Digital Audio Protection with Confusion and Diffusion Scheme Using Double-Scroll Chaotic Function

M. T. Suryadi, Yudi Satria, Muhammad Boyke


This article describes a new idea for protecting digital audio with a confusion and diffusion scheme based on the modification of the double-scroll function and SHA-256 function. In the first scheme, the confusion process is carried out by scrambling dual channels of plain audio using the keystream of the double-scroll function in the form of the proposed new nonlinear transformation function. The initial value of the double scroll function is obtained through the SHA-256 function. In the next scheme, the diffusion process is carried out by substituting the value of the dual channels based on the nonlinear transformation function, resulting in cipher audio. The proposed algorithm based on this new idea produces a very large key space of . This means that this algorithm is highly robust to brute force attacks. Simulation of the algorithm based on the test data used produces a histogram of uniformly distributed cipher audio, and the correlation coefficient is negligible (toward zero), which can be interpreted as uncorrelated. This means that this digital audio encryption algorithm is highly resistant to statistical attacks. Another performance resulting from the algorithm in this article is that it is excellent for doing cipher and decrypted audio with reference to the PSNR value of the cipher audio being negligible (4.66037-5.04020 dB), and the PSNR value of the decrypted audio is much greater (69.28398-81.14115 dB).


Keywords: audio encryption, confusion, diffusion, double-scroll chaotic function, SHA-256.

Full Text:



EVA N., & SURYADI M. T. Chaos-Based Encryption Algorithm for Digital Image. Proceeding IICMA 2013, Yogyakarta, 2014, pp. 169-177.

SURYADI M. T., EVA N., and DHIAN W. Performance of Chaos-Based Encryption Algorithm for Digital Image. TELKOMNIKA (Telecommunication, Computing, Electronics and Control), 2014, 12(3): 675-682.

SURYADI M. T., MARIA Y. T. I., and SATRIA Y. Encryption Algorithm using New Modified map for digital image. Journal of Physisc: Conference Series, 2017, 893: 012050.

SURYANTO Y., SURYADI M. T., and RAMLI K. A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding. Journal of Information Hiding and Multimedia Signal Processing, 2016, 7(4): 697-713.

RASHID A. A., & HUSSEIN K. A. Image encryption algorithm based on the density and 6D logistic map. International Journal of Electrical and Computer Engineering, 2023, 13(2): 1903-1913.

SURYANTO Y., SURYADI M. T., and RAMLI K. A new image encryption using color scrambling based on chaotic permutation multiple circuler shrinking and expanding. Multimedia Tools and Applications, 2017, 76(15): 16831-16854.

CHAUDHARY N., SHAHI T. B., and NEUPANE A. Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach. Journal of Imaging, 2022, 8(6): 167.

LIU H., KADIR A., and LI Y. Audio encryption scheme by confusion and diffusion basedon multi-scroll chaotic system and one-time keys. International Journal for Light and Electron Optics, 2016, 127: 7431–7438.

LIMA J. B. and DA SILVA NETO E. F. Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 2016, 75(14): 8403–8418.

ALBAHRANI E. A. A new audio encryption algorithm based on chaotic block cipher. Proceedings of the Annual Conference on New Trends in Information & Communications Technology Applications, Baghdad, 2017, pp. 22–27.

KORDOV K. A novel audio encryption algorithm with permutation-substitution architecture. Electronics, 2019, 8(5): 530.

NAJIM AL SAAD S., & HATO E. A Speech Encryption Based on Chaotic Maps. International Journal of Computer Applications, 2014, 93(4): 19–28.

SURYADI M. T., GUNAWAN T. S., and SATRIA Y. Securing Digital Audio Using Complex Quadratic Map. Journal of Physics: Conference Series, 2018, 974: 012014.

SATHIYAMURTHI P., & RAMAKRISHNAN S. Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimedia Tools and Applications, 2020, 79(25–26): 17817–17835.

ABDULKADHIM H. A., & SHEHAB J. N. Audio steganography based on least significant bits algorithm with 4D grid multi-wing hyper-chaotic system. International Journal of Electrical and Computer Engineering, 2022, 12(1): 320-330.

AL-HAZAIMEH O. M. A new dynamic speech encryption algorithm based on lorenz chaotic map over internet protocol. International Journal of Electrical and Computer Engineering, 2020, 10(5): 4824-4834.

AL-HAZAIMEH O. M. A new speech encryption algorithm based on dual shuffling Hénon chaotic map. International Journal of Electrical and Computer Engineering, 2021, 11(3): 2203-2210.

AL-HAZAIMEH O. M., ABU-EIN A. A., NAHAR K. M., and AL-QASRAWAI I. S. Chaotic elliptic map for speech encryption. Indonesian Journal of Electrical Engineering and Computer Science, 2022, 25(2): 1103-1114.

MUHALHAL L. A., & ALSHAWI I. S. A hybrid modified lightweight algorithm for achieving data integrity and confidentiality. International Journal of Electrical and Computer Engineering, 2023, 13(1): 833-841.

AL-KATEEB Z. N., & MOHAMMED S. J. Encrypting an audio file based on integer wavelet transform and hand geometry. TELKOMNIKA (Telecommunication, Computing, Electronics and Control), 2020, 18(4): 2012-2017.

HIRSCH M. W., SMALE S., and DEVANEY R. L. Differential equations, dynamical systems, and an introduction to chaos. 3rd ed. Academic Press, Elsevier, 2013.

STALLINGS W. Cryptography and Network Security: Principle and Practice. 5th ed. Prentice Hall, New York, 2011.,%202011)%20BBSbb.pdf

DAI W., XU X., SONG X., and LI G. Audio Encryption Algorithm Based on Chen Memristor Chaotic System. Symmetry, 2022, 14(1): 17.

YAN D., WANG L., DUWAN S., CHEN J., and CHEN J. Chaotic Attractors Generated by a Memristor-Based Chaotic System and Julia Fractal. Chaos, Solitons & Fractals, 2021, 146: 110773.

AKGUL A., KACAR S., and PEHLIVAN İ. An Audio Data Encryption with Single and Double Dimension Discrete-Time Chaotic Systems. The Online Journal of Science and Technology, 2015, 5(3): 14-23.

BASSHAM L., RUKHIN A., SOTO J., NECHVATAL J., SMID M., LEIGH S., LEVENSON M., VANGEL M., HECKERT N., and BANKS D. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. National Institute of Standards and Technology, Gaithersburg, Maryland, 2010.


  • There are currently no refbacks.