Skip to main content
Log in

Encryption of speech signal with multiple secret keys in time and transform domains

  • Published:
International Journal of Speech Technology Aims and scope Submit manuscript

Abstract

This paper introduces a new speech cryptosystem, which is based on permutation and masking of speech segments using multiple secret keys in both time and transform domains. The main key is generated, randomly, using a Pseudo Noise (PN) sequence generator, and two other keys are generated from the main key to be used in the subsequent rounds of encryption. Either the Discrete Cosine Transform (DCT) or the Discrete Sine Transform (DST) can be used in the proposed cryptosystem to remove the residual intelligibility resulting from permutation and masking in the time domain. In the proposed cryptosystem, the permutation process is performed with circular shifts calculated from the key bits. The utilized mask is also generated from the secret key by circular shifts. The proposed cryptosystem has a low complexity, small delay, and high degree of security. Simulation results prove that the proposed cryptosystem is robust to the presence of noise.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Abd El-Samie, F. E. (2009). An efficient singular value decomposition algorithm for digital audio watermarking. International Journal of Speech Technology, 12(1), 27–45.

    Article  Google Scholar 

  • Advanced Encryption System (2001). Federal Information Processing Standards Publication 197.

  • Andrade, J. F., Campos, M. L., & Apolinario, J. A. (2008). Speech privacy for modern mobile communication systems. In IEEE international conference on acoustics, speech and signal processing.

    Google Scholar 

  • Anoop (2007). Public key cryptography—applications algorithm and mathematical explanations.

  • Behnia, S., Akhshani, A., Mahmodi, H., & Akhavan, A. (2006). A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals.

  • Bradley, E. (1995). Autonomous exploration and control of chaotic systems. IEEE Transactions on Systems, Man, and Cybernetics, 26(5), 499–519.

    MATH  Google Scholar 

  • Daemen, J., & Rijndael, V. R. (2001). The advanced encryption standard. Dr. Dobb’s Journal, 26(3), 137–139.

    Google Scholar 

  • El-Fishawy, N., & Abu Zaid, O. M. (2007). Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. International Journal of Network Security, 5(3), 241–251.

    Google Scholar 

  • Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.

    Article  MATH  MathSciNet  Google Scholar 

  • Goldburg, B., Sridharan, S., & Dawson, E. (1993). Design and cryptanalysis of transform based analog speech scramblers. IEEE Journal of Selected Areas on Communication, 11, 735–743.

    Article  Google Scholar 

  • Hassan, E. S., Zhu, X., El-Khamy, S. E., Dessouky, M. I., El-Dolil, S. A., & Abd El-Samie, F. E. (2010). A chaotic interleaving scheme for the continuous phase modulation based single-carrier frequency-domain equalization system. Wireless Personal Communications. doi:10.1007/s11277-010-0047-z.

  • Koduru, S. C., & Chandrasekaran, V. (2008). Integrated confusion-diffusion mechanisms for chaos based image encryption. In IEEE 8th international conference on computer and information technology workshops.

    Google Scholar 

  • Kuo, C. J. (1993). Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging, 2(4), 345–351.

    Article  Google Scholar 

  • Mao, Y. B., Chen, G., & Lian, S. G. (2004). A novel fast image encryption scheme based on the 3D chaotic Baker map. International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 14(10), 3613–3624.

    Article  MATH  MathSciNet  Google Scholar 

  • National Bureau of Standards (1977). Data encryption standard. Federal Information Processing Standards Publication no. 46, U.S. Government Printing Office, Washington.

  • Shannon, C. E. (1949). Communication theory of secrecy system. The Bell System Technical Journal, 28, 656–715.

    MATH  MathSciNet  Google Scholar 

  • Thongpon, T., & Sinchai, K. (2009). Accelerating asymmetric-key cryptography using parallel-key cryptographic algorithm (PCA). In 6th international conference on computer and information technology (Vol. 2, pp. 812–815).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to F. E. Abd El-Samie.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mosa, E., Messiha, N.W., Zahran, O. et al. Encryption of speech signal with multiple secret keys in time and transform domains. Int J Speech Technol 13, 231–242 (2010). https://doi.org/10.1007/s10772-010-9081-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10772-010-9081-1

Keywords

Navigation