Audio Encryption Framework Using the Laplace Transformation

  • Mardan A. Pirdawood Department of Mathematics, Faculty of Science and Health, Koya University, Kurdistan Region – F.R. Iraq https://orcid.org/0000-0002-3234-1825
  • Shadman R. Kareem (1) Department of Mathematics, Faculty of Science and Health, Koya University, Kurdistan Region – F.R. Iraq; (2) Department of Computer Science, College of Information Technology and Computer Sciences, Catholic University in Erbil, Kurdistan Region – F.R. Iraq https://orcid.org/0000-0002-7982-156X
  • Dashne Ch. Zahir Department of Mathematics, Faculty of Science and Health, Koya University, Kurdistan Region – F.R. Iraq https://orcid.org/0000-0003-0886-7154
Keywords: Cryptography, Laplace transformations, Maclaurin series, Sound encryptions

Abstract

Digital information, especially multimedia and its applications, has grown exponentially in recent years. It is important to strengthen sophisticated encryption algorithms due to the security needs of these innovative systems. The security of real-time audio applications is ensured in the present study through a framework for encryption. The design framework protects the confidentiality and integrity of voice communications by encrypting audio applications. A modern method of securing communication and protecting data is cryptography. Using cryptography is one of the most important techniques for protecting data and ensuring the security of messaging. The main purpose of this paper is to present a novel encryption scheme that can be used in real-time audio applications. We encrypt the sound using a combination of an infinite series of hyperbolic functions and the Laplace transform, and then decrypt it using the inverse Laplace transform. The modular arithmetic rules are used to generate the key for the coefficients acquired from the transformation. There is no loss of data or noise in the decryption sound. We also put several sound examples to the test

Downloads

Download data is not yet available.

Author Biographies

Mardan A. Pirdawood, Department of Mathematics, Faculty of Science and Health, Koya University, Kurdistan Region – F.R. Iraq

Mardan A. Pirdawood is a Lecturer at the Department of Mathematics, Faculty of Science, Koya University. He got the B.Sc. degree in Mathematics and the M.Sc. degree in Nonstandard Mathematical Analysis. His research interests are in Nonstandard Analysis, Cryptography and Numerical Analysis.

Shadman R. Kareem, (1) Department of Mathematics, Faculty of Science and Health, Koya University, Kurdistan Region – F.R. Iraq; (2) Department of Computer Science, College of Information Technology and Computer Sciences, Catholic University in Erbil, Kurdistan Region – F.R. Iraq

Shadman R. Kareem is a Lecturer at the Department of Mathematics, Faculty of Science, Koya University. He got the B.Sc. degree in Mathematics, the M.Sc. degree in Fuzzy Topology and the Ph.D. degree in Algebraic Topology-Topological Data Analysis. His research interests are in Algebraic Topology, Topological Data Analysis and Cryptography.

Dashne Ch. Zahir, Department of Mathematics, Faculty of Science and Health, Koya University, Kurdistan Region – F.R. Iraq

Dashne Ch. Zahir is an Assistant lecturer at the Department of Mathematics, Faculty of Science and Health, Koya University. She got the B.Sc. Degree in Mathematics and  the M.Sc. degree in Numerical Analysis. Her research interests are in Numerical Analysis and Cryptography.

References

Adriansyah, Y., 2010. Simple Audio Cryptography. Institute Teknologi Bandung Indonesia, Indonesia.

Al-Kateeb, Z.N., and Mohammed, S.J., 2020. A novel approach for audio file encryption using hand geometry. Multimedia Tools and Applications, 79(27-28), pp.19615-19628. DOI: https://doi.org/10.1007/s11042-020-08869-8

Al-Khazraji, L.R., Abbas, A.R., and Jamil, A.S., 2022. Employing neural style transfer for generating deep dream images. Aro-The Scientific Journal of Koya University, 10(2), pp.134-141. DOI: https://doi.org/10.14500/aro.11051

Delfs, H., Knebl, H., and Knebl, H., 2002. Introduction to Cryptography. Vol. 2. Springer, Heidelberg. DOI: https://doi.org/10.1007/978-3-642-87126-9

Dutta, H., Das, R.K., Nandi, S., and Prasanna, S.M., 2020. An overview of digital audio steganography. IETE Technical Review, 37(6), pp.632-650. DOI: https://doi.org/10.1080/02564602.2019.1699454

El-Zoghdy, S.F., El-sayed, H.S., and Faragallah, O.S., 2020. Transmission of chaotic-based encrypted audio through OFDM. Wireless Personal Communications, 113, pp.241-261. DOI: https://doi.org/10.1007/s11277-020-07187-4

Gencoglu, M., 2019. Embedded image coding using Laplace transform for Turkish letters. Multimedia Tools and Applications,78(13), pp.17521-17534. DOI: https://doi.org/10.1007/s11042-018-7096-9

Ghadi, M., Laouamer, L., and Moulahi, T., 2016. Securing data exchange in wireless multimedia sensor networks: Perspectives and challenges. Multimedia Tools and Applications, 75, p.3425-3451. DOI: https://doi.org/10.1007/s11042-014-2443-y

Ghasemzadeh, A., and Esmaeili, E., 2017. A novel method in audio message encryption based on a mixture of chaos function. International Journal of Speech Technology, 20, pp.829-837. DOI: https://doi.org/10.1007/s10772-017-9452-y

Hayat, U., and Azam, N.A., 2019. A novel image encryption scheme based on an elliptic curve. Signal Processing, 155, pp.391-402. DOI: https://doi.org/10.1016/j.sigpro.2018.10.011

Hayat, U., Azam, N.A., and Asif, M., 2018. A method of generating 8×8 substitution boxes based on elliptic curves. Wireless Personal Communications, 101, p.439-451. DOI: https://doi.org/10.1007/s11277-018-5698-1

Hiwarekar, A., 2013. A new method of cryptography using Laplace transform of hyperbolic functions. International Journal of Mathematical Archive,4(2), pp.208-213.

Kaur, A., and Dutta, M.K., 2018. An optimized high payload audio watermarking algorithm based on LU-factorization. Multimedia Systems, 24, pp.341-353. DOI: https://doi.org/10.1007/s00530-017-0545-x

Khalid, I., Shah, T., Almarhabi, K.A., Shah, D., Asif, M., and Ashraf, M.U., 2022. The SPN network for digital audio data based on elliptic curve over a finite field. IEEE Access, 10, pp.127939-127955. DOI: https://doi.org/10.1109/ACCESS.2022.3226322

Khalil, M., 2016. Real-time encryption/decryption of audio signal. International Journal of Computer Network and Information Security, 8(2), pp.25-31. DOI: https://doi.org/10.5815/ijcnis.2016.02.03

Kordov, K., 2019. A novel audio encryption algorithm with permutation-substitution architecture. Electronics, 8(5), p.530. DOI: https://doi.org/10.3390/electronics8050530

Lakshmi, G.N., Kumar, B.R., and Sekhar, A.C., 2011. A cryptographic scheme of laplace transforms. International Journal of Mathematical Archive, 2(12), pp.2515-2519.

Lakshmi, G.N., Kumar, B.R., Suneetha, C., and Chandra, A., 2011. A cryptographic scheme of finite fields using logical operators. International Journal of Computer Applications, 975, p.8887.

Lima, J.B., and da Silva Neto, E.F., 2016. Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75, pp.8403-8418. DOI: https://doi.org/10.1007/s11042-015-2755-6

Liu, Z., Huang, J., Sun, X., and Qi, C., 2017. A security watermark scheme used for digital speech forensics. Multimedia Tools and Applications, 76, pp.9297-9317. DOI: https://doi.org/10.1007/s11042-016-3533-9

Mel, H., and Baker, D., 2001. Cryptography Decrypted. Addison-Wesley, Reading, MA. Miller, V., 1985, Use of Elliptic Curves in Cryptography.In: Conference on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp.417-426.

Nichols, R., 1996. Classical Cryptography Course. Vol. 2. Aegean Park Press, California.Ramana, B., 2017. Higher Engineering Mathematics. Tata McGraw-Hill Education, United States.

Shah, D., Shah, T., and Jamal, S.S., 2020. Digital audio signals encryption by Mobius transformation and Henon map. Multimedia Systems, 26, pp.235-245. DOI: https://doi.org/10.1007/s00530-019-00640-w

Shannon, C., 1998. Communication theory of secrecy systems. 1945. MD Computing: Computers in Medical Practice,15(1), pp.57-64.

Singh, R., Chauhan, R., Gunjan, V.K., and Singh, P., 2014. Implementation of elliptic curve cryptography for audio-based application. International Journal of Engineering Research and Technology (IJERT),3(1), pp.2210-2214.

Published
2023-08-25
How to Cite
Pirdawood, M. A., Kareem, S. R. and Zahir, D. C. (2023) “Audio Encryption Framework Using the Laplace Transformation”, ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 11(2), pp. 31-37. doi: 10.14500/aro.11165.