Page 89 - 2024-Vol20-Issue2
P. 89

Received: 4 December 2023 | Revised: 2 February 2024 | Accepted: 3 February 2024

DOI: 10.37917/ijeee.20.2.8             Vol. 20 | Issue 2 | December 2024

                                                                                  Open Access

Iraqi Journal for Electrical and Electronic Engineering

Review Article

Study of Chaotic-based Audio Encryption Algorithms: A

                                Review

                                                     Alaa Shumran* and Abdul-Basset A. Al-Hussein
                             Electrical Engineering Department, College of Engineering University of Basrah, Basrah, Iraq

Correspondance
*Alaa Shumran
Electrical Engineering Department, University of Basrah, Basrah, Iraq
Email: pgs.alaash@uobasrah.edu.iq

  Abstract
  Nowadays, multimedia communication has become very widespread and this requires it to be protected from attackers
  and transmitted securely for reliability. Encryption and decryption techniques are useful in providing effective security
  for speech signals to ensure that these signals are transmitted with secure data and prevent third parties or the public
  from reading private messages. Due to the rapid improvement in digital communications over the recent period up to the
  present, the security of voice data transmitted over various networks has been classified as a favored field of study in
  earlier years. The contributions to audio encryption are discussed in this review. This Comprehensive review mainly
  focuses on presenting several kinds of methods for audio encryption and decryption the analysis of these methods with
  their advantages and disadvantages have been investigated thoroughly. It will be classified into encryption based on
  traditional methods and encryption based on advanced chaotic systems. They are divided into two types, continuous-time
  system, and discrete-time system, and also classified based on the synchronization method and the implementation
  method. In the fields of information and communications security, system designers face many challenges in both
  cost, performance, and architecture design, Field Programmable gate arrays (FPGAs) provide an excellent balance
  between computational power and processing flexibility. In addition, encryption methods will be classified based on
  Chaos-based Pseudo Random Bit Generator, Fractional-order systems, and hybrid chaotic generator systems, which is
  an advantageous point for this review compared with previous ones. Audio algorithms are presented, discussed, and
  compared, highlighting important advantages and disadvantages. Audio signals have a large volume and a strong
  correlation between data samples. Therefore, if traditional cryptography systems are used to encrypt such huge data,
  they gain significant overhead. Standard symmetric encryption systems also have a small key-space, which makes them
  vulnerable to attacks. On the other hand, encryption by asymmetric algorithms is not ideal due to low processing speed
  and complexity. Therefore, great importance has been given to using chaotic theory to encode audio files. Therefore,
  when proposing an appropriate encryption method to ensure a high degree of security, the key space, which is the critical
  part of every encryption system, and the key sensitivity must be taken into account. The key sensitivity is related to the
  initial values and control variables of the chaotic system chosen as the audio encryption algorithm. In addition, the
  proposed algorithm should eliminate the problems of periodic windows, such as limited chaotic range and non-uniform
  distribution, and the quality of the recovered audio signal remains good, which confirms the convenience, reliability, and
  high security.

  Keywords
  Audio encryption, chaotic systems, FPGA, Synchronization, and Fractional-order Systems.

                                                         I. INTRODUCTION

                                       Securing speech communication is critical to many businesses,
                                       including corporate, military, voice-over IP, and private voice

This is an open-access article under the terms of the Creative Commons Attribution License,
which permits use, distribution, and reproduction in any medium, provided the original work is properly cited.
©2024 The Authors.
Published by Iraqi Journal for Electrical and Electronic Engineering | College of Engineering, University of Basrah.

https://doi.org/10.37917/ijeee.20.2.8                                             |https://www.ijeee.edu.iq 85
   84   85   86   87   88   89   90   91   92   93   94