Speech Encryption Based On Multi Stage Permutation Using Multiple Chaotic System  
  Authors : P. Sathiyamurthi; T. Sasi Prabha; K. R. Vani Sri; V. Vanitha; S. Vinitha

 

In our paper we are using the multiple mapping techniques. Our proposed system provides robustness across open/shared network. The Speech signals are encrypted by means of various effective one dimensional chaotic mapping techniques which provides greater security. Various testing methods are employed to estimate the efficiency of the system. The results from the analysis show that our proposed system of Speech encryption guarantees stronger protection against various security attacks.

 

Published In : IJCAT Journal Volume 3, Issue 3

Date of Publication : March 2016

Pages : 137 - 141

Figures :07/p>

Tables : 02

Publication Link :Speech Encryption Based On Multi Stage Permutation Using Multiple Chaotic System

 

 

 

P. Sathiyamurthi : Department of Information Technology Dr. Mahalingam College of Engineering and Technology, Pollachi, Coimbatore - 642003, India

T. Sasi Prabha : Department of Information Technology Dr. Mahalingam College of Engineering and Technology, Pollachi, Coimbatore - 642003, India

K. R. Vani Sri : Department of Information Technology Dr. Mahalingam College of Engineering and Technology, Pollachi, Coimbatore - 642003, India

V. Vanitha : Department of Information Technology Dr. Mahalingam College of Engineering and Technology, Pollachi, Coimbatore - 642003, India

S. Vinitha : Department of Information Technology Dr. Mahalingam College of Engineering and Technology, Pollachi, Coimbatore - 642003, India

 

 

 

 

 

 

 

Encryption, Speech Signal, Logistic Map, Chaotic Map

Today speech encryption is most important one to secure the speech from various attacks. Since our system is implemented with different chaotic maps like Logistic, Quadratic and Sine mapping technique, it is more robust and efficient than other existing systems.

 

 

 

 

 

 

 

 

 

[1] Y. Niu, X. Wang, “An anonymous key agreement protocol based on chaotic maps”, Elsevier Journal on Communication in Nonlinear Science and Numerical Simulator 16 (2011) pp.13-15 [2] EmadMosa, Nagy W.Messiha, Osama Zahran, Fathi E. Abd El-Samie, “Chaotic encryption of speech signals”, International Journal of Speech Technology (2011) pp.285-296 [3] Musheer Ahmad, Bashir Alam and Omar Farooq ,” Chaos Based Mixed Keystream Generation for Voice Data Encryption”, International Journal on Cryptography and Information Security (2012) Vol. 2, No. 1, pp.36-45 [4] Dora M.BallesterosL, JuanM.Moreno A, “Real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key”, Elsevier International Journal (2013) [5] SK Hafizul Islam, “Design and analysis of a three party password based authenticated key exchange protocol using extended chaotic maps”, Elsevier International Journal on Information Sciences (2015) pp. 104-130 [6] Iasonas Kokkinos, Petros Maragos, “Nonlinear Speech Analysis Using Models for Chaotic Systems“, IEEE Transactions on Speech and Audio Processing (2005) [7] Howard M. Heys and Stafford E. Tavares, “Avalanche Characteristics of Substitution- Permutation Encryption Networks”, IEEE transactions on computers (2005) vol.44, pp. 9 [8] Barboza R, “Dynamics of a hyper chaotic Lorenz system”, Springer International Journal on Bifurcation Chaos (2007) pp.4285–4294 [9] Azzaz MS, Tanougast C, Sadoudi S, Dandache A, Monteiro F, “Real-time image encryption based chaotic synchronized embedded cryptosystems”, 8th IEEE international NEWCAS conference (2010) pp. 61–64 [10] Kumar KJJ, Salivahanan S, Reddy KCK, “Implementation of low power scalable encryption algorithm”, International Journal on Computer Applications (2010) pp.14–18 [11] K. W. Tang, and W. K. S. Tang, “A Chaos-based Secure Voice Communication System”,International Conference on Industrial Technology (2005) pp. 571–576 [12] K. P. Man, K. W. Wong and K. F. Man, “Security Enhancement on VoIP using Chaotic Cryptography”, International Conference on Industrial Electronics (2006) pp. 3703–3708 [13] Mosa E, Messiha NW, Zahran O, “Chaotic encryption of speech signals in transform domains”, International conference on computer engineering & systems (2009) pp.300–305 [14] H. Tseng, R. Jan, W. Yang, “A chaotic maps-based key agreement protocol that preserves user anonymity”, IEEE International Conference in Communications (ICC09) (2009) pp. 1–6 [15] Zhaopin Su, Jianguo Jiang, ShiguoLian, Donghui Hu, Changyong Liang, Guofu Zhang, “Selective Encryption for G.729 Speech Using Chaotic Maps”, International Conference on Multimedia Information Networking and Security, (2009) pp. 488- 492.