Speech encryption algorithm based on two newly designed chaotic maps
Two new integrated chaotic maps are designed. The sine and logistic maps are used to create a sine-logistic integrated map (SLIM). The sine and cubic maps are used to design a sine-cubic integrated map (SCIM). Their dynamical analyses are done using time series plots, 0–1 tests, bifurcations, sample...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2023-12-01
|
Series: | Franklin Open |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S277318632300049X |
_version_ | 1827590995284328448 |
---|---|
author | Samuel Amde Gebereselassie Binoy Krishna Roy |
author_facet | Samuel Amde Gebereselassie Binoy Krishna Roy |
author_sort | Samuel Amde Gebereselassie |
collection | DOAJ |
description | Two new integrated chaotic maps are designed. The sine and logistic maps are used to create a sine-logistic integrated map (SLIM). The sine and cubic maps are used to design a sine-cubic integrated map (SCIM). Their dynamical analyses are done using time series plots, 0–1 tests, bifurcations, sample entropy, and Lyapunov exponent diagrams. The newly designed chaotic maps exhibit their dynamical properties of a period-two cycle, period-four cycle, and chaos. The speech signal is compressed first, and encryption is performed based on the new integrated chaotic maps. The two keys, such as key-A and key-B, are generated using SLIM and SCIM, respectively. Key-A is used for the shifting operation, while the bitwise XOR operation is carried out between the compressed-shifted speech signal and key-B. After that, the encrypted speech is sent across a public channel, and the original speech is recovered by performing reverse operations on the receiving end. The degree of security is measured using various speech security and attack analysis tools. It is found that the proposed strategy is more secure than some existing methods described in the literature and can withstand several attacks. |
first_indexed | 2024-03-09T01:25:32Z |
format | Article |
id | doaj.art-96e5b8cbec104b78b2fa4d041f30b897 |
institution | Directory Open Access Journal |
issn | 2773-1863 |
language | English |
last_indexed | 2024-03-09T01:25:32Z |
publishDate | 2023-12-01 |
publisher | Elsevier |
record_format | Article |
series | Franklin Open |
spelling | doaj.art-96e5b8cbec104b78b2fa4d041f30b8972023-12-10T06:19:39ZengElsevierFranklin Open2773-18632023-12-015100055Speech encryption algorithm based on two newly designed chaotic mapsSamuel Amde Gebereselassie0Binoy Krishna Roy1Corresponding author.; Department of Electrical Engineering, National Institute of Technology Silchar, Silchar, 788010, Assam, IndiaDepartment of Electrical Engineering, National Institute of Technology Silchar, Silchar, 788010, Assam, IndiaTwo new integrated chaotic maps are designed. The sine and logistic maps are used to create a sine-logistic integrated map (SLIM). The sine and cubic maps are used to design a sine-cubic integrated map (SCIM). Their dynamical analyses are done using time series plots, 0–1 tests, bifurcations, sample entropy, and Lyapunov exponent diagrams. The newly designed chaotic maps exhibit their dynamical properties of a period-two cycle, period-four cycle, and chaos. The speech signal is compressed first, and encryption is performed based on the new integrated chaotic maps. The two keys, such as key-A and key-B, are generated using SLIM and SCIM, respectively. Key-A is used for the shifting operation, while the bitwise XOR operation is carried out between the compressed-shifted speech signal and key-B. After that, the encrypted speech is sent across a public channel, and the original speech is recovered by performing reverse operations on the receiving end. The degree of security is measured using various speech security and attack analysis tools. It is found that the proposed strategy is more secure than some existing methods described in the literature and can withstand several attacks.http://www.sciencedirect.com/science/article/pii/S277318632300049XBifurcationChaotic mapCompressionEncryptionLyapunov exponentSecurity |
spellingShingle | Samuel Amde Gebereselassie Binoy Krishna Roy Speech encryption algorithm based on two newly designed chaotic maps Franklin Open Bifurcation Chaotic map Compression Encryption Lyapunov exponent Security |
title | Speech encryption algorithm based on two newly designed chaotic maps |
title_full | Speech encryption algorithm based on two newly designed chaotic maps |
title_fullStr | Speech encryption algorithm based on two newly designed chaotic maps |
title_full_unstemmed | Speech encryption algorithm based on two newly designed chaotic maps |
title_short | Speech encryption algorithm based on two newly designed chaotic maps |
title_sort | speech encryption algorithm based on two newly designed chaotic maps |
topic | Bifurcation Chaotic map Compression Encryption Lyapunov exponent Security |
url | http://www.sciencedirect.com/science/article/pii/S277318632300049X |
work_keys_str_mv | AT samuelamdegebereselassie speechencryptionalgorithmbasedontwonewlydesignedchaoticmaps AT binoykrishnaroy speechencryptionalgorithmbasedontwonewlydesignedchaoticmaps |