Real-Time Encryption/Decryption of Audio Signal

Full Text (PDF, 609KB), PP.25-31

Views: 0 Downloads: 0

Author(s)

M.I.Khalil 1,2,*

1. Nuclear Research Center, Atomic Energy Authority, Cairo, Egypt

2. Currently in a sabbatical leave as an Associate Prof. at Princess Nora Bint Abdurrahman University, Faculty of Computer and Information Sciences, Networking and Communication Dept., Riyadh, Kingdom of Saudi Arabia, Riyadh

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.02.03

Received: 1 Aug. 2015 / Revised: 2 Oct. 2015 / Accepted: 12 Nov. 2015 / Published: 8 Feb. 2016

Index Terms

Cryptography, Symmetric, Asymmetric, Encryption, Decryption, RSA, Simulink

Abstract

Encryption is a way to secure and verify data that are traded through public communication channels in the presence of intruder party called antagonists. Consequently, the transmitted or stored message can be converted to unreadable form except for intended receivers. The decryption techniques allows intended receiver to reveal the contents of previously encrypted message via secrete keys exchanged exclusively between transmitter and receiver. The encryption and decryption techniques can be applied equally to a message in any form such as text, image, audio or video. The current paper applies and evaluate two different encryption/decryption algorithms to the real-time audio signal. The first one is the well-known RSA encryption and decryption technique, while the second one is a new suggested algorithm based on symmetric cryptography concept. The Matlab Simulink simulator tool is used for acquiring the real-time audio signal and simulating the proposed algorithms. Considering the mathematical nature of the audio signal, the experimental results showed that the RSA method yields an audio signal with low quality while the suggested algorithm yields audio signal with high quality as exact signal as the original one.

Cite This Paper

M.I.Khalil, "Real-Time Encryption/Decryption of Audio Signal", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.2, pp.25-31, 2016. DOI:10.5815/ijcnis.2016.02.03

Reference

[1]Jingli Zheng, Zhengbing Hu, Chuiwei Lu, “A Light-weight Symmetric Encryption Algorithm Based on Feistel Cryptosystem Structure”, IJCNIS, Vol. 7, No. 1, December 2014, pp. 16-23.
[2]Mamta. Juneja, and Parvinder S. Sandhu, “A Review of Cryptography Techniques and Implementation of AES for Images”, International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 1, Issue 4 (2013) ISSN 2320-401X; EISSN 2320-4028.
[3]Koumal Kaushik and Suman, “An Innovative Approach for Video Steganography”, IJCNIS, Vol. 7, No. 11, October 2015, pp. 72-79.
[4]Anupam Mondal and Shiladitya Pujari, “A Novel Approach of Image Based Steganography Using Pseudorandom Sequence Generator Function and DCT Coefficients”, IJCNIS Vol. 7, No. 3, February 2015 pp.42-49.
[5]Habutsu T., Nishio Y., Sasase I., and Morio S., “A secret key cryptosystem by iterating chaotic map,” Lect. Notes comput. Sci, Advances in Cryptology-EuroCrypt’91, 1991, vol. 547, page(s): 127-140.
[6]Pichler F. and Scharinger J., “Finite dimensional generalized baker dynamical systems for cryptographic applications,” Lect. Notes in Comput. Sci, 1996, vol. 1030, pp. 465-476.
[7]T. ElGamal, “A prublic key cryptosystem and a signature scheme based on discrete logarithms”, in Advances in Cryptology (CRYPTO ’84), Springer, 1985, vol. 196, pp. 10–18.
[8]Yen J. C. and Guo J. I., “A new chaotic image encryption algorithm,” Proc. 1998 National symposium on Telecommunications, Dec. 1998, page(s): 358-362.
[9]Yen J. C. and Guo J. I., “Efficient hierarchical image encryption algorithm and its VLSI realization,” IEEE Proceeding Vis. Image Signal Process, April, 2000, vol. 147, no.2, page(s): 430-437.
[10]Ueli Maurer and Bj?rn Tackmann, “On the Soundness of Authenticate-then-Encrypt: Formalizing the Malleability of Symmetric Encryption”, Proceedings of the 17th ACM Conference on Computer and Communication Security, ACM, pp. 505–515, Oct 2010.
[11]Ueli Maurer and Stefano Tessaro, Basing {PRF}s on Constant-Query Weak {PRF}s: Minimizing Assumptions for Efficient Symmetric Cryptography Advances in Cryptology — ASIACRYPT 2008, Lecture Notes in Computer Science, Springer-Verlag, vol. 5350, pp. 161–178, Dec 2008.
[12]Ritesh D.Yelane, Nitiket. N. Mhala and B. J. Chilke, “Security Approach by Using Visual Cryptographic Technique”, ijarcsse, Vol. 5, No. 1, January 2015.
[13]Z. M. Wang, G. R. Arce and G. Di Crescenzo, “Halftone visual cryptography via error diffusion,” In IEEE Transaction on Information Forensics & Security, vol.4, no.3, pp. 383-396, Sep.2009.
[14]R.Gnanajeyaraman, K.Prasadh , Dr.Ramar, Audio encryption using higher dimensional chaotic map, International Journal of Recent Trends in Engineering, Vol. 1, No. 2, May 2009.
[15]Sheetal Sharma and Lucknesh Kumar, Encryption of an Audio File on Lower Frequency Band for Secure Communication, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013 ISSN: 2277 128X.
[16]Ali M. Meligy, Mohammed M. Nasef, Fatma T. Eid, “An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys”, IJCNIS Vol. 7, No. 7, June 2015, pp. 24-29.
[17]Thiruppathy Kesavan, V, “Secret Key Cryptography based Security Approach for Wireless Sensor Networks”, Recent Advances in Computing and Software Systems (RACSS), 2012 International Conference, IEEE.