Loading…

Securing digital voice communication using non-autonomous modulated chaotic signal

In this paper, we present an encryption approach for voice communication systems based on direct chaotic modulation (non-autonomous modulation), in which voice is injected into one variable of the master system (using either Lorenz chaotic flow or Qi hyperchaotic flow) without changing the value of...

Full description

Saved in:
Bibliographic Details
Published in:Journal of information security and applications 2017-06, Vol.34, p.243-250
Main Authors: Elzaher, Mahmoud F. Abd, Shalaby, Mohamed, Kamal, Yasser, Ramly, Salwa El
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In this paper, we present an encryption approach for voice communication systems based on direct chaotic modulation (non-autonomous modulation), in which voice is injected into one variable of the master system (using either Lorenz chaotic flow or Qi hyperchaotic flow) without changing the value of any control parameter. This approach is based on the change of chaotic signal by injecting voice samples into one variable in chaotic system and hence generating a new chaotic signal. The voice signal is then extracted from the chaotic signal in the receiver side. Furthermore, we use a high dimension chaotic flow which increases the security of the encrypted signal. Non-autonomous modulation technique is suitable for secure real-time applications. We also presented a comparative study between the two approaches with their conventional chaotic masking counterparts. Experimental results show that non-autonomous methods give better performance than their chaotic masking counterparts when they are analyzed against Signal-to-Noise-Ratio (−38.55dB vs. 38.51dB and 59.22dB vs. 58.11dB), Segmental signal-to-Noise-Ratio (38.91dB vs. 38.84dB and 54.20dB vs. 53.16dB), Log-Likelihood Ratio (0.88vs. 0.80 and 1.59vs. 1.50), and Correlation Coefficient Analysis (0.0345vs. 0.021 and 0.0002vs. 0.01012). Statistical analyses show that the second proposed approach has the best results for the encrypted signal. Modifying conventional chaotic approaches increases the security of the encryption system.
ISSN:2214-2126
DOI:10.1016/j.jisa.2017.03.002