Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm

被引:3
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
Senthilrajan, A. [1 ]
机构
[1] Alagappa Univ, Dept Computat Logist, Karaikkudi, Tamilnadu, India
关键词
Chaotic maps; SHA-256 hash algorithm; Biometric image; Zigzag traversal; Audio encryption; Cryptanalysis; SECURITY; SCHEME;
D O I
10.1007/s11042-023-15289-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, Internet users who share personal and professional data are concerned about the safety of the data. Encryption is one way to safeguard sensitive and private data on internet sites. Encrypting audio data is more challenging than other types of data owing to the correlation between neighbouring samples. Encryption algorithms based on chaos theory are now widely used to protect digital audio and image data. Chaos theory is the idea that tiny changes in initial conditions will escalate into much more significant difference in the future. This paper proposes a robust and effective method for audio encryption based on chaos theory and user-biometric images. In addition, the SHA-256 hash technique and zigzag traversal are employed to bolster the system. First, the algorithm reads the sample values from the input audio and then separates them into byte blocks. In addition, each byte block is blended with chaotic sequences generated by the Henon map first, then by the Lorenz system. The chaotic sequences generated by the logistic map are used to create different initial values for the Henon map and Lorenz Systems. The initial values of the logistic map are constructed using the hash values of the plain audio signals and biometric images produced by the SHA-256 hash algorithm. The proposed method has a variety of desirable characteristics, such as good chaotic behaviour, low computational complexity, a huge key space, and substantial parameter space. The results of the various security and performance assessments show that the proposed algorithm is more robust and efficient than existing approaches against all forms of crypto-graphic threats.
引用
收藏
页码:43729 / 43758
页数:30
相关论文
共 50 条
  • [1] Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm
    B. Rahul
    K. Kuppusamy
    A. Senthilrajan
    Multimedia Tools and Applications, 2023, 82 : 43729 - 43758
  • [2] A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256
    Zhu, Shuqin
    Zhu, Congxu
    Wang, Wenhong
    ENTROPY, 2018, 20 (09)
  • [3] Symmetric Chaos-Based Image Encryption Technique on Image Bit-Planes using SHA-256
    Bhadke, Abhilash Ashok
    Kannaiyan, Surender
    Kamble, Vipin
    2018 TWENTY FOURTH NATIONAL CONFERENCE ON COMMUNICATIONS (NCC), 2018,
  • [4] A Novel Chaotic Image Encryption Algorithm Based on Coordinate Descent and SHA-256
    Sun, Xiyu
    Chen, Zhong
    IEEE ACCESS, 2022, 10 : 114597 - 114611
  • [5] A Novel Chaotic Image Encryption Algorithm Based on Coordinate Descent and SHA-256
    Sun, Xiyu
    Chen, Zhong
    IEEE Access, 2022, 10 : 114597 - 114611
  • [6] A Fast Chaos-Based Colour Image Encryption Algorithm Using a Hash Function
    Fu, Chong
    Zhang, Gao-Yuan
    Zhu, Mai
    Chen, Jun-Xin
    Lei, Wei-Min
    INFORMATICA, 2018, 29 (04) : 651 - 673
  • [7] A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2
    R. Guesmi
    M. A. B. Farah
    A. Kachouri
    M. Samet
    Nonlinear Dynamics, 2016, 83 : 1123 - 1136
  • [8] A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2
    Guesmi, R.
    Farah, M. A. B.
    Kachouri, A.
    Samet, M.
    NONLINEAR DYNAMICS, 2016, 83 (03) : 1123 - 1136
  • [9] Chaos-based image hybrid encryption algorithm using key stretching and hash feedback
    Liu, Hongjun
    Xu, Yanqiu
    Ma, Chao
    OPTIK, 2020, 216
  • [10] Chaos-based image encryption algorithm
    Guan, ZH
    Huang, FJ
    Guan, WJ
    PHYSICS LETTERS A, 2005, 346 (1-3) : 153 - 157