Audio security through compressive sampling and cellular automata
In this paper, a new approach for scrambling the compressive sensed (CS) audio data using two dimensional cellular automata is presented. In order to improve the security, linear feedback shift register (LFSR) based secure measurement matrix for compressive sensing is used. The basic idea is to sele...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2015-12, Vol.74 (23), p.10393-10417 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10417 |
---|---|
container_issue | 23 |
container_start_page | 10393 |
container_title | Multimedia tools and applications |
container_volume | 74 |
creator | George, Sudhish N. Augustine, Nishanth Pattathil, Deepthi P. |
description | In this paper, a new approach for scrambling the compressive sensed (CS) audio data using two dimensional cellular automata is presented. In order to improve the security, linear feedback shift register (LFSR) based secure measurement matrix for compressive sensing is used. The basic idea is to select the different states of LFSR as the entries of a random matrix and orthonormalize these values to generate a Gaussian random measurement matrix. It is proposed to generate the initial state matrix of cellular automata using an LFSR based random bitstream generator. In order to improve the security and key space of the proposed cryptosystem, piecewise linear chaotic map (PWLCM) based initial seeds generation for LFSRs is used. In the proposed approach, the initial value, parameter value and the number of iterations of PWLCM are kept as secret to provide security. The proposed audio encryption method for CS audio data is validated with different compressive sensing reconstruction approaches. Experimental and analytical verification shows that the proposed encryption system gives good reconstruction performance, robustness to noise, high level of scrambling and good security against several forms of attack. Moreover, since the measurement matrix used for CS operation and the initial state matrix used for 2D cellular automata are generated using the secret key, the storage/transmission requirement of the same can be avoided. |
doi_str_mv | 10.1007/s11042-014-2172-2 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1770287408</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1770287408</sourcerecordid><originalsourceid>FETCH-LOGICAL-c349t-258eede7ecc45eb33a395a542449f8ca7617f6d792f2fff1709714cf8f2f650a3</originalsourceid><addsrcrecordid>eNp1kE1LxDAQhoMouK7-AG8FL16imTRp2uOy-AULXvQcYpp0u7RNTRph_70p9SCCp5mB530ZHoSugdwBIeI-ABBGMQGGKQiK6QlaARc5FoLCadrzkmDBCZyjixAOhEDBKVuhzSbWrcuC0dG30zGb9t7FZp9p14_ehNB-mSyofuzaocnUUGfadF3slM9UnFyvJnWJzqzqgrn6mWv0_vjwtn3Gu9enl-1mh3XOqglTXhpTG2G0Ztx85LnKK644o4xVttRKFCBsUYuKWmqtBUEqAUzbMp0FJypfo9uld_TuM5owyb4N8zdqMC4GCUIQWgpGyoTe_EEPLvohfZcoWiWmqGYKFkp7F4I3Vo6-7ZU_SiBylioXqTJJlbNUSVOGLpmQ2KEx_lfzv6Fv-4J5ZQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1729740698</pqid></control><display><type>article</type><title>Audio security through compressive sampling and cellular automata</title><source>SpringerNature Journals</source><creator>George, Sudhish N. ; Augustine, Nishanth ; Pattathil, Deepthi P.</creator><creatorcontrib>George, Sudhish N. ; Augustine, Nishanth ; Pattathil, Deepthi P.</creatorcontrib><description>In this paper, a new approach for scrambling the compressive sensed (CS) audio data using two dimensional cellular automata is presented. In order to improve the security, linear feedback shift register (LFSR) based secure measurement matrix for compressive sensing is used. The basic idea is to select the different states of LFSR as the entries of a random matrix and orthonormalize these values to generate a Gaussian random measurement matrix. It is proposed to generate the initial state matrix of cellular automata using an LFSR based random bitstream generator. In order to improve the security and key space of the proposed cryptosystem, piecewise linear chaotic map (PWLCM) based initial seeds generation for LFSRs is used. In the proposed approach, the initial value, parameter value and the number of iterations of PWLCM are kept as secret to provide security. The proposed audio encryption method for CS audio data is validated with different compressive sensing reconstruction approaches. Experimental and analytical verification shows that the proposed encryption system gives good reconstruction performance, robustness to noise, high level of scrambling and good security against several forms of attack. Moreover, since the measurement matrix used for CS operation and the initial state matrix used for 2D cellular automata are generated using the secret key, the storage/transmission requirement of the same can be avoided.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-014-2172-2</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Analysis ; Audio data ; Cellular automata ; Communication ; Computer Communication Networks ; Computer Science ; Convex analysis ; Data compression ; Data Structures and Information Theory ; Detection ; Encryption ; Multimedia communications ; Multimedia computer applications ; Multimedia Information Systems ; Network security ; Noise ; Optimization algorithms ; Random variables ; Receivers & amplifiers ; Reconstruction ; Sampling ; Security ; Special Purpose and Application-Based Systems ; Studies ; Two dimensional</subject><ispartof>Multimedia tools and applications, 2015-12, Vol.74 (23), p.10393-10417</ispartof><rights>Springer Science+Business Media New York 2014</rights><rights>Springer Science+Business Media New York 2015</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c349t-258eede7ecc45eb33a395a542449f8ca7617f6d792f2fff1709714cf8f2f650a3</citedby><cites>FETCH-LOGICAL-c349t-258eede7ecc45eb33a395a542449f8ca7617f6d792f2fff1709714cf8f2f650a3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-014-2172-2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-014-2172-2$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>315,781,785,27926,27927,41490,42559,51321</link.rule.ids></links><search><creatorcontrib>George, Sudhish N.</creatorcontrib><creatorcontrib>Augustine, Nishanth</creatorcontrib><creatorcontrib>Pattathil, Deepthi P.</creatorcontrib><title>Audio security through compressive sampling and cellular automata</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>In this paper, a new approach for scrambling the compressive sensed (CS) audio data using two dimensional cellular automata is presented. In order to improve the security, linear feedback shift register (LFSR) based secure measurement matrix for compressive sensing is used. The basic idea is to select the different states of LFSR as the entries of a random matrix and orthonormalize these values to generate a Gaussian random measurement matrix. It is proposed to generate the initial state matrix of cellular automata using an LFSR based random bitstream generator. In order to improve the security and key space of the proposed cryptosystem, piecewise linear chaotic map (PWLCM) based initial seeds generation for LFSRs is used. In the proposed approach, the initial value, parameter value and the number of iterations of PWLCM are kept as secret to provide security. The proposed audio encryption method for CS audio data is validated with different compressive sensing reconstruction approaches. Experimental and analytical verification shows that the proposed encryption system gives good reconstruction performance, robustness to noise, high level of scrambling and good security against several forms of attack. Moreover, since the measurement matrix used for CS operation and the initial state matrix used for 2D cellular automata are generated using the secret key, the storage/transmission requirement of the same can be avoided.</description><subject>Analysis</subject><subject>Audio data</subject><subject>Cellular automata</subject><subject>Communication</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Convex analysis</subject><subject>Data compression</subject><subject>Data Structures and Information Theory</subject><subject>Detection</subject><subject>Encryption</subject><subject>Multimedia communications</subject><subject>Multimedia computer applications</subject><subject>Multimedia Information Systems</subject><subject>Network security</subject><subject>Noise</subject><subject>Optimization algorithms</subject><subject>Random variables</subject><subject>Receivers & amplifiers</subject><subject>Reconstruction</subject><subject>Sampling</subject><subject>Security</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Studies</subject><subject>Two dimensional</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kE1LxDAQhoMouK7-AG8FL16imTRp2uOy-AULXvQcYpp0u7RNTRph_70p9SCCp5mB530ZHoSugdwBIeI-ABBGMQGGKQiK6QlaARc5FoLCadrzkmDBCZyjixAOhEDBKVuhzSbWrcuC0dG30zGb9t7FZp9p14_ehNB-mSyofuzaocnUUGfadF3slM9UnFyvJnWJzqzqgrn6mWv0_vjwtn3Gu9enl-1mh3XOqglTXhpTG2G0Ztx85LnKK644o4xVttRKFCBsUYuKWmqtBUEqAUzbMp0FJypfo9uld_TuM5owyb4N8zdqMC4GCUIQWgpGyoTe_EEPLvohfZcoWiWmqGYKFkp7F4I3Vo6-7ZU_SiBylioXqTJJlbNUSVOGLpmQ2KEx_lfzv6Fv-4J5ZQ</recordid><startdate>20151201</startdate><enddate>20151201</enddate><creator>George, Sudhish N.</creator><creator>Augustine, Nishanth</creator><creator>Pattathil, Deepthi P.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20151201</creationdate><title>Audio security through compressive sampling and cellular automata</title><author>George, Sudhish N. ; Augustine, Nishanth ; Pattathil, Deepthi P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c349t-258eede7ecc45eb33a395a542449f8ca7617f6d792f2fff1709714cf8f2f650a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Analysis</topic><topic>Audio data</topic><topic>Cellular automata</topic><topic>Communication</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Convex analysis</topic><topic>Data compression</topic><topic>Data Structures and Information Theory</topic><topic>Detection</topic><topic>Encryption</topic><topic>Multimedia communications</topic><topic>Multimedia computer applications</topic><topic>Multimedia Information Systems</topic><topic>Network security</topic><topic>Noise</topic><topic>Optimization algorithms</topic><topic>Random variables</topic><topic>Receivers & amplifiers</topic><topic>Reconstruction</topic><topic>Sampling</topic><topic>Security</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Studies</topic><topic>Two dimensional</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>George, Sudhish N.</creatorcontrib><creatorcontrib>Augustine, Nishanth</creatorcontrib><creatorcontrib>Pattathil, Deepthi P.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>ProQuest research library</collection><collection>Research Library (Corporate)</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>George, Sudhish N.</au><au>Augustine, Nishanth</au><au>Pattathil, Deepthi P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Audio security through compressive sampling and cellular automata</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2015-12-01</date><risdate>2015</risdate><volume>74</volume><issue>23</issue><spage>10393</spage><epage>10417</epage><pages>10393-10417</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>In this paper, a new approach for scrambling the compressive sensed (CS) audio data using two dimensional cellular automata is presented. In order to improve the security, linear feedback shift register (LFSR) based secure measurement matrix for compressive sensing is used. The basic idea is to select the different states of LFSR as the entries of a random matrix and orthonormalize these values to generate a Gaussian random measurement matrix. It is proposed to generate the initial state matrix of cellular automata using an LFSR based random bitstream generator. In order to improve the security and key space of the proposed cryptosystem, piecewise linear chaotic map (PWLCM) based initial seeds generation for LFSRs is used. In the proposed approach, the initial value, parameter value and the number of iterations of PWLCM are kept as secret to provide security. The proposed audio encryption method for CS audio data is validated with different compressive sensing reconstruction approaches. Experimental and analytical verification shows that the proposed encryption system gives good reconstruction performance, robustness to noise, high level of scrambling and good security against several forms of attack. Moreover, since the measurement matrix used for CS operation and the initial state matrix used for 2D cellular automata are generated using the secret key, the storage/transmission requirement of the same can be avoided.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-014-2172-2</doi><tpages>25</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2015-12, Vol.74 (23), p.10393-10417 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_miscellaneous_1770287408 |
source | SpringerNature Journals |
subjects | Analysis Audio data Cellular automata Communication Computer Communication Networks Computer Science Convex analysis Data compression Data Structures and Information Theory Detection Encryption Multimedia communications Multimedia computer applications Multimedia Information Systems Network security Noise Optimization algorithms Random variables Receivers & amplifiers Reconstruction Sampling Security Special Purpose and Application-Based Systems Studies Two dimensional |
title | Audio security through compressive sampling and cellular automata |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-17T20%3A46%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Audio%20security%20through%20compressive%20sampling%20and%20cellular%20automata&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=George,%20Sudhish%20N.&rft.date=2015-12-01&rft.volume=74&rft.issue=23&rft.spage=10393&rft.epage=10417&rft.pages=10393-10417&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-014-2172-2&rft_dat=%3Cproquest_cross%3E1770287408%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1729740698&rft_id=info:pmid/&rfr_iscdi=true |