A Novel Digital Audio Encryption Algorithm Using Three Hyperchaotic Rabinovich System Generators
Abstract
Improved speech encryption is needed for digital voice communications. Data security requires advanced encryption against cyberattacks. Traditional encryption may not be able to handle advanced threats or large datasets. This study uses chaotic system features to create a secure and adaptive digital audio encryption algorithm and enhances public audio encryption. Three hyperchaotic systems allow digital audio signal randomized encryption. The first system generates chaotic random integer numbers as keys, the second selects non-sequential indices to increase unpredictability, and the third randomly samples the digital audio signal and encrypts it through XOR operations with a selected key, making it harder for intruders to learn the encryption pattern. The proposed system uses Diffie-Hellman key exchange for key agreement. We have tested and proven the efficiency of the proposed algorithm. The encrypted audio signals, achieving a Peak Signal-to-Noise Ratio (PSNR) of around −20 dB, exhibit high distortion, spectral complexity, very low correlation (round to zero), high entropy, and minimal time delay compared to other articles, making them resistant to decryption attempts by attackers. The system has a large key space of 1345 bits, and its randomized nature and extensive key space protect sensitive audio data in public communication channels, even with minor changes to hyper-chaos generators. The proposed algorithm represents a significant advancement in the field of digital audio encryption. The researchers have utilized chaotic systems to create a strong and flexible encryption system. This algorithm is suitable for military and medical communications that require a high level of audio data security.
Downloads
References
Abdelfatah, R.I., 2020. Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access, 8, pp.69894-69907.
Abdullah, H.N., Hreshee, S.H., and Jawad, A.K., 2015. Design of efficient noise reduction scheme for secure speech masked by chaotic signals. Journal of American Science, 11(7), pp.49-55.
Abdullah, H.N., Hreshee, S.H., and Jawad, A.K., 2016. Noise Reduction of Chaotic Masking System Using Repetition Method. Available from: https:// www.researchgate.net/publication/291356303 [Last accessed on 2024 Oct 10].
Abdullah, H.N., Hreshee, S.S., Karimi, G., and Jawad, A.K., 2022. Performance Improvement of Chaotic Masking System Using Power Control Method. In: International Middle Eastern Simulation and Modelling Conference 2022, MESM 2022, pp.19-23.
Abood, E.W., Hussien, Z.A., Kawi, H.A., Abduljabbar, Z.A., Nyangaresi, V.O., Ma, J., Al Sibahee, M.A., and Ali Kalafy, S.A., 2023. Provably secure and efficient audio compression based on compressive sensing. International Journal of Electrical and Computer Engineering, 13(1), pp.335-346.
Ahmad, J., and Ahmed, F., 2010. Efficiency analysis and security evaluation of image encryption schemes. Computing, 23(4), p.25.
Alsaabri, H.H., and Hreshee, S.S., 2021. Robust Image Encryption Based on Double Hyper Chaotic Rabinovich System. In: 7th International Conference on Contemporary Information Technology and Mathematics, ICCITM 2021, pp.146-152.
Ameen, M.J.M., and Hreshee, S.S., 2022. Securing physical layer of 5G wireless network system over GFDM using linear precoding algorithm for massive MIMO and hyperchaotic QR-decomposition. International Journal of Intelligent Engineering and Systems, 15(5), pp.579-591.
Ameen, M.J.M., and Hreshee, S.S., 2023. Security analysis of encrypted audio based on elliptic curve and hybrid chaotic maps within GFDM modulator in 5G networks. Bulletin of Electrical Engineering and Informatics, 12(6), pp.3467-3479.
Barua, N., and Kabir, A., 2022. Encryption and decryption of audio by changing properties and noise reduction. International Journal of Innovative Science and Research Technology 7(9), pp.805-809.
Belagali, P., and Udupi, V.R., 2023. Image steganography based on enhanced payload capacity using hybrid edge detection and least significant bit steganography. Journal of Harbin Engineering University, 44(8), pp.1952-1960.
Dai, W., Xu, X., Song, X., and Li, G., 2022. Audio encryption algorithm based on chen memristor chaotic system. Symmetry, 14(1), p.17.
Elkamchouchi, H., Salama, W.M., and Abouelseoud,Y., 2020. New video encryption schemes based on chaotic maps. IET Image Processing, 14(2), pp.397-406.
Ene, R.D., Pop, N., and Lapadat, M., 2022. Approximate closed-form solutions for the rabinovich system via the optimal auxiliary functions method. Symmetry, 14(10), p.2185.
Gao, Z., Su, B., Wu, S., Liao, L., Li, Z., Wang, Y., and Qin, Y., 2022. Securityenhanced chaotic optical communication based on external temporal self-feedback hardware encryption and decryption. IEEE Photonics Journal, 14(4), pp.1-8.
Giap, V.N., Nguyen, Q.D., and Huang, S.C., 2021. Synthetic adaptive fuzzy disturbance observer and sliding-mode control for chaos-based secure communication systems. IEEE Access, 9, pp.23907-23928.
Hanif, M., Ali Naqvi, R., Abbas, S., Khan, M.A., and Iqbal, N., 2020. A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations. IEEE Access, 8, pp.123536-123555.
Hasan, F.S., Mosleh, M.F., and Abdulhameed, A.H., 2021. FPGA implementation of LDPC soft-decision decoders based DCSK for spread spectrum applications. International Journal of Electrical and Computer Engineering, 11(6), pp.4794-4809.
Hassan, N.F., Al-Adhami, A., and Mahdi, M.S., 2022. Digital speech files encryption based on hénon and gingerbread chaotic maps. Iraqi Journal of Science, 63(2), pp.830-842.
Hreshee, S.S., Abdullah, H.N., and Jawad, A.K., 2018. A high security communication system based on chaotic scrambling and chaotic masking. International Journal on Communications Antenna and Propagation, 8(3), pp.257-264.
Hussein, E.A.R., Khashan, M.K., and Jawad, A.K., 2020. A high security and noise immunity of speech based on double chaotic masking. International Journal of Electrical and Computer Engineering, 10(4), pp.4270-4278.
Ibrahim, M.K., and Mohammed, F.T., 2022. Image cryptography based on image processing technique and classification algorithm. Journal of Algebraic Statistics, 13(2), pp.989-1001.
Ilyas, B., Raouf, S.M., Abdelkader, S., Camel, T., Said, S., and Lei, H., 2022. An efficient and reliable chaos-based iot security core for UDP/IP wireless communication. IEEE Access, 10, pp.49625-49656.
Jawad, A.K., Abdullah, H.N., and Hreshee, S.S., 2018. Secure Speech Communication System based on Scrambling and Masking by Chaotic Maps. In: IEEE, International Conference on Advances in Sustainable Engineering and Applications, ICASEA 2018 - Proceedings, pp.7-12.
Khalid, M., Hussein, E.A., and Jawad, A.K., 2019. Digital image encryption based on random seguences and XOR operation. Journal of Engineering and Applied Sciences, 14(8), pp.10331-10334.
Kumar Shrivasta, V., Bhatnagar, A., and Pangaria, M., 2013. Enhancement of security in international data encryption algorithm (Idea) by increasing its key length. International Journal of Advanced Research in Computer and Communication Engineering, 2, pp.3869-3871.
Mahdi, A., Jawad, A.K., and Hreshee, S.S., 2016. Digital chaotic scrambling of voice based on duffing map. Communications Engineering Journal, 1(2), pp.16-21.
Majid Msallam, M., and Aldoghan, F., 2023. Multistage encryption for text using steganography and cryptography. Journal of Technique, 5(1), pp.38-43.
Min, L., Ting, L., and Yu-Jie, H., 2013. Arnold Transform Based Image Scrambling Method. In: 3rd International Conference on Multimedia Technology (ICMT-13), Atlantis Press, pp.1302-1309.
Nguyen, K., Adams, R., Sweetland, K., and Chen, H., 2005. A 106-DB SNR hybrid oversampling analog-to-digital converter for digital audio. IEEE Journal of Solid-State Circuits, 40(12), pp.2408-2415.
Nien, H.H., Huang, C.K., Changchien, S.K., Shieh, H.W., Chen, C.T., and Tuan, Y.Y., 2007. Digital color image encoding and decoding using a novel chaotic random generator. Chaos, Solitons and Fractals, 32(3), pp.1070-1080.
Ouannas, A., Karouma, A., Grassi, G., Pham, V.T., and Luong, V.S., 2021. Anovel secure communications scheme based on chaotic modulation, recursive encryption and chaotic masking. Alexandria Engineering Journal, 60(1), pp.1873-1884.
Pirdawood, M.A., Kareem, S.R., and Zahir, D.C., 2023. Audio encryption framework using the laplace transformation. Aro-the Scientific Journal of Koya University, 11(2), pp.31-37.
Qasim, H.A., 2023. A new audio encryption algorithm based on hyper-chaotic system. Mustansiriyah Journal of Pure and Applied Sciences, 1(3), pp.85-94.
Rahman, S., Masood, F., Khan, W.U., Ullah, N., Khan, F.Q., Tsaramirsis, G., Jan, S., and Ashraf, M., 2020. A novel approach of image steganography for secure communication based on LSB substitution technique. Computers, Materials and Continua, 64(1), pp.31-61.
Sajaa, G.M., and Al-Mothafar, N.S., 2024. Evaluation of rijndael algorithm for audio encryption by brute force attack. Journal of Engineering, 30(1), pp.128-141.
Samimi, M., Majidi, M.H., and Khorashadizadeh, S., 2020. Secure communication based on chaos synchronization using brain emotional learning. AEU - International Journal of Electronics and Communications, 127, p.153424.
Sathiyamurthi, P., Ramakrishnan, S., Shobika, S., Subashri, N., and Prakavi, M., 2018. Speech and Audio Cryptography System Using Chaotic Mapping and Modified Euler’s System. In: IEEE, International Conference on Inventive Communication and Computational Technologies, ICICCT 2018 (Icicct), pp.606-611.
Shakir, H.R., Mehdi, S.A., and Hattab, A.A., 2023. A new four-dimensional hyper-chaotic system for image encryption. International Journal of Electrical and Computer Engineering 13(2), pp.1744-1756.
Tan, Y., and Zhou, W., 2010. Image Scrambling Degree Evaluation Algorithm based on Grey Relation Analysis. In: Proceedings- 2010 International Conference on Computational and Information Sciences, ICCIS 2010, pp.511-514.
Tolba, M.F., Sayed, W.S., Radwan, A.G., and Abd-El-Hafiz, S.K., 2018. Chaosbased Hardware Speech Encryption Scheme Using Modified Tent Map and Bit Permutation. In: International Conference on Modern Circuits and Systems Technologies, pp.1-4.
Tomita, K., Okumura, M., and Okamoto, E., 2023. Demonstration of chaos-based radio encryption modulation scheme through wired transmission experiments. IEICE Transactions on Communications, E106, pp.686-695
Vaseghi, B., Hashemi, S.S., Mobayen, S., and Fekih, A., 2021. Finite time chaos synchronization in time-delay channel and its application to satellite image encryption in OFDM communication systems. IEEE Acces, 9, pp.21332-21344.
Xu, W., and Cao, N., 2020. Hardware design of a kind of grid multi-scroll chaotic system based on a MSP430F169 chip. Journal of Circuits, Systems and Computers, 29(12), p.20501893.
Yousif, S.F., 2023. Performance comparison between RSA and El-gamal algorithms for speech data encryption and decryption. Diyala Journal of Engineering Sciences, 16, pp.123-137.
Zhang, F., Gao, R., Huang, Z., Jiang, C., Chen, Y., and Zhang, H., 2022. Complex modified projective difference function synchronization of coupled complex chaotic systems for secure communication in WSNs. Mathematics, 10(7), p.1202.
Copyright (c) 2024 Ameer K. Jawad, Gholamreza Karimi, Mazdak Radmelkshahi
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors who choose to publish their work with Aro agree to the following terms:
-
Authors retain the copyright to their work and grant the journal the right of first publication. The work is simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-SA 4.0]. This license allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
-
Authors have the freedom to enter into separate agreements for the non-exclusive distribution of the journal's published version of the work. This includes options such as posting it to an institutional repository or publishing it in a book, as long as proper acknowledgement is given to its initial publication in this journal.
-
Authors are encouraged to share and post their work online, including in institutional repositories or on their personal websites, both prior to and during the submission process. This practice can lead to productive exchanges and increase the visibility and citation of the published work.
By agreeing to these terms, authors acknowledge the importance of open access and the benefits it brings to the scholarly community.