Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Audio encryption – a chaos-based data byte scrambling technique

Audio encryption – a chaos-based data byte scrambling technique This study proposes an efficient audio byte scrambling technique using multiple chaotic maps. The audio encryption scheme uses Henon map and chaotic economic map for creating sequences. The system uses an efficient algorithm which makes the sequences to interdependent with each other. This inter-dependency will add more sensitivity and complexity to the proposed algorithm. A repeated application of confusion and diffusion techniques on plain audio data bytes produces the cipher audio data bytes which can be stored or sent through the public channel. The detailed study of chaotic maps with respect to Lyapunov exponent and bifurcate nature, supports the proposed cryptosystem to behave chaotically, thereby produce highly secured cipher audio. The results of the various analyses including histogram, key space, key sensitivity, statistical, differential attack, entropy, mean-variance data bytes value and randomness analyses ensures the security of the audio encryption scheme against various kinds of attacks. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Applied Systemic Studies Inderscience Publishers

Audio encryption – a chaos-based data byte scrambling technique

Loading next page...
 
/lp/inderscience-publishers/audio-encryption-a-chaos-based-data-byte-scrambling-technique-KRT6g8jIlh
Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd
ISSN
1751-0589
eISSN
1751-0597
DOI
10.1504/IJASS.2018.091847
Publisher site
See Article on Publisher Site

Abstract

This study proposes an efficient audio byte scrambling technique using multiple chaotic maps. The audio encryption scheme uses Henon map and chaotic economic map for creating sequences. The system uses an efficient algorithm which makes the sequences to interdependent with each other. This inter-dependency will add more sensitivity and complexity to the proposed algorithm. A repeated application of confusion and diffusion techniques on plain audio data bytes produces the cipher audio data bytes which can be stored or sent through the public channel. The detailed study of chaotic maps with respect to Lyapunov exponent and bifurcate nature, supports the proposed cryptosystem to behave chaotically, thereby produce highly secured cipher audio. The results of the various analyses including histogram, key space, key sensitivity, statistical, differential attack, entropy, mean-variance data bytes value and randomness analyses ensures the security of the audio encryption scheme against various kinds of attacks.

Journal

International Journal of Applied Systemic StudiesInderscience Publishers

Published: Jan 1, 2018

There are no references for this article.