Page 104 - 2024-Vol20-Issue2
P. 104
100 | Shumran & Al-Hussein
etc.). communication technologies. Many researchers have identi-
fied the possibility of applying nonlinear dynamics and turbu-
In 2020, F.J. Farsana, et al [55], examined a keystream gen- lent behaviors of a chaotic system in encryption. Among the
erated by the modified Lorenz-Hyperchaotic system, which is important classifications mentioned in our review of this en-
used to substitute audio samples after they have been permuted cryption system is based on advanced chaotic systems, which
using a discrete modified Henon map. The authors suggested are divided into two types: the continuous-time system, such
that in order to eliminate any remaining intelligibility in the as (Lorenz, Chua, and Chen,) and the discrete-time system,
transform domain, the audio file be first compressed using such as (Henon, Arnold cat, logistic and Tent map). which
the Fast Walsh Hadamard Transform (FWHT). After that, the has amazing qualities like unpredictable behavior, high se-
resultant file is encrypted twice. To reduce the correlation curity, and high sensitivity to initial conditions and system
between neighboring samples, a modified discrete Henon map parameters. We also classified them based on the synchro-
is used in the first phase of the permutation operation. The nization method and the implementation method by FPGA or
second phase fills in the silences in the speech conversation by Raspberry Pi. We also studied and classified encryption sys-
using a modified Lorenz hyperchaotic system for substitution tems based on Fractional-order systems and based on Hybrid
operation. To improve the correlation between encrypted and chaotic generator systems.
plaintext text, a mechanism for dynamic keystream genera-
tion is also introduced. An altered Henon map and perturbed CONFLICT OF INTEREST
Lorenz-hyperchaotic system are presented. The original and
encrypted data samples’ correlation eventually decreased as The authors declare that they have no conflicts of interest.
a result of the modified Henon map’s maximizing of the per-
mutation operation over its seed map. The adoption of a REFERENCES
hyperchaotic system removed weak chaotic trajectories and
smaller chaotic ranges, which are frequently found in chaotic [1] E. Mosa, N. W. Messiha, O. Zahran, and F. E. Abd
systems with lower dimensions. El-Samie, “Chaotic encryption of speech signals,” Inter-
national Journal of Speech Technology, vol. 14, pp. 285–
In 2014, Saad Najim Al Saad et al [56], proposed a hybrid 296, 2011.
system, that combines scrambling and stream cipher systems
in which four levels of the encryption process are introduced. [2] F. Farsana and K. Gopakumar, “A novel approach for
The time domain of the frame speech signal is permutated speech encryption: Zaslavsky map as pseudo random
using a permutation key generated by the logistic map. The number generator,” Procedia computer science, vol. 93,
key generation in the first level is the diffusion using random pp. 816–823, 2016.
permutation and it is used to scramble the discrete cosine trans-
form (DCT) or separate wavelet transform (DWT) domain [3] G. Alvarez and S. Li, “Some basic cryptographic re-
of speech signal, which is the second level of the encryption. quirements for chaos-based cryptosystems,” Interna-
Third, the mask key generated by using the logistic map is tional journal of bifurcation and chaos, vol. 16, no. 08,
Xored with the speech samples after taking the inverse DCT pp. 2129–2151, 2006.
or DWT. Finally, the speech samples are permutated using
Arnold Cat Map. [4] Z. Su, G. Zhang, and J. Jiang, “Multimedia secu-
rity: a survey of chaos-based encryption technology,”
III. CONCLUSION Multimedia-A Multidisciplinary Approach to Complex
Issues. InTech, pp. 99–124, 2012.
In this paper, different types of techniques used in audio en-
cryption are covered and encryption algorithms have been [5] P. Gautam, M. D. Ansari, and S. K. Sharma, “Enhanced
classified based on traditional symmetric encryption systems security for electronic health care information using ob-
such as, (AES), (DES), (RSA), However, the small key space fuscation and rsa algorithm in cloud computing,” Inter-
of these systems makes them vulnerable to brute force at- national Journal of Information Security and Privacy
tacks. Because of the high level of sample repetition and (IJISP), vol. 13, no. 1, pp. 59–69, 2019.
the encryption signal’s bandwidth distribution, these encryp-
tion algorithms cannot be used to encrypt speech. Regarding [6] M. D. Ansari, V. K. Gunjan, and E. Rashid, “On security
this. Numerous encryption algorithms have been developed and data integrity framework for cloud computing using
by researchers to keep up with the advancements in wireless tamper-proofing,” in ICCCE 2020: Proceedings of the
3rd International Conference on Communications and