A Novel Digital Audio Encryption Algorithm Using Three Hyperchaotic Rabinovich System Generators

Keywords: Audio encryption, Chaotic sequences, Hyperchaotic systems, Key space, Randomized encryption

Abstract

Improved speech encryption is needed for digital voice communications. Data security requires advanced encryption against cyberattacks. Traditional encryption may not be able to handle advanced threats or large datasets. This study uses chaotic system features to create a secure and adaptive digital audio encryption algorithm and enhances public audio encryption. Three hyperchaotic systems allow digital audio signal randomized encryption. The first system generates chaotic random integer numbers as keys, the second selects non-sequential indices to increase unpredictability, and the third randomly samples the digital audio signal and encrypts it through XOR operations with a selected key, making it harder for intruders to learn the encryption pattern. The proposed system uses Diffie-Hellman key exchange for key agreement. We have tested and proven the efficiency of the proposed algorithm. The encrypted audio signals, achieving a Peak Signal-to-Noise Ratio (PSNR) of around −20 dB, exhibit high distortion, spectral complexity, very low correlation (round to zero), high entropy, and minimal time delay compared to other articles, making them resistant to decryption attempts by attackers. The system has a large key space of 1345 bits, and its randomized nature and extensive key space protect sensitive audio data in public communication channels, even with minor changes to hyper-chaos generators. The proposed algorithm represents a significant advancement in the field of digital audio encryption. The researchers have utilized chaotic systems to create a strong and flexible encryption system. This algorithm is suitable for military and medical communications that require a high level of audio data security.

Downloads

Download data is not yet available.

Author Biography

Ameer K. Jawad, Department of Electrical Engineering, Faculty of Electrical and Computer Engineering, Razi University, Kermanshah, Iran

Postgraduate student

References

Abdelfatah, R.I., 2020. Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access, 8, pp.69894-69907.

Abdullah, H.N., Hreshee, S.H., and Jawad, A.K., 2015. Design of efficient noise reduction scheme for secure speech masked by chaotic signals. Journal of American Science, 11(7), pp.49-55.

Abdullah, H.N., Hreshee, S.H., and Jawad, A.K., 2016. Noise Reduction of Chaotic Masking System Using Repetition Method. Available from: https:// www.researchgate.net/publication/291356303 [Last accessed on 2024 Oct 10].

Abdullah, H.N., Hreshee, S.S., Karimi, G., and Jawad, A.K., 2022. Performance Improvement of Chaotic Masking System Using Power Control Method. In: International Middle Eastern Simulation and Modelling Conference 2022, MESM 2022, pp.19-23.

Abood, E.W., Hussien, Z.A., Kawi, H.A., Abduljabbar, Z.A., Nyangaresi, V.O., Ma, J., Al Sibahee, M.A., and Ali Kalafy, S.A., 2023. Provably secure and efficient audio compression based on compressive sensing. International Journal of Electrical and Computer Engineering, 13(1), pp.335-346.

Ahmad, J., and Ahmed, F., 2010. Efficiency analysis and security evaluation of image encryption schemes. Computing, 23(4), p.25.

Alsaabri, H.H., and Hreshee, S.S., 2021. Robust Image Encryption Based on Double Hyper Chaotic Rabinovich System. In: 7th International Conference on Contemporary Information Technology and Mathematics, ICCITM 2021, pp.146-152.

Ameen, M.J.M., and Hreshee, S.S., 2022. Securing physical layer of 5G wireless network system over GFDM using linear precoding algorithm for massive MIMO and hyperchaotic QR-decomposition. International Journal of Intelligent Engineering and Systems, 15(5), pp.579-591.

Ameen, M.J.M., and Hreshee, S.S., 2023. Security analysis of encrypted audio based on elliptic curve and hybrid chaotic maps within GFDM modulator in 5G networks. Bulletin of Electrical Engineering and Informatics, 12(6), pp.3467-3479.

Barua, N., and Kabir, A., 2022. Encryption and decryption of audio by changing properties and noise reduction. International Journal of Innovative Science and Research Technology 7(9), pp.805-809.

Belagali, P., and Udupi, V.R., 2023. Image steganography based on enhanced payload capacity using hybrid edge detection and least significant bit steganography. Journal of Harbin Engineering University, 44(8), pp.1952-1960.

Dai, W., Xu, X., Song, X., and Li, G., 2022. Audio encryption algorithm based on chen memristor chaotic system. Symmetry, 14(1), p.17.

Elkamchouchi, H., Salama, W.M., and Abouelseoud,Y., 2020. New video encryption schemes based on chaotic maps. IET Image Processing, 14(2), pp.397-406.

Ene, R.D., Pop, N., and Lapadat, M., 2022. Approximate closed-form solutions for the rabinovich system via the optimal auxiliary functions method. Symmetry, 14(10), p.2185.

Gao, Z., Su, B., Wu, S., Liao, L., Li, Z., Wang, Y., and Qin, Y., 2022. Securityenhanced chaotic optical communication based on external temporal self-feedback hardware encryption and decryption. IEEE Photonics Journal, 14(4), pp.1-8.

Giap, V.N., Nguyen, Q.D., and Huang, S.C., 2021. Synthetic adaptive fuzzy disturbance observer and sliding-mode control for chaos-based secure communication systems. IEEE Access, 9, pp.23907-23928.

Hanif, M., Ali Naqvi, R., Abbas, S., Khan, M.A., and Iqbal, N., 2020. A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations. IEEE Access, 8, pp.123536-123555.

Hasan, F.S., Mosleh, M.F., and Abdulhameed, A.H., 2021. FPGA implementation of LDPC soft-decision decoders based DCSK for spread spectrum applications. International Journal of Electrical and Computer Engineering, 11(6), pp.4794-4809.

Hassan, N.F., Al-Adhami, A., and Mahdi, M.S., 2022. Digital speech files encryption based on hénon and gingerbread chaotic maps. Iraqi Journal of Science, 63(2), pp.830-842.

Hreshee, S.S., Abdullah, H.N., and Jawad, A.K., 2018. A high security communication system based on chaotic scrambling and chaotic masking. International Journal on Communications Antenna and Propagation, 8(3), pp.257-264.

Hussein, E.A.R., Khashan, M.K., and Jawad, A.K., 2020. A high security and noise immunity of speech based on double chaotic masking. International Journal of Electrical and Computer Engineering, 10(4), pp.4270-4278.

Ibrahim, M.K., and Mohammed, F.T., 2022. Image cryptography based on image processing technique and classification algorithm. Journal of Algebraic Statistics, 13(2), pp.989-1001.

Ilyas, B., Raouf, S.M., Abdelkader, S., Camel, T., Said, S., and Lei, H., 2022. An efficient and reliable chaos-based iot security core for UDP/IP wireless communication. IEEE Access, 10, pp.49625-49656.

Jawad, A.K., Abdullah, H.N., and Hreshee, S.S., 2018. Secure Speech Communication System based on Scrambling and Masking by Chaotic Maps. In: IEEE, International Conference on Advances in Sustainable Engineering and Applications, ICASEA 2018 - Proceedings, pp.7-12.

Khalid, M., Hussein, E.A., and Jawad, A.K., 2019. Digital image encryption based on random seguences and XOR operation. Journal of Engineering and Applied Sciences, 14(8), pp.10331-10334.

Kumar Shrivasta, V., Bhatnagar, A., and Pangaria, M., 2013. Enhancement of security in international data encryption algorithm (Idea) by increasing its key length. International Journal of Advanced Research in Computer and Communication Engineering, 2, pp.3869-3871.

Mahdi, A., Jawad, A.K., and Hreshee, S.S., 2016. Digital chaotic scrambling of voice based on duffing map. Communications Engineering Journal, 1(2), pp.16-21.

Majid Msallam, M., and Aldoghan, F., 2023. Multistage encryption for text using steganography and cryptography. Journal of Technique, 5(1), pp.38-43.

Min, L., Ting, L., and Yu-Jie, H., 2013. Arnold Transform Based Image Scrambling Method. In: 3rd International Conference on Multimedia Technology (ICMT-13), Atlantis Press, pp.1302-1309.

Nguyen, K., Adams, R., Sweetland, K., and Chen, H., 2005. A 106-DB SNR hybrid oversampling analog-to-digital converter for digital audio. IEEE Journal of Solid-State Circuits, 40(12), pp.2408-2415.

Nien, H.H., Huang, C.K., Changchien, S.K., Shieh, H.W., Chen, C.T., and Tuan, Y.Y., 2007. Digital color image encoding and decoding using a novel chaotic random generator. Chaos, Solitons and Fractals, 32(3), pp.1070-1080.

Ouannas, A., Karouma, A., Grassi, G., Pham, V.T., and Luong, V.S., 2021. Anovel secure communications scheme based on chaotic modulation, recursive encryption and chaotic masking. Alexandria Engineering Journal, 60(1), pp.1873-1884.

Pirdawood, M.A., Kareem, S.R., and Zahir, D.C., 2023. Audio encryption framework using the laplace transformation. Aro-the Scientific Journal of Koya University, 11(2), pp.31-37.

Qasim, H.A., 2023. A new audio encryption algorithm based on hyper-chaotic system. Mustansiriyah Journal of Pure and Applied Sciences, 1(3), pp.85-94.

Rahman, S., Masood, F., Khan, W.U., Ullah, N., Khan, F.Q., Tsaramirsis, G., Jan, S., and Ashraf, M., 2020. A novel approach of image steganography for secure communication based on LSB substitution technique. Computers, Materials and Continua, 64(1), pp.31-61.

Sajaa, G.M., and Al-Mothafar, N.S., 2024. Evaluation of rijndael algorithm for audio encryption by brute force attack. Journal of Engineering, 30(1), pp.128-141.

Samimi, M., Majidi, M.H., and Khorashadizadeh, S., 2020. Secure communication based on chaos synchronization using brain emotional learning. AEU - International Journal of Electronics and Communications, 127, p.153424.

Sathiyamurthi, P., Ramakrishnan, S., Shobika, S., Subashri, N., and Prakavi, M., 2018. Speech and Audio Cryptography System Using Chaotic Mapping and Modified Euler’s System. In: IEEE, International Conference on Inventive Communication and Computational Technologies, ICICCT 2018 (Icicct), pp.606-611.

Shakir, H.R., Mehdi, S.A., and Hattab, A.A., 2023. A new four-dimensional hyper-chaotic system for image encryption. International Journal of Electrical and Computer Engineering 13(2), pp.1744-1756.

Tan, Y., and Zhou, W., 2010. Image Scrambling Degree Evaluation Algorithm based on Grey Relation Analysis. In: Proceedings- 2010 International Conference on Computational and Information Sciences, ICCIS 2010, pp.511-514.

Tolba, M.F., Sayed, W.S., Radwan, A.G., and Abd-El-Hafiz, S.K., 2018. Chaosbased Hardware Speech Encryption Scheme Using Modified Tent Map and Bit Permutation. In: International Conference on Modern Circuits and Systems Technologies, pp.1-4.

Tomita, K., Okumura, M., and Okamoto, E., 2023. Demonstration of chaos-based radio encryption modulation scheme through wired transmission experiments. IEICE Transactions on Communications, E106, pp.686-695

Vaseghi, B., Hashemi, S.S., Mobayen, S., and Fekih, A., 2021. Finite time chaos synchronization in time-delay channel and its application to satellite image encryption in OFDM communication systems. IEEE Acces, 9, pp.21332-21344.

Xu, W., and Cao, N., 2020. Hardware design of a kind of grid multi-scroll chaotic system based on a MSP430F169 chip. Journal of Circuits, Systems and Computers, 29(12), p.20501893.

Yousif, S.F., 2023. Performance comparison between RSA and El-gamal algorithms for speech data encryption and decryption. Diyala Journal of Engineering Sciences, 16, pp.123-137.

Zhang, F., Gao, R., Huang, Z., Jiang, C., Chen, Y., and Zhang, H., 2022. Complex modified projective difference function synchronization of coupled complex chaotic systems for secure communication in WSNs. Mathematics, 10(7), p.1202.

Published
2024-12-21
How to Cite
Jawad, A. K., Karimi, G. and Radmelkshahi, M. (2024) “A Novel Digital Audio Encryption Algorithm Using Three Hyperchaotic Rabinovich System Generators”, ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 12(2), pp. 234-245. doi: 10.14500/aro.11869.