Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems
Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks. Traditional approaches to encryption, like Advanced Encryption Standard and Rivest–Shamir–Adleman, are pretty solid but mostly too computati...
Gespeichert in:
| Veröffentlicht in: | Franklin Open Jg. 8; S. 100158 |
|---|---|
| Hauptverfasser: | , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Elsevier
01.09.2024
|
| Schlagworte: | |
| ISSN: | 2773-1863 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks. Traditional approaches to encryption, like Advanced Encryption Standard and Rivest–Shamir–Adleman, are pretty solid but mostly too computationally intensive for real-time audio applications. This paper presents a new audio encryption scheme using chaotic systems, characterized by high sensitivity to initial conditions, pseudo-randomness, and determinism. These properties make chaotic systems ideal for generating keys for cryptographic purposes. Indeed, complex keys that would be nearly impossible to reverse-engineer without exact initial parameters can be obtained with them. This methodology first digitizes the audio signal and subsequently encrypts each sample according to chaotic sequences from multiple systems, like 2D Memristive Hyperchaotic Maps and 3D Hyperchaotic Quadratic Maps. The encryption processes enormously increase the randomness of the encrypted audio and blind the original data, demonstrating the strength of the chaotic systems in securing audio information.Simulation of this encryption approach confirms its effectuality in providing strong security for audio data while maintaining efficiency, thus being suitable for real-time applications. The developed encryption schemes show high resistance to differential attacks, while the quality of the encrypted audio remains acceptable after transformation. This result can demonstrate chaotic systems’ potential to provide a secure and efficient solution for audio communications, which has broad applications in telecommunications, military communications, and confidential conferencing systems. This work, described in the paper, thus satisfies the growing demand for robust security in digital communications and opens up avenues of future research toward chaotic parameter optimization and an extension to other forms of data, enhancing the security features in all types of digital communication channels. |
|---|---|
| AbstractList | Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks. Traditional approaches to encryption, like Advanced Encryption Standard and Rivest–Shamir–Adleman, are pretty solid but mostly too computationally intensive for real-time audio applications. This paper presents a new audio encryption scheme using chaotic systems, characterized by high sensitivity to initial conditions, pseudo-randomness, and determinism. These properties make chaotic systems ideal for generating keys for cryptographic purposes. Indeed, complex keys that would be nearly impossible to reverse-engineer without exact initial parameters can be obtained with them. This methodology first digitizes the audio signal and subsequently encrypts each sample according to chaotic sequences from multiple systems, like 2D Memristive Hyperchaotic Maps and 3D Hyperchaotic Quadratic Maps. The encryption processes enormously increase the randomness of the encrypted audio and blind the original data, demonstrating the strength of the chaotic systems in securing audio information.Simulation of this encryption approach confirms its effectuality in providing strong security for audio data while maintaining efficiency, thus being suitable for real-time applications. The developed encryption schemes show high resistance to differential attacks, while the quality of the encrypted audio remains acceptable after transformation. This result can demonstrate chaotic systems’ potential to provide a secure and efficient solution for audio communications, which has broad applications in telecommunications, military communications, and confidential conferencing systems. This work, described in the paper, thus satisfies the growing demand for robust security in digital communications and opens up avenues of future research toward chaotic parameter optimization and an extension to other forms of data, enhancing the security features in all types of digital communication channels. |
| Author | Sishu Shankar Muni Upasana S.D. Vyshnavi G. Thejas Haridas Malavika S. Krishnan |
| Author_xml | – sequence: 1 fullname: Thejas Haridas organization: School of Digital Sciences, Digital University Kerala, Thiruvananthapuram, PIN 695317, Kerala, India – sequence: 2 fullname: Upasana S.D. organization: School of Digital Sciences, Digital University Kerala, Thiruvananthapuram, PIN 695317, Kerala, India – sequence: 3 fullname: Vyshnavi G. organization: School of Digital Sciences, Digital University Kerala, Thiruvananthapuram, PIN 695317, Kerala, India – sequence: 4 fullname: Malavika S. Krishnan organization: School of Digital Sciences, Digital University Kerala, Thiruvananthapuram, PIN 695317, Kerala, India – sequence: 5 fullname: Sishu Shankar Muni organization: Corresponding author.; School of Digital Sciences, Digital University Kerala, Thiruvananthapuram, PIN 695317, Kerala, India |
| BookMark | eNotjr1OwzAUhS0EQym8AYNfIMHXdmKbDbWFVqrUBeboxr6mqdo4csqQtycCpiN9On_37LZPPTH2BKIEAfXzqYwZ00ClFFLPSEBlb9hCGqMKsLVasO3qiGksWhwpcPwOXeLU-zwN1y71L3wTY-fRTzxFLtcc-8DVmh-ngbKfg9fO83Ear3QZH9hdxPNIj_-6ZJ9vm4_Vttgf3ner133hlVK2IAe1icEqF4V1TkkjSGsdAJ22GpU2UUM0znmJrrJ-NrQAMZCUmhS2asl2f70h4akZcnfBPDUJu-YXpPzVYJ5_nakJcu6AtqI6CG0MOIPeQKxCXcV6XlE_J9FYVA |
| CitedBy_id | crossref_primary_10_51537_chaos_1517688 crossref_primary_10_1007_s42979_025_04001_5 crossref_primary_10_1007_s11071_025_11565_7 crossref_primary_10_3390_sym17030365 crossref_primary_10_1016_j_cam_2025_116932 crossref_primary_10_3390_informatics12010001 crossref_primary_10_17586_2220_8054_2025_16_4_395_406 crossref_primary_10_1007_s11071_025_11410_x crossref_primary_10_1016_j_chaos_2025_116088 crossref_primary_10_1016_j_chaos_2025_116275 crossref_primary_10_1007_s40435_025_01713_7 crossref_primary_10_3390_electronics13214254 crossref_primary_10_1007_s40435_025_01673_y crossref_primary_10_32323_ujma_1684079 crossref_primary_10_1016_j_chaos_2024_115987 |
| ContentType | Journal Article |
| DBID | DOA |
| DOI | 10.1016/j.fraope.2024.100158 |
| DatabaseName | DOAJ Directory of Open Access Journals |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 2773-1863 |
| ExternalDocumentID | oai_doaj_org_article_d22a91b5e6d0477197ac71f5d65f641f |
| GroupedDBID | GROUPED_DOAJ |
| ID | FETCH-LOGICAL-c3338-e9167fd839f08993270e444d1a9484a347f41f799c2a958c327b11fde224e3ab3 |
| IEDL.DBID | DOA |
| IngestDate | Fri Oct 03 12:53:26 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c3338-e9167fd839f08993270e444d1a9484a347f41f799c2a958c327b11fde224e3ab3 |
| OpenAccessLink | https://doaj.org/article/d22a91b5e6d0477197ac71f5d65f641f |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_d22a91b5e6d0477197ac71f5d65f641f |
| PublicationCentury | 2000 |
| PublicationDate | 2024-09-01 |
| PublicationDateYYYYMMDD | 2024-09-01 |
| PublicationDate_xml | – month: 09 year: 2024 text: 2024-09-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | Franklin Open |
| PublicationYear | 2024 |
| Publisher | Elsevier |
| Publisher_xml | – name: Elsevier |
| Score | 2.3665042 |
| Snippet | Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks.... |
| SourceID | doaj |
| SourceType | Open Website |
| StartPage | 100158 |
| SubjectTerms | Audio security Chaos-based encryption Cryptography Hyperchaotic maps Information security Multimedia encryption |
| Title | Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems |
| URI | https://doaj.org/article/d22a91b5e6d0477197ac71f5d65f641f |
| Volume | 8 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ07T8MwEIAtVDGwIBAg3vLAahHHThyzQR_qgCoGkLpFjs9WuzRV0iL133O2i9SNhdWKHd2dnbtTzt8R8sS9aMB6wQp0N0ziaWIVNDmThYKMO6i0i8j8dzWbVfO5_jho9RVqwhIeOCnuGfLcaN4UroRMKsW1MlZxX0BZ-FJyH76-mdIpmfq9GxcLuHxn2nUgYeYykoZCV_cDLn90IJMzcrqP_OhreuM5OXKrCzIdLkzbs-BLgJotLFuK26bbxYP8QscB8GDsjrae5iOKWT8VI7rA3DEgjlpciSYUc39Jvibjz-GU7ZsbMCswLWQO4zLlAeMTH_68iVxlTkoJ3GhZSSOk8iid0tqi_EVl8YGGcw8Ofa4TphFXZLBqV-6a0KL0GciSO2el9JUwHASYXIReXwJn3JC3IHa9TvyKOhCl4wDqud7ruf5Lz7f_scgdOQnmSDVa92Sw6bbugRzb782y7x6jCX8Ao76iEw |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Chaos-based+audio+encryption%3A+Efficacy+of+2D+and+3D+hyperchaotic+systems&rft.jtitle=Franklin+Open&rft.au=Thejas+Haridas&rft.au=Upasana+S.D.&rft.au=Vyshnavi+G.&rft.au=Malavika+S.+Krishnan&rft.date=2024-09-01&rft.pub=Elsevier&rft.eissn=2773-1863&rft.volume=8&rft.spage=100158&rft_id=info:doi/10.1016%2Fj.fraope.2024.100158&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_d22a91b5e6d0477197ac71f5d65f641f |