Abstract
This paper proposes a new approach to the encryption of speech intended to be transferred on an insecure channel. The proposed technique is based on stream encryption where the original speech is pre-processed in order to select the relevant data for encryption by removing the unvoiced parts of the signal. In addition to reducing the size of the speech signal, the selection process also reduces the encryption and decryption times. The selected data is encrypted using a pseudo-random generator to make the information unable to understand by an intruder. The used pseudo-random generator is based on two 256-bits shift registers, one is linear and the other non-linear. This generator allows encryption in higher dimensional space which expands the key space and, therefore, improves security against brute force attack. Various analyzis such as histograms, key space, key sensitivity, correlation, brute force attack, signal to noise (SNR) and peak signal to noise ratio (PSNR) have been performed. The analysis shows that the proposed scheme is computationally simple, efficient with superior performance compared to other systems presented in the literature.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abd Elzaher, M. F., Shalaby, M., & El Ramly, S. H. (2016). Securing modern voice communication systems using multilevel chaotic approach. International Journal of Computer Applications, 135(9), 0975–8887.
Ashtiyani, M., Moradi Birgani, P., & Karimi Madahi, S. S. (2012). Speech signal encryption using chaotic symmetric cryptography. Journal of Basic and Applied Scientific Research, 2(2), 1668–1674.
Belmeguenai, A., Mansouri, K., & Lashab, M. (2015). Speech encryption using stream cipher. British Journal of Applied Science and Technology, 8(1), 107–125.
Belmeguenai, A., Berrak, O. & Mansouri, K. (2015). Selective encryption of medical images, In Proceedings of the 10th International Conference on Computer Vision Theory and Applications (VISAPP-2015), pp. 93-99, ISBN: 978-989-758-091-8, Berlin.
Belmeguenai, A., Mansouri, K., & Medoued, A. (2015). Speech encryption using the nonlinear filter generator, 16th international Conference on Sciences and Techniques of Automatic control and computer engineering STA'2015, pp. 58–62, IEEE conference (STA conference is indexed scopus), Tunisia.
Bhatnagar, G., & Jonathan Wu, Q. M. (2012). Selective image encryption based on pixels of interest and singular value decomposition. Digital Signal Processing, 22, 648–663.
Burileanu, D., Pascalin, L., Burileanu, C., & Puchiu, M. (2000). An adaptive and fast speech detection algorithm. Proceedings of the 3rd International Workshop on Text, Speech and Dialogue, p. 177182.
Cid, C., Kiyomoto, S., & Kurihara, J. (2009). The rakaposhi stream cipher, Proceedings of the 11th international conference on Information and Communications Security, ICICS'09, Berlin, Heidelberg, Springer, pp. 32–46.
Farsana, F. J., & Gopakumar, K. (2016). A novel approach for speech encryption: Zaslavsky map as pseudorandom number generator, 6th International Conference on Advances In Computing and Communications, ICACC 2016. Procedia Computer Science, 93, 816–823.
Gammel, B. M., Göttfert, R., & Kniffler, O. (2006). Achterbahn-128/80, eSTREAM, ECRYPT Stream Cipher Project, Report 2006/001.
Garofolo, John, et al. (1993). TIMIT Acoustic-Phonetic Continuous Speech Corpus LDC93S1, Web Download. Philadelphia: Linguistic Data Consortium.
Hell, M., Johansson, T., & Meier, W. (2006). A stream cipher proposal: Grain-128, In IEEE International Symposium on Information Theory (ISIT 2006).
Kulkarni, N. S., Raman, B., & Gupta, I. (2008). Selective encryption of multimedia images. NSC, 2008, 17–19.
Lamel, L., Labiner, L., Rosenberg, A., & Wilpon, J. (1981). An improved endpoint detector for isolated word recognition. IEEE ASSP Magazine, 29, 777–785.
Maysaa, A., & Iman Qays, A. (2013). Speech encryption using chaotic map and blowfish algorithms. Journal of Basrah Researches Sciences, 39(2), 68–76.
Musheer, A., Bashir, A., & Omar, F. (2012). Chaos based mixed key stream generator for voice data encryption. International Journal on Cryptography and Information Security (IJCIS), 2(1), 36–45.
Rahman, Md. M., Saha, T. K., & Bhuiyan, Md. A. (2012). Implementation of RSA algorithm for speech data encryption and decryption. IJCSNS International Journal of Computer Science and Network Security, 12(3), 74–82.
Ramirez, J., Gorriz, J. M., & Segura, J. C. (2007). Voice activity detection, fundamentals and speech recognition system robustness, robust speech recognition and understanding, In M. Grimm & K. Kroschel (Eds.), ISBN: 978-3-902613-08-0.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Belmeguenai, A., Ahmida, Z., Ouchtati, S. et al. A novel approach based on stream cipher for selective speech encryption. Int J Speech Technol 20, 685–698 (2017). https://doi.org/10.1007/s10772-017-9439-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10772-017-9439-8