Audio security through compressive sampling and cellular automata

In this paper, a new approach for scrambling the compressive sensed (CS) audio data using two dimensional cellular automata is presented. In order to improve the security, linear feedback shift register (LFSR) based secure measurement matrix for compressive sensing is used. The basic idea is to sele...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2015-12, Vol.74 (23), p.10393-10417
Hauptverfasser: George, Sudhish N., Augustine, Nishanth, Pattathil, Deepthi P.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10417
container_issue 23
container_start_page 10393
container_title Multimedia tools and applications
container_volume 74
creator George, Sudhish N.
Augustine, Nishanth
Pattathil, Deepthi P.
description In this paper, a new approach for scrambling the compressive sensed (CS) audio data using two dimensional cellular automata is presented. In order to improve the security, linear feedback shift register (LFSR) based secure measurement matrix for compressive sensing is used. The basic idea is to select the different states of LFSR as the entries of a random matrix and orthonormalize these values to generate a Gaussian random measurement matrix. It is proposed to generate the initial state matrix of cellular automata using an LFSR based random bitstream generator. In order to improve the security and key space of the proposed cryptosystem, piecewise linear chaotic map (PWLCM) based initial seeds generation for LFSRs is used. In the proposed approach, the initial value, parameter value and the number of iterations of PWLCM are kept as secret to provide security. The proposed audio encryption method for CS audio data is validated with different compressive sensing reconstruction approaches. Experimental and analytical verification shows that the proposed encryption system gives good reconstruction performance, robustness to noise, high level of scrambling and good security against several forms of attack. Moreover, since the measurement matrix used for CS operation and the initial state matrix used for 2D cellular automata are generated using the secret key, the storage/transmission requirement of the same can be avoided.
doi_str_mv 10.1007/s11042-014-2172-2
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1770287408</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1770287408</sourcerecordid><originalsourceid>FETCH-LOGICAL-c349t-258eede7ecc45eb33a395a542449f8ca7617f6d792f2fff1709714cf8f2f650a3</originalsourceid><addsrcrecordid>eNp1kE1LxDAQhoMouK7-AG8FL16imTRp2uOy-AULXvQcYpp0u7RNTRph_70p9SCCp5mB530ZHoSugdwBIeI-ABBGMQGGKQiK6QlaARc5FoLCadrzkmDBCZyjixAOhEDBKVuhzSbWrcuC0dG30zGb9t7FZp9p14_ehNB-mSyofuzaocnUUGfadF3slM9UnFyvJnWJzqzqgrn6mWv0_vjwtn3Gu9enl-1mh3XOqglTXhpTG2G0Ztx85LnKK644o4xVttRKFCBsUYuKWmqtBUEqAUzbMp0FJypfo9uld_TuM5owyb4N8zdqMC4GCUIQWgpGyoTe_EEPLvohfZcoWiWmqGYKFkp7F4I3Vo6-7ZU_SiBylioXqTJJlbNUSVOGLpmQ2KEx_lfzv6Fv-4J5ZQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1729740698</pqid></control><display><type>article</type><title>Audio security through compressive sampling and cellular automata</title><source>SpringerNature Journals</source><creator>George, Sudhish N. ; Augustine, Nishanth ; Pattathil, Deepthi P.</creator><creatorcontrib>George, Sudhish N. ; Augustine, Nishanth ; Pattathil, Deepthi P.</creatorcontrib><description>In this paper, a new approach for scrambling the compressive sensed (CS) audio data using two dimensional cellular automata is presented. In order to improve the security, linear feedback shift register (LFSR) based secure measurement matrix for compressive sensing is used. The basic idea is to select the different states of LFSR as the entries of a random matrix and orthonormalize these values to generate a Gaussian random measurement matrix. It is proposed to generate the initial state matrix of cellular automata using an LFSR based random bitstream generator. In order to improve the security and key space of the proposed cryptosystem, piecewise linear chaotic map (PWLCM) based initial seeds generation for LFSRs is used. In the proposed approach, the initial value, parameter value and the number of iterations of PWLCM are kept as secret to provide security. The proposed audio encryption method for CS audio data is validated with different compressive sensing reconstruction approaches. Experimental and analytical verification shows that the proposed encryption system gives good reconstruction performance, robustness to noise, high level of scrambling and good security against several forms of attack. Moreover, since the measurement matrix used for CS operation and the initial state matrix used for 2D cellular automata are generated using the secret key, the storage/transmission requirement of the same can be avoided.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-014-2172-2</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Analysis ; Audio data ; Cellular automata ; Communication ; Computer Communication Networks ; Computer Science ; Convex analysis ; Data compression ; Data Structures and Information Theory ; Detection ; Encryption ; Multimedia communications ; Multimedia computer applications ; Multimedia Information Systems ; Network security ; Noise ; Optimization algorithms ; Random variables ; Receivers &amp; amplifiers ; Reconstruction ; Sampling ; Security ; Special Purpose and Application-Based Systems ; Studies ; Two dimensional</subject><ispartof>Multimedia tools and applications, 2015-12, Vol.74 (23), p.10393-10417</ispartof><rights>Springer Science+Business Media New York 2014</rights><rights>Springer Science+Business Media New York 2015</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c349t-258eede7ecc45eb33a395a542449f8ca7617f6d792f2fff1709714cf8f2f650a3</citedby><cites>FETCH-LOGICAL-c349t-258eede7ecc45eb33a395a542449f8ca7617f6d792f2fff1709714cf8f2f650a3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-014-2172-2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-014-2172-2$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>315,781,785,27926,27927,41490,42559,51321</link.rule.ids></links><search><creatorcontrib>George, Sudhish N.</creatorcontrib><creatorcontrib>Augustine, Nishanth</creatorcontrib><creatorcontrib>Pattathil, Deepthi P.</creatorcontrib><title>Audio security through compressive sampling and cellular automata</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>In this paper, a new approach for scrambling the compressive sensed (CS) audio data using two dimensional cellular automata is presented. In order to improve the security, linear feedback shift register (LFSR) based secure measurement matrix for compressive sensing is used. The basic idea is to select the different states of LFSR as the entries of a random matrix and orthonormalize these values to generate a Gaussian random measurement matrix. It is proposed to generate the initial state matrix of cellular automata using an LFSR based random bitstream generator. In order to improve the security and key space of the proposed cryptosystem, piecewise linear chaotic map (PWLCM) based initial seeds generation for LFSRs is used. In the proposed approach, the initial value, parameter value and the number of iterations of PWLCM are kept as secret to provide security. The proposed audio encryption method for CS audio data is validated with different compressive sensing reconstruction approaches. Experimental and analytical verification shows that the proposed encryption system gives good reconstruction performance, robustness to noise, high level of scrambling and good security against several forms of attack. Moreover, since the measurement matrix used for CS operation and the initial state matrix used for 2D cellular automata are generated using the secret key, the storage/transmission requirement of the same can be avoided.</description><subject>Analysis</subject><subject>Audio data</subject><subject>Cellular automata</subject><subject>Communication</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Convex analysis</subject><subject>Data compression</subject><subject>Data Structures and Information Theory</subject><subject>Detection</subject><subject>Encryption</subject><subject>Multimedia communications</subject><subject>Multimedia computer applications</subject><subject>Multimedia Information Systems</subject><subject>Network security</subject><subject>Noise</subject><subject>Optimization algorithms</subject><subject>Random variables</subject><subject>Receivers &amp; amplifiers</subject><subject>Reconstruction</subject><subject>Sampling</subject><subject>Security</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Studies</subject><subject>Two dimensional</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kE1LxDAQhoMouK7-AG8FL16imTRp2uOy-AULXvQcYpp0u7RNTRph_70p9SCCp5mB530ZHoSugdwBIeI-ABBGMQGGKQiK6QlaARc5FoLCadrzkmDBCZyjixAOhEDBKVuhzSbWrcuC0dG30zGb9t7FZp9p14_ehNB-mSyofuzaocnUUGfadF3slM9UnFyvJnWJzqzqgrn6mWv0_vjwtn3Gu9enl-1mh3XOqglTXhpTG2G0Ztx85LnKK644o4xVttRKFCBsUYuKWmqtBUEqAUzbMp0FJypfo9uld_TuM5owyb4N8zdqMC4GCUIQWgpGyoTe_EEPLvohfZcoWiWmqGYKFkp7F4I3Vo6-7ZU_SiBylioXqTJJlbNUSVOGLpmQ2KEx_lfzv6Fv-4J5ZQ</recordid><startdate>20151201</startdate><enddate>20151201</enddate><creator>George, Sudhish N.</creator><creator>Augustine, Nishanth</creator><creator>Pattathil, Deepthi P.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20151201</creationdate><title>Audio security through compressive sampling and cellular automata</title><author>George, Sudhish N. ; Augustine, Nishanth ; Pattathil, Deepthi P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c349t-258eede7ecc45eb33a395a542449f8ca7617f6d792f2fff1709714cf8f2f650a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Analysis</topic><topic>Audio data</topic><topic>Cellular automata</topic><topic>Communication</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Convex analysis</topic><topic>Data compression</topic><topic>Data Structures and Information Theory</topic><topic>Detection</topic><topic>Encryption</topic><topic>Multimedia communications</topic><topic>Multimedia computer applications</topic><topic>Multimedia Information Systems</topic><topic>Network security</topic><topic>Noise</topic><topic>Optimization algorithms</topic><topic>Random variables</topic><topic>Receivers &amp; amplifiers</topic><topic>Reconstruction</topic><topic>Sampling</topic><topic>Security</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Studies</topic><topic>Two dimensional</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>George, Sudhish N.</creatorcontrib><creatorcontrib>Augustine, Nishanth</creatorcontrib><creatorcontrib>Pattathil, Deepthi P.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>ProQuest research library</collection><collection>Research Library (Corporate)</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>George, Sudhish N.</au><au>Augustine, Nishanth</au><au>Pattathil, Deepthi P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Audio security through compressive sampling and cellular automata</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2015-12-01</date><risdate>2015</risdate><volume>74</volume><issue>23</issue><spage>10393</spage><epage>10417</epage><pages>10393-10417</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>In this paper, a new approach for scrambling the compressive sensed (CS) audio data using two dimensional cellular automata is presented. In order to improve the security, linear feedback shift register (LFSR) based secure measurement matrix for compressive sensing is used. The basic idea is to select the different states of LFSR as the entries of a random matrix and orthonormalize these values to generate a Gaussian random measurement matrix. It is proposed to generate the initial state matrix of cellular automata using an LFSR based random bitstream generator. In order to improve the security and key space of the proposed cryptosystem, piecewise linear chaotic map (PWLCM) based initial seeds generation for LFSRs is used. In the proposed approach, the initial value, parameter value and the number of iterations of PWLCM are kept as secret to provide security. The proposed audio encryption method for CS audio data is validated with different compressive sensing reconstruction approaches. Experimental and analytical verification shows that the proposed encryption system gives good reconstruction performance, robustness to noise, high level of scrambling and good security against several forms of attack. Moreover, since the measurement matrix used for CS operation and the initial state matrix used for 2D cellular automata are generated using the secret key, the storage/transmission requirement of the same can be avoided.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-014-2172-2</doi><tpages>25</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2015-12, Vol.74 (23), p.10393-10417
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_miscellaneous_1770287408
source SpringerNature Journals
subjects Analysis
Audio data
Cellular automata
Communication
Computer Communication Networks
Computer Science
Convex analysis
Data compression
Data Structures and Information Theory
Detection
Encryption
Multimedia communications
Multimedia computer applications
Multimedia Information Systems
Network security
Noise
Optimization algorithms
Random variables
Receivers & amplifiers
Reconstruction
Sampling
Security
Special Purpose and Application-Based Systems
Studies
Two dimensional
title Audio security through compressive sampling and cellular automata
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-17T20%3A46%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Audio%20security%20through%20compressive%20sampling%20and%20cellular%20automata&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=George,%20Sudhish%20N.&rft.date=2015-12-01&rft.volume=74&rft.issue=23&rft.spage=10393&rft.epage=10417&rft.pages=10393-10417&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-014-2172-2&rft_dat=%3Cproquest_cross%3E1770287408%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1729740698&rft_id=info:pmid/&rfr_iscdi=true