Abstract
The concept of encryption is as old as the reality that confidential information has been interchanging among people. The art of transferring secret information between two parties or groups is known as cryptography. It contains the algorithms, key exchange protocols, and approaches to consistently and securely avoid unauthorized access to confidential information. Nowadays information is in digital form, therefore this factor necessitates some cryptographic algorithms for secure data transmission. In this work, we have designed a new approach for audio encryption to securely store and transfer audio signals. The suggested encryption algorithm is primarily based on Gensio-Tesi chaotic map. Substitution and permutation networks are engendered by the Gensio-Tesi chaotic system for the encryption of signals. The other important feature discussed here is the performance of offered algorithm which is ascertained by some extensive audio analysis. Experimental results reveal that the designed scheme has an essential level of security.
Similar content being viewed by others
Data availability
The authors confirm that the data supporting the findings of this study are available within the article and its supplementary material. Raw data that support the finds of this study are available from the corresponding author, upon reasonable request.
References
Abdelfatah RI (2020) Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8:69894–69907. https://doi.org/10.1109/ACCESS.2020.2987197
Advanced Encryption Standard (AES) (n.d.) (PDF), Federal Information Processing Standards, 26 November 2001, https://doi.org/10.6028/NIST.FIPS.197.197
Al-hazaimeh OM, Abu-Ein AA, Nahar KM, Al-Qasrawi IS (2022) Chaotic elliptic map for speech encryption. Indonesian J Elec Eng Comp Sci 25(2):1103–1114
Arunkumar S, Mukesh K (2022) "Enhanced Audio Encryption using 2-D Zaslavsky Chaotic Map," 2022 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–4, https://doi.org/10.1109/ICCCI54379.2022.9740761
Basu S (2011) International data encryption algorithm (IDEA) - a typical illustration. J Global Res Comp Sci 2011:116–118.1
Farsana FJ, Devi VR, Gopakumar K (2020) An audio encryption scheme based on fast Walsh Hadamard transform and mixed chaotic keystreams. Appl Comput Inform
Genesio R, Tesi A (1992) A harmonic balance method for the analysis of chaotic dynamics in nonlinear systems. Automatica 28:531–548
Hassan NF, Aladhami A, Mahdi MS (2022) Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps. Iraqi J Sci 63(2):830–842. https://doi.org/10.24996/ijs.2022.63.2.36
Hato E, Shihab D (2015) Lorenz and Rossler chaotic system for speech signal encryption. Int J Comput Appl 128:09758887
Kordov K (2019) A novel audio encryption algorithm with permutation-substitution architecture. Electronics 8:530. https://doi.org/10.3390/electronics8050530
Lima JB, da Silva Neto EF (2016) Audio encryption based on the cosine number transform. Multimed Tools Appl 75(14):8403–8418
Lin C-H, Hu G-H, Chen J-S, Yan J-J, Tang K-H (2022) Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys. Multimed Syst 28(5):1793–1808
Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik 127:7431–7438
Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensics Secur 13:2137–2150
Sarker IH, Abushark YB, Alsolami FJ, Khan AI (2020) IntruDTree: a machine learning based cyber security intrusion detection model. Symmetry 12:754
Sarker IH, Khan AI, Abushark YB, Alsolami F (2022) Internet of things (IoT) security intelligence: a comprehensive overview, Machine Learning Solutions and Research Directions. Mobile Netw Appl. https://doi.org/10.1007/s11036-022-01937-3
Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio Speech Music Process 2017:20
Sathiyamurthi P, Ramakrishnan S (2022) Speech encryption using hybrid-hyper chaotic system and binary masking technique. Multimed Tools Appl 81:6331–6349. https://doi.org/10.1007/s11042-021-11757-4
Schneier B (1993) Description of a new variable-length key, 64-bit block cipher (blowfish). Fast software encryption, in: Cambridge Security Workshop Proceedings
Shah D, Shah T, Jamal SS (2020) Digital audio signals encryption by Mobius transformation and Hénon map. Multimed Syst 26:235–245
Shah D, Shah T, Ahamad I, Haider MI, Khalid I (2021) A three-dimensional chaotic map and their applications to digital audio security. Multimed Tools Appl 80:22251–22273
Tamimi AA; Abdalla AM (22–24 October 2014) An Audio Shuffle-Encryption Algorithm. In: Proceedings of the World Congress on Engineering and Computer Science, San Francisco, CA, USA, Volume 1
Walter T (1997) A brief history of the data encryption standard. In: Internet besieged: countering cyberspace scofflaws. ACM Press/Addison-Wesley Publishing Co, New York, pp 275–280
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have not any conflict of interest regarding the publication of this article.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alanazi, A.S., Munir, N., Khan, M. et al. A novel design of audio signals encryption with substitution permutation network based on the Genesio-Tesi chaotic system. Multimed Tools Appl 82, 26577–26593 (2023). https://doi.org/10.1007/s11042-023-14964-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-14964-3