SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 5, October 2020, pp. 4824~4834
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i5.pp4824-4834  4824
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
A new dynamic speech encryption algorithm based on Lorenz
chaotic map over internet protocol
Obaida M. Al-Hazaimeh
Department of Computer Science and Information Technology, Al- Balqa' Applied University, Jordan
Article Info ABSTRACT
Article history:
Received Feb 3, 2020
Revised Mar 13, 2020
Accepted Mar 24, 2020
This paper introduces a dynamic speech encryption algorithm based on
Lorenz chaotic map over internet protocol to enhance the services of
the real-time applications such as increases the security level and reduces
latency. The proposed algorithm was divided into two processes: dynamic
key generation process using 128-bit hash value to dynamically alter
the initial secret keys, and encryption and decryption process using Lorenz
system. In the proposed algorithm, the performance evaluation is carried out
through efficient simulations and implementations and statistical analysis.
In addition, the average time delay in the proposed algorithm and some of
the existing algorithms such as AES is compared. The obtained results
concluded that, the proposed dynamic speech encryption algorithm is
effectually secured against various cryptanalysis attacks and has
useful cryptographic properties such as confusion and diffusion for better
voice communication in the voice applications field in the Internet.
Keywords:
AMR-WB-G.722.2
Chaos-theory
Cryptography
IP telephony
Lorenz map
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Obaida M. Al-hazaimeh,
Department of Computer Science and Information Technology,
Al- Balqa' Applied University,
21163, Jordan.
Email: dr_obaida@bau.edu.jo
1. INTRODUCTION
Voice application over Internet protocol (i.e., VoIP) is a IP telephony technology that allows
the voice data as human voice to transfers in real-time over Internet Protocol (i.e., IP) in a manner that
emulates the traditional telephone service (i.e., PSTN) [1, 2]. In general, the voice application over internet
protocol only requires an program on the end-point computer (i.e., sender, or receiver) capable of encoding
and decoding transmitting speech and Internet access [3, 4].
Voice application over internet protocol technology provides more advantages when it is compared
to the traditional telephone service. IP telephony technology is cheaper, can be integrated with other media
services, portable, and allows for more efficient bandwidth utilization. Therefore, the service providers prefer
the IP telephony technology as a method to reduce the cost over existing multimedia services. Moreover,
the infrastructure of the IP telephony is considered as a solid economical ground in building the more recent
revenue-generating services. Markedly, the deployment of IP telephony technology is becoming more
popular and is considered as an integral part of a global competitive landscape [5, 6]. Despite of all these
positive features, the IP telephony technology is facing some difficulties and challenges such as security,
packet loss, and latency. Consequently, more advanced techniques or strategies are warranted to competently
manage these difficulties, which are expected to ensure the quality of the IP telephony technology services
(i.e., QoS) [3, 7]. For example, the threat of the intruders over IP networks is the greatest security challenge
in IP telephony technology. The later will be a great concern since these offenders utilize various sniffing
tools to compromise the conversation of the IP telephony. To managing the security challenges, cryptography
serves as a valuable tool to maintain data secrecy [8, 9].
Int J Elec & Comp Eng ISSN: 2088-8708 
A new dynamic speech encryption algorithm based on lorenz chaotic map (Obaida M. Al-Hazaimeh)
4825
The science of cryptology consists of two major parts: cryptography and cryptanalysis. The science
of cryptology and its cryptographic primitives are categorized as illustrated in Figure 1. While cryptography
is the art of maintaining data secrecy against unauthorized access (i.e., intruders), on the other sided,
cryptanalysis is about analyzing and handling infringement of secure communication [10, 11].
Figure 1. Taxonomy of cryptology
To maintain data secrecy against unauthorized access over IP networks the cryptography is widely
used. However, most of the existing cryptographic algorithms are built to maintain text data secrecy.
Therefore, these existing algorithms are not suitable for voice applications over internet protocol because it
involves extensive computation and consumed a large amount of time (i.e., delay) [5, 12]. The following four
performance factors: encryption delay, the security level, message delay, and processing power are mainly
used to measure the VoIP security. The security level (i.e., complexity) of the security algorithm seems to
have an impact on these measurement factors [8, 13, 14]. Constructing new speech encryption algorithms
based on chaos theory to increase the security level has drawn for many scientists and researchers
attention [15-21], but unfortunately some of these constructed algorithms have a number of practical
problems in terms of cryptanalysis attacks [22, 23]. In this paper, a new dynamic speech encryption
algorithm using Lorenz chaotic map over IP network is proposed. While generating a chaotic key stream,
the system parameters and 128-bit hash value of the plain-speech are included in the proposed algorithm to
obtain a highest security level.
The rest of this paper is organized into 5 sections including the introduction as follows: section 2 has
described the proposed algorithm based on Lorenz system. Section 3 describes simulation result and security
analysis, and explains the procedures used to test the proposed algorithm. In section 4, a comparison with
existing work is given and finally conclusion is presented in sections 5.
2. PROPOSED ALGORITHM
In practical, Lorenz chaotic map has useful cryptographic properties such as confusion and
diffusion, sensitivity to initial conditions and parameters, and un-predictability [20]. Therefore, Lorenz
chaotic map is used in this paper to propose a new symmetric speech encryption algorithm. It consists of two
major parts: keys generation using 128-bit hash value of plain speech frame and the logistic, and encrypting
the speech frame using chaotic sequences which are generated by Lorenz system. The overall block diagram
of the proposed algorithm architecture can be illustrated by Figure 2.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4824 - 4834
4826
Figure 2. Block diagram
Below, we will provide an introductory definition of the Lorenz system and analyze its main
positive features regarding to cryptography. Then, the steps to implement such a process of the encryption
parts will be discuss. The decryption steps for completeness will also be illustrated.
2.1. Lorenz chaotic system
Lorenz system is a dynamical system which was studied first by Edward Norton Lorenz around
1960 [24], This chaotic system is described by non-linear system of ordinary differential equations
(i.e., ODEs) as given in (1).
ẋ = a(y − x),
ẏ = (σ − z)x − y,
ż = xy − bz.
(1)
The real numbers a, σ, b are called the control parameters, where x, y, z are variables called the state
variables, and ẋ, ẏ, and ż are the time derivatives of x, y, and z. Usually, the Lorenz system (1) is commonly
solved numerically using RK45 (Runge-Kutta methods) for given control parameters, and initial values of
the state variables (i.e., x0, y0, z0). In Figure 3 a chaotic attractor (i.e., Lorenz butterfly) of the dynamical
Lorenz system (1) is presented.
Figure 3. Chaotic attractor
Int J Elec & Comp Eng ISSN: 2088-8708 
A new dynamic speech encryption algorithm based on lorenz chaotic map (Obaida M. Al-Hazaimeh)
4827
For different values of parameter σ the dynamical system (1) exhibits chaos. By having positive
Lyapunov exponents (i.e., sensitivity to initial conditions), chaos can be recognized for many dynamical
systems, and in particular (1). In Figure 4, the maximum Lyapunov exponent of (1) versus values of σ are
plotted. In this paper, we have fixed a and b to be a = 10, b = 8/3, and allow value of σ to dynamically vary
in the interval [28, 90] to provide a large enough key-space to resist brute-force attacks. Moreover, this will
guarantee that (1) has dense (chaotic) attractors, which is important in terms of cryptography; any change in
initial conditions will cause trajectories to remain in the same attractor set, thus making it difficult to predict
any outcome without knowing the exact initial conditions of the system as well as the iteration counts in
the numerical solution.
Figure 4. Maximum lyapunov exponents
2.2. Generation process for the initial values and parameters
In the generation process, we utilize the 128-bit hash value of the plain-speech frame generated by
MD5 hash function to dynamically change the initial secret keysx0, y0, z0and σ0. In the following steps,
the generation process is described in the details.
Algorithm 1: Generation process
Step 1:
Compute a 128-bit hash value K from the plain speech frame Bj, and then
compute four
26-bit sequences as the following:
𝑥 𝑛 = digits(𝑥0 − floor(𝑥0), 26)
𝑦𝑛 = digits(𝑦0 − floor(𝑦0), 26)
𝑧 𝑛 = digits(𝑧0 − floor(𝑧0), 26)
𝜎 𝑛 = digits(𝜎0 − floor(𝜎0), 26)
Step 2: Set 𝑟 = mod(count(𝜎 𝑛, 1), 13).
Step 3: Set s = xn, yn, zn, 1100 to construct the 128-bit string.
Step 4:
Compute a new 128-bit hash-value by 𝐻 𝑁 = rotL(𝑠 XOR 𝐾, 𝑟), then divide 128-bit hash
value into four 32-bit vectors: 𝐻 𝑁 = 𝑘1, 𝑘2, 𝑘3, 𝑘4.
Step 5:
Normalize the initial secret key to the interval (0, 1) using f(t) = (arctan(t) +
π/2)/π as the following:
𝑥 𝑁 = 𝑓(𝑥0), 𝑦 𝑁 = 𝑓(𝑦0), 𝑧 𝑁 = 𝑓(𝑧0), σ 𝑁 = 𝑓(𝜎0).
Step 6:
Set 𝑛𝑖 = 100 + count(𝑘𝑖, 1), 𝑖 = 1, 2, 3, 4 to construct a four chaotic numbers 𝑙1, 𝑙2, 𝑙3,
𝑙4 ∈ (0, 1) by iterating the logistic map 𝑛1, 𝑛2, 𝑛3, and 𝑛4 times using the
initial-values 𝑥 𝑁, 𝑦 𝑁, 𝑧 𝑁, σ 𝑁, respectively.
Step 7:
Finally, the following formula is used to compute the new four chaotic keys
𝑥̅, 𝑦̅, 𝑧̅, and σ̅:
[𝑥̅ 𝑦̅𝑧̅] = [𝑥0 𝑦0 𝑧0] + [𝑙1 𝑙2 𝑙3] + 2−32
× [𝑘1 𝑘2 𝑘3], σ̅ = 14 + 15 × (𝑙4 + 2−32
𝑘4).
2.3. Encryption process
In the encryption process, a several iterations over the plain speech frame that involves a set of
operation such as substitutions, permutations, transformations, and transpositions are performed to
complicate the process of decrypting cipher speech frame by cyber-intruders (i.e., unauthorized access)
[25, 26]. In Figure 5 the block diagram of the proposed decryption process is presented. The speech
encryption algorithm proposed in this paper consists of the following sequential steps:
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4824 - 4834
4828
Algorithm 2: Encryption process
Step 1:
Arrange the 20-ms speech frame in 𝐁 = {𝐵1, 𝐵2, … , 𝐵𝑗} of length 𝑗 = 132, each element
is the 8-bit representation of the bit 0 (BIT-0: FF81) or the bit 1 (BIT-
1: 007F) of
the coder parameters which is codified on 8 bits.
Step 2:
Set 𝑑̅ = floor(𝑑/13), then iterate the Lorenz system (1)using RK-45 method for (𝑑̅ +
1) times using the new initial-values 𝑥(0) = 𝑥̅, 𝑦(0) = 𝑦̅, and 𝑧(0) = 𝑧̅, and new
control parameter 𝜎 = σ̅, to get three chaotic sequences 𝑋, 𝑌, and 𝑍. Then
compute the following three sequences:
𝑋 𝑁 = {𝑥1, 𝑥2, … , 𝑥 𝑑̅+1}, 𝑌𝑁 = {𝑦1, 𝑦2, … , 𝑦 𝑑̅+1}, 𝑍 𝑁 = {𝑧1, 𝑧2, … , 𝑧 𝑑̅+1}
for 𝑖 = 1, 2, … , 𝑑̅ + 1:
𝑥𝑖 = digits(𝑋𝑖 − floor(𝑋𝑖), 26),
𝑦𝑖 = digits(𝑌𝑖 − floor(𝑌𝑖), 26),
𝑧𝑖 = digits(𝑍𝑖 − floor(𝑍𝑖), 26).
Step 3:
Set 𝑑̃ = 𝑑̅ if (𝑑/13) is an integer. Otherwise, 𝑑̃ = 𝑑̅ + 1,. Then, partitioning the
array 𝑷 into 𝑑̃ vectors as 𝑷 = 𝑃1, 𝑃2, … , 𝑃 𝑑̃
where,
𝑃𝑖 = 𝑝13(𝑖−1)+1, … , 𝑝13𝑖, 𝑃 𝑑̃ = 𝑝13𝑑̅+1, … , 𝑝 𝑑, 𝑖 = 1,2, … , 𝑑̅
Step 4:
Construct the sequence 𝑈 = 𝑈1, 𝑈2, … , 𝑈 𝑑̃ with𝑈𝑖 = 𝐵𝑖, for 𝑖 = 1, 2, … , 𝑑̅, and
𝑈 𝑑̃ = digits(𝐵 𝑑̃, length(𝑃 𝑑̃)). Observe that length(𝑈𝑖) = 28 + 28 = 56bit = 7 × 8bit, and
length(𝑃 𝑑̃) = (𝑑 − 13𝑑̅) × 8bit.
Step 5: Construct rotations𝑟𝑖 = count(𝑧𝑖, 1), 𝑖 = 1, 2, … , 𝑑̃.
Step 6:
Finally, the cipher speech frame 𝐂 is obtained using the formula:
𝐶𝑖 = rotL(𝑈𝑖 𝑋𝑂𝑅 𝑃𝑖, 𝑟𝑖), 𝑖 = 1,2, … , 𝑑̃.
Figure 5. Decryption algorithm
3. SIMULATION RESULT AND SECURITY ANALYSIS
This section discusses the proposed speech encryption algorithm, which simulated on a 1.6 GHz
core (TM) i5, 1-TB hard disk capacities and 4-GB memory with MATLAB software. In this section,
as an example, different speech samples of audio files are selected with different sampling rate (i.e., 5000
samples per second). The simulation result was validated by applying the statistical tests such as histogram
analysis, correlation, randomness, and sensitivity to prove the performance metrics [22]. Below,
standardized tests are given.
3.1. Histogram analysis test
To evaluate the quality of encrypted speech signals, this analysis is the most accurate test.
Practically, the proposed algorithm is likely to encrypt the plain speech signals in a random manner
(i.e., noisy signals). Histogram of the input speech signals are illustrated in Figure 6(a) and Figure 6(d).
The corresponding histogram of the encrypted speech signals using the secret keys: x0, y0, z0, σ0,
and 128-bit hash value of the speech signals are illustrated in Figure 6(b) and Figure 6(e). The results in
Figure 6 shows that the histograms of the encrypted speech signals are fairly uniform distributed and totally
different from the plain speech signals. In addition, the result indicates that the proposed algorithm can
be decrypted correctly with the correct keys as illustrated in Figure 6(c) and Figure 6(f).
Int J Elec & Comp Eng ISSN: 2088-8708 
A new dynamic speech encryption algorithm based on lorenz chaotic map (Obaida M. Al-Hazaimeh)
4829
(a) (d)
(b) (e)
(c) (f)
Figure 6. Histogram analysis, (a) Input speech signal_1, (b) Encrypted speech signal_1,
(c) Decrypted speech signal_1, (d) Input speech signal_2, (e) Encrypted speech signal_2,
(f) Decrypted speech signal_2
3.2. Correlation test
The chaotic system was found to produce a strong encryption method, which can be
efficiently identified by correlation method [23]. The correlation method is computed as (2).
𝑟𝑥𝑦 =
cov(𝑥,𝑦)
√ 𝐷(𝑥)√𝐷(𝑦)
(2)
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4824 - 4834
4830
where
cov(𝑥, 𝑦) =
1
𝑁
∑ (𝑥𝑖 − 𝐸(𝑥))(𝑦𝑖 − 𝐸(𝑦))𝑁
𝑖=1 , 𝐸(𝑥) =
1
𝑁
∑ 𝑥𝑖
𝑁
𝑖=1 , 𝐷(𝑥) =
1
𝑁
∑ (𝑥𝑖
𝑁
𝑖=1 −𝐸(𝑥))2
,
where N is the number of speech samples. In proposed algorithm, the correlation coefficient
cov(x, y) between the plain and the ciphered speech samples are tabulated in Table 1. The result in Table 1
shows that the proposed speech encryption algorithm is efficient enough, because the correlation test has
been satisfied that would resist statistical attacks.
Table 1. Correlation test
File Name Original Encrypted
Sample_1.wav 0.98153 0.000992
Sample_2.wav 0.98726 0.000642
Sample_3.wav 0.99114 0.001765
Sample_4.wav 0.96241 0.001357
3.3. Randomness tests
To measure the strength of the encrypted speech frames against cryptanalysis attacks, we have
performed a different suite of statistical tests in this section known as DIEHARD (i.e., 18-tests) and NIST
(i.e., 15-tests) test suite [23, 27]. For given sequence, these suites are designed mainly to measure the quality
of the randomness. As can be seen from Table 2 and Table 3, the p-value of each test ranges from 0.01 to
0.99 (i.e., success range), which means the encrypted sequence is random at the 99% of confidence level.
Table 2. DIEHARD tests suite
Test No. p-value Result
1 0.508955 Testing passed
2 0.352178 Testing passed
3 0.985131 Testing passed
4 0.432234 Testing passed
5 0.577165 Testing passed
6 0.531168 Testing passed
7 0.579962 Testing passed
8 0.461181 Testing passed
9 0.534275 Testing passed
10 0.440085 Testing passed
11 0.537715 Testing passed
12 0.698621 Testing passed
13 0.700913 Testing passed
14 0.385725 Testing passed
15 0.700982 Testing passed
16 0.672727 Testing passed
17 0.700116 Testing passed
18 0.071163 Testing passed
Table 3. NIST tests suite
Test No. p-value Result
1 0.644569 Testing passed
2 0.537212 Testing passed
3 0.822953 Testing passed
4 0.691672 Testing passed
5 0.287185 Testing passed
6 0.279095 Testing passed
7 0.513448 Testing passed
8 0.436158 Testing passed
9 0.214367 Testing passed
10 0.433041 Testing passed
11 0.207415 Testing passed
12 0.387142 Testing passed
13 0.597824 Testing passed
14 0.509732 Testing passed
15 0.484727 Testing passed
Int J Elec & Comp Eng ISSN: 2088-8708 
A new dynamic speech encryption algorithm based on lorenz chaotic map (Obaida M. Al-Hazaimeh)
4831
3.4. Information entropy
Information entropy is used usually as a measure of disorder, or randomness in encrypted speech
signal [28]. The entropy function 𝐻(𝑠)of a source s can be computed as (3).
𝐻(𝑠) = ∑ 𝑃(𝑠𝑖) log2
1
𝑃(𝑠 𝑖)
2𝑁−1
𝑖=1 (3)
where P(Si) represents Si probability. The entropy value for the encrypted speech signals should ideally be 8.
In other words, if the entropy value of the encrypted speech signals is less than 8, then the predictability
threats to the encrypted speech signals are exists. In this paper, ENT test suite is used to calculate
the information entropy value. Practically, ENT is a suite composed of the following three tests: entropy,
serial correlation, and chi-square coefficient as shown in Table 4. From these results, the obtained values are
evaluated to be almost as the theoretical value, which means that the proposed speech encryption algorithm is
efficient enough (i.e., secure) upon the cryptanalysis attacks (i.e., entropy).
Table 4. ENT test suite
No. ENT test suite Theoretical value Obtained value
1 Entropy Close to 8 7.999986
2 Serial correlation Close to 0 0.000381
3 Chi-square coefficient Close to 127.5 127.5019
3.5. Key sensitivity test
To ensure the security against brute-force attacks, the excellent encrypted speech quality must be
sensitive in extreme way with respect to the secret keys [24, 29]. In the proposed algorithm, any slightly
change (i.e., bit flip) on the following sensitivity factors: hash values, keys, and other encryption keys such as
parameters that would generate a completely different decryption results as shown in Figure 7.
(a) (b)
(c) (d)
Figure 7. Key sensitivity, (a) Input speech signal, (b) Decrypted speech signal with correct key,
(c) Decrypted speech signal with incorrect key hash value, (d) Decrypted speech signal with incorrect x0
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4824 - 4834
4832
4. COMPARISON WITH EXISTING WORKS
There are several types of delay in the current IP telephony networks such as processing (i.e., coder,
decoder, digital signal processing), serialization, queuing, propagation, and network delay as shown in
Figure 8. Some of them are fixed while others are variable as illustrated in Table 5. IP telephony applications
are delay sensitive. Therefore, the ITU-T has recommended that the maximum threshold of the delay time
(i.e., ∑delay sources) is 150 ms [2, 5, 6]. The adaptive multi-rate wideband (AMR-WB G.722.2) speech
codec is used in this paper to collect N speech samples as one frame because it supports the GSM features
such as discontinuous transmission, comfort noise generation, and voice activity detection [30].
Figure 8. Packet flow
Table 5. Delay source
Delay source Formula Description Delay type
Coder 𝐶 𝐷 = (2𝑁 + 1) ∗ 𝐹𝑟𝑎𝑚𝑒 𝑆𝑖𝑧𝑒 + 𝐿𝑜𝑜𝑘 𝑎ℎ𝑒𝑎𝑑 𝑡𝑖𝑚𝑒 Collect the speech samples as
frames.
Fixed
Decoder
𝐷 𝐷 =
𝐶 𝐷
2
Playback of the coder process. Fixed
Serialization
𝑆 𝐷 =
𝐹𝑟𝑎𝑚𝑒 𝑆𝑖𝑧𝑒
𝐼𝑛𝑡𝑒𝑟𝑓𝑎𝑐𝑒 𝐶𝑙𝑜𝑐𝑘𝑖𝑛𝑔 𝑅𝑎𝑡𝑒
Time to clock a speech frame onto a
network interface.
Fixed
Queuing
𝑄 𝐷 =
(𝑉𝑜𝑖𝑐𝑒 𝐹𝑟𝑎𝑚𝑒 𝑆𝑖𝑧𝑒 + 5120)
𝐿𝑖𝑛𝑒 𝑆𝑝𝑒𝑒𝑑
Time the voice packet spends in
router.
Variable
Network 𝑁 𝐷 = 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑅𝑜𝑢𝑡𝑒𝑟𝑠 ∗ (𝑄 𝐷+𝑆 𝐷) Time the voice packet spends to go
from one point to another.
Variable
Propagation Caused by the light speed in copper-based networks (i.e., 125,000 miles per second), or in
fiber (i.e., 186,000 miles per second)
Fixed
Security Caused by the encryption and decryption processes. Fixed
A practical comparison on the average time delay between advanced encryption standard algorithm
and proposed algorithm in the same environment and conditions is made in this section. In end-to-end delay,
the implementation result shows that the average time delay to encrypt the speech data using the proposed
algorithm is 2.287701494 ms and the average time delay to encrypt the speech data using AES is
2.7832762824 ms as illustrated in Table 6 and Table 7 respectively. In other words, a column chart showing
the AES algorithm is slower than the proposed speech encryption algorithm is presented in Figure 9.
Table 6. End-to-end delay time for fast Ethernet using the proposed speech encryption algorithm
Int J Elec & Comp Eng ISSN: 2088-8708 
A new dynamic speech encryption algorithm based on lorenz chaotic map (Obaida M. Al-Hazaimeh)
4833
Table 7. End-to-end delay time for fast ethernet using AES algorithm
Figure 9. Average delay time
5. CONCLUSION
In this paper we have achieved our objective of designing a dynamic speech encryption algorithm
based on Lorenz chaotic map over internet protocol to enhance the real-time services. The proposed
algorithm was divided into two processes: key generation process using 128-bit hash value, and encryption
and decryption process using Lorenz system. To evaluate the security level of the proposed algorithm,
efficient simulations and implementations and analysis have been conducted. The security level is increased
by using a multi key with every new speech packet and increasing a key length which protects the proposed
algorithm against various cryptanalysis attacks. In addition, a comparison between the average time delay in
the proposed algorithm and some of the existing encryption algorithms is made. The results endorse that
the proposed algorithm achieved a higher security level with a lowest average delay time and it is an
excellent choice for voice communication in practical applications in the Internet.
REFERENCES
[1] B. Goode, “Voice over internet protocol (VoIP),” Proceedings of the IEEE, vol. 90, no. 9, pp. 1495-1517, 2002.
[2] H. Oouch, et al., “Study on appropriate voice data length of IP packets for VoIP network adjustment,” in Global
Telecommunications Conference, 2002. GLOBECOM'02. IEEE, vol. 2, pp. 1618-1622, 2002.
[3] R. Dantu, et al., “Issues and challenges in securing VoIP,” Computers & Security, vol. 28, no. 8, pp. 743-753, 2009.
[4] O. M. Al-Hazaimeh, “Increase the security level for real-time application using new key management solution,”
International Journal of Computer Science Issues (IJCSI), vol. 9, no. 3, pp. 240-246, 2012.
[5] S. Na and S. Yoo, “Allowable propagation delay for VoIP calls of acceptable quality,” in Proceedings of the First
International Workshop on Advanced Internet Services and Applications, pp. 47-56, 2002.
[6] O. M. Al-Hazaimeh, “New cryptographic algorithms for enhancing security of voice data,” Thesis, Universiti Utara
Malaysia, 2010.
[7] M. Zandi, et al., “Overview of security issues of VoIP,” in Proceedings of the Third IASTED European Conference
on Internet and Multimedia Systems and Applications, pp. 254-259, 2007.
[8] J. Seedorf, “Security challenges for peer-to-peer SIP,” IEEE Network, vol. 20, no. 5, pp. 38-45, 2006.
[9] O. M. Al-Hazaimeh, “Combining audio samples and image frames for enhancing video security,” Indian Journal of
Science and Technology, vol. 8, no. 10, p. 940, 2015.
[10] E. Schaefer, “An introduction to cryptography and Cryptanalysis,” California's Silicon Valley: Santa Clara
University, pp. 4-5, 2009.
[11] M. Mishra and V. H. Mankar, “Review on chaotic sequences based cryptography and cryptanalysis,” International
Journal of Electronics Engineering, vol. 3, no. 2, pp. 189-194, 2011.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4824 - 4834
4834
[12] O. M. Al-Hazaimeh, et al., “A novel video encryption algorithm-based on speaker voice as the public key,” in 2014
IEEE International Conference on Control Science and Systems Engineering, pp. 180-184, 2014.
[13] C. T. Elrod, “VoIP security,” Google Patents, US8295188B2, 2012.
[14] M. Šalamon, “Chaotic electronic circuits in cryptography,” in Applied cryptography and network security,
pp. 295-320, 2012.
[15] E. Mosa, et al., “Chaotic encryption of speech signals,” International Journal of Speech Technology, vol. 14,
no. 4, pp. 285-26, 2011.
[16] L. J. Sheu, “A speech encryption using fractional chaotic systems,” Nonlinear dynamics, vol. 65, no. 1,
pp. 103-108, 2011.
[17] P. Sathiyamurthi and S. Ramakrishnan, “Speech encryption using chaotic shift keying for secured speech
communication,” EURASIP Journal on Audio, Speech, and Music Processing, vol. 2017, no. 1, pp. 20-30, 2017.
[18] H. T. Yau, et al., “Application of a chaotic synchronization system to secure communication,” Information
technology and control, vol. 41, no. 3, pp. 274-282, 2012.
[19] M. S. Azzaz, et al., “Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption,”
Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 8, pp. 2035-2047, 2013.
[20] F. J. Farsana, et al., “An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic
keystreams,” Applied Computing and Informatics, 2019.
[21] K. Kordov, “A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture,” Electronics,
vol. 8, pp. 530-544, 2019.
[22] C. E. Shannon, “Communication theory of secrecy systems,” The Bell system technical journal, vol. 28, no. 4,
pp. 656-715, 1949.
[23] W. Chang, et al., “Randomness testing of compressed data,” arXiv preprint arXiv:1001.3485, 2010.
[24] O. M. Al-Hazaimeh, et al., “Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys,”
Neural Computing and Applications, pp. 1-11, 2017.
[25] R. S. Mohammed and S. B. Sadkhan, “Speech scrambler based on proposed random chaotic maps,” in 2016
Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications
(AIC-MITCSA), pp. 1-6, 2016.
[26] A. K. Mittal, et al., “Secure communication based on chaotic switching and rapid synchronization using parameter
adaptation,” International Journal of Innovative Computing, Information and Control, vol. 11, no. 2, pp. 569-585,
Apr 2015.
[27] J. Soto, “Statistical testing of random number generators,” in Proceedings of the 22nd national information systems
security conference, 1999.
[28] X. Zhang and Z. Zhao, “Chaos-based image encryption with total shuffling and bidirectional diffusion,” Nonlinear
Dynamics, vol. 75, no. 1-2, pp. 319-330, 2014.
[29] J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and
chaos, vol. 8, no. 6, pp. 1259-1284, 1998.
[30] M. Boumaraf and F. Merazka, “Speech Coding Combining Chaos Encryption and Error Recovery for G. 722.2
Codec,” in Proceedings of the 3rd International Conference on Natural Language and Speech Processing,
pp. 128-134, 2019.
BIOGRAPHY OF AUTHOR
Obaida M. Al-Hazaimeh received his BSc in Computer Science from Applied Science
University, Jordan in 2004 and MSc in Computer science from University Science Malaysia,
Malaysia, in 2006. He received his PhD degree in Network Security (Cryptography) from
Malaysia in 2010. He is an associate professor at department of computer science and
information technology, Al-Balqa' Applied University, Jordan. His main research interests are
Cryptology, image processing, machine learning, and chaos theory. He has published more
than 34 Papers as author and Co-author in international refereed journals.
Ad

Recommended

Speech encryption by multiple chaotic maps with fast fourier transform
Speech encryption by multiple chaotic maps with fast fourier transform
IJECEIAES
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
IOSR Journals
 
A new speech encryption algorithm based on dual shuffling Hénon chaotic map
A new speech encryption algorithm based on dual shuffling Hénon chaotic map
IJECEIAES
 
G05124550
G05124550
IOSR-JEN
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
G05215356
G05215356
IOSR-JEN
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
IOSR Journals
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
IJERA Editor
 
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET Journal
 
Network Coding
Network Coding
Kishoj Bajracharya
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
IRJET Journal
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder
IJECEIAES
 
Introduction to Network Coding
Introduction to Network Coding
Electronics & Communication Staff SCU Suez Canal University
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
eSAT Journals
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
ijwmn
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architecture
eSAT Publishing House
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
A smart front end real-time detection and tracking
A smart front end real-time detection and tracking
Lihguong Jang
 
COMPUTER COMMUNICATION NETWORKS -IPv4
COMPUTER COMMUNICATION NETWORKS -IPv4
Krishna Nanda
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channels
iosrjce
 
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
John Mathias
 
Chaotic elliptic map for speech encryption
Chaotic elliptic map for speech encryption
nooriasukmaningtyas
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...
journalBEEI
 
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
IJNSA Journal
 
Enhanced security in lossless audio encryption using zigzag scrambling, DNA c...
Enhanced security in lossless audio encryption using zigzag scrambling, DNA c...
ssuser84cb16
 
A New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure Transmission
TELKOMNIKA JOURNAL
 

More Related Content

What's hot (17)

New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
IOSR Journals
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
IJERA Editor
 
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET Journal
 
Network Coding
Network Coding
Kishoj Bajracharya
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
IRJET Journal
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder
IJECEIAES
 
Introduction to Network Coding
Introduction to Network Coding
Electronics & Communication Staff SCU Suez Canal University
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
eSAT Journals
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
ijwmn
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architecture
eSAT Publishing House
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
A smart front end real-time detection and tracking
A smart front end real-time detection and tracking
Lihguong Jang
 
COMPUTER COMMUNICATION NETWORKS -IPv4
COMPUTER COMMUNICATION NETWORKS -IPv4
Krishna Nanda
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channels
iosrjce
 
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
John Mathias
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
IOSR Journals
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
IJERA Editor
 
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET Journal
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
IRJET Journal
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder
IJECEIAES
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
eSAT Journals
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
ijwmn
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architecture
eSAT Publishing House
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
A smart front end real-time detection and tracking
A smart front end real-time detection and tracking
Lihguong Jang
 
COMPUTER COMMUNICATION NETWORKS -IPv4
COMPUTER COMMUNICATION NETWORKS -IPv4
Krishna Nanda
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channels
iosrjce
 
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
John Mathias
 

Similar to A new dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol (20)

Chaotic elliptic map for speech encryption
Chaotic elliptic map for speech encryption
nooriasukmaningtyas
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...
journalBEEI
 
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
IJNSA Journal
 
Enhanced security in lossless audio encryption using zigzag scrambling, DNA c...
Enhanced security in lossless audio encryption using zigzag scrambling, DNA c...
ssuser84cb16
 
A New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure Transmission
TELKOMNIKA JOURNAL
 
Chaotic cryptography and multimedia security
Chaotic cryptography and multimedia security
Fatima Azeez
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining and encryption
nooriasukmaningtyas
 
A Secure Chaotic Communication System
A Secure Chaotic Communication System
ijsrd.com
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
IRJET Journal
 
predre les principe de cryptage ou chiffrementa.pptx
predre les principe de cryptage ou chiffrementa.pptx
AliAbdelli
 
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
IJECEIAES
 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
ZiadAlqady
 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
ZiadAlqady
 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
ZiadAlqady
 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
ZiadAlqady
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos based
eSAT Publishing House
 
A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...
eSAT Journals
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
nooriasukmaningtyas
 
V01 i010401
V01 i010401
IJARBEST JOURNAL
 
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
IJITCA Journal
 
Chaotic elliptic map for speech encryption
Chaotic elliptic map for speech encryption
nooriasukmaningtyas
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...
journalBEEI
 
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
IJNSA Journal
 
Enhanced security in lossless audio encryption using zigzag scrambling, DNA c...
Enhanced security in lossless audio encryption using zigzag scrambling, DNA c...
ssuser84cb16
 
A New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure Transmission
TELKOMNIKA JOURNAL
 
Chaotic cryptography and multimedia security
Chaotic cryptography and multimedia security
Fatima Azeez
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining and encryption
nooriasukmaningtyas
 
A Secure Chaotic Communication System
A Secure Chaotic Communication System
ijsrd.com
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
IRJET Journal
 
predre les principe de cryptage ou chiffrementa.pptx
predre les principe de cryptage ou chiffrementa.pptx
AliAbdelli
 
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
IJECEIAES
 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
ZiadAlqady
 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
ZiadAlqady
 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
ZiadAlqady
 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
ZiadAlqady
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos based
eSAT Publishing House
 
A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...
eSAT Journals
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
nooriasukmaningtyas
 
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
IJITCA Journal
 
Ad

More from IJECEIAES (20)

Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...
IJECEIAES
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
A review on features and methods of potential fishing zone
A review on features and methods of potential fishing zone
IJECEIAES
 
Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...
IJECEIAES
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...
IJECEIAES
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
A review on features and methods of potential fishing zone
A review on features and methods of potential fishing zone
IJECEIAES
 
Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...
IJECEIAES
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
Ad

Recently uploaded (20)

Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
20CE404-Soil Mechanics - Slide Share PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
Stay Safe Women Security Android App Project Report.pdf
Stay Safe Women Security Android App Project Report.pdf
Kamal Acharya
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
Fatality due to Falls at Working at Height
Fatality due to Falls at Working at Height
ssuserb8994f
 
Structured Programming with C++ :: Kjell Backman
Structured Programming with C++ :: Kjell Backman
Shabista Imam
 
Cadastral Maps
Cadastral Maps
Google
 
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
 
60 Years and Beyond eBook 1234567891.pdf
60 Years and Beyond eBook 1234567891.pdf
waseemalazzeh
 
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Shabista Imam
 
Call For Papers - 17th International Conference on Wireless & Mobile Networks...
Call For Papers - 17th International Conference on Wireless & Mobile Networks...
hosseinihamid192023
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
 
Rapid Prototyping for XR: Lecture 3 - Video and Paper Prototyping
Rapid Prototyping for XR: Lecture 3 - Video and Paper Prototyping
Mark Billinghurst
 
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
20CE404-Soil Mechanics - Slide Share PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
Stay Safe Women Security Android App Project Report.pdf
Stay Safe Women Security Android App Project Report.pdf
Kamal Acharya
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
Fatality due to Falls at Working at Height
Fatality due to Falls at Working at Height
ssuserb8994f
 
Structured Programming with C++ :: Kjell Backman
Structured Programming with C++ :: Kjell Backman
Shabista Imam
 
Cadastral Maps
Cadastral Maps
Google
 
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
 
60 Years and Beyond eBook 1234567891.pdf
60 Years and Beyond eBook 1234567891.pdf
waseemalazzeh
 
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Shabista Imam
 
Call For Papers - 17th International Conference on Wireless & Mobile Networks...
Call For Papers - 17th International Conference on Wireless & Mobile Networks...
hosseinihamid192023
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
 
Rapid Prototyping for XR: Lecture 3 - Video and Paper Prototyping
Rapid Prototyping for XR: Lecture 3 - Video and Paper Prototyping
Mark Billinghurst
 
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
 

A new dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 5, October 2020, pp. 4824~4834 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i5.pp4824-4834  4824 Journal homepage: http://ijece.iaescore.com/index.php/IJECE A new dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol Obaida M. Al-Hazaimeh Department of Computer Science and Information Technology, Al- Balqa' Applied University, Jordan Article Info ABSTRACT Article history: Received Feb 3, 2020 Revised Mar 13, 2020 Accepted Mar 24, 2020 This paper introduces a dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol to enhance the services of the real-time applications such as increases the security level and reduces latency. The proposed algorithm was divided into two processes: dynamic key generation process using 128-bit hash value to dynamically alter the initial secret keys, and encryption and decryption process using Lorenz system. In the proposed algorithm, the performance evaluation is carried out through efficient simulations and implementations and statistical analysis. In addition, the average time delay in the proposed algorithm and some of the existing algorithms such as AES is compared. The obtained results concluded that, the proposed dynamic speech encryption algorithm is effectually secured against various cryptanalysis attacks and has useful cryptographic properties such as confusion and diffusion for better voice communication in the voice applications field in the Internet. Keywords: AMR-WB-G.722.2 Chaos-theory Cryptography IP telephony Lorenz map Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Obaida M. Al-hazaimeh, Department of Computer Science and Information Technology, Al- Balqa' Applied University, 21163, Jordan. Email: [email protected] 1. INTRODUCTION Voice application over Internet protocol (i.e., VoIP) is a IP telephony technology that allows the voice data as human voice to transfers in real-time over Internet Protocol (i.e., IP) in a manner that emulates the traditional telephone service (i.e., PSTN) [1, 2]. In general, the voice application over internet protocol only requires an program on the end-point computer (i.e., sender, or receiver) capable of encoding and decoding transmitting speech and Internet access [3, 4]. Voice application over internet protocol technology provides more advantages when it is compared to the traditional telephone service. IP telephony technology is cheaper, can be integrated with other media services, portable, and allows for more efficient bandwidth utilization. Therefore, the service providers prefer the IP telephony technology as a method to reduce the cost over existing multimedia services. Moreover, the infrastructure of the IP telephony is considered as a solid economical ground in building the more recent revenue-generating services. Markedly, the deployment of IP telephony technology is becoming more popular and is considered as an integral part of a global competitive landscape [5, 6]. Despite of all these positive features, the IP telephony technology is facing some difficulties and challenges such as security, packet loss, and latency. Consequently, more advanced techniques or strategies are warranted to competently manage these difficulties, which are expected to ensure the quality of the IP telephony technology services (i.e., QoS) [3, 7]. For example, the threat of the intruders over IP networks is the greatest security challenge in IP telephony technology. The later will be a great concern since these offenders utilize various sniffing tools to compromise the conversation of the IP telephony. To managing the security challenges, cryptography serves as a valuable tool to maintain data secrecy [8, 9].
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  A new dynamic speech encryption algorithm based on lorenz chaotic map (Obaida M. Al-Hazaimeh) 4825 The science of cryptology consists of two major parts: cryptography and cryptanalysis. The science of cryptology and its cryptographic primitives are categorized as illustrated in Figure 1. While cryptography is the art of maintaining data secrecy against unauthorized access (i.e., intruders), on the other sided, cryptanalysis is about analyzing and handling infringement of secure communication [10, 11]. Figure 1. Taxonomy of cryptology To maintain data secrecy against unauthorized access over IP networks the cryptography is widely used. However, most of the existing cryptographic algorithms are built to maintain text data secrecy. Therefore, these existing algorithms are not suitable for voice applications over internet protocol because it involves extensive computation and consumed a large amount of time (i.e., delay) [5, 12]. The following four performance factors: encryption delay, the security level, message delay, and processing power are mainly used to measure the VoIP security. The security level (i.e., complexity) of the security algorithm seems to have an impact on these measurement factors [8, 13, 14]. Constructing new speech encryption algorithms based on chaos theory to increase the security level has drawn for many scientists and researchers attention [15-21], but unfortunately some of these constructed algorithms have a number of practical problems in terms of cryptanalysis attacks [22, 23]. In this paper, a new dynamic speech encryption algorithm using Lorenz chaotic map over IP network is proposed. While generating a chaotic key stream, the system parameters and 128-bit hash value of the plain-speech are included in the proposed algorithm to obtain a highest security level. The rest of this paper is organized into 5 sections including the introduction as follows: section 2 has described the proposed algorithm based on Lorenz system. Section 3 describes simulation result and security analysis, and explains the procedures used to test the proposed algorithm. In section 4, a comparison with existing work is given and finally conclusion is presented in sections 5. 2. PROPOSED ALGORITHM In practical, Lorenz chaotic map has useful cryptographic properties such as confusion and diffusion, sensitivity to initial conditions and parameters, and un-predictability [20]. Therefore, Lorenz chaotic map is used in this paper to propose a new symmetric speech encryption algorithm. It consists of two major parts: keys generation using 128-bit hash value of plain speech frame and the logistic, and encrypting the speech frame using chaotic sequences which are generated by Lorenz system. The overall block diagram of the proposed algorithm architecture can be illustrated by Figure 2.
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4824 - 4834 4826 Figure 2. Block diagram Below, we will provide an introductory definition of the Lorenz system and analyze its main positive features regarding to cryptography. Then, the steps to implement such a process of the encryption parts will be discuss. The decryption steps for completeness will also be illustrated. 2.1. Lorenz chaotic system Lorenz system is a dynamical system which was studied first by Edward Norton Lorenz around 1960 [24], This chaotic system is described by non-linear system of ordinary differential equations (i.e., ODEs) as given in (1). ẋ = a(y − x), ẏ = (σ − z)x − y, ż = xy − bz. (1) The real numbers a, σ, b are called the control parameters, where x, y, z are variables called the state variables, and ẋ, ẏ, and ż are the time derivatives of x, y, and z. Usually, the Lorenz system (1) is commonly solved numerically using RK45 (Runge-Kutta methods) for given control parameters, and initial values of the state variables (i.e., x0, y0, z0). In Figure 3 a chaotic attractor (i.e., Lorenz butterfly) of the dynamical Lorenz system (1) is presented. Figure 3. Chaotic attractor
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  A new dynamic speech encryption algorithm based on lorenz chaotic map (Obaida M. Al-Hazaimeh) 4827 For different values of parameter σ the dynamical system (1) exhibits chaos. By having positive Lyapunov exponents (i.e., sensitivity to initial conditions), chaos can be recognized for many dynamical systems, and in particular (1). In Figure 4, the maximum Lyapunov exponent of (1) versus values of σ are plotted. In this paper, we have fixed a and b to be a = 10, b = 8/3, and allow value of σ to dynamically vary in the interval [28, 90] to provide a large enough key-space to resist brute-force attacks. Moreover, this will guarantee that (1) has dense (chaotic) attractors, which is important in terms of cryptography; any change in initial conditions will cause trajectories to remain in the same attractor set, thus making it difficult to predict any outcome without knowing the exact initial conditions of the system as well as the iteration counts in the numerical solution. Figure 4. Maximum lyapunov exponents 2.2. Generation process for the initial values and parameters In the generation process, we utilize the 128-bit hash value of the plain-speech frame generated by MD5 hash function to dynamically change the initial secret keysx0, y0, z0and σ0. In the following steps, the generation process is described in the details. Algorithm 1: Generation process Step 1: Compute a 128-bit hash value K from the plain speech frame Bj, and then compute four 26-bit sequences as the following: 𝑥 𝑛 = digits(𝑥0 − floor(𝑥0), 26) 𝑦𝑛 = digits(𝑦0 − floor(𝑦0), 26) 𝑧 𝑛 = digits(𝑧0 − floor(𝑧0), 26) 𝜎 𝑛 = digits(𝜎0 − floor(𝜎0), 26) Step 2: Set 𝑟 = mod(count(𝜎 𝑛, 1), 13). Step 3: Set s = xn, yn, zn, 1100 to construct the 128-bit string. Step 4: Compute a new 128-bit hash-value by 𝐻 𝑁 = rotL(𝑠 XOR 𝐾, 𝑟), then divide 128-bit hash value into four 32-bit vectors: 𝐻 𝑁 = 𝑘1, 𝑘2, 𝑘3, 𝑘4. Step 5: Normalize the initial secret key to the interval (0, 1) using f(t) = (arctan(t) + π/2)/π as the following: 𝑥 𝑁 = 𝑓(𝑥0), 𝑦 𝑁 = 𝑓(𝑦0), 𝑧 𝑁 = 𝑓(𝑧0), σ 𝑁 = 𝑓(𝜎0). Step 6: Set 𝑛𝑖 = 100 + count(𝑘𝑖, 1), 𝑖 = 1, 2, 3, 4 to construct a four chaotic numbers 𝑙1, 𝑙2, 𝑙3, 𝑙4 ∈ (0, 1) by iterating the logistic map 𝑛1, 𝑛2, 𝑛3, and 𝑛4 times using the initial-values 𝑥 𝑁, 𝑦 𝑁, 𝑧 𝑁, σ 𝑁, respectively. Step 7: Finally, the following formula is used to compute the new four chaotic keys 𝑥̅, 𝑦̅, 𝑧̅, and σ̅: [𝑥̅ 𝑦̅𝑧̅] = [𝑥0 𝑦0 𝑧0] + [𝑙1 𝑙2 𝑙3] + 2−32 × [𝑘1 𝑘2 𝑘3], σ̅ = 14 + 15 × (𝑙4 + 2−32 𝑘4). 2.3. Encryption process In the encryption process, a several iterations over the plain speech frame that involves a set of operation such as substitutions, permutations, transformations, and transpositions are performed to complicate the process of decrypting cipher speech frame by cyber-intruders (i.e., unauthorized access) [25, 26]. In Figure 5 the block diagram of the proposed decryption process is presented. The speech encryption algorithm proposed in this paper consists of the following sequential steps:
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4824 - 4834 4828 Algorithm 2: Encryption process Step 1: Arrange the 20-ms speech frame in 𝐁 = {𝐵1, 𝐵2, … , 𝐵𝑗} of length 𝑗 = 132, each element is the 8-bit representation of the bit 0 (BIT-0: FF81) or the bit 1 (BIT- 1: 007F) of the coder parameters which is codified on 8 bits. Step 2: Set 𝑑̅ = floor(𝑑/13), then iterate the Lorenz system (1)using RK-45 method for (𝑑̅ + 1) times using the new initial-values 𝑥(0) = 𝑥̅, 𝑦(0) = 𝑦̅, and 𝑧(0) = 𝑧̅, and new control parameter 𝜎 = σ̅, to get three chaotic sequences 𝑋, 𝑌, and 𝑍. Then compute the following three sequences: 𝑋 𝑁 = {𝑥1, 𝑥2, … , 𝑥 𝑑̅+1}, 𝑌𝑁 = {𝑦1, 𝑦2, … , 𝑦 𝑑̅+1}, 𝑍 𝑁 = {𝑧1, 𝑧2, … , 𝑧 𝑑̅+1} for 𝑖 = 1, 2, … , 𝑑̅ + 1: 𝑥𝑖 = digits(𝑋𝑖 − floor(𝑋𝑖), 26), 𝑦𝑖 = digits(𝑌𝑖 − floor(𝑌𝑖), 26), 𝑧𝑖 = digits(𝑍𝑖 − floor(𝑍𝑖), 26). Step 3: Set 𝑑̃ = 𝑑̅ if (𝑑/13) is an integer. Otherwise, 𝑑̃ = 𝑑̅ + 1,. Then, partitioning the array 𝑷 into 𝑑̃ vectors as 𝑷 = 𝑃1, 𝑃2, … , 𝑃 𝑑̃ where, 𝑃𝑖 = 𝑝13(𝑖−1)+1, … , 𝑝13𝑖, 𝑃 𝑑̃ = 𝑝13𝑑̅+1, … , 𝑝 𝑑, 𝑖 = 1,2, … , 𝑑̅ Step 4: Construct the sequence 𝑈 = 𝑈1, 𝑈2, … , 𝑈 𝑑̃ with𝑈𝑖 = 𝐵𝑖, for 𝑖 = 1, 2, … , 𝑑̅, and 𝑈 𝑑̃ = digits(𝐵 𝑑̃, length(𝑃 𝑑̃)). Observe that length(𝑈𝑖) = 28 + 28 = 56bit = 7 × 8bit, and length(𝑃 𝑑̃) = (𝑑 − 13𝑑̅) × 8bit. Step 5: Construct rotations𝑟𝑖 = count(𝑧𝑖, 1), 𝑖 = 1, 2, … , 𝑑̃. Step 6: Finally, the cipher speech frame 𝐂 is obtained using the formula: 𝐶𝑖 = rotL(𝑈𝑖 𝑋𝑂𝑅 𝑃𝑖, 𝑟𝑖), 𝑖 = 1,2, … , 𝑑̃. Figure 5. Decryption algorithm 3. SIMULATION RESULT AND SECURITY ANALYSIS This section discusses the proposed speech encryption algorithm, which simulated on a 1.6 GHz core (TM) i5, 1-TB hard disk capacities and 4-GB memory with MATLAB software. In this section, as an example, different speech samples of audio files are selected with different sampling rate (i.e., 5000 samples per second). The simulation result was validated by applying the statistical tests such as histogram analysis, correlation, randomness, and sensitivity to prove the performance metrics [22]. Below, standardized tests are given. 3.1. Histogram analysis test To evaluate the quality of encrypted speech signals, this analysis is the most accurate test. Practically, the proposed algorithm is likely to encrypt the plain speech signals in a random manner (i.e., noisy signals). Histogram of the input speech signals are illustrated in Figure 6(a) and Figure 6(d). The corresponding histogram of the encrypted speech signals using the secret keys: x0, y0, z0, σ0, and 128-bit hash value of the speech signals are illustrated in Figure 6(b) and Figure 6(e). The results in Figure 6 shows that the histograms of the encrypted speech signals are fairly uniform distributed and totally different from the plain speech signals. In addition, the result indicates that the proposed algorithm can be decrypted correctly with the correct keys as illustrated in Figure 6(c) and Figure 6(f).
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  A new dynamic speech encryption algorithm based on lorenz chaotic map (Obaida M. Al-Hazaimeh) 4829 (a) (d) (b) (e) (c) (f) Figure 6. Histogram analysis, (a) Input speech signal_1, (b) Encrypted speech signal_1, (c) Decrypted speech signal_1, (d) Input speech signal_2, (e) Encrypted speech signal_2, (f) Decrypted speech signal_2 3.2. Correlation test The chaotic system was found to produce a strong encryption method, which can be efficiently identified by correlation method [23]. The correlation method is computed as (2). 𝑟𝑥𝑦 = cov(𝑥,𝑦) √ 𝐷(𝑥)√𝐷(𝑦) (2)
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4824 - 4834 4830 where cov(𝑥, 𝑦) = 1 𝑁 ∑ (𝑥𝑖 − 𝐸(𝑥))(𝑦𝑖 − 𝐸(𝑦))𝑁 𝑖=1 , 𝐸(𝑥) = 1 𝑁 ∑ 𝑥𝑖 𝑁 𝑖=1 , 𝐷(𝑥) = 1 𝑁 ∑ (𝑥𝑖 𝑁 𝑖=1 −𝐸(𝑥))2 , where N is the number of speech samples. In proposed algorithm, the correlation coefficient cov(x, y) between the plain and the ciphered speech samples are tabulated in Table 1. The result in Table 1 shows that the proposed speech encryption algorithm is efficient enough, because the correlation test has been satisfied that would resist statistical attacks. Table 1. Correlation test File Name Original Encrypted Sample_1.wav 0.98153 0.000992 Sample_2.wav 0.98726 0.000642 Sample_3.wav 0.99114 0.001765 Sample_4.wav 0.96241 0.001357 3.3. Randomness tests To measure the strength of the encrypted speech frames against cryptanalysis attacks, we have performed a different suite of statistical tests in this section known as DIEHARD (i.e., 18-tests) and NIST (i.e., 15-tests) test suite [23, 27]. For given sequence, these suites are designed mainly to measure the quality of the randomness. As can be seen from Table 2 and Table 3, the p-value of each test ranges from 0.01 to 0.99 (i.e., success range), which means the encrypted sequence is random at the 99% of confidence level. Table 2. DIEHARD tests suite Test No. p-value Result 1 0.508955 Testing passed 2 0.352178 Testing passed 3 0.985131 Testing passed 4 0.432234 Testing passed 5 0.577165 Testing passed 6 0.531168 Testing passed 7 0.579962 Testing passed 8 0.461181 Testing passed 9 0.534275 Testing passed 10 0.440085 Testing passed 11 0.537715 Testing passed 12 0.698621 Testing passed 13 0.700913 Testing passed 14 0.385725 Testing passed 15 0.700982 Testing passed 16 0.672727 Testing passed 17 0.700116 Testing passed 18 0.071163 Testing passed Table 3. NIST tests suite Test No. p-value Result 1 0.644569 Testing passed 2 0.537212 Testing passed 3 0.822953 Testing passed 4 0.691672 Testing passed 5 0.287185 Testing passed 6 0.279095 Testing passed 7 0.513448 Testing passed 8 0.436158 Testing passed 9 0.214367 Testing passed 10 0.433041 Testing passed 11 0.207415 Testing passed 12 0.387142 Testing passed 13 0.597824 Testing passed 14 0.509732 Testing passed 15 0.484727 Testing passed
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  A new dynamic speech encryption algorithm based on lorenz chaotic map (Obaida M. Al-Hazaimeh) 4831 3.4. Information entropy Information entropy is used usually as a measure of disorder, or randomness in encrypted speech signal [28]. The entropy function 𝐻(𝑠)of a source s can be computed as (3). 𝐻(𝑠) = ∑ 𝑃(𝑠𝑖) log2 1 𝑃(𝑠 𝑖) 2𝑁−1 𝑖=1 (3) where P(Si) represents Si probability. The entropy value for the encrypted speech signals should ideally be 8. In other words, if the entropy value of the encrypted speech signals is less than 8, then the predictability threats to the encrypted speech signals are exists. In this paper, ENT test suite is used to calculate the information entropy value. Practically, ENT is a suite composed of the following three tests: entropy, serial correlation, and chi-square coefficient as shown in Table 4. From these results, the obtained values are evaluated to be almost as the theoretical value, which means that the proposed speech encryption algorithm is efficient enough (i.e., secure) upon the cryptanalysis attacks (i.e., entropy). Table 4. ENT test suite No. ENT test suite Theoretical value Obtained value 1 Entropy Close to 8 7.999986 2 Serial correlation Close to 0 0.000381 3 Chi-square coefficient Close to 127.5 127.5019 3.5. Key sensitivity test To ensure the security against brute-force attacks, the excellent encrypted speech quality must be sensitive in extreme way with respect to the secret keys [24, 29]. In the proposed algorithm, any slightly change (i.e., bit flip) on the following sensitivity factors: hash values, keys, and other encryption keys such as parameters that would generate a completely different decryption results as shown in Figure 7. (a) (b) (c) (d) Figure 7. Key sensitivity, (a) Input speech signal, (b) Decrypted speech signal with correct key, (c) Decrypted speech signal with incorrect key hash value, (d) Decrypted speech signal with incorrect x0
  • 9.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4824 - 4834 4832 4. COMPARISON WITH EXISTING WORKS There are several types of delay in the current IP telephony networks such as processing (i.e., coder, decoder, digital signal processing), serialization, queuing, propagation, and network delay as shown in Figure 8. Some of them are fixed while others are variable as illustrated in Table 5. IP telephony applications are delay sensitive. Therefore, the ITU-T has recommended that the maximum threshold of the delay time (i.e., ∑delay sources) is 150 ms [2, 5, 6]. The adaptive multi-rate wideband (AMR-WB G.722.2) speech codec is used in this paper to collect N speech samples as one frame because it supports the GSM features such as discontinuous transmission, comfort noise generation, and voice activity detection [30]. Figure 8. Packet flow Table 5. Delay source Delay source Formula Description Delay type Coder 𝐶 𝐷 = (2𝑁 + 1) ∗ 𝐹𝑟𝑎𝑚𝑒 𝑆𝑖𝑧𝑒 + 𝐿𝑜𝑜𝑘 𝑎ℎ𝑒𝑎𝑑 𝑡𝑖𝑚𝑒 Collect the speech samples as frames. Fixed Decoder 𝐷 𝐷 = 𝐶 𝐷 2 Playback of the coder process. Fixed Serialization 𝑆 𝐷 = 𝐹𝑟𝑎𝑚𝑒 𝑆𝑖𝑧𝑒 𝐼𝑛𝑡𝑒𝑟𝑓𝑎𝑐𝑒 𝐶𝑙𝑜𝑐𝑘𝑖𝑛𝑔 𝑅𝑎𝑡𝑒 Time to clock a speech frame onto a network interface. Fixed Queuing 𝑄 𝐷 = (𝑉𝑜𝑖𝑐𝑒 𝐹𝑟𝑎𝑚𝑒 𝑆𝑖𝑧𝑒 + 5120) 𝐿𝑖𝑛𝑒 𝑆𝑝𝑒𝑒𝑑 Time the voice packet spends in router. Variable Network 𝑁 𝐷 = 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑅𝑜𝑢𝑡𝑒𝑟𝑠 ∗ (𝑄 𝐷+𝑆 𝐷) Time the voice packet spends to go from one point to another. Variable Propagation Caused by the light speed in copper-based networks (i.e., 125,000 miles per second), or in fiber (i.e., 186,000 miles per second) Fixed Security Caused by the encryption and decryption processes. Fixed A practical comparison on the average time delay between advanced encryption standard algorithm and proposed algorithm in the same environment and conditions is made in this section. In end-to-end delay, the implementation result shows that the average time delay to encrypt the speech data using the proposed algorithm is 2.287701494 ms and the average time delay to encrypt the speech data using AES is 2.7832762824 ms as illustrated in Table 6 and Table 7 respectively. In other words, a column chart showing the AES algorithm is slower than the proposed speech encryption algorithm is presented in Figure 9. Table 6. End-to-end delay time for fast Ethernet using the proposed speech encryption algorithm
  • 10. Int J Elec & Comp Eng ISSN: 2088-8708  A new dynamic speech encryption algorithm based on lorenz chaotic map (Obaida M. Al-Hazaimeh) 4833 Table 7. End-to-end delay time for fast ethernet using AES algorithm Figure 9. Average delay time 5. CONCLUSION In this paper we have achieved our objective of designing a dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol to enhance the real-time services. The proposed algorithm was divided into two processes: key generation process using 128-bit hash value, and encryption and decryption process using Lorenz system. To evaluate the security level of the proposed algorithm, efficient simulations and implementations and analysis have been conducted. The security level is increased by using a multi key with every new speech packet and increasing a key length which protects the proposed algorithm against various cryptanalysis attacks. In addition, a comparison between the average time delay in the proposed algorithm and some of the existing encryption algorithms is made. The results endorse that the proposed algorithm achieved a higher security level with a lowest average delay time and it is an excellent choice for voice communication in practical applications in the Internet. REFERENCES [1] B. Goode, “Voice over internet protocol (VoIP),” Proceedings of the IEEE, vol. 90, no. 9, pp. 1495-1517, 2002. [2] H. Oouch, et al., “Study on appropriate voice data length of IP packets for VoIP network adjustment,” in Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE, vol. 2, pp. 1618-1622, 2002. [3] R. Dantu, et al., “Issues and challenges in securing VoIP,” Computers & Security, vol. 28, no. 8, pp. 743-753, 2009. [4] O. M. Al-Hazaimeh, “Increase the security level for real-time application using new key management solution,” International Journal of Computer Science Issues (IJCSI), vol. 9, no. 3, pp. 240-246, 2012. [5] S. Na and S. Yoo, “Allowable propagation delay for VoIP calls of acceptable quality,” in Proceedings of the First International Workshop on Advanced Internet Services and Applications, pp. 47-56, 2002. [6] O. M. Al-Hazaimeh, “New cryptographic algorithms for enhancing security of voice data,” Thesis, Universiti Utara Malaysia, 2010. [7] M. Zandi, et al., “Overview of security issues of VoIP,” in Proceedings of the Third IASTED European Conference on Internet and Multimedia Systems and Applications, pp. 254-259, 2007. [8] J. Seedorf, “Security challenges for peer-to-peer SIP,” IEEE Network, vol. 20, no. 5, pp. 38-45, 2006. [9] O. M. Al-Hazaimeh, “Combining audio samples and image frames for enhancing video security,” Indian Journal of Science and Technology, vol. 8, no. 10, p. 940, 2015. [10] E. Schaefer, “An introduction to cryptography and Cryptanalysis,” California's Silicon Valley: Santa Clara University, pp. 4-5, 2009. [11] M. Mishra and V. H. Mankar, “Review on chaotic sequences based cryptography and cryptanalysis,” International Journal of Electronics Engineering, vol. 3, no. 2, pp. 189-194, 2011.
  • 11.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4824 - 4834 4834 [12] O. M. Al-Hazaimeh, et al., “A novel video encryption algorithm-based on speaker voice as the public key,” in 2014 IEEE International Conference on Control Science and Systems Engineering, pp. 180-184, 2014. [13] C. T. Elrod, “VoIP security,” Google Patents, US8295188B2, 2012. [14] M. Šalamon, “Chaotic electronic circuits in cryptography,” in Applied cryptography and network security, pp. 295-320, 2012. [15] E. Mosa, et al., “Chaotic encryption of speech signals,” International Journal of Speech Technology, vol. 14, no. 4, pp. 285-26, 2011. [16] L. J. Sheu, “A speech encryption using fractional chaotic systems,” Nonlinear dynamics, vol. 65, no. 1, pp. 103-108, 2011. [17] P. Sathiyamurthi and S. Ramakrishnan, “Speech encryption using chaotic shift keying for secured speech communication,” EURASIP Journal on Audio, Speech, and Music Processing, vol. 2017, no. 1, pp. 20-30, 2017. [18] H. T. Yau, et al., “Application of a chaotic synchronization system to secure communication,” Information technology and control, vol. 41, no. 3, pp. 274-282, 2012. [19] M. S. Azzaz, et al., “Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 8, pp. 2035-2047, 2013. [20] F. J. Farsana, et al., “An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams,” Applied Computing and Informatics, 2019. [21] K. Kordov, “A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture,” Electronics, vol. 8, pp. 530-544, 2019. [22] C. E. Shannon, “Communication theory of secrecy systems,” The Bell system technical journal, vol. 28, no. 4, pp. 656-715, 1949. [23] W. Chang, et al., “Randomness testing of compressed data,” arXiv preprint arXiv:1001.3485, 2010. [24] O. M. Al-Hazaimeh, et al., “Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys,” Neural Computing and Applications, pp. 1-11, 2017. [25] R. S. Mohammed and S. B. Sadkhan, “Speech scrambler based on proposed random chaotic maps,” in 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), pp. 1-6, 2016. [26] A. K. Mittal, et al., “Secure communication based on chaotic switching and rapid synchronization using parameter adaptation,” International Journal of Innovative Computing, Information and Control, vol. 11, no. 2, pp. 569-585, Apr 2015. [27] J. Soto, “Statistical testing of random number generators,” in Proceedings of the 22nd national information systems security conference, 1999. [28] X. Zhang and Z. Zhao, “Chaos-based image encryption with total shuffling and bidirectional diffusion,” Nonlinear Dynamics, vol. 75, no. 1-2, pp. 319-330, 2014. [29] J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and chaos, vol. 8, no. 6, pp. 1259-1284, 1998. [30] M. Boumaraf and F. Merazka, “Speech Coding Combining Chaos Encryption and Error Recovery for G. 722.2 Codec,” in Proceedings of the 3rd International Conference on Natural Language and Speech Processing, pp. 128-134, 2019. BIOGRAPHY OF AUTHOR Obaida M. Al-Hazaimeh received his BSc in Computer Science from Applied Science University, Jordan in 2004 and MSc in Computer science from University Science Malaysia, Malaysia, in 2006. He received his PhD degree in Network Security (Cryptography) from Malaysia in 2010. He is an associate professor at department of computer science and information technology, Al-Balqa' Applied University, Jordan. His main research interests are Cryptology, image processing, machine learning, and chaos theory. He has published more than 34 Papers as author and Co-author in international refereed journals.