A Review on Audio Encryption Algorithms Using Chaos Maps-Based Techniques

Authors

  • Ekhlas Abbas Albahrani Department of Computer Science, Mustansiriyah University, Baghdad, Iraq
  • Tayseer Karam Alshekly Department of Banking and Finance science, Al-Imam Al-A’tham University College, Baghdad, Iraq
  • Sadeq H. Lafta Department of Applied Science, University of Technology – Iraq https://orcid.org/0000-0002-7000-8337

DOI:

https://doi.org/10.13052/jcsm2245-1439.1113

Keywords:

encryption algorithms, audio encryption, audio decryption, chaotic maps.

Abstract

Due to the quick improvement in digital communications and multimedia applications during recent periods up to the current time, data protection of digital data such as image, audio and video becomes a significant challenge. The security of audio data that transfer through different networks was rated as a preferred research field in the preceding years. This review covers the recent contribution for audio encryption and gives the most evaluations for audio encryption algorithm involving security analysis, computational complexity and quality analysis and their requirements. This paper fundamentally concentrates on displaying the different types of audio encryption and decryption techniques based on chaotic maps. Digital and analog audio algorithms were displayed, discussed and compared with the illustration of the important features and drawbacks. Various digital and audio proposed projects for audio encryption using chaotic maps have been covered, which they showed extreme sensitivity to initial conditions, unpredictability and conducting in a quasi-random manner. A comparison among the proposed algorithms in the key space, chaotic maps sensitivity and statistical analysis were provided.

Downloads

Download data is not yet available.

Author Biographies

Ekhlas Abbas Albahrani, Department of Computer Science, Mustansiriyah University, Baghdad, Iraq

Ekhlas Abbas Albahrani Assistant Prof. was born at 1974. She had the PhD Degree in Computer science/Data Security in 2016. The Msc. in Computer science/Data Security in 2001, and Bachelor Degree in Computer science 1996 at the University of Technology/Iraq. Work teams are at University of Technology and Mustansiriyah University, Baghdad, Iraq on Cryptography research field. Academic member from 1996 to 2001 at the University of Technology/Iraq, from 2001 to 2009 at Sebha University and at Mustansiriyah University/Iraq from 2009 to 2021. She participated in different committees such as organizing symposium and conferences in computer Sciences at Mustansiriyah University and IEEE conferences. She participated in different seminars, Training courses and lectures inside Iraq. She reviewed more than 20 articles in data security for Clarivate and Scopus journals. She participated in different organizing and scientific committees of conferences in College of Education at Mustansiriyah University/Iraq. She has about 20 published research papers in Cryptography and Data Security.

Tayseer Karam Alshekly, Department of Banking and Finance science, Al-Imam Al-A’tham University College, Baghdad, Iraq

Tayseer Karam Alshekly, born in 1991 in Baghdad, B.Sc. 2014 in computer science. MSc. In Computer Science from College of Education at Mustansiriyah University/Baghdad. She has four published papers in the field of cryptography. Now, she works for Banking and Finance science, Al-Imam Al-A’tham University College in Baghdad- Iraq.

Sadeq H. Lafta, Department of Applied Science, University of Technology – Iraq

Sadeq H. Lafta Assistant Prof. was born at 1972 He had his PhD Degree in Magnetic Material Science in 2016, the Msc. in Laser Physics1998, and Bachelor Degree in Applied Physics 1995 University of Technology/Iraq. His work teams are at University of Technology in semiconductor, nanomaterials and sensor fields, Duisburg-Essen University in nano-magnetic material field and Mustansiriyah University in Cryptography research field. He was an academic member from 1998 to 2009 in Sebha University, researcher at Nanotechnology Centre and Applied Science Department/University of Technology/Iraq from 2010 to 2021. He participated in different committees such as organizing symposium and conferences in Nanotechnology Centre/University of Technology. He participated in revealing the validity of laboratory equipment and suitability for work. He participated in different seminars, Training courses and lectures inside and outside Iraq. He has different social and scientific articles in Applied Science Dep. Website. He reviewed more than 50 articles in different applied physics for Clarivate and Scopus journals. He participated in different organizing and scientific committees of conferences in Nanotechnology Centre Applied Science Dep. At University of Technology/Iraq. He has about 20 published research papers in Applied Physics and Cryptography. He has a Science Day Medal/Ministry of Higher Education/Iraq in 2016 and Inventors Medal/Ministry of Science and Technology/Iraq in 2018.

References

E. Mosa, N. W. Messiha, O. Zahran, and F. E. Abd El-Samie, “Chaotic encryption of speech signals,” Int. J. Speech Technol., vol. 14, no. 4, pp. 285–296, 2011, doi: 10.1007/s10772-011-9103-7.

F. J. Farsana and K. Gopakumar, “A Novel Approach for Speech Encryption: Zaslavsky Map as Pseudo Random Number Generator,” Procedia Comput. Sci., vol. 93, no. September, pp. 816–823, 2016, doi: 10.1016/j.procs.2016.07.302.

G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” Int. J. Bifurc. Chaos, vol. 16, no. 8, pp. 2129–2151, 2006, doi: 10.1142/S0218127406015970.

A.Zhaopin Su, Guofu Zhang, Jianguo Jiang. “Multimedia security: a survey of chaos based encryption technology”, in book “Multimedia – A multicplinary Approach to Complex Issues”, edited by Loannis Karydis, INTECH, March 2012.

P. Gautam, M. D. Ansari, and S. K. Sharma, “Enhanced security for electronic health care information using obfuscation and RSA algorithm in cloud computing,” Int. J. Inf. Secur. Priv., vol. 13, no. 1, pp. 59–69, 2019, doi: 10.4018/IJISP.2019010105.

M. D. Ansari, V. K. Gunjan, E.Rashid, “On Security and Data Integrity Framework for Cloud Computing Using Tamper-Proofing”, ICCCE 2020 Springer, Singapore, pp. 1419–1427.

W. Dutta, S. Mitra, and S. Kalaivani, “Audio encryption and decryption algorithm in image format for secured communication,” Proc. Int. Conf. Inven. Comput. Informatics, ICICI 2017, no. Icici, pp. 517–521, 2018, doi: 10.1109/ICICI.2017.8365185.

M. Kalpana, K. Ratnavelu, and P. Balasubramaniam, “An audio encryption based on synchronization of robust BAM FCNNs with time delays,” Multimed. Tools Appl., vol. 78, no. 5, pp. 5969–5988, 2019, doi: 10.1007/s11042-018-6373-y.

S. F. Yousif, “Encryption and Decryption of Audio Signal Based on Rsa Algorithn,” Int. J. Eng. Technol. Manag. Res., vol. 5, no. 7, pp. 57–64, 2020, doi: 10.29121/ijetmr.v5.i7.2018.259.

H. Liu, A. Kadir, and Y. Li, “Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys,” Optik (Stuttg)., vol. 127, no. 19, pp. 7431–7438, 2016, doi: 10.1016/j.ijleo.2016.05.073.

E.A.Albahrani and T.K.Alshekly, “New Chaotic Substitution and Permutation Method for Image Encryption”, International Journal of Applied Information Systems (IJAIS), Vol. 12 – No. 4, July 2017.

X. Wang and Y. Su, “An Audio Encryption Algorithm Based on DNA Coding and Chaotic System,” in IEEE Access, vol. 8, pp. 9260–9270, 2020, doi: 10.1109/ACCESS.2019.2963329.

R. Chawla, “A Review on Audio Cryptography,” no. 7, pp. 14–16, 2015.

E. C. Ngineering, “Literature Survey on Recent Audio,” vol. 7, no. 6, pp. 91–95, 2016.

B. E. Students, “A Survey Paper on Audio Security 1,” vol. 4, no. 3, pp. 22–27, 2018.

E. A. Abbas, T. A. Karam, and A. K. Abbas, “Image cipher system based on RSA and chaotic maps,” Eurasian J. Math. Comput. Appl., vol. 7, no. 4, pp. 4–17, 2019, doi: 10.32523/2306-6172-2019-7-4-4-17.

E. A. Albahrani, “A new audio encryption algorithm based on chaotic block cipher,” 2017 Annu. Conf. New Trends Inf. Commun. Technol. Appl. NTICT 2017, no. March, pp. 22–27, 2017, doi: 10.1109/NTICT.2017.7976129.

R. Gnanajeyaraman and K. Prasadh, “Audio encryption using higher dimensional chaotic map,” Int. J. Recent Trends Eng., vol. 1, no. 2, pp. 103–107, 2009.

J. B. Lima and E. F. Da Silva Neto, “Audio encryption based on the cosine number transform,” Multimed. Tools Appl., vol. 75, no. 14, pp. 8403–8418, 2016, doi: 10.1007/s11042-015-2755-6.

Rania A. Elmanfaloty, Ehab Abou-Bakr, “An Image Encryption Scheme Using a 1D Chaotic Double Section Skew Tent Map”, Complexity, vol. 2020, Article ID 7647421, 18 pages, 2020. https://doi.org/10.1155/2020/7647421.

S. Borislav and K. Krasimir, “Novel Image Encryption Scheme Based on Chebyshev Polynomial and Duffing Map”, Hindawi Publishing Corporation, the Scientific World Journal, 2014.

S. J. Sheela, K. V. Suresh, and D. Tandur, “A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding,” J. Comput. Networks Commun., vol. 2017, 2017, doi: 10.1155/2017/2721910.

S. J. Sheela, K. V. Suresh, and D. Tandur, “Performance evaluation of modified henon map in image encryption,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10063, 2016.

Yucheng Chen, Chunming Tang, Zongxiang Yi, “A Novel Image Encryption Scheme Based on PWLCM and Standard Map”, Complexity, vol. 2020, Article ID 3026972, 23 pages, 2020. https://doi.org/10.1155/2020/3026972

K. Kordov, “A novel audio encryption algorithm with permutation-substitution architecture,” Electron., vol. 8, no. 5, 2019, doi: 10.3390/electronics8050530.

K. Kordov, “Modified pseudo-random bit generation scheme based on two circle maps and XOR function,” Appl. Math. Sci., vol. 9, no. 1–4, pp. 129–135, 2015, doi: 10.12988/ams.2015.411887.

An improvement on the chaotic behavior of the Gauss Map for cryptography purposes using the Circle Map combination. To cite this article: MT Suryadi et al. 2020 J. Phys.: Conf. Ser. 1490 012045. https://doi.org/10.1088/1742-6596/1490/1/012045

Skiadas, C.H., Skiadas, C. “Chaotic Modelling and Simulation: Analysis of Chaotic Models”, Attractors and Forms; CRC Press: Boca Raton, FL, USA, 2008.

R. I. Abdelfatah, “Audio Encryption Scheme Using Self-Adaptive Bit Scrambling and Two Multi Chaotic-Based Dynamic DNA Computations,” IEEE Access, vol. 8, pp. 69894–69907, 2020, doi: 10.1109/ACCESS.2020.2987197.

Osama S. Faragallah, “An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Multimedia Applications”, Information Security Journal: A Global Perspective, Vol. 20, 2011.

S. Najim Al Saad and E. Hato, “A Speech Encryption based on Chaotic Maps,” Int. J. Comput. Appl., vol. 93, no. 4, pp. 19–28, 2014, doi: 10.5120/16203-5488.

Ashtiyani M., Moradi Birgani P. and Karimi Madahi S. S., “Speech Signal Encryption Using Chaotic Symmetric Cryptography”, J. Basic. Appl. Sci. Res., Vol. 2, 2012.

E. M. Elshamy et al., “Efficient audio cryptosystem based on chaotic maps and double random phase encoding,” Int. J. Speech Technol., vol. 18, no. 4, pp. 619–631, 2015, doi: 10.1007/s10772-015-9279-3.

F. J. Farsana, V. R. Devi, and K. Gopakumar, “An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams,” Appl. Comput. Informatics, no. xxxx, pp. 1–11, 2019, doi: 10.1016/j.aci.2019.10.001.

P. Sathiyamurthi and S. Ramakrishnan, “Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map,” Multimed. Tools Appl., vol. 79, no. 25–26, pp. 17817–17835, 2020, doi: 10.1007/s11042-020-08729-5.

E. A. Albahrani and T. K. Alshekly, “A Text Encryption Algorithm Based on Self-Synchronizing Stream Cipher and Chaotic Maps,” vol. 3, no. 5, pp. 579–585, 2017.

Downloads

Published

2021-11-20

How to Cite

1.
Albahrani EA, Alshekly TK, Lafta SH. A Review on Audio Encryption Algorithms Using Chaos Maps-Based Techniques. JCSANDM [Internet]. 2021 Nov. 20 [cited 2024 Apr. 26];11(1):53-82. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/6239

Issue

Section

Articles

Most read articles by the same author(s)