Modify Speech Cryptosystem Based on Shuffling Overlapping Blocks Technique
Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.4, No. 2)Publication Date: 2015-05-20
Authors : Hala B.Abdul Wahab; Sundus I. Mahdi;
Page : 070-075
Keywords : Speech Encryption; Chaotic system; Arnold Chaotic map; Hénon system;
Abstract
A combination of high efficiency cryptosystem algorithms based on MOBS (Modified Overlapped Block Shuffling) and a HCS (Hybrid Chaotic System) are proposed to secure the transfer of an on-the-go audio signal (i.e. speech). As online voice-based communication is becoming increasingly more common, the need to protect these signals from an unauthorized third party becomes more significant. In natural speech, the values and positions for neighboring samples are highly correlated. The proposed algorithm breaks the correlation by using MOBS and encrypting with a HCS. First, the original speech signal is converted from a one dimensional into a two dimensional array. Then, it is divided into overlapped squared blocks followed by a subsequent permutation. Third, each permutated block is dynamically shuffled using Hénon and Arnold transformation. And finally a Hybrid Chaotic Map (Hénon and Arnold Cat map) is employed to generate a key matrix to encrypt the shuffled blocks, thus producing ciphered speech ready for transmission. Experimental results show that the cryptosystem can successfully encrypt/decrypt with symmetric keys. Experimental analyses like: Signal-to-Noise-Ratio (SNR), Segmental Signal-to-Noise-Ratio (segSNR), Correlation Coefficient Analysis (CCA), Log-Likelihood Ratio (LLR), Residual Deviation, key space and key-sensitivity reveal the effectiveness of the proposed technique for secure speech communication.
Other Latest Articles
- NEOTERIC INNOVATION IN GI-FI TECHNOLOGY
- S R S for responsive design environment: Generic Medicine Mobile Website -A portal to facilitate updated information about generic medicine
- A stochastic model for feature extraction in Time Series Data Mining and its Engineering applications using remote sensing technique
- Assessing ICT Policy Development and Implementation in Developing Countries: a case study from Morocco
- IEAACK Implementation of A New Security Intrusion Detection System by Using Hybrid Cryptographic Algorithm for MANET
Last modified: 2015-05-15 20:06:42