Abstract
Audio encryption needs critical attention due to an insecure channel in the wireless medium. This paper presents the first- of- its- kind work addressing a Discrete Wavelet Transform (DWT) and Elliptic Curve Cryptography (ECC) influenced Single Carrier Frequency Division Multiple Access (SC-FDMA) for secure audio data communication. The Percent Residual Deviation, Perceptual Evaluation of Speech Quality histogram, correlation coefficient, Signal to Noise Ratio Test, Peak Signal to Noise Ratio Test, Log-likelihood ratio Test, and Key sensitivity test have been performed to analyse the sternness of the suggested algorithm. Also, the scheme resists brute force, statistical and differential attacks on the encrypted audio. The proposed algorithm offers an average NSCR and UACI of 99.9819 and 33.5938, respectively.
Similar content being viewed by others
References
Abdelfatah RI (2020) Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8:69894–69907. https://doi.org/10.1109/ACCESS.2020.2987197
Al-Saad SN, Hashim EH (2013) A speech scrambler algorithm based on chaotic system. Al- Mustansiriyah J Sci 24(5):357–372
Backstrom T, Fischer J (2018) Fast randomisation for distributed low-bitrate coding of speech and audio. IEEE/ACM Trans Audio Speech Lang Process 26(1):19–30
Chang D, Li Z, Wang M, Zeng Y (2018) A novel digital programmable multi-scroll chaotic system and its application in FPGA-based audio secure communication. AEU - Int J Electron Commun 88(November):20–29
De Andrade JF, De Campos MLR, Apolinário JA (2008) Speech privacy for modern mobile communication systems. ICASSP, IEEE Int. Conf. Acoust. Speech Signal Process - Proc 1, pp 1777–1780
Elshamy EM et al (2015) Efficient audio cryptosystem based on chaotic maps and double random phase encoding. Int J Speech Technol 18(4):619–631
El-Zoghdy SF, El-sayed HS, Faragallah OS (2020) Transmission of chaotic-based encrypted audio through OFDM (2020). Wirel Pers Commun 113:241–261. https://doi.org/10.1007/s11277-020-07187-4
Ergünay SK, Khoury E, Lazaridis A, Marcel S (2015) On the vulnerability of speaker verification to realistic voice spoofing. 2015 IEEE 7th Int. Conf. Biometrics Theory, Appl Syst BTAS
Faragallah OS (2018) Secure audio cryptosystem using hashed image LSB watermarking and encryption. Wirel Pers Commun 98(2):2009–2023
Faragallah OS, El-Sayed HS (2021) Secure opto-audio cryptosystem using XORing Mask and Hartley Transform. IEEE Access 9:25437–25449
Ghasemzadeh A, Esmaeili E (2017) A novel method in audio message encryption based on a mixture of chaos function. Int J Speech Technol 20(4):829–837
Huang S (2020) The influence of digital multimedia communication forms on graphic design. Comput Syst Sci Eng 35:215–222. https://doi.org/10.32604/csse.2020.35.215
Janarthanan A, Kumar D (2019) Localisation based evolutionary routing (lober) for efficient aggregation in wireless multimedia sensor networks. Comput Mater Contin 60(3):895–912
Kakaei Kate H, Razmara J, Isazadeh A (2018) A novel fast and secure approach for voice encryption based on DNA computing. 3D Res 9(17). https://doi.org/10.1007/s13319-018-0167-x
Lakshmi C, Ravi VM, Thenmozhi K, Rayappan JBB, Amirtharajan R (2020) Con(dif)fused voice to convey secret: a dual-domain approach. Multimed Syst. https://doi.org/10.1007/s00530-019-00644-6
Li G, Pu Y, Yang B, Zhao J (2018) Synchronisation between different hyper chaotic systems and dimensions of cellular neural network and its design in audio encryption. Cluster Comput 22:7423–7434. https://doi.org/10.1007/s10586-018-1700-7
Li C, Li S, Lou DC, Zhang D. On the security of the Yen-Guo’s domino signal encryption algorithm (DSEA). J Syst Softw 79(2):253–258
Lima JB, Da Silva Neto EF (2016) Audio encryption based on the cosine number transform. Multimed Tools Appl 75(14):8403–8418
Lin Q, Yin F, Mei T, Liang H, Member S (2006) A blind source separation based method for speech encryption. IEEE Trans Circuits Syst 53(6):1320–1328
Lin C-M, Pham D-H, Huynh T-T(2021) Synchronisation of chaotic system using a brain-imitated neural network controller and its applications for secure communications. Access IEEE 9:75923–75944
Luma A, Ameti L (2014) ECC secured voice transmitter. Lect Notes Eng Comput Sci 1:488–491
Luma A, Selimi B, Ameti L (2015) Using elliptic curve encryption and decryption for securing audio messages. In: Yang GC, Ao SI, Gelman L (eds) Transactions on Engineering Technologies. Springer, Dordrecht pp 599–613, 2014
Ma J, Hu Y, Loizou PC (2009) Objective measures for predicting speech intelligibility in noisy conditions based on new band-importance functions. J Acoust Soc Am 125(5):3387
Mosa E, Messiha NW, Zahran Z, Abd El-Samie(2011) Chaotic encryption of speech signals. Int J Speech Technol 14:285–296
Padmapriya VM, Thenmozhi K, Praveenkumar P et al (2020) ECC joins first time with SC-FDMA for Mission “security”. Multimed Tools Appl 79:17945–17967. https://doi.org/10.1007/s11042-020-08610-5
Paul V (2006) A novel hybrid encryption method for multimedia encryption using elliptic curve cryptography and TDMRC. Int J Emerg Res Manag Technol 6(7):1, 2018
Roy A, Misra AP (2017) Audio signal encryption using chaotic Hénon map and lifting wavelet transforms. Eur Phys J Plus 132(12):1–10
Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. Eurasip J Audio Speech Music Process 2017(1). https://doi.org/10.1186/s13636-017-0118-0
Sathiyamurthi P, Ramakrishnan S (2020) Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08729-5
Satti M, Kak S (2009) Multilevel indexed quasigroup encryption for data and speech. IEEE Trans Broadcast 55(2)Part 1:270–281
Schürmann D, Sigg S (2013) Secure communication based on ambient audio. IEEE Trans Mob Comput 12(2):358-370. https://doi.org/10.1109/TMC.2011.271
Servetti A, De Martin JC (2002) Perception-based partial encryption of compressed speech. IEEE Trans Speech Audio Process 10(8):637–643. https://doi.org/10.1109/TSA.2002.804300
Sheela SJ, Suresh KV, Tandur D (2017) A novel audio cryptosystem using chaotic maps and DNA encoding. J Comput Netw Commun 2017. https://doi.org/10.1155/2017/2721910
Singh S, Jeong, Y-S, Park J (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75. https://doi.org/10.1016/j.jnca.2016.09.002
Singh LD, Singh KM (2015) Implementation of text encryption using elliptic curve cryptography. Procedia Comput Sci 54(1):73–82
Singh S, Sharma PK, Moon SY et al (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-017-0494-4
Sokouti M, Sokouti B (2018) A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties. Comput Sci Rev 29:14–20
Spanias A, Painter T, Atti V (2010) Audio signal processing and coding. Wiley, Hoboken
Sufi JHF, Han F (2014) A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications. Secur Commun Netw 2010(August):515–524
Toosy F, Ehsan MS (2020) Statistical inference of user experience of multichannel audio on mobile phones. Comput Mater Contin 65(2):1253–1270
Wang X, Su Y (2020) An audio encryption algorithm based on DNA coding and chaotic system. IEEE Access 8(8946578):9260–9270. https://doi.org/10.1109/ACCESS.2019.2963329
Wu CP, Kuo CCJ (2005) Design of integrated multimedia compression and encryption systems. IEEE Trans Multimed 7(5):828–839
Wu Q, Wu M (2018) Adaptive and blind audio watermarking algorithm based on chaotic encryption in hybrid domain. Symmetry (Basel) 10:7
Xiang Y, Natgunanathan I, Peng D, Hua G, Liu B (2018) Spread spectrum audio watermarking using multiple orthogonal PN sequences and variable embedding strengths and polarities. IEEE/ACM Trans Audio Speech Lang Process 26(3):529–539
Acknowledgements
Authors thank the Department of Science & Technology, New Delhi, for the FIST funding (SR/FST/ET-I/2018/221(C)). In addition, the authors wish to thank SASTRA-Keysight Centre for Excellence in RF System Engineering at the School of Electrical & Electronics Engineering, SASTRA Deemed University, for providing infrastructural support to carry out this research work.
Author information
Authors and Affiliations
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Padmapriya, V.M., Thenmozhi, K., Praveenkumar, P. et al. Misconstrued voice on SC-FDMA for secured comprehension - a cooperative influence of DWT and ECC. Multimed Tools Appl 81, 7201–7217 (2022). https://doi.org/10.1007/s11042-022-11996-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-11996-z