International Journal of Speech Technology

, Volume 13, Issue 4, pp 231–242 | Cite as

Encryption of speech signal with multiple secret keys in time and transform domains

  • E. Mosa
  • N. W. Messiha
  • O. Zahran
  • F. E. Abd El-Samie


This paper introduces a new speech cryptosystem, which is based on permutation and masking of speech segments using multiple secret keys in both time and transform domains. The main key is generated, randomly, using a Pseudo Noise (PN) sequence generator, and two other keys are generated from the main key to be used in the subsequent rounds of encryption. Either the Discrete Cosine Transform (DCT) or the Discrete Sine Transform (DST) can be used in the proposed cryptosystem to remove the residual intelligibility resulting from permutation and masking in the time domain. In the proposed cryptosystem, the permutation process is performed with circular shifts calculated from the key bits. The utilized mask is also generated from the secret key by circular shifts. The proposed cryptosystem has a low complexity, small delay, and high degree of security. Simulation results prove that the proposed cryptosystem is robust to the presence of noise.


Speech encryption Chaotic maps Advanced encryption standard (AES) DCT DST 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Abd El-Samie, F. E. (2009). An efficient singular value decomposition algorithm for digital audio watermarking. International Journal of Speech Technology, 12(1), 27–45. CrossRefGoogle Scholar
  2. Advanced Encryption System (2001). Federal Information Processing Standards Publication 197. Google Scholar
  3. Andrade, J. F., Campos, M. L., & Apolinario, J. A. (2008). Speech privacy for modern mobile communication systems. In IEEE international conference on acoustics, speech and signal processing. Google Scholar
  4. Anoop (2007). Public key cryptography—applications algorithm and mathematical explanations. Google Scholar
  5. Behnia, S., Akhshani, A., Mahmodi, H., & Akhavan, A. (2006). A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals. Google Scholar
  6. Bradley, E. (1995). Autonomous exploration and control of chaotic systems. IEEE Transactions on Systems, Man, and Cybernetics, 26(5), 499–519. MATHGoogle Scholar
  7. Daemen, J., & Rijndael, V. R. (2001). The advanced encryption standard. Dr. Dobb’s Journal, 26(3), 137–139. Google Scholar
  8. El-Fishawy, N., & Abu Zaid, O. M. (2007). Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. International Journal of Network Security, 5(3), 241–251. Google Scholar
  9. Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284. MATHCrossRefMathSciNetGoogle Scholar
  10. Goldburg, B., Sridharan, S., & Dawson, E. (1993). Design and cryptanalysis of transform based analog speech scramblers. IEEE Journal of Selected Areas on Communication, 11, 735–743. CrossRefGoogle Scholar
  11. Hassan, E. S., Zhu, X., El-Khamy, S. E., Dessouky, M. I., El-Dolil, S. A., & Abd El-Samie, F. E. (2010). A chaotic interleaving scheme for the continuous phase modulation based single-carrier frequency-domain equalization system. Wireless Personal Communications. doi: 10.1007/s11277-010-0047-z.
  12. Koduru, S. C., & Chandrasekaran, V. (2008). Integrated confusion-diffusion mechanisms for chaos based image encryption. In IEEE 8th international conference on computer and information technology workshops. Google Scholar
  13. Kuo, C. J. (1993). Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging, 2(4), 345–351. CrossRefGoogle Scholar
  14. Mao, Y. B., Chen, G., & Lian, S. G. (2004). A novel fast image encryption scheme based on the 3D chaotic Baker map. International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 14(10), 3613–3624. MATHCrossRefMathSciNetGoogle Scholar
  15. National Bureau of Standards (1977). Data encryption standard. Federal Information Processing Standards Publication no. 46, U.S. Government Printing Office, Washington. Google Scholar
  16. Shannon, C. E. (1949). Communication theory of secrecy system. The Bell System Technical Journal, 28, 656–715. MATHMathSciNetGoogle Scholar
  17. Thongpon, T., & Sinchai, K. (2009). Accelerating asymmetric-key cryptography using parallel-key cryptographic algorithm (PCA). In 6th international conference on computer and information technology (Vol. 2, pp. 812–815). Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • E. Mosa
    • 1
  • N. W. Messiha
    • 1
  • O. Zahran
    • 1
  • F. E. Abd El-Samie
    • 1
  1. 1.Department of Electronics and Electrical Communications, Faculty of Electronic EngineeringMenofia UniversityMenoufEgypt

Personalised recommendations