Cover
Vol. 20 No. 2 (2024)

Published: December 31, 2024

Pages: 85-103

Review Article

Study of Chaotic-based Audio Encryption Algorithms: A Review

Abstract

Nowadays, multimedia communication has become very widespread and this requires it to be protected from attackers and transmitted securely for reliability. Encryption and decryption techniques are useful in providing effective security for speech signals to ensure that these signals are transmitted with secure data and prevent third parties or the public from reading private messages. Due to the rapid improvement in digital communications over the recent period up to the present, the security of voice data transmitted over various networks has been classified as a favored field of study in earlier years. The contributions to audio encryption are discussed in this review. This Comprehensive review mainly focuses on presenting several kinds of methods for audio encryption and decryption the analysis of these methods with their advantages and disadvantages have been investigated thoroughly. It will be classified into encryption based on traditional methods and encryption based on advanced chaotic systems. They are divided into two types, continuous-time system, and discrete-time system, and also classified based on the synchronization method and the implementation method. In the fields of information and communications security, system designers face many challenges in both cost, performance, and architecture design, Field Programmable gate arrays (FPGAs) provide an excellent balance between computational power and processing flexibility. In addition, encryption methods will be classified based on Chaos-based Pseudo Random Bit Generator, Fractional-order systems, and hybrid chaotic generator systems, which is an advantageous point for this review compared with previous ones. Audio algorithms are presented, discussed, and compared, highlighting important advantages and disadvantages. Audio signals have a large volume and a strong correlation between data samples. Therefore, if traditional cryptography systems are used to encrypt such huge data, they gain significant overhead. Standard symmetric encryption systems also have a small key-space, which makes them vulnerable to attacks. On the other hand, encryption by asymmetric algorithms is not ideal due to low processing speed and complexity. Therefore, great importance has been given to using chaotic theory to encode audio files. Therefore, when proposing an appropriate encryption method to ensure a high degree of security, the key space, which is the critical part of every encryption system, and the key sensitivity must be taken into account. The key sensitivity is related to the initial values and control variables of the chaotic system chosen as the audio encryption algorithm. In addition, the proposed algorithm should eliminate the problems of periodic windows, such as limited chaotic range and non-uniform distribution, and the quality of the recovered audio signal remains good, which confirms the convenience, reliability, and high security.

References

  1. E. Mosa, N. W. Messiha, O. Zahran, and F. E. Abd El-Samie, “Chaotic encryption of speech signals,” Inter- national Journal of Speech Technology, vol. 14, pp. 285–
  2. 296, 2011.
  3. F. Farsana and K. Gopakumar, “A novel approach for speech encryption: Zaslavsky map as pseudo random number generator,” Procedia computer science, vol. 93, pp. 816–823, 2016.
  4. G. Alvarez and S. Li, “Some basic cryptographic re- quirements for chaos-based cryptosystems,” Interna- tional journal of bifurcation and chaos, vol. 16, no. 08, pp. 2129–2151, 2006.
  5. Z. Su, G. Zhang, and J. Jiang, “Multimedia secu- rity: a survey of chaos-based encryption technology,” Multimedia-A Multidisciplinary Approach to Complex Issues. InTech, pp. 99–124, 2012.
  6. P. Gautam, M. D. Ansari, and S. K. Sharma, “Enhanced security for electronic health care information using ob- fuscation and rsa algorithm in cloud computing,” Inter- national Journal of Information Security and Privacy (IJISP), vol. 13, no. 1, pp. 59–69, 2019.
  7. M. D. Ansari, V. K. Gunjan, and E. Rashid, “On security and data integrity framework for cloud computing using tamper-proofing,” in ICCCE 2020: Proceedings of the
  8. 3rd International Conference on Communications and Cyber Physical Engineering, pp. 1419–1427, Springer, 2021.
  9. W. Dutta, S. Mitra, and S. Kalaivani, “Audio encryption and decryption algorithm in image format for secured communication,” in 2017 International Conference on Inventive Computing and Informatics (ICICI), pp. 517–521, IEEE, 2017.
  10. M. Kalpana, K. Ratnavelu, and P. Balasubramaniam, “An audio encryption based on synchronization of robust bam fcnns with time delays,” Multimedia Tools and Applications, vol. 78, pp. 5969–5988, 2019.
  11. H. Liu, A. Kadir, and Y. Li, “Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys,” Optik, vol. 127, no. 19, pp. 7431–7438, 2016.
  12. M. M. Rahman, T. K. Saha, and M. A.-A. Bhuiyan, “Implementation of rsa algorithm for speech data encryp- tion and decryption,” IJCSNS International Journal of Computer Science and Network Security, vol. 12, no. 3, pp. 74–82, 2012.
  13. M. I. Khalil, “Real-time encryption/decryption of audio signal,” International Journal of Computer Network and Information Security, vol. 8, no. 2, pp. 25–31, 2016.
  14. S. F. Yousif, “Encryption and decryption of audio signal based on rsa algorithn,” International Journal of Engi- neering Technologies and Management Research, vol. 5, no. 7, pp. 57–64, 2018.
  15. A. E. Taki El Deen, “Implementation of an encryption scheme for voice calls,” International Journal of Com- puter Applications, vol. 975, p. 8887.
  16. A.-B. A. Al-Hussein, F. R. Tahir, and O. Boubaker, “Chaos elimination in power system using synergetic control theory,” in 2021 18th International Multi- Conference on Systems, Signals & Devices (SSD), pp. 340–345, IEEE, 2021.
  17. A.-B. A. Al-Hussein, F. R. Tahir, and K. Rajagopal, “Chaotic power system stabilization based on novel in- commensurate fractional-order linear augmentation con- troller,” Complexity, vol. 2021, pp. 1–13, 2021.
  18. A.-B. A. Al-Hussein, “Chaos phenomenon in power systems: A review.,” Iraqi Journal for Electrical & Elec- tronic Engineering, vol. 17, no. 2, 2021.
  19. A.-B. A. Al-Hussein, F. Rahma, L. Fortuna, M. Bucolo, M. Frasca, and A. Buscarino, “A new time-delay model for chaotic glucose-insulin regulatory system,” Interna- tional Journal of Bifurcation and Chaos, vol. 30, no. 12, p. 2050178, 2020.
  20. W. Dai, X. Xu, X. Song, and G. Li, “Audio encryp- tion algorithm based on chen memristor chaotic system. symmetry 14 (1): 17,” 2022.
  21. S. Fu, X. Cheng, and J. Liu, “Dynamics, circuit de- sign, feedback control of a new hyperchaotic system and its application in audio encryption,” Scientific Reports, vol. 13, no. 1, p. 19385, 2023.
  22. E. A. Hussein, M. K. Khashan, and A. K. Jawad, “A high security and noise immunity of speech based on double chaotic masking,” International Journal of Elec- trical and Computer Engineering (IJECE), vol. 10, no. 4, pp. 4270–4278, 2020.
  23. S. S. Hreshee, H. N. Abdullah, and A. K. Jawad, “A high security communication system based on chaotic scram- bling and chaotic masking,” Int. J. Commun. Antenna Propag, vol. 8, no. 3, p. 257, 2018.
  24. M. F. Abd Elzaher, M. Shalaby, and S. H. El Ramly, “Securing modern voice communication systems using multilevel chaotic approach,” International Journal of Computer Applications, vol. 135, no. 9, pp. 17–21, 2016.
  25. E. Avaro˘glu, “Pseudorandom number generator based on arnold cat map and statistical analysis,” Turkish Jour- nal of Electrical Engineering and Computer Sciences, vol. 25, no. 1, pp. 633–643, 2017.
  26. K. Kordov, “A novel audio encryption algorithm with permutation-substitution architecture,” Electronics, vol. 8, no. 5, p. 530, 2019.
  27. H. Aziz, S. M. M. Gilani, I. Hussain, A. K. Janjua, and S. Khurram, “A noise-tolerant audio encryption frame- work designed by the application of s8 symmetric group and chaotic systems,” Mathematical Problems in Engi- neering, vol. 2021, pp. 1–15, 2021.
  28. M. M. Parvees, J. A. Samath, and B. P. Bose, “Audio encryption–a chaos-based data byte scrambling tech- nique,” International Journal of Applied Systemic Stud- ies, vol. 8, no. 1, pp. 51–75, 2018.
  29. S. Sheela, K. Suresh, D. Tandur, et al., “A novel audio cryptosystem using chaotic maps and dna encoding,” Journal of Computer Networks and Communications, vol. 2017, 2017.
  30. A. Mahdi and S. S. Hreshee, “Design and implemen- tation of voice encryption system using xor based on h´enon map,” in 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), pp. 1–5, IEEE, 2016.
  31. A. Ghasemzadeh and E. Esmaeili, “A novel method in audio message encryption based on a mixture of chaos function,” International Journal of Speech Technology, vol. 20, pp. 829–837, 2017.
  32. P. Sathiyamurthi and S. Ramakrishnan, “Speech encryp- tion using chaotic shift keying for secured speech com- munication,” EURASIP Journal on Audio, Speech, and Music Processing, vol. 2017, pp. 1–11, 2017.
  33. M. F. Tolba, W. S. Sayed, A. G. Radwan, and S. K. Abd-El-Hafiz, “Chaos-based hardware speech encryp- tion scheme using modified tent map and bit permuta- tion,” in 2018 7th international conference on modern circuits and systems technologies (MOCAST), pp. 1–4, IEEE, 2018.
  34. Z. A. O. Nasri Sulaiman, M. Marhaban, and M. Hami- don, “Design and implementation of fpga-based systems- a review,” Australian Journal of Basic and Applied Sci- ences, vol. 3, no. 4, pp. 3575–3596, 2009.
  35. W. S. Sayed, M. F. Tolba, A. G. Radwan, and S. K. Abd-El-Hafiz, “Fpga realization of a speech encryption system based on a generalized modified chaotic transi- tion map and bit permutation,” Multimedia Tools and Applications, vol. 78, pp. 16097–16127, 2019.
  36. M. A. Mohamed, T. Bonny, A. Sambas, S. Vaidyanathan, W. A. Nassan, S. Zhang, K. Obaideen, M. Mamat, M. Nawawi, and M. Kamal, “A speech cryptosystem using the new chaotic system with a capsule-shaped equilibrium curve.,” Computers, Materials & Continua, vol. 75, no. 3, 2023.
  37. E. Rodr´ıguez-Orozco, E. E. Garc´ıa-Guerrero, E. Inzunza- Gonzalez, O. R. L´opez-Bonilla, A. Flores-Vergara, J. R. C´ardenas-Valdez, and E. Tlelo-Cuautle, “Fpga-based chaotic cryptosystem by using voice recognition as ac- cess key,” Electronics, vol. 7, no. 12, p. 414, 2018.
  38. M. A. Riyadi, N. Pandapotan, M. R. A. Khafid, and T. Prakoso, “Fpga-based 128-bit chaotic encryption method for voice communication,” in 2018 International Symposium on Electronics and Smart Devices (ISESD), pp. 1–5, IEEE, 2018.
  39. F. Dridi, S. El Assad, W. El Hadj Youssef, M. Machhout, and R. Lozi, “The design and fpga-based implementa- tion of a stream cipher based on a secure chaotic genera- tor,” Applied Sciences, vol. 11, no. 2, p. 625, 2021.
  40. H. M. Yassin, A. T. Mohamed, A. H. Abdel-Gawad, M. F. Tolba, H. I. Saleh, A. H. Madian, and A. G. Radwan, “Speech encryption on fpga using a chaotic generator and s-box table,” in 2019 Fourth International Conference on Advances in Computational Tools for Engineering Applications (ACTEA), pp. 1–4, IEEE, 2019.
  41. M. F. Tolba, W. S. Sayed, A. G. Radwan, and S. K. Abd- El-Hafiz, “Fpga realization of speech encryption based on modified chaotic logistic map,” in 2018 IEEE Inter- national Conference on Industrial Technology (ICIT), pp. 1412–1417, IEEE, 2018.
  42. O. Guill´en-Fern´andez, E. Tlelo-Cuautle, L. G. de la Fraga, Y. Sandoval-Ibarra, and J.-C. Nu˜nez-Perez, “An image encryption scheme synchronizing optimized chaotic systems implemented on raspberry pis,” Mathe- matics, vol. 10, no. 11, p. 1907, 2022.
  43. Y. Chincholkar and S. Ganorkar, “Audio watermarking algorithm implementation using patchwork technique,” in 2019 IEEE 5th International Conference for Conver- gence in Technology (I2CT), pp. 1–5, IEEE, 2019.
  44. B. Paul, “A novel design and implementation of a real- time wireless video and audio transmission device,” WSEAS Transactions on Computer Research, vol. 4, pp. 161–172, 2016.
  45. N. R. Babu, M. Kalpana, and P. Balasubramaniam, “A novel audio encryption approach via finite-time synchro- nization of fractional order hyperchaotic system,” Multi- media Tools and Applications, vol. 80, pp. 18043–18067, 2021.
  46. J. Yang, J. Xiong, J. Cen, and W. He, “Finite-time gener- alized synchronization of non-identical fractional order chaotic systems and its application in speech secure communication,” Plos one, vol. 17, no. 3, p. e0263007, 2022.
  47. P. Muthukumar, P. Balasubramaniam, and K. Ratnavelu, “Sliding mode control for generalized robust synchro- nization of mismatched fractional order dynamical sys- tems and its application to secure transmission of voice messages,” ISA transactions, vol. 82, pp. 51–61, 2018.
  48. A. H. Elsafty, M. F. Tolba, L. A. Said, A. H. Madian, and A. G. Radwan, “Enhanced hardware implementation
  49. 103 | Shumran & Al-Hussein of a mixed-order nonlinear chaotic system and speech encryption application,” AEU-International Journal of Electronics and Communications, vol. 125, p. 153347, 2020.
  50. A. A. S. Alghamdi, “Design and implementation of a voice encryption system using fractional-order chaotic maps,” Int. Res. J. Modern. Eng. Technol. Sci, vol. 3, no. 06, 2021.
  51. Z. M. Alroubaie, M. A. Hashem, and F. S. Hasan, “Fpga design of encryption speech system using synchronized fixed-point chaotic maps based stream ciphers,” Interna- tional Journal of Engineering and Advanced Technology, vol. 8, no. 6, pp. 1534–1541, 2019.
  52. A. J. Abd El-Maksoud, A. A. Abd El-Kader, B. G. Has- san, N. G. Rihan, M. F. Tolba, L. A. Said, A. G. Rad- wan, and M. F. Abu-Elyazeed, “Fpga implementation of sound encryption system based on fractional-order chaotic systems,” Microelectronics Journal, vol. 90, pp. 323–335, 2019.
  53. F. S. Hasan, “Speech encryption using fixed point chaos based stream cipher (fpc-sc),” Eng. &Tech. Journal, vol. 34, no. 11, pp. 2152–2166, 2016.
  54. G. A. Beyene, F. Rahma, K. Rajagopal, A.-B. A. Al- Hussein, and S. Boulaaras, “Dynamical analysis of a 3d fractional-order chaotic system for high-security com- munication and its electronic circuit implementation,” Journal of Nonlinear Mathematical Physics, vol. 30, no. 4, pp. 1375–1391, 2023.
  55. M. K. Ibrahem and H. A. Qasim, “Implementation of voip speech encryption system using stream cipher with lorenz map key generator,” International Journal of Sci- entific and Engineering Research, vol. 8, no. 7, pp. 533–541, 2017.
  56. S. B. Sadkhan and R. S. Mohammed, “Proposed ran- dom unified chaotic map as prbg for voice encryption in wireless communication,” Procedia computer science, vol. 65, pp. 314–323, 2015.
  57. M. S. Azzaz, C. Tanougast, S. Sadoudi, and A. Bouri- dane, “Synchronized hybrid chaotic generators: Applica- tion to real-time wireless speech encryption,” Communi- cations in Nonlinear Science and Numerical Simulation, vol. 18, no. 8, pp. 2035–2047, 2013.
  58. F. Farsana, V. Devi, and K. Gopakumar, “An audio en- cryption scheme based on fast walsh hadamard trans- form and mixed chaotic keystreams,” Applied Comput- ing and Informatics, vol. 19, no. 3/4, pp. 239–264, 2020.
  59. S. N. Al Saad and E. Hato, “A speech encryption based on chaotic maps,” International Journal of Computer Applications, vol. 93, no. 4, pp. 19–28, 2014.