A new secure and efficient scheme of ADPCM encoder based on chaotic encryption (original) (raw)
Related papers
Secure Speech Transmission Using Chaos Encryption System for AMR-WB Codec
International Journal of Chaotic Computing, 2017
In recent years, the need for secured communication research based on Speech Coding with chaos cryptography has highly increased. Therefore, it is absolutely necessary to have secure systems to protect the transferred data against arbitrary intrusions. So, data encryption is an effective way to meet these requirements. In this paper, we propose a full and a partial speech encryption schemes based on chaos maps for AMR-WB G.722.2 Codec. To increase the security level, we combine chaos maps logistic and Hénon for shuffling and scrambling speech in order to have a hybrid chaotic key generator. The proposed algorithms evaluated with both Perceptual Evaluation of Speech Quality (PESQ) and Enhanced Modified Bark Spectral Distortion (EMBSD) measure confirm the efficiency of our proposed cryptosystem scheme.
A Speech Cryptosystem Based on Chaotic Modulation Technique
The Egyptian Journal of Language Engineering, 2017
In this paper, an encryption approach for Speech communication based on direct chaotic modulation (non-autonomous modulation) is presented, in which speech signal is injected into one variable of the master system (using Lorenz system) without changing the value of any control parameter. This approach is based on the change of chaotic signal by injecting Speech samples into one variable in chaotic system and hence generating a new chaotic signal. The Speech signal is then extracted from the chaotic signal on the receiver side. Furthermore, a high dimension chaotic system is used, which increases the security of the encrypted signal. Non-autonomous modulation technique is suitable for securing real-time applications. A comparative study of approach and Speech masking technique is also presented. Experimental results show that non-autonomous methods give better performance than their chaotic masking counterparts when they are analyzed against Signal-to-Noise-Ratio (-38.55 dB vs.-35.51 dB), Segmental signal-to-Noise-Ratio (-38.91 dB vs.-35.84 dB), Log-Likelihood Ratio (0.89 vs. 0.80), and Correlation Coefficient Analysis (0.0345 vs. 0.021). Non-autonomous techniques overcome the chaotic masking break and considered more secure.
Securing digital voice communication using non-autonomous modulated chaotic signal
Journal of Information Security and Applications, 2017
In this paper, we present an encryption approach for voice communication systems based on direct chaotic modulation (non-autonomous modulation), in which voice is injected into one variable of the master system (using either Lorenz chaotic flow or Qi hyperchaotic flow) without changing the value of any control parameter. This approach is based on the change of chaotic signal by injecting voice samples into one variable in chaotic system and hence generating a new chaotic signal. The voice signal is then extracted from the chaotic signal in the receiver side. Furthermore, we use a high dimension chaotic flow which increases the security of the encrypted signal. Non-autonomous modulation technique is suitable for secure real-time applications. We also presented a comparative study between the two approaches with their conventional chaotic masking counterparts. Experimental results show that non-autonomous methods give better performance than their chaotic masking counterparts when they are analyzed against Signal-to-Noise-Ratio (−38.55 dB vs. 38.51 dB and 59.22 dB vs. 58.11 dB), Segmental signal-to-Noise-Ratio (38.91 dB vs. 38.84 dB and 54.20 dB vs. 53.16 dB), Log-Likelihood Ratio (0.88 vs. 0.80 and 1.59 vs. 1.50), and Correlation Coefficient Analysis (0.0345 vs. 0.021 and 0.0 0 02 vs. 0.01012). Statistical analyses show that the second proposed approach has the best results for the encrypted signal. Modifying conventional chaotic approaches increases the security of the encryption system.
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
Iraqi journal of science, 2021
Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn't give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time random key used to encrypt each voice data in the RTP packet. Chaotic maps have been used successfully for encryption bulky data such as voice, image, and video, chaotic cryptography has good properties such as long periodicity, pseudo-randomness, and sensitivity to initial conditions and change in system parameters. A VoIP system was successfully implemented based on the on ITU-T G.729 for voice codec, as a multimedia encoding of Real-time Transport Protocol payload data, then, apply a proposed method to generate three-mixed logistic chaotic maps [1] and then analysis the encryption/ decryption quality measures for speech signal based this method. The experimental work demonstrates that the proposed scheme can provide confidentiality to voice data with voice over IP performance quality, minimum lost in transmitted packet, minimum average delay, and minimum jitter.
A novel chaotic encryption technique for secure communication
Second IFAC Conference on Analysis and Control of Chaotic Systems (2009), 2009
In this work, a novel chaotic encryption technique is proposed to realize a secure communication system. In the proposed method, the message signal to be transmitted is first encrypted using a chaotic keystream and then masked with a chaotic signal. At the receiver end, the received chaotic signal is used for synchronization and to recover the encrypted signal. After applying the same keystream used in transmitter side, the message signal could be decrypted back. The main contribution of this work is generation of the keystream which is not part of the transmitter chaotic oscillator but is produced using an oscillator of different structure.
A Combined Chaotic System for Speech Encryption
Engineering, Technology & Applied Science Research
This paper presents a speech encryption scheme by performing a combination of modified chaotic maps inspired by classic logistic and cubic maps. The main idea was to enhance the performance of classical chaotic maps by extending the range of the chaotic parameter. The resulted combining map was applied to a speech encryption scheme by using the confusion and diffusion architecture. The evaluation results showed a good performance regarding the chaotic behaviors such as initial value, control parameter, Lyapunov exponent, and bifurcation diagram. Simulations and computer evaluations with security analysis showed that the proposed chaotic system exhibits excellent performance in speech encryption against various attacks. The results obtained demonstrated the efficiency of the proposed scheme compared to an existing valuable method for static and differential cryptographic attacks.
Design of secure digital communication systems using DCSK chaotic modulation
Design and Test of Integrated …, 2006
Chaos-based communication can be applied advantageously only if the property of chaotic systems is suitably exploited. Chaos communication has been studied for only a little more than a decade while traditional communication schemes have been developed for nearly a century. The hope was (and still is) that for some application chaotic communication will prove to be better than traditional communication. Yet, after one decade of research, in most cases chaos communication did not take the place of traditional communication schemes. As far as communication efficiency is concerned, chaotic communication schemes are typically less efficient than their traditional counterpart. Still, the main advantage of chaotic communication schemes is for analogy implementation of secure communication. In traditional communication schemes data has to be digitized before encryption takes place. This is due to the fact that traditional encryption is based on discrete number theory. In this paper we study the performance of differential chaos shift key (DCSK) modulation and we compare it to BPSK modulation, a new application of DCSK modulation is presented (transmission of the image)
A New Audio Encryption Algorithm Based on Chaotic Block Cipher
—in this paper, new encryption algorithm for audio file is proposed based on a combination between block cipher and chaotic maps. The proposed algorithm encrypts and decrypts a block size of 625(25 × 25) bytes. Each block is inputs into three sages: Permutation stage, Xor adding stage, Substitution stage. In Permutation stage the audio block is permuted using chaotic Tent map. Then the resulted block is Xored with the key block and finally the resulted block is substituted using new substitution method based on multiplication inverse. The key is generated by new key generation algorithm based on Chebyshev polynomial. This algorithm was performed and analysis with audio files of varies sizes of a WAV file extension. The results from key space analysis, statistical analysis, MSE (mean square error) analyses, PSNR (Peak signal to noise ratio) analyses and entropy analyses showed that the algorithm is not vulnerable to brute force attacks, statistical attacks and achieve higher level of security.
Securing Modern Voice Communication Systems using Multilevel Chaotic Approach
International Journal of Computer Applications, 2016
In this paper, we present a new voice encryption for voice communication system. It is based on permutation and substitution of voice samples using transform domains and secret keys in time. To increase the security we design the system such that it is multilevel in the sense that two chaotic maps are used. This provides the encrypted signal with a high degree of confidence.
Chaos-Based Cryptography for Voice Secure Wireless Communication
Multidisciplinary Perspectives in Cryptology and Information Security, 2014
Chaos theory was originally developed by mathematicians and physicists. The theory deals with the behaviors of nonlinear dynamic systems. Chaos theory has desirable features, such as deterministic, nonlinear, irregular, long-term prediction, and sensitivity to initial conditions. Therefore, and based on chaos theory features, the security research community adopts chaos theory in modern cryptography. However, there are challenges of using chaos theory with cryptography, and this chapter highlights some of those challenges. The voice information is very important compared with the information of image and text. This chapter reviews most of the encryption techniques that adopt chaos-based cryptography, and illustrates the uses of chaos-based voice encryption techniques in wireless communication as well. This chapter summarizes the traditional and modern techniques of voice/speech encryption and demonstrates the feasibility of adopting chaos-based cryptography in wireless communications.