Speech Encryption Scheme Based on Chaotic Memristor Neural Network and S-Box

被引:0
|
作者
Zhao, Dawei [1 ,2 ]
Yu, Hui [1 ,2 ,3 ]
Chen, Chuan [1 ,2 ]
Li, Lixiang [4 ]
Mi, Ling [5 ]
机构
[1] Qilu Univ Technol, Shandong Comp Sci Ctr, Key Lab Comp Power Network & Informat Secur, Minist Educ,Shandong Acad Sci, Jinan 250353, Peoples R China
[2] Shandong Fundamental Res Ctr Comp Sci, Shandong Prov Key Lab Ind Network & Informat Syst, Jinan 250014, Peoples R China
[3] Quan Cheng Lab, Jinan 250013, Peoples R China
[4] Beijing Univ Posts & Teleconununicat, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[5] Qilu Univ Technol, Sch Math & Stat, Shandong Acad Sci, Jinan 250353, Peoples R China
基金
中国国家自然科学基金;
关键词
speech encryption; memristor neural network; S-box; chaotic sequences; SYNCHRONIZATION; HYPERCHAOS; SYSTEM;
D O I
10.1007/978-981-97-9440-9_37
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this study, we propose a novel speech encryption scheme based on a chaotic memristor neural network (MNN) and S-box. Firstly, we consider a magnetic-controlled memristor model and a new MNN model, and explore the chaotic behaviors of the new MNN under different memristor strengths. By iterating the new chaotic MNN, we generate an S-box through bit AND and modulo operations. Subsequently, the original speech is converted into a one-dimensional array, which is split into an integer part array and a fractional part array. The integer part array of the above one-dimensional array is converted into a binary matrix, which is separated into two binary matrices. These two binary matrices undergo XOR operations with two chaotic sequences and a sequence generated by the S-box. We convert the obtained matrix into a new array, and perform scrambling operation on the new array by using another chaotic sequence. Then, the encrypted speech can be obtained. Finally, the proposed encryption scheme is evaluated through experimental simulations and security analyses, demonstrating its high level of security.
引用
收藏
页码:483 / 495
页数:13
相关论文
共 50 条
  • [1] FPGA Speech Encryption Realization Based on Variable S-Box and Memristor Chaotic Circuit
    Elsafty, Abdulaziz H.
    Tolba, Mohammed E.
    Said, Lobna A.
    Madian, Ahmed H.
    Radwan, Ahmed G.
    2018 30TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2018, : 152 - 155
  • [2] Hybrid Chaotic Image Encryption Scheme based on S-box and Ciphertext Feedback
    Asim, Muhammad
    Jeoti, Varun
    ICIAS 2007: INTERNATIONAL CONFERENCE ON INTELLIGENT & ADVANCED SYSTEMS, VOLS 1-3, PROCEEDINGS, 2007, : 736 - 741
  • [3] A novel memristor-based chaotic image encryption algorithm with Hash process and S-box
    Hang Shi
    Dengwei Yan
    Lidan Wang
    Shukai Duan
    The European Physical Journal Special Topics, 2022, 231 : 465 - 480
  • [4] A novel memristor-based chaotic image encryption algorithm with Hash process and S-box
    Shi, Hang
    Yan, Dengwei
    Wang, Lidan
    Duan, Shukai
    EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 2022, 231 (03): : 465 - 480
  • [5] Speech Encryption on FPGA Using a Chaotic Generator and S-Box Table
    Yassin, Heba M.
    Mohamed, Ahmed T.
    Abdel-Gawad, Ahmed H.
    Tolba, Mohammed F.
    Saleh, Hassan I.
    Madian, Ahmed H.
    Radwan, Ahmed G.
    2019 FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTATIONAL TOOLS FOR ENGINEERING APPLICATIONS (ACTEA), 2019,
  • [6] A New Scheme for Implementing S-box Based on Neural Network
    Zhang, Xia
    Chen, Fangyue
    Chen, Bo
    Cao, Zhongwei
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2015, : 571 - 576
  • [7] An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box
    Lu, Qing
    Zhu, Congxu
    Deng, Xiaoheng
    IEEE ACCESS, 2020, 8 : 25664 - 25678
  • [8] Selective image encryption scheme based on DWT, AES S-box and chaotic permutation
    Belazi, Akram
    El-Latif, Ahmed A. Abd
    Rhouma, Rhouma
    Belghith, Safya
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 606 - 610
  • [9] Image encryption algorithm based on total shuffling scheme and chaotic S-box transformation
    Hussain, Iqtadar
    Shah, Tariq
    Gondal, Muhammad Asif
    JOURNAL OF VIBRATION AND CONTROL, 2014, 20 (14) : 2133 - 2136
  • [10] A Novel Block Encryption Algorithm Based on Chaotic S-Box for Wireless Sensor Network
    Yi, Longteng
    Tong, Xiaojun
    Wang, Zhu
    Zhang, Miao
    Zhu, Honghong
    Liu, Jing
    IEEE ACCESS, 2019, 7 : 53079 - 53090