Audio Encryption Using Chaotic Systems with Direct Byte-Level Processing

محتوى المقالة الرئيسي

Nagham Malik Abd Ali
Tarik Zeyad Ismaeel

الملخص

To protect digital audio transmissions from unauthorized access and modification, this paper proposes a voice encryption scheme based on chaotic systems. The proposed approach combines multiple chaotic maps into a cryptographic scheme that is applied at the byte level. The input sound is first divided into four equal-length parts. The Rossler system, Lorenz system, Henon map, and Baker map are chaotic systems used to encode each fragment. Four segments are combined, and subsequently, a logistic map is applied to the encoded audio to introduce a flipping step, ensuring a strong spread and confusion throughout the entire signal. During the decoding phase, XOR processes and switching are systematically reversed using saved keys, restoring the original audio. The encoded and retrieved audio is evaluated using several tests to ensure the success of the encoding and retrieval process, such as the signal-to-noise ratio (SNR) test, autocorrelation, mean square error (MSE), histogram analysis, and spectrogram comparison. The results demonstrate that the proposed system is highly secure against attackers and possesses a powerful diffusion and confusion mechanism, enhancing speech communication in the field of communications. Hence, the system is suitable for multimedia applications that require an elevated level of confidentiality, including the transmission of sensitive data, digital rights protection, and military communications.

##plugins.themes.bootstrap3.displayStats.downloads##

##plugins.themes.bootstrap3.displayStats.noStats##

تفاصيل المقالة

القسم

Articles

كيفية الاقتباس

"Audio Encryption Using Chaotic Systems with Direct Byte-Level Processing" (2026) مجلة الهندسة, 32(4), ص 106–122. doi:10.31026/j.eng.2026.04.06.

المراجع

Abd, M. and Naser, U., 2018. Speech encryption using chaotic map and Blowfish algorithms. Journal of Basrah Researches (Science), 39(2A), pp. 68–76. https://doi.org/10.13140/RG.2.2.28316.13444.

Abdulameer, L.F., Sripati, U., and Kulkarni, M., 2022. BER performance improvement of dual chaotic maps based on STBC communication system. Al-Khwarizmi Engineering Journal, 18(4), pp. 32–44. https://doi.org/10.22153/kej.2022.10.001.

Abdullah, S.M. and Abduljaleel, I.Q., 2021. Speech encryption technique using S-box based on multi chaotic maps. TEM Journal, 10(3), pp. 1429–1434. https://doi.org/10.18421/TEM103-54.

Ahmad, M., Alam, B. and Farooq, O., 2012. Chaos-based mixed keystream generation for voice data encryption. International Journal on Cryptography and Information Security (IJCIS), 2(1), pp. 39–48.

Alaklabi, A., Munir, A., Hafeez, M.A., and Khattak, M.A.K., 2024. Z-crypt: Chirp z-transform-based image encryption leveraging chaotic logistic maps and substitution permutation network. IEEE Access, 12, pp. 123401-123422. https://doi.org/10.1109/ACCESS.2024.3453171.

Alrifaee, Z.I.A. and Ismaeel, T.Z., 2022. Cryptography based on retina information. Indonesian Journal of Electrical Engineering and Computer Science, 28(3), pp. 1697–1708. https://doi.org/10.11591/ijeecs.v28.i3.pp1697-1708.

AlSaad, S.N. and Hato, E., 2014. A speech encryption based on chaotic maps. International Journal of Computer Applications, 93(4), pp. 19–28. https://doi.org/10.5120/16203-5488.

Ambika, D. and Radha, V., 2012. Secure speech communication: A review. International Journal of Engineering Research of Application (IJERA), 2(5), pp. 1044–1049. https://www.ijera.com/papers/Vol2_issue5/FR2510441049.pdf.

Anjana, S. et al., 2022. Audio and image encryption scheme based on QR decomposition and random modulus decomposition in Fresnel domain. Optica Applicata, 52(3), pp. 359–374. https://doi.org/10.37190/oa220303.

Bushra W., Hussein AL Zahawy, and Saad S. Hreshee, 2025. Two layers of audio security utilizing the international data encryption algorithm (IDEA) and Lorenz chaotic scrambler. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.2183.

Chang, W.D., Shih, S.P., and Chen, C.Y., 2015. Chaotic secure communication systems with an adaptive state observer. Journal of Control Science and Engineering, 2015, Article ID 471913. https://doi.org/10.1155/2015/471913.

Chicco, D., Warrens, M.J., and Jurman, G., 2021. The coefficient of determination, R-squared, is more informative than SMAPE, MAE, MAPE, MSE, and RMSE in regression analysis evaluation. PeerJ Computer Science, 7, pp. 1–24. https://doi.org/10.7717/PEERJ-CS.623.

Gill, H.S., Amjad, M., Faheem, M., Ur Rehman, A., Rana, U., Khan, A.R. and Bashir, R., 2025. A normalized exponential piecewise chaotic system (NEPCS) and DNA image cryptography using SHA-256. IEEE Access. https://doi.org/10.1109/ACCESS.2025.3582318.

Gokavarapu, S., and Vani Kumari, S., 2015. A novel encryption using one-dimensional chaotic maps. In Advances in Intelligent Systems and Computing, Springer Verlag, pp. 193–203. https://doi.org/10.1007/978-3-319-13728-5_22.

Hasan, F.S., 2016. Speech encryption using fixed point chaos-based stream cipher (FPC-SC). Eng. & Tech. Journal, 34(11), pp. 2152–2166. https://doi.org/10.30684/etj.34.11A.19.

Haseeb, E.H., Kadhim, S.A., and Mahmood, A.S., 2023. A six-dimensional hyperchaotic pseudorandom sequence for enhanced voice encryption. Ingénierie des Systèmes d’Information, 28(4), pp. 1055–1062. https://doi.org/10.18280/isi.280425.

Hosny, K.M., Elnabawy, Y.M., Elshewey, A.M., Alhammad, S.M., Khafaga, D.S., and Salama, R., 2024. New method of colour image encryption using triple chaotic maps. IET Image Processing, 18(12), pp. 3262-3276. https://doi.org/10.1049/ipr2.13171.

Kocarev, L., 2011. Chaos‑based cryptography: a brief overview. 1st ed. Berlin: Springer‑Verlag. https://doi.org/10.1007/978-3-642-20544-6.

Kuperin, Y.A. and Pyatkin, D.A., 2005. Two-dimensional chaos: The baker map under control. Journal of Mathematical Sciences. Kluwer Academic/Plenum, pp. 2798–2802. https://doi.org/10.1007/s10958-005-0234-8.

Mansor, A.J., 2016. FPGA-Based Image Encryption Using Chaotic Systems. PhD thesis, University of Technology, Iraq.

Mohammed, R.S., and Sadkhan, S.B., 2016. Speech scrambler based on proposed random chaotic maps. In Proceedings of the Al‑Sadiq International Conference on Multidisciplinary in IT and Communication Techniques Science and Applications (AIC‑MITCSA 2016). IEEE, pp. 154–159. https://doi.org/10.1109/AIC-MITCSA.2016.7759928.

Mohammed, S.G. and Al-Mothafar, N.S., 2024. Evaluation of Rijndael algorithm for audio encryption by brute force attack. Journal of Engineering, 30(11), pp. 128–141. https://doi.org/10.31026/j.eng.2024.11.08.

Mohi Ud Din, S., Shah, T., Alblehai, F., Nooh, S., and Jamal, S.S., 2025. A combinatory approach of non-chain ring and Henon map for image encryption application. Scientific Reports, 15(1), p.1781. https://doi.org/10.1038/s41598-025-85814-5.

Mokhnache, S., Daachi, M.E.H., Bekkouche, T. and Diffellah, N., 2022. A combined chaotic system for speech encryption. Engineering, Technology & Applied Science Research, 12(3), pp. 8578-8583. https://doi.org/10.48084/etasr.5157.

Mosa, E., Messiha, N.W., Zahran, O. and Abd El-Samie, F.E., 2011. Chaotic encryption of speech signals. International Journal of Speech Technology, 14(4), pp. 285-296. https://doi.org/10.1007/s10772-011-9103-7.

Mursi, M.F., Ahmed, H.E.H., Abd El-samie, F.E., and Abd El-aziem, A.H., 2014. Image encryption based on development of Hénon chaotic maps using fractional Fourier transform. International Journal of Strategic Information Technology and Applications (IJSITA), 5(3), pp. 62-77. https://doi.org/10.4018/ijsita.2014070105.

Pareek, N.K., Patidar, V., and Sud, K.K., 2006. Image encryption using chaotic logistic map. Image and Vision Computing, 24(9), pp. 926–934. https://doi.org/10.1016/j.imavis.2006.02.021.

Raghuvanshi, K.K., Kumar, Subodh, and Kumar, Sunil, 2020. A data encryption model based on intertwining logistic map. Journal of Information Security and Applications, 55, Article 102622. https://doi.org/10.1016/j.jisa.2020.102622.

Rastogi, S. and Thakur, S., 2013. Security analysis of multimedia data encryption technique using piecewise linear chaotic maps. International Journal on Recent and Innovation Trends in Computing and Communication, 1(5), pp. 458–461.

Sadkhan, S.B. and Abbas, N.A., 2015. Performance evaluation of speech scrambling methods based on statistical approach. Atti della Fondazione Giorgio Ronchi, 66(5), pp. 601–614.

Sathiyamurthi, P. and Ramakrishnan, S., 2017. Speech encryption using chaotic shift keying for secured speech communication. Eurasip Journal on Audio, Speech, and Music Processing, 2017(1), pp. 1–11. https://doi.org/10.1186/s13636-017-0118-0.

Sathiyamurthi, P. and Ramakrishnan, S., 2020. Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimedia Tools and Applications, 79(25–26), pp. 17817–17835. https://doi.org/10.1007/s11042-020-08729-5.

Sowthily, C. and Brindha, M., 2019. Image encryption using chaotic Baker’s map and LSB steganography. International Journal of Computational Intelligence and IoT, pp. 1–6. https://ssrn.com/abstract=3355504.

Talib Mangi, H., Ali, S.A., and Jawad, M.J., 2023. Encrypting of text based on chaotic map. Journal of University of Babylon for Pure and Applied Sciences (JUBPAS), 31(1). https://doi.org/10.19196/jubpas.v31i1.4526.

Willsey, M.S., Cuomo, K.M., and Oppenheim, A.V., 2011. Selecting the Lorenz parameters for wideband radar waveform generation. International Journal of Bifurcation and Chaos, 21(9), pp. 2539–2545. https://doi.org/10.1142/S0218127411029914.

Yau, H.T., Pu, Y.C. and Li, S.C., 2012. Application of a chaotic synchronization system to secure communication. Information Technology and Control, 41(3), pp. 274–282. https://doi.org/10.5755/j01.itc.41.3.1137.

المؤلفات المشابهة

يمكنك أيضاً إبدأ بحثاً متقدماً عن المشابهات لهذا المؤلَّف.