Speech encryption algorithm based on two newly designed chaotic maps

Two new integrated chaotic maps are designed. The sine and logistic maps are used to create a sine-logistic integrated map (SLIM). The sine and cubic maps are used to design a sine-cubic integrated map (SCIM). Their dynamical analyses are done using time series plots, 0–1 tests, bifurcations, sample...

Full description

Bibliographic Details
Main Authors: Samuel Amde Gebereselassie, Binoy Krishna Roy
Format: Article
Language:English
Published: Elsevier 2023-12-01
Series:Franklin Open
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S277318632300049X
_version_ 1827590995284328448
author Samuel Amde Gebereselassie
Binoy Krishna Roy
author_facet Samuel Amde Gebereselassie
Binoy Krishna Roy
author_sort Samuel Amde Gebereselassie
collection DOAJ
description Two new integrated chaotic maps are designed. The sine and logistic maps are used to create a sine-logistic integrated map (SLIM). The sine and cubic maps are used to design a sine-cubic integrated map (SCIM). Their dynamical analyses are done using time series plots, 0–1 tests, bifurcations, sample entropy, and Lyapunov exponent diagrams. The newly designed chaotic maps exhibit their dynamical properties of a period-two cycle, period-four cycle, and chaos. The speech signal is compressed first, and encryption is performed based on the new integrated chaotic maps. The two keys, such as key-A and key-B, are generated using SLIM and SCIM, respectively. Key-A is used for the shifting operation, while the bitwise XOR operation is carried out between the compressed-shifted speech signal and key-B. After that, the encrypted speech is sent across a public channel, and the original speech is recovered by performing reverse operations on the receiving end. The degree of security is measured using various speech security and attack analysis tools. It is found that the proposed strategy is more secure than some existing methods described in the literature and can withstand several attacks.
first_indexed 2024-03-09T01:25:32Z
format Article
id doaj.art-96e5b8cbec104b78b2fa4d041f30b897
institution Directory Open Access Journal
issn 2773-1863
language English
last_indexed 2024-03-09T01:25:32Z
publishDate 2023-12-01
publisher Elsevier
record_format Article
series Franklin Open
spelling doaj.art-96e5b8cbec104b78b2fa4d041f30b8972023-12-10T06:19:39ZengElsevierFranklin Open2773-18632023-12-015100055Speech encryption algorithm based on two newly designed chaotic mapsSamuel Amde Gebereselassie0Binoy Krishna Roy1Corresponding author.; Department of Electrical Engineering, National Institute of Technology Silchar, Silchar, 788010, Assam, IndiaDepartment of Electrical Engineering, National Institute of Technology Silchar, Silchar, 788010, Assam, IndiaTwo new integrated chaotic maps are designed. The sine and logistic maps are used to create a sine-logistic integrated map (SLIM). The sine and cubic maps are used to design a sine-cubic integrated map (SCIM). Their dynamical analyses are done using time series plots, 0–1 tests, bifurcations, sample entropy, and Lyapunov exponent diagrams. The newly designed chaotic maps exhibit their dynamical properties of a period-two cycle, period-four cycle, and chaos. The speech signal is compressed first, and encryption is performed based on the new integrated chaotic maps. The two keys, such as key-A and key-B, are generated using SLIM and SCIM, respectively. Key-A is used for the shifting operation, while the bitwise XOR operation is carried out between the compressed-shifted speech signal and key-B. After that, the encrypted speech is sent across a public channel, and the original speech is recovered by performing reverse operations on the receiving end. The degree of security is measured using various speech security and attack analysis tools. It is found that the proposed strategy is more secure than some existing methods described in the literature and can withstand several attacks.http://www.sciencedirect.com/science/article/pii/S277318632300049XBifurcationChaotic mapCompressionEncryptionLyapunov exponentSecurity
spellingShingle Samuel Amde Gebereselassie
Binoy Krishna Roy
Speech encryption algorithm based on two newly designed chaotic maps
Franklin Open
Bifurcation
Chaotic map
Compression
Encryption
Lyapunov exponent
Security
title Speech encryption algorithm based on two newly designed chaotic maps
title_full Speech encryption algorithm based on two newly designed chaotic maps
title_fullStr Speech encryption algorithm based on two newly designed chaotic maps
title_full_unstemmed Speech encryption algorithm based on two newly designed chaotic maps
title_short Speech encryption algorithm based on two newly designed chaotic maps
title_sort speech encryption algorithm based on two newly designed chaotic maps
topic Bifurcation
Chaotic map
Compression
Encryption
Lyapunov exponent
Security
url http://www.sciencedirect.com/science/article/pii/S277318632300049X
work_keys_str_mv AT samuelamdegebereselassie speechencryptionalgorithmbasedontwonewlydesignedchaoticmaps
AT binoykrishnaroy speechencryptionalgorithmbasedontwonewlydesignedchaoticmaps