Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm

被引:5
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
Senthilrajan, A. [1 ]
机构
[1] Alagappa Univ, Dept Computat Logist, Karaikkudi, Tamilnadu, India
关键词
Chaotic maps; SHA-256 hash algorithm; Biometric image; Zigzag traversal; Audio encryption; Cryptanalysis; SECURITY; SCHEME;
D O I
10.1007/s11042-023-15289-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, Internet users who share personal and professional data are concerned about the safety of the data. Encryption is one way to safeguard sensitive and private data on internet sites. Encrypting audio data is more challenging than other types of data owing to the correlation between neighbouring samples. Encryption algorithms based on chaos theory are now widely used to protect digital audio and image data. Chaos theory is the idea that tiny changes in initial conditions will escalate into much more significant difference in the future. This paper proposes a robust and effective method for audio encryption based on chaos theory and user-biometric images. In addition, the SHA-256 hash technique and zigzag traversal are employed to bolster the system. First, the algorithm reads the sample values from the input audio and then separates them into byte blocks. In addition, each byte block is blended with chaotic sequences generated by the Henon map first, then by the Lorenz system. The chaotic sequences generated by the logistic map are used to create different initial values for the Henon map and Lorenz Systems. The initial values of the logistic map are constructed using the hash values of the plain audio signals and biometric images produced by the SHA-256 hash algorithm. The proposed method has a variety of desirable characteristics, such as good chaotic behaviour, low computational complexity, a huge key space, and substantial parameter space. The results of the various security and performance assessments show that the proposed algorithm is more robust and efficient than existing approaches against all forms of crypto-graphic threats.
引用
收藏
页码:43729 / 43758
页数:30
相关论文
共 50 条
  • [41] BREAKING AN IMAGE ENCRYPTION ALGORITHM BASED ON CHAOS
    Li, Chengqing
    Chen, Michael Z. Q.
    Lo, Kwok-Tung
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2011, 21 (07): : 2067 - 2076
  • [42] A chaos-based probabilistic block cipher for image encryption
    Dhall, Sakshi
    Pal, Saibal K.
    Sharma, Kapil
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (01) : 1533 - 1543
  • [43] A Chaos-Based Video Watermarking Algorithm
    Mohammadi, Somayyeh
    Hakimi, Ahmad
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 4 (01): : 77 - 86
  • [44] Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box
    Wang, Juan
    Liu, Ge
    Chen, Yongqi
    Wang, Shu
    IEEE ACCESS, 2021, 9 : 61768 - 61777
  • [45] Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism
    Xiao, Shenyong
    Yu, ZhiJun
    Deng, YaShuang
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [46] Breaking a novel colour image encryption algorithm based on chaos
    Li, Chengqing
    Zhang, Leo Yu
    Ou, Rong
    Wong, Kwok-Wo
    Shu, Shi
    NONLINEAR DYNAMICS, 2012, 70 (04) : 2383 - 2388
  • [47] A plaintext-related image encryption algorithm based on chaos
    Zhang, Yong
    Tang, Yingjun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (06) : 6647 - 6669
  • [48] The fast image encryption algorithm based on lifting scheme and chaos
    Zhang, Yong
    INFORMATION SCIENCES, 2020, 520 (520) : 177 - 194
  • [49] Efficient Image Encryption Using a Chaos-based PWL Memristor
    Lin, Zhaohui
    Wang, Hongxia
    IETE TECHNICAL REVIEW, 2010, 27 (04) : 318 - 325
  • [50] Hash key-based image encryption using crossover operator and chaos
    Guesmi, Ramzi
    Ben Farah, Mohamed Amine
    Kachouri, Abdennaceur
    Samet, Mounir
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) : 4753 - 4769