2020
DOI: 10.1109/access.2020.2987197
|View full text |Cite
|
Sign up to set email alerts
|

Audio Encryption Scheme Using Self-Adaptive Bit Scrambling and Two Multi Chaotic-Based Dynamic DNA Computations

Abstract: In this paper, a novel scheme for secure audio transmission is introduced. The novelty of this scheme is that it combines four different techniques for audio encryption in the same scheme which makes it more secure: self-adaptive scrambling, multi chaotic maps, dynamic DNA encoding and cipher feedback encryption. Also, it introduces two new designed multi chaotic maps as pseudo random generators that combine five different chaotic maps with eight control parameters. The scheme consists of three phases with thr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
33
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(35 citation statements)
references
References 52 publications
0
33
0
2
Order By: Relevance
“…SSIM gages the difference between the two audio samples. PSNR is a measure of the ratio between the original and encrypted audio file and Reference [32] Reference [34] Reference [33] Reference [50] Reference [51] Proposed (Audio 1)…”
Section: Encryption Qualitymentioning
confidence: 99%
See 2 more Smart Citations
“…SSIM gages the difference between the two audio samples. PSNR is a measure of the ratio between the original and encrypted audio file and Reference [32] Reference [34] Reference [33] Reference [50] Reference [51] Proposed (Audio 1)…”
Section: Encryption Qualitymentioning
confidence: 99%
“…e algorithm attained confusion through Mobius transformation and diffusion via chaotic Hénon map. Abdelfatah [33] proposed a novel audio encryption scheme through the combination of four methods self-adaptive scrambling, multiple chaotic maps, cipher feedback, and DNA encoding. e proposed scheme tends to enhance keyspace and provide strength against brute force attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…If the second rule in Table 1. is selected, the 8-bit binary "00110110" number can be expressed as "ATCG", if the fourth rule is chosen , then the 8-bit of the binary number "00110110" can be expressed as "CGTA" [7]. In this paper, we use the second rule to encode 8 bits of speech signal as shown in Table 1 , Rule 2= 00-A 01-G 10-C 11-T.…”
Section: Dna Encodingmentioning
confidence: 99%
“…A safe audio transmission method is introduced, combining four different techniques for encoding audio in the same system for even more security. The method is called Deoxyribonucleic acid (DNA) encoding and the proposed method is assessed using various measurements such as signal to noise ratio (SNR), root mean square (RMS), peak signal-to-noise ratio (PSNR), and correlation coefficient [25]. Recently, a chaotic synchronization-based secure communication system using a BELC was proposed.…”
Section: Introductionmentioning
confidence: 99%