Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm

被引:3
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
Senthilrajan, A. [1 ]
机构
[1] Alagappa Univ, Dept Computat Logist, Karaikkudi, Tamilnadu, India
关键词
Chaotic maps; SHA-256 hash algorithm; Biometric image; Zigzag traversal; Audio encryption; Cryptanalysis; SECURITY; SCHEME;
D O I
10.1007/s11042-023-15289-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, Internet users who share personal and professional data are concerned about the safety of the data. Encryption is one way to safeguard sensitive and private data on internet sites. Encrypting audio data is more challenging than other types of data owing to the correlation between neighbouring samples. Encryption algorithms based on chaos theory are now widely used to protect digital audio and image data. Chaos theory is the idea that tiny changes in initial conditions will escalate into much more significant difference in the future. This paper proposes a robust and effective method for audio encryption based on chaos theory and user-biometric images. In addition, the SHA-256 hash technique and zigzag traversal are employed to bolster the system. First, the algorithm reads the sample values from the input audio and then separates them into byte blocks. In addition, each byte block is blended with chaotic sequences generated by the Henon map first, then by the Lorenz system. The chaotic sequences generated by the logistic map are used to create different initial values for the Henon map and Lorenz Systems. The initial values of the logistic map are constructed using the hash values of the plain audio signals and biometric images produced by the SHA-256 hash algorithm. The proposed method has a variety of desirable characteristics, such as good chaotic behaviour, low computational complexity, a huge key space, and substantial parameter space. The results of the various security and performance assessments show that the proposed algorithm is more robust and efficient than existing approaches against all forms of crypto-graphic threats.
引用
收藏
页码:43729 / 43758
页数:30
相关论文
共 50 条
  • [21] Implementation of Efficient SHA-256 Hash Algorithm for Secure Vehicle Communication using FPGA
    Jeong, Chanbok
    Kim, Youngmin
    2014 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2014, : 224 - 225
  • [22] A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps
    Aqeel-ur-Rehman
    Liao, Xiaofeng
    Kulsoom, Ayesha
    Ullah, Sami
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (18) : 11241 - 11266
  • [23] A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps
    Xiaofeng Aqeel-ur-Rehman
    Ayesha Liao
    Sami Kulsoom
    Multimedia Tools and Applications, 2016, 75 : 11241 - 11266
  • [24] FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256
    Algredo-Badillo, I.
    Feregrino-Uribe, C.
    Cumplido, R.
    Morales-Sandoval, M.
    MICROPROCESSORS AND MICROSYSTEMS, 2013, 37 (6-7) : 750 - 757
  • [25] Blockchain Based Email Communication with SHA-256 Algorithm
    Beevi, L. Sherin
    Vijayalakshmi, R.
    Ilampiray, P.
    Priya, K. Hema
    UBIQUITOUS INTELLIGENT SYSTEMS, 2022, 302 : 455 - 466
  • [26] Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL
    Bensalem, Hachem
    Blaquiere, Yves
    Savaria, Yvon
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [27] Analysis and improvement of a chaos-based image encryption algorithm
    Xiao, Di
    Liao, Xiaofeng
    Wei, Pengcheng
    CHAOS SOLITONS & FRACTALS, 2009, 40 (05) : 2191 - 2199
  • [28] DNA Coding and Chaos-Based Image Encryption Algorithm
    Zhang, Qiang
    Liu, Lili
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2013, 10 (02) : 341 - 346
  • [29] FPGA implementation of a chaos-based image encryption algorithm
    Maazouz, Mohamed
    Toubal, Abdelmoughni
    Bengherbia, Billel
    Houhou, Oussama
    Batel, Noureddine
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 9926 - 9941
  • [30] Security analysis of a chaos-based image encryption algorithm
    Lian, SG
    Sun, JS
    Wang, ZQ
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2005, 351 (2-4) : 645 - 661