Академический Документы
Профессиональный Документы
Культура Документы
ISSN 2278-6856
Abstract
The most common way of human communication is
accomplished by speech. There are situations when secret
messages have to be sent. Transmission of speech signals over
internet encounters the risk of eavesdropping. Cryptographic
algorithms support in securing the voice signals by
scrambling techniques. Many scrambling techniques are
available for securing the speech signal. The encryption /
decryption technique should provide high level of security to
the signal and recover the original signals quickly and
efficiently yet maintaining excellent audio quality. Few
methods to protect the signal from outsiders are discussed and
their performances are analyzed. This review report is
presented to provide aid for selecting the best cryptographic
algorithm to ensure speech signal security during
transmission.
1. INTRODUCTION
Encrypting the important speech at the sending end and
sending the encrypted signal may prevent unauthenticated
access to the signal. Strength of the algorithm determines
the security of the signal. Cryptographic algorithms can be
classified into four major categories: frequency domain
scrambling, time domain scrambling, amplitude domain
scrambling and combinational domain scrambling.
Analogue algorithms can also be used for enhancing
secure voice signal transmission. Transformations such as
Wavelet transform, Fast Fourier transform, discrete cosine
transform, discrete wavelet transform are used by
analogue algorithms to ensure security. Digital encryption
is more secure than analog but it needs complex
implementations and large bandwidth for signal
transmission. Therefore, in the case of limited bandwidth
channel, analog scramble is used for better performance.
Encrypting and decrypting speech used in two major areas
which includes mobile telephony and VoIP.
3. LITERATURE REVIEW
Jianhua Hao et.al [1], described the algorithm based on
scrambling technique in frequency domain. In which the
encryption algorithm specified, scrambles the sample
speech signal in the limited frequency domain range to
guarantee that the encrypted speech signal bandwidth does
not be extended. Encryption based on chaotic maps is
well-defined by E. Mosa et al in 2009[3]. It has been given
that the technique used will provide extra security level to
the encryption system without much increase in algorithm
complexity. It is achieved by using different secret block
size and changing secret key every time. The user is free
to choose the required block size and the sub- keys that
form the secret key. This way of generating the secret key
ensures security. Also a brief description about logistic
maps, henon map and baker encryption are specified and
the effectiveness of the above mentioned are compared.
Blowfish algorithm is an example for symmetric block
cipher method of encryption and its efficiency is compared
with chaotic maps cryptosystem by Maysaa abd ulkareem
and Iman Qays Abduljaleel [4] in 2013. Signal to Noise
Ratio (SNR), Peak Signal to Noise Ratio (PSNR),
Normalized Root Mean Square Error(NRMSE) and
Retained Signal Energy(RSE) are considered as quality
measures to analyze both the algorithms. Zhang Qiu-yu et
al. [5] in 2016 elaborated security authentication method
of speech perceptual hashing based on fuzzy commitment
scheme. It accomplish, the FCS-based perceptual hashing
authentication scheme can effectively guarantee the safety
of the hash algorithm without affecting the original
performance of robustness and distinction that as long as
ISSN 2278-6856
Page 85
ISSN 2278-6856
6. ANALYSIS REPORT
a. Frequency Domain Scrambling:
The speech signal is sampled before applying Fast Fourier
Transformation. The scrambling matrix is chosen suitably,
and then Inverse Fast Fourier Transformation is obtained
to get the encrypted signal.
Fig.3 Chaotic Encryption of speech signal
The variable secret key block size is the reason for the
popularity of this process.
c. Blowfish:
Data encryption in blowfish algorithmic technique occurs
via a 16-round Feistel network and each round consists of
a key. This method uses large method of sub key which
makes it an efficient technique. These keys must be precomputed before any data encryption or decryption. The Parray consists of 18 32-bit sub- keys ( P1, P2, , P18)
and there are four 32-bit S-boxes with 256 entries each:
S1,0, S1,1, , S1,255;
S2,0, S2,1, , S2,255;
S3,0, S3,1, , S3,255;
S4,0, S4,1, , S4,255;
d. Fuzzy Commitment:
The fuzzy commitment scheme is a new method for safety
authentication which combines cryptographic hash
function and error correcting code. As shown in Fig.4
FCS (Fuzzy Commitment Scheme) mainly consists of
enrolment process and verification process
Page 86
ISSN 2278-6856
e. Duffing Map:
Chaotic behavior is observed in duffing map. It is one of
the most frequently used chaotic functions and is
expressed as follows:
Xn+1=yn
Yn+1= - bxn + ayn - yn3
(1)
Where b =0.15 and a =2.75
f. LFSR:
LFSR algorithm is well suitable for the encryption and
decryption of online streaming data, e.g. VoIP (voice
chatting over IP). Here also the analog speech signal is
digitalized to get the plain text. Cipher text is obtained by
XORing this key stream bits with plain text bits p1, p2, ...,
pn.
Ci =Pi Ki
(2)
X(t) = A S(t)
p( )=[ 1( ),, ( )] ,
=1 ,,
g. BSS:
Blind Source Separation (BSS) method of encryption and
decryption has its own worth, where the number of the
source signals is greater than that of the mixed signals.
The security of many cryptographic techniques depends
upon the apparent intractability of the computational
problems. BSS based speech encryption scheme, works on
the security which relies on the difculty of solving the
underdetermined BSS problem where the number of the
source signals is greater than that of the mixed signals.
(3)
(4)
x(
( ) = (A ( )A , ( ))x , ( )
1)
(5)
5. CONCLUSION
Speech signals are considered to be the most vulnerable
part of data which are very often open to espionage in
transmission. Unauthorized espionage incur security risk
in protecting the very sensitive data. Though cryptography
provides solution to improve security, it is critical to use
appropriate algorithmic technique. Hence, the advantages
and disadvantages of various cryptographic algorithms are
Page 87
6. ACKNOWLEDGEMENT
We owe sincere thankfulness to Shri Shankarlal
Sundarbai Shasun Jain College for women and University
of Madras for being supportive throughout our research
work.
References
[1] End-to-end speech encryption algorithm based on
speech scrambling in frequency domain, Yaoyao
Chen ; PLA Equipment Academy, Beijing, China,
101416 ; Jianhua Hao ; Jianbiao Chen ; Zibo Zhang
Published in: Third International Conference on
Cyberspace Technology (CCT 2015) Page(s):1 5
[2] Chaotic time series prediction model for speech signal
encoding based on genetic programming;
Lei
Yangc, Junxi Zhangd, Xiaojun Wua, b, c, , , Yumei
Zhangb, c, Jingjing Lia in Applied Soft Computing
,Volume 38, January 2016, Pages 754761A
[3] Speech encryption using two dimensional chaotic
maps Alzharaa Mostafa ; Faculty of Engineering,
Zagazig University, Egypt ; Naglaa. F.Soliman ;
Mohamoud Abdalluh ; Fathi E. Abd El-samie
Published in: 2015 11th International Computer
Engineering Conference (ICENCO) Page(s):235
240
[4] Speech encryption using chaotic map and blowfish
algorithms; Maysaa abd ulkareem and Iman Qays
Abduljaleel in Journal of Basrah Researches
((Sciences)) Vol.( 39). No. ( 2 ) .A ( 2013)
[5] Security Authentication Method of Speech Perceptual
Hashing Based on Fuzzy Commitment Scheme ;
Zhang Qiu-yu, Ren Zhan-wei, Huang Yi-bo, Yu
Shuang and Hu Wen-jin International Journal of
Security and Its Applications Vol. 10, No. 1 (2016),
pp.229-240
[6] Digital Chaotic Scrambling of Voice Based on
Duffing Map; Amina Mahdi, Ameer K. Jawad, Saad
S. Hreshee in Communications Engineering Journal
2016; 1(2): 16-21
[7] Speech Encryption and Decryption Using Linear
Feedback Shift Register (LFSR); Tin Lai Win, and
Nant Christina Kyaw in International Journal of
Electrical, Computer, Energetic, Electronic and
Communication Engineering Vol:2, No:12, 2008
[8] Dual Key Speech Encryption Algorithm Based
Underdetermined
BSS;
HuanZhao,
ShaofangHe,ZuoChen ,and XixiangZhang
in
Hindawi Publishing Corporation e Scientic World
ISSN 2278-6856
AUTHORS
Aparna R , received PG degree in
MOP Vaishnav College and M.Phil in
University of Madras. Working as
Assistant Professor in the Department
of Computer Applications, SSS Shasun
Jain College, Chennai. Her areas of
Research Interest are Signal & Image
Processing.
Dr.PL.Chihtra, working as an
Associate Professor (Senior Grade)
in the Department of Computer
Science, University of Madras,
Chennai. Her areas of research
interest are Digital image processing,
Pattern recognition and Signal
processing.
Page 88