Multimedia Tools and Applications

, Volume 75, Issue 14, pp 8403–8418 | Cite as

Audio encryption based on the cosine number transform

  • Juliano B. Lima
  • Eronides F. da Silva Neto


In this paper, we introduce an audio encryption scheme based on the cosine number transform (CNT). The transform, which is defined over a finite field, is recursively applied to blocks of samples of a noncompressed digital audio signal. The blocks are selected using a simple overlapping rule, which provides diffusion of the ciphered data to all processed blocks. A secret-key is used to specify the number of times the transform is applied to each one of such blocks. Computer experiments are carried out and security aspects of the proposed scheme are discussed. Our analysis indicates that the method meets the main security requirements of secret-key cryptography. More specifically, after the encryption of 16-bit audio signals, correlation coefficients significantly close to 0 and entropy values close to 16 were obtained. Furthermore, the flexibility of the method easily allows key space sizes greater than 2256 and provides robustness against differential, known-plaintext and chosen-plaintext attacks.


Multimedia security Audio encryption Number-theoretic transform Cosine number transform 



This research was supported by Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq) under Grants 307686/2014-0 and 456744/2014-2.


  1. 1.
    Abuturab MR (2013) Color image security system based on discrete hartley transform in gyrator transform domain. Opt Lasers Eng 51(3):317–324CrossRefGoogle Scholar
  2. 2.
    Birtwistle DT (1982) The eigenstructure of the number theoretic transforms. Signal Process 4(4):287–294MathSciNetCrossRefGoogle Scholar
  3. 3.
    Blahut RE (2010) Fast algorithms for signal processing. Cambridge University PressGoogle Scholar
  4. 4.
    Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727–752CrossRefMATHGoogle Scholar
  5. 5.
    Cintra RJ, Dimitrov VS, Campello de Souza RM, de Oliveira HM (2009) Fragile watermarking using finite field trigonometrical transforms. Signal Process Image Commun 24:587–597CrossRefGoogle Scholar
  6. 6.
    Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography, 2nd edn. The Morgan Kaufmann series in multimedia information and systems. Morgan KaufmannGoogle Scholar
  7. 7.
    Fallahpour M, Megias D (2009) High capacity audio watermarking using FFT amplitude interpolation. IEICE Electron Express 6(14):1057–1063CrossRefMATHGoogle Scholar
  8. 8.
    Gnanajeyaraman R, Prasadh K, Ramar D (2009) Audio encryption using higher dimensional chaotic map. Int J Recent Trends Eng 1(2):103–107Google Scholar
  9. 9.
    Gong L, Liu X, Zheng F, Zhou N (2013) Flexible multiple-image encryption algorithm based on log-polar transform and double random phase encoding technique. J Modern Opt 60(13):1074–1082CrossRefGoogle Scholar
  10. 10.
    Kok CW (1997) Fast algorithm for computing discrete cosine transform. IEEE Trans Signal Process 45(3):757–760CrossRefGoogle Scholar
  11. 11.
    Kwon GR, Wang C, Lian S, Hwang SS (2012) Advanced partial encryption using watermarking and scrambling in MP3. Multimed Tools Appl 59(3):885–895CrossRefGoogle Scholar
  12. 12.
    Lian S (2008) Multimedia content encryption: techniques and applications, 7th edn. Auerbach PublicationsGoogle Scholar
  13. 13.
    Lima JB, Lima EAO, Madeiro F (2013) Image encryption based on the finite field cosine transform. Signal Process Image Commun 28(10):1537–1547CrossRefGoogle Scholar
  14. 14.
    Lima JB, Campello de Souza RM (2011) Finite field trigonometric transforms. Appl Algebra Eng Commun Comput 22(5-6):393–411MathSciNetCrossRefMATHGoogle Scholar
  15. 15.
    Madain A, Abu Dalhoum AL, Hiary H, Ortega A, Alfonseca M (2014) Audio scrambling technique based on cellular automata. Multimed Tools Appl 71(3):1803–1822CrossRefGoogle Scholar
  16. 16.
    Nibouche O, Boussakta S, Darnell M (2009) Pipeline architectures for radix-2 new Mersenne number transform. IEEE Trans Circ Syst–I: Regular Papers 56 (8):1668–1680MathSciNetCrossRefGoogle Scholar
  17. 17.
    Peng X, Cui Z, Cai L, Yu L (2003) Digital audio signal encryption with a virtual optics scheme. Optik - Int J Light Electron Opt 114(2):69–75CrossRefGoogle Scholar
  18. 18.
    Raghunandhan kR, Radhakrishna D, Sudeepa KB, Ganesh A (2013) Efficient audio encryption algorithm for online applications using transposition and multiplicative non-binary system. Int J Eng Res Technol 2(6):472–477Google Scholar
  19. 19.
    Rubanov NS, Bovbel EI, Kukharchik PD, Bodrov VJ (1998) The modified number theoretic transform over the direct sum of finite fields to compute the linear convolution. IEEE Trans Signal Process 46(3):813–817MathSciNetCrossRefGoogle Scholar
  20. 20.
    Sadek MM, Khalifa AS, Mostafa MGM (2014) Video steganography: a comprehensive review. Multimed Tools Appl. 1–32. doi: 10.1007/s11042-014-1952-z
  21. 21.
    Serag Eldin SM, Khamis SA, Mahmoud Hassanin AAI, Alsharqawy MA (2015) New audio encryption package for TV cloud computing. Int J Speech Technol 18(1):131–142CrossRefGoogle Scholar
  22. 22.
    Shih FY (2012) Multimedia security: watermarking, steganography and forensics. CRC PressGoogle Scholar
  23. 23.
    Smart N (2011) ECRYPT II yearly report on algorithms and keysizes (2010-2011). Tech. rep., European Network of Excellence in Cryptology IIGoogle Scholar
  24. 24.
    Sui L, Duan K, Liang J, Zhang Z, Meng H (2014) Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain. Opt Lasers Eng 62:139–152CrossRefGoogle Scholar
  25. 25.
    Tamori H, Yamamoto T (2009) Asymetric fragile watermarking using a number theoretic transform. IEICE Trans Fundament Electron Commun Comput Sci E92-A (3):836–838CrossRefGoogle Scholar
  26. 26.
    Wang H, Hempel M, Peng D, Sharif H, Chen HH (2010) Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Trans Multimed 12(3):215–223CrossRefGoogle Scholar
  27. 27.
    Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522CrossRefGoogle Scholar
  28. 28.
    Yan D, Wang R, Yu X, Zhu J (2012) Steganography for MP3 audio by exploiting the rule of window switching. Comput Secur 31(5):704–716CrossRefGoogle Scholar
  29. 29.
    Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recog Lett 31(5):347–354CrossRefGoogle Scholar
  30. 30.
    Zhou N, Zhang A, Zheng F, Gong L (2014) Image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152–160CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.Department of Electronics and SystemsFederal University of PernambucoRecifeBrazil

Personalised recommendations