Hybrid Audio Encryption Method Based on DCT and Walsh-Hadamard Transform Using Henon Chaotic Maps and Logistic Maps

Authors

  • Sergo Episkoposyan National Polytechnic University of Armenia
  • Davit Hovhannisyan National Polytechnic University of Armenia

Abstract

A new hybrid audio signal encryption algorithm is proposed, combining transform-domain processing using the discrete cosine transform (DCT) and the Walsh–Hadamard transform (WHT) with the application of Henon chaotic maps and the logistic map. The novelty of the method lies in the integration of DCT–WHT transforms to enhance decorrelation and energy compaction, as well as in an adaptive key self-generation mechanism based on the statistical characteristics of each audio frame, which eliminates the need for transmitting and storing external secret data. The algorithm reduces the correlation between the original and encrypted signals to approximately 0.0006 (compared to approximately 0.00045 for the Hénon+LWT method), increases entropy to 5.18 bits (an improvement of approximately 8.3%), provides NPCR approximately 97.63% (versus 98.47%) and UACI approximately 6.67% (versus 15.57%), with RMSE of reconstruction 0.0205 (versus 0.0354). Experiments were conducted on the VCTK corpus (16 kHz, 16-bit, 1000 audio segments). In addition to describing the proposed method, the paper also contains a detailed comparative analysis of its performance relative to other approaches, including DCT+Hénon, WHT+Hénon, and Hénon+LWT algorithms. Such a comparison allows an objective assessment of the advantages and limitations of each method in the context of cryptographic security, reconstruction quality, and computational load.

Author Biography

Davit Hovhannisyan, National Polytechnic University of Armenia

D. Hovhannisyan received the B.Sc. degree in Applied Mathematics and Physics from the National Polytechnic University of Armenia, Yerevan, Armenia, and is currently pursuing the M.Sc. degree in the same faculty (e-mail: david.hovhannisyan445@gmail.com)

Additional Files

Published

2026-05-16

Issue

Section

Cryptography and Cybersecurity