audio encryption
Recently Published Documents


TOTAL DOCUMENTS

54
(FIVE YEARS 27)

H-INDEX

6
(FIVE YEARS 2)

Symmetry ◽  
2021 ◽  
Vol 14 (1) ◽  
pp. 17
Author(s):  
Wanying Dai ◽  
Xiangliang Xu ◽  
Xiaoming Song ◽  
Guodong Li

The data space for audio signals is large, the correlation is strong, and the traditional encryption algorithm cannot meet the needs of efficiency and safety. To solve this problem, an audio encryption algorithm based on Chen memristor chaotic system is proposed. The core idea of the algorithm is to encrypt the audio signal into the color image information. Most of the traditional audio encryption algorithms are transmitted in the form of noise, which makes it easy to attract the attention of attackers. In this paper, a special encryption method is used to obtain higher security. Firstly, the Fast Walsh–Hadamar Transform (FWHT) is used to compress and denoise the signal. Different from the Fast Fourier Transform (FFT) and the Discrete Cosine Transform (DCT), FWHT has good energy compression characteristics. In addition, compared with that of the triangular basis function of the Fast Fourier Transform, the rectangular basis function of the FWHT can be more effectively implemented in the digital circuit to transform the reconstructed dual-channel audio signal into the R and B layers of the digital image matrix, respectively. Furthermore, a new Chen memristor chaotic system solves the periodic window problems, such as the limited chaos range and nonuniform distribution. It can generate a mask block with high complexity and fill it into the G layer of the color image matrix to obtain a color audio image. In the next place, combining plaintext information with color audio images, interactive channel shuffling can not only weaken the correlation between adjacent samples, but also effectively resist selective plaintext attacks. Finally, the cryptographic block is used for overlapping diffusion encryption to fill the silence period of the speech signal, so as to obtain the ciphertext audio. Experimental results and comparative analysis show that the algorithm is suitable for different types of audio signals, and can resist many common cryptographic analysis attacks. Compared with that of similar audio encryption algorithms, the security index of the algorithm is better, and the efficiency of the algorithm is greatly improved.


Author(s):  
Ekhlas Abbas Albahrani ◽  
Tayseer Karam Alshekly ◽  
Sadeq H. Lafta

Due to the quick improvement in digital communications and multimedia applications during recent periods up to the current time, data protection of digital data such as image, audio and video becomes a significant challenge. The security of audio data that transfer through different networks was rated as a preferred research field in the preceding years. This review covers the recent contribution for audio encryption and gives the most evaluations for audio encryption algorithm involving security analysis, computational complexity and quality analysis and their requirements. This paper fundamentally concentrates on displaying the different types of audio encryption and decryption techniques based on chaotic maps. Digital and analog audio algorithms were displayed, discussed and compared with the illustration of the important features and drawbacks. Various digital and audio proposed projects for audio encryption using chaotic maps have been covered, which they showed extreme sensitivity to initial conditions, unpredictability and conducting in a quasi-random manner. A comparison among the proposed algorithms in the key space, chaotic maps sensitivity and statistical analysis were provided.


2021 ◽  
Vol 11 (21) ◽  
pp. 10190
Author(s):  
Borislav Stoyanov ◽  
Tsvetelina Ivanova

In this paper, we present an algorithm for encrypting audio files based on the Ikeda map, a mathematical function of chaos theory. Detailed experimental, security and theoretical analysis is provided on the proposed algorithm using histogram analysis, using different measurements including the signal-to-noise ratio, the peak signal-to-noise ratio, the number of samples change rate and the correlation coefficient. The provided results show a highly secure and strong algorithm against different types of attacks.


2021 ◽  
pp. 163-174
Author(s):  
Akshay Joshi ◽  
Arun Mishra
Keyword(s):  

Author(s):  
Thiago A. Santos ◽  
Erivelton G. Nepomuceno ◽  
Thomas M. Chen ◽  
Denis N. Butusov

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Haris Aziz ◽  
Syed Mushhad Mustuzhar Gilani ◽  
Iqtadar Hussain ◽  
Abdul Kashif Janjua ◽  
Shahzada Khurram

The recent decade has witnessed an exponential surge of digital content, especially multimedia and its applications. The security requirements of these innovative platforms necessitate the significance of enhancing advanced encryption schemes. In this paper, a novel encryption scheme is presented for real-time audio applications. The framework of the proposed scheme is grounded on the principles of confusion and diffusion. The confusion incorporates nonlinearity by the application of Mordell elliptic curves (MEC) and a symmetric group of permutations S8. The endurance of the proposed scheme is further enriched through the application of chaotic maps. The proposed scheme is intended to cater requirements of real-time voice communications in defense applications particularly warzones. The adoption of a modular design and fusion of chaotic maps makes the algorithm viable for numerous real-time audio applications. The security can further be enriched by incorporating additional rounds and number of S-boxes in the algorithm. The security and resistance of the algorithm against various attacks are gaged through performance evaluation and security measurements. The audio encryption scheme has the ability to tolerate noise triggered by a channel or induced by an invader. The decryption was successful and the resultant output was audible for noisy data. The overall results depict that the proposed audio encryption scheme contains an excellent cryptographic forte with the minimum computational load. These characteristics allow the algorithm to be a hotspot for modern robust applications.


2021 ◽  
Vol 103 (2) ◽  
pp. 2019-2042
Author(s):  
Prabir Kumar Naskar ◽  
Surojit Bhattacharyya ◽  
Atal Chaudhuri
Keyword(s):  

Author(s):  
Tsvetelina Ivanova ◽  

Any cryptographic algorithm that is claimed to be effective must be properly analysed to prove its effectiveness, reliability and security. In this paper the most used quality indicators are reviewed and classified. The principles of the audio encryption are reviewed. A classification of the analysing methods is made.


Sign in / Sign up

Export Citation Format

Share Document