Speech Signal Security Scheme Based on Multiple Chaotic Maps with Deoxyribonucleic Acid Coding Algorithm
Abstract
This article presents a novel speech cryptosystem by using chaotic maps and Deoxyribonucleic Acid coding. Initially, the speech signal is divided into four equal blocks. Then the speech samples in each block are submitted to confusion/diffusion via four different chaotic maps. The gained ciphered speech samples and the obtained chaotic sequence from Sine map are encoded via DNA rules. The consequent coded sequences from the previous step are merged via DNA/XNOR to get the coded DNA signal. Ultimately, the resulted signal is decoded to acquire the definitive ciphered signal. The experiments prove the efficiency and robustness of the suggested method.References
S. F. Yousif, “Encryption and Decryption of Audio Signal Based on RSA Algorithm”, International Journal of Engineering Technologies and Management Research, vol.5, no.7, pp. 57-64, 2018. https://doi.org/10.29121/ijetmr.v5.i7.2018.259
Farsana F J and Gopakumar K, “A Novel Approach for Speech Encryption: Zaslavsky Map as Pseudo Random Number Generator”, Procedia Computer Science, 6th International Conference on Advances In Computing & Communications, ICACC, vol. 93, pp. 816 – 823, 2016. https://doi.org/10.1016/j.procs.2016.07.302
O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. Al-Din Abed, and A. T. Hammid, “Implementation of El-Gamal algorithm for speech signals encryption and decryption” Procedia Computer Science, International Conference on Computational Intelligence and Data Science (ICCIDS), vol. 167, pp. 1028–1037, 2020. https://doi.org/10.1016/j.procs.2020.03.402
S. F. Yousif, “Secure voice cryptography based on Diffie-Hellman algorithm”, 2nd International Scientific Conference of Engineering Sciences (ISCES), IOP Conf. Series: Materials Science and Engineering, vol. 1076, pp. 012057, 2021. https://doi.org/10.1088/1757-899x/1076/1/012057
S. J. Sheela, K. V. Suresh, and D. Tandur, “A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding”, Journal of Computer Networks and Communications, vol. 2017, pp. 1-12, 2017. https://doi.org/10.1155/2017/2721910
P. Sathiyamurthi and S. Ramakrishnan, “Speech encryption using chaotic shift keying for secured speech communication”, EURASIP Journal on Audio, Speech, and Music Processing, vol. 2017, No. 1, pp. 1-11, 2017. http://dx.doi.org/10.1186/s13636-017-0118-0
S. F. Yousif, “Speech Encryption Based on Zaslavsky Map”, Journal of Engineering and Applied Sciences, vol. 14, no. 17, pp. 6392-6399, 2019. http://dx.doi.org/10.36478/jeasci.2019.6392.6399
S. F. Yousif, “A new speech cryptosystem using DNA encoding, genetic and RSA algorithms”, International Journal of Engineering & Technology, vol. 7, no. 4, pp. 4550-4557, 2018. https://doi.org/10.14419/ijet.v7i4.21271
S. F. Yousif, A. J. Abboud, and R. S. Alhumaima, “A new image encryption based on bit replacing, chaos and DNA coding techniques”, Multimedia Tools and Applications, vol. 81, pp. 27453–27493, 2022. https://doi.org/10.1007/s11042-022-12762-x
E. Mosa, N. W. Messiha, O. Zahran, and F. E. Abd El-Samie, “Chaotic encryption of speech signals”, International Journal of Speech Technology, vol. 14, no. 4, pp. 285-296, 2011. https://doi.org/10.1007/s10772-011-9103-7
S. M. H. Alwahbani and E. B. M. Bashier, “Speech Scrambling Based on Chaotic Maps and One Time Pad”, INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), pp. 128-133, 2013. https://doi.org/10.1109/ICCEEE.2013.6633919
S. N. Al Saad and E. Hato, “A Speech Encryption based on Chaotic Maps”, International Journal of Computer Applications, vol. 93, no. 4, pp. 19-28, 2014. https://doi.org/10.5120/16203-5488
E. M. Elshamy, E. M. El-Rabaie, O. S. Faragallah, O. A. Elshakankiry, F. E. Abd El-Samie, H. S. El-sayed, and S. F. El-Zoghdy, “Efficient audio cryptosystem based on chaotic maps and double random phase encoding”, International Journal of Speech Technology, vol. 18, no. 4, pp. 619-631, 2015. https://doi.org/10.1007/s10772-015-9279-3
M. F. A. Elzaher, M. Shalaby, and S. H. El Ramly, “Securing Modern Voice Communication Systems using Multilevel Chaotic Approach”, International Journal of Computer Applications, vol. 135, no.9, pp. 17-21, 2016. https://doi.org/10.5120/ijca2016908497
Y. Alemami, M. A. Mohamed, S. Atiewi, and M. Mamat, “Speech encryption by multiple chaotic maps with fast fourier transform”, International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 6, pp. 5658-5664, 2020. https://doi.org/10. 11591/ijece.v10i6.pp5658-5664
S. M. Abdullah and I. Q. Abduljaleel, “Speech Encryption Technique using S - box based on Multi Chaotic Maps”, TEM Journal, vol. 10, no. 3, pp. 1429‐1434, 2021. https://doi.org/10.18421/TEM103-54
N. F. Hassan, A. Al-Adhami, and M. S. Mahdi, “Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps”, Iraqi Journal of Science, vol. 63, no. 2, pp. 830-842, 2022. https://doi.org/10. 24996/ijs.2022.63.2.36
S. Mokhnache and M. E. Daachi, T. Bekkouche, and N. Diffellah “A Combined Chaotic System for Speech Encryption”, Engineering, Technology & Applied Science Research, vol. 12, no. 3, pp. 8578-8583, 2022. https://doi.org/10.48084/etasr.4912
O. M. Al-Hazaimeh, A. A. Abu-Ein, K. M. Nahar, and I. S. Al-Qasrawi, “Chaotic elliptic map for speech encryption”, Indonesian Journal of Electrical Engineering and Computer Science, vol. 25, no. 2, pp. 1103-1114, 2022. https://doi.org/10.11591/ijeecs.v25.i2.pp1103-1114
H. A. Abdallah and S. Meshoul, “A Multilayered Audio Signal Encryption Approach for Secure Voice Communication”, Electronics, vol. 12, no. pp. 2, 2023. https://doi.org/10.3390/electronics12010002
C. M. Nițu, M. Răducanu, and D.-G. Cheroiu, “Fast speech encryption algorithm based on Arnold 3D chaotic system”, Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies XI, vol. 12493, pp. 592-599, 2023. https://doi.org/10.1117/12.2643008
F.J. Farsana, V.R. Dev, and K. Gopakumar, “An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams”, Applied Computing and Informatics, vol. 19, no. 3/4, 2023, https://doi.org/10.1016/j.aci.2019.10.001
S. F. Yousif, “Grayscale Image Confusion and Diffusion Based on Multiple Chaotic Maps”, 1st International Scientific Conference of Engineering Sciences - 3rd Scientific Conference of Engineering Science (ISCES), pp. 114-119, 2018. https://doi.org/10.1109/NCCCS.2012.6412989
M.Y. M. Parvees and J. A. Samath, “A Colour Byte Scrambling Technique for Efficient Image Encryption Based on Combined Chaotic Map”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 1067-1072, 2016. https://doi.org/10.1109/ICEEOT.2016.7754851
S. Yuan, T. Jiang, and Z. Jing, “Bifurcation and chaos in the Tinkerbell map”, International Journal of Bifurcation and Chaos, vol. 21, no. 11, , pp. 3137–3156, 2011. https://doi.org/10.1142/S0218127411030581
T. Gopalakrishnan and S. Ramakrishnan, “Chaotic Image Encryption with Hash Keying as Key Generator”, IETE Journal of Research, vol. 63, no. 2, pp. 172–187, 2017. http://dx.doi.org/10.1080/03772063.2016.1251855
H. N. Abdullah, S. F. Yousif, and A. A. Valenzuela, “Wavelet Based Image Steganographic System Using Chaotic Signals”, 6th International Conference on Information Communication and Management, pp. 130-135, 2016. http://dx.doi.org/10.1109/INFOCOMAN.2016.7784229
H. N. Abdullah, S. F. Yousif, and A. A. Valenzuela, “Efficient Steganography Scheme for Color Images based on Wavelets and Chaotic Maps”, Iraqi Journal of Information and Communications Technology(IJICT), vol. 2, no. 4, pp. 1-10, 2019. https://doi.org/10.31987/ijict.2.4.86
H. N. Abdullah, S. F. Yousif, and A. A. Valenzuela, “Spatial and Transform Domain based Steganography Using Chaotic Maps for Color Images”, Journal of Fundamental and Applied Sciences, vol. 10, no. 4S, 2018, pp. 551-556, 2018. http://dx.doi.org/10.4314/jfas.v10i4s.212
SURA F. YOUSIF, ALI J. ABBOUD, and HUSSEIN Y. RADHI, “Robust Image Encryption With Scanning Technology, the El-Gamal Algorithm and Chaos Theory”, IEEE Access, vol. 8, pp. 155184-155209, 2020. http://dx.doi.org/10.1109/ACCESS.2020.3019216
S. A. Gebereselassie and B. K. Roy, “A new Secure Speech Communication Scheme Based on Hyperchaotic Masking and Modulation”, IFAC-PapersOnLine, vol. 55, no. 1, pp. 914-919, 2022, https://doi.org/10.1016/j.ifacol.2022.04.150
F. J. Farsana and K. Gopakumar, “Speech Encryption Algorithm Based on Nonorthogonal Quantum State with Hyperchaotic Keystreams”, Advances in Mathematical Physics, vol. 2020, pp. 1-12, 2020. https://doi.org/10.1155/2020/8050934
Additional Files
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Electronics and Telecommunications

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on https://creativecommons.org/licenses/by/4.0/.
2. Author’s Warranties
The author warrants that the article is original, written by stated author/s, has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author/s. The undersigned also warrants that the manuscript (or its essential substance) has not been published other than as an abstract or doctorate thesis and has not been submitted for consideration elsewhere, for print, electronic or digital publication.
3. User Rights
Under the Creative Commons Attribution license, the author(s) and users are free to share (copy, distribute and transmit the contribution) under the following conditions: 1. they must attribute the contribution in the manner specified by the author or licensor, 2. they may alter, transform, or build upon this work, 3. they may use this contribution for commercial purposes.
4. Rights of Authors
Authors retain the following rights:
- copyright, and other proprietary rights relating to the article, such as patent rights,
- the right to use the substance of the article in own future works, including lectures and books,
- the right to reproduce the article for own purposes, provided the copies are not offered for sale,
- the right to self-archive the article
- the right to supervision over the integrity of the content of the work and its fair use.
5. Co-Authorship
If the article was prepared jointly with other authors, the signatory of this form warrants that he/she has been authorized by all co-authors to sign this agreement on their behalf, and agrees to inform his/her co-authors of the terms of this agreement.
6. Termination
This agreement can be terminated by the author or the Journal Owner upon two months’ notice where the other party has materially breached this agreement and failed to remedy such breach within a month of being given the terminating party’s notice requesting such breach to be remedied. No breach or violation of this agreement will cause this agreement or any license granted in it to terminate automatically or affect the definition of the Journal Owner. The author and the Journal Owner may agree to terminate this agreement at any time. This agreement or any license granted in it cannot be terminated otherwise than in accordance with this section 6. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.
7. Royalties
This agreement entitles the author to no royalties or other fees. To such extent as legally permissible, the author waives his or her right to collect royalties relative to the article in respect of any use of the article by the Journal Owner or its sublicensee.
8. Miscellaneous
The Journal Owner will publish the article (or have it published) in the Journal if the article’s editorial process is successfully completed and the Journal Owner or its sublicensee has become obligated to have the article published. Where such obligation depends on the payment of a fee, it shall not be deemed to exist until such time as that fee is paid. The Journal Owner may conform the article to a style of punctuation, spelling, capitalization and usage that it deems appropriate. The Journal Owner will be allowed to sublicense the rights that are licensed to it under this agreement. This agreement will be governed by the laws of Poland.
By signing this License, Author(s) warrant(s) that they have the full power to enter into this agreement. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.