An Audio Data Encryption with Single and Double Dimension Discrete-Time Chaotic Systems

An Audio Data Encryption with Single and Double Dimension Discrete-Time Chaotic Systems

— In this article, a study on increasing security of audio data encryption with single and double dimension discrete-time chaotic systems was carried out and application and security analyses were executed. Audio data samples of both mono and stereo types were encrypted. In the application here, single and double dimension discrete-time chaotic systems were used. In order to enhance security during encryption, a different method was applied by also using a non-linear function. In the chaos based application realized with the method developed, analyses results were achieved with common security analyses such as key space, key sensitivity, chaos effect and histogram. Several examinations on the safety of chaotic systems in the application were carried out with these analyses results

___

  • Gopalan KG, Benincasa DS, Wenndt SJ (2001). Data embedding in audio signals. IEEE Aerospace Conference Proceedings (Cat. No.01TH8542). Vol. 6, pp. 2713–2720.
  • Chang CC, Lee RTC, Xiao GX, Chen TS (2003). A new Speech Hiding Scheme based upon sub-band coding. Proceedings of the 2003 Joint Conference of the Fourth International Conference on Information, Communications and Signal Processing and Fourth Pacific Rim Conference on Multimedia. Vol. 2, pp. 980– 984.
  • Chen S, Leung H, Ding H (2007). Telephony Speech Enhancement by Data Hiding. IEEE Transactıons On Instrumentatıon And Measurement. Vol. 56, no. 1, pp. 63–74.
  • Dipu KHM, Alam SB (2010). Hardware based real time, fast and highly secured speech communication using FPGA. IEEE International Conference on Information Theory and Information Security, pp. 452–457.
  • Pehlivan I, Uyaroğlu Y (2007). Simplified Chaotic Diffusionless Lorenz Attractor and its Application to Secure Communication Systems. IET Communications, pp: 1015-1022.
  • Cicek S., Uyaroğlu Y., Pehlivan I (2013). Simulation and Circuit Implementation Of Sprott Case H Chaotic System And Its Synchronization Application For Secure Communication Systems. Journal of Circuits, Systems and Computers. Vol.22, No.04, 1350022_1-1350022_15 DOI: 10.1142/S0218126613500229.
  • Pehlivan I, Wei Z (2012). Analysis, Nonlinear Control and Circuit Design of an Another Strange Chaotic System. Turkish Journal of Electrical Engineering & Computer Sciences.Volume 20, Issue sup2, 1229-1239.
  • Pehlivan I, Uyaroğlu Y (2012). A New 3D Chaotic System with Golden Proportion Equilibria: Analysis and Electronic Circuit Realization. Computers & Electrical Engineering, Vol. 38, Issue 6 , 1777-1784.
  • Sakthidasan K, Santhosh BV (2011). A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images, International Journal of Information and Education Technology. Vol. 1, no.2, pp: 137-141.
  • Ogras H, Turk M (2012). Digital Image Encryption Scheme using Chaotic Sequences with a Nonlinear Function. World Academy of Science Engineering and Technology. Stockholm. Findik O (2004). Şifrelemede Kaotik Sistemin Kullanılması. M.S. thesis, Comp. Dept., Selçuk. Univ., Konya.
  • Yardim FE, Afacan E (2010). Lorenz-Tabanlı Diferansiyel Kaos Kaydırmalı Anahtarlama (Dcsk) Modeli Kullanılarak Kaotik Bir Haberleşme Sisteminin Simülasyonu. Gazi¨ Univ. Müh. Mim. Fak. Der., Vol. 25, no.1, pp: 101-110.
  • Sobhy MI, Shehata AR (2001). Chaotic Algorithms for Data Encryption, Acoustics, Speech, and Signal Processing. IEEE International Conference on, Salt Like City.
  • Maysaa A, Iman Q (2013). A.,Speech Encryption Using Chaotic Map and Blowfish Algorithms, Journal of Basrah Researches.Vol. 39. No. 2,pp. 68-76.
  • Zhangx M (2005). Ageneralized Chaos Synchronization Based Encryption Algorithm For Sound Signal Communication. Circuits Systems Signal Processing. Vol. 24. No. 5, pp. 535-548. Gnanajeyaraman R, Prasadhk, Ramar (2009). International Journal of RecentTrends in Engineering. Audio encryption using higher dimensional chaotic map. Vol. 1. No. 2, pp. 103-107.
  • Prabu AV, Srinivassaraos, Apparao T, Jaganmohan M, Babu RK (2012). International Journal of Computer Applications. Audio Encryption in Handsets. Vol. 40. No. 6, pp. 40-45.
  • Ganesan K, Muthukumarr, Murali K (2006). Look-up Table Based Chaotic Encryption of Audio Files, Circuits and Systems. APCCAS 2006. IEEE Asia Pacific Conference, Singapore, pp: 1951-1954.