CFP last date
15 May 2024
Reseach Article

Cellular Automata and Chaotic Maps for Speech Signal Encryption

by Eman Hato
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Number 3
Year of Publication: 2015
Authors: Eman Hato
10.5120/ijais15-451377

Eman Hato . Cellular Automata and Chaotic Maps for Speech Signal Encryption. International Journal of Applied Information Systems. 9, 3 ( June 2015), 9-16. DOI=10.5120/ijais15-451377

@article{ 10.5120/ijais15-451377,
author = { Eman Hato },
title = { Cellular Automata and Chaotic Maps for Speech Signal Encryption },
journal = { International Journal of Applied Information Systems },
issue_date = { June 2015 },
volume = { 9 },
number = { 3 },
month = { June },
year = { 2015 },
issn = { 2249-0868 },
pages = { 9-16 },
numpages = {9},
url = { https://www.ijais.org/archives/volume9/number3/760-1377/ },
doi = { 10.5120/ijais15-451377 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T18:59:52.076961+05:30
%A Eman Hato
%T Cellular Automata and Chaotic Maps for Speech Signal Encryption
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 9
%N 3
%P 9-16
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Speech is widely used in our daily life with cell phones and over the Internet, especially for long distance calls. Higher security for transmitting these data is required. Therefore an encryption scheme for the speech signal encryption based on combination of permutation and substitution are proposed in this paper. The permutation process is performed based on permutation key that generated from Game of Life matrix which is a simple cellular automaton, remarkable for its complex behavior. . The substitution performed with mask key that generated from one dimensional cubic and sine chaotic maps. The initial conditions and control parameters for chaotic maps are used as password for the sender and receiver. In order to check the performance of the proposed encryption algorithm , experimental implementation has been done. The results indicate that the encryption system provides encryption speech signal of low residual intelligibility while preserves the good quality of the recovered speech signal. The system has a large key sensitivity because a small change in the secret key causes a large change in the encrypted signal.

References
  1. Srinivasan A. and Arul Selvan P. , "A Review of Analog Audio Scrambling Methods for Residual Intelligibility", Innovative Systems Design and Engineering, Vol. 3, No. 7, PP. 22-39, 2012.
  2. Musheer Ahmad, Bashir Alam and Omar Farooq, "Chaos Based Mixed Keystream Generation for Voice Data Encryption", International Journal on Cryptography and Information Security (IJCIS), Vol. 2, No. 1, PP. 39-48, 2012.
  3. Musheer Ahmad, Bashir Alam and Omar Farooq, "Chaos Based Mixed Keystream Generation for Voice Data Encryption", International Journal on Cryptography and Information Security (IJCIS), Vol. 2, No. 1, PP. 39-48, 2012.
  4. Fasel Qadir , M. A. Peer, K. A. Khan, "Digital Image Scrambling Based on Two Dimensional Cellular Automata", I. J. Computer Network and information Security, Vol. 2, PP. 36-41, 2013.
  5. Alia Madain, Abdel Latif Abu Dalhoum, Hazem Hiary•Alfonso Ortega, Manuel AlfonsecaAlia Madain " Audio Scrambling Technique Based on Cellular Automata", Multimedia Tools and Applications, Vol. 71, Issue 3, PP. 1803-1822 , 2014.
  6. Ljupco Kocarev and Shiguo Lian (Eds. ), "Chaos-Based Cryptography Theory, Algorithms and Applications, Studies in Computational Intelligence", Springer Vol. 354, 2011.
  7. Swati Rastogi and Sanjeev Thakur," Security Analysis of Multimedia Data Encryption Technique Using Piecewise Linear Chaotic Maps", International Journal on Recent and Innovation Trends in Computing and Communication Vol. 1, Issue 5, PP. 458 - 461, 2013.
  8. Hui Lu, Xiaoteng Wang, Zongming Fei, and Meikang Qiu, "The Effects of Using Chaotic Map on Improving the Performance of Multiobjective Evolutionary Algorithms" , Hindawi Publishing Corporation Mathematical Problems in Engineering , Article ID 924652,16 pages, 2014.
  9. N. K. Pareek , Vinod Patidar , K. K. Sud, "Cryptography using Multiple One-Dimensional Chaotic Maps", Communications in Nonlinear Science and Numerical Simulation, Vol. 10, PP. 715–723, 2005.
  10. Mosa E. , Messiha N. W. , Zahran O. and Abd El-Samie F. E. , " Chaotic Encryption of Speech Signals", Int. J Speech Technol. , Vol. 14, PP. 285-296, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Speech encryption Cellular automata Game of life Chaotic maps Residual intelligibility.