Abstract
A new substitution and permutation method for the encryption/decryption of two-channel audio files based on chaotic maps is presented. The proposed scheme's structure depends on encoding the original audio data into a new data range. Each value in the resulted range was translated to a binary sequence and both substitution and permutation operations are accomplished using the chaotic state and chaotic parameters. The substitution was attained using the XORing operation and Bernoulli substitution while the permutation method was based on the numbers sequence generated using a hyper chaotic system. A new key generation algorithm is proposed based on the properties of the square root of large prime numbers and a hyper chaotic system to produce the keys. The proposed cipher system was tested by various audio file sizes of (.WAV) extension. Performance evaluation and security measures to assess the algorithm’s security against various attacks. The results of the key space analysis, statistical analysis, mean square error analyses, Peak signal to noise ratio (PSNR) analyses, entropy analyses, homogeneity, contrast, SNR, etc. showed that the proposed cipher is notably secured in opposition to the attackers and possesses an effective diffusion and confusion mechanism for better audio communication with inside the area of telecommunication.
Similar content being viewed by others
Availability of data and materials
Not applicable.
References
Aziz H, Gilani SMM, Hussain I, Janjua AK, Khurram S (2021) A noise-tolerant audio encryption framework designed by the application of S8Symmetric group and chaotic systems. Math Probl Eng. https://doi.org/10.1155/2021/5554707
Naik RB, Singh U (2022) A review on applications of chaotic maps in pseudo-random number generators and encryption. Ann Data Sci. https://doi.org/10.1007/s40745-021-00364-7
Sheela SJ, Suresh KV, Tandur D (2017) A novel audio cryptosystem using chaotic maps and DNA encoding. J Comput Networks Commun. https://doi.org/10.1155/2017/2721910
Albahrani EA (2017) A new audio encryption algorithm based on chaotic block cipher. In: 2017 Annu. Conf. New Trends Inf. Commun. Technol. Appl. NTICT 2017, no. March, pp 22–27.https://doi.org/10.1109/NTICT.2017.7976129.
Babu NR, Kalpana M, Balasubramaniam P (2021) A novel audio encryption approach via finite-time synchronization of fractional order hyperchaotic system. Multimed Tools Appl 80(12):18043–18067. https://doi.org/10.1007/s11042-020-10288-8
Adhikari S, Karforma S (2021) A novel audio encryption method using Henon-Tent chaotic pseudo random number sequence. Int J Inf Technol 13(4):1463–1471. https://doi.org/10.1007/s41870-021-00714-x
Kakaei Kate H, Razmara J, Isazadeh A (2018) A novel fast and secure approach for voice encryption based on DNA computing. 3D Res. 9(2). https://doi.org/10.1007/s13319-018-0167-x.
Lynnyk V, Sakamoto N, Čelikovský S (2015) Pseudo random number generator based on the generalized Lorenz chaotic system. IFAC-PapersOnLine 28(18):257–261. https://doi.org/10.1016/j.ifacol.2015.11.046
Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101–111. https://doi.org/10.1016/j.cnsns.2013.06.017
Sadkhan SB, Mohammed RS (2015) Proposed random unified chaotic map as prbg for voice encryption in wireless communication. Procedia Comput Sci; 65(Iccmit) 314–323, 2015. https://doi.org/10.1016/j.procs.2015.09.089.
Krishnamoorthi S, Jayapaul P, Dhanaraj RK, Rajasekar V, Balusamy B, Islam SH (2021) Design of pseudo-random number generator from turbulence padded chaotic map. Nonlinear Dyn 104(2):1627–1643. https://doi.org/10.1007/s11071-021-06346-x
Yousif A, Kashmar AH (2019) Key generator to encryption images based on chaotic maps. Iraqi J Sci 60(2):362–370. https://doi.org/10.24996/ijs.2019.60.2.16
Wang L, Cheng H (2019) Logistic chaotic system
Gaeini A, Mirghadri A, Jandaghi G, Keshavarzi B (2016) A new pseudo-random number generator based on chaotic maps and linear feedback shift register. J Comput Theor Nanosci 13(1):836–845. https://doi.org/10.1166/jctn.2016.4883
Al-Mhadawi MM, Albahrani AA (2019) Hybrid method as pseudo-random bits generator, 1st Int. Sci Conf Comput Appl Sci CAS 2019:250–255. https://doi.org/10.1109/CAS47993.2019.9075715
Ghayad NH, Albahrani EA (2019) A combination of two-dimensional hénon map and two-dimensional rational map as key number generator. 1st Int Sci Conf Comput Appl Sci CAS 2019(2):107–112. https://doi.org/10.1109/CAS47993.2019.9075731
Naskar PK, Bhattacharyya S, Chaudhuri A (2021) An audio encryption based on distinct key blocks along with PWLCM and ECA. Nonlinear Dyn 103(2):2019–2042. https://doi.org/10.1007/s11071-020-06164-7
Ding L, Ding Q (2020) The establishment and dynamic properties of a new 4d hyperchaotic system with its application and statistical tests in gray images. Entropy. https://doi.org/10.3390/e22030310.
Sheela S, Sathyanarayana SV (2016) Application of chaos theory in data security-a survey. Accent Trans Inf Secur 2(5) 1–15, 2016. https://doi.org/10.19101/tis.2017.25001.
Awad A, Saadane A (2010) New chaotic permutation methods for image encryption. IAENG Int J Comput Sci 37(4):34–39
Albhrany E, Alshekly T (2017) A new key stream generator based on 3D Henon map and 3D Cat map 8(February), pp 2114–2120
Al-Zubaidy RN, Al-Bahrani E (2019) New key generation algorithm based on dynamical chaotic substitution box. NTCCIT 2018 - Al Mansour Int Conf New Trends Comput Commun Inf Technol. https://doi.org/10.1109/NTCCIT.2018.8681187.
Kubba ZMJ, Hoomod HK (2019) A hybrid modified lightweight algorithm combined of two cryptography algorithms PRESENT and Salsa20 using chaotic system. 1st Int Sci Conf Comput Appl Sci CAS 2019:199–203. https://doi.org/10.1109/CAS47993.2019.9075488
Albahrani EA, Alshekly TK (2017) A Text encryption algorithm based on self-synchronizing stream cipher and chaotic maps. 3(5):579–585
Al-Bahrani EA, Kadhum RNJ (2019) A new cipher based on Feistel structure and chaotic maps. Baghdad Sci J 16(1):270–280. https://doi.org/10.21123/bsj.2019.16.1(Suppl.).0270
Wang X, Su Y (2020) An audio encryption algorithm based on DNA coding and chaotic system. IEEE Access 8:9260–9270. https://doi.org/10.1109/ACCESS.2019.2963329
Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. Eurasip. J Audio, Speech, Music Process. https://doi.org/10.1186/s13636-017-0118-0
Satam IA, Shahab SN, Kamel HA, Al-Hamadani MNA (2021) Execution of a smart street lighting system for energy saving enhancement. Bull Electr Eng Inf 10(4):1884–1892. https://doi.org/10.11591/EEI.V10I4.2924
Albahrani EA, Alshekly TK, Lafta SH (2022) A review on audio encryption algorithms using chaos maps-based techniques. J Cyber Secur Mobility 11(1):53–82. https://doi.org/10.13052/jcsm2245-1439.1113
Albahrani EA, Maryoosh AA, Lafta SH (2020) Block image encryption based on modified play fair and chaotic system. J Inf Secur Appl. https://doi.org/10.1016/j.jisa.2019.102445.
Chawla R (2015) A review on audio cryptography. 7, pp 14–16
Ngineering EC (2016) Literature survey on recent audio; 7(6): 91–95
Students BE (2018) A survey paper on audio security 1. J Inf Technol Sci 4(3):22–27
Abbas EA, Karam TA, Abbas AK (2019) Image cipher system based on RSA and chaotic maps. Eurasian J Math Comput Appl 7(4):4–17. https://doi.org/10.32523/2306-6172-2019-7-4-4-17
Abdelfatah RI (2020) Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8:69894–69907. https://doi.org/10.1109/ACCESS.2020.2987197
Hussain S, Shah T, Javeed A (2022) Modified advanced encryption standard (MAES) based on non-associative inverse property loop. Multimedia Tools Appl
Javeed A, Shah T, Ullah A (2020) A color image privacy scheme established on nonlinear system of coupled differential equations. Multimedia Tools Appl 79(43–44):32487–32501
Acknowledgments
The authors are grateful and appreciative to their institutes, Mustansiriyah University, Al-Imam Al-A’tham University College, and University of Technology-Iraq, due to institute roles in supporting and providing academic time for performing the research.
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
Not applicable.
Corresponding author
Ethics declarations
Competing interests
Not applicable.
Ethical approval
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Albahrani, E.A., Alshekly, T.K. & Lafta, S.H. New secure and efficient substitution and permutation method for audio encryption algorithm. J Supercomput 79, 16616–16646 (2023). https://doi.org/10.1007/s11227-023-05249-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05249-5