Abstract
In this work, authors’ proposed an audio encryption based on synchronization of hybrid bidirectional associative memory (BAM) and fuzzy cellular neural networks (FCNNs) with time delays. Here, the significant effort is to find the values of the parameters \(A,\ B,\ D,\ \alpha ,\ \beta ,\ \tilde {A},\ \tilde {B},\ \tilde {D},\ \tilde {\alpha },\ \tilde {\beta },\ L,\ \tilde {L},\) \(O_{d}, \ \tilde {O}_{d},\ O_{a}, \ \tilde {O}_{a},\ O_{b}, \ \tilde {O}_{b},\) of the given robust BAM FCNNs system to obtain the dynamical signal (chaotic) which are used to encrypt an audio file and satisfy the condition of Linear matrix inequality (LMI) by choosing suitable Lyapunov-Krasovskii functional (LKF). Further, the key sensitivity of order \(10^{-10}\) of this proposed method have massive key space to make brute-force attack infeasible. Numerical simulations, results and discussions along with comparison are provided to illustrate the effectiveness and merits of the proposed scheme.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Literature review
Babu and Ilango [2] proposed a new higher dimensional chaotic system for audio encryption, in which variables are considered as encryption keys in order to attain safe transmission of audio signals. Lan et al. [13] presented integrated chaotic systems (ICS)-I and ICS-II as two novel formations, which have better chaotic behaviors for image encryption. Zhou et al. [36] introduced a general chaotic framework called the cascade chaotic system which is applied in the field of image encryption. A simultaneous arithmetic coding and encryption method based on the chaotic maps has been proposed [31], in which the security of the method was supported by its high key and plaintext sensitivities. Wang et al. [30] presented an image encryption scheme based on two-dimensional partitioned cellular automaton, in which the scheme has the similar topology as a digital image and is flexible to images with different color depth. A new combination chaotic system based on Logistic and Tent systems was considered and by using this new combination chaotic system a large number of chaotic map can be produced to encrypt the images [22]. Recently, Lima and da Silva Neto [15] have analyzed an audio encryption scheme by utilizing the cosine number transform. Liu et al. [16] investigated a method to recognize activities from the sensor data. In [19], a scientific fortune teller for career path prediction has been presented. Further, a new algorithm capable of efficiently mining temporal patterns from low-level actions to represent high-level human activities was reported [18]. Cui et al. [7] demonstrated a new probabilistic fusion structure to integrate low- and high-dimensional approaches into one framework and the proposed approach is capable of efficiently tracking generic human motion of different types and styles. In [20], a new spatio-temporal multi-view multi-task learning framework was analyzed to forecast the water quality of a station by fusing multiple sources of urban data.
From the above-mentioned literature review, this paper focused on audio information whereas the secure communication of this data is of major concern compared with the text messages and images, where the samples are highly correlated. The work is also motivated to fill the research gap in the audio encryption for the problem, if ’N’ audio files are available and one desire to combine all those ’N’ audio files then the combined file is to encrypt and decrypt successfully.
2 Introduction
Internet is an extremely multipurpose resource which helps us to complete many tasks easily and speedily. It is widely used for communication, research, education, financial transaction, real time updates and many other activities. However, security of transmitting critical information through internet is the most central issue. In practice, an encryption is a technique to secure information (i.e. text, image, audio, and video) from attackers by adding the key (noise) to the plain text (for more details, see [9, 23]). Decryption is the process of adding the symmetric key or asymmetric key to the cipher plain text to obtain the original plain text.
Neural networks (NNs) possesses various attractive properties such as high nonlinearity and parameter sensitivity, in which chaos exists and suitable for secured communication [14]. To use a chaotic signal in communications, the receiver (response or slave system) must have a duplicate of the chaotic transmitter’s (drive or master system). Since, chaos is sensitive to initial conditions, the identical chaotic systems starting both at near but not exactly equal initial conditions, soon diverge from each other, while retaining the same attractor pattern. That is, each has its own attractor without having any relation to the other system. It is possible to force the two chaotic systems to follow the same path on the attractor, namely synchronization. Due to this synchronization, the error between drive and response systems must converge to zero [1, 4, 10, 24,25,26, 29]. Carroll and Pecora [6] have introduced the drive-response concepts.
However, the BAM NNs originally presented in [11, 12], have special structure of connection weights. Since, it is regarded as an extension of the unidirectional autoassociator of Hopfield NNs, it shows more excellent characteristics and wide application in science and engineering fields. Moreover, it is well known that image encryption scheme based on NNs has been well established in the literature and there exists only a very few studies on an audio encryption and decryption [17, 34]. Also, the time delay is inevitable in the dynamical systems [3, 27, 28, 35].
Motivated by the above discussions, as a first attempt in this paper, we have encrypted and decrypted the combined ’N’ audio files based on dynamical signal (chaotic) of uncertain BAM FCNNs (master) system (1) and uncertain BAM FCNNs (slave) system (3), respectively. Moreover, the contribution of the proposed method is that the security and statistical analysis, such as correlation, spectrogram, key space comparison and key sensitivity test in the order of \(10^{-10}\) are illustrated to show that the algorithm can resist against brute-force attack (high safe transmission). The performance evaluation and efficiency in speed and power was performed in Table 4 along with comparison for the real-time audio signals. Moreover, the pros of the proposed method is to attain high security transmission of an audio signal in the real-time and the cons is implementation of dynamical signal (chaos) based secure communication is hard to achieve, by choosing suitable value of the parameters. Finally, the flow diagram of the proposed audio encryption and decryption method is presented in Fig. 1.
The organization of this paper is as follows: in Section 3, system description and preliminaries are presented; in Section 4, synchronization criteria for robust BAM FCNNs with time delays is proposed; in Section 5, numerical simulations are demonstrated to show the effectiveness of the main theoretical results and its application; in Section 6, experimental results and discussion are provided; in Section 7, a brief conclusion and future work are drawn.
Notations
\(\mathbb {R}^{n}\) and HCode \(\mathbb {R}^{m}\) denote the n-dimensional and m-dimensional Euclidean Spaces, respectively. For any matrix \(A=[a_{ij}]_{n\times m},\) let AT and \(A^{-1}\) denote the transpose and the inverse of A, respectively. \(|A|=[|a_{ij}|]_{n\times m}\). Let \(A > 0 \ (A < 0)\) denotes a positive-definite (negative-definite) symmetric matrix. I denotes the identity matrix of appropriate dimension and \(\mathcal {I}\in \{1, 2,..., n\},\ \mathcal {J}\in \{1, 2,..., m\}\). \(*\) denotes the symmetric terms in a symmetric matrix.
3 System description
The dynamical signal of an uncertain BAM FCNNs with discrete and unbounded distributed delays is considered to encrypt an audio signal A as follows
where xi(t) & \(y_{j}(t)\), \(\tilde {g}_{i}\) & \(\tilde {f}_{j}\), \(\tilde {w}_{i}\) & \(w_{j}\), and \(J_{i}\) & \(\tilde {J}_{j}\), denote the states, the signal functions, the inputs and the bias of the i-th neuron and the j-th neuron at time t, respectively; \(d_{i}, \ \tilde {d}_{j}\) are the diagonal matrices, \(d_{i}\) and \(\tilde {d}_{j}\) represent the rates with which the i-th neuron and the j-th neuron will reset their potential to the resting state in isolation when disconnected from the networks and external inputs, respectively; \(a_{ij},\ b_{ij}, \ \tilde {a}_{ji}, \ \ \tilde {b}_{ji}\) denote the connection weights of feedback template and \(c_{ij},\ \tilde {c}_{ji}\) denote the connection weights of feedforward template, respectively; \(\alpha _{ij},\ \tilde {\alpha }_{ji}\) and \(\beta _{ij},\ \tilde {\beta }_{ji}\) denote the connection weights of the delayed fuzzy feedback MIN and MAX template, respectively; \(T_{ij},\ \tilde {T}_{ji}\) and \(\mathfrak {S}_{ij},\ \mathfrak {\tilde {S}}_{ji}\) are the elements of fuzzy feedforward MIN and MAX template, respectively; \(\bigwedge \) and \(\bigvee \) denote the fuzzy AND and fuzzy OR operations, respectively; \(0\leq \tau (t) \leq \tau \) and \(0\leq \rho (t) \leq \rho \) correspond to the transmission delays at time \(t,\) respectively; \(\tilde {g}_{i}(\cdot )\) and \(\tilde {f}_{j}(\cdot )\) are the activation functions; \(k_{i}(s)\geq 0\) and \(k_{j}(s)\geq 0\) are the feedback kernels and satisfy
\({\Delta } d_{i}(t),\ {\Delta } a_{ij}(t),\ {\Delta } b_{ij}(t), \ {\Delta } \tilde {d}_{j}(t),\ {\Delta } \tilde {a}_{ji}(t),\ {\Delta } \tilde {b}_{ji}(t)\) represent the time-varying parameter uncertainties. In addition, we address the uncertainty, suppose that matrices \(D,\ A,\ B,\ \tilde {D},\) \(\tilde {A}, \ \tilde {B}\) have parameter perturbations \({\Delta } d_{i}(t),\ {\Delta } a_{ij}(t),\ {\Delta } b_{ij}(t), \ {\Delta } \tilde {d}_{j}(t),\ {\Delta } \tilde {a}_{ji}(t),\ {\Delta } \tilde {b}_{ji}(t),\) which are of the form [ΔD(t) ΔA(t) ΔB(t)] = LM(t)[Od Oa Ob], \([{\Delta } \tilde {D}(t) \ {\Delta } \tilde {A}(t) \ {\Delta } \tilde {B}(t)]=\tilde {L}\tilde {M}(t)[\tilde {O}_{d} \ \tilde {O}_{a} \ \tilde {O}_{b}]\). Here, \(L,\ O_{d}, \ O_{a}, \ O_{b},\ \tilde {L},\ \tilde {O}_{d}, \ \tilde {O}_{a}, \ \tilde {O}_{b}\) are known real constant matrices of appropriate dimensions with an unknown time-varying matrices \(M(t)\in \mathbb {R}^{i\times j}, \ \tilde {M}(t)\in \mathbb {R}^{j\times i}\) with Lebesque measurable elements and satisfying MT(t)M(t) ≤ I, \(\tilde {M}^{T}(t)\tilde {M}(t)\leq I\).
We consider system (1) as the master system. Now, the dynamical signal of the slave system to decrypt the cipher audio signal \(E(A)\) is defined as follows
where \(u_{i}(t),\ v_{j}(t)\) are the states of the i-th neuron and the j-th neuron at time t, respectively; \(H_{i}, \ \tilde {H}_{j}\) are the control inputs; the remaining parameters are same as in system (1).
Defining the synchronization error signal as \(e_{i}(t)=x_{i}(t)-u_{i}(t),\) \(\tilde {e}_{j}(t)=y_{j}(t)-v_{j}(t),\) \(i\in \mathcal {I},\) \(j \in \mathcal {J},\) between master (1) and slave (3) systems, which yield the following synchronization error dynamical system
where \(g_{i}(e_{i}(\cdot ))=\tilde {g}_{i}(x_{i}(\cdot ))-\tilde {g}_{i}(u_{i}(\cdot )),\)\(f_{j}(\tilde {e}_{j}(\cdot ))=\tilde {f}_{j}(y_{j}(\cdot ))-\tilde {f}_{j}(v_{j}(\cdot )),\)\(i\in \mathcal {I},\)\(j \in \mathcal {J}.\)
The appropriate control inputs are
Assumption 1
The neuron activation functions \(\tilde {f}_{j}(\cdot )\) and \(\tilde {g}_{i}(\cdot ),\) where \(i \in \mathcal {I},\ j \in \mathcal {J},\) are Lipschitz continuous, that is, there exists constants \(s_{j}>0\) and \(r_{i}>0\) such that
Assumption 2
The transmission delays \(\tau (t)\) and \(\rho (t)\) are the time-varying delays and satisfy \(0\leq \tau (t) \leq \tau ,\) \(\dot {\tau }(t)\leq \zeta _{1}<1,\) and 0 ≤ ρ(t) ≤ ρ, \(\dot {\rho }(t)\leq \zeta _{2}<1,\) where \(\tau , \ \rho , \ \zeta _{1}\) and \(\zeta _{2}\) are constants.
Lemma 3.1 (Schur Complement [5])
The Linear matrix inequality (LMI) \(\left [ \begin {array} {cc} Q(x) & S(x) \\ S^{T}(x) & R(x) \end {array} \right ]>0,\) where \(Q(x)=Q^{T}(x),\) \(R(x)=R^{T}(x),\) is equivalent to
Lemma 3.2
[32] Let \(z,\ z^{\prime }\) be two states of system (1), then we have
and
Lemma 3.3
[33] Let \(L,\ O\) and \(M(t)\) be matrices of appropriate dimensions, and MT(t)M(t) ≤ I, then for any scalar \(\xi >0,\)
4 Synchronization criteria for robust BAM FCNNs with delays
The value of the 54 secret keys \([a_{ij},\ b_{ij},\ d_{ij},\ \tilde {a}_{ij},\ \tilde {b}_{ij},\ \tilde {d}_{ij}],\) for \(i, j \in \{1, 2, 3\}\) and the remaining parameters \(\alpha ,\ \beta ,\ \tilde {\alpha },\ \tilde {\beta },\ L,\ \tilde {L},\) \(O_{d}, \ \tilde {O}_{d},\ O_{a}, \ \tilde {O}_{a},\ O_{b}, \ \tilde {O}_{b},\) of system (4) can be found to encrypt/decrypt an audio signal, which also satisfy the inequality (6).
Theorem 4.1
Under Assumptions 1-2, the error dynamical system (4) is globally asymptotically stable, if there exist \(n\times n\) positive diagonal matrices Ui, V i, i ∈{1,2}, some \(n\times n\) positive definite symmetric matrices \(P_{i},\ Q_{i},\ M_{i},\ N_{i},\ i \in \{1,2\},\) and some positive scalars \(\mu _{j},\ \tilde {\mu }_{j},\ j \in \{1,2,3\},\) such that the following LMI has feasible solution:
where \({\Omega }=({\Omega }_{i,j})_{12 \times 12},\) \({\Gamma }=({\Gamma }_{i,j})_{12 \times 6},\) andΥ = (Υi,j)6×6, with
Moreover, the controller gain matrices take the form \(h=\eta P_{1}^{-1}Z_{1}\) and \(\tilde {h}=\eta P_{2}^{-1}Z_{2}\).
Proof
Consider the following LKF
where
The time derivatives of \(V_{i}(t)\) along the trajectory of system (4) are as follows
In addition, for any \(n \times n\) diagonal matrices \(U_{1}>0,\) \(U_{2}>0,\) \(V_{1}>0,\) \(V_{2}>0,\) we can get from Assumption 1 that
where
By (6), it yields
where \({\Sigma }^{\star }=-{\Sigma }>0\).
Therefore, one can conclude that the error dynamical system (4) is globally asymptotically stable. As a result, the slave chaotic uncertain BAM FCNNs with time delays (3) is globally synchronized with the master uncertain BAM FCNNs (1). This completes the proof. □
From this, we can utilize the dynamical signal of maser system (1) as the encryption key to encrypt an audio signal and the dynamical signal of slave system (3) can be used as the decryption key to decrypt an encrypted audio signal, successfully.
5 Simulation results
Consider the master (1), slave (3) and the error dynamical system (4) with the parameters:
\(\tau (t)= 0.1|\sin (t)|,\) \(\rho (t)= 0.1|\sin (t)|,\) \(\zeta _{1}=\zeta _{2}= 0.9,\) \(\eta = 0.001,\) \(\tilde {g}_{i}(x_{i})=\frac {1}{2}(|x_{i}+ 1|-|x_{i}-1|),\) \(i \in \mathcal {I},\)\(\tilde {f}_{j}(y_{j})=\frac {1}{2}(|y_{j}+ 1|-|y_{j}-1|),\) \(j \in \mathcal {J},\) which satisfy the Assumption 1, we get \(r_{i}= 0.1,\) \(s_{j}= 0.1\), and then \(R = 0.1I,\) \(S = 0.1I\). By using the Matlab LMI solver to solve the LMI (6) in Theorem 4.1 , it can be found that the LMI is feasible with the following controller gain matrices
From Theorem 4.1, the error dynamical system (4) is globally robustly asymptotically stable.
The simulation results with the initial values \(\phi (s)=[-1,-0.7,-1.3]^{T},\) \(\varphi (s)=[2,-1.5,-1]^{T},\) and \(\rho (s)=[-1.01,-0.69,-1.31]^{T},\)σ(s) = [2.01,− 1.51,− 0.5]T, are chosen for the systems (1) and (3), respectively. Also, the state and error trajectories of the considered dynamical systems with and without control inputs (13) are demonstrated in Fig. 2.
The above obtained results can be applied in the field of signal processing as follows:
-
1.
First of all, read the audio files of guitar.wav, bass.wav and drums.wav
$$guitar\leftarrow audioread('guitar.wav');$$$$bass\leftarrow audioread('bass.wav');$$$$drums\leftarrow audioread('drums.wav'). $$ -
2.
Next, segment few seconds that is from 10 seconds to 17 seconds of the above audio signals
$$guit_{seg}\leftarrow guitar(44100*10:44100*17);$$$$bass_{seg}\leftarrow bass(44100*10:44100*17);$$$$drum_{seg}\leftarrow drums(44100*10:44100*17). $$ -
3.
Then, composed three segmented files \((guit_{seg}, bass_{seg}, drum_{seg})\) into a single file as
$$\boldsymbol{A}\leftarrow guit_{seg}+bass_{seg}+drum_{seg}. $$ -
4.
If we apply the dynamical signal of master system (1) to the audio signal \(\boldsymbol {A},\) then the encrypted audio signal \(E(\boldsymbol {A})\) can be obtained, which is provided in Algorithm 1.
-
5.
Finally, as in Algorithm 2, the successful decrypted audio signal \(D(\boldsymbol {A})\) can be obtained by applying the dynamical signal of slave system (3) to an encrypted signal \(E(\boldsymbol {A})\).
Remark 5.1
Three audio signals, namely, guitar, bass and drums have been taken in Fig. 3. In this experiment, we have composed those three audio signals to music.wav and named it as \(\boldsymbol {A}\) in Fig. 4a. Also, simulations about audio encryption (Fig. 4b), successful decryption (Fig. 4c) and failed decryption (Fig. 4d) have been provided in Fig. 4, which illustrate the application potential of synchronization of robust BAM FCNNs in signal processing.
6 Experimental results and discussions
The proposed encryption scheme is implemented by Matlab \(R2013a\) running on Windows 7 Professional, operating on a personal computer with Intel(R) Xeon(R) CPU \(E5620 @2.40 GHz\) and 12GB of RAM.
6.1 Spectrogram analysis
The spectrogram is a two-dimensional graph, with a third dimension represents by colors. The amplitude (or energy or loudness) of a particular frequency at a particular time is represented by the third dimension, color, with dark blue corresponding to low amplitudes and brighter colors up through red corresponding to gradually stronger (or louder) amplitudes (Fig. 5). An audio signal \(\boldsymbol {A}\) in Fig. 5a and a successful decrypted audio signal D(A) in Fig. 5c are similar and show stronger amplitude. However, an encrypted audio signal E(A) in Fig. 5b and an unsuccessful decrypted audio signal D(A) in Fig. 5d represent medium amplitude and lower amplitude, respectively.
6.2 Key space analysis
The brute-force attack has the ability to attack against existing types of encryption, with different degrees of success [8]. The brute-force attack begins with one-digit, then two-digit and so on until the maximum length of secret key is reached. In order to resist against brute-force, the secret key space should be quite large. In this work, the secret keys of 54 can be expressed as \([a_{ij},\ b_{ij},\ d_{ij},\ \tilde {a}_{ij},\ \tilde {b}_{ij},\ \tilde {d}_{ij}],\) for \(i, j \in \{1, 2, 3\}\). Here, the computed precision is equal to 10− 10, and the key space is (1010)6×9 = 10540 ≈ 21620, which corresponds to a key length of 1620 bits, sufficient to resist against brute-force attack. The evaluation of secret key space for the proposed and other method is provided in Table 1, in which the secret key space of proposed method is superior to other method.
6.3 Key sensitivity test
The proposed encryption possesses 54 secret keys provided in Section 6.2, in which they are significant for all secret key sensitivity. Due to space consuming, here we have shown the key sensitivity of six among 54 secret keys. The decrypted keys are identical as the encrypted keys provided in Section 6.2, with the exclusion of the following six dissimilar conditions that have a tiny difference of order \(10^{-10}\) in the encrypted keys (Table 2). (i) \(a_{11}= 2.3699999999\); (ii) \(b_{23}=-5.0100000001\); (iii) \(d_{31}= 0.0000000001\); (iv) \(\tilde {a}_{33}= 0.9899999999\); (v) \(\tilde {b}_{21}=-3.0100000001\); (vi) \(\tilde {d}_{22}= 1.0100000001\); for encrypted audio signal of Fig. 4b. The failed decrypted results in Fig. 6 show that the decrypted keys have key sensitivity assets with a slight difference of order \(10^{-10}\) from the encrypted keys.
6.4 Correlation analysis
Correlation analysis assists us in determining the degree of relationship between variables. It enables us to make our decision for the future course of actions. The correlation coefficient \(r_{\sigma \upsilon }\) as follows:
where \(\mathcal {C}(\sigma ,\upsilon )\), and 𝜗(σ), \(\vartheta (\upsilon )\), represent the covariance, and the variance, respectively.
The proposed method generates a low correlation among encrypted audio signal \(E(A)\) with an audio signal A using correct keys and if a slight change in any of parameters in the order of \(10^{-10}\) will lead to low correlation among failed decrypted audio signal \(D(A)\) with an audio signal A (see Table 3). From this, the performance of the proposed method works well in the field of secure communication.
6.5 Time analysis
The proposed method takes about 0.1690 second to encrypt an audio signal A of quantity \((44100*10:44100*17)\), which excludes the time needed to generate the dynamical signal. Similarly, on average, it takes approximately 0.1188 second to decrypt an encrypted audio signal \(E(A)\) of the same quantity. From Table 4, one Kbyte of wave file needs 18.2858 and 99.5754 microseconds to be encrypted (in average) by Nadir et al. [21] and the proposed method, respectively. Also, the time takes 209.3191 and 99.8931 microseconds to decrypt (in average) one Kbyte of wave file by Nadir et al. [21] and the proposed method, respectively. Comparison of the experimental results show that the time taken for the proposed method to decrypt the wave file possesses less than Nadir et al. [21] and if the size of an audio file increases then proportionally the time taken for encrypt/decrypt an audio file will also increases.
7 Conclusion
In this work, we have utilized the delayed uncertain BAM FCNNs dynamical signal to encrypt an audio signal. Specifically, we use each generated BAM FCNNs dynamical signal expressed in (1) and (3) to encrypt and decrypt, the original audio signal and encrypted audio signal, respectively. The results indicate that the synchronization behavior of uncertain BAM FCNNs is highly suitable for the application in the field of encryption. Further, these results have been derived by employing LKF and LMI approach. The key sensitivity was verified to be in the order of \(10^{-10}\). In addition, statistical analysis against the conventional methods demonstrated the effectiveness of the proposed method.
In future, we will extend the results to the application in the field of video encryption.
References
Abdurahman A, Jiang H, Teng Z (2016) Finite-time synchronization for fuzzy cellular neural networks with time-varying delays. Fuzzy Sets Syst 297:96–111
Babu SG, Ilango P (2013) Higher dimensional chaos for audio encryption. In: 2013 IEEE Symposium on computational intelligence in cyber security (CICS). IEEE, pp 52–58
Balasubramaniam P, Kalpana M, Rakkiyappan R (2011) Global asymptotic stability of BAM fuzzy cellular neural networks with time delay in the leakage term, discrete and unbounded distributed delays. Math Comput Modelling 53:839–853
Bigdeli N, Farid Y, Afshar K (2012) A novel image encryption/decryption scheme based on chaotic neural networks. Eng Appl Artif Intell 25:753–765
Boyd S, El Ghaoui L, Feron E, Balakrishnan V (1994) Linear matrix inequalities in system and control theory, vol 15. Siam
Carroll TL, Pecora LM (1991) Synchronizing chaotic circuits. IEEE Trans Circuits Syst 38:453–456
Cui J, Liu Y, Xu Y, Zhao H, Zha H (2013) Tracking generic human motion via fusion of low- and high-dimensional approaches. IEEE Trans Syst Man Cybern: Syst 43:996–1002
Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, If Isnin (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng 71:33–41
Jawahir A, Haviluddin H (2015) An audio encryption using transposition method. Int J Adv Intell Informatics 1:98–106
Kalpana M, Balasubramaniam P, Ratnavelu K (2015) Direct delay decomposition approach to synchronization of chaotic fuzzy cellular neural networks with discrete, unbounded distributed delays and Markovian jumping parameters. Appl Math Comput 254:291–304
Kosko B (1987) Adaptive bidirectional associative memories. Appl Opt 26:4947–4960
Kosko B (1988) Bidirectional associative memories. IEEE Trans Syst Man Cybern 18:49–60
Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133–145
Lian S (2009) A block cipher based on chaotic neural networks. Neurocomputing 72:1296–1301
Lima JB, da Silva Neto EF (2016) Audio encryption based on the cosine number transform. Multimed Tools Appl 75:8403–8418
Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2Activity: recognizing complex activities from sensor data. In IJCAI 2015, pp 1617–1623
Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Opt-Int J Light Electron Opt 127:7431–7438
Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115
Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. In: AAAI 2016, pp 201–207
Liu Y, Zheng Y, Liang Y, Liu S, Rosenblum DS (2016) Urban water quality prediction based on multi-task multi-view learning. In: IJCAI 2016, pp 2576–2582
Nadir J, Ein AA, Alqadi Z (2016) A technique to encrypt-decrypt stereo wave file. Int J Comput Inf Technol (ISSN 2279-0764) 05:465–470
Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101:30–41
Prabu AV, Srinivasarao S, Apparao T, Rao MJ, Rao KB (2012) Audio encryption in handsets. Int J Comput Appl 40:40–45
Rakkiyappan R, Latha VP, Zhu Q, Yao Z (2017) Exponential synchronization of Markovian jumping chaotic neural networks with sampled-data and saturating actuators. Nonlinear Anal Hybrid Syst 24:28–44
Ratnavelu K, Manikandan M, Balasubramaniam P (2015) Synchronization of fuzzy bidirectional associative memory neural networks with various time delays. Appl Math Comput 270:582–605
Ratnavelu K, Kalpana M, Balasubramaniam P, Wong K, Raveendran P (2017) Image encryption method based on chaotic fuzzy cellular neural networks. Signal Process 140:87–96
Sakthivel R, Vadivel P, Mathiyalagan K, Arunkumar A, Sivachitra M (2015) Design of state estimator for bidirectional associative memory neural networks with leakage delays. Inform Sci 296:263–274
Wan L, Zhou Q, Liu J (2017) Delay-dependent attractor analysis of Hopfield neural networks with time-varying delays. Chaos Solitons Fractals 101:68–72
Wen S, Zeng Z, Huang T, Meng Q, Yao W (2015) Lag synchronization of switched neural networks via neural activation function and applications in image encryption. IEEE Trans Neural Netw Learn Syst 26:1493–1502
Wang Y, Zhao Y, Zhou Q, Lin Z (2018) Image encryption using partitioned cellular automata. Neurocomputing 275:1318–1332
Wong KW, Lin Q, Chen J (2010) Simultaneous arithmetic coding and encryption using chaotic maps. IEEE Trans Circuits Syst II: Exp Briefs 57:146–150
Yang T, Yang LB (1996) The global stability of fuzzy cellular neural network. IEEE Trans Circuits Syst I: Fund Theory Appl 43:880–883
Yang R, Gao H, Shi P (2009) Novel robust stability criteria for stochastic Hopfield neural networks with time delays. IEEE Trans Syst Man Cybern Part B (Cybernetics) 39:467–474
Yang YG, Tian J, Sun SJ, Xu P (2015) Quantum-assisted encryption for digital audio signals. Opt-Int J Light Electron Opt 126:3221–3226
Yu ZX, Mei M (2016) Uniqueness and stability of traveling waves for cellular neural networks with multiple delays. J Diff Equa 260:241–267
Zhou Y, Hua Z, Pun CM, Chen CP (2015) Cascade chaotic system with applications. IEEE Trans Cybern 45:2001–2012
Acknowledgments
This work was supported by the Fundamental Research Grant Scheme (FRGS) MoHE Grant No. FP051-2016. Dr. M. Kalpana is working as a Post-Doctoral Research Fellow at the University of Malaya.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kalpana, M., Ratnavelu, K. & Balasubramaniam, P. An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimed Tools Appl 78, 5969–5988 (2019). https://doi.org/10.1007/s11042-018-6373-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6373-y