A new speech cryptosystem using DNA encoding, genetic and RSA algorithms

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    A new system for speech signals encryption and decryption based on the combination of three different encryption techniques which are Deoxyribonucleic Acid (DNA) , Genetic and RSA algorithms is presented in this work. Initially, the one dimensional speech signal is divided to three equal blocks. Secondly, DCT is applied to each block to obtain coefficients of speech samples. Thirdly, each block of speech samples coefficients is encrypted using different encryption method, DNA encoding for the first block whereas Genetic algorithm and RSA algorithm are applied to the second and last blocks respectively. Finally, the three encrypted blocks are combined together to produce ciphered speech signal ready for transmission. The presented speech cryptosystem is implemented and its performance is assessed via different speech encryption and decryption quality criterions and for various speech signals. The results of experiments and comparison prove that the presented algorithm achieves good results for both encryption and decryption and it has the ability to withstand various cryptographic attacks effectively. Further, several kinds of analysis have been performed on the proposed scheme like SNR, PSNR, Correlation Coefficient, NPCR and UACI which are reach to -61.4085 dB, 6.0671 dB, 0.00031683, 99.96 % and 37.2940 % respectively. All these tests reveal that the presented cryptosystem is appropriate to be applied in communication systems for secure real time speech encryption and decryption applications.

     

     

     

  • Keywords


    Speech Encryption and Decryption; DNA Coding; Genetic Algorithm; RSA Algorithm; Security Analysis.

  • References


      [1] A. Mostafa, N. F. Soliman, M. Abdalluh, and F. E. Abd EI-samieD, Speech Encryption Using Two Dimensional Chaotic Maps, IEEE, (2015), 235-240, available on line: https://ieeexplore.ieee.org/document/7416354.

      [2] D. Slimania and F. Merazka, Encryption of Speech Signal with Multiple Secret Keys, International Conference on Natural Language and Speech Processing, Procedia Computer Science 128, (2018), 79–88, available on line: https://www.sciencedirect.com/science/article/pii/S1877050918302242. https://doi.org/10.1016/j.procs.2018.03.011.

      [3] P. Sathiyamurthi and S. Ramakrishnan, Speech Encryption Using Chaotic Shift Keying for Secured Speech Communication, EURASIP Journal on Audio, Speech, and Music Processing, Springer, (2017), 1-11, available on line: https://asmp-eurasipjournals.springeropen.com/articles/10.1186/s13636-017-0118-0.

      [4] A. Agrawal, A. Bhopale, J. Sharma, M. S. Ali, and D. Gautam, Implementation of DNA Algorithm for Secure Voice Communication, International Journal of Scientific & Engineering Research, Vol. 3, Issue 6, (2012), 1-5, available on line: https://www.ijser.org/researchpaper/Implementation-of-DNA-algorithm-for-secure-voice-communication.pdf.

      [5] Narendren S, Y. B. Yathish, and C. Mohan B, A Cryptosystem using Two Layers of Security - DNA and RSA Cryptography, International Journal of Pure and Applied Mathematics, Vol. 119, No. 7, (2018), 217-224, available on line: https://acadpubl.eu/jsi/2018-119-7/articles/7a/23.pdf.

      [6] E. M. Elshamy, E. M. El-Rabaie, O. S. Faragallah et al., Efficient Audio Cryptosystem Based on Chaotic Maps and Double Random Phase Encoding, International Journal of Speech Technology, Springer, 2015, available on line: https://link.springer.com/article/10.1007/s10772-015-9279-3.

      [7] H. B. Abdul Wahab and S. I. Mahdi, Modify Speech Cryptosystem Based on Shuffling Overlapping Blocks Technique, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Vol. 4, Issue 2, (2015), 70-75, available on line: http://www.ijettcs.org/Volume4Issue2/IJETTCS-2015-03-20-41.pdf.

      [8] M. F. Abd Elzaher, M. Shalaby, and S. H. El Ramly, Securing Modern Voice Communication Systems using Multilevel Chaotic Approach, International Journal of Computer Applications (0975 – 8887), Vol. 135, No.9, (2016), 17-21, available on line: http://adsabs.harvard.edu/abs/2016IJCA..135i..17M.

      [9] S. J. Sheela, K. V. Suresh, and D. Tandur, A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding”, Journal of Computer Networks and Communications, (2017), 1-12, available on line: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ved=2ahUKEwj6wcrF9prfAhWysqQKHSDNDXIQFjABegQICBAC&url=http%3A%2F%2Fdownloads.hindawi.com%2Fjournals%2Fjcnc%2F2017%2F2721910.pdf&usg=AOvVaw0jIfU77c-BacUFy9yhXyz-.

      [10] X. Li, C. Zhou, and N. Xu, A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos, International Journal of Network Security, Vol. 20, No.1, (2018), 110-120, available on line: http://ijns.femto.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p110-120.pdf.

      [11] S. Arunpandian, and K. Mahesh, Image Enciphering Using Genetic Algorithm, International Journal of Engineering and Technology (IJET), Vol. 9, No. 5, (2017), 3570-3574, available on line: http://www.enggjournals.com/ijet/docs/IJET17-09-05-311.pdf. https://doi.org/10.21817/ijet/2017/v9i5/170905311.

      [12] R. Choudhary and P. Abrol, Genetic Algorithm Based Image Cryptography to Enhance Security, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 6, Issue 6, (2017), 873-878, available on line: http://ijarcet.org/wp-content/uploads/IJARCET-VOL-6-ISSUE-6-873-878.pdf.

      [13] R. Jhingran, V. Thada, and S. Dhaka, A Study on Cryptography using Genetic Algorithm, International Journal of Computer Applications (0975 – 8887), Vol. 118, No. 20, (2015), 10-14, available on line: https://pdfs.semanticscholar.org/2ea1/89f876f6167ceca1e064404bcf6d67f51a3e.pdf.

      [14] R. B. Vyavahare, A. J. Bajaj, H. P. Fuse, and P. K. Patil, Study of Secure Data Transmission Using Audio File, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 2, (2015), 146-149, available on line: https://ijarcce.com/wp-content/uploads/2015/03/IJARCCE3B.pdf. https://doi.org/10.17148/IJARCCE.2015.4232.

      [15] A. E. T. El_Deen, E.A. El-Badawy, and S. N. Gobran, Digital Image Encryption Based on RSA Algorithm, IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), Vol. 9, Issue 1, (2014), 69-73, available on line: https://pdfs.semanticscholar.org/e0ee/c327cec4aac470a562c2d35dbf1bdc88e93c.pdf.

      [16] S. M. H. Alwahbani and E. B. M. Bashier, Speech Scrambling Based on Chaotic Maps and One Time Pad, International Conference on Computing, Electrical and Electronic Engineering (ICCEEE), IEEE, (2013), 128-133, available on line: https://ieeexplore.ieee.org/document/7759928.

      [17] S. M. Hameed, H. A. Sa’adoon, and M. Al-Ani, Image Encryption Using DNA Encoding and RC4 Algorithm, Iraqi Journal of Science, Vol. 59, No.1B, (2018), 434-446, available on line: http://oaji.net/articles/2017/6146-1524128349.pdf.

      [18] S. Chakraborty, A. S., M. Roy, and K. Mali, A Novel Lossless Image Encryption Method using DNA Substitution and Chaotic Logistic Map, International Journal of Security and Its Applications, Vol. 10, No. 2, (2016), 205-216, available on line: https://www.earticle.net/Article/A269974. https://doi.org/10.14257/ijsia.2016.10.2.19.

      [19] S. N. Al Saad and E. Hato, A Speech Encryption based on Chaotic Maps, International Journal of Computer Applications (0975 – 8887), Vol. 93, No. 4, (2014), 19-28, available on line: https://pdfs.semanticscholar.org/9bec/6c202e227ae9245fcd21c321ecbb9020d4b4.pdf.


 

View

Download

Article ID: 21271
 
DOI: 10.14419/ijet.v7i4.21271




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.