Pirdawood, Mardan A. and Kareem, Shadman R. and Zahir, Dashne Ch. (2023) Audio Encryption Framework Using the Laplace Transformation. ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 11 (2). pp. 31-37. ISSN 2410-9355
Text (Research Article)
ARO.11165.VOL11.NO2.2023.ISSUE21-PP31-37.pdf - Published Version Available under License Creative Commons Attribution Non-commercial Share Alike. Download (2MB) |
Abstract
Digital information, especially multimedia and its applications, has grown exponentially in recent years. It is important to strengthen sophisticated encryption algorithms due to the security needs of these innovative systems. The security of real-time audio applications is ensured in the present study through a framework for encryption. The design framework protects the confidentiality and integrity of voice communications by encrypting audio applications. A modern method of securing communication and protecting data is cryptography. Using cryptography is one of the most important techniques for protecting data and ensuring the security of messaging. The main purpose of this paper is to present a novel encryption scheme that can be used in real-time audio applications. We encrypt the sound using a combination of an infinite series of hyperbolic functions and the Laplace transform, and then decrypt it using the inverse Laplace transform. The modular arithmetic rules are used to generate the key for the coefficients acquired from the transformation. There is no loss of data or noise in the decryption sound. We also put several sound examples to the test
Item Type: | Article |
---|---|
Additional Information: | Adriansyah, Y., 2010. Simple Audio Cryptography. Institute Teknologi Bandung Indonesia, Indonesia. Al-Kateeb, Z.N., and Mohammed, S.J., 2020. A novel approach for audio file encryption using hand geometry. Multimedia Tools and Applications, 79(27-28), pp.19615-19628. DOI: https://doi.org/10.1007/s11042-020-08869-8 Al-Khazraji, L.R., Abbas, A.R., and Jamil, A.S., 2022. Employing neural style transfer for generating deep dream images. Aro-The Scientific Journal of Koya University, 10(2), pp.134-141. DOI: https://doi.org/10.14500/aro.11051 Delfs, H., Knebl, H., and Knebl, H., 2002. Introduction to Cryptography. Vol. 2. Springer, Heidelberg. DOI: https://doi.org/10.1007/978-3-642-87126-9 Dutta, H., Das, R.K., Nandi, S., and Prasanna, S.M., 2020. An overview of digital audio steganography. IETE Technical Review, 37(6), pp.632-650. DOI: https://doi.org/10.1080/02564602.2019.1699454 El-Zoghdy, S.F., El-sayed, H.S., and Faragallah, O.S., 2020. Transmission of chaotic-based encrypted audio through OFDM. Wireless Personal Communications, 113, pp.241-261. DOI: https://doi.org/10.1007/s11277-020-07187-4 Gencoglu, M., 2019. Embedded image coding using Laplace transform for Turkish letters. Multimedia Tools and Applications,78(13), pp.17521-17534. DOI: https://doi.org/10.1007/s11042-018-7096-9 Ghadi, M., Laouamer, L., and Moulahi, T., 2016. Securing data exchange in wireless multimedia sensor networks: Perspectives and challenges. Multimedia Tools and Applications, 75, p.3425-3451. DOI: https://doi.org/10.1007/s11042-014-2443-y Ghasemzadeh, A., and Esmaeili, E., 2017. A novel method in audio message encryption based on a mixture of chaos function. International Journal of Speech Technology, 20, pp.829-837. DOI: https://doi.org/10.1007/s10772-017-9452-y Hayat, U., and Azam, N.A., 2019. A novel image encryption scheme based on an elliptic curve. Signal Processing, 155, pp.391-402. DOI: https://doi.org/10.1016/j.sigpro.2018.10.011 Hayat, U., Azam, N.A., and Asif, M., 2018. A method of generating 8×8 substitution boxes based on elliptic curves. Wireless Personal Communications, 101, p.439-451. DOI: https://doi.org/10.1007/s11277-018-5698-1 Hiwarekar, A., 2013. A new method of cryptography using Laplace transform of hyperbolic functions. International Journal of Mathematical Archive,4(2), pp.208-213. Kaur, A., and Dutta, M.K., 2018. An optimized high payload audio watermarking algorithm based on LU-factorization. Multimedia Systems, 24, pp.341-353. DOI: https://doi.org/10.1007/s00530-017-0545-x Khalid, I., Shah, T., Almarhabi, K.A., Shah, D., Asif, M., and Ashraf, M.U., 2022. The SPN network for digital audio data based on elliptic curve over a finite field. IEEE Access, 10, pp.127939-127955. DOI: https://doi.org/10.1109/ACCESS.2022.3226322 Khalil, M., 2016. Real-time encryption/decryption of audio signal. International Journal of Computer Network and Information Security, 8(2), pp.25-31. DOI: https://doi.org/10.5815/ijcnis.2016.02.03 Kordov, K., 2019. A novel audio encryption algorithm with permutation-substitution architecture. Electronics, 8(5), p.530. DOI: https://doi.org/10.3390/electronics8050530 Lakshmi, G.N., Kumar, B.R., and Sekhar, A.C., 2011. A cryptographic scheme of laplace transforms. International Journal of Mathematical Archive, 2(12), pp.2515-2519. Lakshmi, G.N., Kumar, B.R., Suneetha, C., and Chandra, A., 2011. A cryptographic scheme of finite fields using logical operators. International Journal of Computer Applications, 975, p.8887. Lima, J.B., and da Silva Neto, E.F., 2016. Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75, pp.8403-8418. DOI: https://doi.org/10.1007/s11042-015-2755-6 Liu, Z., Huang, J., Sun, X., and Qi, C., 2017. A security watermark scheme used for digital speech forensics. Multimedia Tools and Applications, 76, pp.9297-9317. DOI: https://doi.org/10.1007/s11042-016-3533-9 Mel, H., and Baker, D., 2001. Cryptography Decrypted. Addison-Wesley, Reading, MA. Miller, V., 1985, Use of Elliptic Curves in Cryptography.In: Conference on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp.417-426. Nichols, R., 1996. Classical Cryptography Course. Vol. 2. Aegean Park Press, California.Ramana, B., 2017. Higher Engineering Mathematics. Tata McGraw-Hill Education, United States. Shah, D., Shah, T., and Jamal, S.S., 2020. Digital audio signals encryption by Mobius transformation and Henon map. Multimedia Systems, 26, pp.235-245. DOI: https://doi.org/10.1007/s00530-019-00640-w Shannon, C., 1998. Communication theory of secrecy systems. 1945. MD Computing: Computers in Medical Practice,15(1), pp.57-64. Singh, R., Chauhan, R., Gunjan, V.K., and Singh, P., 2014. Implementation of elliptic curve cryptography for audio-based application. International Journal of Engineering Research and Technology (IJERT),3(1), pp.2210-2214. |
Uncontrolled Keywords: | Cryptography, Laplace transformations, Maclaurin series, Sound encryptions |
Subjects: | Q Science > QA Mathematics |
Divisions: | ARO-The Scientific Journal of Koya University > VOL 11, NO 2 (2023) |
Depositing User: | Dr Salah Ismaeel Yahya |
Date Deposited: | 04 Sep 2023 09:36 |
Last Modified: | 04 Sep 2023 09:36 |
URI: | http://eprints.koyauniversity.org/id/eprint/389 |
Actions (login required)
View Item |