Page 104 - 2024-Vol20-Issue2
P. 104

100 |                                                              Shumran & Al-Hussein

etc.).                                                             communication technologies. Many researchers have identi-
                                                                   fied the possibility of applying nonlinear dynamics and turbu-
    In 2020, F.J. Farsana, et al [55], examined a keystream gen-   lent behaviors of a chaotic system in encryption. Among the
erated by the modified Lorenz-Hyperchaotic system, which is        important classifications mentioned in our review of this en-
used to substitute audio samples after they have been permuted     cryption system is based on advanced chaotic systems, which
using a discrete modified Henon map. The authors suggested         are divided into two types: the continuous-time system, such
that in order to eliminate any remaining intelligibility in the    as (Lorenz, Chua, and Chen,) and the discrete-time system,
transform domain, the audio file be first compressed using         such as (Henon, Arnold cat, logistic and Tent map). which
the Fast Walsh Hadamard Transform (FWHT). After that, the          has amazing qualities like unpredictable behavior, high se-
resultant file is encrypted twice. To reduce the correlation       curity, and high sensitivity to initial conditions and system
between neighboring samples, a modified discrete Henon map         parameters. We also classified them based on the synchro-
is used in the first phase of the permutation operation. The       nization method and the implementation method by FPGA or
second phase fills in the silences in the speech conversation by   Raspberry Pi. We also studied and classified encryption sys-
using a modified Lorenz hyperchaotic system for substitution       tems based on Fractional-order systems and based on Hybrid
operation. To improve the correlation between encrypted and        chaotic generator systems.
plaintext text, a mechanism for dynamic keystream genera-
tion is also introduced. An altered Henon map and perturbed                      CONFLICT OF INTEREST
Lorenz-hyperchaotic system are presented. The original and
encrypted data samples’ correlation eventually decreased as        The authors declare that they have no conflicts of interest.
a result of the modified Henon map’s maximizing of the per-
mutation operation over its seed map. The adoption of a                                 REFERENCES
hyperchaotic system removed weak chaotic trajectories and
smaller chaotic ranges, which are frequently found in chaotic       [1] E. Mosa, N. W. Messiha, O. Zahran, and F. E. Abd
systems with lower dimensions.                                           El-Samie, “Chaotic encryption of speech signals,” Inter-
                                                                         national Journal of Speech Technology, vol. 14, pp. 285–
    In 2014, Saad Najim Al Saad et al [56], proposed a hybrid            296, 2011.
system, that combines scrambling and stream cipher systems
in which four levels of the encryption process are introduced.      [2] F. Farsana and K. Gopakumar, “A novel approach for
The time domain of the frame speech signal is permutated                 speech encryption: Zaslavsky map as pseudo random
using a permutation key generated by the logistic map. The               number generator,” Procedia computer science, vol. 93,
key generation in the first level is the diffusion using random          pp. 816–823, 2016.
permutation and it is used to scramble the discrete cosine trans-
form (DCT) or separate wavelet transform (DWT) domain               [3] G. Alvarez and S. Li, “Some basic cryptographic re-
of speech signal, which is the second level of the encryption.           quirements for chaos-based cryptosystems,” Interna-
Third, the mask key generated by using the logistic map is               tional journal of bifurcation and chaos, vol. 16, no. 08,
Xored with the speech samples after taking the inverse DCT               pp. 2129–2151, 2006.
or DWT. Finally, the speech samples are permutated using
Arnold Cat Map.                                                     [4] Z. Su, G. Zhang, and J. Jiang, “Multimedia secu-
                                                                         rity: a survey of chaos-based encryption technology,”
                  III. CONCLUSION                                        Multimedia-A Multidisciplinary Approach to Complex
                                                                         Issues. InTech, pp. 99–124, 2012.
In this paper, different types of techniques used in audio en-
cryption are covered and encryption algorithms have been            [5] P. Gautam, M. D. Ansari, and S. K. Sharma, “Enhanced
classified based on traditional symmetric encryption systems             security for electronic health care information using ob-
such as, (AES), (DES), (RSA), However, the small key space               fuscation and rsa algorithm in cloud computing,” Inter-
of these systems makes them vulnerable to brute force at-                national Journal of Information Security and Privacy
tacks. Because of the high level of sample repetition and                (IJISP), vol. 13, no. 1, pp. 59–69, 2019.
the encryption signal’s bandwidth distribution, these encryp-
tion algorithms cannot be used to encrypt speech. Regarding         [6] M. D. Ansari, V. K. Gunjan, and E. Rashid, “On security
this. Numerous encryption algorithms have been developed                 and data integrity framework for cloud computing using
by researchers to keep up with the advancements in wireless              tamper-proofing,” in ICCCE 2020: Proceedings of the
                                                                         3rd International Conference on Communications and
   99   100   101   102   103   104   105   106   107   108   109