Skip to main content
Log in

A novel approach for audio file encryption using hand geometry

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper suggests a new proposed algorithm for encryption/ decryption audio files based on discrete wavelet transform (DWT) and biometric features to provide a high level of confidentiality and reliability. The proposed algorithm used number of hand geometry measurements properties as keys to encode and decode the audio file, combine with using the discrete wavelet transform (DWT) in order to increase the efficiency of the encryption process. Subjective and objective measures are applied to the resulted signal. They cleared that the retrieved audio signal has very acceptable loosing of its data with certain keeping the main decrypted message in a good understanding on the receiver side. This achieves the major target of encryption processing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Akgul A, Kacar S, Pehlivan I (2015) An audio data encryption with single and double dimension discrete-time chaotic systems. Online J Sci Technol 5

  2. Al Mahafzah H, AlRwashdeh MZ (2012) A survey of multibiometric systems. International Journal of Computer Applications 43(15):36–43

    Google Scholar 

  3. AL-Azzawi SF (2012) Stability and bifurcation of pan chaotic system by using Routh–Hurwitz and Gardan methods. Appl Math Comput 219(3):1144–1152

    MathSciNet  MATH  Google Scholar 

  4. AL-Azzawi SF, Aziz MM (2018) Chaos synchronization of nonlinear dynamical systems via a novel analytical approach. Alexandria Engineering Journal 57(4):3493–3500

    Google Scholar 

  5. AL-Azzawi SF, Aziz MM (2019) Strategies of linear feedback control and its classification. Telkomnika Telecommunication, Computing, Electronics and Control 17(4):1931–1940

    Google Scholar 

  6. Albahrani EA (2017) A new audio encryption algorithm based on chaotic block cipher. Annual Conference on New Trends in Information & Communications Technology Applications 22–27

  7. Al-Kateeb ZN, Al-Bazaz MR (2019) Steganography in colored images based on biometrics. Tikrit Journal of Pure Science 24(3):111–117

    Google Scholar 

  8. Al-Obeidi AS, AL-Azzawi SF (2019) Projective synchronization for a class of 6-D Hyperchaotic Lorenz system. Indonesian Journal of Electrical Engineering and Computer Science 16(2):692–700

  9. Arul P, Shanmugam A (2009) Generate a key for aes using biometric for voip network security. J Theor Appl Inf Technol

  10. Belazi A, El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing 128:155–170

    Google Scholar 

  11. Cahyono J, Subiono (2016) A cryptographic algorithm based on max plus wavelet transform. Conference: Proceeding of The 6th Annual Basic Science International

  12. Chadha A, Mallik S, Chadha A, Johar R, Mani Roja M (2015) Dual-layer video encryption using RSA algorithm. International Journal of Computer Applications 116:0975–8887

    Google Scholar 

  13. Djebbar F, Ayad B, Meraim KA, Hamam H (2012) Comparative study of digital audio steganography techniques. EURASIP J Audio Speech Music Process 1–16

  14. Gad R, EL-Sayed A, El-Fishawy N, Zorkany M (2015) Multi-biometric systems: a state of the art survey and research directions. Int J Adv Comput Sci Appl 6(6)

  15. Gadanayak B, Pradhan CH, Chandra Dey's U (2011) Comparative study of different encryption techniques on MP3 compression. Int J Comput Appl 26(3):28–31

    Google Scholar 

  16. Gadanayak B, Pradhan CH, Baranwal N (2011) Secured partial MP3 encryption technique. Int J Comput Sci Inf Technol 2(4):1584–1587

    Google Scholar 

  17. Gandhi R, Gonsai AM (2015) A study on current scenario of audio encryption. International Journal of Computer Applications 116(7):0975–8887

    Google Scholar 

  18. Hemalatha S, Dinesh Acharya U, Renuka A, Renuka A, Deepthi S, Jyothi Upadhya K (2015) Audio steganography in discrete wavelet transform domain. Int J Appl Eng Res 10(16):36639–36644

    Google Scholar 

  19. Kahn D (1980) Cryptography Goes public. IEEE Commun Mag 18:19–28

    Google Scholar 

  20. Kisasondi T et al (2007) Biometric cryptography and network authentication. Journal of Information and Organizational Sciences 31(1):91–99

    Google Scholar 

  21. Krasimir K (2019) A novel audio encryption algorithm with permutation-substitution architecture. Electronics 8:530. https://doi.org/10.3390/electronics8050530

    Article  Google Scholar 

  22. Osaghae EO (2018) Replication of Ciphertext in Cryptographic System. J. Appl. Sci. Environ. Manage 22(8):1193–1197. https://doi.org/10.4314/jasem.v22i8.8

    Article  Google Scholar 

  23. Prabu AV, Srinivasarao S, Tholada A, Jaganmohan M, Babu Rau K (2012) Audio encryption in handsets. International Journal of Computer Applications 40:8975–8887

    Google Scholar 

  24. Radha N, Kavitha A (2011) Rank level fusion using fingerprint and Iris biometrics. Indian Journal of Computer Science and Engineering (IJCSE) 2(6):917–923

    Google Scholar 

  25. Sharma P (2013) Efficient image encryption and decryption using discrete wavelet transform and fractional fourier transform. Dissertation of the Degree of Master of Technology in the Department of Computer Science and Engineering (with specialization in Computer Science and Engineering)

  26. Sharma S, Kumar L, Sharma H (2013) Encryption of an audio file on lower frequency band for secure communication. Int J Adv Res Comput Sc & Software Eng 3(7):79–84

    Google Scholar 

  27. Sheela SJ, Suresh KV, Tandur D (2017) A novel audio cryptosystem using chaotic maps and DNA encoding. Hindawi Journal of Computer Networks and Communications 2017:12. https://doi.org/10.1155/2017/2721910

    Article  Google Scholar 

  28. Singh K (2015) Biometric-based network security using MIPS cryptography processor. Conf Int Conf Emerg Futur Trends Eng Technol Int J Exp Eng Technol 1 https://doi.org/10.2139/ssrn.2777942

  29. Sinha N, Bhowmick A, Kishore B (2015) Encrypted information hiding using audio steganography and audio cryptography. International Journal of Computer Applications 112(5):0975–8887

    Google Scholar 

  30. Streijl RC, Winkler S, Hands DS (2016) Mean opinion score (MOS) revisited: methods and applications, limitations and alternatives. Multimed Syst

  31. Tamimi AA, Abdalla AM (2014) An audio shuffle-encryption algorithm. Proceedings of the world congress on engineering and computer science I (WCECS)

Download references

Acknowledgements

The authors are very grateful to the University of Mosul/ College of Computer Science and Mathematics for their provided facilities, which helped to improve the quality of this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zeena N. Al-kateeb.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-kateeb, Z.N., Mohammed, S.J. A novel approach for audio file encryption using hand geometry. Multimed Tools Appl 79, 19615–19628 (2020). https://doi.org/10.1007/s11042-020-08869-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08869-8

Keywords