Page 92 - 2024-Vol20-Issue2
P. 92

88 |                                                                                 Shumran & Al-Hussein

Fig. 2. Block diagram of the presented methodology, adapted       is employed to fill the speech signal’s silence period, resulting
from [12].                                                        in the audio ciphertext. The primary audio signal, compres-
                                                                  sion and de-noising, and audio image conversion procedure
    The investigation for more safe and efficient ways to pre-    are the three basic components of the encryption technique.
serve speech confidentiality began after it became evident        In a memristor chaotic system, the overlapping diffusion en-
from our study of traditional encryption methods that these       cryption process and interactive channel shuffle are used to
techniques were ineffective for encrypting speech due to their    generate the mask and cipher blocks. Fig. 3. depicts the
small key space, high sampling frequency, and complicated         algorithm encryption process design.
switching process, which needed a larger processing unit and
more computation time.                                              In 2023, ShiMing Fu et al [19], examined a novel four-
                                                                  dimensional hyperchaotic system showed its fundamental
B. New Chaotic Methods:                                           dynamic behavior, such as its bifurcation diagram, equilib-
Over the past 40 years, the scientific, mathematical, and engi-   rium point stability, chaotic attractor, and Lyapunov expo-
neering communities have conducted a great deal of research       nent spectrum. To stabilize the hyperchaotic system until it
on chaos, a very fascinating and complex nonlinear phenom-        reaches equilibrium, a linear feedback control technique was
ena. Consequently, creating chaos has emerged as a prominent      presented. The efficacy of this technique was demonstrated
field of study.chaotic systems are of high importance in engi-    using both Multisim circuit simulation and embedded hard-
neering [14–16], and medical [17], applications.In this section,  ware STM32 implementation. In addition, this paper applies
a general method of chaotic encryption will be provided as        the designed hyperchaotic system to audio encryption. The
follows:                                                          cross-XOR operation method, which has a certain degree of
                                                                  complexity and is easy to implement, is used by the audio
1) Continuous Time Chaotic Systems:                               encryption algorithm. The results of the experiment demon-
In 2021, Wanying Dai et al [18], proposed an audio encryption     strate that, in the time domain, the encrypted audio sequence
algorithm based on Chen memristor chaotic system. The core        is exactly the same as the original sequence; however, in
idea of the algorithm is to encrypt the audio signal into the     the frequency domain, it appears as random noise, making
color image information. Most of the traditional audio encryp-    it impossible to decipher the actual information carried by
tion algorithms are transmitted in the form of noise, which       the audio. This demonstrates the efficacy of the hyperchaotic
makes it easy to attract the attention of attackers. To achieve   key sequence-based cross-XOR operation method for audio
greater security, the authors employed a unique encryption        encryption.
technique. First, the signal is compressed and denoised using
the Fast Walsh-Hadamard Transform (FWHT). The Discrete            An innovative 4D hyperchaotic system given by system (1)
Cosine Transform (DCT) and the Fast Fourier Transform             [19],:
(FFT) lack the good energy compression characteristics of the
FWHT. Additionally, the rectangular basis function of the Fast    dx = a(y - x) + w  (1)
Fourier Transform (FWHT) can be implemented in the digital        dt
circuit more effectively than the triangular basis function, al-  dy = cy - 10xz
lowing it to transform the reconstructed dual-channel audio       dt
signal into the R and B layers of the digital image matrix, re-   dz = -bz + 10xy
spectively. Moreover, the limited chaos range and nonuniform      dt
distribution of the periodic window problems are resolved         dw = dy + x2
by a novel Chen memristor chaotic system. Ultimately, the         dt
overlapping diffusion encryption of the cryptographic block
                                                                  the state variables in this case are x,y,z and w and the deriva-
                                                                  tives of these variables are, in turn, dx/dt,dy/dt ,dz/dt and
                                                                  dw/dt.

                                                                  In 2020, Ehab Abdul Razzaq Hussein et al. [20], Based on the
                                                                  double chaotic masking technique, an active secure commu-
                                                                  nication system was applied to the information signal. From
                                                                  this study, the following conclusions can be made:
   87   88   89   90   91   92   93   94   95   96   97