A Review on Audio Encryption Algorithms Using Chaos Maps-Based Techniques
Keywords:encryption algorithms, audio encryption, audio decryption, chaotic maps.
Due to the quick improvement in digital communications and multimedia applications during recent periods up to the current time, data protection of digital data such as image, audio and video becomes a significant challenge. The security of audio data that transfer through different networks was rated as a preferred research field in the preceding years. This review covers the recent contribution for audio encryption and gives the most evaluations for audio encryption algorithm involving security analysis, computational complexity and quality analysis and their requirements. This paper fundamentally concentrates on displaying the different types of audio encryption and decryption techniques based on chaotic maps. Digital and analog audio algorithms were displayed, discussed and compared with the illustration of the important features and drawbacks. Various digital and audio proposed projects for audio encryption using chaotic maps have been covered, which they showed extreme sensitivity to initial conditions, unpredictability and conducting in a quasi-random manner. A comparison among the proposed algorithms in the key space, chaotic maps sensitivity and statistical analysis were provided.
E. Mosa, N. W. Messiha, O. Zahran, and F. E. Abd El-Samie, “Chaotic encryption of speech signals,” Int. J. Speech Technol., vol. 14, no. 4, pp. 285–296, 2011, doi: 10.1007/s10772-011-9103-7.
F. J. Farsana and K. Gopakumar, “A Novel Approach for Speech Encryption: Zaslavsky Map as Pseudo Random Number Generator,” Procedia Comput. Sci., vol. 93, no. September, pp. 816–823, 2016, doi: 10.1016/j.procs.2016.07.302.
G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” Int. J. Bifurc. Chaos, vol. 16, no. 8, pp. 2129–2151, 2006, doi: 10.1142/S0218127406015970.
A.Zhaopin Su, Guofu Zhang, Jianguo Jiang. “Multimedia security: a survey of chaos based encryption technology”, in book “Multimedia – A multicplinary Approach to Complex Issues”, edited by Loannis Karydis, INTECH, March 2012.
P. Gautam, M. D. Ansari, and S. K. Sharma, “Enhanced security for electronic health care information using obfuscation and RSA algorithm in cloud computing,” Int. J. Inf. Secur. Priv., vol. 13, no. 1, pp. 59–69, 2019, doi: 10.4018/IJISP.2019010105.
M. D. Ansari, V. K. Gunjan, E.Rashid, “On Security and Data Integrity Framework for Cloud Computing Using Tamper-Proofing”, ICCCE 2020 Springer, Singapore, pp. 1419–1427.
W. Dutta, S. Mitra, and S. Kalaivani, “Audio encryption and decryption algorithm in image format for secured communication,” Proc. Int. Conf. Inven. Comput. Informatics, ICICI 2017, no. Icici, pp. 517–521, 2018, doi: 10.1109/ICICI.2017.8365185.
M. Kalpana, K. Ratnavelu, and P. Balasubramaniam, “An audio encryption based on synchronization of robust BAM FCNNs with time delays,” Multimed. Tools Appl., vol. 78, no. 5, pp. 5969–5988, 2019, doi: 10.1007/s11042-018-6373-y.
S. F. Yousif, “Encryption and Decryption of Audio Signal Based on Rsa Algorithn,” Int. J. Eng. Technol. Manag. Res., vol. 5, no. 7, pp. 57–64, 2020, doi: 10.29121/ijetmr.v5.i7.2018.259.
H. Liu, A. Kadir, and Y. Li, “Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys,” Optik (Stuttg)., vol. 127, no. 19, pp. 7431–7438, 2016, doi: 10.1016/j.ijleo.2016.05.073.
E.A.Albahrani and T.K.Alshekly, “New Chaotic Substitution and Permutation Method for Image Encryption”, International Journal of Applied Information Systems (IJAIS), Vol. 12 – No. 4, July 2017.
X. Wang and Y. Su, “An Audio Encryption Algorithm Based on DNA Coding and Chaotic System,” in IEEE Access, vol. 8, pp. 9260–9270, 2020, doi: 10.1109/ACCESS.2019.2963329.
R. Chawla, “A Review on Audio Cryptography,” no. 7, pp. 14–16, 2015.
E. C. Ngineering, “Literature Survey on Recent Audio,” vol. 7, no. 6, pp. 91–95, 2016.
B. E. Students, “A Survey Paper on Audio Security 1,” vol. 4, no. 3, pp. 22–27, 2018.
E. A. Abbas, T. A. Karam, and A. K. Abbas, “Image cipher system based on RSA and chaotic maps,” Eurasian J. Math. Comput. Appl., vol. 7, no. 4, pp. 4–17, 2019, doi: 10.32523/2306-6172-2019-7-4-4-17.
E. A. Albahrani, “A new audio encryption algorithm based on chaotic block cipher,” 2017 Annu. Conf. New Trends Inf. Commun. Technol. Appl. NTICT 2017, no. March, pp. 22–27, 2017, doi: 10.1109/NTICT.2017.7976129.
R. Gnanajeyaraman and K. Prasadh, “Audio encryption using higher dimensional chaotic map,” Int. J. Recent Trends Eng., vol. 1, no. 2, pp. 103–107, 2009.
J. B. Lima and E. F. Da Silva Neto, “Audio encryption based on the cosine number transform,” Multimed. Tools Appl., vol. 75, no. 14, pp. 8403–8418, 2016, doi: 10.1007/s11042-015-2755-6.
Rania A. Elmanfaloty, Ehab Abou-Bakr, “An Image Encryption Scheme Using a 1D Chaotic Double Section Skew Tent Map”, Complexity, vol. 2020, Article ID 7647421, 18 pages, 2020. https://doi.org/10.1155/2020/7647421.
S. Borislav and K. Krasimir, “Novel Image Encryption Scheme Based on Chebyshev Polynomial and Duffing Map”, Hindawi Publishing Corporation, the Scientific World Journal, 2014.
S. J. Sheela, K. V. Suresh, and D. Tandur, “A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding,” J. Comput. Networks Commun., vol. 2017, 2017, doi: 10.1155/2017/2721910.
S. J. Sheela, K. V. Suresh, and D. Tandur, “Performance evaluation of modified henon map in image encryption,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10063, 2016.
Yucheng Chen, Chunming Tang, Zongxiang Yi, “A Novel Image Encryption Scheme Based on PWLCM and Standard Map”, Complexity, vol. 2020, Article ID 3026972, 23 pages, 2020. https://doi.org/10.1155/2020/3026972
K. Kordov, “A novel audio encryption algorithm with permutation-substitution architecture,” Electron., vol. 8, no. 5, 2019, doi: 10.3390/electronics8050530.
K. Kordov, “Modified pseudo-random bit generation scheme based on two circle maps and XOR function,” Appl. Math. Sci., vol. 9, no. 1–4, pp. 129–135, 2015, doi: 10.12988/ams.2015.411887.
An improvement on the chaotic behavior of the Gauss Map for cryptography purposes using the Circle Map combination. To cite this article: MT Suryadi et al. 2020 J. Phys.: Conf. Ser. 1490 012045. https://doi.org/10.1088/1742-6596/1490/1/012045
Skiadas, C.H., Skiadas, C. “Chaotic Modelling and Simulation: Analysis of Chaotic Models”, Attractors and Forms; CRC Press: Boca Raton, FL, USA, 2008.
R. I. Abdelfatah, “Audio Encryption Scheme Using Self-Adaptive Bit Scrambling and Two Multi Chaotic-Based Dynamic DNA Computations,” IEEE Access, vol. 8, pp. 69894–69907, 2020, doi: 10.1109/ACCESS.2020.2987197.
Osama S. Faragallah, “An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Multimedia Applications”, Information Security Journal: A Global Perspective, Vol. 20, 2011.
S. Najim Al Saad and E. Hato, “A Speech Encryption based on Chaotic Maps,” Int. J. Comput. Appl., vol. 93, no. 4, pp. 19–28, 2014, doi: 10.5120/16203-5488.
Ashtiyani M., Moradi Birgani P. and Karimi Madahi S. S., “Speech Signal Encryption Using Chaotic Symmetric Cryptography”, J. Basic. Appl. Sci. Res., Vol. 2, 2012.
E. M. Elshamy et al., “Efficient audio cryptosystem based on chaotic maps and double random phase encoding,” Int. J. Speech Technol., vol. 18, no. 4, pp. 619–631, 2015, doi: 10.1007/s10772-015-9279-3.
F. J. Farsana, V. R. Devi, and K. Gopakumar, “An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams,” Appl. Comput. Informatics, no. xxxx, pp. 1–11, 2019, doi: 10.1016/j.aci.2019.10.001.
P. Sathiyamurthi and S. Ramakrishnan, “Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map,” Multimed. Tools Appl., vol. 79, no. 25–26, pp. 17817–17835, 2020, doi: 10.1007/s11042-020-08729-5.
E. A. Albahrani and T. K. Alshekly, “A Text Encryption Algorithm Based on Self-Synchronizing Stream Cipher and Chaotic Maps,” vol. 3, no. 5, pp. 579–585, 2017.
How to Cite
Copyright (c) 2021 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.