Merging the International Data Encryption Algorithm and Digital Chaotic Scrambler (DCS) to Enhance Audio Security
Received: 28 March 2025 | Revised: 4 May 2025 and 16 May 2025 | Accepted: 17 May 2025 | Online: 15 September 2025
Corresponding author: Bushra W. Hussein Al Zahawy
Abstract
Voice communication is a daily necessity, and as digital communication channels become increasingly widespread, the importance of voice transmission security is increasing. This paper proposes a robust and secure voice encryption system that combines chaotic systems and traditional cryptography. Specifically, it introduces a Digital Chaotic Scrambler (DCS) based on the Lorenz system to overcome the limitations of the International Data Encryption Algorithm (IDEA) in voice encryption. Incorporating the DCS into the IDEA structure enhances its resilience to cryptographic attacks. The DCS and IDEA's robust mathematical operations create a secure and efficient voice encryption system for real-time applications. Security metrics such as initial condition sensitivity, key sensitivity, and attack resistance quantify the proposed system's performance. Additional analyses, including key space analysis, statistical analysis, Mean Square Error (MSE), Signal-to-Noise Ratio (SNR), Segmental Spectral Signal-to-Noise Ratio (SSSNR), and Cepstral Distance (CD) demonstrate the effectiveness of the approach. Experimental results using audio files of various sizes in WAV format confirm that the suggested algorithms are not vulnerable to brute force or statistical attacks and achieve a higher level of security.
Keywords:
voice encryption, IDEA, chaos, digital chaotic scrambler, Lorenz system, MSE, correlation coefficientDownloads
References
A. Mahdi, A. K. Jawad, and S. S. Hreshee, "Digital Chaotic Scrambling of Voice Based on Duffing Map," International Journal of Information and Communication Sciences, vol. 1, no. 2, pp. 16–21, Aug. 2016.
M. Orceyre and R. Heller, "An approach to secure voice communication based on the data encryption standard," IEEE Communications Society Magazine, vol. 16, no. 6, pp. 41–50, Nov. 1978.
N. J. Corron and D. W. Hahs, "A new approach to communications using chaotic signals," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 44, no. 5, pp. 373–382, May 1997.
A. K. Jawad, G. Karimi, and M. Radmelkshahi, "A Novel Digital Audio Encryption Algorithm Using Three Hyperchaotic Rabinovich System Generators," ARO-The Scientific Journal Of Koya University, vol. 12, no. 2, pp. 234–245, Dec. 2024.
A. k. Jawad, G. Karimi, and M. Radmalekshahi, "A Novel Lorenz-Rossler-Chan (LRC) Algorithm for Efficient Chaos-Based Voice Encryption," in 2024 3rd International Conference on Advances in Engineering Science and Technology, Babil, Iraq, 2024, pp. 114–119.
W. Dai, X. Xu, X. Song, and G. Li, "Audio Encryption Algorithm Based on Chen Memristor Chaotic System," Symmetry, vol. 14, no. 1, Jan. 2022, Art. no. 17.
P. Sathiyamurthi, S. Ramakrishnan, S. Shobika, N. Subashri, and M. Prakavi, "Speech and Audio Cryptography System using Chaotic Mapping and Modified Euler’s System," in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India, 2018, pp. 606–611.
M. J. M. Ameen and S. S. Hreshee, "Hyperchaotic Modulo Operator Encryption Technique for Massive Multiple Input Multiple Output Generalized Frequency Division Multiplexing system," International Journal on Electrical Engineering and Informatics, vol. 14, no. 2, pp. 311–329, Jun. 2022.
M. J. M. Ameen and S. S. Hreshee, "Security analysis of encrypted audio based on elliptic curve and hybrid chaotic maps within GFDM modulator in 5G networks," Bulletin of Electrical Engineering and Informatics, vol. 12, no. 6, pp. 3467–3479, Dec. 2023.
W. Wei and J. Kim, "Modeling and Analysis of Chaos-based Spread Spectrum Scheme using Irregular LDPC Code and Non-Coherent 16-DCSK under Fading and Jamming," Engineering, Technology & Applied Science Research, vol. 9, no. 6, pp. 5080–5087, Dec. 2019.
B. Rahul, K. Kuppusamy, and A. Senthilrajan, "Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm," Multimedia Tools and Applications, vol. 82, no. 28, pp. 43729–43758, Nov. 2023.
X. Wang and Y. Su, "An Audio Encryption Algorithm Based on DNA Coding and Chaotic System," IEEE Access, vol. 8, pp. 9260–9270, 2020.
A. K. Jawad, H. N. Abdullah, S. S. Hreshee, and G. Karimi, "Performance Improvement of Chaotic Masking System using Power Control Method," in International Middle Eastern Simulation and Modelling Conference, Baghdad, Iraq, 2022, pp. 19–23.
H. N. Abdullah, S. S. Hreshee, and A. K. Jawad, "Design of Efficient Noise Reduction Scheme for Secure Speech Masked by Chaotic Signals," Journal of American Science, vol. 11, no. 7, pp. 49–55, Jul. 2015.
H. N. Abdullah, S. S. Hreshee, and A. K. Jawad, "Noise Reduction of Chaotic Masking System using Repetition Method," Unpublished, Feb. 2015.
W. A. Nassan, T. Bonny, and A. Baba, "A New Chaos-Based Cryptoystem for Voice Encryption," in 2020 3rd International Conference on Signal Processing and Information Security, Dubai, United Arab Emirates, 2020, pp. 1–4.
T. Bonny, W. A. Nassan, and A. Baba, "Voice encryption using a unified hyper-chaotic system," Multimedia Tools and Applications, vol. 82, no. 1, pp. 1067–1085, Jan. 2023.
A. K. Jawad, H. N. Abdullah, and S. S. Hreshee, "Secure speech communication system based on scrambling and masking by chaotic maps," in 2018 International Conference on Advance of Sustainable Engineering and its Application, Kut, Iraq, 2018, pp. 7–12.
E. A. Hussein, M. K. Khashan, and A. K. Jawad, "A high security and noise immunity of speech based on double chaotic masking," International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4, pp. 4270–4278, Aug. 2020.
S. S. Hreshee, H. N. Abdullah, and A. K. Jawad, "A High Security Communication System Based on Chaotic Scrambling and Chaotic Masking," International Journal on Communications Antenna and Propagation (IRECAP), vol. 8, no. 3, pp. 257–264, Jun. 2018.
M. Baykara, R. Daş, and G. Tuna, "A Novel Symmetric Encryption Algorithm and its Implementation," Turkish Journal of Science and Technology, vol. 12, no. 1, pp. 5–9, Mar. 2017.
S. Basu, "International Data Encryption Algorithm (IDEA) – A Typical Illustration," Journal of Global Research in Computer Science, vol. 2, no. 7, pp. 116–118, Jul. 2011.
H. P. Singh, S. Verma, and S. Mishra, "Secure-International Data Encryption Algorithm," International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 2, no. 2, pp. 780–792, Feb. 2013.
A. Mostafa, Naglaa. F. Soliman, M. Abdalluh, and F. E. Abd El-samie, "Speech encryption using two dimensional chaotic maps," in 2015 11th International Computer Engineering Conference, Cairo, Egypt, 2015, pp. 235–240.
S. M. H. Alwahbani and E. B. M. Bashier, "Speech scrambling based on chaotic maps and one time pad," in 2013 International Conference on Computing, Electrical and Electronic Engineering, Khartoum, Sudan, 2013, pp. 128–133.
S. Pati, M. Mishra, and J. Rout, "Securing Audio with 3D-Chaotic Map Based Hybrid Encryption Technique," International Journal of Computing and Digital Systems, vol. 18, no. 1, pp. 1–15, Aug. 2024.
H. A. Ismael and S. B. Sadkhan, "Security enhancement of speech scrambling using triple Chaotic Maps," in 2017 Annual Conference on New Trends in Information & Communications Technology Applications, Baghdad, Iraq, 2017, pp. 132–137.
I. Jomaa, W. M. Saleh, R. R. I. Hassan, and S. H. H. Wadi, "Secured drone communication based on Esalsa20 algorithm and 1d logistic map," Indonesian Journal of Electrical Engineering and Computer Science, vol. 29, no. 2, pp. 861–874, Feb. 2023.
H. Mahalingam, T. Veeramalai, A. R. Menon, S. S., and R. Amirtharajan, "Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective," Mathematics, vol. 11, no. 2, Jan. 2023, Art. no. 457.
M. Khalid, E. A. Hussein, and A. K. Jawad, "Digital Image Encryption Based on Random Sequences and XOR Operation," Journal of Engineering and Applied Sciences, vol. 14, no. 8, pp. 10331–10334, Nov. 2019.
H. Tian, Z. Wang, P. Zhang, M. Chen, and Y. Wang, "Dynamic Analysis and Robust Control of a Chaotic System with Hidden Attractor," Complexity, vol. 2021, no. 1, Jan. 2021, Art. no. 8865522.
S. Mokhnache, M. E. H. Daachi, T. Bekkouche, and N. Diffellah, "A Combined Chaotic System for Speech Encryption," Engineering, Technology & Applied Science Research, vol. 12, no. 3, pp. 8578–8583, Jun. 2022.
A. A. Abdul-Kareem and W. A. M. Al-Jawher, "An image encryption algorithm using hybrid sea lion optimization and chaos theory in the hartley domain," International Journal of Computers and Applications, vol. 46, no. 5, pp. 324–337, May 2024.
D. Raghuvanshi, K. Joshi, R. Nandal, H. Sehrawat, S. Singh, and S. Singh, "Improved security with novel M-Log chaos steganography algorithm for huffman compressed english text," Multimedia Tools and Applications, vol. 84, no. 2, pp. 665–688, Jan. 2025.
H. Rafiee, M. Mahdavi, and A. NaghshNilchi, "Introducing a New Evaluation Criteria for EMD-Base Steganography Method." arXiv, Aug. 15, 2023.
M. Moghtadaei and M. R. Hashemi Golpayegani, "Complex dynamic behaviors of the complex Lorenz system," Scientia Iranica, vol. 19, no. 3, pp. 733–738, Jun. 2012.
W. A. H. Hadi, H. F. Y. Hussein, and A. K. Jawad, "Enhancement of Image Transmission Using Chaotic Interleaver over Wireless Sensor Network," International Journal of New Technology and Research, vol. 2, no. 7, pp. 24–28, 2016.
X. Li, H. Yu, H. Zhang, X. Jin, H. Sun, and J. Liu, "Video encryption based on hyperchaotic system," Multimedia Tools and Applications, vol. 79, no. 33, pp. 23995–24011, Sep. 2020.
A. Elsharkawi, R. M. El-Sagheer, H. Akah, and H. Taha, "A Novel Image Stream Cipher Based On Dynamic Substitution," Engineering, Technology & Applied Science Research, vol. 6, no. 5, pp. 1195–1199, Oct. 2016.
A. R. Alharbi et al., "A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map," Complexity, vol. 2022, no. 1, Apr. 2022, Art. no. 7047282.
A. H. Elsafty, M. F. Tolba, L. A. Said, A. H. Madian, and A. G. Radwan, "FPGA Speech Encryption Realization Based on Variable S-Box and Memristor Chaotic Circuit," in 2018 30th International Conference on Microelectronics, Sousse, Tunisia, 2018, pp. 152–155.
A. H. ElSafty, M. F. Tolba, L. A. Said, A. H. Madian, and A. G. Radwan, "Hardware realization of a secure and enhanced s-box based speech encryption engine," Analog Integrated Circuits and Signal Processing, vol. 106, no. 2, pp. 385–397, Feb. 2021.
S. B. Sadkhab, A. M. Raheema, and S. M. Abdul Sattar, "Design and Implementation Voice Scrambling Model Based on Hybrid Chaotic Signals," in 2019 First International Conference of Computer and Applied Sciences, Baghdad, Iraq, 2019, pp. 193–198.
W. A. Al-Musawi, M. A. A. Al-Ibadi, and W. A. Wali, "Artificial intelligence techniques for encrypt images based on the chaotic system implemented on field-programmable gate array," IAES International Journal of Artificial Intelligence, vol. 12, no. 1, pp. 347–356, Mar. 2023.
H. Wen et al., "High-quality restoration image encryption using DCT frequency-domain compression coding and chaos," Scientific Reports, vol. 12, no. 1, Oct. 2022, Art. no. 16523.
P. V. S. Reddy and M. N. R, "Reduction of Correlation in 2D Image Encryption using Novel Gingerbreadman Chaotic Map in Comparison with Tinkerbell Map," Baltic Journal of Law & Politics, vol. 15, no. 4, pp. 147–158, Dec. 2022.
F. J. Farsana, V. R. Devi, and K. Gopakumar, "An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams," Applied Computing and Informatics, vol. 19, no. 3/4, pp. 239–264, Jun. 2023.
H. Elkamchouchi, W. M. Salama, and Y. Abouelseoud, "New video encryption schemes based on chaotic maps," IET Image Processing, vol. 14, no. 2, pp. 397–406, Feb. 2020.
M. K. M. AlAzawi and J. Q. Kadhim, "Speech Scrambling Employing Lorenz Fractional Order Chaotic System," Journal of Engineering and Sustainable Development, vol. 17, no. 4, pp. 195–211, Oct. 2013.
Z. Ali, K. Saleem, R. Brown, N. Christofides, and S. Dudley, "Performance Analysis and Benchmarking of PLL-Driven Phasor Measurement Units for Renewable Energy Systems," Energies, vol. 15, no. 5, Mar. 2022, Art. no. 1867.
Downloads
How to Cite
License
Copyright (c) 2025 Bushra W. Hussein Al Zahawy, Saad S. Hreshee

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.