Research Article
Chaotic Masking of Voice Bitstream Using Mixed Sequences for Authorized Listening
@INPROCEEDINGS{10.1007/978-3-642-27308-7_64, author={Musheer Ahmad and Bashir Alam and Omar Farooq}, title={Chaotic Masking of Voice Bitstream Using Mixed Sequences for Authorized Listening}, proceedings={Advances in Computer Science and Information Technology. Computer Science and Engineering. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part II}, proceedings_a={CCSIT PATR II}, year={2012}, month={11}, keywords={Voice communication security chaotic systems voice encryption}, doi={10.1007/978-3-642-27308-7_64} }
- Musheer Ahmad
Bashir Alam
Omar Farooq
Year: 2012
Chaotic Masking of Voice Bitstream Using Mixed Sequences for Authorized Listening
CCSIT PATR II
Springer
DOI: 10.1007/978-3-642-27308-7_64
Abstract
The voice-based communication becomes extensively vital in the application areas of military, voice over IP, voice-conferencing, phone banking, news telecasting etc. It greatly demands to preserve sensitive voice signals from the unauthorized listening and illegal usage over shared/open networks. To address the need, we propose a chaos-based symmetric encryption technique to protect voice bitstreams over insecure transmission channel. The technique utilizes the features of high dimensional chaos like Lorenz and Chen systems to generate highly unpredictable and random-like sequences. The encryption keys are dynamically extracted from the pretreated chaotic mixed sequences, which are then used to mask the voice bitstream for integrity protection of voice data. The experimental analyses like auto-correlation, signal distribution, parameter-residual deviation, key space and key-sensitivity demonstrate the effectiveness of the proposed technique for secure voice communication.