Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems

Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks. Traditional approaches to encryption, like Advanced Encryption Standard and Rivest–Shamir–Adleman, are pretty solid but mostly too computati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Franklin Open Jg. 8; S. 100158
Hauptverfasser: Thejas Haridas, Upasana S.D., Vyshnavi G., Malavika S. Krishnan, Sishu Shankar Muni
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Elsevier 01.09.2024
Schlagworte:
ISSN:2773-1863
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks. Traditional approaches to encryption, like Advanced Encryption Standard and Rivest–Shamir–Adleman, are pretty solid but mostly too computationally intensive for real-time audio applications. This paper presents a new audio encryption scheme using chaotic systems, characterized by high sensitivity to initial conditions, pseudo-randomness, and determinism. These properties make chaotic systems ideal for generating keys for cryptographic purposes. Indeed, complex keys that would be nearly impossible to reverse-engineer without exact initial parameters can be obtained with them. This methodology first digitizes the audio signal and subsequently encrypts each sample according to chaotic sequences from multiple systems, like 2D Memristive Hyperchaotic Maps and 3D Hyperchaotic Quadratic Maps. The encryption processes enormously increase the randomness of the encrypted audio and blind the original data, demonstrating the strength of the chaotic systems in securing audio information.Simulation of this encryption approach confirms its effectuality in providing strong security for audio data while maintaining efficiency, thus being suitable for real-time applications. The developed encryption schemes show high resistance to differential attacks, while the quality of the encrypted audio remains acceptable after transformation. This result can demonstrate chaotic systems’ potential to provide a secure and efficient solution for audio communications, which has broad applications in telecommunications, military communications, and confidential conferencing systems. This work, described in the paper, thus satisfies the growing demand for robust security in digital communications and opens up avenues of future research toward chaotic parameter optimization and an extension to other forms of data, enhancing the security features in all types of digital communication channels.
AbstractList Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks. Traditional approaches to encryption, like Advanced Encryption Standard and Rivest–Shamir–Adleman, are pretty solid but mostly too computationally intensive for real-time audio applications. This paper presents a new audio encryption scheme using chaotic systems, characterized by high sensitivity to initial conditions, pseudo-randomness, and determinism. These properties make chaotic systems ideal for generating keys for cryptographic purposes. Indeed, complex keys that would be nearly impossible to reverse-engineer without exact initial parameters can be obtained with them. This methodology first digitizes the audio signal and subsequently encrypts each sample according to chaotic sequences from multiple systems, like 2D Memristive Hyperchaotic Maps and 3D Hyperchaotic Quadratic Maps. The encryption processes enormously increase the randomness of the encrypted audio and blind the original data, demonstrating the strength of the chaotic systems in securing audio information.Simulation of this encryption approach confirms its effectuality in providing strong security for audio data while maintaining efficiency, thus being suitable for real-time applications. The developed encryption schemes show high resistance to differential attacks, while the quality of the encrypted audio remains acceptable after transformation. This result can demonstrate chaotic systems’ potential to provide a secure and efficient solution for audio communications, which has broad applications in telecommunications, military communications, and confidential conferencing systems. This work, described in the paper, thus satisfies the growing demand for robust security in digital communications and opens up avenues of future research toward chaotic parameter optimization and an extension to other forms of data, enhancing the security features in all types of digital communication channels.
Author Sishu Shankar Muni
Upasana S.D.
Vyshnavi G.
Thejas Haridas
Malavika S. Krishnan
Author_xml – sequence: 1
  fullname: Thejas Haridas
  organization: School of Digital Sciences, Digital University Kerala, Thiruvananthapuram, PIN 695317, Kerala, India
– sequence: 2
  fullname: Upasana S.D.
  organization: School of Digital Sciences, Digital University Kerala, Thiruvananthapuram, PIN 695317, Kerala, India
– sequence: 3
  fullname: Vyshnavi G.
  organization: School of Digital Sciences, Digital University Kerala, Thiruvananthapuram, PIN 695317, Kerala, India
– sequence: 4
  fullname: Malavika S. Krishnan
  organization: School of Digital Sciences, Digital University Kerala, Thiruvananthapuram, PIN 695317, Kerala, India
– sequence: 5
  fullname: Sishu Shankar Muni
  organization: Corresponding author.; School of Digital Sciences, Digital University Kerala, Thiruvananthapuram, PIN 695317, Kerala, India
BookMark eNotjr1OwzAUhS0EQym8AYNfIMHXdmKbDbWFVqrUBeboxr6mqdo4csqQtycCpiN9On_37LZPPTH2BKIEAfXzqYwZ00ClFFLPSEBlb9hCGqMKsLVasO3qiGksWhwpcPwOXeLU-zwN1y71L3wTY-fRTzxFLtcc-8DVmh-ngbKfg9fO83Ear3QZH9hdxPNIj_-6ZJ9vm4_Vttgf3ner133hlVK2IAe1icEqF4V1TkkjSGsdAJ22GpU2UUM0znmJrrJ-NrQAMZCUmhS2asl2f70h4akZcnfBPDUJu-YXpPzVYJ5_nakJcu6AtqI6CG0MOIPeQKxCXcV6XlE_J9FYVA
CitedBy_id crossref_primary_10_51537_chaos_1517688
crossref_primary_10_1007_s42979_025_04001_5
crossref_primary_10_1007_s11071_025_11565_7
crossref_primary_10_3390_sym17030365
crossref_primary_10_1016_j_cam_2025_116932
crossref_primary_10_3390_informatics12010001
crossref_primary_10_17586_2220_8054_2025_16_4_395_406
crossref_primary_10_1007_s11071_025_11410_x
crossref_primary_10_1016_j_chaos_2025_116088
crossref_primary_10_1016_j_chaos_2025_116275
crossref_primary_10_1007_s40435_025_01713_7
crossref_primary_10_3390_electronics13214254
crossref_primary_10_1007_s40435_025_01673_y
crossref_primary_10_32323_ujma_1684079
crossref_primary_10_1016_j_chaos_2024_115987
ContentType Journal Article
DBID DOA
DOI 10.1016/j.fraope.2024.100158
DatabaseName DOAJ Directory of Open Access Journals
DatabaseTitleList
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
EISSN 2773-1863
ExternalDocumentID oai_doaj_org_article_d22a91b5e6d0477197ac71f5d65f641f
GroupedDBID GROUPED_DOAJ
ID FETCH-LOGICAL-c3338-e9167fd839f08993270e444d1a9484a347f41f799c2a958c327b11fde224e3ab3
IEDL.DBID DOA
IngestDate Fri Oct 03 12:53:26 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3338-e9167fd839f08993270e444d1a9484a347f41f799c2a958c327b11fde224e3ab3
OpenAccessLink https://doaj.org/article/d22a91b5e6d0477197ac71f5d65f641f
ParticipantIDs doaj_primary_oai_doaj_org_article_d22a91b5e6d0477197ac71f5d65f641f
PublicationCentury 2000
PublicationDate 2024-09-01
PublicationDateYYYYMMDD 2024-09-01
PublicationDate_xml – month: 09
  year: 2024
  text: 2024-09-01
  day: 01
PublicationDecade 2020
PublicationTitle Franklin Open
PublicationYear 2024
Publisher Elsevier
Publisher_xml – name: Elsevier
Score 2.3665042
Snippet Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks....
SourceID doaj
SourceType Open Website
StartPage 100158
SubjectTerms Audio security
Chaos-based encryption
Cryptography
Hyperchaotic maps
Information security
Multimedia encryption
Title Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems
URI https://doaj.org/article/d22a91b5e6d0477197ac71f5d65f641f
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ07T8MwEIAtVDGwIBAg3vLAahHHThyzQR_qgCoGkLpFjs9WuzRV0iL133O2i9SNhdWKHd2dnbtTzt8R8sS9aMB6wQp0N0ziaWIVNDmThYKMO6i0i8j8dzWbVfO5_jho9RVqwhIeOCnuGfLcaN4UroRMKsW1MlZxX0BZ-FJyH76-mdIpmfq9GxcLuHxn2nUgYeYykoZCV_cDLn90IJMzcrqP_OhreuM5OXKrCzIdLkzbs-BLgJotLFuK26bbxYP8QscB8GDsjrae5iOKWT8VI7rA3DEgjlpciSYUc39Jvibjz-GU7ZsbMCswLWQO4zLlAeMTH_68iVxlTkoJ3GhZSSOk8iid0tqi_EVl8YGGcw8Ofa4TphFXZLBqV-6a0KL0GciSO2el9JUwHASYXIReXwJn3JC3IHa9TvyKOhCl4wDqud7ruf5Lz7f_scgdOQnmSDVa92Sw6bbugRzb782y7x6jCX8Ao76iEw
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Chaos-based+audio+encryption%3A+Efficacy+of+2D+and+3D+hyperchaotic+systems&rft.jtitle=Franklin+Open&rft.au=Thejas+Haridas&rft.au=Upasana+S.D.&rft.au=Vyshnavi+G.&rft.au=Malavika+S.+Krishnan&rft.date=2024-09-01&rft.pub=Elsevier&rft.eissn=2773-1863&rft.volume=8&rft.spage=100158&rft_id=info:doi/10.1016%2Fj.fraope.2024.100158&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_d22a91b5e6d0477197ac71f5d65f641f