Abstract
This paper suggests a new proposed algorithm for encryption/ decryption audio files based on discrete wavelet transform (DWT) and biometric features to provide a high level of confidentiality and reliability. The proposed algorithm used number of hand geometry measurements properties as keys to encode and decode the audio file, combine with using the discrete wavelet transform (DWT) in order to increase the efficiency of the encryption process. Subjective and objective measures are applied to the resulted signal. They cleared that the retrieved audio signal has very acceptable loosing of its data with certain keeping the main decrypted message in a good understanding on the receiver side. This achieves the major target of encryption processing.






Similar content being viewed by others
References
Akgul A, Kacar S, Pehlivan I (2015) An audio data encryption with single and double dimension discrete-time chaotic systems. Online J Sci Technol 5
Al Mahafzah H, AlRwashdeh MZ (2012) A survey of multibiometric systems. International Journal of Computer Applications 43(15):36–43
AL-Azzawi SF (2012) Stability and bifurcation of pan chaotic system by using Routh–Hurwitz and Gardan methods. Appl Math Comput 219(3):1144–1152
AL-Azzawi SF, Aziz MM (2018) Chaos synchronization of nonlinear dynamical systems via a novel analytical approach. Alexandria Engineering Journal 57(4):3493–3500
AL-Azzawi SF, Aziz MM (2019) Strategies of linear feedback control and its classification. Telkomnika Telecommunication, Computing, Electronics and Control 17(4):1931–1940
Albahrani EA (2017) A new audio encryption algorithm based on chaotic block cipher. Annual Conference on New Trends in Information & Communications Technology Applications 22–27
Al-Kateeb ZN, Al-Bazaz MR (2019) Steganography in colored images based on biometrics. Tikrit Journal of Pure Science 24(3):111–117
Al-Obeidi AS, AL-Azzawi SF (2019) Projective synchronization for a class of 6-D Hyperchaotic Lorenz system. Indonesian Journal of Electrical Engineering and Computer Science 16(2):692–700
Arul P, Shanmugam A (2009) Generate a key for aes using biometric for voip network security. J Theor Appl Inf Technol
Belazi A, El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing 128:155–170
Cahyono J, Subiono (2016) A cryptographic algorithm based on max plus wavelet transform. Conference: Proceeding of The 6th Annual Basic Science International
Chadha A, Mallik S, Chadha A, Johar R, Mani Roja M (2015) Dual-layer video encryption using RSA algorithm. International Journal of Computer Applications 116:0975–8887
Djebbar F, Ayad B, Meraim KA, Hamam H (2012) Comparative study of digital audio steganography techniques. EURASIP J Audio Speech Music Process 1–16
Gad R, EL-Sayed A, El-Fishawy N, Zorkany M (2015) Multi-biometric systems: a state of the art survey and research directions. Int J Adv Comput Sci Appl 6(6)
Gadanayak B, Pradhan CH, Chandra Dey's U (2011) Comparative study of different encryption techniques on MP3 compression. Int J Comput Appl 26(3):28–31
Gadanayak B, Pradhan CH, Baranwal N (2011) Secured partial MP3 encryption technique. Int J Comput Sci Inf Technol 2(4):1584–1587
Gandhi R, Gonsai AM (2015) A study on current scenario of audio encryption. International Journal of Computer Applications 116(7):0975–8887
Hemalatha S, Dinesh Acharya U, Renuka A, Renuka A, Deepthi S, Jyothi Upadhya K (2015) Audio steganography in discrete wavelet transform domain. Int J Appl Eng Res 10(16):36639–36644
Kahn D (1980) Cryptography Goes public. IEEE Commun Mag 18:19–28
Kisasondi T et al (2007) Biometric cryptography and network authentication. Journal of Information and Organizational Sciences 31(1):91–99
Krasimir K (2019) A novel audio encryption algorithm with permutation-substitution architecture. Electronics 8:530. https://doi.org/10.3390/electronics8050530
Osaghae EO (2018) Replication of Ciphertext in Cryptographic System. J. Appl. Sci. Environ. Manage 22(8):1193–1197. https://doi.org/10.4314/jasem.v22i8.8
Prabu AV, Srinivasarao S, Tholada A, Jaganmohan M, Babu Rau K (2012) Audio encryption in handsets. International Journal of Computer Applications 40:8975–8887
Radha N, Kavitha A (2011) Rank level fusion using fingerprint and Iris biometrics. Indian Journal of Computer Science and Engineering (IJCSE) 2(6):917–923
Sharma P (2013) Efficient image encryption and decryption using discrete wavelet transform and fractional fourier transform. Dissertation of the Degree of Master of Technology in the Department of Computer Science and Engineering (with specialization in Computer Science and Engineering)
Sharma S, Kumar L, Sharma H (2013) Encryption of an audio file on lower frequency band for secure communication. Int J Adv Res Comput Sc & Software Eng 3(7):79–84
Sheela SJ, Suresh KV, Tandur D (2017) A novel audio cryptosystem using chaotic maps and DNA encoding. Hindawi Journal of Computer Networks and Communications 2017:12. https://doi.org/10.1155/2017/2721910
Singh K (2015) Biometric-based network security using MIPS cryptography processor. Conf Int Conf Emerg Futur Trends Eng Technol Int J Exp Eng Technol 1 https://doi.org/10.2139/ssrn.2777942
Sinha N, Bhowmick A, Kishore B (2015) Encrypted information hiding using audio steganography and audio cryptography. International Journal of Computer Applications 112(5):0975–8887
Streijl RC, Winkler S, Hands DS (2016) Mean opinion score (MOS) revisited: methods and applications, limitations and alternatives. Multimed Syst
Tamimi AA, Abdalla AM (2014) An audio shuffle-encryption algorithm. Proceedings of the world congress on engineering and computer science I (WCECS)
Acknowledgements
The authors are very grateful to the University of Mosul/ College of Computer Science and Mathematics for their provided facilities, which helped to improve the quality of this work.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Al-kateeb, Z.N., Mohammed, S.J. A novel approach for audio file encryption using hand geometry. Multimed Tools Appl 79, 19615–19628 (2020). https://doi.org/10.1007/s11042-020-08869-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08869-8