A Combined Chaotic System for Speech Encryption
Received: 13 March 2022 | Revised: 26 March 2022 | Accepted: 29 March 2022 | Online: 9 April 2022
This paper presents a speech encryption scheme by performing a combination of modified chaotic maps inspired by classic logistic and cubic maps. The main idea was to enhance the performance of classical chaotic maps by extending the range of the chaotic parameter. The resulted combining map was applied to a speech encryption scheme by using the confusion and diffusion architecture. The evaluation results showed a good performance regarding the chaotic behaviors such as initial value, control parameter, Lyapunov exponent, and bifurcation diagram. Simulations and computer evaluations with security analysis showed that the proposed chaotic system exhibits excellent performance in speech encryption against various attacks. The results obtained demonstrated the efficiency of the proposed scheme compared to an existing valuable method for static and differential cryptographic attacks.
Keywords:speech encryption, chaos, modified chaotic maps
S. NajimAlSaad and E. Hato, "A Speech Encryption based on Chaotic Maps," International Journal of Computer Applications, vol. 93, no. 4, pp. 19–28, May 2014. DOI: https://doi.org/10.5120/16203-5488
M. O. Al-Dwairi, A. Y. Hendi, and Z. A. AlQadi, "An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4165–4168, Jun. 2019. DOI: https://doi.org/10.48084/etasr.2525
R. J. Rasras, Z. A. AlQadi, and M. R. A. Sara, "A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages," Engineering, Technology & Applied Science Research, vol. 9, no. 1, pp. 3681–3684, Feb. 2019. DOI: https://doi.org/10.48084/etasr.2380
H. O. Alanazi, B. B. Zaidan, A. A. Zaidan, H. A. Jalab, M. Shabbir, and Y. Al-Nabhani, "New Comparative Study Between DES, 3DES and AES within Nine Factors," Journal of Computing, vol. 2, no. 3, pp. 152–157, Mar. 2010.
P. Patil, P. Narayankar, Narayan D.G., and Meena S.M., "A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish," Procedia Computer Science, vol. 78, pp. 617–624, Jan. 2016. DOI: https://doi.org/10.1016/j.procs.2016.02.108
R. Matthews, "On the Derivation of a ‘Chaotic’ Encryption Algorithm," Cryptologia, vol. 13, no. 1, pp. 29–42, Jan. 1989. DOI: https://doi.org/10.1080/0161-118991863745
Y. Hu and R. Tian, "Image Encryption and Decryption Based on Chaotic Algorithm," Journal of Applied Mathematics and Physics, vol. 8, no. 9, pp. 1814–1825, Sep. 2020. DOI: https://doi.org/10.4236/jamp.2020.89136
J. Fridrich, "Symmetric Ciphers Based on Two-Dimensional Chaotic Maps," International Journal of Bifurcation and Chaos, vol. 08, no. 06, pp. 1259–1284, Jun. 1998. DOI: https://doi.org/10.1142/S021812749800098X
X. Wang and Q. Yu, "A block encryption algorithm based on dynamic sequences of multiple chaotic systems," Communications in Nonlinear Science and Numerical Simulation, vol. 14, no. 2, pp. 574–581, Feb. 2009. DOI: https://doi.org/10.1016/j.cnsns.2007.10.011
B. Flaeh and M. Dhiaa, "Multi-Levels Image Encryption Technique based on Multiple Chaotic Maps and Dynamic Matrix," International Journal of Computer Applications, vol. 151, no. 3, pp. 1–5, Oct. 2016. DOI: https://doi.org/10.5120/ijca2016911693
E. Hato and D. Shihab, "Lorenz and Rossler Chaotic System for Speech Signal Encryption," International Journal of Computer Applications, vol. 128, no. 11, pp. 25–33, Oct. 2015. DOI: https://doi.org/10.5120/ijca2015906670
A. Elsharkawi, R. M. El-Sagheer, H. Akah, and H. Taha, "A Novel Image Stream Cipher Based On Dynamic Substitution," Engineering, Technology & Applied Science Research, vol. 6, no. 5, pp. 1195–1199, Oct. 2016. DOI: https://doi.org/10.48084/etasr.729
M. Boumaraf and F. Merazka, "Partial and full speech encryption schemes based on 1D chaotic maps for AMR-WB codec," in 2018 2nd International Conference on Natural Language and Speech Processing (ICNLSP), Algiers, Algeria, Apr. 2018, pp. 1–5. DOI: https://doi.org/10.1109/ICNLSP.2018.8374388
C. Pak and L. Huang, "A new color image encryption using combination of the 1D chaotic map," Signal Processing, vol. 138, pp. 129–137, Sep. 2017. DOI: https://doi.org/10.1016/j.sigpro.2017.03.011
S. Gokavarapu and S. V. Kumari, "A Novel Encryption Using One Dimensional Chaotic Maps," in Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1, 2015, pp. 193–203. DOI: https://doi.org/10.1007/978-3-319-13728-5_22
E. N. Lorenz, "Deterministic Nonperiodic Flow," Journal of the Atmospheric Sciences, vol. 20, no. 2, pp. 130–141, Mar. 1963. DOI: https://doi.org/10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2
P. Sathiyamurthi and S. Ramakrishnan, "Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map," Multimedia Tools and Applications, vol. 79, no. 25, pp. 17817–17835, Jul. 2020. DOI: https://doi.org/10.1007/s11042-020-08729-5
I.-I. B. Ltd, "Speech Encryption Technique using S - box based on Multi Chaotic Maps," TEM Journal, vol. 10, no. 3, pp. 1429–1434, 2021. DOI: https://doi.org/10.18421/TEM103-54
P. Sathiyamurthi and S. Ramakrishnan, "Speech encryption using chaotic shift keying for secured speech communication," EURASIP Journal on Audio, Speech, and Music Processing, vol. 2017, no. 1, Sep. 2017, Art. no. 20. DOI: https://doi.org/10.1186/s13636-017-0118-0
How to Cite
MetricsAbstract Views: 219
PDF Downloads: 135
Copyright (c) 2022 S. Mokhnache, M. E. H. Daachi, T. Bekkouche, N. Diffellah
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.