Abstract
This paper introduces a speech encryption approach, which is based on permutation of speech segments using chaotic Baker map and substitution using masks in both time and transform domains. Two parameters are extracted from the main key used in the generation of mask. Either the Discrete Cosine Transform (DCT) or the Discrete Sine Transform (DST) can be used in the proposed cryptosystem to remove the residual intelligibility resulting from permutation and masking in time domain. Substitution with Masks is used in this cryptosystem to fill the silent periods within speech conversation and destroy format and pitch information. Permutation with chaotic Baker map is used in to maximize the benefits of the permutation process in encryption by using large-size blocks to allow more audio segments to be permutated. The proposed cryptosystem has a low complexity, small delay, and high degree of security. Simulation results prove that the proposed cryptosystem is robust to the presence of noise.
Similar content being viewed by others
References
Abd El-Samie, F. E. (2009). An efficient singular value decomposition algorithm for digital audio watermarking. International Journal of Speech Technology, 12(1), 27–45.
Advanced Encryption System (2001). Federal Information Processing Standards Publication, 197.
Ahmed, N., Natarajan, T., Rao, K. R. (1974). Discrete cosine transfom. IEEE Transactions on Computers, C-23, 90–93.
Behnia, S., Akhshani, A., Mahmodi, H., & Akhavan, A. (2006). Novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals.
Beker, H. J., & Piper, F. C. (1985). Secure speech communications. London: Academic Press.
Cheng, L. Z. (2001). On computing the two-dimensional (2-D) type IV discrete cosine transform (2-D DCT-IV). IEEE Signal Processing Letters, 8, 239–241.
Daemen, J., & Rijndael, V. R. (2001). The advanced encryption standard. Doctor Dobb’s Journal, 26(3), 137–139.
Fridrich, J. (1997). Secure image ciphering based on chaos (Final report).
Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.
Goldburg, B., Sridharan, S., & Dawson, E. (1993). Design and cryptanalysis of transform-based analog speech scramblers. IEEE Journal on Selected Areas in Communications, 11(5), 735–744.
Koduru, S. C., & Chandrasekaran, V. (2008). Integrated confusion-diffusion mechanisms for chaos based image encryption. In IEEE 8th international conference on computer and information technology workshops.
Kuo, C. J. (1993). Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging, 2(4), 345–351.
Lee, L. S., Chou, G. C., & Chang, C. S. (1984). A new frequency domain speech scrambling system which does not require frame synchronization. IEEE Transactions on Communications, 32, 444–456.
Lin, Q. H., Yin, F. L., Mei, T. M., & Liang, H. (2006). A blind source separation based method for speech encryption. IEEE Transactions on Circuits and Systems. I, 53(6), 1320–1328.
Ma, F., Cheng, J., & Wang, Y. (1996). Wavelet transform-based analogue speech scrambling scheme. Electronics Letters, 32(8), 719–721.
Manjunath, G., & Anand, G. V. (2002). Speech encryption using circulant transformations. In Proc. IEEE, Int. conf. multimedia and exp. (Vol. 1, pp. 553–556).
Mao, Y. B., Chen, G., & Lian, S. G. (2004). A novel fast image encryption scheme based on the 3D chaotic baker map. International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 14(10), 3613–3624.
Meng-En, L., Chien-Feng, C., Tsung-Nan, L., & Chun-Nan, C. (2009). The application of discrete cosine transform (DCT) combined with the nonlinear regression routine on optical auto-focusing. In Digest of technical papers international conference on consumer electronics ICCE 2009 (pp. 1–2).
Milton, R. M. (1989). A time and frequency-domain speech scrambler. In COMSIG 1989 proceedings, Southern African conference (pp. 125–130).
Murthy, N. R., & Swamy, M. N. (1991). Efficient algorithms for the computation of running discrete cosine and sine transforms. IEEE International Symposium on Circuits and Systems, 1, 634–637.
Shannon, C. E. (1949). Communication theory of secrecy system. The Bell System Technical Journal, 28, 656–715.
Tseng (2007). An OFDM speech scrambler without residual intelligibility. In TENCON 2007 (pp. 1–4).
Wu, Y., & Ng, B. P. (2002). Speech scrambling with Hadamard transform in frequency domain. Proceedings of the 6th International Conference on Signal Processing, 2, 1560–1563.
Yip, P., Rao, K. (1987). On the shift property of DCT’s and DST’s. Acoustics, Speech and Signal Processing, 35, 404–406.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mosa, E., Messiha, N.W., Zahran, O. et al. Chaotic encryption of speech signals. Int J Speech Technol 14, 285–296 (2011). https://doi.org/10.1007/s10772-011-9103-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10772-011-9103-7