Abstract
The exponential developments in the field of communication, data transfer, and computational technologies have created tremendous growth in the development of encryption techniques. In this contest, there will always be a healthy demand for efficient and strong encryption techniques to store data in encrypted domain to avoid the possibility of data breach in the shared networks. In this paper, a novel approach for multi-level keyless speech encryption technique based on controlled chaos position transformation and controlled noise generation is developed. In the proposed algorithm, speech sample positions are randomized with the help of controlled chaos position transformation system and then noise is generated in the randomized speech samples with the help of controlled noise generation system. Secret noise generation level of the noise generation system increases the security of the developed algorithm. It is then attached in the end of encrypted speech with the help of combinational masking scheme, which makes the developed encryption technique keyless. The developed algorithm is tested over a huge number of speech samples and the obtained result shows improvement in UACI and SNR by 17.4% and 49.29%, respectively, than the related work found in the literature. The proposed algorithm is compared with different relevant works and found superior to them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chang S, Cohen T, Ostdiek B (2018) What is machine learning? Phys Rev D 97:056009
Kahate A (2013) Cryptography and network security. Tata McGraw-Hill Education
Satti MVK (2007) Quasi group based crypto-system
Yoon JW, Kim H (2010) An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun Nonlinear Sci Numer Simul 15(12):3998–4006
Tamimi AA, Abdalla AM (2012) A double-shuffle image-encryption algorithm. In: Proceedings of the International conference on image processing, computer vision, and pattern recognition (IPCV). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), p 1
Yahya AA, Abdalla AM (2008) A shuffle image-encryption algorithm. J Comput Sci 4(12):999
Kaur M, Kaur S (2014) Survey of various encryption techniques for audio data. Int J Adv Res Comput Sci Softw Eng 4(5):1314–1317
Al-kateeb ZN, Mohammed SJ (2020) A novel approach for audio file encryption using hand geometry. Multimedia Tools Appl 79(27):19615–19628
Teerakanok T, Kamolphiwong S (2009) Accelerating asymmetric-key cryptography using parallel-key cryptographic algorithm (PCA). In: 2009 6th International conference on electrical engineering/electronics, computer, telecommunications and information technology, vol. 2. IEEE, pp 812–815
Sathiyamurthi P, Ramakrishnan S (2020) Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimedia Tools Appl 1–19
Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio Speech Music Process 2017(1):1–11
Mosa E, Messiha NW, Zahran O, Abd El-Samie FE (2011) Chaotic encryption of speech signals. Int J Speech Technol 14(4):285
Belmeguenai A, Ahmida Z, Ouchtati S, Djemii R. A novel approach based on stream cipher for selective speech encryption
Tamimi AA, Abdalla AM (2014) An audio shuffle-encryption algorithm. In: The world congress on engineering and computer science
Moreno-Alvarado R, Rivera-Jaramillo E, Nakano M, Perez-Meana H (2020) Simultaneous audio encryption and compression using compressive sensing techniques. Electronics 9(5):863
Etem T, Kaya T (2020) Self-generated encryption model of acoustics. Appl Acoust 170:107481
Kaur H, Sekhon GS (2012) A four level speech signal encryption algorithm. Int J Comput Sci Commun 3(2):151–153
Belazi A, Khan M, Abd El-Latif AA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn 87(1):337–361
Farsana FJ, Gopakumar K (2016) A novel approach for speech encryption: Zaslavsky map as pseudo random number generator. Procedia Comput Sci 93:816–823
Eaton JW, Bateman D, Hauberg S, Wehbring R (2014) GNU Octave version 6.1.0. Available from https://www.gnu.org/software/octave/download.html
Nagakrishnan R, Revathi A (2020) A robust cryptosystem to enhance the security in speech based person authentication. Multimedia Tools Appl 79(29):20795–20819
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284
Lin Q-H, Yin F-L, Mie T-M, Liang H-L (2004) A speech encryption algorithm based on blind source separation. In: 2004 International conference on communications, circuits and systems (IEEE Cat. No. 04EX914). IEEE, vol 2, pp 1013–1017
Lin Q-H, Yin F-L, Mei T-M, Liang H (2006) A blind source separation based method for speech encryption. IEEE Trans Circuits Syst I Regul Pap 53(6):1320–1328
Yilmaz O, Rickard S (2004) Blind separation of speech mixtures via time-frequency masking. IEEE Trans Signal Process 52(7):1830–1847
Lima JB, da Silva Neto Eronides F (2016) Audio encryption based on the cosine number transform. Multimedia Tools Appl 75(14):8403–8418
Davis GM (ed) (2018) Noise reduction in speech applications. CRC
Thirupalu U, Kesavulu Reddy E (2019) A new cryptosystem for ciphers using transposition techniques. Int J Eng Res Technol (IJERT) 8(4):402–406
Farsana FJ, Gopakumar K (2020) Speech encryption algorithm based on nonorthogonal quantum state with hyperchaotic keystreams. Adv Math Phys 2020:12. Article ID 8050934
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Srivastava, T.K., Ghosh, A., Mandal, H., Phadikar, A., Adhikary, P. (2022). Controlled Chaos Position Transformation and Noise Generation-Based Keyless Speech Encryption Technique. In: Mandal, L., Tavares, J.M.R.S., Balas, V.E. (eds) Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-1657-1_29
Download citation
DOI: https://doi.org/10.1007/978-981-19-1657-1_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1656-4
Online ISBN: 978-981-19-1657-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)