Professional Documents
Culture Documents
Abstract. Encryption is one of the most important methods for providing data
security mainly for an end to end protection of data transmitted across the
networks. In this paper, we proposed a speech encryption algorithm based on
DNA addition and chaotic maps for secure speech communication. The algo-
rithm deals with sampled speech signal that is given as input which is divided
into four segments of equal duration. During successive levels of iteration, the
speech segment is permuted and substituted with different chaotic mapping
techniques such as sine mapping, henon mapping, logistic mapping and tent
mapping. After performing the permutation and substitution all the segments are
combined and encoded as a sequence of DNA’s denoted by X. The DNA
sequence X and DNA sequence Y obtained using henon mapping are summed
up together using DNA addition operation. Finally, the speech encryption is
obtained as the result using DNA decoding. The correlation co-efficient test,
Signal to noise ratio test and Peak Signal to Noise Ratio test provides better
analysis of the proposed system. The algorithm also provides a better simulation
result and also helps in resisting the brute force attacks and differential attacks.
1 Introduction
Voice based communication has become very important in the field of video telephony,
mobile banking, education, military etc. The encryption methods are characterized into
digital speech encryption method and analog encryption method. The digital speech
encryption is classified into two types: symmetric and asymmetric. The examples of the
symmetric digital encryption technique are Advanced Encryption Standard [8] and
Data Encryption Standard. The symmetric digital encryption algorithm is also called a
secret key algorithm; it uses the same key for both encryption and decryption. It is
rarely used in existing voice based communication systems due to the increase in
capacity of the encrypted speech signal. The examples of the asymmetric digital
encryption technique are RSA algorithm. The asymmetric encryption algorithm is also
called a public key algorithm; it uses the different key for both encryption and
decryption. The asymmetric digital encryption scheme is not advisable for voice based
communication due to difficulty, results in slow performance [6].
In modern years, a secure system was developed based on chaos theory. It has
involved a large contract of consideration; chaos based encryption have several pre-
dominant characteristics include pseudo random number generator, ergodicity and
sensitive dependence on initial conditions or origin boundary [7]. These characteristics
are appropriate for secure communication and a lot of speech encryption systems have
been proposed [1–4, 6].
Speech encryption [1] based on three different secret keys are proposed. In this
system, the speech signals are rotated in both row and column wise to achieve
imperceptibility speech. Speech encryption algorithm [3] based on several chaotic
mapping techniques is proposed. In this system, the speech samples are permuted using
logistic mapping and resultant is divided into four speech segments based on amplitude
values. Each speech segment is permuted with four different chaotic mapping tech-
niques. Speech encryption techniques [4] are related by the four dimensional hyper
chaotic sequence. The hyperchaotic system is proved with high-quality randomness
and unpredictability and speech sequence are compressed by DCT to decrease
transparency.
In order to compute huge parallel data over the encryption, DNA based computing
is used in cryptographic techniques. The memory storage complexity in one time pad
can be avoided using DNA based system as it has huge information structure and the
vast storage of data in one time pad. Henceforth, this paper suggests a DNA based
speech encryption to overcome the storage problem.
The paper is systemized in the following way. The different types of chaotic
mapping used in this algorithm are discussed in Sect. 2. The different DNA rules and
DNA addition are presented in Sect. 3. The proposed encryption system is described in
Sect. 4. The simulation results and security analysis is presented in Sect. 5. Finally the
conclusion is discussed in Sect. 6.
2 Chaotic Mapping
Chaos is a stochastic process in nonlinear dynamic systems [7] that is generally used in
the field of cryptography.
xn þ 1 ¼ z xn ð1 xn Þ ð1Þ
xn þ 1 ¼ r1 sinðp xn Þ ð2Þ
Where, the system parameter r1 is varied between 0 and 4. x0 is the initial condition
of the sine map. The value of x0 is varying between [0.25, 0.5].
It consists of two constants a and b having values 1.4 and 0.3 respectively.
The DNA (Deoxyribonucleic acid) sequence is a very important characteristics tool for
many researches in biologic, diagnostic, forensics, biotechnology and biological sys-
tematic areas. The DNA contains a consistent amount of information density amount of
that generally applies to the one time pad. The DNA sequence consists of four nucleic
acids namely adenine (A), guanine (G), thymine (T) and cytosine (G). It takes on a base
pairing which refers to the combination of A and T together. Similarly, this holds good
in the combination of C and G ensuring complementary operation between each other.
In general, considering a binary system we refer that 0 and 1 are binary and 1 is
complementary of 0. The binary pairs 00 and 11 are complementary. The binary pairs
01 and 10 are complementary [5]. Table 1 shows the rules of the DNA sequence for
encoding and decoding map.
A Robust Speech Encryption System Based on DNA Addition and Chaotic Maps 1073
Initially, the original speech is segregated into four speech segments of speech with
equal duration. Each level uses a different type of chaotic mappings such as sine
mapping, logistic mapping, henon mapping and tent mapping. The first speech segment
is confused and substituted with a logistic mapping, second speech segment is confused
and substituted with sine mapping, third speech segment is confused and substituted
with tent mapping and fourth speech segment is confused and substituted with henon
mapping.
The block diagram of the proposed encryption system is shown in Fig. 1. The
algorithm of the proposed system is presented in Fig. 2. The encryption process is
achieved in three phases: Permutation phase, first level substitution phase and DNA
level substitution phase.
1074 R. Nagakrishnan and A. Revathi
The proposed speech encryption system was simulated using Matlab tool. Three
samples of male and female speech signals were taken and sampled at 8 kHz sampling
rate. The input Speech signals are taken from www.1speechsoft.com/voices.html. The
key sets used for encryption are x0 ¼ 0:43, l ¼ 1:79, a ¼ 1:25, b ¼ 0:3, r ¼ 4,
r1 ¼ 0:01. The process of encryption is evident by simulation results, which is shown
in Fig. 3. From the simulation results, it is evident that the encrypted signal is entirely
varying from the input speech whereas the decryption provided the input speech
completely.
Covðx; eÞ
rfxe ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffiffiffiffi ð5Þ
VarðxÞ VarðeÞ
1076 R. Nagakrishnan and A. Revathi
(a)
(b)
(c)
(d)
(e)
(f)
(g)
Fig. 3. (a) Waveforms of the original speech signal, (b) Waveforms of the Speech segment 1,
(c) Waveforms of the Speech segment 2, (d) Waveforms of the Speech segment 3, (e) Waveforms
of the Speech segment 4, (f) Waveforms of the Encrypted speech, (g) Waveforms of the
Decrypted speech
Where Cov(x, e) is the covariance between the original speech ‘x’ and the encrypted
speech ‘e’. Var(x) is the variance of the original speech. Var(e) is the variance of the
encrypted speech. The Var(x) is calculated as in (6)
A Robust Speech Encryption System Based on DNA Addition and Chaotic Maps 1077
1 X Ns
VarðxÞ ¼ ðxðkÞ EðxÞÞ2 ð6Þ
Ns k ¼ 1
1 X Ns
EðxÞ ¼ xðkÞ ð7Þ
Ns k¼1
1 X Ns
Covðx; eÞ ¼ ðxðkÞ EðxÞÞðeðkÞ EðeÞÞ ð8Þ
Ns k¼1
In Table 3, the correlation coefficient between the input speech and encrypted
speech and correlation coefficient between the input speech and decrypted speech are
shown. From these results, the correlation coefficient values are very low which
indicates that the encrypted sequence is totally random and highly correlated. The
obtained correlation coefficient value is unity thereby indicating that the decrypted
signal is completely retrieved back as same as the original signal.
P
Ns
x2 ðkÞ
k¼1
SNR ¼ 10 log10 ð9Þ
P
Ns
2
ðxðkÞ eðkÞÞ
k¼1
1078 R. Nagakrishnan and A. Revathi
eðkÞ is the encrypted speech signal. Table 4 provides the results of the signal to noise
ratio test for the six different speech signals. In our proposed system the SNR value
between original speech and encrypted speech is low; it shows that the encrypted
speech has been higher quality.
nx2
PSNR ¼ 10 log10 ð10Þ
jjx ejj2
Where ‘x’ denotes the highest power of the original speech signal. ‘n’ denotes the
length of encrypted speech. Whereas ‘x e’ denotes the mean square error. The PSNR
value for all the six speech samples that are different from one another is described in
Table 5. In our proposed system the PSNR value between original speech and
encrypted speech is low; it shows that the encrypted speech has been higher quality.
The PSNR value between original speech and decrypted speech is infinity; it shows that
the entire input speech samples are recovered at the decryption.
(a)
(b)
(c)
Fig. 4. (a) Histogram of the original speech signal, (b) Histogram of the Encrypted speech
signal, (c) Histogram of the Decrypted speech signal
1080 R. Nagakrishnan and A. Revathi
6 Conclusion
References
1. Slimani, D., Merazka, F.: Encryption of speech signal with multiple secret keys. In:
International Conference on Natural Language and Speech Processing, pp. 79–88 (2018)
2. Farsana, F.J., Gopakumar, K.: Private key encryption of speech signal based on three
dimensional chaotic map. In: International Conference on Communication and Signal
Processing, pp. 2197–2200 (2017)
3. Sathiyamurthi, P., Ramakrishnan, S.: Speech encryption using chaotic shift keying for
secured speech communication. EURASIP J. Audio Speech Music Process. 20, 1–11 (2017)
4. Farsana, F.J., Gopakumar, K.: Speech encryption based on four-dimensional hyperchaotic
system. In: Proceedings of IEEE International Conference on Data Mining and Advanced
Computing (SAPIENCE) (2016)
5. Enayatifar, R., Abdullah, A.H., FauziIsnin, I.: Chaos based image encryption using
hypridgentic algorithm and a DNA sequence. Opt. Lasers Eng. 56, 83–93 (2014)
6. Mosa, E., Messiha, N.W., Zahran, O., Fathi, E., El-Samie, A.: Chaotic encryption of speech
signals. Int. J. Speech Technol. 14, 285–296 (2011)
7. Liu, B., Peng, J.: Non Linear Dynamics. High Education Press, Beijing (2004)
8. Daemen, J., Rijndael, V.R.: The advanced encryption standard. Doctor Dobb’s J. 26(3),
137–139 (2001)
9. Head, T., Rozenberg, G., Bladergroen, R.S., Breek, C.K.D., Lommerse, P.H.M., Spaink, H.
P.: Computing with DNA by operating on plasmids. Bio Syst. 57, 87–93 (2000)
10. Piotr, W., Jan, J.M., Witold, R.R., Bogolan, L.: Adding numbers with DNA. In: International
Conference on Systems, Man and Cybernetics, pp. 265–270 (2000)