Next Article in Journal
Radiation Properties of Conformal Antennas: The Elliptical Source
Previous Article in Journal
Design of a 41.14–48.11 GHz Triple Frequency Based VCO
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture

Department of Computer Informatics, Faculty of Mathematics and Computer Science, Konstantin Preslavsky University of Shumen, 9700 Shumen, Bulgaria
Electronics 2019, 8(5), 530; https://doi.org/10.3390/electronics8050530
Submission received: 7 April 2019 / Revised: 4 May 2019 / Accepted: 6 May 2019 / Published: 11 May 2019
(This article belongs to the Section Computer Science & Engineering)

Abstract

:
In this paper, a new cryptographic method is proposed, designed for audio files’ security. The encryption algorithm is based on classic symmetric models using pseudo-random number generator composed with chaotic circle map and modified rotation equations. The scheme of a new pseudo-random generator is presented and used as basis for chaotic bit-level permutations and substitutions applied to audio files structure for successful encryption. The audio encryption and decryption algorithms are described and explained. Proving the high level of security we provide extensive cryptographic analysis including key sensitivity analysis, key-space analysis, waveform and spectrogram analysis, correlation analysis, number of sample change rate analysis, level of noise analysis and speed performance test.

1. Introduction

The cryptography in general is an art of secret transferring information from sender to receiver or a group of receivers. The modern technologies changed the way information is being sent simply because the information is now digital in a form of bits transferred in computer networks around the world. This factor requires standard cryptography algorithms used before digital ages to be applied and/or modernized to work with digital information. In this paper, we present a new method for encryption designed for audio files security in order to safely store and transfer this specific type of files. The other important aspect of cryptology is the cryptographic analysis with the main purpose to reveal the encrypted messages. The cryptographic analysis often uses different kind of empirical experiments that can be used to establish if any proposed algorithm has the necessary level of security or to prove that the algorithm is not secure enough. In this paper, we provide extensive cryptographic analysis for confirming the level of security of the proposed audio encryption scheme.
Previous research in this area has shown that the use of chaotic maps for construction audio encryption algorithms leads to high levels of security. In [1] Liu, Kadir and Li proposed encryption scheme using confusion and diffusion based on multi-scroll chaotic system. Hato and Shihab performed evaluation of Lorenz and Rossler chaotic system for speech signal encryption in [2]. More valuable research is presented in [3], where Sathiyamurthi and Ramakrishnan used Bernoulli’s chaotic map for constructing encryption algorithm. Tamimi and Abdalla provide one more similar approach for audio shuffle-encryption algorithm in [4].
Important research [5] demonstrates that using a single chaotic map is not always a guarantee for highest levels of cryptographic security. The research overviews how encryption algorithms, using Arnold’s Cat Map, Baker’s Map or Two-Dimensional Logistic Chaotic Map may be vulnerable. This is one of the reasons we are using combination of two chaotic maps in order to extend the key-space (all the possible values for secret keys) for additional cryptographic security.
Considering the previous experience in this area we constructed a novel audio encryption algorithm with permutation-substitution architecture and compared the results with other algorithms.

2. Pseudo-Random Generator Based on Circle Map and Modified Rotation Equations

The pseudo-random generators (PRG) are software designed tools designed to provide endless sequence of random bits. PRGs are often used as main resource for symmetric cryptographic algorithms by using the random bits for encryption and decryption of digital files. Chaotic maps are widely preferred for constructing pseudo-random generators because of their chaotic behavior [6,7,8].

2.1. Circle Map

The Circle map is one dimensional dynamical system often used in cryptography because of its chaotic behavior. Examples of PRGs based on circle map are proposed in [9,10]. The iterations of the standard circle map are calculated by:
θ n + 1 = ( θ n + Ω K 2 π sin ( 2 π θ n ) )     mod   1 ,
where Ω is a fixed constant playing the role of polar angle of the sinusoidal oscillator, and K is the coupling strength. The initial values we used for our scheme are: θ 0 = 0.25 , Ω = 0.7128281828459045 , K = 0.5 . The values of the constants are chosen by considering the results of the experiments in our previous work of constructing PRGs based on circle map [9].

2.2. Modified Rotation Equations

A Modified form of rotation equation, presented in [11,12] is rarely used in encryption algorithms, but in our previous work we have determined the good chaotic properties of the Modified rotation equations [13]. The formula we used is given by:
x t + 1 = a ( x t a ) cos θ + y t sin θ / r t y t + 1 = x t r t sin θ y t cos θ r t = 0.5 ( x t 2 + x t 4 + 4 y t 2 ) ,
where the parameters for chaotic behavior are θ = 2 and a = 2.8 . The initial values we used are x 0 = 0.2343214592 and y = 0.742190593 . The plots of 5000 points with the initial values are shown in Figure 1.

2.3. Pseudo-Random Generation Algorithm

The chaotic formulas presented in Section 2.1 and Section 2.2 are used for pseudo-random binary sequence generation by following the next steps:
Step 1:
The initial values θ , Ω and K from Equation (1) are determined.
Step 2:
The initial values θ , a, x 0 and y 0 from Equation (2) are determined.
Step 3:
The two chaotic maps from Equations (1) and (2) are iterated for M times, without extracting any results. This step is for additional security and extending the secret key.
Step 4:
The current iteration of Equation (1) is used for obtaining θ and its decimal value is post-processed as follows:
s i = m o d ( i n t e g e r ( θ i × 10 9 ) ) , 2 )
where i n t e g e r ( x ) returns the integer part of x, truncating the value at the decimal point, and m o d ( x , y ) returns the reminder after division.
Step 5:
The current iteration of Equation (2) is used for obtaining y and its decimal value is post-processed as follows:
j i = m o d ( i n t e g e r ( y i × 10 5 ) ) , 2 )
where i n t e g e r ( x ) returns the integer part of x, truncating the value at the decimal point, and m o d ( x , y ) returns the reminder after division.
Step 6:
Calculated values for s i and j i are combined with XOR operation to get a single output bit.
Step 7:
Return to Step 4 until the necessary bit stream is reached.

2.4. Statistical Results

Using pseudo-random binary streams for cryptographic algorithms requires extended statistical analysis to ensure the randomness of the stream [14,15]. The PRG described in the previous section is tested by generating 1 billion bits and the binary sequence was subjected to the following analysis:

2.4.1. NIST-Test

NIST-Statistical Test Suite [16] is one of the most used software when the PRGs are concern. The NIST package evaluates the randomness by performing 17 tests over given binary sequence. The actual evaluation is made by dividing the 1,000,000,000 bits into 1000 subsequences with 1,000,000 bits. The results for all tests are presented in Table 1.
The minimum pass rate for each statistical test with the exception of the random excursion (variant) test is approximately = 980 for a sample size = 1000 binary sequences. The minimum pass rate for the random excursion (variant) test is approximately = 603 for a sample size = 617 binary sequences. All the NIST tests have p-values in the acceptable range [ 0 , 1 ) indicating that all tests are passed.

2.4.2. DIEHARD-Test

DIEHARD software contains 19 test for randomness and we applied the tests again over the same bitstream of 1,000,000,000 bits provided by our PRG. The acceptable range for passing the individual tests once again is [ 0 , 1 ) for calculated p-values [17]. The results for all tests are presented in Table 2.
All the tests in Table 2 have p-values within the desired range meaning all the tests for randomness are passed.

2.4.3. ENT-Test

The last statistical test software we used for randomness determination is ENT [18]. The tests are 6—Entropy, Optimum compression, χ 2 distribution, Arithmetic mean value, Monte Carlo π estimation, and Serial correlation coefficient. The results are presented in Table 3.

2.4.4. Key Space Analysis

The key space is defined by initial values from Equations (1) and (2) and represents all the possibilities that can be used as a secret key for encryption. The parameters from the equations are not included in key space because their values do not change, so the included variables are θ 0 from Equation (1), x 0 and y 0 from Equation (2) and M from the proposed algorithm. Considering IEEE floating-point standard [19] the precision of 64bits double variables is about 10 15 . In our case we have three double variables so the final key space is about 10 45 2 149 . This is large enough to resist against brute force attack methods [20].

2.4.5. Key Sensitivity Analysis

Key sensitivity test requires using very similar keys and comparing the results of the produced random sequences. To compare the bit streams produced by our PRG we used five different but very similar keys. For the first key (K1) we used the initial values from Section 2.1 and Section 2.2. For the second key (K2)— θ 0 is changed to 0.251, for K3— θ 0 is 0.249, for K4— x 0 is 0.2343214593 and for K5— y 0 is −0.742190594. Figure 2 visually represents the completely different binary sequences produced when the different secret keys are used, even if they are very similar.

3. Audio Encryption Algorithm with Permutation-Substitution Architecture

In this section, we present an audio encryption/decryption algorithm using the presented pseudo-random generator described in Section 2.3 and previous research [21]. Considering the audio file structure our algorithm leaves the header bits intact and process only the audio data part of the files. For further empirical experiment header bits of the audio files are not modified because they contain information about the file size, number of samples, bits per sample etc. The audio data part is divided into samples with digital value representing the actual sound signal. Our scheme processes the samples by shifting the bits in every sample, performing permutation and changing the values of the bits in the sample performing substitution.

3.1. Encryption Algorithm

The audio encryption algorithm consists of the following steps:
Step 1:
The initial values from Equations (1) and (2) are determined then the PRG is iterated M times.
Step 2:
The header bits from plain audio file A are transferred into file A without cryptographic modifications.
Step 3:
The audio data from file A is processed sample by sample.
Step 4:
S bits are extracted from the proposed PRG, where S is the number of bits in the sample. The bits are converted into integer value— S 1
Step 5:
Integer number P is calculated as follows: P = S 1 m o d u l o S .
Step 6:
The bits from current sample are shifted with the obtained value P from the previous step.
Step 7:
The bits in the result sample are modified using XOR operation with the same amount of bits produced by the proposed PRG.
Step 8:
The encrypted sample from Step 7 is transferred into file A .
Step 9:
Repeat Steps 4–8 until end of plain file A is reached.
Step 10:
The produced output file A is the final encrypted audio file.
Figure 3 illustrates the encryption process.

3.2. Decryption Algorithm

The description method needs to consider the linear bits output of the PRG, but the opposite order of the bit-shifting and bit-modification in every sample. The decryption steps are:
Step 1:
The initial values from Equations (1) and (2) are determined then the PRG is iterated M times.
Step 2:
The header bits from encrypted audio file A are transferred into file A without cryptographic modifications.
Step 3:
The audio data from file A is processed sample by sample.
Step 4:
S bits are extracted from the proposed PRG, where S is the number of bits in the sample. The bits are converted into integer value— S 1
Step 5:
Integer number P is calculated as follows: P = S 1 m o d u l o S .
Step 6:
The bits in the result sample are modified using XOR operation with the same amount of bits produced by the proposed PRG.
Step 7:
The bits from current sample are shifted back with the obtained value P from the step 5.
Step 8:
The result sample from Step 7 is transferred into file A .
Step 9:
Repeat Steps 4–8 until end of plain file A is reached.
Step 10:
The produced output file A is the final decrypted audio file.
Figure 4 illustrates the decryption process.
The encryption and the decryption methods are implemented using programming language C++ for further evaluation by performing extended cryptographic analysis presented in the next section.

4. Cryptographic Analysis

The main purpose of the cryptographic analysis is restoring the plain message from the encrypted message. In this section, in order to prove the audio encryption efficiency, we performed various empirical tests to compare plain files and their corresponding encrypted files.

4.1. Waveform Plotting

One of the most common approaches, concerning audio signal analysis is waveform plotting to display the audio signal amplitude distributed in time. To compare the plain audio files with the encrypted ones we present the visualization of one of the tested files. Figure 5a represents the waveform of normal file before encryption, Figure 5b represents the changes in the file after encryption and Figure 5c demonstrates the restored file after decryption.
The difference between the plain file plot and the encrypted file plot is indication of successful encryption. Furthermore, the strong difference also means the original file cannot be restored even partially.

4.2. Spectrogram Plotting

The spectrogram plotting is another important approach for analyzing audio signals. In this case the main focus is the frequency of the sound against time domain. Comparing plain files with encrypted files allows us to see the difference between the files and to evaluate the proposed audio encryption algorithm. Figure 6a shows the spectrogram of plain file, Figure 6b represents the changes in the file after encryption and Figure 6c demonstrates the restored file after decryption. The spectrogram plot of the encrypted file means the frequency of the original signal in the plain file is completely destroyed. This test is another indicator of the high encryption properties of the proposed audio encryption algorithm.

4.3. Histogram Analysis

The histograms are common tool to measure the distribution of values. Evaluating audio signal with histogram diagrams is excellent method to determine the distribution of the samples values in the audio files.
Figure 7a shows the histogram of one of the tested plain files and Figure 7b shows the histogram of the corresponding encrypted file. The distribution of the values in Figure 7b are very close and uniform, indicating strong encryption. The close values, also indicates resistance against attacks.

4.4. Correlation Analysis

Measuring correlation coefficient between two audio files express the dependency between their corresponding sample values. This is another statistical evaluation for testing the quality encryption algorithms. Calculating correlation coefficient determines the level of correlation between two files and the correlation coefficient is always in range [ 1 , 1 ] . Values between |1–0.7| is considered as strong correlation (samples from the plain files are similar to samples from the encrypted file), correlation between |0.7–0.3| is considered as medium correlation and values between |0.3–0| is considered as weak correlation.
Correlation coefficient can be calculated as follows:
r x y = c o v ( x , y ) D ( x ) D ( y ) ,
where
D ( x ) = 1 N i = 1 N ( x i x ¯ ) 2 ,
D ( y ) = 1 N i = 1 N ( y i y ¯ ) 2 ,
c o v ( x , y ) = i = 1 N ( x i x ¯ ) ( y i y ¯ ) ,
N is the total number of samples, x i and y i are the sample values of the plain and encrypted files, x ¯ and y ¯ are the mean values of samples, and finally c o v ( x , y ) is covariance between both files.
Table 4 shows the obtained result values from our tests.
The results in Table 4 indicates values close to zero which means there is no dependence between the two files. The results also mean high quality of the encryption.

4.5. Number of Sample Change Rate

Number of sample change rate (NSCR) is robustness test for establishing the quality of encryption algorithms. The purpose of the test is to compare the corresponding sample values of the original and encrypted audio files and to show the difference in percents. NSCR can be calculated as follows:
N S C R = i = 1 N D i N × 100 % ,
where
D i = 1 , x i y i 0 , O t h e r w i s e
In Equation (4), N is the total number of samples, x i and y i are the corresponding sample values of the plain and encrypted files.
Table 5 shows the obtained result values from our tests.
The results clearly demonstrate the complete difference between the original and encrypted files, indicating high security level of the proposed audio encryption scheme.

4.6. Signal to Noise Ratio

Signal to Noise Ratio (SNR) is widely user to determine the quality of the signals [2,23]. Values grater than 0 dB indicates the clear signal is more than the noise. For this test we need both plain and encrypted audio files and SNR is calculated as follows:
S N R = 10 l o g 10 i = 1 N x i 2 i = 1 N [ x i y i ] ( dB ) ,
where x i and y i are corresponding sample values from audio files, and N is number of samples.
The results from our SNR tests are shown in the next Table 6.
All the obtained values for SNR are negative which means the encrypted files are very noisy and the encryption method completely destroys the clear signal from plain audio files.

4.7. Peak Signal to Noise Ratio

Peak Signal to Noise Ratio (PSNR) is different approach to measure the power of clean signal against the power of noise. PSNR is more applicable for image encryption algorithms, but can be used for testing the quality of the proposed encryption scheme in this paper. PSNR is calculated as follows:
P S N R = 10 log 10 M A X 2 M S E dB ,
where M A X is the maximum possible value of audio stream (In our case the maximum value is 65,535) and M S E is the mean square error between the plain and encrypted file. MSE is defined as:
M S E = 1 N i = 1 N ( x i y i ) 2 ,
where N is the total number of samples, x i and y i are the corresponding sample values of the plain and encrypted files.
Table 7 contains the results of our tests.
All the obtained values for PSNR are close to zero (or below) indicating very high level of noise in the encrypted audio files.

4.8. Encryption/Decryption Key Sensitivity

In Section 2.4.5 we performed key sensitivity test of the PRG used for proposed the audio encryption algorithm in this paper. Analyzing the general behavior of the encryption method we used very similar keys to encrypt and to restore encrypted audio file. The decryption key is obtained by changing a single digit from one of the variables constructing the key space. Key 1 and Key 2 are described in Section 2.4.5.
Both Figure 8 and Figure 9 demonstrate that the decryption is unsuccessful even with very similar secret key. Changing a single digit of the key leads to fail decryption. The experiment is proof of high key sensitivity concerning the proposed audio encryption algorithm.

4.9. Speed Performance

To measure the necessary encryption time we used audio files with different size with hardware configuration—2.40 GHz Intel® Core™ i7-3630QM Dell Inspiron, 8 GB RAM, Windows 7. Table 8 contains the results of our tests.

5. Conclusions

This paper evaluates a new design for audio files encryption algorithm. The proposed cryptographic algorithm relies on permutation-substitution architecture realized by using chaotic circle map and modified rotation equations. Extended cryptographic analysis is performed for testing the proposed method for security. The waveform plots and the spectrograms of the tested audio files demonstrate the changes in encrypted files compared to plain files. The correlation analysis and NSCR tests confirm the high quality of encryption, demonstrating the sample values are completely different in corresponding files. The measured SNR and PSNR values show high levels of noise in the encrypted files, indicating the original signal is destroyed in the encryption process. Key space analysis shows the necessary level of security against brute-force attacks and key sensitivity analysis shows that even minimal change of the secret key leads to unsuccessful decryption. Considering the obtained results during the cryptographic analysis, we can conclude that the proposed algorithm has the necessary cryptographic security for audio files encryption.

Funding

This research received no external funding.

Acknowledgments

The author is grateful to the anonymous referees for valuable and helpful comments. This work is supported by the Scientific research fund of Konstantin Preslavski University of Shumen under the grant No. RD-08-71/29.01.2019 and by European Regional Development Fund and the Operational Program “Science and Education for Smart Growth” under contract UNITe No. BG05M2OP001-1.001-0004-C01 (2018–2023).

Conflicts of Interest

The author declares no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MDPIMultidisciplinary Digital Publishing Institute
MSEMean Square Error
NSCRNumber of sample change rate
PRGPseudo-random generator
PSNRPeak Signal to Noise Ratio
SNRSignal to Noise Ratio

References

  1. Liu, H.; Kadir, A.; Li, Y. Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik 2016, 127, 7431–7438. [Google Scholar] [CrossRef]
  2. Hato, E.; Shihab, D. Lorenz and Rossler Chaotic System for Speech Signal Encryption. Int. J. Comput. Appl. 2015, 128, 09758887. [Google Scholar] [CrossRef]
  3. Sathiyamurthi, P.; Ramakrishnan, S. Speech encryption using chaotic shift keying for secured speech communication. EURASIP J. Audio Speech Music Process. 2017, 2017, 20. [Google Scholar] [CrossRef]
  4. Tamimi, A.A.; Abdalla, A.M. An Audio Shuffle-Encryption Algorithm. In Proceedings of the World Congress on Engineering and Computer Science, San Francisco, CA, USA, 22–24 October 2014; Volume 1. [Google Scholar]
  5. Preishuber, M.; Hütter, T.; Katzenbeisser, S.; Uhl, A. Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2137–2150. [Google Scholar] [CrossRef]
  6. Kordov, K.M. Modified Chebyshev Map Based Pseudo-random Bit Generator. AIP Conf. Proc. 2014, 1629, 432–436. [Google Scholar]
  7. Kordov, K. Signature Attractor Based Pseudorandom Generation Algorithm. Adv. Stud. Theor. Phys. 2015, 9, 287–293. [Google Scholar] [CrossRef]
  8. Stoyanov, B. Pseudo-random bit generation algorithm based on Chebyshev polynomial and Tinkerbell map. Appl. Math. Sci. 2014, 8, 6205–6210. [Google Scholar] [CrossRef]
  9. Kordov, K. Modified pseudo-random bit generation scheme based on two circle maps and XOR function. Appl. Math. Sci. 2015, 9, 129–135. [Google Scholar] [CrossRef]
  10. Stoyanov, B.P. Using Circle Map in Pseudorandom Bit Generation. AIP Conf. Proc. 2014, 1629, 460–463. [Google Scholar]
  11. Skiadas, C.H. Mathematical models of Chaos. In Chaos Applications in Telecommunications; Stavroulakis, P., Ed.; CRC Press: Boca Raton, FL, USA, 2006; pp. 383–413. [Google Scholar]
  12. Skiadas, C.H.; Skiadas, C. Chaotic Modelling and Simulation: Analysis of Chaotic Models, Attractors and Forms; CRC Press: Boca Raton, FL, USA, 2008. [Google Scholar]
  13. Stoyanov, B.P.; Zhelezov, S.K.; Kordov, K.M. Least significant bit image steganography algorithm based on chaotic rotation equations. C. R. Acad. Bulgare Sci. 2016, 69, 845–850. [Google Scholar]
  14. Parvees, M.M.; Samath, J.A.; Bose, B.P. Cryptographically Secure Diffusion Sequences—An Attempt to Prove Sequences Are Random. In Advances in Big Data and Cloud Computing; Springer: Singapore, 2019; pp. 433–442. [Google Scholar]
  15. Tutueva, A.V.; Butusov, D.N.; Pesterev, D.O.; Belkin, D.A.; Ryzhov, N.G. Novel normalization technique for chaotic Pseudo-random number generators based on semi-implicit ODE solvers. In Proceedings of the 2017 International Conference “Quality Management, Transport and Information Security, Information Technologies” (IT&QM&IS), St. Petersburg, Russia, 24–30 September 2017; pp. 292–295. [Google Scholar]
  16. Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, A.; et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application; NIST Special Publication 800-22; NIST: Gaithersburg, MD, USA, 2001.
  17. Marsaglia, G. The Marsaglia Random Number CDROM including the Diehard Battery of Tests of Randomness; Florida State University: Tallahassee, FL, USA, 1995. [Google Scholar]
  18. Walker, J. ENT: A Pseudorandom Number Sequence Test Program. Available online: http://www.fourmilab.ch/random/ (accessed on 7 April 2019).
  19. IEEE Computer Society. 754-2008—IEEE Standard for Floating-Point Arithmetic, Revision of ANSI/IEEE Std 754-1985; IEEE: New York, NY, USA, 2018. [Google Scholar] [CrossRef]
  20. Alvarez, G.; Li, S. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
  21. Kordov, K.; Bonchev, L. Using circle map for audio encryption algorithm. Math. Softw. Eng. 2017, 3, 183–189. [Google Scholar]
  22. Lima, J.B.; da Silva Neto, E.F. Audio encryption based on the cosine number transform. Multimedia Tools Appl. 2016, 75, 8403–8418. [Google Scholar] [CrossRef]
  23. Kabakchiev, H.; Behar, V.; Garvanov, I.; Kabakchieva, D.; Kabakchiev, A.; Rohling, H.; Bentum, M.; Fernandes, J. Comparison of Two Algorithms for Signal Detection in Pulsarbased FSR. In Proceedings of the 2018 19th International Radar Symposium (IRS), Bonn, Germany, 20–22 June 2018; pp. 1–9. [Google Scholar]
Figure 1. Modified rotation equations with θ = 2, a = 2.8, x0 = 0.2343214592 and y = −0.742190593.
Figure 1. Modified rotation equations with θ = 2, a = 2.8, x0 = 0.2343214592 and y = −0.742190593.
Electronics 08 00530 g001
Figure 2. Plot of binary sequences with similar keys.
Figure 2. Plot of binary sequences with similar keys.
Electronics 08 00530 g002
Figure 3. Encryption scheme.
Figure 3. Encryption scheme.
Electronics 08 00530 g003
Figure 4. Encryption scheme.
Figure 4. Encryption scheme.
Electronics 08 00530 g004
Figure 5. Waveform plotting.
Figure 5. Waveform plotting.
Electronics 08 00530 g005aElectronics 08 00530 g005b
Figure 6. Spectrogram plotting.
Figure 6. Spectrogram plotting.
Electronics 08 00530 g006aElectronics 08 00530 g006b
Figure 7. Histograms of plain file and encrypted file.
Figure 7. Histograms of plain file and encrypted file.
Electronics 08 00530 g007
Figure 8. Waveform plotting-key sensitivity.
Figure 8. Waveform plotting-key sensitivity.
Electronics 08 00530 g008
Figure 9. Spectrogram plotting-key sensitivity.
Figure 9. Spectrogram plotting-key sensitivity.
Electronics 08 00530 g009
Table 1. NIST test suite results.
Table 1. NIST test suite results.
NIST Testp-ValuePass Rate
Frequency (monobit)0.875539990/1000
Block-frequency0.474986986/1000
Cumulative sums (Forward)0.231956988/1000
Cumulative sums (Reverse)0.404728987/1000
Runs0.737915993/1000
Longest run of Ones0.504219991/1000
Rank0.268917988/1000
FFT0.332970985/1000
Non-overlapping templates0.527913990/1000
Overlapping templates0.908760984/1000
Universal0.452173989/1000
Approximate entropy0.942198988/1000
Random-excursions0.587477611/617
Random-excursions Variant0.499704611/617
Serial 10.395940993/1000
Serial 20.448424991/1000
Linear complexity0.345650991/1000
Table 2. DIEHARD statistical test results.
Table 2. DIEHARD statistical test results.
DIEHARD Testp-Value
Birthday spacings0.6936326
Overlapping 5-permutation0.1870995
Binary rank (31 × 31)0.3212080
Binary rank (32 × 32)0.7507100
Binary rank (6 × 8)0.4515738
Bitstream0.4843810
OPSO0.5597304
OQSO0.4843929
DNA0.5809645
Stream count-the-ones0.4507350
Byte count-the-ones0.5006025
Parking lot0.5674729
Minimum distance0.2135240
3D spheres0.5417610
Squeeze0.0204010
Overlapping sums0.5881176
Runs up0.8360805
Runs down0.3161460
Craps0.2423550
Table 3. ENT statistical test results.
Table 3. ENT statistical test results.
ENT TestResult
Entropy7.999999 bits per byte
Optimum compressionOC would reduce the size of this 125,000,000 byte file by 0%.
χ 2 distributionFor 125,000,000 samples is 253.43, and randomly would exceed this value 51.61% of the times.
Arithmetic mean value127.4968 (127.5 = random)
Monte Carlo π estimation3.141710066 (error 0.00%)
Serial correlation coefficient−0.000087 (totally uncorrelated = 0.0)
Table 4. Correlation between plain and encrypted audio files.
Table 4. Correlation between plain and encrypted audio files.
FileFile SizeFile Length (s)Correlation Coefficient
File1.wav41.1 kb0.47 s−0.004794
File2.wav98.6 kb1.14 s0.001699
File3.wav138 kb1.60 s−0.00038781
File4.wav277 kb3.21 s−0.00088715
File5.wav544 kb6.32 s−0.0011166
File6.wav1.08 mb12.91 s0.00053012
File7.wav2.33 mb13.85 s0.00047104
Ref. [3]-7 s0.0119
Ref. [4]--0.0263
Table 5. Number of sample change rate.
Table 5. Number of sample change rate.
FileFile SizeFile Length (s)NSCR
File1.wav41.1 kb0.47 s100%
File2.wav98.6 kb1.14 s99.996%
File3.wav138 kb1.60 s99.9972%
File4.wav277 kb3.21 s99.9993%
File5.wav544 kb6.32 s99.9996%
File6.wav1.08 mb12.91 s99.9986%
File7.wav2.33 mb13.85 s99.9984%
Ref. [3]--99.9996%
Ref. [22]--99.9992%
Table 6. Signal to noise ratio.
Table 6. Signal to noise ratio.
FileFile SizeFile Length (s)SNR
File1.wav41.1 kb0.47 s−16.0483 dB
File2.wav98.6 kb1.14 s−10.6478 dB
File3.wav138 kb1.60 s−8.7189 dB
File4.wav277 kb3.21 s−10.6345 dB
File5.wav544 kb6.32 s−15.3072 dB
File6.wav1.08 mb12.91 s−14.3761 dB
File7.wav2.33 mb13.85 s−16.0483 dB
Ref. [2]-4 s−12.1727 dB
Ref. [2]-7 s−12.5180 dB
Table 7. Peak signal to noise ratio.
Table 7. Peak signal to noise ratio.
FileFile SizeFile Length (s)PSNR
File1.wav41.1 kb0.47 s1.4524 dB
File2.wav98.6 kb1.14 s4.3909 dB
File3.wav138 kb1.60 s2.3292 dB
File4.wav277 kb3.21 s−1.1625 dB
File5.wav544 kb6.32 s−0.53082 dB
File6.wav1.08 mb12.91 s1.5163 dB
File7.wav2.33 mb13.85 s1.4524 dB
Ref. [1]12.17 kb-4.5299 dB
Ref. [4]--4.373 dB
Table 8. Speed performance test.
Table 8. Speed performance test.
FileFile SizeBytes per SampleEncryption Time (s)
File1.wav41.1 kb20.130 s
File2.wav98.6 kb20.245 s
File3.wav138 kb20.333 s
File4.wav277 kb20.694 s
File5.wav544 kb21.324 s
File6.wav1.08 mb22.688 s
File7.wav2.33 mb25.767 s

Share and Cite

MDPI and ACS Style

Kordov, K. A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture. Electronics 2019, 8, 530. https://doi.org/10.3390/electronics8050530

AMA Style

Kordov K. A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture. Electronics. 2019; 8(5):530. https://doi.org/10.3390/electronics8050530

Chicago/Turabian Style

Kordov, Krasimir. 2019. "A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture" Electronics 8, no. 5: 530. https://doi.org/10.3390/electronics8050530

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop