Speech Encryption Scheme Based on Chaotic Memristor Neural Network and S-Box

被引:0
|
作者
Zhao, Dawei [1 ,2 ]
Yu, Hui [1 ,2 ,3 ]
Chen, Chuan [1 ,2 ]
Li, Lixiang [4 ]
Mi, Ling [5 ]
机构
[1] Qilu Univ Technol, Shandong Comp Sci Ctr, Key Lab Comp Power Network & Informat Secur, Minist Educ,Shandong Acad Sci, Jinan 250353, Peoples R China
[2] Shandong Fundamental Res Ctr Comp Sci, Shandong Prov Key Lab Ind Network & Informat Syst, Jinan 250014, Peoples R China
[3] Quan Cheng Lab, Jinan 250013, Peoples R China
[4] Beijing Univ Posts & Teleconununicat, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[5] Qilu Univ Technol, Sch Math & Stat, Shandong Acad Sci, Jinan 250353, Peoples R China
基金
中国国家自然科学基金;
关键词
speech encryption; memristor neural network; S-box; chaotic sequences; SYNCHRONIZATION; HYPERCHAOS; SYSTEM;
D O I
10.1007/978-981-97-9440-9_37
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this study, we propose a novel speech encryption scheme based on a chaotic memristor neural network (MNN) and S-box. Firstly, we consider a magnetic-controlled memristor model and a new MNN model, and explore the chaotic behaviors of the new MNN under different memristor strengths. By iterating the new chaotic MNN, we generate an S-box through bit AND and modulo operations. Subsequently, the original speech is converted into a one-dimensional array, which is split into an integer part array and a fractional part array. The integer part array of the above one-dimensional array is converted into a binary matrix, which is separated into two binary matrices. These two binary matrices undergo XOR operations with two chaotic sequences and a sequence generated by the S-box. We convert the obtained matrix into a new array, and perform scrambling operation on the new array by using another chaotic sequence. Then, the encrypted speech can be obtained. Finally, the proposed encryption scheme is evaluated through experimental simulations and security analyses, demonstrating its high level of security.
引用
收藏
页码:483 / 495
页数:13
相关论文
共 50 条
  • [31] Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation
    Sharma, Pankaj Kumar
    Ahmad, Musheer
    Khan, Parvez Mahmood
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 173 - 181
  • [32] S-Box Based Image Encryption Application Using a Chaotic System without Equilibrium
    Wang, Xiong
    Cavusoglu, Unal
    Kacar, Sezgin
    Akgul, Akif
    Viet-Thanh Pham
    Jafari, Sajad
    Alsaadi, Fawaz E.
    Xuan Quynh Nguyen
    APPLIED SCIENCES-BASEL, 2019, 9 (04):
  • [33] Image encryption algorithm based on hyper-chaotic system and dynamic S-box
    Liu, Yang
    Tong, Xiaojun
    Ma, Jing
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (13) : 7739 - 7759
  • [34] Construction of S-box based on chaotic Boolean functions and its application in image encryption
    Khan, Majid
    Shah, Tariq
    Batool, Syeda Iram
    NEURAL COMPUTING & APPLICATIONS, 2016, 27 (03): : 677 - 685
  • [35] An efficient image encryption scheme integrating chaotic keystream generator with S-box and triangular block scrambling
    Chen, Su-hua
    Gong, Jue
    Gong, Li-hua
    Wang, Meng-meng
    JOURNAL OF MODERN OPTICS, 2024, 71 (1-3) : 82 - 99
  • [36] A Lightweight Image Encryption Algorithm Based on a Dual Chaotic System and Dynamic S-box
    Chen, Rui-Hong
    Zhang, Qiu-Yu
    Meng, Ling-Tao
    Liu, Yi-Lin
    International Journal of Network Security, 2024, 26 (02) : 270 - 284
  • [37] A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System
    Han Y.
    He Y.
    Liu P.
    Zhang D.
    Wang Z.
    He W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2147 - 2157
  • [38] An image encryption algorithm using a dynamic S-box and chaotic maps
    Zheng, Jiming
    Zeng, Qingxia
    APPLIED INTELLIGENCE, 2022, 52 (13) : 15703 - 15717
  • [39] An Image Encryption Algorithm Using Cascade Chaotic Map and S-Box
    Zheng, Jiming
    Bao, Tianyu
    ENTROPY, 2022, 24 (12)
  • [40] An image encryption algorithm using a dynamic S-box and chaotic maps
    Jiming Zheng
    Qingxia Zeng
    Applied Intelligence, 2022, 52 : 15703 - 15717