Chaos-based joint speech encryption scheme using SHA-1

被引:0
|
作者
Gurvir Kaur
Kuldeepak Singh
Harsimranjit Singh Gill
机构
[1] Guru Nanak Dev Engineering College,Research Scholar, Department of Electronics and Communication
[2] Guru Nanak Dev Engineering College,Department of Electronics and Communication
来源
关键词
Speech-signal; One-dimensional chaotic maps; Three-dimensional chaos map; SHA-1; Blowfish;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, the speech signal is encrypted using multiple chaotic maps and cryptographic protocols. The input signal is fragmented and scrambled into four segments using cubic map. In order to make the signal invulnerable against attacks, scrambled signal is processed through various one-dimensional chaotic maps like cubic, logistic, skew-tent, and quadratic map. All chaotic maps are employed to provide an encryption at transmitter side; however, reversal of the same is carried out at other end. To protect the various parameters of all chaotic techniques, blowfish algorithm is employed with the private key. On top of that, additional layer of security is provided through hashing algorithm for authentication of shared data and the blowfish key of system between two ends. The computed message digest of secure hash algorithm should be same for successful communication, which authenticates and verify the parameters of chaotic maps. Furthermore, several tests have been performed on 8 KHz secured speech signal such as signal-to-noise ratio, power-spectral density, peak signal-to-noise ratio, and correlation test in order to check the efficiency of proposed system. The various statistical tests and analysis of adversary model validates the encryption model and embraces stronger security, thus making it as invulnerable to the attacks of intruder. The result promises that presented technique is extremely secure, provides end-to-end encryption and can be utilized in a real time speech communication.
引用
收藏
页码:10927 / 10947
页数:20
相关论文
共 50 条
  • [1] Chaos-based joint speech encryption scheme using SHA-1
    Kaur, Gurvir
    Singh, Kuldeepak
    Gill, Harsimranjit Singh
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (07) : 10927 - 10947
  • [2] A chaos-based joint image compression and encryption scheme using DCT and SHA-1
    Yuen, Ching-Hung
    Wong, Kwok-Wo
    [J]. APPLIED SOFT COMPUTING, 2011, 11 (08) : 5092 - 5098
  • [3] A Modified Chaos-Based Joint Compression and Encryption Scheme
    Chen, Jianyong
    Zhou, Junwei
    Wong, Kwok-Wo
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2011, 58 (02) : 110 - 114
  • [4] A novel image encryption scheme using chaos, hyper-chaos systems and the Secure Hash Algorithm SHA-1
    Ben Slimane, Nabil
    Bouallegue, Kais
    Machhout, Mohsen
    [J]. 2017 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND DIAGNOSIS (ICCAD), 2017, : 141 - 145
  • [5] A Chaos-Based Joint Compression and Encryption Scheme for Streaming data
    Chang, Yu-Jung
    Lin, Yu-Chen
    Hsieh, Yung-Chen
    Hsueh, Chih-Wen
    Wu, Ja-Ling
    [J]. 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [6] CRYPTANALYSIS OF A CHAOS-BASED ENCRYPTION SCHEME
    Ergun, Salih
    [J]. 2017 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2017), 2017, : 474 - 479
  • [7] Chaos-Based Hardware Speech Encryption Scheme Using Modified Tent Map and Bit Permutation
    Tolba, Mohammed F.
    Sayed, Wafaa S.
    Radwan, Ahmed G.
    Abd-El-Hafiz, Salwa K.
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON MODERN CIRCUITS AND SYSTEMS TECHNOLOGIES (MOCAST), 2018,
  • [8] An improved chaos-based image encryption scheme
    Fu, Chong
    Zhang, Zhen-chuan
    Chen, Ying
    Wang, Xing-wei
    [J]. COMPUTATIONAL SCIENCE - ICCS 2007, PT 1, PROCEEDINGS, 2007, 4487 : 575 - +
  • [9] A novel chaos-based image encryption scheme
    Dascalescu, Ana Cristina
    Boriga, Radu
    Miitailescu, Marius Iulian
    [J]. ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2014, 41 (01): : 47 - 58
  • [10] A ROBUST CHAOS-BASED IMAGE ENCRYPTION SCHEME
    Li, Weihai
    Yu, Nenghai
    [J]. ICME: 2009 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-3, 2009, : 1034 - 1037