Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A novel approach based on stream cipher for selective speech encryption

  • Published:
International Journal of Speech Technology Aims and scope Submit manuscript

Abstract

This paper proposes a new approach to the encryption of speech intended to be transferred on an insecure channel. The proposed technique is based on stream encryption where the original speech is pre-processed in order to select the relevant data for encryption by removing the unvoiced parts of the signal. In addition to reducing the size of the speech signal, the selection process also reduces the encryption and decryption times. The selected data is encrypted using a pseudo-random generator to make the information unable to understand by an intruder. The used pseudo-random generator is based on two 256-bits shift registers, one is linear and the other non-linear. This generator allows encryption in higher dimensional space which expands the key space and, therefore, improves security against brute force attack. Various analyzis such as histograms, key space, key sensitivity, correlation, brute force attack, signal to noise (SNR) and peak signal to noise ratio (PSNR) have been performed. The analysis shows that the proposed scheme is computationally simple, efficient with superior performance compared to other systems presented in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Abd Elzaher, M. F., Shalaby, M., & El Ramly, S. H. (2016). Securing modern voice communication systems using multilevel chaotic approach. International Journal of Computer Applications, 135(9), 0975–8887.

    Google Scholar 

  • Ashtiyani, M., Moradi Birgani, P., & Karimi Madahi, S. S. (2012). Speech signal encryption using chaotic symmetric cryptography. Journal of Basic and Applied Scientific Research, 2(2), 1668–1674.

    Google Scholar 

  • Belmeguenai, A., Mansouri, K., & Lashab, M. (2015). Speech encryption using stream cipher. British Journal of Applied Science and Technology, 8(1), 107–125.

    Article  Google Scholar 

  • Belmeguenai, A., Berrak, O. & Mansouri, K. (2015). Selective encryption of medical images, In Proceedings of the 10th International Conference on Computer Vision Theory and Applications (VISAPP-2015), pp. 93-99, ISBN: 978-989-758-091-8, Berlin.

  • Belmeguenai, A., Mansouri, K., & Medoued, A. (2015). Speech encryption using the nonlinear filter generator, 16th international Conference on Sciences and Techniques of Automatic control and computer engineering STA'2015, pp. 58–62, IEEE conference (STA conference is indexed scopus), Tunisia.

  • Bhatnagar, G., & Jonathan Wu, Q. M. (2012). Selective image encryption based on pixels of interest and singular value decomposition. Digital Signal Processing, 22, 648–663.

    Article  MathSciNet  Google Scholar 

  • Burileanu, D., Pascalin, L., Burileanu, C., & Puchiu, M. (2000). An adaptive and fast speech detection algorithm. Proceedings of the 3rd International Workshop on Text, Speech and Dialogue, p. 177182.

  • Cid, C., Kiyomoto, S., & Kurihara, J. (2009). The rakaposhi stream cipher, Proceedings of the 11th international conference on Information and Communications Security, ICICS'09, Berlin, Heidelberg, Springer, pp. 32–46.

  • Farsana, F. J., & Gopakumar, K. (2016). A novel approach for speech encryption: Zaslavsky map as pseudorandom number generator, 6th International Conference on Advances In Computing and Communications, ICACC 2016. Procedia Computer Science, 93, 816–823.

    Article  Google Scholar 

  • Gammel, B. M., Göttfert, R., & Kniffler, O. (2006). Achterbahn-128/80, eSTREAM, ECRYPT Stream Cipher Project, Report 2006/001.

  • Garofolo, John, et al. (1993). TIMIT Acoustic-Phonetic Continuous Speech Corpus LDC93S1, Web Download. Philadelphia: Linguistic Data Consortium.

  • Hell, M., Johansson, T., & Meier, W. (2006). A stream cipher proposal: Grain-128, In IEEE International Symposium on Information Theory (ISIT 2006).

  • Kulkarni, N. S., Raman, B., & Gupta, I. (2008). Selective encryption of multimedia images. NSC, 2008, 17–19.

    Google Scholar 

  • Lamel, L., Labiner, L., Rosenberg, A., & Wilpon, J. (1981). An improved endpoint detector for isolated word recognition. IEEE ASSP Magazine, 29, 777–785.

    Article  Google Scholar 

  • Maysaa, A., & Iman Qays, A. (2013). Speech encryption using chaotic map and blowfish algorithms. Journal of Basrah Researches Sciences, 39(2), 68–76.

    Google Scholar 

  • Musheer, A., Bashir, A., & Omar, F. (2012). Chaos based mixed key stream generator for voice data encryption. International Journal on Cryptography and Information Security (IJCIS), 2(1), 36–45.

  • Rahman, Md. M., Saha, T. K., & Bhuiyan, Md. A. (2012). Implementation of RSA algorithm for speech data encryption and decryption. IJCSNS International Journal of Computer Science and Network Security, 12(3), 74–82.

    Google Scholar 

  • Ramirez, J., Gorriz, J. M., & Segura, J. C. (2007). Voice activity detection, fundamentals and speech recognition system robustness, robust speech recognition and understanding, In M. Grimm & K. Kroschel (Eds.), ISBN: 978-3-902613-08-0.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aissa Belmeguenai.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Belmeguenai, A., Ahmida, Z., Ouchtati, S. et al. A novel approach based on stream cipher for selective speech encryption. Int J Speech Technol 20, 685–698 (2017). https://doi.org/10.1007/s10772-017-9439-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10772-017-9439-8

Keywords

Navigation