Encryption of speech signal with multiple secret keys in time and transform domains
- 278 Downloads
This paper introduces a new speech cryptosystem, which is based on permutation and masking of speech segments using multiple secret keys in both time and transform domains. The main key is generated, randomly, using a Pseudo Noise (PN) sequence generator, and two other keys are generated from the main key to be used in the subsequent rounds of encryption. Either the Discrete Cosine Transform (DCT) or the Discrete Sine Transform (DST) can be used in the proposed cryptosystem to remove the residual intelligibility resulting from permutation and masking in the time domain. In the proposed cryptosystem, the permutation process is performed with circular shifts calculated from the key bits. The utilized mask is also generated from the secret key by circular shifts. The proposed cryptosystem has a low complexity, small delay, and high degree of security. Simulation results prove that the proposed cryptosystem is robust to the presence of noise.
KeywordsSpeech encryption Chaotic maps Advanced encryption standard (AES) DCT DST
Unable to display preview. Download preview PDF.
- Advanced Encryption System (2001). Federal Information Processing Standards Publication 197. Google Scholar
- Andrade, J. F., Campos, M. L., & Apolinario, J. A. (2008). Speech privacy for modern mobile communication systems. In IEEE international conference on acoustics, speech and signal processing. Google Scholar
- Anoop (2007). Public key cryptography—applications algorithm and mathematical explanations. Google Scholar
- Behnia, S., Akhshani, A., Mahmodi, H., & Akhavan, A. (2006). A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals. Google Scholar
- Daemen, J., & Rijndael, V. R. (2001). The advanced encryption standard. Dr. Dobb’s Journal, 26(3), 137–139. Google Scholar
- El-Fishawy, N., & Abu Zaid, O. M. (2007). Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. International Journal of Network Security, 5(3), 241–251. Google Scholar
- Hassan, E. S., Zhu, X., El-Khamy, S. E., Dessouky, M. I., El-Dolil, S. A., & Abd El-Samie, F. E. (2010). A chaotic interleaving scheme for the continuous phase modulation based single-carrier frequency-domain equalization system. Wireless Personal Communications. doi: 10.1007/s11277-010-0047-z.
- Koduru, S. C., & Chandrasekaran, V. (2008). Integrated confusion-diffusion mechanisms for chaos based image encryption. In IEEE 8th international conference on computer and information technology workshops. Google Scholar
- National Bureau of Standards (1977). Data encryption standard. Federal Information Processing Standards Publication no. 46, U.S. Government Printing Office, Washington. Google Scholar
- Thongpon, T., & Sinchai, K. (2009). Accelerating asymmetric-key cryptography using parallel-key cryptographic algorithm (PCA). In 6th international conference on computer and information technology (Vol. 2, pp. 812–815). Google Scholar