Abstract
In this work, the problem of N sound record data (audio) encryption based on double-key secure is proposed. The first key is the math tricks to cumulate N audio files in a single file. The second key is the values of the parameters \(A,\ B,\ D,\ \tilde{A},\ \tilde{B},\ \tilde{D},\) of the constructed drive-response bidirectional associative memory neural networks to be found by suitable Lyapunov–Krasovskii functional and satisfying the linear matrix inequality to obtain the dynamical signal (irregular), which are used to encrypt an audio file. Further, the key sensitivity of \(1e-10\) of the proposed method are large adequate key space to make hacker’s attack infeasible. Numerical simulations, cryptanalysis of the proposed scheme are provided to show the best performance.
Similar content being viewed by others
References
Yang YG, Tian J, Sun SJ, Xu P (2015) Quantum-assisted encryption for digital audio signals. Opt Int J Light Electron Opt 126:3221–3226
Chang D, Li Z, Wang M, Zeng Y (2018) A novel digital programmable multi-scroll chaotic system and its application in FPGA-based audio secure communication. AEU Int J Electron Commun 88:20–29
Yan F, Iliyasu AM, Guo Y, Yang H (2018) Flexible representation and manipulation of audio signals on quantum computers. Theor Comput Sci 752:71–85
Shahadi HI (2018) Covert communication model for speech signals based on an indirect and adaptive encryption technique. Comput Electr Eng 68:425–436
Pu Z, Rao R (2018) Exponential stability criterion of high-order BAM neural networks with delays and impulse via fixed point approach. Neurocomputing 292:63–71
Balasubramaniam P, Kalpana M, Rakkiyappan R (2011) Existence and global asymptotic stability of fuzzy cellular neural networks with time delay in the leakage term and unbounded distributed delays. Circuits Syst Signal Process 30:1595–1616
Huang C, Cao J (2018) Impact of leakage delay on bifurcation in high-order fractional BAM neural networks. Neural Netw 98:223–235
Huang C, Meng Y, Cao J, Alsaedi A, Alsaadi FE (2017) New bifurcation results for fractional BAM neural network with leakage delay. Chaos Solitons Fractals 100:31–44
Aouiti C, Gharbia IB, Cao J, M’hamdi MS, Alsaedi A (2018) Existence and global exponential stability of pseudo almost periodic solution for neutral delay BAM neural networks with time-varying delay in leakage terms. Chaos Solitons Fractals 107:111–127
Chen C, Li L, Peng H, Yang Y (2018) Adaptive synchronization of memristor-based BAM neural networks with mixed delays. Appl Math Comput 322:100–110
Kalpana M, Balasubramaniam P, Ratnavelu K (2015) Direct delay decomposition approach to synchronization of chaotic fuzzy cellular neural networks with discrete, unbounded distributed delays and Markovian jumping parameters. Appl Math Comput 254:291–304
Mansi, Chawla R (2015) A review on audio cryptography. Int J Mod Commun Technol Res 3:14–16
Kalpana M, Ratnavelu K, Balasubramaniam P, Kamali MZM (2018) Synchronization of chaotic-type delayed neural networks and its application. Nonlinear Dyn 93:543–555
Ratnavelu K, Kalpana M, Balasubramaniam P, Wong K, Raveendran P (2017) Image encryption method based on chaotic fuzzy cellular neural networks. Signal Process 140:87–96
Kosko B (1988) Bidirectional associative memories. IEEE Trans Syst Man Cybern 18:49–60
Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105
Li H, Qin Z, Zhang X, Wang X (2011) Auditory cryptography security algorithm with audio shelters. Proc Eng 15:2695–2699
Muthukumar P, Balasubramaniam P, Ratnavelu K (2018) Sliding mode control for generalized robust synchronization of mismatched fractional order dynamical systems and its application to secure transmission of voice messages. ISA Trans 82:51–61
Silva-García VM, Flores-Carapia R, Rentería-Márquez C, Luna-Benoso B, Aldape-Pérez M (2018) Substitution box generation using Chaos: an image encryption application. Appl Math Comput 332:123–135
Sadkhan SB, Mohammed RS (2015) Proposed random unified chaotic map as PRBG for voice encryption in wireless communication. Proc Comput Sci 65:314–323
Shatheesh Sam I, Devaraj P, Bhuvaneswaran Raghuvel S (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56:315–330
Wang W, Yuan M, Luo X, Liu L, Zhang Y (2018) Anti-synchronization control of BAM memristive neural networks with multiple proportional delays and stochastic perturbations. Mod Phys Lett B 32:1850028
Wang W, Yu X, Luo X, Li L (2018) Stability analysis of memristive multidirectional associative memory neural networks and applications in information storage. Mod Phys Lett B 32:1850207
Yuan M, Wang W, Luo X, Liu L, Zhao W (2018) Finite-time anti-synchronization of memristive stochastic BAM neural networks with probabilistic time-varying delays. Chaos Solitons Fractals 113:244–260
Wang W, Yu X, Luo X, Kurths J (2018) Synchronization control of memristive multidirectional associative memory neural networks and applications in network security communication. IEEE Access 6:36002–36018
Wang W, Yu X, Luo X, Kurths J (2018) Finite-time synchronization of chaotic memristive multidirectional associative memory neural networks and applications in image encryption. IEEE Access 6:35764–35779
Yuan M, Luo X, Wang W, Li L, Peng H (2019) Pinning synchronization of coupled memristive recurrent neural networks with mixed time-varying delays and perturbations. Neural Process Lett 49:239–262
Wang W, Yu M, Luo X, Liu L, Yuan M, Zhao W (2017) Synchronization of memristive BAM neural networks with leakage delay and additive time-varying delay components via sampled-data control. Chaos Solitons Fractals 104:84–97
Yang R, Gao H, Shi P (2009) Novel robust stability criteria for stochastic Hopfield neural networks with time delays. IEEE Trans Syst Man Cybern Part B (Cybern) 39:467–474
Kalpana M, Ratnavelu K, Balasubramaniam P (2019) An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimed Tools Appl 78:5969–5988
Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Opt Int J Light Electron Opt 127:7431–7438
Nadir J, Ein AA, Alqadi Z (2016) A technique to encrypt–decrypt stereo wave file. Int J Comput Inf Technol 05:465–470
Acknowledgements
This effort was assisted by the University of Malaya, Frontier Research Grant 2017, Grant No. FG037-17AFR. Dr. M. Kalpana is working as a Post-Doctoral Research Fellow at University of Malaya.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kalpana, M., Ratnavelu, K., Balasubramaniam, P. et al. Double-Key Secure for N-1-N Sound Record Data (SRD) by the Drive-Response of BAM NNs. Neural Process Lett 50, 2925–2944 (2019). https://doi.org/10.1007/s11063-019-10067-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11063-019-10067-z