999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Secure Audio Transmission Over Wireless Uncorrelated Rayleigh Fading Channel

2022-11-09 08:16:36OsamaFaragallahFaroukHalaElsayedandMohsenElbendary
Computers Materials&Continua 2022年1期

Osama S.Faragallah,M.Farouk,Hala S.El-sayed and Mohsen A.M.El-bendary

1Department of Information Technology,College of Computers and Information Technology,Taif University,P.O.Box 11099,Taif,21944,Saudi Arabia

2Department of Computer Science and Engineering,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

3Department of Electrical Engineering,Faculty of Engineering,Menoufia University,Shebin El-Kom,32511,Egypt

4Department of Electronics Technology,Faculty of Technology and Education,Helwan University,Cairo,Egypt

Abstract: Audio communications and computer networking play essential roles in our daily lives,including many domains with different scopes.Developments in these technologies are quick.In consequence,there is a dire need to secure these technologies up to date.This paper presents an efficient model for secure audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel.Also,the performance of the utilized multiple secret keys-based audio cryptosystem is analyzed in different transformation domains.The discrete cosine transform (DCT),the discrete sine transform(DST),and the discrete wavelet transform (DWT) are investigated in the utilized multiple secret key-based audio cryptosystem.Simulationresults show consistent results with the wireless noisy channel.The performance of the proposed multiple secret keys-based audio cryptosystem can be ranked concerning the employed domain as DWT,DCT,and DST transform techniques.The simulation experiments proved that the presented multiple secret keysbased audio cryptosystem for audio signals transmitted over the wireless noisy uncorrelated Rayleigh fading channel achieves reliable and secure wireless link utilizing combined multi security layers.

Keywords: Audio communications;encryption;uncorrelated Rayleigh fading channel

1 Introduction

Audio communications have a pivotal role in our daily life,covering many domains like cell phone,military applications,electronic learning,online banking,social networks,landline phone conversation,and chatting conversation programs.Therefore,audio calls are widely utilized in our daily life,especially with audio cryptosystem calls.Essentially,any audio cryptosystem requires audio data to be transmitted in a non-clear form or encrypted form using a robust encryption algorithm.Otherwise,the audio cryptosystem cannot guarantee enough security against eavesdropping during the communication process.Moreover,it is mandatory to cancel and eliminate any residual intelligibility in the ciphered audio data to ensure sufficient protection against eavesdropping during audio communications [1-4].

As the cryptanalysis tools and activities have increased,it is crucial to encrypt audio files during the communication process through all known communication channels like the public telephone network,wireless network,radio communications and Internet calls.Any successful audio cryptosystem should own a strong encryption algorithm against attacks and eavesdroppers.Therefore,scientific research must focus on security enhancements for audio cryptosystems.They should quickly enhance the security of audio cryptosystems because of two reasons.First,there is rapid development in cryptanalysis and eavesdroppers’techniques.Second,there is a rapid increase in audio communication usage in a wide variety of daily lives [5-8].

Due to the wide-spreading of different wireless networks,security issues became vital to combat the various attacks.Several audio signals are susceptible,and they must be protected and secured from any attacks.Also,a communication system cannot give the required security level against hackers during communications,especially if the audio data over wireless channels is clear or not encrypted [7].It is usually receivable for any unauthorized eavesdropper.For ensuring a high-security degree,efficient audio encryption/decryption techniques are required [8].

The secured wireless transmission model for sensitive audio signals is presented in this paper.Furthermore,the performance of the enhanced multiple secret keys-based audio cryptosystem is analyzed using different metrics over the wireless uncorrelated fading channel to prove its applicability with varying kinds of noises.

The paper rest has been organized as follows: the overview of the related work is presented in section 2.In section 3,the enhanced multiple secret keys-based audio cryptosystem description based on enhanced multiple key is presented.The computer simulation experiments for the enhanced multiple secret keys-based audio cryptosystem are explored in section 4.Finally,the conclusion is given in section 5.

2 Related Works

The recent presented audio security techniques have been discussed in this section.The audio security techniques include encryption tools,secret key based methods and data hiding based security techniques.The audio cryptosystems can be categorized into analog cryptosystems and digital cryptosystems.The analog methods of audio encryption can be categorized into timedomain (TD) methods and frequency domain methods like DCT,DST,and DWT [9-19].The second type of audio cryptosystem is the digital cryptosystems.There are two examples of digital audio cryptosystems: the traditional Advanced Encryption Standard (AES) and the chaotic encryption using baker map-based techniques [20-23].

The chaotic baker map is used in 2019 as an efficient data randomizing tool for enhancing the error performance of low complex convolutional codes [24].The chaotic baker map is employed in this presented research to improve the multiple secret keys audio cryptosystem.Although the problems of audio signals protection over the commercial channel have been discussed in [25],this research work proposed an efficient method for encrypting the speech using the variable-length encoding and the collatz conjecture.This speech encryption approach has a larger keyspace and significantly higher key sensitivity.Several metrics are considered for studying the performance of this proposed audio security technique,such as the computational cost,key sensitivity and security keyspace size [25].

The data hiding concept is presented as a tool for protecting the audio signal in [26].The authors in this research work proposed the watermarking technique to secure the audio signals.The DWT and singular value decomposition (SVD) techniques have been utilized in the proposed watermarking scheme;this proposed decentralized watermarking works based on distributing the audio signal watermark into the corners of the host signals for enhancing the robustness of this decentralized watermarking technique [26].Furthermore,based on the LSB algorithm in [27],the steganography technique is proposed for image embedding into audio files.This approach contains two processes,the compression and encryption process of the image by the GMPR technique.Examples of data hiding techniques utilized as a tool for image and audio security have been presented in several research papers [26-28].

3 Enhanced Multiple Secret Keys-Based Audio Cryptosystem

The enhanced multiple secret keys-based audio cryptosystemis a combined encryption algorithm utilizing the baker map within the frequency domains.The permutation process increases the confusion of the presented multiple secret keys-based audio cryptosystem.Therefore,this research paper has utilized different transform techniques to test their performance within the presented multiple secret keys-based audio cryptosystem over the wireless uncorrelated Rayleigh fading channel.The enhanced multiple secret keys-based audio cryptosystem employs different transform domains like DCT,DST,and DWT.

3.1 Encryption Algorithm

In the following,the steps of the encryption algorithm of the enhanced multiple secret keysbased audio cryptosystem are presented.

Round 1: Framing and reshaping the audio signal from a 1D block into 2D blocks.

Round 2: Mask generation using the secret key;this is an essential step to modify the remaining non-permutated parts of the audio signal and enhance the security of the enhanced multiple secret keys-based audio cryptosystem.The mask is generated as follows:

The square matrix of size equal to the secret key size is filled with zero values.The first number of rows is equivalent to the number of sub-keys in the private key,filled with a value of 1.Zeros and ones masks are formed using the chaotic baker map permutations.This mask is combined with every audio block signal after reformatting to fill the silent periods of the audio signal and offer immunity against known-plaintext attacks.

Round 3: Permutation and substitution;the permutation utilizes the chaotic baker map to rearrange audio sample data in the audio matrix.

For each separate test,repeat permutation a number of rounds equals 3,5 and 7.Then,permutation is followed by substitution to alter the remaining non-shuffled portions of the audio signal and increase the cryptosystem’s security.Finally,the mask is added to the original audio signal in the encryption algorithm and subtracted in the decryption algorithm.

Round 4: Apply discrete transforms followed by permutation and then substitution;finally,apply the inverse of discrete transforms.

The main idea of employing the DCT,DST and DWT [29-31] is to increase diffusion and change the values of 1 introduced by masking in silent periods (all-zero blocks).Another shuffling operation is employed in the DCT,DST or DWT for the audio samples to improve the confusion and enhance the security before employing the inverse of the employed transform.This is followed by a substitution step,which changes the audio samples by combining their values to the mask’s value.Finally,this step is followed by applying the inverse of transform domain IDCT,IDST or IDWT.

Round 5: Permutation using baker map is repeated a number of rounds equals 3,5 and 7.

Round 6: Reshaping into a 1D format save audio data into a file.The output is the encrypted audio version.

3.2 Decryption Algorithm

In the following,the steps of the decryption algorithm of the enhanced multiple secret keysbased audio cryptosystem are presented.

Round 1: Mask generation using the secret key and baker map.

Round 2: Framing and reshaping into 2D blocks to form a readable format.

Round 3: Employ the inverse of permutation using the inverse of baker map.For each separate experiment,repeat this round a number of rounds equals 3,5 and 7.

Round 4: Apply discrete transforms followed by the inverse of substitution and then the inverse of substitution;finally,apply the inverse of discrete transforms.

Round 5: Employ the inverse of substitution and the inverse of permutation.The inverse of substitution utilizes a subtract mask.The inverse of permutation employs the inverse of baker map with repeating the inverse permutation a number of rounds equals 3,5 and 7.

Round 6: Reshaping into a 1D format save audio data into a file.The output is the decrypted audio version.

The encryption and decryption algorithms steps have been described in the above sections of the enhanced multiple secret keys-based audio cryptosystem.This enhanced multiple secret keys-based audio cryptosystem works using substitution and permutation of audio blocks using multiple secret keys in frequency domains.In addition,the enhanced multiple secret keys-based audio cryptosystem is based on utilizing the fifth private key created from the enhanced audio cryptosystem’s original secret key.This adds another security layer for the enhanced multiple secret keys-based audio cryptosystem and enlarges the keyspace.Simulation experiments demonstrated that these modifications enhance the security of the audio transmission over the wireless uncorrelated fading channel.Therefore,the enhanced multiple secret keys-based audio cryptosystem is suitable for sensitive and classified phone calls.However,these enhancements are at the cost of increasing the time taken to execute the enhanced multiple secret keys-based audio cryptosystem.

The presented audio cryptosystem adds another security layer by enlarging the secret keyspace.This is done by increasing the number of private keys used to five keys instead of only four keys by generating the fifth key (key 5).The size of key 5 equals one half the size of key 2.Also,mask four is developed to be handled with operations of key 4.

3.3 The Evaluating Model of the Enhanced Multiple Secret Keys-Based Audio Cryptosystem

In this section,the evaluating model of the presented enhanced multiple secret keys-based audio cryptosystem have been introduced.This model processes the audio files for performing the encryption process at the transmitter side as shown in Fig.1.Also,it shows the operation of the encrypted audio file and the decryption process,as shown in Fig.1 for decrypting the encrypted audio signal.The Rayleigh fading channel is utilized to test the performance of the presented audio cryptosystem and evaluate the quality of the received decrypted audio file.The encrypted audio signal is prepared to send over the wireless uncorrelated Rayleigh fading channel through the following three steps: a-transmission process,b-segmentation to packets,and c-modulation.In Fig.1,the proposed secured audio communication model is designed for testing the multiple secret keys-based audio cryptosystem over the wireless uncorrelated Rayleigh fading channel.This model has been designed for evaluating the performance of the enhanced multiple secret keys-based audio cryptosystem for securing the audio signals transmission in a free and open environment.This environment is represented in this proposed model of secure audio transmission by the wireless uncorrelated Rayleigh fading channel.In the simulation section,the presented guaranteed audio wireless transmission parameters are presented.These parameters are the length of the small packets,“transmitted packet length”,the channel conditions simulation“SNR Values”,the modulation and the utilized wireless communication channel.

4 The Computer Simulation Experiments

Several experiments are devoted to test and evaluate the effect of noise using uncorrelated fading channel on the received decrypted audio signal after passing through a wireless medium,with different SNR noise levels and at the same time re-run tests with the error-free channel.For evaluating the algorithms’performance,many metrics utilized,such as the spectral distortion(SD),Log-Likelihood Ratio (LLR),and the correlation coefficient (CC).There are two groups of experiments;the first experiment group tests the enhanced multiple secret keys-based audio cryptosystem concerning the different transform domains.The second experiment group tests evaluate the presented multiple secret keys-based audio cryptosystem as a security tool for securing the transmitted speech or audio signals over the wireless uncorrelated Rayleigh fading channel communication.The simulation setting parameters of the secured transmission model of the audio signals are presented in Tab.1.

4.1 Uncorrelated Rayleigh Fading Channel Experiments Group

In this group of experiments,the enhanced multiple secret keys-based audio cryptosystem is tested over wireless uncorrelated Rayleigh fading channel with error-free and various SNR values using the different transform domains.

4.1.1 DCT Analysis

For decryption and according to the employed security metrics shown in Tab.2 for CC,SD and LLR,the best performance of the enhanced multiple secret keys-based audio cryptosystemis achieved with SNR equals 35 dB,while the worst performance of the enhanced multiple secret keys-based audio cryptosystem is obtained with SNR equals 0 dB.This is generally expected as the noise level becomes lowest with the value of 35 dB and,as a result,better quality for the decrypted audio signal.Furthermore,it is shown from Tab.2 that the enhanced multiple secret keys-based audio cryptosystem shows improved values of CC,SD and LLR with increasing the SNR of the uncorrelated Rayleigh fading channel.

4.1.2 DST Analysis

For decryption,according to employed security metrics shown in Tab.3 for CC,SD and LLR,the best performance of the enhanced multiple secret keys-based audio cryptosystem is achieved with SNR equals 35,while the worst performance of the enhanced multiple secret keys-based audio cryptosystem is obtained with SNR equals 0 dB.This is usually expected as the noise level becomes lowest with a value of 35 dB and,as a result,better quality for the decrypted audio signal.This is generally expected as the noise level becomes lowest with a value of 35 dB and,as a result,better quality for the decrypted audio signal.It is shown from Tab.3 that the performance of the enhanced multiple secret keys-based audio cryptosystem shows improved values of CC,SD and LLR with increasing the SNR of the uncorrelated Rayleigh fading channel.On the other hand,it is delivered from Tab.3 that the DST-based enhanced multiple secret keys-based audio cryptosystem performs worse than the DCT-based enhanced multiple secret keys-based audio cryptosystem.Also,the received decrypted audio signal quality is lower than the DCT domain.Hence,these tabulated results demonstrate that the DCT transform achieves better performance over the uncorrelated Rayleigh fading channel than the DST transform.

Figure 1:The encryption and decryption steps of the enhanced multiple secret keys-based audio cryptosystem model for performance evaluating over wireless uncorrelated Rayleigh fading channel

Table 1:Uncorrelated Rayleigh fading channel setting parameters

Table 2:DCT results with error-free channel and various uncorrelated Rayleigh fading SNR values

Table 3:DST with error-free channel and various uncorrelated Rayleigh fading SNR values

4.1.3 DWT Analysis

The performance evaluation of the enhanced multiple secret keys-based audio cryptosystem utilizing the DWT transform has been presented.The CC,SD and LLR metrics are employed for measuring the quality of encryption and decryption processes of the enhanced multiple secret keys-based audio cryptosystem.In addition,the various uncorrelated Rayleigh fading channel conditions are used through various SNR values.The results tabulated in Tab.4.

Table 4:DWT with error-free channel and various uncorrelated Rayleigh fading SNR values

As shown in Tab.4,the DWT-based enhanced multiple secret keys-based audio cryptosystem performs better than the DCT and DST-based system.Moreover,the decrypted audio signal quality is improved with the DWT.These two previous computer simulation experiments prove the applicability of the enhanced multiple secret keys-based audio cryptosystem for securing the sensitive speech calls or audio files transmission over the wireless uncorrelated Rayleigh fading channel.

4.2 Results Analysis and Comparison

This section presents a comparison and analysis for security and quality metrics in decryption with different SNR values.Tab.5 shows a comparison between the correlation coefficient (CC)values of different transform techniques.Fig.2 shows the values of the CC between the original and received decrypted audio with different transform techniques and various SNR of the uncorrelated Rayleigh fading channel.For CC values,it is shown that the best values exist with the DWT for all SNR values.However,the worst values indicated with the DST for values of SNR equal 0 dB,5 dB,10 dB,15 dB,20 dB,and 25 dB.The worst value indicated with the DCT for SNR equals 25 dB.

Fig.3 shows the values of the SD metric values of the enhanced multiple secret keysbased audio cryptosystem with the different transform techniques and various SNR values of the uncorrelated Rayleigh fading channels.In Fig.3,the SD metrics values are drawn for the previous experiments for encrypted audio using the enhanced multiple secret keys-based audio cryptosystems.As shown from Fig.3,with increasing the SNR values of the wireless uncorrelated Rayleigh fading channel,the quality of the received decrypted audio signal is improved.On the other hand,the DWT transform achieves better metrics values.For SD values,it is shown from Fig.3 that the best values exist with the DWT for all SNR values.However,the worst values are indicated with the DCT and DST for different SNR values.Fig.4 shows the LLR metric values of the enhanced multiple secret keys-based audio cryptosystem with different transform techniques and various SNR values of the uncorrelated Rayleigh fading channel.For LLR values shown in Fig.4,the best values exist with the DWT for SNR values equal 10 dB and 15 dB.The best values exist with the DST for SNR values equal 0 dB and 5 dB.However,the worst values are shown with the DWT for values of SNR equal 0 dB and 5 dB.The worst values exist with the DCT for SNR values equal 10 dB and 15 dB.The different metrics values are collected in Tab.5.This table tabulates the values of the experiments using different transform techniques.

Table 5:Metrics values of different techniques over the wireless noisy uncorrelated Rayleigh fading channel with SNR variations for original and decrypted version

Figure 2:CC vs. SNR for the enhanced multiple secret keys-based audio cryptosystem over the wireless noisy uncorrelated Rayleigh fading channel

Figure 3:SD vs. SNR for the enhanced multiple secret keys-based audio cryptosystem over the wireless noisy uncorrelated Rayleigh fading channel

In Tab.5,the metrics of the received decrypted audio signal quality are tabulated.These metrics demonstrate the suitability of this enhanced multiple secret keys-based audio cryptosystem for securing the audio signals transmission over the wireless uncorrelated Rayleigh fading channel.Hence,this high-level audio security tool can achieve reliable wireless links to transmit highsensitive audio signals.The DWT transform technique achieves good decrypted audio quality compared to the other utilized methods.The presented secured model for sensitive speech calls or audio signals transmitted over the wireless uncorrelated Rayleigh fading channel is applicable and can provide combined layers of security due to the secret key enlarging and security-enhancing utilizing the chaotic baker map.

Figure 4:LLR vs. SNR for the enhanced multiple secret keys-based audio cryptosystem over the wireless noisy uncorrelated Rayleigh fading channel

5 Conclusions

This paper presents an efficient model for guaranteed audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel.Also,the performance of the utilized enhanced multiple secret keys-based audio cryptosystem is analyzed with different transform domains like DCT,DST and DWT using chaotic baker map and multiple secret keys.Simulation results show consistent results with the wireless uncorrelated Rayleigh fading channel.The DWT-based enhanced multiple secret keys-based audio cryptosystem outperforms better than the DCT and DST-based systems.Also,the decrypted audio signal quality is improved with the DWT.The achieved results proved the applicability of the enhanced multiple secret keys-based audio cryptosystem for transmitting sensitive speech calls or audio signals over the wireless uncorrelated Rayleigh fading channel.

Acknowledgement: This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project number (TURSP-2020/08),Taif University,Taif,Saudi Arabia.

Funding Statement: This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project number (TURSP-2020/08),Taif University,Taif,Saudi Arabia.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 国产日韩久久久久无码精品| 极品国产一区二区三区| 国产18页| 午夜a视频| 久青草免费在线视频| 久久国产成人精品国产成人亚洲| 国产乱子伦一区二区=| 日韩精品亚洲一区中文字幕| 国产精品视频白浆免费视频| 国产精品无码在线看| 男人天堂亚洲天堂| 久久窝窝国产精品午夜看片| 一本大道东京热无码av| 久草视频精品| 国产高清在线精品一区二区三区 | 91精品国产综合久久香蕉922| 免费视频在线2021入口| 亚洲黄色激情网站| 久久无码av三级| 国产香蕉97碰碰视频VA碰碰看| 国产精品久线在线观看| 被公侵犯人妻少妇一区二区三区| 国产99欧美精品久久精品久久| 无码有码中文字幕| 国产91成人| 国产人碰人摸人爱免费视频| 久久精品娱乐亚洲领先| 丝袜高跟美脚国产1区| 国产美女91呻吟求| 欧美日韩中文国产| 99久久精品免费观看国产| 青青操国产| 亚洲国产第一区二区香蕉| 六月婷婷激情综合| 国产成人高清亚洲一区久久| 亚洲中文制服丝袜欧美精品| 欧美第二区| 天天婬欲婬香婬色婬视频播放| 青草免费在线观看| 欧美不卡二区| 精品伊人久久久久7777人| 久久久久亚洲AV成人人电影软件| www.亚洲一区二区三区| 欧美一级片在线| 国产老女人精品免费视频| 极品国产在线| 91精品啪在线观看国产91| 操国产美女| 色亚洲成人| 日本成人一区| 欧美视频在线第一页| 2018日日摸夜夜添狠狠躁| 午夜在线不卡| 99久久精品久久久久久婷婷| 少妇被粗大的猛烈进出免费视频| 欧美性久久久久| 白浆免费视频国产精品视频| 欧美日韩国产综合视频在线观看 | 天天综合网色| 在线看免费无码av天堂的| 亚洲综合精品第一页| 乱人伦视频中文字幕在线| 亚洲天堂网在线视频| 亚洲精品成人福利在线电影| 亚洲中文久久精品无玛| 欧美成人午夜视频| 欧美日韩精品一区二区视频| 亚洲欧洲国产成人综合不卡| 国产成人精品午夜视频'| 国产第一福利影院| 色婷婷亚洲十月十月色天| 久热中文字幕在线| 狠狠做深爱婷婷久久一区| 亚洲第一在线播放| 熟妇无码人妻| 91成人精品视频| 内射人妻无码色AV天堂| 无码一区18禁| 91成人精品视频| 天天综合网亚洲网站| 国产免费人成视频网| 久久99热66这里只有精品一|