Audio Encryption Framework Using the Laplace Transformation
AbstractDigital information, especially multimedia and its applications, has grown exponentially in recent years. It is important to strengthen sophisticated encryption algorithms due to the security needs of these innovative systems. The security of real-time audio applications is ensured in the present study through a framework for encryption. The design framework protects the confidentiality and integrity of voice communications by encrypting audio applications. A modern method of securing communication and protecting data is cryptography. Using cryptography is one of the most important techniques for protecting data and ensuring the security of messaging. The main purpose of this paper is to present a novel encryption scheme that can be used in real-time audio applications. We encrypt the sound using a combination of an infinite series of hyperbolic functions and the Laplace transform, and then decrypt it using the inverse Laplace transform. The modular arithmetic rules are used to generate the key for the coefficients acquired from the transformation. There is no loss of data or noise in the decryption sound. We also put several sound examples to the test
Adriansyah, Y., 2010. Simple Audio Cryptography. Institute Teknologi Bandung Indonesia, Indonesia.
Al-Kateeb, Z.N., and Mohammed, S.J., 2020. A novel approach for audio file encryption using hand geometry. Multimedia Tools and Applications, 79(27-28), pp.19615-19628. DOI: https://doi.org/10.1007/s11042-020-08869-8
Al-Khazraji, L.R., Abbas, A.R., and Jamil, A.S., 2022. Employing neural style transfer for generating deep dream images. Aro-The Scientific Journal of Koya University, 10(2), pp.134-141. DOI: https://doi.org/10.14500/aro.11051
Delfs, H., Knebl, H., and Knebl, H., 2002. Introduction to Cryptography. Vol. 2. Springer, Heidelberg. DOI: https://doi.org/10.1007/978-3-642-87126-9
Dutta, H., Das, R.K., Nandi, S., and Prasanna, S.M., 2020. An overview of digital audio steganography. IETE Technical Review, 37(6), pp.632-650. DOI: https://doi.org/10.1080/02564602.2019.1699454
El-Zoghdy, S.F., El-sayed, H.S., and Faragallah, O.S., 2020. Transmission of chaotic-based encrypted audio through OFDM. Wireless Personal Communications, 113, pp.241-261. DOI: https://doi.org/10.1007/s11277-020-07187-4
Gencoglu, M., 2019. Embedded image coding using Laplace transform for Turkish letters. Multimedia Tools and Applications,78(13), pp.17521-17534. DOI: https://doi.org/10.1007/s11042-018-7096-9
Ghadi, M., Laouamer, L., and Moulahi, T., 2016. Securing data exchange in wireless multimedia sensor networks: Perspectives and challenges. Multimedia Tools and Applications, 75, p.3425-3451. DOI: https://doi.org/10.1007/s11042-014-2443-y
Ghasemzadeh, A., and Esmaeili, E., 2017. A novel method in audio message encryption based on a mixture of chaos function. International Journal of Speech Technology, 20, pp.829-837. DOI: https://doi.org/10.1007/s10772-017-9452-y
Hayat, U., and Azam, N.A., 2019. A novel image encryption scheme based on an elliptic curve. Signal Processing, 155, pp.391-402. DOI: https://doi.org/10.1016/j.sigpro.2018.10.011
Hayat, U., Azam, N.A., and Asif, M., 2018. A method of generating 8×8 substitution boxes based on elliptic curves. Wireless Personal Communications, 101, p.439-451. DOI: https://doi.org/10.1007/s11277-018-5698-1
Hiwarekar, A., 2013. A new method of cryptography using Laplace transform of hyperbolic functions. International Journal of Mathematical Archive,4(2), pp.208-213.
Kaur, A., and Dutta, M.K., 2018. An optimized high payload audio watermarking algorithm based on LU-factorization. Multimedia Systems, 24, pp.341-353. DOI: https://doi.org/10.1007/s00530-017-0545-x
Khalid, I., Shah, T., Almarhabi, K.A., Shah, D., Asif, M., and Ashraf, M.U., 2022. The SPN network for digital audio data based on elliptic curve over a finite field. IEEE Access, 10, pp.127939-127955. DOI: https://doi.org/10.1109/ACCESS.2022.3226322
Khalil, M., 2016. Real-time encryption/decryption of audio signal. International Journal of Computer Network and Information Security, 8(2), pp.25-31. DOI: https://doi.org/10.5815/ijcnis.2016.02.03
Kordov, K., 2019. A novel audio encryption algorithm with permutation-substitution architecture. Electronics, 8(5), p.530. DOI: https://doi.org/10.3390/electronics8050530
Lakshmi, G.N., Kumar, B.R., and Sekhar, A.C., 2011. A cryptographic scheme of laplace transforms. International Journal of Mathematical Archive, 2(12), pp.2515-2519.
Lakshmi, G.N., Kumar, B.R., Suneetha, C., and Chandra, A., 2011. A cryptographic scheme of finite fields using logical operators. International Journal of Computer Applications, 975, p.8887.
Lima, J.B., and da Silva Neto, E.F., 2016. Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75, pp.8403-8418. DOI: https://doi.org/10.1007/s11042-015-2755-6
Liu, Z., Huang, J., Sun, X., and Qi, C., 2017. A security watermark scheme used for digital speech forensics. Multimedia Tools and Applications, 76, pp.9297-9317. DOI: https://doi.org/10.1007/s11042-016-3533-9
Mel, H., and Baker, D., 2001. Cryptography Decrypted. Addison-Wesley, Reading, MA. Miller, V., 1985, Use of Elliptic Curves in Cryptography.In: Conference on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp.417-426.
Nichols, R., 1996. Classical Cryptography Course. Vol. 2. Aegean Park Press, California.Ramana, B., 2017. Higher Engineering Mathematics. Tata McGraw-Hill Education, United States.
Shah, D., Shah, T., and Jamal, S.S., 2020. Digital audio signals encryption by Mobius transformation and Henon map. Multimedia Systems, 26, pp.235-245. DOI: https://doi.org/10.1007/s00530-019-00640-w
Shannon, C., 1998. Communication theory of secrecy systems. 1945. MD Computing: Computers in Medical Practice,15(1), pp.57-64.
Singh, R., Chauhan, R., Gunjan, V.K., and Singh, P., 2014. Implementation of elliptic curve cryptography for audio-based application. International Journal of Engineering Research and Technology (IJERT),3(1), pp.2210-2214.
Copyright (c) 2023 Mardan A. Pirdawood, Shadman R. Kareem, Dashne Ch. Zahir
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors who choose to publish their work with Aro agree to the following terms:
Authors retain the copyright to their work and grant the journal the right of first publication. The work is simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-SA 4.0]. This license allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors have the freedom to enter into separate agreements for the non-exclusive distribution of the journal's published version of the work. This includes options such as posting it to an institutional repository or publishing it in a book, as long as proper acknowledgement is given to its initial publication in this journal.
Authors are encouraged to share and post their work online, including in institutional repositories or on their personal websites, both prior to and during the submission process. This practice can lead to productive exchanges and increase the visibility and citation of the published work.
By agreeing to these terms, authors acknowledge the importance of open access and the benefits it brings to the scholarly community.