrambling. In addition, dlpc increased to (4.428) as comparing with time domain. The key space in this proposed is 11.8336*1064×range of parameters.
Ameer K. Jawad,
Saad S. Hreshee,
Digital Chaotic Scrambling of Voice Based on Duffing Map, International Journal of Information and Communication Sciences.
Vol. 1, No. 2,
2016, pp. 16-21.
R. Gnanajeyaraman, K. Prasadh, Dr. Ramar, “Audio Encryption Using Higher Dimensional Chaotic Map”, International Journal of Recent Trends in Engineering, Vol. 1, No. 2, PP. 103 -107, May 2009.
H. Bai-Lin, “Chaos”, World Scientic, Singapore Vol. I (1984) and Vol. II (1989).
Maher K. M. Al-Azawi, Jaafar Qassim Kadhim, “Speech Scrambling Employing Lorenz Fractional Order Chaotic System”, Journal of Engineering and Development, Vol. 17, No. 4, PP. 195-211, ISSN 1813- 7822, October 2013.
Q. H. Lin, F. L. Yin, T. M. Mei and H. Liang, (2006) “A Blind Source Separation Based Method for Speech Encryption”, IEEE Transaction on circuits and systems-I, Vol. 53, No. 6, pp. 1320–1328.
Hikmat N. Abdullah, Saad S. Hreshee, Ameer K. Jawad, "Design Of Efficient Noise Reduction Scheme For Secure Speech Masked By Chaotic Signals", Journal of American Science 2015; Vol. 11, Issue 7, pp. 49-55.
J. I. Guo, J. C. Yen and H. F. Pai, (2002) “New Voice over Internet Protocol technique with Hierarchical Data Security Protection”, IEE Proceedings Vision, Image & Signal Processing, Vol. 149, No. 4, pp. 237–243.
K. W. Wong, K. P. Man, S. Li and X. Liao, (2005) “A more Secure Chaotic Cryptographic scheme based on Dynamic Look-up table”, Circuits, Systems and Signal Processing, Vol. 24, No. 5, pp. 571–584.
K. W. Tang, and W. K. S. Tang, (2005) “A Chaos-based Secure Voice Communication System”, International Conference on Industrial Technology, pp. 571–576.
K. P. Man, K. W. Wong and K. F. Man, (2006) “Security Enhancement on VoIP using Chaotic Cryptography”, International Conference on Industrial Electronics, pp. 3703–3708.
H. F. Qi, X. H. Yang, R. Jiang, B. Liang, and S. J. Zhou, (2008) “Novel End-to-End Voice Encryption Method in GSM System”, International Conference on Networking, Sensing and Control, 217–220.
Hikmat N. Abdullah and Sarab K. Mahmood, “Performance Evaluation of Non-redundant Error Correcting Scheme Using Logistic Chaotic Map”, Wireless Personal Communications, An International Journal, Volume 86, Issue 3, pp 1169-1181, February 2016.
Liu J. & Ma H. “A Speech Chaotic Encryption Algorithm based on Network”, Proceedings of IIHMSP, IEEE press, Harbin, China, pp. 283–286, 2008.
Rahul Ekhande and Sanjay Deshmukh, “Chaotic Signal for Signal Masking in Digital Communications”, International organization of Scientific Research (IOSR), PP. 29-33, Vol. 04, February. 2014.
F. Palmieri, and U. Fiore, (2009) “Providing true end-to-end security in converged voice over IP infrastructures”, Computers & Security, Vol. 28, No. 6, pp. 433–449.
M. Ahmad and Izharuddin, (2010) “Randomness Evaluation of Stream Cipher for Secure Mobile Communication”, International Conference on Parallel, Distributed and Grid Computing, pp. 165–168.
S. Mukhopadhyay and P. Sarkar, (2006) "Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms", Applied Cryptography and Information Security, LNCS, Vol. 3982, pp. 426–435.
Rahul Ekhande, Sanjay Deshmukh, “Chaotic Signal for Signal Masking in Digital Communications”, International organization of Scientific Research Journal of Engineering, Vol. 4, Issue. 2, PP. 29-33, February, 2014.
Jaafar Q. K., “Speech Scrambling Employing Lorenz Fractional Order Chaotic System”, M.Sc. Thesis, AL-Mustansiriya University, Electrical Engineering Department, 2013.
Mahmoud. M. “Analysis and Design Security Primitives Based on Chaotic Systems for ecommerce”, Ph.D. Thesis, School of Engineering and Computing Sciences, Durham University, United Kingdom, 2012.
S. H. Strogatz, “Nonlinear dynamics and chaos” preseus Books publishing, LLC, 1994.
Tariq. M. K “ Objective Tests of Speech Signal ” M.Sc. Thesis, College of Engineering Al-Mustansiriya University, Department of Electrical Engineering, Iraq, Baghdad, October 2001.
S. Sridharan & E. Dawson & B. Goldburg “Fast Fourier Transform Based Speech Encryption System” IEE Proc-I, Vol. 138, No. 3, pp. 215-223 JUNE 1991.
Chuan p., Yuanxiang L., “A new algorithm for image encryption based on couple chaotic system and cellular automata”, Mechatronic Sciences, Electric Engineering and Computer (MEC), Proceedings 2013 International Conference on IEEE, PP. 1645 - 1648.
G. Heidari-Bateni and C. D. Mc Gillem, “A chaotic direct-sequence spread-spectrum communication system” IEEE Transactions on Communications, Vol. 42, Issue, 234, PP. 1524 - 1527, 1994.