Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

May Edition 2020

International Journal of Applied Information Systems solicits high quality original research papers for the May 2020 Edition of the journal. The last date of research paper submission is April 15, 2020.

Cellular Automata and Chaotic Maps for Speech Signal Encryption

Eman Hato Published in Signal Processing

International Journal of Applied Information Systems
Year of Publication: 2015
© 2015 by IJAIS Journal
Authors Eman Hato
10.5120/ijais15-451377
Download full text
  1. Eman Hato. Article: Cellular Automata and Chaotic Maps for Speech Signal Encryption. International Journal of Applied Information Systems 9(3):9-16, June 2015. BibTeX

    @article{key:article,
    	author = "Eman Hato",
    	title = "Article: Cellular Automata and Chaotic Maps for Speech Signal Encryption",
    	journal = "International Journal of Applied Information Systems",
    	year = 2015,
    	volume = 9,
    	number = 3,
    	pages = "9-16",
    	month = "June",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

Speech is widely used in our daily life with cell phones and over the Internet, especially for long distance calls. Higher security for transmitting these data is required. Therefore an encryption scheme for the speech signal encryption based on combination of permutation and substitution are proposed in this paper. The permutation process is performed based on permutation key that generated from Game of Life matrix which is a simple cellular automaton, remarkable for its complex behavior. . The substitution performed with mask key that generated from one dimensional cubic and sine chaotic maps. The initial conditions and control parameters for chaotic maps are used as password for the sender and receiver. In order to check the performance of the proposed encryption algorithm , experimental implementation has been done. The results indicate that the encryption system provides encryption speech signal of low residual intelligibility while preserves the good quality of the recovered speech signal. The system has a large key sensitivity because a small change in the secret key causes a large change in the encrypted signal.

Reference

  1. Srinivasan A. and Arul Selvan P. , "A Review of Analog Audio Scrambling Methods for Residual Intelligibility", Innovative Systems Design and Engineering, Vol. 3, No. 7, PP. 22-39, 2012.
  2. Musheer Ahmad, Bashir Alam and Omar Farooq, "Chaos Based Mixed Keystream Generation for Voice Data Encryption", International Journal on Cryptography and Information Security (IJCIS), Vol. 2, No. 1, PP. 39-48, 2012.
  3. Musheer Ahmad, Bashir Alam and Omar Farooq, "Chaos Based Mixed Keystream Generation for Voice Data Encryption", International Journal on Cryptography and Information Security (IJCIS), Vol. 2, No. 1, PP. 39-48, 2012.
  4. Fasel Qadir , M. A. Peer, K. A. Khan, "Digital Image Scrambling Based on Two Dimensional Cellular Automata", I. J. Computer Network and information Security, Vol. 2, PP. 36-41, 2013.
  5. Alia Madain, Abdel Latif Abu Dalhoum, Hazem Hiary•Alfonso Ortega, Manuel AlfonsecaAlia Madain " Audio Scrambling Technique Based on Cellular Automata", Multimedia Tools and Applications, Vol. 71, Issue 3, PP. 1803-1822 , 2014.
  6. Ljupco Kocarev and Shiguo Lian (Eds. ), "Chaos-Based Cryptography Theory, Algorithms and Applications, Studies in Computational Intelligence", Springer Vol. 354, 2011.
  7. Swati Rastogi and Sanjeev Thakur," Security Analysis of Multimedia Data Encryption Technique Using Piecewise Linear Chaotic Maps", International Journal on Recent and Innovation Trends in Computing and Communication Vol. 1, Issue 5, PP. 458 - 461, 2013.
  8. Hui Lu, Xiaoteng Wang, Zongming Fei, and Meikang Qiu, "The Effects of Using Chaotic Map on Improving the Performance of Multiobjective Evolutionary Algorithms" , Hindawi Publishing Corporation Mathematical Problems in Engineering , Article ID 924652,16 pages, 2014.
  9. N. K. Pareek , Vinod Patidar , K. K. Sud, "Cryptography using Multiple One-Dimensional Chaotic Maps", Communications in Nonlinear Science and Numerical Simulation, Vol. 10, PP. 715–723, 2005.
  10. Mosa E. , Messiha N. W. , Zahran O. and Abd El-Samie F. E. , " Chaotic Encryption of Speech Signals", Int. J Speech Technol. , Vol. 14, PP. 285-296, 2011.

Keywords

Speech encryption, Cellular automata, Game of life, Chaotic maps, Residual intelligibility.