Abstract
This paper throws light on chaotic shift keying-based speech encryption and decryption method. In this method, the input speech signals are sampled and its values are segmented into four levels, namely L0, L1, L2, and L3. Each level of sampled values is permuted using four chaotic generators such as logistic map, tent map, quadratic map, and Bernoulli’s map. A chaotic shift keying mechanism assigns logistic map for L0, tent map for L1, quadratic map for L2, and Bernoulli’s map for L3 for shuffling the speech samples at every level. Further, the sampled values are permuted using Chen map which uncovers the chaotic behavior. Various testing methods are applied to analyze the efficiency of the system. The results prove that the proposed system is highly secured against the attackers and possesses a powerful diffusion and confusion mechanism for better speech communication in the field of telecommunication.
Highlights
Security and privacy are the two major concerns in the ever growing speech communication system
Each level of the speech samples is permuted with respect to the corresponding chaotic mapping techniques such as logistic map, tent map, quadratic map, and Bernoulli’s map
5 Results and discussion The proposed system was tested in Matlab. This system was subjected to correlation test, Signal-to-noise ratio (SNR) test, Peak signal-to-noise ratio (PSNR) test, security analysis, randomness test, sensitivity test, histogram analysis, and robustness test which are carried out to prove the performance metrics [21]
Summary
Security and privacy are the two major concerns in the ever growing speech communication system. Symmetric key otherwise known as secret key or shared key or private key is one of the encryption methods [1] which use one key for encryption as they do for decryption process. Asymmetric cryptography [2, 3] uses different encryption keys for encryption and decryption. In this case, whether it is public or private, an end user on a network has a pair of keys: one for encryption and the other one for decryption. Higher degree of security is achieved by multiple level of permutation process on sampled speech at five levels using five different chaotic maps. Sathiyamurthi and Ramakrishnan EURASIP Journal on Audio, Speech, and Music Processing (2017) 2017:20
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: EURASIP Journal on Audio, Speech, and Music Processing
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.