Skip to main content
Log in

FPGA realization of a speech encryption system based on a generalized modified chaotic transition map and bit permutation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a generalized modified chaotic transition map with three independent parameters. A hardware speech encryption scheme utilizing this map along with a bit permutation network is presented. While the transition map’s generalization introduces additional parameters, the modification enhances its chaotic properties and overcomes the finite range of the control parameter and dynamical degradation problems. The modification also presents a simplification for the hardware realization of the exponentiation operation in the map’s equation because the modified output range allows conversion from the linear domain to the Logarithmic Number System (LNS). Mathematical analysis of the map is presented, where exact nonlinear expressions of the dependent parameters are derived and validated through simulations. To further simplify the hardware realization, the complicated nonlinear expressions are linearized and the introduced approximation error is quite acceptable. The encryption scheme is simulated using Xilinx ISE 14.7 and realized on Xilinx Nexys 4 Artix-7 FPGA with a throughput of 1.526 Gbit/sec. The security and efficiency of the hardware speech encryption scheme are validated and the performance is compared with recent works that provided experimental results on Pseudo-Random Number Generation (PRNG) and speech encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. The history place - great speeches collection: Ronald reagan speech “tear down this wall” (audio), accessed (2018). http://www.historyplace.com/speeches/reagan-tear-down.htm

  2. ITU-T test signals for telecommunication systems, Test vectors associated to Rec. ITU-T P.501, accessed (2018), https://www.itu.int/net/itu-t/sigdb/genaudio/AudioForm-g.aspx?val=10000501

  3. We shall fight on the beaches (audio), accessed (2018). https://www.winstonchurchill.org/resources/speeches/1940-the-finest-hour/we-shall-never-surrender/

  4. A Al-Juaid N, A Gutub A, A Khan E et al (2018) Enhancing pc data security via combining rsa cryptography and video based steganography. Journal of Information Security and Cybercrimes Research (JISCR) 1(1):8–18

    Google Scholar 

  5. Abd-El-Hafiz SK, Radwan AG, AbdEl-Haleem SH (2015) Encryption applications of a generalized chaotic map. Appl Math Inf Sci 9(6):3215

    MathSciNet  Google Scholar 

  6. Alassaf N, Alkazemi B, Gutub A (2003) Applicable light-weight cryptography to secure medical data in iot systems. Journal of Research in Engineering and Applied Sciences (JREAS) 2(2):50–58

    Google Scholar 

  7. Alligood KT, Sauer TD, Yorke JA (1996) Chaos: an introduction to dynamical systems. Springer, Berlin

    Book  MATH  Google Scholar 

  8. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16(08):2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  9. Azzaz MS, Tanougast C, Sadoudi S, Dandache A (2011) New hardware cryptosystem based chaos for the secure real-time of embedded applications. In: 2011 IEEE workshop on signal processing systems (siPS), pp 251–254. IEEE

  10. Azzaz MS, Tanougast C, Sadoudi S, Bouridane A (2013) Synchronized hybrid chaotic generators: application to real-time wireless speech encryption. Commun Nonlinear Sci Numer Simul 18(8):2035–2047

    Article  MathSciNet  MATH  Google Scholar 

  11. Barakat ML, Mansingka AS, Radwan AG, Salama KN (2013) Generalized hardware post-processing technique for chaos-based pseudorandom number generators. ETRI J 35(3):448–458

    Article  Google Scholar 

  12. de la Fraga LG, Torres-Pérez E, Tlelo-Cuautle E, Mancillas-López C (2017) Hardware implementation of pseudo-random number generators based on chaotic maps. Nonlinear Dyn 90(3):1661–1670

    Article  Google Scholar 

  13. George SN, Augustine N, Pattathil DP (2015) Audio security through compressive sampling and cellular automata. Multimedia Tools Appl 74(23):10393–10417

    Article  Google Scholar 

  14. Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security IGI Global

  15. Gutub A, Ibrahim MK, Araman MA (2004) Super pipelined digit serial adders for multimedia and e-security. In: International computer engineering conference on new technologies for the information society (ICENCO), pp 558–561

  16. Gutub A, Tahhan H (2003) Improving cryptographic architectures by adopting efficient adders in their modular multiplication hardware vlsi. In: 9Th annual gulf internet symposium

  17. Gutub AAA (2011) Subthreshold sram designs for cryptography security computations. In: International conference on software engineering and computer systems. Springer, pp 104–110

  18. Gutub AAA, Khan EA (2011) Using subthreshold sram to design low-power crypto hardware. International Journal of New Computer Architectures and their Applications (IJNCAA) 1(2):474–483

    Google Scholar 

  19. Gutub AAA, Khan FAA (2012) Hybrid crypto hardware utilizing symmetric-key and public-key cryptosystems. In: 2012 international conference on Advanced computer science applications and technologies (ACSAT). IEEE, pp 116–121

  20. Hamdi M, Rhouma R, Belghith S (2017) An appropriate system for securing real-time voice communication based on adpcm coding and chaotic maps. Multimedia Tools Appl 76(5):7105–7128

    Article  Google Scholar 

  21. Hermassi H, Hamdi M, Rhouma R, Belghith SM (2017) A joint encryption-compression codec for speech signals using the ITU-t g. 711 standard and chaotic map. Multimedia Tools Appl 76(1):1177–1200

    Article  Google Scholar 

  22. Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412:223–241

    Article  Google Scholar 

  23. Ismail SM, Said LA, Rezk AA, Radwan AG, Madian AH, Abu-Elyazeed MF, Soliman AM (2017) Generalized fractional logistic map encryption system based on FPGA. AEU Int J Electron Commun 80:114–126

    Article  Google Scholar 

  24. Kak SC, Jayant N (1977) On speech encryption using waveform scrambling. Bell Syst Tech J 56(5):781–808

    Article  Google Scholar 

  25. Kim H, Nam BG, Sohn JH, Woo JH, Yoo HJ (2006) A 231-MHz, 2.18-mW 32-bit logarithmic arithmetic unit for fixed-point 3-D graphics system. IEEE J Solid-State Circ 41(11):2373–2381

    Article  Google Scholar 

  26. Klinefelter A, Ryan J, Tschanz J, Calhoun BH (2015) Error-energy analysis of hardware logarithmic approximation methods for low power applications. In: 2015 IEEE International Symposium on Circuits and systems (ISCAS). IEEE, pp 2361–2364

  27. Korn GA, Korn TM (2000) Mathematical handbook for scientists and engineers: definitions, theorems, and formulas for reference and review Courier Corporation

  28. Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25 (8):2201–2210

    Article  Google Scholar 

  29. Li J, Li J, Chen X, Jia C, Lou W (2015a) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437

    Article  MathSciNet  MATH  Google Scholar 

  30. Li J, Li YK, Chen X, Lee PP, Lou W (2015b) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216

    Article  Google Scholar 

  31. Li P, Li J, Huang Z, Li T, Gao CZ, Yiu SM, Chen K (2017) Multi-key privacy-preserving deep learning in cloud computing. Futur Gener Comput Syst 74:76–85

    Article  Google Scholar 

  32. Lian S (2008) Multimedia content encryption: techniques and applications. CRC Press, Boca Raton

    Book  MATH  Google Scholar 

  33. Lima JB, da Silva Neto EF (2016) Audio encryption based on the cosine number transform. Multimedia Tools Appl 75(14):8403–8418

    Article  Google Scholar 

  34. Mitchell JN (1962) Computer multiplication and division using binary logarithms. IRE Transactions on Electronic Computers EC-11(4):512–517

    Article  MathSciNet  MATH  Google Scholar 

  35. Mosa E, Messiha NW, Zahran O, El-Samie FEA (2011) Chaotic encryption of speech signals. Int J Speech Technol 14(4):285

    Article  Google Scholar 

  36. Pande A, Zambreno J (2013) A chaotic encryption scheme for real-time embedded systems: design and implementation. Telecommun Syst 52:1–11

    Article  Google Scholar 

  37. Pedre S, Krajník T, Todorovich E, Borensztejn P (2016) Accelerating embedded image processing for real time: a case study. J Real-Time Image Process 11 (2):349–374

    Article  Google Scholar 

  38. Pineiro JA, Ercegovac MD, Bruguera JD (2004) Algorithm and architecture for logarithm, exponential, and powering computation. IEEE Trans Comput 53(9):1085–1096

    Article  Google Scholar 

  39. Radwan AG, Abd-El-Hafiz SK (2013) Image encryption using generalized tent map. In: IEEE 20Th international conference on electronics, circuits, and systems (ICECS). IEEE, pp 653–656

  40. Radwan AG, Abd-El-Hafiz SK, AbdElHaleem SH (2014) An image encryption system based on generalized discrete maps. In: IEEE International conference on electronics, circuits and systems (ICECS), 21st. IEEE, pp 283–286

  41. Radwan AG, AbdElHaleem SH, Abd-El-Hafiz SK (2015) Symmetric encryption algorithms using chaotic and non-chaotic generators: a review Journal of Advanced Research

  42. Sadr A, Okhovat RS (2015) Security in the speech cryptosystem based on blind sources separation. Multimedia Tools Appl 74(21):9715–9728

    Article  Google Scholar 

  43. Sayed WS, Fahmy HA, Rezk AA, Radwan AG (2017a) Generalized smooth transition map between tent and logistic maps. Int J Bifurcation and Chaos 27 (01):1730004

    Article  MathSciNet  MATH  Google Scholar 

  44. Sayed WS, Radwan AG, Fahmy HA (2015a) Design of a generalized bidirectional tent map suitable for encryption applications. In: 11Th international computer engineering conference (ICENCO). IEEE, pp 207–211

  45. Sayed WS, Radwan AG, Fahmy HA (2015b) Design of positive, negative, and alternating sign generalized logistic maps. Discret Dyn Nat Soc 2015

  46. Sayed WS, Radwan AG, Rezk AA, Fahmy HA (2017b) Finite precision logistic map between computational efficiency and accuracy with encryption applications. Complexity 2017

  47. Sheikh F, Mathew SK, Anders MA, Kaul H, Hsu SK, Agarwal A, Krishnamurthy RK, Borkar S (2013) A 2.05 GVertices/s 151 mW lighting accelerator for 3D graphics vertex and pixel shading in 32 nm CMOS. IEEE J Solid-State Circ 48 (1):128–139

    Article  Google Scholar 

  48. Sheu LJ (2011) A speech encryption using fractional chaotic systems. Nonlinear Dyn 65(1):103–108

    Article  MathSciNet  MATH  Google Scholar 

  49. Stouraitis T, Paliouras V (2001) Considering the alternatives in low-power design. IEEE Circ Devices Mag 17(4):22–29

    Article  Google Scholar 

  50. Strogatz SH (2014) Nonlinear dynamics and chaos: with applications to physics, biology, chemistry, and engineering, Westview Press, Boulder

  51. Tolba MF, AbdelAty AM, Soliman NS, Said LA, Madian AH, Azar AT, Radwan AG (2017) FPGA implementation of two fractional order chaotic systems. AEU-Int J Electron Commun 78:162–172

    Article  Google Scholar 

  52. Vaidyanathan S (2013) A new six-term 3-d chaotic system with an exponential nonlinearity. Far East J Math Sci 79(1):135

    MATH  Google Scholar 

  53. Yu C, Li J, Li X, Ren X, Gupta B (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimedia Tools Appl 77(4):4585–4608

    Article  Google Scholar 

  54. Zeng L, Zhang X, Chen L, Fan Z, Wang Y (2012) Scrambling-based speech encryption via compressed sensing. EURASIP J Adv Sig Process 2012(1):257

    Article  Google Scholar 

  55. Zhao B, Qi C (2016) Chaotic signal generator design based on discrete system. J Inf Hiding Multimed Sig Process 7(1):50–58

    MathSciNet  Google Scholar 

  56. Zhao H, He S, Chen Z, Zhang X (2014) Dual key speech encryption algorithm based underdetermined BSS. The Scientific World Journal 2014

  57. Zidan MA, Radwan AG, Salama KN (2012) Controllable V-shape multiscroll butterfly attractor: system and circuit implementation. Int J Bifurcation Chaos 22(6):125–143

    Article  MATH  Google Scholar 

Download references

Acknowledgements

This research was supported financially by Cairo University, Egypt, research project no. 16-120.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wafaa S. Sayed.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sayed, W.S., Tolba, M.F., Radwan, A.G. et al. FPGA realization of a speech encryption system based on a generalized modified chaotic transition map and bit permutation. Multimed Tools Appl 78, 16097–16127 (2019). https://doi.org/10.1007/s11042-018-6946-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6946-9

Keywords

Navigation