Abstract
This paper proposes a new and efficient chaos-based cryptosystem for multiuser speech encryption. In this regards, Chua chaotic systems are added to the transmitters and receiver to generate the chaotic encryption/decryption keys. The User, who has been selected to send the speech information, encrypts voice information by the chaotic keys and sends it to the base station. To encrypt the speech signal, combination of Chaotic Matrix Operation for Randomization or Encryption and XOR operation is suggested. To analyse the robustness and demonstrate the efficiency of the proposed method, several security analysis is carried out. The key space analysis, key sensitivity analysis and statistical analysis are performed. The simulation results demonstrate that the suggested cryptosystem has much sensitivity to the secret keys, the key space is large enough to resist the brute-force attack and the distribution of the encrypted speech signal has a random-like behaviour. Statistical security analyses for the proposed cryptosystem, from a strict cryptographic viewpoint, shows that the proposed speech cryptosystem is highly secure and has a very powerful diffusion and confusion mechanisms widely used in conventional cryptography. Moreover, in the proposed method sending the voice information by users is done selectively, thus, the proposed scheme, besides that provides the security, also increases the battery life-time of the transmitter.
Similar content being viewed by others
References
Abd El-Maksoud, A. J., Abd El-Kader, A. A., Hassan, B. G., Rihan, N. G., Tolba, M. F., Said, L. A., et al. (2019). FPGA implementation of sound encryption system based on fractional-order chaotic systems. Microelectronics Journal, 90, 323–335.
Albin, C., Narayan, D., Varu, R., & Thanikaiselvan, V. (2018). DWT based audio encryption scheme. In 2018 second international conference on electronics, communication and aerospace technology (ICECA). IEEE, pp. 920–924.
Alemami, Y., Mohamed, M. A., Atiewi, S., & Mamat, M. (2020). Speech encryption by multiple chaotic maps with fast fourier transform. International Journal of Electrical & Computer Engineering (2088-8708), 10(6), 5658–5664.
Al-Suhail, G. A., Tahir, F. R., Abd, M. H., Pham, V.-T., & Fortuna, L. (2018). Modelling of long-wave chaotic radar system for anti-stealth applications. Communications in Nonlinear Science and Numerical Simulation, 57, 80–96.
Azzaz, M. S., Tanougast, C., Sadoudi, S., & Bouridane, A. (2013). Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption. Communications in Nonlinear Science and Numerical Simulation, 18(8), 2035–2047.
Banerjee, S., Rondoni, L., & Mitra, M. (2015). Applications of chaos and nonlinear dynamics in science and engineering (Vol. 4, p. 4). Applications of Chaos and Nonlinear Dynamics in Science and Engineering.
Beker, H., & Piper, F. C. (1985). Secure speech communications. London: Academic Press.
Chen, Y.-J., Chou, H.-G., Wang, W.-J., Tsai, S.-H., Tanaka, K., Wang, H. O., et al. (2020). A polynomial-fuzzy-model-based synchronization methodology for the multi-scroll Chen chaotic secure communication system. Engineering Applications of Artificial Intelligence, 87, 103251.
Chen, Y., Hao, J., Chen, J., & Zhang, Z. (2015). End-to-end speech encryption algorithm based on speech scrambling in frequency domain.
da Costa, R. A., Loiola, M. B., & Eisencraft, M. (2017). Correlation and spectral properties of chaotic signals generated by a piecewise-linear map with multiple segments. Signal Processing, 133, 187–191.
De la Hoz, M. Z., Acho, L., & Vidal, Y. (2014). A modified Chua chaotic oscillator and its application to secure communications. Applied Mathematics and Computation, 247, 712–722.
Eisencraft, M., & Kato, D. M. (2009). Spectral properties of chaotic signals with applications in communications. Nonlinear Analysis: Theory, Methods & Applications, 71(12), e2592–e2599.
Elsafty, A. H., Tolba, M. F., Said, L. A., Madian, A. H., & Radwan, A. G. (2020). Enhanced hardware implementation of a mixed-order nonlinear chaotic system and speech encryption application. AEU-International Journal of Electronics and Communications, 125, 153347.
Goldwasser, S., & Micali, S. (1984). Probabilistic encryption. Journal of Computer and System Sciences, 28(2), 270–299.
Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017). Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th international conference on electrical and electronic engineering (ICEEE) (pp. 246–250). IEEE.
Herceg, M., Vranješ, D., Grbić, R., & Job, J. (2019). Chaos-Based transmitted-reference ultra-wideband communications. International Journal of Electronics, 106(1), 160–172.
Hermassi, H., Hamdi, M., Rhouma, R., & Belghith, S. M. (2017). A joint encryption-compression codec for speech signals using the ITU-T G. 711 standard and chaotic map. Multimedia Tools and Applications, 76(1), 1177–1200.
Horsman, G. (2019). A call for the prohibition of encryption: Panacea or problem? IEEE Security & Privacy, 17(2), 59–66.
Hu, S., Wang, L., Mao, J., Gao, C., Zhang, B., & Yang, S. (2019). Synchronous online diagnosis of multiple cable intermittent faults based on chaotic spread spectrum sequence. IEEE Transactions on Industrial Electronics, 66(4), 3217–3226.
Huang, Y.-B., Wang, S.-H., Wang, Y., & Li, H. (2020) A new four-dimensional chaotic system and its application in speech encryption. In 2020 information communication technologies conference (ICTC) (pp. 171–175). IEEE.
Ilchenko, M. (2018). Advances in information and communication technologies: Processing and control in information and communication systems. Berlin: Springer.
Jampour, M., & Naserasadi, A. (2019). Chaos game theory and its application for offline signature identification. IET Biometrics, 8, 316–324.
Kalpana, J., & Murali, P. (2015). An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos. Optik, 126(24), 5703–5709.
Khan, J. S., & Ahmad, J. (2019). Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing, 30(2), 943–961.
Kipnis, A., & Hibshoosh, E. (2012). Efficient methods for practical fully homomorphic symmetric-key encrypton, randomization and verification. IACR Cryptology ePrint Archive, 2012, 637.
Lee, L.-S., Chou, G.-C., & Chang, C.-S. (1984). A new frequency domain speech scrambling system which does not require frame synchronization. IEEE Transactions on Communications, 32(4), 444–456.
Manjunath, G., & Anand, G. V. (2002). Speech encryption using circulant transformations. In Proceedings. IEEE international conference on multimedia and expo (pp. 553–556). IEEE.
Milton, R. (1989). A time and frequency-domain speech scrambler. In COMSIG 1989 proceedings: Southern African conference on communications and signal processing (pp. 125–130). IEEE.
Naseer, Y., Shah, D., & Shah, T. (2019). A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocessors and Microsystems, 65, 1–6.
Niu, Y., Zhang, X., & Han, F. (2017). Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Computational Intelligence and Neuroscience. https://doi.org/10.1155/2017/4079793.
Peng, C., Sun, H., Yang, M., & Wang, Y. (2019). A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems. https://doi.org/10.1109/TSMC.2018.2884952.
Preishuber, M., Hütter, T., Katzenbeisser, S., & Uhl, A. (2018). Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Transactions on Information Forensics and Security, 13(9), 2137–2150.
Qian, Q., Wang, H., Shi, C., & Wang, H. (2016). An efficient content authentication scheme in encrypted speech based on integer wavelet transform. 2016 Asia-Pacific signal and information processing association annual summit and conference (APSIPA) (pp. 1–8). IEEE.
Renza, D., & Mendoza, S. (2019). High-uncertainty audio signal encryption based on the Collatz conjecture. Journal of Information Security and Applications, 46, 62–69.
Ridha, O. A., Jawad, G. N., & Kadhim, S. F. (2018). Modified blind source separation for securing end-to-end mobile voice calls. IEEE Communications Letters, 22(10), 2072–2075.
Sathiyamurthi, P., & Ramakrishnan, S. (2017a). Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech, and Music Processing, 2017(1), 20. https://doi.org/10.1186/s13636-017-0118-0.
Sathiyamurthi, P., & Ramakrishnan, S. (2017b). Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech, and Music Processing, 2017(1), 1–11.
Sayed, W. S., Tolba, M. F., Radwan, A. G., & Abd-El-Hafiz, S. K. (2018). FPGA realization of a speech encryption system based on a generalized modified chaotic transition map and bit permutation. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-6946-9.
Senk, V., Delic, V., & Milosevic, V. (1997). A new speech scrambling concept based on Hadamard matrices. IEEE Signal Processing Letters, 4(6), 161–163.
Strogatz, S. H. (2018). Nonlinear dynamics and chaos with student solutions manual: With applications to physics, biology, chemistry, and engineering. Boca Raton: CRC Press.
Thein, N., Nugroho, H. A., Adji, T. B., & Mustika, I. W. (2017). Comparative performance study on ordinary and chaos image encryption schemes. In 2017 international conference on advanced computing and applications (ACOMP) (pp. 122–126). IEEE.
Vaseghi, B., Pourmina, M. A., & Mobayen, S. (2017). Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control. Nonlinear Dynamics, 89(3), 1689–1704.
Vaseghi, B., Pourmina, M. A., & Mobayen, S. (2018). Finite-time chaos synchronization and its application in wireless sensor networks. Transactions of the Institute of Measurement and Control, 40(13), 3788–3799.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hashemi, S., Pourmina, M.A., Mobayen, S. et al. Multiuser wireless speech encryption using synchronized chaotic systems. Int J Speech Technol 24, 651–663 (2021). https://doi.org/10.1007/s10772-021-09821-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10772-021-09821-3