Skip to main content
Log in

A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

We propose to incorporate encryption procedure into the lossy compression of voice data PCM(Pulse Code Modulation) based on the A-law approximation quantization. The proposed codec CPCM (Chaotic Pulse Code Modulaion) will join the encryption to the compression of the voice data. This scheme provides the same compression ratio given by the PCM codec, but with an unintelligible content. Comparisons with many used schemes have been made to highlight the proposed method in terms of security and rapidity. CPCM codec can be a better alternative to Compress-then-encrypt classical methods which is a time and resource consuming and non suitable for real-time multimedia secure transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. Am. English female: https://sites.google.com/site/houcemeddinehermassi/AM_Female%201.wav?attredirects=0

  2. Am. English female PCM: https://sites.google.com/site/houcemeddinehermassi/AM-female1PCM.wav?attredirects=0

  3. Am. English female CPCM: https://sites.google.com/site/houcemeddinehermassi/AM_female1CPCM.wav?attredirects=0

  4. Chinese male: https://sites.google.com/site/houcemeddinehermassi/CH_male1.wav?attredirects=0

  5. Chinese male PCM: https://sites.google.com/site/houcemeddinehermassi/CH_male1PCM.wav?attredirects=0

  6. Chinese male CPCM: https://sites.google.com/site/houcemeddinehermassi/CH_male1CPCM.wav?attredirects=0

References

  1. (1993) Pulse code modulation (pcm) for voice frequencies. ITU-T Recommandation G711

  2. Bhatnagar G, Wu QJ (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digital Signal Process 22:648–663

    Article  MathSciNet  Google Scholar 

  3. El-Latif AAA, Niu X (2012) A hybrid chaotic system and cyclic elliptic curve for image encryption. Int J Electron Commun (AE). doi:10.1016/j.aeue.2012.07.004

  4. Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans Multimedia 8(5):905–917

    Article  Google Scholar 

  5. Han X, Chang X (2012) A chaotic digital secure communication based on a modified gravitational search algorithm filter. Inform Sci 208:14–27

    Article  Google Scholar 

  6. Hermassi H, Rhouma R, Belghith S (2009) A modified hyperchaos based image cryptosystem. In: Proceedings of the 6th international multiconferences on systems, signals and devices SSD’09

  7. Hermassi H, Rhouma R, Belghith S (2009b) Join compression and encryption using chaotically mutated huffman trees. Comun Nonlinear Sci Numer Simulat 15(10):2987–2999

    Article  MATH  Google Scholar 

  8. Hussain I, Shah T, Gondal MA (2012) An efficient image encryption algorithm based on s8 s-box transformation and nca map. Opt Commun 285:4887–4890

    Article  Google Scholar 

  9. Jakimoski G, Subbalakshmi KP (2008) Cryptanalysis of some multimedia encryption schemes. IEEE Trans Multimedia 10(3):330–338

    Article  Google Scholar 

  10. Jia D, Zheng G, Khan MK (2011) An effective memetic differential evolution algorithm based on chaotic local search. Inf Sci 181(15):3175–3187

    Article  Google Scholar 

  11. Khan MK, Zhang J (2006) Investigation on pseudorandom properties of chaotic stream ciphers. In: IEEE Conf Proceedings on ICEIS’06, pp 289–293

  12. Kim H, Wen J, Villasenor JD (2007) Secure arithmetic coding. IEEE Trans Sig Process 55(5):2263–2272

    Article  MathSciNet  Google Scholar 

  13. Kuhn DR, JWalsh T, Fries S (2005) Security considerations for voice over ip systems. Natl Inst Stand Technol 800(58)

  14. Li S (2003) Analyses and new designs of digital chaotic ciphers. PhD thesis, School of Electronics and Information Engineering. Xi’an Jiaotong University, Xi’an

    Google Scholar 

  15. Lian S (2009) Multimedia content encryption. Techniques and Applications. Taylor & Francis Group

  16. Mosa E, Messiha N, Zahran O, El-Samie FA (2010) Encryption of speech signal with multiple secret keys in time and transform domains. Int J Speech Technol 13(4)

  17. Nagaraj N, Vaidya PG, Bhat KG (2009) Arithmetic coding as a non-linear dynamical system. Commun Nonlinear Sci Numer Simul 14(4):1013–1020

    Article  MathSciNet  MATH  Google Scholar 

  18. Riley MD (1987) Time-frequency representations for speech signals. PhD thesis, Massachusetts Institute of Technology

  19. Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92:1202–1215

    Article  Google Scholar 

  20. Sheu LJ (2011) A speech encryption using fractional chaotic systems. Nonlinear Dyn 65(1-2)

  21. Son B, Nahm E, Kim H (2013) Voip encryption module for securing privacy. Multimedia Tools Appl 63(1)

  22. for Telecommunication Systems ITTS (????) Test vectors associated to rec. i t ut p.501. http://www.itu.int/net/itu-t/sigdb/genaudio/AudioForm-g.aspx?val=10000501

  23. Usama M, Khan MK, Alghathbar K, Lee C (2010) Chaos-based secure satellite imagery cryptosystem. Comput Math Appl 60(2):326–337

    Article  MathSciNet  MATH  Google Scholar 

  24. Wen J, Kim H, Villasenor JD (2006) Binary arithmetic coding with key-based interval splitting. IEEE Signal Process Lett 13(2):69–72

    Article  Google Scholar 

  25. Wong KW, Yuen CH (2008) Embedding compression in chaos-based cryptography. IEEE Trans Circuits Syst Express Briefs 55(11):1193–1197

    Article  Google Scholar 

  26. Wong KW, Lin Q, Chen J (2010) Simultaneous arithmetic coding and encryption using chaotic maps. IEEE Trans Circuits Syst Express Briefs 57(2):146–150

    Article  Google Scholar 

  27. Wu CP, Kuo CCJ (2005) Design of integrated multimedia compression and encryption systems. IEEE Trans Multimedia 7(5):828–839

    Article  Google Scholar 

  28. Xiang T, Wong KW, Liao X (2007) Selective image encryption using a spatiotemporal chaotic system. Chaos 17(023115):1–12

    MATH  Google Scholar 

  29. Zhang W, wo Wong K, Yu H, liang Zhu Z (2013) A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simulat 18:584–600

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Houcemeddine Hermassi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hermassi, H., Hamdi, M., Rhouma, R. et al. A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map. Multimed Tools Appl 76, 1177–1200 (2017). https://doi.org/10.1007/s11042-015-3030-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3030-6

Keywords

Navigation