Speech Signal Security Scheme Based on Multiple Chaotic Maps with Deoxyribonucleic Acid Coding Algorithm

Authors

  • Sura F. Yousif University of Diyala, College of Engineering
  • Hussein A. Abdulkadhim University of Diyala, College of Engineering, Dept. of Communication Engineering https://orcid.org/0000-0002-5059-9694

Abstract

This article presents a novel speech cryptosystem by using chaotic maps and Deoxyribonucleic Acid coding. Initially, the speech signal is divided into four equal blocks. Then the speech samples in each block are submitted to confusion/diffusion via four different chaotic maps. The gained ciphered speech samples and the obtained chaotic sequence from Sine map are encoded via DNA rules. The consequent coded sequences from the previous step are merged via DNA/XNOR to get the coded DNA signal. Ultimately, the resulted signal is decoded to acquire the definitive ciphered signal. The experiments prove the efficiency and robustness of the suggested method.

References

S. F. Yousif, “Encryption and Decryption of Audio Signal Based on RSA Algorithm”, International Journal of Engineering Technologies and Management Research, vol.5, no.7, pp. 57-64, 2018. https://doi.org/10.29121/ijetmr.v5.i7.2018.259

Farsana F J and Gopakumar K, “A Novel Approach for Speech Encryption: Zaslavsky Map as Pseudo Random Number Generator”, Procedia Computer Science, 6th International Conference on Advances In Computing & Communications, ICACC, vol. 93, pp. 816 – 823, 2016. https://doi.org/10.1016/j.procs.2016.07.302

O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. Al-Din Abed, and A. T. Hammid, “Implementation of El-Gamal algorithm for speech signals encryption and decryption” Procedia Computer Science, International Conference on Computational Intelligence and Data Science (ICCIDS), vol. 167, pp. 1028–1037, 2020. https://doi.org/10.1016/j.procs.2020.03.402

S. F. Yousif, “Secure voice cryptography based on Diffie-Hellman algorithm”, 2nd International Scientific Conference of Engineering Sciences (ISCES), IOP Conf. Series: Materials Science and Engineering, vol. 1076, pp. 012057, 2021. https://doi.org/10.1088/1757-899x/1076/1/012057

S. J. Sheela, K. V. Suresh, and D. Tandur, “A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding”, Journal of Computer Networks and Communications, vol. 2017, pp. 1-12, 2017. https://doi.org/10.1155/2017/2721910

P. Sathiyamurthi and S. Ramakrishnan, “Speech encryption using chaotic shift keying for secured speech communication”, EURASIP Journal on Audio, Speech, and Music Processing, vol. 2017, No. 1, pp. 1-11, 2017. http://dx.doi.org/10.1186/s13636-017-0118-0

S. F. Yousif, “Speech Encryption Based on Zaslavsky Map”, Journal of Engineering and Applied Sciences, vol. 14, no. 17, pp. 6392-6399, 2019. http://dx.doi.org/10.36478/jeasci.2019.6392.6399

S. F. Yousif, “A new speech cryptosystem using DNA encoding, genetic and RSA algorithms”, International Journal of Engineering & Technology, vol. 7, no. 4, pp. 4550-4557, 2018. https://doi.org/10.14419/ijet.v7i4.21271

S. F. Yousif, A. J. Abboud, and R. S. Alhumaima, “A new image encryption based on bit replacing, chaos and DNA coding techniques”, Multimedia Tools and Applications, vol. 81, pp. 27453–27493, 2022. https://doi.org/10.1007/s11042-022-12762-x

E. Mosa, N. W. Messiha, O. Zahran, and F. E. Abd El-Samie, “Chaotic encryption of speech signals”, International Journal of Speech Technology, vol. 14, no. 4, pp. 285-296, 2011. https://doi.org/10.1007/s10772-011-9103-7

S. M. H. Alwahbani and E. B. M. Bashier, “Speech Scrambling Based on Chaotic Maps and One Time Pad”, INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), pp. 128-133, 2013. https://doi.org/10.1109/ICCEEE.2013.6633919

S. N. Al Saad and E. Hato, “A Speech Encryption based on Chaotic Maps”, International Journal of Computer Applications, vol. 93, no. 4, pp. 19-28, 2014. https://doi.org/10.5120/16203-5488

E. M. Elshamy, E. M. El-Rabaie, O. S. Faragallah, O. A. Elshakankiry, F. E. Abd El-Samie, H. S. El-sayed, and S. F. El-Zoghdy, “Efficient audio cryptosystem based on chaotic maps and double random phase encoding”, International Journal of Speech Technology, vol. 18, no. 4, pp. 619-631, 2015. https://doi.org/10.1007/s10772-015-9279-3

M. F. A. Elzaher, M. Shalaby, and S. H. El Ramly, “Securing Modern Voice Communication Systems using Multilevel Chaotic Approach”, International Journal of Computer Applications, vol. 135, no.9, pp. 17-21, 2016. https://doi.org/10.5120/ijca2016908497

Y. Alemami, M. A. Mohamed, S. Atiewi, and M. Mamat, “Speech encryption by multiple chaotic maps with fast fourier transform”, International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 6, pp. 5658-5664, 2020. https://doi.org/10. 11591/ijece.v10i6.pp5658-5664

S. M. Abdullah and I. Q. Abduljaleel, “Speech Encryption Technique using S - box based on Multi Chaotic Maps”, TEM Journal, vol. 10, no. 3, pp. 1429‐1434, 2021. https://doi.org/10.18421/TEM103-54

N. F. Hassan, A. Al-Adhami, and M. S. Mahdi, “Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps”, Iraqi Journal of Science, vol. 63, no. 2, pp. 830-842, 2022. https://doi.org/10. 24996/ijs.2022.63.2.36

S. Mokhnache and M. E. Daachi, T. Bekkouche, and N. Diffellah “A Combined Chaotic System for Speech Encryption”, Engineering, Technology & Applied Science Research, vol. 12, no. 3, pp. 8578-8583, 2022. https://doi.org/10.48084/etasr.4912

O. M. Al-Hazaimeh, A. A. Abu-Ein, K. M. Nahar, and I. S. Al-Qasrawi, “Chaotic elliptic map for speech encryption”, Indonesian Journal of Electrical Engineering and Computer Science, vol. 25, no. 2, pp. 1103-1114, 2022. https://doi.org/10.11591/ijeecs.v25.i2.pp1103-1114

H. A. Abdallah and S. Meshoul, “A Multilayered Audio Signal Encryption Approach for Secure Voice Communication”, Electronics, vol. 12, no. pp. 2, 2023. https://doi.org/10.3390/electronics12010002

C. M. Nițu, M. Răducanu, and D.-G. Cheroiu, “Fast speech encryption algorithm based on Arnold 3D chaotic system”, Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies XI, vol. 12493, pp. 592-599, 2023. https://doi.org/10.1117/12.2643008

F.J. Farsana, V.R. Dev, and K. Gopakumar, “An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams”, Applied Computing and Informatics, vol. 19, no. 3/4, 2023, https://doi.org/10.1016/j.aci.2019.10.001

S. F. Yousif, “Grayscale Image Confusion and Diffusion Based on Multiple Chaotic Maps”, 1st International Scientific Conference of Engineering Sciences - 3rd Scientific Conference of Engineering Science (ISCES), pp. 114-119, 2018. https://doi.org/10.1109/NCCCS.2012.6412989

M.Y. M. Parvees and J. A. Samath, “A Colour Byte Scrambling Technique for Efficient Image Encryption Based on Combined Chaotic Map”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 1067-1072, 2016. https://doi.org/10.1109/ICEEOT.2016.7754851

S. Yuan, T. Jiang, and Z. Jing, “Bifurcation and chaos in the Tinkerbell map”, International Journal of Bifurcation and Chaos, vol. 21, no. 11, , pp. 3137–3156, 2011. https://doi.org/10.1142/S0218127411030581

T. Gopalakrishnan and S. Ramakrishnan, “Chaotic Image Encryption with Hash Keying as Key Generator”, IETE Journal of Research, vol. 63, no. 2, pp. 172–187, 2017. http://dx.doi.org/10.1080/03772063.2016.1251855

H. N. Abdullah, S. F. Yousif, and A. A. Valenzuela, “Wavelet Based Image Steganographic System Using Chaotic Signals”, 6th International Conference on Information Communication and Management, pp. 130-135, 2016. http://dx.doi.org/10.1109/INFOCOMAN.2016.7784229

H. N. Abdullah, S. F. Yousif, and A. A. Valenzuela, “Efficient Steganography Scheme for Color Images based on Wavelets and Chaotic Maps”, Iraqi Journal of Information and Communications Technology(IJICT), vol. 2, no. 4, pp. 1-10, 2019. https://doi.org/10.31987/ijict.2.4.86

H. N. Abdullah, S. F. Yousif, and A. A. Valenzuela, “Spatial and Transform Domain based Steganography Using Chaotic Maps for Color Images”, Journal of Fundamental and Applied Sciences, vol. 10, no. 4S, 2018, pp. 551-556, 2018. http://dx.doi.org/10.4314/jfas.v10i4s.212

SURA F. YOUSIF, ALI J. ABBOUD, and HUSSEIN Y. RADHI, “Robust Image Encryption With Scanning Technology, the El-Gamal Algorithm and Chaos Theory”, IEEE Access, vol. 8, pp. 155184-155209, 2020. http://dx.doi.org/10.1109/ACCESS.2020.3019216

S. A. Gebereselassie and B. K. Roy, “A new Secure Speech Communication Scheme Based on Hyperchaotic Masking and Modulation”, IFAC-PapersOnLine, vol. 55, no. 1, pp. 914-919, 2022, https://doi.org/10.1016/j.ifacol.2022.04.150

F. J. Farsana and K. Gopakumar, “Speech Encryption Algorithm Based on Nonorthogonal Quantum State with Hyperchaotic Keystreams”, Advances in Mathematical Physics, vol. 2020, pp. 1-12, 2020. https://doi.org/10.1155/2020/8050934

Additional Files

Published

2025-03-26

Issue

Section

Cryptography and Cybersecurity