Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm

被引:5
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
Senthilrajan, A. [1 ]
机构
[1] Alagappa Univ, Dept Computat Logist, Karaikkudi, Tamilnadu, India
关键词
Chaotic maps; SHA-256 hash algorithm; Biometric image; Zigzag traversal; Audio encryption; Cryptanalysis; SECURITY; SCHEME;
D O I
10.1007/s11042-023-15289-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, Internet users who share personal and professional data are concerned about the safety of the data. Encryption is one way to safeguard sensitive and private data on internet sites. Encrypting audio data is more challenging than other types of data owing to the correlation between neighbouring samples. Encryption algorithms based on chaos theory are now widely used to protect digital audio and image data. Chaos theory is the idea that tiny changes in initial conditions will escalate into much more significant difference in the future. This paper proposes a robust and effective method for audio encryption based on chaos theory and user-biometric images. In addition, the SHA-256 hash technique and zigzag traversal are employed to bolster the system. First, the algorithm reads the sample values from the input audio and then separates them into byte blocks. In addition, each byte block is blended with chaotic sequences generated by the Henon map first, then by the Lorenz system. The chaotic sequences generated by the logistic map are used to create different initial values for the Henon map and Lorenz Systems. The initial values of the logistic map are constructed using the hash values of the plain audio signals and biometric images produced by the SHA-256 hash algorithm. The proposed method has a variety of desirable characteristics, such as good chaotic behaviour, low computational complexity, a huge key space, and substantial parameter space. The results of the various security and performance assessments show that the proposed algorithm is more robust and efficient than existing approaches against all forms of crypto-graphic threats.
引用
收藏
页码:43729 / 43758
页数:30
相关论文
共 50 条
  • [31] A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms
    Aydin, Yilmaz
    Garipcan, Ali Murat
    Ozkaynak, Fatih
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, : 1247 - 1260
  • [32] Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms
    Li, Huijuan
    Wang, Yurong
    Zuo, Zhengwei
    OPTICS AND LASERS IN ENGINEERING, 2019, 115 : 197 - 207
  • [33] A hash-based image encryption algorithm
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    McKevitt, Paul
    OPTICS COMMUNICATIONS, 2010, 283 (06) : 879 - 893
  • [34] Spatial chaos-based image encryption design
    Liu ShuTang
    Sun FuYan
    SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2009, 52 (02): : 177 - 183
  • [35] A chaos based image encryption and lossless compression algorithm using hash table and Chinese Remainder Theorem
    Brindha, M.
    Gounden, N. Ammasai
    APPLIED SOFT COMPUTING, 2016, 40 : 379 - 390
  • [36] Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos
    Ahmad, Musheer
    Al Solami, Eesa
    Wang, Xing-Yuan
    Doja, M. N.
    Beg, M. M. Sufyan
    Alzaidi, Amer Awad
    SYMMETRY-BASEL, 2018, 10 (07):
  • [37] Image Encryption Algorithm Based on Adaptive Wavelet Chaos
    An, Feng-Ping
    Liu, Jun-e
    JOURNAL OF SENSORS, 2019, 2019
  • [38] Cryptanalysis of a new image encryption algorithm based on chaos
    Ozkaynak, Fatih
    Ozer, Ahmet Bedri
    OPTIK, 2016, 127 (13): : 5190 - 5192
  • [39] A new unified image encryption algorithm based on a lifting transformation and chaos
    Zhang, Yong
    INFORMATION SCIENCES, 2021, 547 : 307 - 327
  • [40] Chaos-based joint compression and encryption algorithm for generating variable length ciphertext
    Lui, Oi-Yan
    Wong, Kwok-Wo
    Chen, Jianyong
    Zhou, Junwei
    APPLIED SOFT COMPUTING, 2012, 12 (01) : 125 - 132