Secure speech coding communication using hyperchaotic key generators for AMR-WB codec

被引:8
作者
Boumaraf, Messaouda [1 ]
Merazka, Fatiha [1 ]
机构
[1] USTHB Univ, Telecommun Dept, LISIC Lab, Algiers, Algeria
关键词
Speech encryption; Hyperchaos; Lyapunov exponent; EMBSD; ENCRYPTION; CRYPTANALYSIS;
D O I
10.1007/s00530-020-00738-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Classical cryptosystems are not suitable for all situations for they fail to meet some current security requirements due to their small keyspace, which makes them prone to brute-force attacks, as well as their inefficiency in real-time applications due to their considerable time complexity. Recently, secure applications such as hyperchaos-based speech signals became a focal topic for research. Their properties such as unpredictability and randomness make them an efficient alternative for data protection. In this paper, a new 4D hyperchaotic cryptosystem based on the Lorenz system is introduced by adding a new state to its classical equation for full and partial encryption of speech coded using AMR-WB G.722.2 Codec. For higher computational security, we perform the encryption by combining both confusion and diffusion mechanisms, and to evaluate the efficiency of our proposed cryptosystem scheme, several experiments are carried out on the basis of the waveform and spectrogram analysis, sensitivity analysis, keyspace analysis, statistical analysis, differential analysis, as well as objective and subjective measurement tools of speech quality, namely, Enhanced Modified Bark Spectral Distortion and WideBand Perceptual Evaluation of Speech Quality as the objective measure and Mean Opinion Score and MUltiple Stimuli with Hidden Reference and Anchor as the subjective one. The experimental results proves the robustness of our cryptosystem and its adequacy for real-time secure speech communication.
引用
收藏
页码:247 / 269
页数:23
相关论文
共 59 条
[1]   Combined speech compression and encryption using chaotic compressive sensing with large key size [J].
Al-Azawi, Maher K. Mahmood ;
Gaze, Ali M. .
IET SIGNAL PROCESSING, 2018, 12 (02) :214-218
[2]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[3]  
[Anonymous], 1990, NIST SPEECH DISC 1 1
[4]  
[Anonymous], 2003, G7222 ITUT
[5]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[6]   A New Approach to Securing Speech Signals [J].
Belmeguenai, Aissa ;
Ahmida, Zahir ;
Djemili, Rafik .
2017 10TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2017), 2017, :77-82
[7]  
Boumaraf M., 2019, 6 INT C IM SIGN PROC, P1
[8]  
Boumaraf M, 2017, INT CONF INTERNET, P87, DOI 10.23919/ICITST.2017.8356353
[9]  
BS I, 2003, 15341 BSI
[10]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761