Page 91 - 2024-Vol20-Issue2
P. 91

87 |                                                            Shumran & Al-Hussein

        Fig. 1. Scheme of audio encryption techniques.          within the range given by the modulus (i.e., M lies in the range
                                                                [0, n - 1]). With their continued efforts, all of this algorithm’s
niques used in encryption processes, where we classified the    drawbacks have been eliminated, and speech communication
methods into encryption based on traditional methods such as    systems will use the RSA digital signature scheme.
(DES, AES, RSA) and encryption based on chaotic systems,
which are divided into two types: continuous-time systems           In 2016, Khalil [11], they proposed and evaluated two
such as (Lorenz, Chen, Chua) and discrete time systems such     distinct encryption/decryption algorithms that are applied to
as (Henon, Arnold Catt map, logistic map). As well as clas-     the audio signal in real-time. The first is the conventional
sifications based on different implementation methods, such     RSA encryption and decryption method, and the second is
as (FPGA, Raspberry Pi), types of synchronization systems,      a newly proposed algorithm built on the idea of symmetric
chaotic systems based on fractional order systems, and hybrid   cryptography. The suggested algorithms are simulated and
chaotic generator systems, as shown in Fig. 1.                  the real-time audio signal is obtained using the MATLAB
                                                                Simulink simulator tool. Given the mathematical nature of
                                                                the audio signal, the experimental results demonstrated that
                                                                the recommended algorithm produces an audio signal with
                                                                high quality that is identical to the original signal, while the
                                                                RSA method produces an audio signal with low quality.

                                                                    In 2020, Sura F .Yousif [12], proposed sound signal en-
                                                                cryption and decryption using the RSA algorithm. The algo-
                                                                rithm’s performance was evaluated through an experimental
                                                                implementation. Using MATLAB simulations, the results
                                                                indicated that the Cepstral Distance Measure (CD), Linear
                                                                Predicative Code Measure (LPC), and Segmental Spectral
                                                                Signal to Noise Ratio (SSSNR) reached values of 6.8781,
                                                                4.9614, and -21.5563 dB, respectively. The approach demon-
                                                                strated high intelligibility of the recovered audio signal and
                                                                was found to be safe, dependable, and effective when used in
                                                                secure audio communications. . The suggested approach is
                                                                divided into two phases: first, the audio signal is encrypted,
                                                                and then it is decrypted using the RSA algorithm. The ob-
                                                                tained voice or audio samples are encrypted at the transmitter
                                                                using the public key, which was previously produced together
                                                                with the private key. The audio samples that have been ci-
                                                                phered or encrypted are transferred one after the other across
                                                                a communication channel to the recipient, who uses the secret
                                                                key to decrypt each sample. In the interest of simplicity, it is
                                                                assumed that the communication or transmission channel is
                                                                perfect or noise-free. Fig. 2. displays the block diagram of
                                                                the approach that is being described.

A. Traditional Methods:                                             In 2016, El Bakri et al [13], the security of voice calls
In 2012,by Rahman et al [10], the authors proposed an effec-    was maintained by employing the RSA encryption technique.
tive way to encrypt and decrypt speech data using the RSA       Using an analog-to-digital converter circuit, the voice call
algorithm. The maximum number of characters that can be         is transformed from analog to digital in this method after it
encrypted at once is constrained by the requirement that the    is received from the microphone. The output signal is then
integer representation of the message to be encrypted must lie  encrypted using RSA and sent to a digital-to-analog converter
                                                                circuit to be converted back to analog. The original voice
                                                                call will be obtained by the receiver by applying the reverse
                                                                decryption procedures.
   86   87   88   89   90   91   92   93   94   95   96