Voice encryption using a unified hyper-chaotic system

A Chaos-based cryptosystem is a vital method to enhance information protection in communication systems. The previous works have addressed this topic either by using highly complicated algorithms that are difficult to apply in practice or have a few encryption keys. This paper presents a new, highly...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2023, Vol.82 (1), p.1067-1085
Hauptverfasser: Bonny, Talal, Nassan, Wafaa Al, Baba, Abdullatif
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1085
container_issue 1
container_start_page 1067
container_title Multimedia tools and applications
container_volume 82
creator Bonny, Talal
Nassan, Wafaa Al
Baba, Abdullatif
description A Chaos-based cryptosystem is a vital method to enhance information protection in communication systems. The previous works have addressed this topic either by using highly complicated algorithms that are difficult to apply in practice or have a few encryption keys. This paper presents a new, highly secure chaos-based secure communication system that combines a conventional cryptography algorithm with two levels of chaotic masking technique. Furthermore, to enhance the security level, we employ the characteristic of a unified hyper-chaotic system to generate three different types of attractors. A Simulink of the stated system is implemented using MATLAB SIMULINK (R2013) to transmit a voice signal. Several testing methods such as power spectral density, spectrogram, histogram analysis, key sensitivity, correlation coefficient, signal to noise ratio (SNR), Percent Residual Deviation (PRD) are carried out to evaluate the quality of the proposed algorithm in several domains, time, frequency, and statistics. The simulation and comparison results demonstrate the high efficiency of the suggested cryptosystem and robustness against various cryptographic attacks.
doi_str_mv 10.1007/s11042-022-13317-w
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2758756272</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2758756272</sourcerecordid><originalsourceid>FETCH-LOGICAL-c249t-72376669dfe2fe2c5c0fb8460557900120717811dabca61e03596e6f4c5553d83</originalsourceid><addsrcrecordid>eNp9kE1LxDAQhoMouK7-AU8Fz9GZpMm0R1n8AsGLeg3dNN3N4rY1aVn6741W8CYMzBzej-Fh7BLhGgHoJiJCLjgIwVFKJH44YgtUJDmRwON0ywI4KcBTdhbjDgC1EvmCqffOW5e51oapH3zXZmP07SarsrH1jXd1tp16F7jdVt3gbRanOLj9OTtpqo_oLn73kr3d372uHvnzy8PT6vaZW5GXAychSWtd1o0Taayy0KyLXINSVKYXBBBSgVhXa1tpdCBVqZ1ucquUknUhl-xqzu1D9zm6OJhdN4Y2VRpBqiClRepYMjGrbOhiDK4xffD7KkwGwXzjMTMek_CYHzzmkExyNsUkbjcu_EX_4_oCO7lmzw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2758756272</pqid></control><display><type>article</type><title>Voice encryption using a unified hyper-chaotic system</title><source>Springer Nature - Complete Springer Journals</source><creator>Bonny, Talal ; Nassan, Wafaa Al ; Baba, Abdullatif</creator><creatorcontrib>Bonny, Talal ; Nassan, Wafaa Al ; Baba, Abdullatif</creatorcontrib><description>A Chaos-based cryptosystem is a vital method to enhance information protection in communication systems. The previous works have addressed this topic either by using highly complicated algorithms that are difficult to apply in practice or have a few encryption keys. This paper presents a new, highly secure chaos-based secure communication system that combines a conventional cryptography algorithm with two levels of chaotic masking technique. Furthermore, to enhance the security level, we employ the characteristic of a unified hyper-chaotic system to generate three different types of attractors. A Simulink of the stated system is implemented using MATLAB SIMULINK (R2013) to transmit a voice signal. Several testing methods such as power spectral density, spectrogram, histogram analysis, key sensitivity, correlation coefficient, signal to noise ratio (SNR), Percent Residual Deviation (PRD) are carried out to evaluate the quality of the proposed algorithm in several domains, time, frequency, and statistics. The simulation and comparison results demonstrate the high efficiency of the suggested cryptosystem and robustness against various cryptographic attacks.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-022-13317-w</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Behavior ; Chaos theory ; Communications systems ; Computer Communication Networks ; Computer Science ; Correlation coefficients ; Cryptography ; Data Structures and Information Theory ; Histograms ; Multimedia ; Multimedia Information Systems ; Power spectral density ; Receivers &amp; amplifiers ; Signal to noise ratio ; Special Purpose and Application-Based Systems ; Voice communication ; Wavelet transforms</subject><ispartof>Multimedia tools and applications, 2023, Vol.82 (1), p.1067-1085</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c249t-72376669dfe2fe2c5c0fb8460557900120717811dabca61e03596e6f4c5553d83</citedby><cites>FETCH-LOGICAL-c249t-72376669dfe2fe2c5c0fb8460557900120717811dabca61e03596e6f4c5553d83</cites><orcidid>0000-0003-1111-0304</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-022-13317-w$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-022-13317-w$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Bonny, Talal</creatorcontrib><creatorcontrib>Nassan, Wafaa Al</creatorcontrib><creatorcontrib>Baba, Abdullatif</creatorcontrib><title>Voice encryption using a unified hyper-chaotic system</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>A Chaos-based cryptosystem is a vital method to enhance information protection in communication systems. The previous works have addressed this topic either by using highly complicated algorithms that are difficult to apply in practice or have a few encryption keys. This paper presents a new, highly secure chaos-based secure communication system that combines a conventional cryptography algorithm with two levels of chaotic masking technique. Furthermore, to enhance the security level, we employ the characteristic of a unified hyper-chaotic system to generate three different types of attractors. A Simulink of the stated system is implemented using MATLAB SIMULINK (R2013) to transmit a voice signal. Several testing methods such as power spectral density, spectrogram, histogram analysis, key sensitivity, correlation coefficient, signal to noise ratio (SNR), Percent Residual Deviation (PRD) are carried out to evaluate the quality of the proposed algorithm in several domains, time, frequency, and statistics. The simulation and comparison results demonstrate the high efficiency of the suggested cryptosystem and robustness against various cryptographic attacks.</description><subject>Algorithms</subject><subject>Behavior</subject><subject>Chaos theory</subject><subject>Communications systems</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Correlation coefficients</subject><subject>Cryptography</subject><subject>Data Structures and Information Theory</subject><subject>Histograms</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Power spectral density</subject><subject>Receivers &amp; amplifiers</subject><subject>Signal to noise ratio</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Voice communication</subject><subject>Wavelet transforms</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE1LxDAQhoMouK7-AU8Fz9GZpMm0R1n8AsGLeg3dNN3N4rY1aVn6741W8CYMzBzej-Fh7BLhGgHoJiJCLjgIwVFKJH44YgtUJDmRwON0ywI4KcBTdhbjDgC1EvmCqffOW5e51oapH3zXZmP07SarsrH1jXd1tp16F7jdVt3gbRanOLj9OTtpqo_oLn73kr3d372uHvnzy8PT6vaZW5GXAychSWtd1o0Taayy0KyLXINSVKYXBBBSgVhXa1tpdCBVqZ1ucquUknUhl-xqzu1D9zm6OJhdN4Y2VRpBqiClRepYMjGrbOhiDK4xffD7KkwGwXzjMTMek_CYHzzmkExyNsUkbjcu_EX_4_oCO7lmzw</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Bonny, Talal</creator><creator>Nassan, Wafaa Al</creator><creator>Baba, Abdullatif</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-1111-0304</orcidid></search><sort><creationdate>2023</creationdate><title>Voice encryption using a unified hyper-chaotic system</title><author>Bonny, Talal ; Nassan, Wafaa Al ; Baba, Abdullatif</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c249t-72376669dfe2fe2c5c0fb8460557900120717811dabca61e03596e6f4c5553d83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Behavior</topic><topic>Chaos theory</topic><topic>Communications systems</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Correlation coefficients</topic><topic>Cryptography</topic><topic>Data Structures and Information Theory</topic><topic>Histograms</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Power spectral density</topic><topic>Receivers &amp; amplifiers</topic><topic>Signal to noise ratio</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Voice communication</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bonny, Talal</creatorcontrib><creatorcontrib>Nassan, Wafaa Al</creatorcontrib><creatorcontrib>Baba, Abdullatif</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bonny, Talal</au><au>Nassan, Wafaa Al</au><au>Baba, Abdullatif</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Voice encryption using a unified hyper-chaotic system</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2023</date><risdate>2023</risdate><volume>82</volume><issue>1</issue><spage>1067</spage><epage>1085</epage><pages>1067-1085</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>A Chaos-based cryptosystem is a vital method to enhance information protection in communication systems. The previous works have addressed this topic either by using highly complicated algorithms that are difficult to apply in practice or have a few encryption keys. This paper presents a new, highly secure chaos-based secure communication system that combines a conventional cryptography algorithm with two levels of chaotic masking technique. Furthermore, to enhance the security level, we employ the characteristic of a unified hyper-chaotic system to generate three different types of attractors. A Simulink of the stated system is implemented using MATLAB SIMULINK (R2013) to transmit a voice signal. Several testing methods such as power spectral density, spectrogram, histogram analysis, key sensitivity, correlation coefficient, signal to noise ratio (SNR), Percent Residual Deviation (PRD) are carried out to evaluate the quality of the proposed algorithm in several domains, time, frequency, and statistics. The simulation and comparison results demonstrate the high efficiency of the suggested cryptosystem and robustness against various cryptographic attacks.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-022-13317-w</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0003-1111-0304</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2023, Vol.82 (1), p.1067-1085
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2758756272
source Springer Nature - Complete Springer Journals
subjects Algorithms
Behavior
Chaos theory
Communications systems
Computer Communication Networks
Computer Science
Correlation coefficients
Cryptography
Data Structures and Information Theory
Histograms
Multimedia
Multimedia Information Systems
Power spectral density
Receivers & amplifiers
Signal to noise ratio
Special Purpose and Application-Based Systems
Voice communication
Wavelet transforms
title Voice encryption using a unified hyper-chaotic system
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T20%3A45%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Voice%20encryption%20using%20a%20unified%20hyper-chaotic%20system&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Bonny,%20Talal&rft.date=2023&rft.volume=82&rft.issue=1&rft.spage=1067&rft.epage=1085&rft.pages=1067-1085&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-022-13317-w&rft_dat=%3Cproquest_cross%3E2758756272%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2758756272&rft_id=info:pmid/&rfr_iscdi=true