{"title":"音频加密-基于混沌的数据字节置乱技术","authors":"M. Parvees, J. A. Samath, B. Bose","doi":"10.1504/IJASS.2018.10013105","DOIUrl":null,"url":null,"abstract":"This study proposes an efficient audio byte scrambling technique using multiple chaotic maps. The audio encryption scheme uses Henon map and chaotic economic map for creating sequences. The system uses an efficient algorithm which makes the sequences to interdependent with each other. This inter-dependency will add more sensitivity and complexity to the proposed algorithm. A repeated application of confusion and diffusion techniques on plain audio data bytes produces the cipher audio data bytes which can be stored or sent through the public channel. The detailed study of chaotic maps with respect to Lyapunov exponent and bifurcate nature, supports the proposed cryptosystem to behave chaotically, thereby produce highly secured cipher audio. The results of the various analyses including histogram, key space, key sensitivity, statistical, differential attack, entropy, mean-variance data bytes value and randomness analyses ensures the security of the audio encryption scheme against various kinds of attacks.","PeriodicalId":39029,"journal":{"name":"International Journal of Applied Systemic Studies","volume":"8 1","pages":"51"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Audio encryption – a chaos-based data byte scrambling technique\",\"authors\":\"M. Parvees, J. A. Samath, B. Bose\",\"doi\":\"10.1504/IJASS.2018.10013105\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study proposes an efficient audio byte scrambling technique using multiple chaotic maps. The audio encryption scheme uses Henon map and chaotic economic map for creating sequences. The system uses an efficient algorithm which makes the sequences to interdependent with each other. This inter-dependency will add more sensitivity and complexity to the proposed algorithm. A repeated application of confusion and diffusion techniques on plain audio data bytes produces the cipher audio data bytes which can be stored or sent through the public channel. The detailed study of chaotic maps with respect to Lyapunov exponent and bifurcate nature, supports the proposed cryptosystem to behave chaotically, thereby produce highly secured cipher audio. The results of the various analyses including histogram, key space, key sensitivity, statistical, differential attack, entropy, mean-variance data bytes value and randomness analyses ensures the security of the audio encryption scheme against various kinds of attacks.\",\"PeriodicalId\":39029,\"journal\":{\"name\":\"International Journal of Applied Systemic Studies\",\"volume\":\"8 1\",\"pages\":\"51\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Applied Systemic Studies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJASS.2018.10013105\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Decision Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Applied Systemic Studies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJASS.2018.10013105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Decision Sciences","Score":null,"Total":0}
Audio encryption – a chaos-based data byte scrambling technique
This study proposes an efficient audio byte scrambling technique using multiple chaotic maps. The audio encryption scheme uses Henon map and chaotic economic map for creating sequences. The system uses an efficient algorithm which makes the sequences to interdependent with each other. This inter-dependency will add more sensitivity and complexity to the proposed algorithm. A repeated application of confusion and diffusion techniques on plain audio data bytes produces the cipher audio data bytes which can be stored or sent through the public channel. The detailed study of chaotic maps with respect to Lyapunov exponent and bifurcate nature, supports the proposed cryptosystem to behave chaotically, thereby produce highly secured cipher audio. The results of the various analyses including histogram, key space, key sensitivity, statistical, differential attack, entropy, mean-variance data bytes value and randomness analyses ensures the security of the audio encryption scheme against various kinds of attacks.