Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm

被引:3
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
Senthilrajan, A. [1 ]
机构
[1] Alagappa Univ, Dept Computat Logist, Karaikkudi, Tamilnadu, India
关键词
Chaotic maps; SHA-256 hash algorithm; Biometric image; Zigzag traversal; Audio encryption; Cryptanalysis; SECURITY; SCHEME;
D O I
10.1007/s11042-023-15289-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, Internet users who share personal and professional data are concerned about the safety of the data. Encryption is one way to safeguard sensitive and private data on internet sites. Encrypting audio data is more challenging than other types of data owing to the correlation between neighbouring samples. Encryption algorithms based on chaos theory are now widely used to protect digital audio and image data. Chaos theory is the idea that tiny changes in initial conditions will escalate into much more significant difference in the future. This paper proposes a robust and effective method for audio encryption based on chaos theory and user-biometric images. In addition, the SHA-256 hash technique and zigzag traversal are employed to bolster the system. First, the algorithm reads the sample values from the input audio and then separates them into byte blocks. In addition, each byte block is blended with chaotic sequences generated by the Henon map first, then by the Lorenz system. The chaotic sequences generated by the logistic map are used to create different initial values for the Henon map and Lorenz Systems. The initial values of the logistic map are constructed using the hash values of the plain audio signals and biometric images produced by the SHA-256 hash algorithm. The proposed method has a variety of desirable characteristics, such as good chaotic behaviour, low computational complexity, a huge key space, and substantial parameter space. The results of the various security and performance assessments show that the proposed algorithm is more robust and efficient than existing approaches against all forms of crypto-graphic threats.
引用
收藏
页码:43729 / 43758
页数:30
相关论文
共 50 条
  • [31] An Image Encryption Algorithm for New Multiple Chaos-Based
    Tong, XiaoJun
    Liu, Yang
    ADVANCES IN COMPUTER SCIENCE, ENVIRONMENT, ECOINFORMATICS, AND EDUCATION, PT 5, 2011, 218 : 88 - 93
  • [32] A new chaos-based fast image encryption algorithm
    Wang, Yong
    Wong, Kwok-Wo
    Liao, Xiaofeng
    Chen, Guanrong
    APPLIED SOFT COMPUTING, 2011, 11 (01) : 514 - 522
  • [33] Speeding Up a Chaos-Based Image Encryption Algorithm Using GPGPU
    Jose Rodriguez-Vazquez, Juan
    Romero-Sanchez, Sixto
    Cardenas-Montes, Miguel
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2011, PT I, 2012, 6927 : 592 - 599
  • [34] Cryptanalyzing a chaos-based image encryption algorithm using alternate structure
    Zhang, Leo Yu
    Li, Chengqing
    Wong, Kwok-Wo
    Shu, Shi
    Chen, Guanrong
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (09) : 2077 - 2085
  • [35] Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function
    Rahul B.
    Kuppusamy K.
    Senthilrajan A.
    Optik, 2023, 289
  • [36] Algorithm for simplifying the SHA-256 operations tree
    Plotnikov, Andrey
    Levina, Alla
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 592 - 597
  • [37] Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function
    Hlobaz, Artur
    PROCEEDINGS OF THE IEEE LCN: 2019 44TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2019), 2019, : 238 - 241
  • [38] HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256
    Kammoun, Manel
    Elleuchi, Manel
    Abid, Mohamed
    Obeid, Abdulfattah M.
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2021, 17 (02) : 87 - 96
  • [39] Comments on "DNA coding and chaos-based image encryption algorithm
    Zhang Y.
    Zhang, Yong, 2016, American Scientific Publishers (13) : 4025 - 4035
  • [40] A chaos-based image encryption algorithm with variable control parameters
    Wang, Yong
    Wong, Kwok-Wo
    Liao, Xiaofeng
    Xiang, Tao
    Chen, Guanrong
    CHAOS SOLITONS & FRACTALS, 2009, 41 (04) : 1773 - 1783