Secure Audio Transmission Over Wireless Uncorrelated Rayleigh Fading Channel

被引:1
作者
Faragallah, Osama S. [1 ]
Farouk, M. [2 ]
El-sayed, Hala S. [3 ]
El-bendary, Mohsen A. M. [4 ]
机构
[1] Taif Univ, Dept Informat Technol, Coll Comp & Informat Technol, POB 11099, At Taif 21944, Saudi Arabia
[2] Menoufia Univ, Dept Comp Sci & Engn, Fac Elect Engn, Menoufia 32952, Egypt
[3] Menoufia Univ, Dept Elect Engn, Fac Engn, Shibin Al Kawm 32511, Egypt
[4] Helwan Univ, Fac Technol & Educ, Dept Elect Technol, Cairo, Egypt
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 70卷 / 01期
关键词
Audio communications; encryption; uncorrelated Rayleigh fading channel; WATERMARKING;
D O I
10.32604/cmc.2022.019710
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Audio communications and computer networking play essential roles in our daily lives, including many domains with different scopes. Developments in these technologies are quick. In consequence, there is a dire need to secure these technologies up to date. This paper presents an efficient model for secure audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel. Also, the performance of the utilized multiple secret keys-based audio cryptosystem is analyzed in different transformation domains. The discrete cosine transform (DCT), the discrete sine transform (DST), and the discrete wavelet transform (DWT) are investigated in the utilized multiple secret key-based audio cryptosystem. Simulation results show consistent results with the wireless noisy channel. The performance of the proposed multiple secret keys-based audio cryptosystem can be ranked concerning the employed domain as DWT, DCT, and DST transform techniques. The simulation experiments proved that the presented multiple secret keysbased audio cryptosystem for audio signals transmitted over the wireless noisy uncorrelated Rayleigh fading channel achieves reliable and secure wireless link utilizing combined multi security layers.
引用
收藏
页码:1603 / 1615
页数:13
相关论文
共 31 条
  • [1] Abdulrazzaq ST., 2020, SN Comp. Sci, V1, P1
  • [2] Borujeni SE, 2000, ICECS 2000: 7TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS & SYSTEMS, VOLS I AND II, P290, DOI 10.1109/ICECS.2000.911539
  • [3] Chaotic image encryption system using phase-magnitude transformation and pixel substitution
    Borujeni, Shahram Etemadi
    Eshghi, Mohammad
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 525 - 537
  • [4] Castiglione Arcangelo, 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems, P157, DOI 10.1109/INCoS.2013.32
  • [5] A novel quantum steganography-Steganalysis system for audio signals
    Chaharlang, Javad
    Mosleh, Mohammad
    Rasouli-Heikalabad, Saeed
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (25-26) : 17551 - 17577
  • [6] Daemen J, 2005, ENCY CRYPTOGRAPHY SE, P520
  • [7] Complexity considerations: efficient image transmission over mobile communications channels
    El-Bendary, Mohsen A. M.
    Abou El-Azm, A. E.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (12) : 16633 - 16664
  • [8] Sensitivity of automatic speaker identification to SVD digital audio watermarking
    El-Samie, Fathi
    Shafik, Amira
    El-Sayed, Hala
    Elhalafawy, Said
    Diab, Salaheldin
    Sallam, Bassiouny
    Faragallah, Osama
    [J]. INTERNATIONAL JOURNAL OF SPEECH TECHNOLOGY, 2015, 18 (04) : 565 - 581
  • [9] Transmission of Chaotic-based Encrypted Audio Through OFDM
    El-Zoghdy, S. F.
    El-sayed, Hala S.
    Faragallah, Osama S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (01) : 241 - 261
  • [10] Efficient audio cryptosystem based on chaotic maps and double random phase encoding
    Elshamy E.M.
    El-Rabaie E.-S.M.
    Faragallah O.S.
    Elshakankiry O.A.
    Abd El-Samie F.E.
    El-sayed H.S.
    El-Zoghdy S.F.
    [J]. International Journal of Speech Technology, 2015, 18 (04) : 619 - 631