Skip to main content
Log in

Misconstrued voice on SC-FDMA for secured comprehension - a cooperative influence of DWT and ECC

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Audio encryption needs critical attention due to an insecure channel in the wireless medium. This paper presents the first- of- its- kind work addressing a Discrete Wavelet Transform (DWT) and Elliptic Curve Cryptography (ECC) influenced Single Carrier Frequency Division Multiple Access (SC-FDMA) for secure audio data communication. The Percent Residual Deviation, Perceptual Evaluation of Speech Quality histogram, correlation coefficient, Signal to Noise Ratio Test, Peak Signal to Noise Ratio Test, Log-likelihood ratio Test, and Key sensitivity test have been performed to analyse the sternness of the suggested algorithm. Also, the scheme resists brute force, statistical and differential attacks on the encrypted audio. The proposed algorithm offers an average NSCR and UACI of 99.9819 and 33.5938, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abdelfatah RI (2020) Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8:69894–69907. https://doi.org/10.1109/ACCESS.2020.2987197

  2. Al-Saad SN, Hashim EH (2013) A speech scrambler algorithm based on chaotic system. Al- Mustansiriyah J Sci 24(5):357–372

    Google Scholar 

  3. Backstrom T, Fischer J (2018) Fast randomisation for distributed low-bitrate coding of speech and audio. IEEE/ACM Trans Audio Speech Lang Process 26(1):19–30

    Article  Google Scholar 

  4. Chang D, Li Z, Wang M, Zeng Y (2018) A novel digital programmable multi-scroll chaotic system and its application in FPGA-based audio secure communication. AEU - Int J Electron Commun 88(November):20–29

  5. De Andrade JF, De Campos MLR, Apolinário JA (2008) Speech privacy for modern mobile communication systems. ICASSP, IEEE Int. Conf. Acoust. Speech Signal Process - Proc 1, pp 1777–1780

  6. Elshamy EM et al (2015) Efficient audio cryptosystem based on chaotic maps and double random phase encoding. Int J Speech Technol 18(4):619–631

    Article  Google Scholar 

  7. El-Zoghdy SF, El-sayed HS, Faragallah OS (2020) Transmission of chaotic-based encrypted audio through OFDM (2020). Wirel Pers Commun 113:241–261. https://doi.org/10.1007/s11277-020-07187-4

  8. Ergünay SK, Khoury E, Lazaridis A, Marcel S (2015) On the vulnerability of speaker verification to realistic voice spoofing. 2015 IEEE 7th Int. Conf. Biometrics Theory, Appl Syst BTAS

  9. Faragallah OS (2018) Secure audio cryptosystem using hashed image LSB watermarking and encryption. Wirel Pers Commun 98(2):2009–2023

    Article  Google Scholar 

  10. Faragallah OS, El-Sayed HS (2021) Secure opto-audio cryptosystem using XORing Mask and Hartley Transform. IEEE Access 9:25437–25449

  11. Ghasemzadeh A, Esmaeili E (2017) A novel method in audio message encryption based on a mixture of chaos function. Int J Speech Technol 20(4):829–837

    Article  Google Scholar 

  12. Huang S (2020) The influence of digital multimedia communication forms on graphic design. Comput Syst Sci Eng 35:215–222. https://doi.org/10.32604/csse.2020.35.215

    Article  Google Scholar 

  13. Janarthanan A, Kumar D (2019) Localisation based evolutionary routing (lober) for efficient aggregation in wireless multimedia sensor networks. Comput Mater Contin 60(3):895–912

    Article  Google Scholar 

  14. Kakaei Kate H, Razmara J, Isazadeh A (2018) A novel fast and secure approach for voice encryption based on DNA computing. 3D Res 9(17). https://doi.org/10.1007/s13319-018-0167-x

  15. Lakshmi C, Ravi VM, Thenmozhi K, Rayappan JBB, Amirtharajan R (2020) Con(dif)fused voice to convey secret: a dual-domain approach. Multimed Syst. https://doi.org/10.1007/s00530-019-00644-6

    Article  Google Scholar 

  16. Li G, Pu Y, Yang B, Zhao J (2018) Synchronisation between different hyper chaotic systems and dimensions of cellular neural network and its design in audio encryption. Cluster Comput 22:7423–7434. https://doi.org/10.1007/s10586-018-1700-7

  17. Li C, Li S, Lou DC, Zhang D. On the security of the Yen-Guo’s domino signal encryption algorithm (DSEA). J Syst Softw 79(2):253–258

  18. Lima JB, Da Silva Neto EF (2016) Audio encryption based on the cosine number transform. Multimed Tools Appl 75(14):8403–8418

    Article  Google Scholar 

  19. Lin Q, Yin F, Mei T, Liang H, Member S (2006) A blind source separation based method for speech encryption. IEEE Trans Circuits Syst 53(6):1320–1328

    Article  MathSciNet  Google Scholar 

  20. Lin C-M, Pham D-H, Huynh T-T(2021) Synchronisation of chaotic system using a brain-imitated neural network controller and its applications for secure communications. Access IEEE 9:75923–75944

  21. Luma A, Ameti L (2014) ECC secured voice transmitter. Lect Notes Eng Comput Sci 1:488–491

    Google Scholar 

  22. Luma A, Selimi B, Ameti L (2015) Using elliptic curve encryption and decryption for securing audio messages. In: Yang GC, Ao SI, Gelman L (eds) Transactions on Engineering Technologies. Springer, Dordrecht pp 599–613, 2014

  23. Ma J, Hu Y, Loizou PC (2009) Objective measures for predicting speech intelligibility in noisy conditions based on new band-importance functions. J Acoust Soc Am 125(5):3387

    Article  Google Scholar 

  24. Mosa E, Messiha NW, Zahran Z, Abd El-Samie(2011) Chaotic encryption of speech signals. Int J Speech Technol 14:285–296

    Article  Google Scholar 

  25. Padmapriya VM, Thenmozhi K, Praveenkumar P et al (2020) ECC joins first time with SC-FDMA for Mission “security”. Multimed Tools Appl 79:17945–17967. https://doi.org/10.1007/s11042-020-08610-5

    Article  Google Scholar 

  26. Paul V (2006) A novel hybrid encryption method for multimedia encryption using elliptic curve cryptography and TDMRC. Int J Emerg Res Manag Technol 6(7):1, 2018

  27. Roy A, Misra AP (2017) Audio signal encryption using chaotic Hénon map and lifting wavelet transforms. Eur Phys J Plus 132(12):1–10

    Article  Google Scholar 

  28. Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. Eurasip J Audio Speech Music Process 2017(1). https://doi.org/10.1186/s13636-017-0118-0

  29. Sathiyamurthi P, Ramakrishnan S (2020) Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08729-5

    Article  Google Scholar 

  30. Satti M, Kak S (2009) Multilevel indexed quasigroup encryption for data and speech. IEEE Trans Broadcast 55(2)Part 1:270–281

  31. Schürmann D, Sigg S (2013) Secure communication based on ambient audio. IEEE Trans Mob Comput 12(2):358-370. https://doi.org/10.1109/TMC.2011.271

  32. Servetti A, De Martin JC (2002) Perception-based partial encryption of compressed speech. IEEE Trans Speech Audio Process 10(8):637–643. https://doi.org/10.1109/TSA.2002.804300

  33. Sheela SJ, Suresh KV, Tandur D (2017) A novel audio cryptosystem using chaotic maps and DNA encoding. J Comput Netw Commun 2017. https://doi.org/10.1155/2017/2721910

  34. Singh S, Jeong, Y-S, Park J (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75. https://doi.org/10.1016/j.jnca.2016.09.002

  35. Singh LD, Singh KM (2015) Implementation of text encryption using elliptic curve cryptography. Procedia Comput Sci 54(1):73–82

    Article  MathSciNet  Google Scholar 

  36. Singh S, Sharma PK, Moon SY et al (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-017-0494-4

    Article  Google Scholar 

  37. Sokouti M, Sokouti B (2018) A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties. Comput Sci Rev 29:14–20

    Article  Google Scholar 

  38. Spanias A, Painter T, Atti V (2010) Audio signal processing and coding. Wiley, Hoboken

  39. Sufi JHF, Han F (2014) A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications. Secur Commun Netw 2010(August):515–524

  40. Toosy F, Ehsan MS (2020) Statistical inference of user experience of multichannel audio on mobile phones. Comput Mater Contin 65(2):1253–1270

    Article  Google Scholar 

  41. Wang X, Su Y (2020) An audio encryption algorithm based on DNA coding and chaotic system. IEEE Access 8(8946578):9260–9270. https://doi.org/10.1109/ACCESS.2019.2963329

  42. Wu CP, Kuo CCJ (2005) Design of integrated multimedia compression and encryption systems. IEEE Trans Multimed 7(5):828–839

    Article  Google Scholar 

  43. Wu Q, Wu M (2018) Adaptive and blind audio watermarking algorithm based on chaotic encryption in hybrid domain. Symmetry (Basel) 10:7

    Google Scholar 

  44. Xiang Y, Natgunanathan I, Peng D, Hua G, Liu B (2018) Spread spectrum audio watermarking using multiple orthogonal PN sequences and variable embedding strengths and polarities. IEEE/ACM Trans Audio Speech Lang Process 26(3):529–539

    Article  Google Scholar 

Download references

Acknowledgements

Authors thank the Department of Science & Technology, New Delhi, for the FIST funding (SR/FST/ET-I/2018/221(C)). In addition, the authors wish to thank SASTRA-Keysight Centre for Excellence in RF System Engineering at the School of Electrical & Electronics Engineering, SASTRA Deemed University, for providing infrastructural support to carry out this research work.

Author information

Authors and Affiliations

Authors

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Padmapriya, V.M., Thenmozhi, K., Praveenkumar, P. et al. Misconstrued voice on SC-FDMA for secured comprehension - a cooperative influence of DWT and ECC. Multimed Tools Appl 81, 7201–7217 (2022). https://doi.org/10.1007/s11042-022-11996-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-11996-z

Keywords

Navigation