| Peer-Reviewed

Comparison of Audio Speech Cryptosystem Using 2-D Chaotic Map Algorithms

Received: 30 August 2016     Accepted: 8 September 2016     Published: 10 October 2016
Views:       Downloads:
Abstract

This paper presents a comparison between different audio speech encryption and decryption techniques for audio speech signals based on 2-D chaotic map algorithms with time and transform domains in a search for best of them and study advantages and disadvantages for each of them. Chaotic algorithms will be used because they have advantages of its casual Conduct and sensitivity to values of parameters and primary conditions that enable chaotic algorithms to fulfill the cryptographic systems. We consider doing simulation tests using MATLAB codes for logistic 2D map, Henon map, Standard map and baker map. Real simulation results show that baker map with TD exhibits best quality for both encryption and decryption and has a well balance between its advantages and disadvantages among other algorithms in comparison.

Published in Mathematics and Computer Science (Volume 1, Issue 4)
DOI 10.11648/j.mcs.20160104.11
Page(s) 66-81
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2016. Published by Science Publishing Group

Keywords

Audio Speech Encryption, Chaotic Map, Speech Communication, Logistic 2D Map, Henon Map, Standard Map, Chaotic Baker Map

References
[1] Li, T. and Jiang, J. Digital signal processing: fundamentals and applications. Academic Press, 2013.
[2] Azriel, R. and Kak, A. Digital picture processing. Vol. 1. Elsevier, 2014.‏
[3] Badih, G., et al. "Sample-optimal average-case sparse fourier transform in two dimensions." arXiv preprint arXiv: 1303.1209 (2013).‏
[4] Ehsan, V., Wong, V. and Blake, I. "An Overview of Cryptography." Crisis Management: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications (2013): 102.‏
[5] Zhongyun, H., et al. "2D Sine Logistic modulation map for image encryption." Information Sciences 297 (2015): 80-94
[6] Kunal Kumar, k., et al. "Comparative study of image encryption using 2D chaotic map." Information Systems and Computer Networks (ISCON), 2014 International Conference on. IEEE, 2014.
[7] Lin, Q., et al. "A blind source separation based method for speech encryption", IEEE Trans. On Circuits and Systems-I, vol. 53, no. 6, pp. 1320-1328, 2006.
[8] Wu, Y. and Ng, B.P. "Speech scrambling with Hadamard transform in frequency domain", Proc. 6th Int. Conf. on Signal Processing, vol. 2, pp. 1560-1563, 2002.
[9] Manjunath, G. and Anand, G. V. "Speech encryption using circulate transformations", Proc. IEEE, Int. Conf. Multimedia and Exp, vol. 1, pp. 553-556, 2002.
[10] "Advanced Encryption System", Federal Information Processing Standards Publication, 197, 2001
[11] Ghada, Z., et al. "Efficient and secure chaotic S‐Box for wireless sensor network." Security and Communication Networks 7.2 (2014): 279-292.‏
[12] Ahmed, A., et al. "Defense against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard." (2014): 1-1.‏
[13] Prempratap, S. Gosawi, G. and Dubey, S. "Genetic Algorithms: A Technique For Cryptography Real Time Data Transmission." Binary Journal of Data Mining & Networking 4.2 (2014): 37-40.‏
[14] Mosa E., et al "Encryption of Speech Signal with Multiple Secret Keys in Time Transform Domains " Int. J Speech Technol., Vol. 13 PP. 231-242 (2010).
[15] Yicong, Z., Bao, L. and Philip Chen, CL. "A new 1D chaotic system for image encryption." Signal processing 97 (2014): 172-182.‏
[16] Xiong, W. and Chen, G. "Constructing a chaotic system with any number of equilibria." Nonlinear Dynamics 71.3 (2013): 429-436.
[17] Chittaranjan, P., et al. "Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Cryptosystem in Wavelets." International Journal on Recent Trends in Engineering and Technology 10.2 (2014): 70-77.‏
[18] Rajinder, K. and Singh, Er. "Comparative Analysis and Implementation of Image Encryption Algorithms." International Journal of Computer Science and Mobile Computing (IJCSMC) 2.4 (2013): 170-176.‏
[19] Samuel, S. and Takahasi, H. "Equilibrium measures for the Hénon map at the first bifurcation." Nonlinearity 26.6 (2013): 1719.‏
[20] Narcís, M., Simó, C. and Vieiro, A. "From the Hénon conservative map to the Chirikov standard map for large parameter values." Regular and Chaotic Dynamics 18.5 (2013): 469-489.‏
[21] Yushu, Z. and Xiao, Di. "Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform." Optics and Lasers in Engineering 51.4 (2013): 472-480.‏
[22] Wei, Z., et al. "An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion." Communications in Nonlinear Science and Numerical Simulation 18.8 (2013): 2066-2080.
[23] Iqtadar, H., et al. "Efficient method for designing chaotic S-boxes based on generalized Baker’s map and TDERC chaotic sequence." Nonlinear Dynamics 74.1-2 (2013): 271-275.‏
[24] Xiao-Jun, T. "Design of an image encryption scheme based on a multiple chaotic map." Communications in Nonlinear Science and Numerical Simulation 18.7 (2013): 1725-1733.‏
[25] Wang, X. and Lin-Tao, L. "Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices." Chinese Physics B 22.5 (2013): 050503.‏
[26] Reza, D. and Gottemukkula, V. "Quality metrics for biometric authentication." U.S. Patent No. 8,724,857. 13 May 2014.‏
[27] Sang Yeob, O. and Chung, K. "Target speech feature extraction using non-parametric correlation coefficient." Cluster Computing 17.3 (2014): 893-899.‏
[28] El-Samie, F., et al. Image Encryption: A Communication Perspective. CRC Press, 2013.‏
[29] Abdul Hamid, R., et al. "Encryption Quality Evaluation of Robust Chaotic Block Cipher for Digital Imaging." International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878.‏
[30] Mona, M., et al. "A New Image Encryption Scheme Based on Multiple Chaotic Systems in Different Modes of Operation."‏
[31] Ahmed, E., et al. "Optical image encryption based on chaotic baker map and double random phase encoding." Journal of Lightwave Technology 31.15 (2013): 2533-2539.‏
[32] ON, EFFICIENT VISUAL QUALITY INDEX BASED. "An Effective and Efficient Visual Quality Index based on Local Edge Gradients." Visual Evaluation, Scaling and Transport of Secure Videos (2013): 53.‏
[33] Gilbert, M. and Peng, D. Introduction. Springer International Publishing, 2014.‏
[34] Leeuwen, V., David A., and Brümmer, N. "The distribution of calibrated likelihood-ratios in speaker recognition." arXiv preprint arXiv:1304.1199 (2013).‏
[35] Navjot, K, and Kaur, U. "Audio Watermarking using Arnold transformation with DWT-DCT." Issues 1.1: 286-294.‏
[36] Cheng, L. "On computing the two-dimensional (2-D) type IV discrete cosine transform (2-D DCT-IV)", IEEE Signal Processing Letters, vol. 8, Issue. 8, pp. 239 – 241, August 2001.
[37] Jyoti, R. and Ahmad, T. "Performance Optimized DCT Domain Watermarking Technique with JPEG." International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075.‏
[38] Kekre, H. B., et al. "Comparative Performance of Image Scrambling in Transform Domain using Sinusoidal Transforms." International Journal of Image Processing (IJIP) 8.2 (2014): 49.‏
[39] Ehab H., et al. "Robust and secure fractional wavelet image watermarking." Signal, Image and Video Processing (2014): 1-10.‏
[40] Kekre, H. B., Sarode, T. and Natu, S. "Robust Watermarking Technique using Hybrid Wavelet Transform Generated from Kekre Transform and Discrete Cosine Transform." International Journal of Scientific and Research Publications: 152.‏
[41] Xueyao, L. Hua, X. and Bailing, C. "Noisy Speech Enhancement Based on Discrete Sine Transform", First International Multi-Symposiums on Computer and Computational Sciences, IMSCCS 2006, vol. 1, pp. 199 – 202, 2006.
[42] Bernadin, S. L. and Foo, S. Y. "Wavelet Processing for Pitch Period Estimation", Proceedings of the 38th Southeastern Symposium on System Theory Tennessee Technological University Cookeville, TN, USA, 5-7 March, 2006.
[43] Krishnan, V. and Jayakumar, A. "Speech Recognition of Isolated Malayalam Words Using Wavelet Features and Artificial Neural Network", 4th IEEE International Symposium on Electronic Design, Test & Applications, DELTA2008, PP. 240- 243, 23-25 January, 2008.
[44] Tufekci Z. and Gowdy J. N, “Feature Extraction Using Discrete Wavelet Transform for Speech Recognition”, Southeastcon 2000. Proceedings of the IEEE, pp. 116 – 123, 7-9 April 2000.
[45] Malik, S. and Afsar, F. A. "Wavelet Transform Based Automatic Speaker Recognition", IEEE 13th International Multitopic Conference (INMIC2009), PP. 1-4, 14-15 December, 2009.
Cite This Article
  • APA Style

    Mahmoud Farouk, Osama Faragallah, Osama Elshakankiry, Ahmed Elmhalaway. (2016). Comparison of Audio Speech Cryptosystem Using 2-D Chaotic Map Algorithms. Mathematics and Computer Science, 1(4), 66-81. https://doi.org/10.11648/j.mcs.20160104.11

    Copy | Download

    ACS Style

    Mahmoud Farouk; Osama Faragallah; Osama Elshakankiry; Ahmed Elmhalaway. Comparison of Audio Speech Cryptosystem Using 2-D Chaotic Map Algorithms. Math. Comput. Sci. 2016, 1(4), 66-81. doi: 10.11648/j.mcs.20160104.11

    Copy | Download

    AMA Style

    Mahmoud Farouk, Osama Faragallah, Osama Elshakankiry, Ahmed Elmhalaway. Comparison of Audio Speech Cryptosystem Using 2-D Chaotic Map Algorithms. Math Comput Sci. 2016;1(4):66-81. doi: 10.11648/j.mcs.20160104.11

    Copy | Download

  • @article{10.11648/j.mcs.20160104.11,
      author = {Mahmoud Farouk and Osama Faragallah and Osama Elshakankiry and Ahmed Elmhalaway},
      title = {Comparison of Audio Speech Cryptosystem Using 2-D Chaotic Map Algorithms},
      journal = {Mathematics and Computer Science},
      volume = {1},
      number = {4},
      pages = {66-81},
      doi = {10.11648/j.mcs.20160104.11},
      url = {https://doi.org/10.11648/j.mcs.20160104.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.mcs.20160104.11},
      abstract = {This paper presents a comparison between different audio speech encryption and decryption techniques for audio speech signals based on 2-D chaotic map algorithms with time and transform domains in a search for best of them and study advantages and disadvantages for each of them. Chaotic algorithms will be used because they have advantages of its casual Conduct and sensitivity to values of parameters and primary conditions that enable chaotic algorithms to fulfill the cryptographic systems. We consider doing simulation tests using MATLAB codes for logistic 2D map, Henon map, Standard map and baker map. Real simulation results show that baker map with TD exhibits best quality for both encryption and decryption and has a well balance between its advantages and disadvantages among other algorithms in comparison.},
     year = {2016}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Comparison of Audio Speech Cryptosystem Using 2-D Chaotic Map Algorithms
    AU  - Mahmoud Farouk
    AU  - Osama Faragallah
    AU  - Osama Elshakankiry
    AU  - Ahmed Elmhalaway
    Y1  - 2016/10/10
    PY  - 2016
    N1  - https://doi.org/10.11648/j.mcs.20160104.11
    DO  - 10.11648/j.mcs.20160104.11
    T2  - Mathematics and Computer Science
    JF  - Mathematics and Computer Science
    JO  - Mathematics and Computer Science
    SP  - 66
    EP  - 81
    PB  - Science Publishing Group
    SN  - 2575-6028
    UR  - https://doi.org/10.11648/j.mcs.20160104.11
    AB  - This paper presents a comparison between different audio speech encryption and decryption techniques for audio speech signals based on 2-D chaotic map algorithms with time and transform domains in a search for best of them and study advantages and disadvantages for each of them. Chaotic algorithms will be used because they have advantages of its casual Conduct and sensitivity to values of parameters and primary conditions that enable chaotic algorithms to fulfill the cryptographic systems. We consider doing simulation tests using MATLAB codes for logistic 2D map, Henon map, Standard map and baker map. Real simulation results show that baker map with TD exhibits best quality for both encryption and decryption and has a well balance between its advantages and disadvantages among other algorithms in comparison.
    VL  - 1
    IS  - 4
    ER  - 

    Copy | Download

Author Information
  • Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University, Menouf, Egypt

  • Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University, Menouf, Egypt

  • Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University, Menouf, Egypt

  • Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University, Menouf, Egypt

  • Sections