Next Article in Journal
The Identification Method of the Winding Vibration Faults of Dry-Type Transformers
Next Article in Special Issue
Interactivity Recognition Graph Neural Network (IR-GNN) Model for Improving Human–Object Interaction Detection
Previous Article in Journal
Application and Research of IoT Architecture for End-Net-Cloud Edge Computing
Previous Article in Special Issue
Efficient Vision-Based Face Image Manipulation Identification Framework Based on Deep Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Multilayered Audio Signal Encryption Approach for Secure Voice Communication

Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Electronics 2023, 12(1), 2; https://doi.org/10.3390/electronics12010002
Submission received: 27 October 2022 / Revised: 15 December 2022 / Accepted: 16 December 2022 / Published: 20 December 2022
(This article belongs to the Special Issue Advances in Intelligent Systems and Networks)

Abstract

:
In this paper, multilayer cryptosystems for encrypting audio communications are proposed. These cryptosystems combine audio signals with other active concealing signals, such as speech signals, by continuously fusing the audio signal with a speech signal without silent periods. The goal of these cryptosystems is to prevent unauthorized parties from listening to encrypted audio communications. Preprocessing is performed on both the speech signal and the audio signal before they are combined, as this is necessary to get the signals ready for fusion. Instead of encoding and decoding methods, the cryptosystems rely on the values of audio samples, which allows for saving time while increasing their resistance to hackers and environments with a noisy background. The main feature of the proposed approach is to consider three levels of encryption namely fusion, substitution, and permutation where various combinations are considered. The resulting cryptosystems are compared to the one-dimensional logistic map-based encryption techniques and other state-of-the-art methods. The performance of the suggested cryptosystems is evaluated by the use of the histogram, structural similarity index, signal-to-noise ratio (SNR), log-likelihood ratio, spectrum distortion, and correlation coefficient in simulated testing. A comparative analysis in relation to the encryption of logistic maps is given. This research demonstrates that increasing the level of encryption results in increased security. It is obvious that the proposed salting-based encryption method and the multilayer DCT/DST cryptosystem offer better levels of security as they attain the lowest SNR values, −25 dB and −2.5 dB, respectively. In terms of the used evaluation metrics, the proposed multilayer cryptosystem achieved the best results in discrete cosine transform and discrete sine transform, demonstrating a very promising performance.

1. Introduction

When transmitting data across communication channels, security and privacy represent major challenges. Speech signals can be conveyed via numerous means, such as telephone networks and private or public radio networks. Over time, speech has become the most common method of human interaction among all modes of communication. Speech communication is simple, natural, flexible, and efficient, which explains its widespread use and practicality. There are two possible ways to encode a speech signal: analog and digital. In an analog representation, the speech signal is viewed as a waveform that specifies the signal’s frequency and amplitude. In digital form, the speech signal is the numerical equivalent of the analog version, where the signal is encoded as a sequence of zeros and ones. Certain situations need the transmission of confidential information, including diplomatic and military communications during times of war and peace.
Because voice is so redundant when compared to written material, ensuring security is extremely difficult. Speech security can be achieved using either analog scrambling or digital ciphering; two distinct techniques. Speech scrambling has always piqued the interest of researchers due to its low-bandwidth consumption, ease of implementation, and effective handling of asynchronous transmission.
Speech codes are used in digital telecommunication networks to reduce the required transmission bandwidth. Other vocoders such as LPC-10 (Linear Prediction Coding), CELP (Code Excited Linear Prediction), MELP (Mixed Excitation Linear Prediction), and others have been developed. The most secure communication systems are built on LPC techniques. The main reason for this is that LPC voice coding ensures low bit rates and excellent voice clarity. Cryptographic algorithms frequently have stringent implementation criteria, such as minimal resource use, reduced memory, and logic gate count, and efficient power use. Designing systems that meet all of these needs in this context is a difficult task that requires extensive research.
More specifically, an implementation must be fast enough to avoid a significant slowdown in the system caused by the operation of cryptographic methods. Because software implementations have shown to be unable to deliver the required level of performance at an affordable price, hardware acceleration is adopted to accomplish this [1,2].
Only a small portion of available resources are dedicated to cryptography, making it difficult to develop high-security methods.
Real-time processing is an essential requirement for secure voice communications. In this case, the task of framing the incoming data becomes vital. It is crucial to strike a balance between the block size and all other elements since depending on the sampling rate, either short or large buffers may result in buffer overflows and delays. Because of their complexity, cryptographic algorithms need to be implemented on flexible platforms to meet real-time voice encryption requirements.
To improve security and address issues with existing techniques, we suggest investigating the use of multilayer encryption (fusion, substitution, and permutation) to achieve greater privacy by increasing confusion, which complicates the relationship between original and encrypted signals. The main contributions of this work can be summarized as follows:
-
The encryption of audio signals using random projection and salting in the time domain and frequency domain.
-
The encryption of audio signals using three layers of encryption that include fusion, substitution, and permutation in the frequency domain.
The following outlines how this paper is organized. Section 2 introduces the related work on audio signal encryption. Section 3 presents the proposed audio cryptosystems. The experimental study, simulation results, and discussion are included in Section 4. Finally, Section 5 summarizes the work and provides the concluding remarks.

2. Related Work

As mentioned previously, several attempts for audio data encryption have been proposed. For instance, numerous studies have examined audio encryption algorithms with the ultimate goal to achieve a good balance of speed and security [3]. Sharma et al. [4] developed a method for encrypting audio recordings with the RSA algorithm. Several algorithms, such as those outlined in [5], encrypted text files and images using a variety of shuffling techniques. The RSA algorithm was used to encrypt speech files with each word extracted and translated to text, as described in [6]. Using a chaotic map, several encryption keys are generated and used during each iteration of the encryption process, as in the chaotic audio encryption approach described in [7]. Five steps were employed to implement the audio encryption technique; these phases use various diffusion and table substitution algorithms to encrypt audio data without data loss [8]. To reduce the time required for audio encryption, the authors of [9] recommended employing the discrete Fourier transform to encrypt selected parts of the audio stream.
In [8], the dual-channel audio data is encrypted with a one-time key using a chaotic system with both the confusion and diffusion technique. To guard against brute-force attacks, the approach uses a big keyspace. Block by block, the cosine number transformation has already been used to generate a secret key from non-compressed 16-bit audio data [10]. The sequence is based on a narrative that combines Henon and economic maps. When computing encrypted audio data, the confusion and diffusion technique is repeatedly used to encrypt plain audio data [11]. Audio data has also been confused and disseminated using DNA coding and chaotic systems. The chaotic system’s initial value is calculated using the hash value of the audio [12], the audio signal is transformed into data using a lifting wavelet methodology in a new encryption method, and it is then encrypted using a chaotic dataset and a hyperbolic function. Block-by-block encryption for audio files uses the principles of a block cipher and chaotic maps. In the permutation stage, a chaotic tent map is utilized. After that, a key block and the obtained block were XORed. The multiplication inverse-based method of substitution is used to replace the resultant block [13]. With self-adaptive scrambling, chaotic maps, DNA coding, and cipher feedback mechanisms, a novel audio transmission technique is discussed. A pseudo-random number is produced by combining five separate chaotic maps and eight control settings [14]. The chaotic circle map and modified rotation equations are utilized to produce the pseudo-random number in a proposed encryption technique for audio data [15]. The permutation of audio samples using a discrete modified Henon map, followed by a substitution operation, is used to create a proposed audio encryption method. The modified Lorenz–hyperchaotic system yields the keystream. To assess the quality of the encryption method, many quality criteria have been established [9]. The use of numerous chaotic maps and cryptographic protocols is described as a novel approach to voice signal encryption. The input signal is separated into four parts using a cubic map as part of the scrambling procedure. The blowfish algorithm is used in combination with the private key to protect all of the chaotic map parameters. The blowfish key of the system and the hashing algorithm are implemented between the sender and receiver endpoints. The message digest is used to authenticate and verify the chaotic map parameters during secure communication. To demonstrate the effectiveness of the technique, several statistical tests are conducted [16]. A chaos-based cryptosystem was used to develop a novel multiuser speech encryption technique. Chua chaotic systems are used in transmitters and receivers to generate chaotic encryption and decryption keys. The XOR operation is combined with a chaotic matrix operation for randomization to encrypt the speech stream. The security analysis demonstrates the vulnerability of secret keys and the need for a large key space to withstand a brute-force attack. Strong diffusion and confusion processes have increased the battery life of the transmitter [17].
A novel audio encryption system has been investigated using a substitution–permutation algorithm and DNA encoding [18]. As part of the key generation process, the chaotic logistic map generates a new key block for each plain block. Several security assaults are carried out to evaluate the system. A cycle attack, selected plaintext attacks, and chosen cipher text are all successfully demonstrated [18]. Effective cryptography is required for secure communication to exhibit confidentiality, privacy, efficiency, and accuracy. The security considerations and methods incorporated into the design and implementation of the most popular symmetric encryption algorithms were examined. Researchers estimated and compared the performance of various encryption algorithm parameters, including encryption and decryption times, throughput, key size, the avalanche effect, memory requirements, correlation assessment, and entropy, to determine which encryption algorithm is best for each application. With the use of a substitution–permutation algorithm and DNA encoding, a novel audio encryption system has been investigated. With the chaotic logistic map, a new key block is created for each plain block as part of the key generation process. To assess the system, several security assaults are carried out. A cycle attack, the selected plaintext attacks, and the selected cipher text are all successfully shown [18]. Effective cryptography is necessary for secure communication to have the properties of confidentiality, privacy, efficiency, and correctness. The security considerations and procedures addressed in the design and implementation of the most widely used symmetric encryption algorithms were examined. To determine which encryption algorithm is best for each application, researchers estimated and compared the performance of various encryption algorithm parameters, including encryption and decryption times, throughput, key size, the avalanche effect, memory requirements, correlation assessment, and entropy.
The study described in [19] proposes a new chaotic one-dimensional map. The second hyperbolic tangent term in this connection is delayed to prevent dynamical degradation. The map’s consistent chaotic behavior for practically all parameter values is demonstrated by computing its bifurcation diagrams and Lyapunov exponent diagrams. The suggested map is then used to construct a high-key space pseudo-random bit generator. Then, using this generator as a foundation, a proposed password generator application is built. The goal of this program is to develop an algorithm that takes a user-supplied, easy-to-remember key as the input and generates a strong password suitable for website security or file security.
The authors of [20] propose a brand-new, straightforward chaotic one-dimensional map. The chaotic properties have been declared using Lyapunov exponent analysis and bifurcation analysis. They also propose a new picture encryption scheme based on this novel chaotic map. The shuffling algorithm and the substitution method both use this map. According to numerous statistical tests and security analyses, this approach has outstanding security performance and can compete with certain other recently presented picture encryption algorithms.
Authors of [21] investigate the problem of chaos-based image encryption. The first step is to create and investigate a generalization of the one-dimensional chaotic map proposed by Talhaoui et al. in The Visual Computer. The generalized map, like the original image, depicts areas of persistent chaos. Using the new map, a statistically safe pseudo-random bit generator is created and used in the encryption procedure. To introduce an image encryption technique based on rearranging the bit levels of an image, the bits are first organized into a three-dimensional matrix, and then a three-level shuffling is applied to each row, column, and bit level of the 3D matrix. After the bits have been shuffled, they are subjected to an exclusive OR operation.
In light of the provided literature review, we were motivated to develop a multilayer encryption system to increase privacy.
To the best of our knowledge, no prior research has investigated the impact of using layers of encryption. The main contributions of this study are described in the following section.

3. Proposed Approaches to Multilayer Audio Data Encryption

In the following proposed cryptosystems, audio signals and personal data are encrypted before being transmitted over wireless networks. The encrypted information can either be used as-is for authentication in cancelable biometric applications at the receiving end, or it can be recovered using a secret key and a decryption algorithm to be used for additional audio analysis. In this research, we consider the discrete wavelet transform (DWT), the discrete cosine transform (DCT), the discrete sine transform (DST), random projection, salting, and the chaotic baker map. As depicted in Figure 1, these methods are arranged into three-layer encryption systems where numerous combinations are investigated. The cryptosystems alleviate the issue of audio low-activity intervals by combining the audio signal with a speech signal that lacks silence periods. The audio signal and the speech signal undergo preprocessing to meet the fusion requirements. During the preprocessing phase, the audio signal is converted from a one-dimensional to a two-dimensional signal. The 2D DWT is then applied to the audio signal. The same approach is used for the speech signal. In the proposed cryptosystems, the first layer is a fusion layer that employs either random projection or salting. The second layer is a substitution layer based primarily on the DCT or DST techniques. The third layer is a permutation layer that uses the chaotic baker map. Before delving into these strategies, we outline the overall structure first. The idea behind proposing a three-layer system is to strengthen audio signal security and preserve privacy and confidentiality. As seen in Figure 1, audio and speech input signals are transformed into 2D signals prior to DWT processing. The two signals are subsequently fused using either random projection or salting. The result of applying an inverse DWT (IDWT) on the fused signal is sent to the next layer for the second level of encryption using a substitution operation with DCT or DST. The result of the substitution is then sent to the permutation layer using a chaotic baker map for the third level of encryption. In order to obtain the encrypted signal, an inverse DCT (IDCT) or inverse DST (IDST) is performed at the end. Algorithm 1 outlines this process. In Figure 2 and Figure 3, the various combinations of fusion with random signal and substitution layer approaches are shown. Figure 2 depicts the use of DWT with random projection or salting, whereas Figure 3 depicts the use of DCT with random projection or salting. Further details concerning the proposed strategies follow.
Algorithm 1: Encryption
Input: Original audio signal and speech signal
Output: Encrypted audio signal
Begin:
   1-Get audio signal.
   2-Get speech signal.
   3-Preprocess the two signals by converting them to 2D signals.
   4-Apply 2D DWT to the 2D signals to decompose each signal into four subbands.
   5-Apply fusion using random projection by multiplying the coefficients of the subbands of the two signals or applying salting by adding the coefficients.
   6-Apply IDWT to the results of random projection or salting.
   7-The results of step 6 undergo a DCT or DST to replace the values with the frequency coefficients.
   8-The coefficients from step 7 are permuted using the chaotic baker map with key
S_key = [n1, n2, n3] = [2, 4, 2].
   9-Apply the IDCT or IDST to the output of step 8 results.
 10-Convert the 2D signal obtained in step 9 to a 1D signal to obtain the encrypted audio.
End

3.1. Random Projection Based on 1D-DWT/1D-DCT

The proposed algorithm for audio signal encryption based on random projection in the DWT domain is illustrated in Figure 2. The block diagram suggests combining the 1D DWT of the audio signal with a random signal.
The DWT first divides the signal into an approximation signal obtained by using a low-pass filter (L) and details obtained by using a high-pass filter (H). The details represent the high-frequency component, while the approximation is the low-frequency component. The audio signal is split into two sub-signals, each half its original length, by the DWT. One sub-signal is a running average or trend (L), and the other is a running difference (or fluctuation) (H). To generate a random signal, the audio signal is divided in half.
The random projection transformation is then used to encrypt the wavelet coefficients. Random projection transformation is frequently used for cancelable biometric templates [22]. “Random projection” refers to the act of projecting the original signal or feature vector onto a random space. It can be implemented by multiplying with a random matrix. For example, a random matrix F can be used to multiply the vector of an audio signal, L, to produce a random vector, L*. Also, a random matrix F can be used to multiply an audio signal’s vector, H, to produce a random vector, H*, as can be seen in Equation (1) where k and d refer to the dimension of the matrix.
L * k × 1 = F k × d · L d × 1   ,   H * K × 1 = F k × d · H d × 1
The wavelet coefficients of an audio signal are transformed into a random signal using this method. The encrypted audio signal is created after the random projection transformation. As a result, the relative separations between any two samples in the encrypted audio signal space are preserved in the output random space. Then, at the receiver, the audio signal is subjected to the inverse random projection transform in preparation for further processing. Finally, the inverse DWT method is used to reconstruct the original audio signal so that it can be compared to those in the database if used for authentication.
Another combination is considered in our study. As illustrated in Figure 3, the discrete cosine transform (DCT) can be used in place of the DWT. In this case, the random projection algorithm is used to encrypt the DCT coefficients.

3.2. Salting Based on 1D-DWT/1D-DCT

Figure 2 and Figure 3 show the other combinations considered in our study, where the fusion rule is achieved this time through salting. Depending on the type of random sequence, the salting process involves adding a random sequence to the audio stream or its extracted features (Gaussian or uniform). The noise power affects the performance of the salting-based technology. This method entails blending a pattern with the original audio pattern’s DWT or DCT elements. The mixed patterns may contain pure random noise or artificial patterns. The relative strength of the noise patterns influences the cryptosystem’s effectiveness. As a result, picking a pattern with a lot of actions makes sense. Using a simple subtraction technique, the original audio signal is extracted at the receiver for further processing.

3.3. Permutation Using Chaotic Baker Map

The third method in the suggested cryptosystems for permuting the coefficients from layer 2 to obscure the output of the second layer is the chaotic baker map. The horizontal and vertical stretching and folding of the coefficients provide the foundation of the baker map. The positions of each coefficient in the output of the second layer are changed by repeating this process. More specifically, the chaotic baker map is a two-dimensional map that shifts each square matrix element [23]. These maps are used to nonlinearly randomize the elements of the square matrix in a framework that is sensitive to the initial conditions. To achieve confusion and diffusion, cryptosystems must be extremely sensitive to the starting conditions. The two key properties of the chaotic baker map are as follows:
  • Its output is highly random, unpredictable, and correlated little with the input.
  • It is highly dependent upon the input parameters, starting values, and early conditions.
Let B ( n 1 , , n k ) denote the discretized map, where the vector [ n 1 , , n k ] represents the secret key, S k e y . Defining N as the number of data items in one row, the secret key is chosen such that each integer n i divides N, and n 1 + … + n k = N. Let N i = n 1 + … + n i , The data item at the indices (q, z), is moved to the indices: as shown in Equation (2).
B ( n 1 , n i ) ( q , z ) = ( N n i ( q N i ) + z m o d ( N n i ) , n i N ( Z Z m o d ( N n i ) ) + N i )
where N i q < N i + n i , and 0 ≤ z < N.
The chaotic permutation is performed in the following steps:
  • An N × N square matrix is divided into k rectangles of width n i and the number of elements N.
  • The elements in each rectangle are rearranged into a row in the permuted rectangle. Rectangles are taken from left to right beginning with upper rectangles and then lower ones.
  • Inside each rectangle, the scan begins from the bottom left corner toward the upper elements.
Figure 4 below shows a popular example that explains how permutation is performed for a chaotic map of an (8 × 8) square image (i.e., N = 8). The secret key, S k e y = [n1, n2, n3] = [2, 4, 2].

3.4. Decryption Process of the Proposed Three Layers Technique

The inverse of the encryption process is used in the decryption algorithm. As shown in Figure 5, the encrypted signal is transformed using DCT or DST and the resulting coefficients are passed through a pipeline that begins with chaotic decryption followed by an inverse discrete cosine transform or inverse discrete sine transform, then DWT. After this stage, inverse fusion is performed, whereas in salting, we subtract the speech coefficients from the audio coefficients (in case of a random projection we apply division), then an inverse DWT is applied, and finally, a conversion operation is performed to obtain the decrypted signal.

4. Simulation Results and Discussions

In order to evaluate the proposed cryptosystems, the performance of each technique was evaluated in a simulated environment using MATLAB. We also considered logistic map encryption, which is used in many comparable publications, for comparison purposes. The logistic map is one of the traditional chaotic maps that can be used to generate keys for an encryption scheme [24]. The 1D logistic map is defined as follows:
x m + 1 = hx m ( 1 x m )
where x 0 is the initial state, m is the number of iterations and h is a system control parameter with values ranging from 0 to 4, and x m + 1 has a value range of 0 to 1 for all values of m. The value of h determines how the logistic map behaves. As the repetitions become entirely chaotic, h is chosen for encryption purposes to be 3.57. There are different behaviors of x depending on the h value. The 1D logistic map system is used to construct the new S-Box used to permute samples.
Due to the 1D logistic map’s limitations, a modified 2D logistic map has been developed for encryption. It is defined as follows [24]:
x m + 1 = h ( 3 y m + 1 ) x m ( 1 x m )
y m + 1 = h ( 3 x m + 1 + 1 ) y m ( 1 y m )

4.1. Statistical Metrics

Each signal in the database has an average runtime of 3 min and a 360 Hz sampling frequency. Various measurements and viewpoints have been taken into account during the performance analysis process.
To evaluate the quality of the encryption and decryption processes, histograms of the encrypted and decrypted signals were calculated. Table 1 illustrates this comparison. It is important to note from Table 1 that both the proposed random projection based on 1D DWT and the cryptosystem based on three layers provide uniform histograms for the encrypted signals. These methods are hence resistant to statistical attacks. Unfortunately, the random projection based on DCT, salting, and logistic map encryption has histogram distributions that are not uniform enough, making them less resistant to histogram-based statistical assaults.
SNR, SNRseg, LLR, and spectral distortion are examples of quality measures that can be used to assess the effectiveness of audio signal encryption (SD). Based on the original and encrypted audio signals, all of these parameters can be approximated. The quality of the encryption increases with decreasing SNR and SNRseg. Additionally, the encryption quality improves with greater LLR and SD values. We represent SNR in Equation (6), and we suggest referring to [25] for further details.
SNR = 10   log 10   n = 1 N x 2 ( n ) n = 1 N ( x ( n ) y ( n ) ) 2
where x(n) is the plain audio signal, y(n) is the encrypted signal, and n is the time index.
Figure 6 shows the original audio, histogram, and spectrogram of the audio signal, whereas Figure 7 depicts a comparison of the proposed encryption techniques in terms of SNR. The suggested salting-based encryption technique and the three-phase DCT/DST cryptosystem provide the highest level of security compared to the other approaches since they achieve the lowest SNR values (−25 dB and −2.5 dB, respectively).
Over a brief frame of the predefined signal, the average SNR values can be determined. SNRseg is a well-known metric that uses the following Equation (7) to compute the average SNR values for a given signal over a particular period of time.
SNRseg = 10 M m = 0 M 1   log 10   i = N m N m + N 1 ( x 2 ( i ) x ( i ) y ( i ) ) 2
where M is the total number of frames in the audio signal, and N is the frame duration which can be set between 15 and 20 ms.
The log-likelihood ratio (LLR), an objective metric described in [26], is based on the distance between two vectors of linear prediction coefficients (LPC) computed on plain and encrypted signals. It can be calculated using the following mathematical equation:
LLR = | log [ a x   r x     a x   T a y   r y   a y   T ]   |
LPC coefficients for the original audio signal are ( a x ), and those for the encrypted audio signal are ( a y ). The autocorrelation matrix for the original audio signal and the encrypted audio signal are determined by the values of ( r x ) and ( r y ), respectively.
The LLR values of the suggested alternatives in comparison to the logistic map encryption method are shown in Figure 8. The suggested three-phase cryptosystem offers the maximum level of encryption since, when compared to the other systems, it obtains the highest LLR value.
The spectral distortion (SD), which has maximum values of 44 to 45, indicates how much the encrypted signal spectrum differs from the original signal spectrum. In the frequency domain, it is calculated as:
SD = 1 M m = 0 M 1 i = N m N m + N 1 | V s ( i ) V y ( i ) |
where V s ( i ) and V y ( i ) represent the spectrum of the original and encrypted audio signals, respectively; greater simple signals result in a smaller SD value. Figure 9 compares several encryption methods in terms of SD values. It is apparent that the SD value of the 1D-DWT random projection, which achieves the most spectral distortion during the encryption process, yields the best results. Accordingly, the correlation between the original and encrypted audio signals is evaluated in order to determine how well the cryptosystem works:
r xy = c v ( x , y ) D ( x ) . D ( y )
The correlation between the decrypted signal y and the original signal x is denoted by r xy while cv(x,y) refers to the covariance between them. The variances of these signals are represented by D(x) and D(y), respectively. Further details on this measure can be found in [26]. The lower the value of the correlation coefficient r, the better the performance of the encryption.
Table 2 compares the normal and encrypted audio signals in terms of SNR, r, SSIM, SD, SNRseg, and LLR. Similar comparisons are conducted between plain and decrypted signals, as shown in Table 3, in order to determine how effectively the encryption systems perform after being decrypted
The three suggested options offer high levels of security, as shown in Table 2, where the correlation values are near zero. However, the logistic chaotic encryption yields a correlation of just 0.48. The correlation values between the original and decrypted audio signals equal 1, as given in Table 3, further demonstrating the high quality of the decrypted audio signals. These tables reveal a significant discrepancy between the original and encrypted signals, revealing remarkably low SNR values. The findings demonstrate close to zero values for r, low values for SNR, and SSIM, big values for LLR, and high values for SD. These results confirm that the suggested audio encryption methods are extremely effective.

4.2. Infiltration of Encrypted Signals

Noise attack is a considerable risk when the encrypted signals are transmitted through a communication channel. This section analyses how noise attacks impact the suggested approaches.
Here, the encrypted signal is subjected to salt and pepper noise with a variance equal to 0.019. The impact of noise on the decrypted signal is seen in Table 4. The noise disrupted the decryption process and the recovered signals suffered from data loss as a consequence. Table 5 displays the outcome of the cropping experiment using 40% of the encrypted signal. Contrary to salt and pepper noise, cropping was considerably less impactful. According to Table 4 and Table 5, the random projection based on 1D DWT and the three-phase encryption cryptosystem record the best results, demonstrating that these two systems are highly resistant to noise attacks.

4.3. Performance Comparison of Audio Encryption Algorithms

In this section, we provide a comparison of audio encryption techniques from the literature in terms of correlation (r) and SNR. Table 6 displays the results of this comparative study.
As shown in Table 6, the proposed encryption methods achieved competitive results compared to the state-of-the-art methods showing low scores for both correlation coefficient r and SNR. The best score in terms of correlation score is obtained with the logistic map. However, its SNR score is not the best. The results clearly show that the proposed methods achieved a better balance in terms of r and SNR. Because the correlation scores are so low, we can conclude that a statistical attack by an intruder will not reveal any valuable data. On the other hand, the algorithm’s SNR results are low, implying that the proposed algorithms have a lot of noise, making them more attack-resistant.

4.4. Signal-to-Noise Ratio between Plain and Encrypted Audio Files

Since the employed measures show low SNRs, it is clear from Table 7 that all test findings show that the audio encryption technique is secure. According to Table 7, all of the observed SNR values are negative, indicating that the encrypted files are extremely noisy and that the encryption approach has entirely destroyed the clear signal in the plain audio files.

5. Conclusions

In this study, the generation of audio signals was framed as a security risk and three cryptosystems were developed and evaluated accordingly. Each cryptosystem approaches the problem differently. The first method involves the projection of random numbers onto the DWT coefficients of audio signals. The second method employs salting algorithms, whereas the third way enhances security by applying multiple levels of processing for encryption and functioning in three stages: fusion, substitution, and chaotic permutations. This method combines the original audio with a speech signal to compensate for lengthy audio signals with low-activity intervals. It then employs the 2D chaotic map to produce permutations. The proposed approaches were assessed in a simulated environment. The results demonstrated that the three-phase cryptosystem provides the best performance and attack resilience. In future research, we intend to use deep learning to extract the most prominent features from audio signals and to expand its use in further applications such as authentication.

Author Contributions

Conceptualization, H.A.A. and S.M.; methodology, H.A.A. and S.M.; software, H.A.A. and S.M.; validation, H.A.A. and S.M.; formal analysis, H.A.A. and S.M.; investigation, H.A.A. and S.M.; resources, S.M. and H.A.A.; data curation, H.A.A. and S.M.; writing—original draft preparation, H.A.A. and S.M.; writing—review and editing, H.A.A. and S.M.; visualization, H.A.A. and S.M.; supervision, H.A.A. and S.M.; project administration, H.A.A. and S.M.; funding acquisition, S.M. All authors have read and agreed to the published version of the manuscript.

Funding

This project is supported by the Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R196), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Acknowledgments

The authors would like to acknowledge the Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R196), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Pedre, S.; Krajník, T.; Todorovich, E.; Borensztejn, P. Accelerating embedded image processing for real time: A case study. J. Real-Time Image Process. 2016, 11, 349–374. [Google Scholar] [CrossRef]
  2. Joao, J.A.; Mutlu, O.; Patt, Y.N. Flexible reference-counting-based hardware acceleration for garbage collection. ACM SIGARCH Comput. Arch. News 2009, 37, 418–428. [Google Scholar] [CrossRef] [Green Version]
  3. Albahrani, E.A.; Alshekly, T.K.; Lafta, S.H. A Review on Audio Encryption Algorithms Using Chaos Maps-Based Techniques. J. Cyber Secur. Mobil. 2021, 11, 53–82. [Google Scholar] [CrossRef]
  4. Sheetal, S.; Kumar, L.; Sharma, H. Encryption of an Audio File on Lower Frequency Band for Secure Communication. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2013, 3, 79–84. [Google Scholar]
  5. Yahya, A.; Abdalla, A. An AES-Based Encryption Algorithm with Shuffling. In Proceedings of the 2009 International Conference on Security & Management, SAM 2009, Las Vegas, NV, USA, 13–16 July 2009; pp. 113–116. [Google Scholar]
  6. Yousif, S.F. Encryption and Decryption of Audio Signal Based on Rsa Algorithn. Int. J. Eng. Technol. Manag. Res. 2020, 5, 57–64. [Google Scholar] [CrossRef]
  7. Chaudhary, N.; Shahi, T.B.; Neupane, A. Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach. J. Imaging 2022, 8, 167. [Google Scholar] [CrossRef] [PubMed]
  8. Liu, H.; Kadir, A.; Li, Y. Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik 2016, 127, 7431–7438. [Google Scholar] [CrossRef]
  9. Farsana, F.; Devi, V.; Gopakumar, K. An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams. Appl. Comput. Inform. 2019. Online ahead of print. [Google Scholar] [CrossRef]
  10. Oyiza, A.H.; Maarof, M.A. An Improved Discrete Cosine Transformation Block Based Scheme for Copy-move Image Forgery Detection. Int. J. Innov. Comput. 2019, 9, 2. [Google Scholar] [CrossRef] [Green Version]
  11. Adhikari, S.; Karforma, S. A novel audio encryption method using Henon–Tent chaotic pseudo random number sequence. Int. J. Inf. Technol. 2021, 13, 1463–1471. [Google Scholar] [CrossRef]
  12. Wang, X.; Su, Y. An Audio Encryption Algorithm Based on DNA Coding and Chaotic System. IEEE Access 2019, 8, 9260–9270. [Google Scholar] [CrossRef]
  13. Albahrani, E.A. A new audio encryption algorithm based on chaotic block cipher. In Proceedings of the 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), Baghdad, Iraq, 7–9 March 2017; pp. 22–27. [Google Scholar] [CrossRef]
  14. Abdelfatah, R.I. Audio Encryption Scheme Using Self-Adaptive Bit Scrambling and Two Multi Chaotic-Based Dynamic DNA Computations. IEEE Access 2020, 8, 69894–69907. [Google Scholar] [CrossRef]
  15. Kordov, K.; Bonchev, L. Using Circle Map for Audio Encryption Algorithm. Math. Softw. Eng. 2017, 3, 183–189. [Google Scholar]
  16. Yasser, I.; Mohamed, M.; Samra, A.; Khalifa, F. A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications. Entropy 2020, 22, 1253. [Google Scholar] [CrossRef] [PubMed]
  17. Hashemi, S.; Pourmina, M.A.; Mobayen, S.; Alagheband, M.R. Multiuser wireless speech encryption using synchronized chaotic systems. Int. J. Speech Technol. 2021, 24, 651–663. [Google Scholar] [CrossRef]
  18. Belazi, A.; El-Latif, A.A.A.; Belghith, S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016, 128, 155–170. [Google Scholar] [CrossRef]
  19. Kafetzis, I.; Moysis, L.; Tutueva, A.; Butusov, D.; Nistazakis, H.; Volos, C. A 1D coupled hyperbolic tangent chaotic map with delay and its application to password generation. Multimed. Tools Appl. 2022, 1–20. [Google Scholar] [CrossRef]
  20. Liu, L.; Miao, S. A new simple one-dimensional chaotic map and its application for image encryption. Multimed. Tools Appl. 2018, 77, 21445–21462. [Google Scholar] [CrossRef]
  21. Moysis, L.; Kafetzis, I.; Tutueva, A.; Butusov, D.; Volos, C. Chaos-Based Image Encryption Based on Bit Level Cubic Shuffling. In Cybersecurity; Studies in Big Data; Abd El-Latif, A.A., Volos, C., Eds.; Springer: Cham, Switzerland, 2022; Volume 102. [Google Scholar] [CrossRef]
  22. Soliman, R.F.; Amin, M.; El-Samie, F.E.A. A Modified Cancelable Biometrics Scheme Using Random Projection. Ann. Data Sci. 2018, 6, 223–236. [Google Scholar] [CrossRef]
  23. El-Bendary, M.A.M.; El-Azm, A.E.A.; El-Fishawy, N.A.; Al-Hosarey, F.S.M.; Eltokhy, M.A.; El-Samie, F.E.A.; Kazemian, H. JPEG image transmission over mobile network with an efficient channel coding and interleaving. Int. J. Electron. 2012, 99, 1497–1518. [Google Scholar] [CrossRef]
  24. Wu, Y.; Yang, G.; Jin, H.; Noonan, J.P. Image encryption using the two-dimensional logistic chaotic map. J. Electron. Imaging 2012, 21, 013014. [Google Scholar] [CrossRef]
  25. Belmeguenai, A.; Ahmida, Z.; Ouchtati, S.; Djemii, R. A novel approach based on stream cipher for selective speech encryption. Int. J. Speech Technol. 2017, 20, 685–698. [Google Scholar] [CrossRef]
  26. Zhou, Y.; Long, B.; Chen, C. A new 1D chaotic system for image encryption. Signal Process. 2014, 97, 172–182. [Google Scholar] [CrossRef]
  27. Augustine, N.; George, S.N.; Pattathil, D. An audio encryption technique through compressive sensing and Arnold transform. Int. J. Trust Manag. Comput. Commun. 2015, 3, 74. [Google Scholar] [CrossRef]
  28. Sathiyamurthi, P.; Ramakrishnan, S. Speech encryption using chaotic shift keying for secured speech communication. EURASIP J. Audio Speech Music. Process. 2017, 2017, 20. [Google Scholar] [CrossRef]
  29. Farsana, F.; Gopakumar, K. A Novel Approach for Speech Encryption: Zaslavsky Map as Pseudo Random Number Generator. Procedia Comput. Sci. 2016, 93, 816–823. [Google Scholar] [CrossRef] [Green Version]
  30. Belazi, A.; Khan, M.; El-Latif, A.A.; Belghith, S. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn. 2017, 87, 337–361. [Google Scholar] [CrossRef]
  31. Abd El-Latif, A.A.; Li, L.; Wang, N.; Han, Q.; Niu, X. A new approach to chaotic image encryption based quantum chaotic system, exploiting color spaces. Signal Process. 2013, 93, 2986–3000. [Google Scholar] [CrossRef]
Figure 1. Cryptosystem based on three layers of encryption.
Figure 1. Cryptosystem based on three layers of encryption.
Electronics 12 00002 g001
Figure 2. A 1D DWT fusion system for encryption with random projection and salting.
Figure 2. A 1D DWT fusion system for encryption with random projection and salting.
Electronics 12 00002 g002
Figure 3. Diagram of the proposed 1D-DCT encryption of audio signals.
Figure 3. Diagram of the proposed 1D-DCT encryption of audio signals.
Electronics 12 00002 g003
Figure 4. (a) The 8 × 8 matrix divided into blocks, and (b) represents the matrix after applying the 2D baker map [24].
Figure 4. (a) The 8 × 8 matrix divided into blocks, and (b) represents the matrix after applying the 2D baker map [24].
Electronics 12 00002 g004
Figure 5. Decryption process of the proposed three layers technique.
Figure 5. Decryption process of the proposed three layers technique.
Electronics 12 00002 g005
Figure 6. Original audio signal representations: (a) audio signal in the time domain, (b) audio spectrogram in the frequency domain, and (c) histogram for the audio signal.
Figure 6. Original audio signal representations: (a) audio signal in the time domain, (b) audio spectrogram in the frequency domain, and (c) histogram for the audio signal.
Electronics 12 00002 g006aElectronics 12 00002 g006b
Figure 7. Comparison of SNR (dB) between the proposed cryptosystems.
Figure 7. Comparison of SNR (dB) between the proposed cryptosystems.
Electronics 12 00002 g007
Figure 8. Comparison of LLR values for the proposed cryptosystem.
Figure 8. Comparison of LLR values for the proposed cryptosystem.
Electronics 12 00002 g008
Figure 9. Comparison of SD values for the proposed cryptosystem.
Figure 9. Comparison of SD values for the proposed cryptosystem.
Electronics 12 00002 g009
Table 1. Comparison between the results of different encryption schemes.
Table 1. Comparison between the results of different encryption schemes.
Encryption MethodEncrypted SignalSpectrogram of Encrypted SignalHistogram of Encrypted SignalDecrypted Signal
Random projection based on 1D-DWT Electronics 12 00002 i001Electronics 12 00002 i002Electronics 12 00002 i003Electronics 12 00002 i004
Random projection based on 1D-DCTElectronics 12 00002 i005Electronics 12 00002 i006Electronics 12 00002 i007Electronics 12 00002 i008
Salting based on 1D-DCTElectronics 12 00002 i009Electronics 12 00002 i010Electronics 12 00002 i011Electronics 12 00002 i012
Salting based on 1D-DWTElectronics 12 00002 i013Electronics 12 00002 i014Electronics 12 00002 i015Electronics 12 00002 i016
Multilayer encryption in the DST domainElectronics 12 00002 i017Electronics 12 00002 i018Electronics 12 00002 i019Electronics 12 00002 i020
Multilayer encryption in the DCT domain Electronics 12 00002 i021Electronics 12 00002 i022Electronics 12 00002 i023Electronics 12 00002 i024
Encryption using a Logistic mapElectronics 12 00002 i025Electronics 12 00002 i026Electronics 12 00002 i027Electronics 12 00002 i028
Table 2. Comparison of various encryption schemes using the evaluation metrics.
Table 2. Comparison of various encryption schemes using the evaluation metrics.
Encryption
Encryption MethodAlgorithmSNRrLLRSDSNRsegSSIM
Fusion Random projection-DWT−10.350.010.74624.7−10.670.001
Random projection-DCT−6.340.010.9017.21−7.120.9
Salting-DWT−22.28040.061.1338.29−22.290.9
Salting-DCT−1.60.010.836.7−14.20.9
Multilayer cryptosystemIn transform domain-DCT−2.690.0022.744.7−2.60.2
In transform domain-DST−2.40.0182.6844.49−2.390.2
Logistic mapIn spatial domain−3.0131−6.3977 × 10−40.581813.9475−3.03790.7
Table 3. Comparison of different decrypted signals.
Table 3. Comparison of different decrypted signals.
Decryption
Encryption Method AlgorithmSNRrLLRSDSNRsegSSIM
Fusion Random projection-DWT222.8100222.71
Random projection-DCT302.718.3 × 10−151.5772 × 10−14302.71
Salting-DWT303.811.2 × 10−141.4 × 10−14303.71
Salting-DCT300.411.3897 × 10−142.0368 × 10−14300.41
Cryptosystem based on multilayers In transform domain-DCT3041003041
In transform domain-DST3021003021
Logistic map In spatial domain27.94440.99920.06100.800827.91200.999
Table 4. Comparison of different decrypted signals after applying salt and pepper noise.
Table 4. Comparison of different decrypted signals after applying salt and pepper noise.
Decryption after Adding Salt and Pepper Noise 0.019
Encryption Method AlgorithmSNRrLLRSDSNRsegSSIM
Fusion Random projection-DWT−50.690.0150.8728−80.970.98
Salting-DCT−17.920.030.28634.6−44.60.99
Random projection-DCT −25.210.0210.9142−25.20.93
Salting-DWT−17.390.0431.234−17.40.98
Multilayers
cryptosystem
In transform domain-DCT−1.350.420.3513.20.490.99
In transform domain-DST−1.360.420.413.24−1.860.98
Logistic mapIn spatial domain−170.960.3339.826.70.99
Table 5. Comparison of different decrypted signals after applying cropping.
Table 5. Comparison of different decrypted signals after applying cropping.
Decryption after Cropping by 40%
Encryption MethodAlgorithmSNRrLLRSDSNRsegSSIM
Fusion Random projection-DWT26.210.580.3015.2326.191
Random projection-DCT63.140.990.0040.3863.151
Salting-DWT12.390.150.6628.5412.390.99
Salting-DCT12.380.1490.23632.974.410.98
Multilayers cryptosystem In transform domain-DCT7.540.680.09314.377.540.99
In transform domain-DST6.700.680.09214.566.71
Logistic mapIn spatial domain7.6560.690.11915.027.650.99
Table 6. Comparison based on statistical analysis.
Table 6. Comparison based on statistical analysis.
MethodCorrelation Coefficient (r)SNR
Ref. [25]0.0011 −10.6357
Ref. [27]0.0471−1.47
Ref. [28]0.0233 −33.7464
Ref. [29]0.0029−23.89
Ref. [30]0.0491−44.8
Ref. [31]0.0321−54.89
AES0.00971−1.4461
Triple DES0.1704−0.250
Fusion Random projection -DWT0.01−10.35
Fusion Random projection-DCT0.01−6.34
Fusion Salting-DWT0.06−22.2804
Fusion Salting-DCT0.01−1.6
Proposed multilayers in transform domain-DCT0.002−2.69
Proposed multilayers in transform domain-DST0.018−2.4
Logistic map in the spatial domain−6.3977 × 10−4−3.0131
Table 7. Evaluation using four audio samples.
Table 7. Evaluation using four audio samples.
SNR
Fusion Random Projection-DWTFusion Random Projection-DCTFusion Salting-DWTFusion Salting-DCTMultilayer Cryptosystems in Transform Domain-DCTMultilayer Cryptosystems in Transform Domain-DST
Audio 1−10.35−6.34−22.28−1.6−2.69−2.4
Audio 2−12.43−8.65−23.52−2.67−5.98−4.5
Audio 3−9.81−7.222−21.31−1.98−3.43−3.86
Audio 4−10.98−6.97−22.56−1.93−2.72−2.22
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Abdallah, H.A.; Meshoul, S. A Multilayered Audio Signal Encryption Approach for Secure Voice Communication. Electronics 2023, 12, 2. https://doi.org/10.3390/electronics12010002

AMA Style

Abdallah HA, Meshoul S. A Multilayered Audio Signal Encryption Approach for Secure Voice Communication. Electronics. 2023; 12(1):2. https://doi.org/10.3390/electronics12010002

Chicago/Turabian Style

Abdallah, Hanaa A., and Souham Meshoul. 2023. "A Multilayered Audio Signal Encryption Approach for Secure Voice Communication" Electronics 12, no. 1: 2. https://doi.org/10.3390/electronics12010002

APA Style

Abdallah, H. A., & Meshoul, S. (2023). A Multilayered Audio Signal Encryption Approach for Secure Voice Communication. Electronics, 12(1), 2. https://doi.org/10.3390/electronics12010002

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop