Digital Audio Protection with Confusion and Diffusion Scheme Using Double-Scroll Chaotic Function

M. T. Suryadi, Yudi Satria, Muhammad Boyke

Abstract

This article describes a new idea for protecting digital audio with a confusion and diffusion scheme based on the modification of the double-scroll function and SHA-256 function. In the first scheme, the confusion process is carried out by scrambling dual channels of plain audio using the keystream of the double-scroll function in the form of the proposed new nonlinear transformation function. The initial value of the double scroll function is obtained through the SHA-256 function. In the next scheme, the diffusion process is carried out by substituting the value of the dual channels based on the nonlinear transformation function, resulting in cipher audio. The proposed algorithm based on this new idea produces a very large key space of . This means that this algorithm is highly robust to brute force attacks. Simulation of the algorithm based on the test data used produces a histogram of uniformly distributed cipher audio, and the correlation coefficient is negligible (toward zero), which can be interpreted as uncorrelated. This means that this digital audio encryption algorithm is highly resistant to statistical attacks. Another performance resulting from the algorithm in this article is that it is excellent for doing cipher and decrypted audio with reference to the PSNR value of the cipher audio being negligible (4.66037-5.04020 dB), and the PSNR value of the decrypted audio is much greater (69.28398-81.14115 dB).

 

Keywords: audio encryption, confusion, diffusion, double-scroll chaotic function, SHA-256.

 

https://doi.org/10.55463/issn.1674-2974.50.5.6


Full Text:

PDF


References


EVA N., & SURYADI M. T. Chaos-Based Encryption Algorithm for Digital Image. Proceeding IICMA 2013, Yogyakarta, 2014, pp. 169-177. https://www.researchgate.net/profile/Samsul-Arifin-2/publication/319502474_DESIGNING_ADDITION_OPERATION_LEARNING_IN_THE_MATHEMATICS_OF_GASING_FOR_RURAL_AREA_STUDENT_IN_INDONESIA/links/5d4b8b5592851cd046ab08c3/DESIGNING-ADDITION-OPERATION-LEARNING-IN-THE-MATHEMATICS-OF-GASING-FOR-RURAL-AREA-STUDENT-IN-INDONESIA.pdf#page=183

SURYADI M. T., EVA N., and DHIAN W. Performance of Chaos-Based Encryption Algorithm for Digital Image. TELKOMNIKA (Telecommunication, Computing, Electronics and Control), 2014, 12(3): 675-682. http://doi.org/10.12928/telkomnika.v12i3.106

SURYADI M. T., MARIA Y. T. I., and SATRIA Y. Encryption Algorithm using New Modified map for digital image. Journal of Physisc: Conference Series, 2017, 893: 012050. http://doi.org/10.1088/1742-6596/893/1/012050

SURYANTO Y., SURYADI M. T., and RAMLI K. A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding. Journal of Information Hiding and Multimedia Signal Processing, 2016, 7(4): 697-713. https://bit.nkust.edu.tw/2016/vol7/JIH-MSP-2016-04-003.pdf

RASHID A. A., & HUSSEIN K. A. Image encryption algorithm based on the density and 6D logistic map. International Journal of Electrical and Computer Engineering, 2023, 13(2): 1903-1913. http://doi.org/10.11591/ijece.v13i2.pp1903-1913

SURYANTO Y., SURYADI M. T., and RAMLI K. A new image encryption using color scrambling based on chaotic permutation multiple circuler shrinking and expanding. Multimedia Tools and Applications, 2017, 76(15): 16831-16854. https://doi.org/10.1007/s11042-016-3954-5

CHAUDHARY N., SHAHI T. B., and NEUPANE A. Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach. Journal of Imaging, 2022, 8(6): 167. https://doi.org/10.3390/jimaging8060167

LIU H., KADIR A., and LI Y. Audio encryption scheme by confusion and diffusion basedon multi-scroll chaotic system and one-time keys. International Journal for Light and Electron Optics, 2016, 127: 7431–7438. https://doi.org/10.1016/j.ijleo.2016.05.073

LIMA J. B. and DA SILVA NETO E. F. Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 2016, 75(14): 8403–8418. https://doi.org/10.1007/s11042-015-2755-6

ALBAHRANI E. A. A new audio encryption algorithm based on chaotic block cipher. Proceedings of the Annual Conference on New Trends in Information & Communications Technology Applications, Baghdad, 2017, pp. 22–27. https://doi.org/10.1109/NTICT.2017.7976129

KORDOV K. A novel audio encryption algorithm with permutation-substitution architecture. Electronics, 2019, 8(5): 530. https://doi.org/10.3390/electronics8050530

NAJIM AL SAAD S., & HATO E. A Speech Encryption Based on Chaotic Maps. International Journal of Computer Applications, 2014, 93(4): 19–28. http://dx.doi.org/10.5120/16203-5488

SURYADI M. T., GUNAWAN T. S., and SATRIA Y. Securing Digital Audio Using Complex Quadratic Map. Journal of Physics: Conference Series, 2018, 974: 012014. https://doi.org/10.1088/1742-6596/974/1/012014

SATHIYAMURTHI P., & RAMAKRISHNAN S. Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimedia Tools and Applications, 2020, 79(25–26): 17817–17835. https://doi.org/10.1007/s11042-020-08729-5

ABDULKADHIM H. A., & SHEHAB J. N. Audio steganography based on least significant bits algorithm with 4D grid multi-wing hyper-chaotic system. International Journal of Electrical and Computer Engineering, 2022, 12(1): 320-330. http://doi.org/10.11591/ijece.v12i1.pp320-330

AL-HAZAIMEH O. M. A new dynamic speech encryption algorithm based on lorenz chaotic map over internet protocol. International Journal of Electrical and Computer Engineering, 2020, 10(5): 4824-4834. http://doi.org/10.11591/ijece.v10i5.pp4824-4834

AL-HAZAIMEH O. M. A new speech encryption algorithm based on dual shuffling Hénon chaotic map. International Journal of Electrical and Computer Engineering, 2021, 11(3): 2203-2210. http://doi.org/10.11591/ijece.v11i3.pp2203-2210

AL-HAZAIMEH O. M., ABU-EIN A. A., NAHAR K. M., and AL-QASRAWAI I. S. Chaotic elliptic map for speech encryption. Indonesian Journal of Electrical Engineering and Computer Science, 2022, 25(2): 1103-1114. http://doi.org/10.11591/ijeecs.v25.i2.pp1103-1114

MUHALHAL L. A., & ALSHAWI I. S. A hybrid modified lightweight algorithm for achieving data integrity and confidentiality. International Journal of Electrical and Computer Engineering, 2023, 13(1): 833-841. http://doi.org/10.11591/ijece.v13i1.pp833-841

AL-KATEEB Z. N., & MOHAMMED S. J. Encrypting an audio file based on integer wavelet transform and hand geometry. TELKOMNIKA (Telecommunication, Computing, Electronics and Control), 2020, 18(4): 2012-2017. http://doi.org/10.12928/telkomnika.v18i4.14216

HIRSCH M. W., SMALE S., and DEVANEY R. L. Differential equations, dynamical systems, and an introduction to chaos. 3rd ed. Academic Press, Elsevier, 2013. https://eclass.uoa.gr/modules/document/file.php/MATH626/Morris%20W.%20Hirsch%2C%20Stephen%20Smale%20and%20Robert%20L.%20Devaney%20%28Auth.%29%20-%20Differential%20Equations%2C%20Dynamical%20Systems%2C%20and%20an%20Introduction%20to%20Chaos-Academic%20Press%20%282012%29.pdf

STALLINGS W. Cryptography and Network Security: Principle and Practice. 5th ed. Prentice Hall, New York, 2011. https://gacbe.ac.in/images/E%20books/Cryptography%20and%20Network%20Security%20-%20Prins%20and%20Pract.%205th%20ed%20-%20W.%20Stallings%20(Pearson,%202011)%20BBSbb.pdf

DAI W., XU X., SONG X., and LI G. Audio Encryption Algorithm Based on Chen Memristor Chaotic System. Symmetry, 2022, 14(1): 17. https://doi.org/10.3390/sym14010017

YAN D., WANG L., DUWAN S., CHEN J., and CHEN J. Chaotic Attractors Generated by a Memristor-Based Chaotic System and Julia Fractal. Chaos, Solitons & Fractals, 2021, 146: 110773. https://doi.org/10.1016/j.chaos.2021.110773

AKGUL A., KACAR S., and PEHLIVAN İ. An Audio Data Encryption with Single and Double Dimension Discrete-Time Chaotic Systems. The Online Journal of Science and Technology, 2015, 5(3): 14-23. https://dergipark.org.tr/en/pub/tojsat/issue/22630/241816

BASSHAM L., RUKHIN A., SOTO J., NECHVATAL J., SMID M., LEIGH S., LEVENSON M., VANGEL M., HECKERT N., and BANKS D. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. National Institute of Standards and Technology, Gaithersburg, Maryland, 2010. https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906762


Refbacks

  • There are currently no refbacks.