Skip to main content
Log in

An appropriate system for securing real-time voice communication based on ADPCM coding and chaotic maps

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a very simple and efficient encryption scheme based on controlled chaotic maps and ADPCM (Adaptive Differential Pulse Code Modulation) coding, in order to secure the real-time voice communication for operating at 16, 24, 32 or 40 kbps. This encryption algorithm adopts three main operations one to generate chaotic values using two chaotic logistic maps starting from independent initial conditions, the second to transform them into binary words using random encoding tables and the third to execute some basic operations and substitutions. It has important properties of randomness that can pass NIST batteries of tests. The evaluation and simulation analysis indicate that our proposal possesses an excellent statistical and cryptographic properties; it provides low correlation between adjacent samples in encryption speech, extremely sensitive encryption keys and has a large key space which is sufficient to protect against brute-force attack. As an illustrative example, an application on a commonly-encoder type used in communications, standard ITU-T G.726, is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101–111

    Article  MATH  Google Scholar 

  2. Alanazi HO, Zaidan BB, Zaidan AA, Jalab HA, Shabbir M, Al-Nabhani Y (2010) DES, new comparative study between DES, 3DES and AES within nine factors. J Comput 2(3):152–157

    Google Scholar 

  3. Alligood KT, Sauer TD, Yorke JA (1996) Chaos : an introduction to dynamical systems. Springer, New York

    MATH  Google Scholar 

  4. Anees A, Siddiqui AM, Ahmed F (2014) Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul 19:3106–3118

    Article  MathSciNet  Google Scholar 

  5. Audio File and Compression Formats, for use with oracle multimedia. https://docs.oracle.com/database/121/AIVUG/ap_audfmts.htm

  6. Baptista MS (1998) Cryptography with chaos. Phys Lett A 240:50–54

    Article  MathSciNet  MATH  Google Scholar 

  7. Barenghi A, Bertoni GM, Breveglieri L, Pelosi G (2013) A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. J Syst Softw 86:1864–1878

    Article  Google Scholar 

  8. Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35:408–419

    Article  MathSciNet  MATH  Google Scholar 

  9. Boriga R, Dăscălescu AC, Diaconu A (2014) A new one-dimensional chaotic map and its use in a novel real-time image encryption scheme. Hindawi Publishing Corporation, Advances in Multimedia 2014:15

  10. CCITT Recommendation G.726 for 40, 32, 24, 16 kbit/s, Adaptive Differential Pulse Code Modulation (ADPCM), December 1990. http://www.itu.int/rec/T-REC-G.726/

  11. CCITT Recommendation G.726 for 5, 4, 3 and 2-bit/sample, Embedded Adaptive Differential Pulse Code Modulation (ADPCM), 1990. http://www.itu.int/rec/T-REC-G.727

  12. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21:749–761

    Article  MathSciNet  MATH  Google Scholar 

  13. Cheng CJ, Cheng CB (2013) An asymmetric image cryptosystem based on the adaptive synchronization of an uncertain unified chaotic system and a cellular neural network. Commun Nonlinear Sci Numer Simul 18:2825–2837

    Article  MathSciNet  MATH  Google Scholar 

  14. Francois M, Grosges T, Barchiesi D, Erra R (2013) A new pseudo-random number generator based on two chaotic maps. Informatica 24(2):181–197

    MathSciNet  Google Scholar 

  15. Hamdi M, Hermassi H, Rhouma R, Belghith S (2014) A new secure and efficient scheme of ADPCM encoder based on chaotic encryption. IEEE Int Conf Adv Technol Signal Image Process 1:7–11

    Google Scholar 

  16. Hamdi M, Rhouma R, Belghith S (2015) A very efficient pseudo-random number generator based on chaotic maps and s-box tables. Int J Comput Electr Autom Control Inf Eng 9(2):481–485

    Google Scholar 

  17. Hermassi H, Hamdi M, Rhouma R, Belghith S (2015) A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map. Multimedia Tools Appl 74:1–24

    Article  Google Scholar 

  18. Huang D (2000) Lossless compression for μ-law (A-law) and IMA ADPCM on the basis of a fast RLS algorithm. IEEE Int Conf Multimed Expo (ICME) 3:1775–1778

    Article  Google Scholar 

  19. ITU-T Test Signals for Telecommunication Systems. https://www.itu.int/net/itu-t/sigdb/speaudio/

  20. Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst I Fundam Theory Appl 48(2):163–169

    Article  MathSciNet  MATH  Google Scholar 

  21. Ji X, Bai S, Guo Y, Guo H (2015) A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding. Commun Nonlinear Sci Numer Simul 22:321–333

    Article  Google Scholar 

  22. Jolfaei A, Mirghadri A (2011) Image encryption using chaos and block cipher. Comput Inf Sci 4(1):172–185

    Google Scholar 

  23. Kazmi S, Ikram N (2013) Chaos based key expansion function for block ciphers. Multimed Tools Appl 66:267–281

    Article  Google Scholar 

  24. Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32:1518–1529

    Article  MathSciNet  MATH  Google Scholar 

  25. Lasota A, Mackey MC (1994) Chaos, fractals, and noise: stochastic aspects of dynamics. Springer, New York

    Book  MATH  Google Scholar 

  26. Ling C, Wu X (2008) A back-iteration method for reconstructing chaotic sequences in finite-precision machines. Circ Syst Signal Process 27(6):883–891

    Article  MathSciNet  MATH  Google Scholar 

  27. Mao Y, Chen G, Lian S (2014) A novel fast image encryption scheme based on 3d chaotic baker maps. World Sci Int J Bifurcation Chaos 14(10):3613–3624

    Article  MathSciNet  MATH  Google Scholar 

  28. Masmoudi A, Puech W, Bouhlel MS (2010) An efficient PRBG based on chaotic map and engel continued fractions. J Softw Eng Appl (Sci Res) 3(12):1141–1147

    Article  Google Scholar 

  29. Özkaynak F, Yavuz S (2013) Security problems for a pseudorandom sequence generator based on the Chen chaotic system. Comput Phys Commun 184(9):2178–2181

    Article  MATH  Google Scholar 

  30. Piret G, Quisquater JJ (2003) A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. Cryptographic Hardware and Embedded Systems – (CHES). In: Computer Science. Springer, Berlin, pp 77–88

  31. Purwar RK, Priyanka (2013) An improved image encryption scheme using chaotic logistic maps. Int J Latest Trends Eng Technol (IJLTET) 2(3)

  32. Shannon CE (1949) Communication theory of secrecy system. Bell Syst Tech J 28:656–715

    Article  MathSciNet  MATH  Google Scholar 

  33. Shlomo Y (2003) Gini’s mean difference: a superior measure of variability for non-normal distributions. Metron - Int J Stat LXI(2):285–316

    MathSciNet  Google Scholar 

  34. Wang X, Qin X (2012) A new pseudo-random number generator based on CML and chaotic iteration. Nonlinear Dyn 70(2):1589–1592

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mimoun Hamdi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hamdi, M., Rhouma, R. & Belghith, S. An appropriate system for securing real-time voice communication based on ADPCM coding and chaotic maps. Multimed Tools Appl 76, 7105–7128 (2017). https://doi.org/10.1007/s11042-016-3377-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3377-3

Keywords

Navigation