Advances in Computer Science and Information Technology. Computer Science and Engineering. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part II

Research Article

Chaotic Masking of Voice Bitstream Using Mixed Sequences for Authorized Listening

Download
239 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-27308-7_64,
        author={Musheer Ahmad and Bashir Alam and Omar Farooq},
        title={Chaotic Masking of Voice Bitstream Using Mixed Sequences for Authorized Listening},
        proceedings={Advances in Computer Science and Information Technology. Computer Science and Engineering. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part II},
        proceedings_a={CCSIT PATR II},
        year={2012},
        month={11},
        keywords={Voice communication security chaotic systems voice encryption},
        doi={10.1007/978-3-642-27308-7_64}
    }
    
  • Musheer Ahmad
    Bashir Alam
    Omar Farooq
    Year: 2012
    Chaotic Masking of Voice Bitstream Using Mixed Sequences for Authorized Listening
    CCSIT PATR II
    Springer
    DOI: 10.1007/978-3-642-27308-7_64
Musheer Ahmad1, Bashir Alam1, Omar Farooq2
  • 1: Jamia Millia Islamia
  • 2: AMU

Abstract

The voice-based communication becomes extensively vital in the application areas of military, voice over IP, voice-conferencing, phone banking, news telecasting etc. It greatly demands to preserve sensitive voice signals from the unauthorized listening and illegal usage over shared/open networks. To address the need, we propose a chaos-based symmetric encryption technique to protect voice bitstreams over insecure transmission channel. The technique utilizes the features of high dimensional chaos like Lorenz and Chen systems to generate highly unpredictable and random-like sequences. The encryption keys are dynamically extracted from the pretreated chaotic mixed sequences, which are then used to mask the voice bitstream for integrity protection of voice data. The experimental analyses like auto-correlation, signal distribution, parameter-residual deviation, key space and key-sensitivity demonstrate the effectiveness of the proposed technique for secure voice communication.