Skip to main content
Log in

Multiuser wireless speech encryption using synchronized chaotic systems

  • Published:
International Journal of Speech Technology Aims and scope Submit manuscript

Abstract

This paper proposes a new and efficient chaos-based cryptosystem for multiuser speech encryption. In this regards, Chua chaotic systems are added to the transmitters and receiver to generate the chaotic encryption/decryption keys. The User, who has been selected to send the speech information, encrypts voice information by the chaotic keys and sends it to the base station. To encrypt the speech signal, combination of Chaotic Matrix Operation for Randomization or Encryption and XOR operation is suggested. To analyse the robustness and demonstrate the efficiency of the proposed method, several security analysis is carried out. The key space analysis, key sensitivity analysis and statistical analysis are performed. The simulation results demonstrate that the suggested cryptosystem has much sensitivity to the secret keys, the key space is large enough to resist the brute-force attack and the distribution of the encrypted speech signal has a random-like behaviour. Statistical security analyses for the proposed cryptosystem, from a strict cryptographic viewpoint, shows that the proposed speech cryptosystem is highly secure and has a very powerful diffusion and confusion mechanisms widely used in conventional cryptography. Moreover, in the proposed method sending the voice information by users is done selectively, thus, the proposed scheme, besides that provides the security, also increases the battery life-time of the transmitter.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Abd El-Maksoud, A. J., Abd El-Kader, A. A., Hassan, B. G., Rihan, N. G., Tolba, M. F., Said, L. A., et al. (2019). FPGA implementation of sound encryption system based on fractional-order chaotic systems. Microelectronics Journal, 90, 323–335.

    Article  Google Scholar 

  • Albin, C., Narayan, D., Varu, R., & Thanikaiselvan, V. (2018). DWT based audio encryption scheme. In 2018 second international conference on electronics, communication and aerospace technology (ICECA). IEEE, pp. 920–924.

  • Alemami, Y., Mohamed, M. A., Atiewi, S., & Mamat, M. (2020). Speech encryption by multiple chaotic maps with fast fourier transform. International Journal of Electrical & Computer Engineering (2088-8708), 10(6), 5658–5664.

    Google Scholar 

  • Al-Suhail, G. A., Tahir, F. R., Abd, M. H., Pham, V.-T., & Fortuna, L. (2018). Modelling of long-wave chaotic radar system for anti-stealth applications. Communications in Nonlinear Science and Numerical Simulation, 57, 80–96.

    Article  MathSciNet  Google Scholar 

  • Azzaz, M. S., Tanougast, C., Sadoudi, S., & Bouridane, A. (2013). Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption. Communications in Nonlinear Science and Numerical Simulation, 18(8), 2035–2047.

    Article  MathSciNet  Google Scholar 

  • Banerjee, S., Rondoni, L., & Mitra, M. (2015). Applications of chaos and nonlinear dynamics in science and engineering (Vol. 4, p. 4). Applications of Chaos and Nonlinear Dynamics in Science and Engineering.

  • Beker, H., & Piper, F. C. (1985). Secure speech communications. London: Academic Press.

    MATH  Google Scholar 

  • Chen, Y.-J., Chou, H.-G., Wang, W.-J., Tsai, S.-H., Tanaka, K., Wang, H. O., et al. (2020). A polynomial-fuzzy-model-based synchronization methodology for the multi-scroll Chen chaotic secure communication system. Engineering Applications of Artificial Intelligence, 87, 103251.

    Article  Google Scholar 

  • Chen, Y., Hao, J., Chen, J., & Zhang, Z. (2015). End-to-end speech encryption algorithm based on speech scrambling in frequency domain.

  • da Costa, R. A., Loiola, M. B., & Eisencraft, M. (2017). Correlation and spectral properties of chaotic signals generated by a piecewise-linear map with multiple segments. Signal Processing, 133, 187–191.

    Article  Google Scholar 

  • De la Hoz, M. Z., Acho, L., & Vidal, Y. (2014). A modified Chua chaotic oscillator and its application to secure communications. Applied Mathematics and Computation, 247, 712–722.

    Article  MathSciNet  Google Scholar 

  • Eisencraft, M., & Kato, D. M. (2009). Spectral properties of chaotic signals with applications in communications. Nonlinear Analysis: Theory, Methods & Applications, 71(12), e2592–e2599.

    Article  Google Scholar 

  • Elsafty, A. H., Tolba, M. F., Said, L. A., Madian, A. H., & Radwan, A. G. (2020). Enhanced hardware implementation of a mixed-order nonlinear chaotic system and speech encryption application. AEU-International Journal of Electronics and Communications, 125, 153347.

    Article  Google Scholar 

  • Goldwasser, S., & Micali, S. (1984). Probabilistic encryption. Journal of Computer and System Sciences, 28(2), 270–299.

    Article  MathSciNet  Google Scholar 

  • Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017). Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th international conference on electrical and electronic engineering (ICEEE) (pp. 246–250). IEEE.

  • Herceg, M., Vranješ, D., Grbić, R., & Job, J. (2019). Chaos-Based transmitted-reference ultra-wideband communications. International Journal of Electronics, 106(1), 160–172.

    Article  Google Scholar 

  • Hermassi, H., Hamdi, M., Rhouma, R., & Belghith, S. M. (2017). A joint encryption-compression codec for speech signals using the ITU-T G. 711 standard and chaotic map. Multimedia Tools and Applications, 76(1), 1177–1200.

    Article  Google Scholar 

  • Horsman, G. (2019). A call for the prohibition of encryption: Panacea or problem? IEEE Security & Privacy, 17(2), 59–66.

    Article  Google Scholar 

  • Hu, S., Wang, L., Mao, J., Gao, C., Zhang, B., & Yang, S. (2019). Synchronous online diagnosis of multiple cable intermittent faults based on chaotic spread spectrum sequence. IEEE Transactions on Industrial Electronics, 66(4), 3217–3226.

    Google Scholar 

  • Huang, Y.-B., Wang, S.-H., Wang, Y., & Li, H. (2020) A new four-dimensional chaotic system and its application in speech encryption. In 2020 information communication technologies conference (ICTC) (pp. 171–175). IEEE.

  • Ilchenko, M. (2018). Advances in information and communication technologies: Processing and control in information and communication systems. Berlin: Springer.

    Google Scholar 

  • Jampour, M., & Naserasadi, A. (2019). Chaos game theory and its application for offline signature identification. IET Biometrics, 8, 316–324.

    Article  Google Scholar 

  • Kalpana, J., & Murali, P. (2015). An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos. Optik, 126(24), 5703–5709.

    Article  Google Scholar 

  • Khan, J. S., & Ahmad, J. (2019). Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing, 30(2), 943–961.

    Article  MathSciNet  Google Scholar 

  • Kipnis, A., & Hibshoosh, E. (2012). Efficient methods for practical fully homomorphic symmetric-key encrypton, randomization and verification. IACR Cryptology ePrint Archive, 2012, 637.

    Google Scholar 

  • Lee, L.-S., Chou, G.-C., & Chang, C.-S. (1984). A new frequency domain speech scrambling system which does not require frame synchronization. IEEE Transactions on Communications, 32(4), 444–456.

    Article  Google Scholar 

  • Manjunath, G., & Anand, G. V. (2002). Speech encryption using circulant transformations. In Proceedings. IEEE international conference on multimedia and expo (pp. 553–556). IEEE.

  • Milton, R. (1989). A time and frequency-domain speech scrambler. In COMSIG 1989 proceedings: Southern African conference on communications and signal processing (pp. 125–130). IEEE.

  • Naseer, Y., Shah, D., & Shah, T. (2019). A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocessors and Microsystems, 65, 1–6.

    Article  Google Scholar 

  • Niu, Y., Zhang, X., & Han, F. (2017). Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Computational Intelligence and Neuroscience. https://doi.org/10.1155/2017/4079793.

    Article  Google Scholar 

  • Peng, C., Sun, H., Yang, M., & Wang, Y. (2019). A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems. https://doi.org/10.1109/TSMC.2018.2884952.

    Article  Google Scholar 

  • Preishuber, M., Hütter, T., Katzenbeisser, S., & Uhl, A. (2018). Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Transactions on Information Forensics and Security, 13(9), 2137–2150.

    Article  Google Scholar 

  • Qian, Q., Wang, H., Shi, C., & Wang, H. (2016). An efficient content authentication scheme in encrypted speech based on integer wavelet transform. 2016 Asia-Pacific signal and information processing association annual summit and conference (APSIPA) (pp. 1–8). IEEE.

  • Renza, D., & Mendoza, S. (2019). High-uncertainty audio signal encryption based on the Collatz conjecture. Journal of Information Security and Applications, 46, 62–69.

    Article  Google Scholar 

  • Ridha, O. A., Jawad, G. N., & Kadhim, S. F. (2018). Modified blind source separation for securing end-to-end mobile voice calls. IEEE Communications Letters, 22(10), 2072–2075.

    Article  Google Scholar 

  • Sathiyamurthi, P., & Ramakrishnan, S. (2017a). Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech, and Music Processing, 2017(1), 20. https://doi.org/10.1186/s13636-017-0118-0.

    Article  Google Scholar 

  • Sathiyamurthi, P., & Ramakrishnan, S. (2017b). Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech, and Music Processing, 2017(1), 1–11.

    Article  Google Scholar 

  • Sayed, W. S., Tolba, M. F., Radwan, A. G., & Abd-El-Hafiz, S. K. (2018). FPGA realization of a speech encryption system based on a generalized modified chaotic transition map and bit permutation. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-6946-9.

    Article  Google Scholar 

  • Senk, V., Delic, V., & Milosevic, V. (1997). A new speech scrambling concept based on Hadamard matrices. IEEE Signal Processing Letters, 4(6), 161–163.

    Article  Google Scholar 

  • Strogatz, S. H. (2018). Nonlinear dynamics and chaos with student solutions manual: With applications to physics, biology, chemistry, and engineering. Boca Raton: CRC Press.

    Book  Google Scholar 

  • Thein, N., Nugroho, H. A., Adji, T. B., & Mustika, I. W. (2017). Comparative performance study on ordinary and chaos image encryption schemes. In 2017 international conference on advanced computing and applications (ACOMP) (pp. 122–126). IEEE.

  • Vaseghi, B., Pourmina, M. A., & Mobayen, S. (2017). Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control. Nonlinear Dynamics, 89(3), 1689–1704.

    Article  MathSciNet  Google Scholar 

  • Vaseghi, B., Pourmina, M. A., & Mobayen, S. (2018). Finite-time chaos synchronization and its application in wireless sensor networks. Transactions of the Institute of Measurement and Control, 40(13), 3788–3799.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Ali Pourmina.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hashemi, S., Pourmina, M.A., Mobayen, S. et al. Multiuser wireless speech encryption using synchronized chaotic systems. Int J Speech Technol 24, 651–663 (2021). https://doi.org/10.1007/s10772-021-09821-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10772-021-09821-3

Keywords

Navigation