999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Secure Audio Transmission Over Wireless Uncorrelated Rayleigh Fading Channel

2022-11-09 08:16:36OsamaFaragallahFaroukHalaElsayedandMohsenElbendary
Computers Materials&Continua 2022年1期

Osama S.Faragallah,M.Farouk,Hala S.El-sayed and Mohsen A.M.El-bendary

1Department of Information Technology,College of Computers and Information Technology,Taif University,P.O.Box 11099,Taif,21944,Saudi Arabia

2Department of Computer Science and Engineering,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

3Department of Electrical Engineering,Faculty of Engineering,Menoufia University,Shebin El-Kom,32511,Egypt

4Department of Electronics Technology,Faculty of Technology and Education,Helwan University,Cairo,Egypt

Abstract: Audio communications and computer networking play essential roles in our daily lives,including many domains with different scopes.Developments in these technologies are quick.In consequence,there is a dire need to secure these technologies up to date.This paper presents an efficient model for secure audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel.Also,the performance of the utilized multiple secret keys-based audio cryptosystem is analyzed in different transformation domains.The discrete cosine transform (DCT),the discrete sine transform(DST),and the discrete wavelet transform (DWT) are investigated in the utilized multiple secret key-based audio cryptosystem.Simulationresults show consistent results with the wireless noisy channel.The performance of the proposed multiple secret keys-based audio cryptosystem can be ranked concerning the employed domain as DWT,DCT,and DST transform techniques.The simulation experiments proved that the presented multiple secret keysbased audio cryptosystem for audio signals transmitted over the wireless noisy uncorrelated Rayleigh fading channel achieves reliable and secure wireless link utilizing combined multi security layers.

Keywords: Audio communications;encryption;uncorrelated Rayleigh fading channel

1 Introduction

Audio communications have a pivotal role in our daily life,covering many domains like cell phone,military applications,electronic learning,online banking,social networks,landline phone conversation,and chatting conversation programs.Therefore,audio calls are widely utilized in our daily life,especially with audio cryptosystem calls.Essentially,any audio cryptosystem requires audio data to be transmitted in a non-clear form or encrypted form using a robust encryption algorithm.Otherwise,the audio cryptosystem cannot guarantee enough security against eavesdropping during the communication process.Moreover,it is mandatory to cancel and eliminate any residual intelligibility in the ciphered audio data to ensure sufficient protection against eavesdropping during audio communications [1-4].

As the cryptanalysis tools and activities have increased,it is crucial to encrypt audio files during the communication process through all known communication channels like the public telephone network,wireless network,radio communications and Internet calls.Any successful audio cryptosystem should own a strong encryption algorithm against attacks and eavesdroppers.Therefore,scientific research must focus on security enhancements for audio cryptosystems.They should quickly enhance the security of audio cryptosystems because of two reasons.First,there is rapid development in cryptanalysis and eavesdroppers’techniques.Second,there is a rapid increase in audio communication usage in a wide variety of daily lives [5-8].

Due to the wide-spreading of different wireless networks,security issues became vital to combat the various attacks.Several audio signals are susceptible,and they must be protected and secured from any attacks.Also,a communication system cannot give the required security level against hackers during communications,especially if the audio data over wireless channels is clear or not encrypted [7].It is usually receivable for any unauthorized eavesdropper.For ensuring a high-security degree,efficient audio encryption/decryption techniques are required [8].

The secured wireless transmission model for sensitive audio signals is presented in this paper.Furthermore,the performance of the enhanced multiple secret keys-based audio cryptosystem is analyzed using different metrics over the wireless uncorrelated fading channel to prove its applicability with varying kinds of noises.

The paper rest has been organized as follows: the overview of the related work is presented in section 2.In section 3,the enhanced multiple secret keys-based audio cryptosystem description based on enhanced multiple key is presented.The computer simulation experiments for the enhanced multiple secret keys-based audio cryptosystem are explored in section 4.Finally,the conclusion is given in section 5.

2 Related Works

The recent presented audio security techniques have been discussed in this section.The audio security techniques include encryption tools,secret key based methods and data hiding based security techniques.The audio cryptosystems can be categorized into analog cryptosystems and digital cryptosystems.The analog methods of audio encryption can be categorized into timedomain (TD) methods and frequency domain methods like DCT,DST,and DWT [9-19].The second type of audio cryptosystem is the digital cryptosystems.There are two examples of digital audio cryptosystems: the traditional Advanced Encryption Standard (AES) and the chaotic encryption using baker map-based techniques [20-23].

The chaotic baker map is used in 2019 as an efficient data randomizing tool for enhancing the error performance of low complex convolutional codes [24].The chaotic baker map is employed in this presented research to improve the multiple secret keys audio cryptosystem.Although the problems of audio signals protection over the commercial channel have been discussed in [25],this research work proposed an efficient method for encrypting the speech using the variable-length encoding and the collatz conjecture.This speech encryption approach has a larger keyspace and significantly higher key sensitivity.Several metrics are considered for studying the performance of this proposed audio security technique,such as the computational cost,key sensitivity and security keyspace size [25].

The data hiding concept is presented as a tool for protecting the audio signal in [26].The authors in this research work proposed the watermarking technique to secure the audio signals.The DWT and singular value decomposition (SVD) techniques have been utilized in the proposed watermarking scheme;this proposed decentralized watermarking works based on distributing the audio signal watermark into the corners of the host signals for enhancing the robustness of this decentralized watermarking technique [26].Furthermore,based on the LSB algorithm in [27],the steganography technique is proposed for image embedding into audio files.This approach contains two processes,the compression and encryption process of the image by the GMPR technique.Examples of data hiding techniques utilized as a tool for image and audio security have been presented in several research papers [26-28].

3 Enhanced Multiple Secret Keys-Based Audio Cryptosystem

The enhanced multiple secret keys-based audio cryptosystemis a combined encryption algorithm utilizing the baker map within the frequency domains.The permutation process increases the confusion of the presented multiple secret keys-based audio cryptosystem.Therefore,this research paper has utilized different transform techniques to test their performance within the presented multiple secret keys-based audio cryptosystem over the wireless uncorrelated Rayleigh fading channel.The enhanced multiple secret keys-based audio cryptosystem employs different transform domains like DCT,DST,and DWT.

3.1 Encryption Algorithm

In the following,the steps of the encryption algorithm of the enhanced multiple secret keysbased audio cryptosystem are presented.

Round 1: Framing and reshaping the audio signal from a 1D block into 2D blocks.

Round 2: Mask generation using the secret key;this is an essential step to modify the remaining non-permutated parts of the audio signal and enhance the security of the enhanced multiple secret keys-based audio cryptosystem.The mask is generated as follows:

The square matrix of size equal to the secret key size is filled with zero values.The first number of rows is equivalent to the number of sub-keys in the private key,filled with a value of 1.Zeros and ones masks are formed using the chaotic baker map permutations.This mask is combined with every audio block signal after reformatting to fill the silent periods of the audio signal and offer immunity against known-plaintext attacks.

Round 3: Permutation and substitution;the permutation utilizes the chaotic baker map to rearrange audio sample data in the audio matrix.

For each separate test,repeat permutation a number of rounds equals 3,5 and 7.Then,permutation is followed by substitution to alter the remaining non-shuffled portions of the audio signal and increase the cryptosystem’s security.Finally,the mask is added to the original audio signal in the encryption algorithm and subtracted in the decryption algorithm.

Round 4: Apply discrete transforms followed by permutation and then substitution;finally,apply the inverse of discrete transforms.

The main idea of employing the DCT,DST and DWT [29-31] is to increase diffusion and change the values of 1 introduced by masking in silent periods (all-zero blocks).Another shuffling operation is employed in the DCT,DST or DWT for the audio samples to improve the confusion and enhance the security before employing the inverse of the employed transform.This is followed by a substitution step,which changes the audio samples by combining their values to the mask’s value.Finally,this step is followed by applying the inverse of transform domain IDCT,IDST or IDWT.

Round 5: Permutation using baker map is repeated a number of rounds equals 3,5 and 7.

Round 6: Reshaping into a 1D format save audio data into a file.The output is the encrypted audio version.

3.2 Decryption Algorithm

In the following,the steps of the decryption algorithm of the enhanced multiple secret keysbased audio cryptosystem are presented.

Round 1: Mask generation using the secret key and baker map.

Round 2: Framing and reshaping into 2D blocks to form a readable format.

Round 3: Employ the inverse of permutation using the inverse of baker map.For each separate experiment,repeat this round a number of rounds equals 3,5 and 7.

Round 4: Apply discrete transforms followed by the inverse of substitution and then the inverse of substitution;finally,apply the inverse of discrete transforms.

Round 5: Employ the inverse of substitution and the inverse of permutation.The inverse of substitution utilizes a subtract mask.The inverse of permutation employs the inverse of baker map with repeating the inverse permutation a number of rounds equals 3,5 and 7.

Round 6: Reshaping into a 1D format save audio data into a file.The output is the decrypted audio version.

The encryption and decryption algorithms steps have been described in the above sections of the enhanced multiple secret keys-based audio cryptosystem.This enhanced multiple secret keys-based audio cryptosystem works using substitution and permutation of audio blocks using multiple secret keys in frequency domains.In addition,the enhanced multiple secret keys-based audio cryptosystem is based on utilizing the fifth private key created from the enhanced audio cryptosystem’s original secret key.This adds another security layer for the enhanced multiple secret keys-based audio cryptosystem and enlarges the keyspace.Simulation experiments demonstrated that these modifications enhance the security of the audio transmission over the wireless uncorrelated fading channel.Therefore,the enhanced multiple secret keys-based audio cryptosystem is suitable for sensitive and classified phone calls.However,these enhancements are at the cost of increasing the time taken to execute the enhanced multiple secret keys-based audio cryptosystem.

The presented audio cryptosystem adds another security layer by enlarging the secret keyspace.This is done by increasing the number of private keys used to five keys instead of only four keys by generating the fifth key (key 5).The size of key 5 equals one half the size of key 2.Also,mask four is developed to be handled with operations of key 4.

3.3 The Evaluating Model of the Enhanced Multiple Secret Keys-Based Audio Cryptosystem

In this section,the evaluating model of the presented enhanced multiple secret keys-based audio cryptosystem have been introduced.This model processes the audio files for performing the encryption process at the transmitter side as shown in Fig.1.Also,it shows the operation of the encrypted audio file and the decryption process,as shown in Fig.1 for decrypting the encrypted audio signal.The Rayleigh fading channel is utilized to test the performance of the presented audio cryptosystem and evaluate the quality of the received decrypted audio file.The encrypted audio signal is prepared to send over the wireless uncorrelated Rayleigh fading channel through the following three steps: a-transmission process,b-segmentation to packets,and c-modulation.In Fig.1,the proposed secured audio communication model is designed for testing the multiple secret keys-based audio cryptosystem over the wireless uncorrelated Rayleigh fading channel.This model has been designed for evaluating the performance of the enhanced multiple secret keys-based audio cryptosystem for securing the audio signals transmission in a free and open environment.This environment is represented in this proposed model of secure audio transmission by the wireless uncorrelated Rayleigh fading channel.In the simulation section,the presented guaranteed audio wireless transmission parameters are presented.These parameters are the length of the small packets,“transmitted packet length”,the channel conditions simulation“SNR Values”,the modulation and the utilized wireless communication channel.

4 The Computer Simulation Experiments

Several experiments are devoted to test and evaluate the effect of noise using uncorrelated fading channel on the received decrypted audio signal after passing through a wireless medium,with different SNR noise levels and at the same time re-run tests with the error-free channel.For evaluating the algorithms’performance,many metrics utilized,such as the spectral distortion(SD),Log-Likelihood Ratio (LLR),and the correlation coefficient (CC).There are two groups of experiments;the first experiment group tests the enhanced multiple secret keys-based audio cryptosystem concerning the different transform domains.The second experiment group tests evaluate the presented multiple secret keys-based audio cryptosystem as a security tool for securing the transmitted speech or audio signals over the wireless uncorrelated Rayleigh fading channel communication.The simulation setting parameters of the secured transmission model of the audio signals are presented in Tab.1.

4.1 Uncorrelated Rayleigh Fading Channel Experiments Group

In this group of experiments,the enhanced multiple secret keys-based audio cryptosystem is tested over wireless uncorrelated Rayleigh fading channel with error-free and various SNR values using the different transform domains.

4.1.1 DCT Analysis

For decryption and according to the employed security metrics shown in Tab.2 for CC,SD and LLR,the best performance of the enhanced multiple secret keys-based audio cryptosystemis achieved with SNR equals 35 dB,while the worst performance of the enhanced multiple secret keys-based audio cryptosystem is obtained with SNR equals 0 dB.This is generally expected as the noise level becomes lowest with the value of 35 dB and,as a result,better quality for the decrypted audio signal.Furthermore,it is shown from Tab.2 that the enhanced multiple secret keys-based audio cryptosystem shows improved values of CC,SD and LLR with increasing the SNR of the uncorrelated Rayleigh fading channel.

4.1.2 DST Analysis

For decryption,according to employed security metrics shown in Tab.3 for CC,SD and LLR,the best performance of the enhanced multiple secret keys-based audio cryptosystem is achieved with SNR equals 35,while the worst performance of the enhanced multiple secret keys-based audio cryptosystem is obtained with SNR equals 0 dB.This is usually expected as the noise level becomes lowest with a value of 35 dB and,as a result,better quality for the decrypted audio signal.This is generally expected as the noise level becomes lowest with a value of 35 dB and,as a result,better quality for the decrypted audio signal.It is shown from Tab.3 that the performance of the enhanced multiple secret keys-based audio cryptosystem shows improved values of CC,SD and LLR with increasing the SNR of the uncorrelated Rayleigh fading channel.On the other hand,it is delivered from Tab.3 that the DST-based enhanced multiple secret keys-based audio cryptosystem performs worse than the DCT-based enhanced multiple secret keys-based audio cryptosystem.Also,the received decrypted audio signal quality is lower than the DCT domain.Hence,these tabulated results demonstrate that the DCT transform achieves better performance over the uncorrelated Rayleigh fading channel than the DST transform.

Figure 1:The encryption and decryption steps of the enhanced multiple secret keys-based audio cryptosystem model for performance evaluating over wireless uncorrelated Rayleigh fading channel

Table 1:Uncorrelated Rayleigh fading channel setting parameters

Table 2:DCT results with error-free channel and various uncorrelated Rayleigh fading SNR values

Table 3:DST with error-free channel and various uncorrelated Rayleigh fading SNR values

4.1.3 DWT Analysis

The performance evaluation of the enhanced multiple secret keys-based audio cryptosystem utilizing the DWT transform has been presented.The CC,SD and LLR metrics are employed for measuring the quality of encryption and decryption processes of the enhanced multiple secret keys-based audio cryptosystem.In addition,the various uncorrelated Rayleigh fading channel conditions are used through various SNR values.The results tabulated in Tab.4.

Table 4:DWT with error-free channel and various uncorrelated Rayleigh fading SNR values

As shown in Tab.4,the DWT-based enhanced multiple secret keys-based audio cryptosystem performs better than the DCT and DST-based system.Moreover,the decrypted audio signal quality is improved with the DWT.These two previous computer simulation experiments prove the applicability of the enhanced multiple secret keys-based audio cryptosystem for securing the sensitive speech calls or audio files transmission over the wireless uncorrelated Rayleigh fading channel.

4.2 Results Analysis and Comparison

This section presents a comparison and analysis for security and quality metrics in decryption with different SNR values.Tab.5 shows a comparison between the correlation coefficient (CC)values of different transform techniques.Fig.2 shows the values of the CC between the original and received decrypted audio with different transform techniques and various SNR of the uncorrelated Rayleigh fading channel.For CC values,it is shown that the best values exist with the DWT for all SNR values.However,the worst values indicated with the DST for values of SNR equal 0 dB,5 dB,10 dB,15 dB,20 dB,and 25 dB.The worst value indicated with the DCT for SNR equals 25 dB.

Fig.3 shows the values of the SD metric values of the enhanced multiple secret keysbased audio cryptosystem with the different transform techniques and various SNR values of the uncorrelated Rayleigh fading channels.In Fig.3,the SD metrics values are drawn for the previous experiments for encrypted audio using the enhanced multiple secret keys-based audio cryptosystems.As shown from Fig.3,with increasing the SNR values of the wireless uncorrelated Rayleigh fading channel,the quality of the received decrypted audio signal is improved.On the other hand,the DWT transform achieves better metrics values.For SD values,it is shown from Fig.3 that the best values exist with the DWT for all SNR values.However,the worst values are indicated with the DCT and DST for different SNR values.Fig.4 shows the LLR metric values of the enhanced multiple secret keys-based audio cryptosystem with different transform techniques and various SNR values of the uncorrelated Rayleigh fading channel.For LLR values shown in Fig.4,the best values exist with the DWT for SNR values equal 10 dB and 15 dB.The best values exist with the DST for SNR values equal 0 dB and 5 dB.However,the worst values are shown with the DWT for values of SNR equal 0 dB and 5 dB.The worst values exist with the DCT for SNR values equal 10 dB and 15 dB.The different metrics values are collected in Tab.5.This table tabulates the values of the experiments using different transform techniques.

Table 5:Metrics values of different techniques over the wireless noisy uncorrelated Rayleigh fading channel with SNR variations for original and decrypted version

Figure 2:CC vs. SNR for the enhanced multiple secret keys-based audio cryptosystem over the wireless noisy uncorrelated Rayleigh fading channel

Figure 3:SD vs. SNR for the enhanced multiple secret keys-based audio cryptosystem over the wireless noisy uncorrelated Rayleigh fading channel

In Tab.5,the metrics of the received decrypted audio signal quality are tabulated.These metrics demonstrate the suitability of this enhanced multiple secret keys-based audio cryptosystem for securing the audio signals transmission over the wireless uncorrelated Rayleigh fading channel.Hence,this high-level audio security tool can achieve reliable wireless links to transmit highsensitive audio signals.The DWT transform technique achieves good decrypted audio quality compared to the other utilized methods.The presented secured model for sensitive speech calls or audio signals transmitted over the wireless uncorrelated Rayleigh fading channel is applicable and can provide combined layers of security due to the secret key enlarging and security-enhancing utilizing the chaotic baker map.

Figure 4:LLR vs. SNR for the enhanced multiple secret keys-based audio cryptosystem over the wireless noisy uncorrelated Rayleigh fading channel

5 Conclusions

This paper presents an efficient model for guaranteed audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel.Also,the performance of the utilized enhanced multiple secret keys-based audio cryptosystem is analyzed with different transform domains like DCT,DST and DWT using chaotic baker map and multiple secret keys.Simulation results show consistent results with the wireless uncorrelated Rayleigh fading channel.The DWT-based enhanced multiple secret keys-based audio cryptosystem outperforms better than the DCT and DST-based systems.Also,the decrypted audio signal quality is improved with the DWT.The achieved results proved the applicability of the enhanced multiple secret keys-based audio cryptosystem for transmitting sensitive speech calls or audio signals over the wireless uncorrelated Rayleigh fading channel.

Acknowledgement: This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project number (TURSP-2020/08),Taif University,Taif,Saudi Arabia.

Funding Statement: This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project number (TURSP-2020/08),Taif University,Taif,Saudi Arabia.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 免费在线成人网| 久操线在视频在线观看| 国产综合无码一区二区色蜜蜜| 91精品免费高清在线| 国产麻豆aⅴ精品无码| 久久久精品无码一区二区三区| 国产精品自在线天天看片| 国产在线精品人成导航| 亚洲日韩精品欧美中文字幕| 99久视频| 狠狠色香婷婷久久亚洲精品| 国产高清在线精品一区二区三区| 五月丁香伊人啪啪手机免费观看| 偷拍久久网| 国产精品久久国产精麻豆99网站| 日韩欧美中文| 5555国产在线观看| 2021国产乱人伦在线播放| 亚洲视屏在线观看| 国产特级毛片aaaaaaa高清| 性欧美在线| 大香伊人久久| 亚洲AV永久无码精品古装片| 精品久久蜜桃| 国产成人1024精品下载| 国产精品亚洲一区二区三区在线观看| 国产原创演绎剧情有字幕的| 国产成人做受免费视频| 97色婷婷成人综合在线观看| 成人小视频在线观看免费| 亚州AV秘 一区二区三区| a欧美在线| 一级不卡毛片| 国产无码精品在线| 国产噜噜噜| 色噜噜综合网| 国产成人欧美| 日韩黄色在线| 亚洲第一av网站| 一级毛片在线免费视频| 亚洲一区波多野结衣二区三区| 色综合婷婷| jizz国产视频| 欧美午夜小视频| 国产爽歪歪免费视频在线观看| 亚洲色偷偷偷鲁综合| 国产主播福利在线观看| 91网址在线播放| 中文字幕日韩久久综合影院| 亚洲一区二区三区香蕉| 69av在线| 精品在线免费播放| 国产精品三级专区| 中文字幕人成人乱码亚洲电影| 亚洲欧美日韩中文字幕一区二区三区| 国产一区二区福利| 中国毛片网| 国产91特黄特色A级毛片| 伊人AV天堂| 亚洲精品成人片在线观看 | 青青操国产视频| 激情无码视频在线看| 国产成人综合亚洲欧美在| 国产91九色在线播放| 欧美日韩综合网| 欧美精品在线观看视频| 在线观看免费AV网| 成人免费一级片| 国产国模一区二区三区四区| 日韩一级毛一欧美一国产| 国产日韩精品欧美一区喷| 在线观看91精品国产剧情免费| 18黑白丝水手服自慰喷水网站| 8090午夜无码专区| 99热免费在线| 欧美不卡在线视频| 午夜性刺激在线观看免费| 毛片卡一卡二| 久久久久国产精品免费免费不卡| 奇米影视狠狠精品7777| 亚洲大学生视频在线播放| 精品国产自|