A Combined Chaotic System for Speech Encryption

Authors

  • S. Mokhnache EBT Department, University Ferhat Abbas Setif 1, Algeria
  • M. E. H. Daachi ETA Laboratory, Electronics Department, Mohamed El Bachir El Ibrahimi University, Algeria
  • T. Bekkouche Electromecanics Department, ETA Laboratory, Mohamed El Bachir El Ibrahimi University, Algeria
  • N. Diffellah Electronics Department, ETA Laboratory, Mohamed El Bachir El Ibrahimi University, Algeria

Abstract

This paper presents a speech encryption scheme by performing a combination of modified chaotic maps inspired by classic logistic and cubic maps. The main idea was to enhance the performance of classical chaotic maps by extending the range of the chaotic parameter. The resulted combining map was applied to a speech encryption scheme by using the confusion and diffusion architecture. The evaluation results showed a good performance regarding the chaotic behaviors such as initial value, control parameter, Lyapunov exponent, and bifurcation diagram. Simulations and computer evaluations with security analysis showed that the proposed chaotic system exhibits excellent performance in speech encryption against various attacks. The results obtained demonstrated the efficiency of the proposed scheme compared to an existing valuable method for static and differential cryptographic attacks.

Keywords:

speech encryption, chaos, modified chaotic maps

Downloads

Download data is not yet available.

References

S. NajimAlSaad and E. Hato, "A Speech Encryption based on Chaotic Maps," International Journal of Computer Applications, vol. 93, no. 4, pp. 19–28, May 2014. DOI: https://doi.org/10.5120/16203-5488

M. O. Al-Dwairi, A. Y. Hendi, and Z. A. AlQadi, "An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4165–4168, Jun. 2019. DOI: https://doi.org/10.48084/etasr.2525

R. J. Rasras, Z. A. AlQadi, and M. R. A. Sara, "A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages," Engineering, Technology & Applied Science Research, vol. 9, no. 1, pp. 3681–3684, Feb. 2019. DOI: https://doi.org/10.48084/etasr.2380

H. O. Alanazi, B. B. Zaidan, A. A. Zaidan, H. A. Jalab, M. Shabbir, and Y. Al-Nabhani, "New Comparative Study Between DES, 3DES and AES within Nine Factors," Journal of Computing, vol. 2, no. 3, pp. 152–157, Mar. 2010.

P. Patil, P. Narayankar, Narayan D.G., and Meena S.M., "A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish," Procedia Computer Science, vol. 78, pp. 617–624, Jan. 2016. DOI: https://doi.org/10.1016/j.procs.2016.02.108

R. Matthews, "On the Derivation of a ‘Chaotic’ Encryption Algorithm," Cryptologia, vol. 13, no. 1, pp. 29–42, Jan. 1989. DOI: https://doi.org/10.1080/0161-118991863745

Y. Hu and R. Tian, "Image Encryption and Decryption Based on Chaotic Algorithm," Journal of Applied Mathematics and Physics, vol. 8, no. 9, pp. 1814–1825, Sep. 2020. DOI: https://doi.org/10.4236/jamp.2020.89136

J. Fridrich, "Symmetric Ciphers Based on Two-Dimensional Chaotic Maps," International Journal of Bifurcation and Chaos, vol. 08, no. 06, pp. 1259–1284, Jun. 1998. DOI: https://doi.org/10.1142/S021812749800098X

X. Wang and Q. Yu, "A block encryption algorithm based on dynamic sequences of multiple chaotic systems," Communications in Nonlinear Science and Numerical Simulation, vol. 14, no. 2, pp. 574–581, Feb. 2009. DOI: https://doi.org/10.1016/j.cnsns.2007.10.011

B. Flaeh and M. Dhiaa, "Multi-Levels Image Encryption Technique based on Multiple Chaotic Maps and Dynamic Matrix," International Journal of Computer Applications, vol. 151, no. 3, pp. 1–5, Oct. 2016. DOI: https://doi.org/10.5120/ijca2016911693

E. Hato and D. Shihab, "Lorenz and Rossler Chaotic System for Speech Signal Encryption," International Journal of Computer Applications, vol. 128, no. 11, pp. 25–33, Oct. 2015. DOI: https://doi.org/10.5120/ijca2015906670

A. Elsharkawi, R. M. El-Sagheer, H. Akah, and H. Taha, "A Novel Image Stream Cipher Based On Dynamic Substitution," Engineering, Technology & Applied Science Research, vol. 6, no. 5, pp. 1195–1199, Oct. 2016. DOI: https://doi.org/10.48084/etasr.729

M. Boumaraf and F. Merazka, "Partial and full speech encryption schemes based on 1D chaotic maps for AMR-WB codec," in 2018 2nd International Conference on Natural Language and Speech Processing (ICNLSP), Algiers, Algeria, Apr. 2018, pp. 1–5. DOI: https://doi.org/10.1109/ICNLSP.2018.8374388

C. Pak and L. Huang, "A new color image encryption using combination of the 1D chaotic map," Signal Processing, vol. 138, pp. 129–137, Sep. 2017. DOI: https://doi.org/10.1016/j.sigpro.2017.03.011

S. Gokavarapu and S. V. Kumari, "A Novel Encryption Using One Dimensional Chaotic Maps," in Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1, 2015, pp. 193–203. DOI: https://doi.org/10.1007/978-3-319-13728-5_22

E. N. Lorenz, "Deterministic Nonperiodic Flow," Journal of the Atmospheric Sciences, vol. 20, no. 2, pp. 130–141, Mar. 1963. DOI: https://doi.org/10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2

P. Sathiyamurthi and S. Ramakrishnan, "Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map," Multimedia Tools and Applications, vol. 79, no. 25, pp. 17817–17835, Jul. 2020. DOI: https://doi.org/10.1007/s11042-020-08729-5

I.-I. B. Ltd, "Speech Encryption Technique using S - box based on Multi Chaotic Maps," TEM Journal, vol. 10, no. 3, pp. 1429–1434, 2021. DOI: https://doi.org/10.18421/TEM103-54

P. Sathiyamurthi and S. Ramakrishnan, "Speech encryption using chaotic shift keying for secured speech communication," EURASIP Journal on Audio, Speech, and Music Processing, vol. 2017, no. 1, Sep. 2017, Art. no. 20. DOI: https://doi.org/10.1186/s13636-017-0118-0

Downloads

How to Cite

[1]
S. Mokhnache, M. E. H. Daachi, T. Bekkouche, and N. Diffellah, “A Combined Chaotic System for Speech Encryption”, Eng. Technol. Appl. Sci. Res., vol. 12, no. 3, pp. 8578–8583, Jun. 2022.

Metrics

Abstract Views: 356
PDF Downloads: 210

Metrics Information
Bookmark and Share

Most read articles by the same author(s)