Abstract
We propose to incorporate encryption procedure into the lossy compression of voice data PCM(Pulse Code Modulation) based on the A-law approximation quantization. The proposed codec CPCM (Chaotic Pulse Code Modulaion) will join the encryption to the compression of the voice data. This scheme provides the same compression ratio given by the PCM codec, but with an unintelligible content. Comparisons with many used schemes have been made to highlight the proposed method in terms of security and rapidity. CPCM codec can be a better alternative to Compress-then-encrypt classical methods which is a time and resource consuming and non suitable for real-time multimedia secure transmission.
Similar content being viewed by others
Notes
Am. English female PCM: https://sites.google.com/site/houcemeddinehermassi/AM-female1PCM.wav?attredirects=0
Am. English female CPCM: https://sites.google.com/site/houcemeddinehermassi/AM_female1CPCM.wav?attredirects=0
References
(1993) Pulse code modulation (pcm) for voice frequencies. ITU-T Recommandation G711
Bhatnagar G, Wu QJ (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digital Signal Process 22:648–663
El-Latif AAA, Niu X (2012) A hybrid chaotic system and cyclic elliptic curve for image encryption. Int J Electron Commun (AE). doi:10.1016/j.aeue.2012.07.004
Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans Multimedia 8(5):905–917
Han X, Chang X (2012) A chaotic digital secure communication based on a modified gravitational search algorithm filter. Inform Sci 208:14–27
Hermassi H, Rhouma R, Belghith S (2009) A modified hyperchaos based image cryptosystem. In: Proceedings of the 6th international multiconferences on systems, signals and devices SSD’09
Hermassi H, Rhouma R, Belghith S (2009b) Join compression and encryption using chaotically mutated huffman trees. Comun Nonlinear Sci Numer Simulat 15(10):2987–2999
Hussain I, Shah T, Gondal MA (2012) An efficient image encryption algorithm based on s8 s-box transformation and nca map. Opt Commun 285:4887–4890
Jakimoski G, Subbalakshmi KP (2008) Cryptanalysis of some multimedia encryption schemes. IEEE Trans Multimedia 10(3):330–338
Jia D, Zheng G, Khan MK (2011) An effective memetic differential evolution algorithm based on chaotic local search. Inf Sci 181(15):3175–3187
Khan MK, Zhang J (2006) Investigation on pseudorandom properties of chaotic stream ciphers. In: IEEE Conf Proceedings on ICEIS’06, pp 289–293
Kim H, Wen J, Villasenor JD (2007) Secure arithmetic coding. IEEE Trans Sig Process 55(5):2263–2272
Kuhn DR, JWalsh T, Fries S (2005) Security considerations for voice over ip systems. Natl Inst Stand Technol 800(58)
Li S (2003) Analyses and new designs of digital chaotic ciphers. PhD thesis, School of Electronics and Information Engineering. Xi’an Jiaotong University, Xi’an
Lian S (2009) Multimedia content encryption. Techniques and Applications. Taylor & Francis Group
Mosa E, Messiha N, Zahran O, El-Samie FA (2010) Encryption of speech signal with multiple secret keys in time and transform domains. Int J Speech Technol 13(4)
Nagaraj N, Vaidya PG, Bhat KG (2009) Arithmetic coding as a non-linear dynamical system. Commun Nonlinear Sci Numer Simul 14(4):1013–1020
Riley MD (1987) Time-frequency representations for speech signals. PhD thesis, Massachusetts Institute of Technology
Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92:1202–1215
Sheu LJ (2011) A speech encryption using fractional chaotic systems. Nonlinear Dyn 65(1-2)
Son B, Nahm E, Kim H (2013) Voip encryption module for securing privacy. Multimedia Tools Appl 63(1)
for Telecommunication Systems ITTS (????) Test vectors associated to rec. i t u−t p.501. http://www.itu.int/net/itu-t/sigdb/genaudio/AudioForm-g.aspx?val=10000501
Usama M, Khan MK, Alghathbar K, Lee C (2010) Chaos-based secure satellite imagery cryptosystem. Comput Math Appl 60(2):326–337
Wen J, Kim H, Villasenor JD (2006) Binary arithmetic coding with key-based interval splitting. IEEE Signal Process Lett 13(2):69–72
Wong KW, Yuen CH (2008) Embedding compression in chaos-based cryptography. IEEE Trans Circuits Syst Express Briefs 55(11):1193–1197
Wong KW, Lin Q, Chen J (2010) Simultaneous arithmetic coding and encryption using chaotic maps. IEEE Trans Circuits Syst Express Briefs 57(2):146–150
Wu CP, Kuo CCJ (2005) Design of integrated multimedia compression and encryption systems. IEEE Trans Multimedia 7(5):828–839
Xiang T, Wong KW, Liao X (2007) Selective image encryption using a spatiotemporal chaotic system. Chaos 17(023115):1–12
Zhang W, wo Wong K, Yu H, liang Zhu Z (2013) A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simulat 18:584–600
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hermassi, H., Hamdi, M., Rhouma, R. et al. A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map. Multimed Tools Appl 76, 1177–1200 (2017). https://doi.org/10.1007/s11042-015-3030-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-3030-6