Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A detailed study of speech signal cryptography using simple put _operation and get_operation
Author(s):
1. Nasser Abdellatif: Department of Electrical Engineering, Applied Science Private University, Amman, Jordan; Department of Electrical Engineering, Middle East University, Amman, Jordan
2. Adnan Manasreh: Department of Electrical Engineering, Applied Science Private University, Amman, Jordan; Department of Electrical Engineering, Middle East University, Amman, Jordan
3. Ziad A. Alqadi: Department of Computer Engineering, Faculty of Engineering Technology, AL-Balqa Applied University Amman,,Jordan
4. Mohammad S. Khrisat: Department of Computer Engineering, Faculty of Engineering Technology, AL-Balqa Applied University Amman,,Jordan
5. Maryam Akhozahieh: Department of Electrical Engineering, Applied Science Private University, Amman, Jordan; Department of Electrical Engineering, Middle East University, Amman, Jordan
6. Dmitry Manasreh: Center for Smart, Sustainable and Resilient Infrastructure (CSSRI), University of Cincinnati,Ohio,USA
Abstract:
Protecting digital speech files is an important issue. In this paper's research, a simplified method of speech file cryptography will be provided, and the encryption and decryption functions will require a reduced number of operations. The encryption function will perform a put_operation to reorder the speech sample to get the encrypted file, while the decryption function will perform a get_operation to reorder the encrypted samples to get the decrypted speech file; these operations will be implemented based on the generated secret indices key. The Put and get operations will affect the speech file by recording the samples keeping the histograms of the speech files (source, encrypted, and decrypted) the same and without any changes. The secret key generation phase will be analyzed for efficiency purposes, and two methods will be presented: The first one will use the chaotic logistic map model to generate the secret indices key, while the second method will use a selected secret image to generate the secret indices key, both methods will be tested and examined to give some recommendations for the users. Each of the introduced methods will provide a high level of security, the private keys will provide a huge key space and they will be very sensitive to resist any hacking attacks. The quality, sensitivity, security, and speed of the proposed methods will be examined, the method will be tested and implemented, and the obtained results will be analyzed to prove the achievements provided by the proposed method.
Page(s): 2576-2590
DOI: DOI not available
Published: Journal: ARPN Journal of Engineering and Applied Sciences, Volume: 18, Issue: 23, Year: 2023
Keywords:
Security , sensitivity , cryptography , Quality , speech , CLMM , speedup , getoperation , putoperation , SIK , PK
References:
[1] Mahmood K.,Ibrahem K. .2017 .Implementation of VoIP Speech Encryption System Using Stream Cipher with Lorenz map Key Generator. International Journal of Scientific & Engineering Research, 8(7) : .
[2] M. M. R. A. G. P. G. Alvarez F. .2000 .Cryptanalysis of a chaotic encryption system. Physics Letters, 276(1) : 1-13.
[3] Hato A. D. S. Eman .2015 .Lorenz and Rossler Chaotic System for Speech Signal Encryption. International Journal of Computer Applications, 128(11) : 25-33.
[4] Abu-Faraj M.,Al-Hyari A.,Aldebei K.,Al-Ahmad B.,Alqadi Z. .2022 .Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography. IEEE Access, 3187317 : 69388-69397.
[5] Abu-Faraj M.,Al-Hyari A.,I. A.,Alqadi Z.,Abu-Faraj M.,Al-Hyari A.,Alqadi Z. .2022 .CASDC: A Cryptographically Secure Data System Based on Two Private Key Images. IEEE Access, 32263 : 126304-126314.
[6] .2022 .Experimental Analysis of Methods Used to Solve Linear Regression Models. Materials & Continua, 027364(3) : 5699-5712.
[7] Abu-Faraj M.,Al-Hyari A.,Alqadi Z. .2022 .Complex Matrix Private Key to Enhance the Security Level of Image Cryptography. , 14(4) : 664-678.
[8] Abu-Faraj M.,Aldebei K.,Alqadi Z. .2022 .. Highly Secure, and Multiple Purposed Method on Data Cryptography. Traitement du Signal, 39(1) : 173-178.
[9] Abu-Faraj M.,Zubi M. .2020 .Analysis and Implementation of Kidney Stones Detection by Applying Segmentation Techniques on Computerized Tomography Scans. Italian Journal of Pure and Applied Mathematics, 43 : 590-602.
[10] Abu-Faraj M.,Alqadi Z.,Zubi M. .2022 .Creating Color Image Features Based on Morphology Image Processing. Traitement du Signal, 39(3) : 797-803.
[11] Abu-Faraj M.,Alqadi Z.,Al-Ahmad B.,Aldebei K.,Ali B. .2022 .A Novel Approach to Extract Color Image Features using Image Thinning. Applied Mathematics & Information Sciences (AMIS), 16(5) : 665-672.
[12] Abu-Faraj M.,Al-Hyari A.,Al-Ahmad B.,Alqadi Z.,Ali B.,Alhaj A. .2022 .Building a Secure Image Cryptography System using Parallel Processing and Complicated Dynamic Length Private Key. Applied Mathematics & Information Sciences (AMIS), 16(6) : 1017-1026.
[13] Abu-Faraj M.,Al-Hyari A.,Alqadi Z.,Ali B. .2023 .Increasing the Security of Transmitted Text Messages Using Chaotic Key and Image Key Cryptography. International Journal of Data and Network Science, 1(1) : 1-12.
[14] Abu-Faraj M.,Al-Hyari A.,Al-Ahmad B.,Alqadi Z.,Ali B.,Aldebe K. .2023 .Improving the Efficiency of Median Filters Using Two Rounds of Generated Windows Processing. Applied Mathematics & Information Sciences (AMIS), 17(1) : 187-200.
[15] Prof .2023 .Digital Image Cryptography using Index Keys. International Journal of Computer Science and Mobile Computing, 12(2) : 26-37.
[16] Hatim Zaini,Alqadi Ziad .2023 .Long Messages Segmentation for Efficient Message Cryptography. , 12(1) : 59-69.
[17] Ziad A.,Alqadi A. .2023 .Improving Data Standard Methods of Cryptography. ARPN Journal of Engineering and Applied Sciences, 17(24) : 2077-2088.
[18] Abdullah N.,Olimat Ali F.,Al-Shawabkeh Ali F.,Al-Qadi Ali F.,Al-Najdawi Ali F. .2023 .Experimental study and computational approach prediction on thermal performance of eutectic salt inside a latent heat storage prototype. Thermal Science and Engineering Progress, 37 : 101606.
[19] Alqadi Z. A.,Ibrahiem M. M. El Emary Z. A. .2008 .Performance analysis and evaluation of parallel matrix multiplication algorithms. World Applied Sciences Journal. 5, (2) : 211-214.
[20] Al-Rawashdeh Ayman .2018 .Using wave equation to extract digital signal features. , 8(4) : 1356-1359.
[21] Ziad Alqadi .2019 .Enhancing the Capacity of LSB Method by Introducing LSB2Z Method. International Journal of Computer Science and Mobile Computing, 8(3) : 76-90.
[22] Ziad A.,Alqadi A.,Al-Dwairi A. .2010 .Optimized TrueRGB color Image Processing. World Applied Sciences Journal, 4952(10) : 1175-1182.
[23] Waheeb A.,Ziad AlQadi A. .2009 .Gray image reconstruction. Eur. J. Sci. Res, 27 : 167-173.
[24] Moustafa A. A.,Image Reconstruction Using a New R'G'I Model Z. A. Alqadi. 2009. Color . .. Journal of Computer Science, 5(4) : 250-254.
[25] Matrouk K.,Al-Hasanat A.,Alasha'ary H.,Al-Qadi Al-Shalabi Z. .2014 .Speech fingerprint to identify isolated word person. World Applied Sciences Journal, 31(10) : 1767-1771.
[26] Al-Azzeh J.,Zahran B.,Alqadi Z.,Ayyoub B.,Abu-Zaher M. .2018 .A Novel zero-error method to create a secret tag for an image. Journal of Theoretical and Applied Information Technology, 96(13) : 4081-4091.
[27] Prof. Ziad A. A. Alqadi ,Prof. Mohammed K. Abu Zalata ,Ghazi M.,Qaryouti M. .2016 .Comparative Analysis of Color Image Steganography. JCSMC, 5(11) : 37-43.
[28] Bilal Zahran .2016 .A Comparison between Parallel and Segmentation Methods Used For Image EncryptionDecryption. International Journal of Computer Science & Information Technology (IJCSIT), 8(5) : .
[29] Alqadi Z. A.,Abu-Jazar A. .2005 .Analysis of Program Methods Used for Optimizing Matrix Multiplication. Journal of Engineering, 15(1) : 73-78.
[30] . .. International Journal of Computer Science and Mobile Computing, 8(3) : 14-26.
[31] Al-Azzeh Jamil,Mesleh Muhammed .2019 .A Novel Based on Image Blocking Method to Encrypt-Decrypt Color. International Journal on Informatics Visualization, 3 : .
[32] Zahran B.,AL-Azzeh J.,Qadi Z. Al,Zoghoul M. Al,Khawatreh S. .2018 .A Modified Lbp Method to Extract Features from Color Images. Journal of Theoretical and Applied Information Technology (JATIT), 96(10) : .
[33] Al-Azzeh J.,Zahran B.,Alqadi Z.,Ayyoub B.,Abu-Zaher M. .2018 .A novel Zero-error Method to Create a Secret Tag for an Image. Journal of Theoretical and Applied Information Technology (JATIT), 96(13) : 4081-4091.
[34] Al-Azzeh J.,Zahran B.,Alqadi Z. .2018 .Salt and Pepper Noise: Effects and Removal. International Journal on Informatics Visualization, 2(4) : 252-256.
[35] Jihad Nader,Zahran Bilal .2017 .Analysis of Color Image Filtering Methods. International Journal of Computer Applications (IJCA), 174(8) : 12-17.
[36] Ziad Alqadi,Nader Jihad .2017 .Estimation and Tuning of FIR Low pass Digital Filter Parameters. International Journal of Advanced Research in Computer Science and Software Engineering, 7(2) : 18-23.
[37] Dr .2022 .Highly Secure Method for Secret Data Transmission. International Journal of Scientific Engineering and Science, 6(1) : 49-55.
[38] Musbah J.,Aqel J. .2018 .RGB color image encryptiondecryption using image segmentation and matrix multiplication. International Journal of Engineering & Technology. 7, (3) : 104-107.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

14

Views