Skip to main content <#maincontent> We will keep fighting for all libraries - stand with us! Internet Archive logo A line drawing of the Internet Archive headquarters building façade. Search icon An illustration of a magnifying glass. Search icon An illustration of a magnifying glass. Upload icon An illustration of a horizontal line over an up pointing arrow. Upload User icon An illustration of a person's head and chest. Sign up | Log in Web icon An illustration of a computer application window Wayback Machine Texts icon An illustration of an open book. Books Video icon An illustration of two cells of a film strip. Video Audio icon An illustration of an audio speaker. Audio Software icon An illustration of a 3.5" floppy disk. Software Images icon An illustration of two photographs. Images Donate icon An illustration of a heart shape Donate Ellipses icon An illustration of text ellipses. More Hamburger icon An icon used to represent a menu that can be toggled by interacting with this icon. Internet Archive Audio Live Music Archive Librivox Free Audio Featured * All Audio * This Just In * Grateful Dead * Netlabels * Old Time Radio * 78 RPMs and Cylinder Recordings Top * Audio Books & Poetry * Computers, Technology and Science * Music, Arts & Culture * News & Public Affairs * Spirituality & Religion * Podcasts * Radio News Archive Images Metropolitan Museum Cleveland Museum of Art Featured * All Images * This Just In * Flickr Commons * Occupy Wall Street Flickr * Cover Art * USGS Maps Top * NASA Images * Solar System Collection * Ames Research Center Software Internet Arcade Console Living Room Featured * All Software * This Just In * Old School Emulation * MS-DOS Games * Historical Software * Classic PC Games * Software Library Top * Kodi Archive and Support File * Vintage Software * APK * MS-DOS * CD-ROM Software * CD-ROM Software Library * Software Sites * Tucows Software Library * Shareware CD-ROMs * Software Capsules Compilation * CD-ROM Images * ZX Spectrum * DOOM Level CD Books Books to Borrow Open Library Featured * All Books * All Texts * This Just In * Smithsonian Libraries * FEDLINK (US) * Genealogy * Lincoln Collection Top * American Libraries * Canadian Libraries * Universal Library * Project Gutenberg * Children's Library * Biodiversity Heritage Library * Books by Language * Additional Collections Video TV News Understanding 9/11 Featured * All Video * This Just In * Prelinger Archives * Democracy Now! * Occupy Wall Street * TV NSA Clip Library Top * Animation & Cartoons * Arts & Music * Computers & Technology * Cultural & Academic Films * Ephemeral Films * Movies * News & Public Affairs * Spirituality & Religion * Sports Videos * Television * Videogame Videos * Vlogs * Youth Media Search the history of over 835 billion web pages on the Internet. Search the Wayback Machine Search icon An illustration of a magnifying glass. Mobile Apps * Wayback Machine (iOS) * Wayback Machine (Android) Browser Extensions * Chrome * Firefox * Safari * Edge Archive-It Subscription * Explore the Collections * Learn More * Build Collections Save Page Now Capture a web page as it appears now for use as a trusted citation in the future. Please enter a valid web address * About * Blog * Projects * Help * Donate * Contact * Jobs * Volunteer * People * Sign up for free * Log in Search metadata Search text contents Search TV news captions Search radio transcripts Search archived web sites Advanced Search * About * Blog * Projects * Help * Donate Donate icon An illustration of a heart shape * Contact * Jobs * Volunteer * People Full text of "Hiding of Speech based on Chaotic Steganography and Cryptography Techniques " See other formats International Journal of Engineering Research Volume No.4, Issue No.4, pp : 165-172 ISSN:2319-6890(online),2347-5013(print) 01 April 2015 Hiding of Speech based on Chaotic Steganography and Cryptography Techniques Abbas Salman Hameed Assistant Lecturer, Electronic Engineering Department, College of Engineering, Diyala Universityjraq Email: abbasfuture@yahoo.com Abstract: The technique of embedding secret information into cover media, like image, video, audio and text called Steganography, so that only the sender and the authorized recipient who have a key can detect the presence of secret information. In this paper Steganography and Cryptography techniques of speech present with Chaos. Fractional order Lorenz and Chua systems that provides an expanded in key space are used to encrypt speech message. The large key space addition to all properties of randomness and nonlinearity which are possessed these chaotic systems ensure a highly robustness and security for cryptography process. As well as Modified Android Cat Map (MACM) offers additional space and security for steganography process. The irregular outputs of the MACM are used in this paper to embed a secret message in a digital cover image. The results show a large key sensitivity to a small change in the secret key or parameters of MACM. Therefore, highly security hiding for speech will be guaranteed by using this system. Key Words: Steganography, Cryptography, Fractional Order chaotic system, Modified Android Cat Map 1. Introduction: In the digital world, data is the heart of computer communication and global economy. To ensure the security of the data, the concept of data hiding has attracted people to come up with creative solutions to protect data from falling into wrong hands [1]. Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Steganography works by replacing bits of useless or unused data (embedded) in regular computer files (such as graphics, sound, text, or HTML) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images [2] . To add more security, the data to be hidden is encrypted with a key during the embedding process. To extract the hidden information, one should have the key. Steganography and cryptography are the two different information hiding techniques which provide confidentiality and integrity of data. Steganography technique aims at transmitting a message on a channel. The goal of steganography is to hide messages inside other "harmless" digital media in a way that does not allow any person to even detect the presence of secret message. Cryptography hides the contents of a secret message from an unauthorized people but the content of the message is visible. In cryptography, the structure of a message is scrambled in such a way as to make it meaningless and unintelligible manner [1,3]. For Cryptography process, Chaos is a typical behavior of nonlinear dynamic systems. It is characterized by extremely sensitive to parameters and initial conditions, mathematically defined as randomness governed by simple deterministic rules [4]. A high dimensional chaotic system like Lorenz or Chua system will give a more complex structure, more system variables, and parameters. Then the crypto system's key space will be larger for integer orders, and the system variables time sequence will be more erratic and unpredictable than using the low dimension chaotic system [5]. This paper demonstrates Encryption of speech using fractional order chaotic systems (Non integer orders) to increase the security level of generated key then embedded the encrypted data in cover image after applied Modified Arnold Cat Map (MACM) to shuffle the image pixels before embedded process. The paper is organized as follows; section 2 describes the Fraction Order Lorenz and Chua systems and the Chaotic Key Generation. Section 3 shows the embedded process using MACM. The system model of steganography and encrypted speech is presented in section 4. In section 5, the simulation results of hiding and encryption speech message using chaos are presented. Finally, conclusions are presented in section 6. 2. Chaotic Cryptography: Chaos is one of the possible behaviors associated with evolution of a nonlinear physical system and occurs for specific values of system parameters. Chaotic systems have many important properties, such as the sensitive dependence on initial conditions and system parameters, pseudorandom property, no periodicity and topological transitivity, etc. Most properties meet some requirements such as diffusion and mixing in the sense of cryptography. Therefore, chaotic cryptosystems have more useful and practical applications [6] . Chaotic systems can be divided into those described by differential equations, known as flows such as: Lorenz System [7], Rossler System [8], Chua system [9]. And those described by difference equations, known as maps such as: logistic map [8], Henon map [10], Arnold Cat Map (ACM) [11],... etc. 2.1 Fraction Order Lorenz and Chua systems: The mathematical description of the fractional-order Lorenz system is expressed as [5]: D sl x = a L (y - x) D c2 y - -xz -f pi x - y D" 2 z = xy — 0 L z where (a L , p L , p L ) are system parameters ,(al, a2 and a3) determine the fractional orders of the equation and (a 1, a2, IJER@2015 Page 165 International Journal of Engineering Research Volume No.4, Issue No.4, pp : 165-172 a3 > 0) . When al= a2= a3 = 1, Eq. 1 becomes the ordinary integer orders Lorenz system. Whereas, the mathematical description for fractional -order Chua system [12], can be expressed as: D n x = v c (y - x) - (r c F(x) D^y =x-y+Z (2] Fix) = m L x -f (m D - m t ) * (\x + l| - \x - ll) where (a c , Pc ? Pc> mo, W\) are system parameters ,(yl, y2 and y 3) determine the fractional orders of the equation and (yl, y2, y3> 0). The solution of fractional-order Lorenz system using Fractional Backward Difference Methods [13] can be written as: ( x n = k" 1 *[a L * (y^-t - iJ] ~~ ^ w k x(m - k-j (3) 3*11 = ^ * [-^in-l. * *r*-l + Pi - ic = i And for Chua system can be written as: x r; = h yL * [a c * C>' m -i - Xn-i) - cr c * Fix") ] ... m — ^ Wfrx(rn — kfr) C4) where /z, is step size parameter and m = 0,1,2,..,N. The coefficients w k can be computed in a recursive scheme (with w 0 = l)by / p + 1\ w-k = j^— Jwk_ l (5] where is a or y order corresponding to chaotic sequence type. 2.2 Chaotic Key Generation: To generate chaotic key used to encrypt the speech message, the sequences generated from fraction-order Lorenz system and fraction-order Chua system are pre-processing by magnification and modulo transformation to the two chaos types sequences as: (M L (;nj = mod(floor(.M L (:n) X 10 L5 X 2' Y ) for Lorenz Utf c (n) =modffloor(M c (rd xlQ 16 X2 jV ) for Chua (6] where M L and M c , are (x, y, z) sequences for Lorenz and Chua respectively. N is maximum number of bits required to quantize M into an integer sequence. Then, to make proposed system more secure, the fractional - order of Lorenz and Chua sequences are combined together by using XOR to get new chaotic sequences as in Eq. 7. ISSN:2319-6890(online),2347-5013(print) 01 April 2015 XfeO = BITXOR(x L ^n) f y c M f z L (n}) K 2 (n) = BITXQR(x c {n) f y L GO, z c W ) (7] ,K 2 (n) = BITX0R(x L (nl.x c (7{}) The combined of these sequences are improved the security level of the system by enhancing the encryption process complexity, the key space and the robustness of the cryptosystem. To get highly random and uncorrelated key, ^i(n) and K 2 (n) are fed to a 2x1 multiplexer which dynamically selects one of randomly key dependent on random value of ^(n) to produce the next member of output keystream as shown in Fig. 1. - z< i no 1 — ► laotic — ► U — ► 2x1 MUX -> Key Generated Fig. 1 Block diagram of Chaotic Key Generation. 3. Embedded Data using ACM: Digital covers have a large number of redundant bits such least significant bits (LSB). In the substitution technique of steganography, the bits of the secret message substitute the LSB of the bytes of the cover file without causing a drastic change to this cover file [14]. To increase the security of embedded process, a secret message is embedded in the irregular output pixels of the Arnold Cat Map (ACM) that is applied on a digital cover image. ACM is used in the embedding process in order to improve the image hiding safety and visual quality of the extracted message. Which when applied to a digital image randomizes the original organization of its pixels and the image becomes imperceptible or noisy. So, the secret message will become chaotic on the embedding process and if the receiver side wants to extract the secret message it should know the exact location which was used for embedding. In this way, it is becoming exponentially hard to recover the initial message without knowing the original transformation or the secret key. However, ACM has a period p to shuffle image pixels and if iterated p number of times, the original image reappears [15]. The generalized form of ACM can be given by the transformation [15]. r : T 2 -*T 2 such that: £)=( \ ^)(J)(modN) (8) where, x, y {0, 1, 2 ... N —1} and N is the size of a digital image. It can easily be seen that the original Arnold transformations given by Eq. 8 can be modified to produce a sequence of Modified Arnold Cat Map (MACM) [15] by introducing new three parameters (a,b,c) to increase and ensure high security implementation as: IJER@2015 Page 166 International Journal of Engineering Research Volume No.4, Issue No.4, pp : 165-172 V c ~ -1 ( v )(modN) (9) b + . Lc 1 -h c b where a,b and c are positive integer values considered as a control parameters and (a, b, c)E R, x' and y' are the coordinate values of the shuffled pixel. 4. SYSTEM MODEL: The proposed system is shown in Fig. 2. First, the speech signal is preprocessed and quantized to get the corresponding speech bitstream. The speech bitstream is then XORed with the chaotic Key generation as in section 2.2 to generate encrypted data. Before embedded the encrypted speech message in image pixel, the cover image is permutated using MACM with p iteration and (a, b, c) parameters to increase and ensure high security implementation. After that, inverse process of Modified Arnold Cat mapping (IMACM) is done on the image to rearrangement the image coordinate values of the shuffled pixel, and then the result stego image is transmitted. Received Speech message Dequantizer Decrypted data M Extract Embedded l^j C Encrypted data Initial value for Lorenz x(0)v(0)z(0) Initial value for Chua x(0)v(0)z(0) TTT Chaotic Key Generation Stego image transmitted with secret message MACM parameter p a b c Secret speech message Quantizer ST - Encrypted data il Embedded process Cover image Transmitted side Fig. 2 Block Diagram of Proposed Hiding and Encryption Speech at Transmitted Side, Decryption and Extraction at Receiver Side. At the receiver side, MACM must be performed on the received stego image to extracted encrypted data. Then the decrypted process is executed by the same chaotic key used in transmitted side. 5. Simulation Results: The simulation uses the following referencing speech file: "Army moves toward the enemy and should be fighting at zero moment" . The speech signal is sampled at 8 kHz and is quantized with 10 bits / sample, 58.6 k byte with respect to 60 msec, as shown in Fig. 3. Fig. 3 Original Speech Signal. ISSN:2319-6890(online),2347-5013(print) 01 April 2015 In this simulation, Grayscale image of size 800x800 pixels is used as a cover image to test the proposed algorithm. The images used are shown in Fig. 4. Fig. 4 Grayscale Parrot Cover Image. 5.1 Test of Chaotic Cryptography: The fraction-order Lorenz system used to generate secure chaotic key has these qualifications:- Fraction order: al=0.96, a2=0.98, a3=l.l. The control parameters: o L =10, Pl=28, p L =8/3. The initial conditions: jc(0)=0.1j(0)=-0.1, z (0)=20. Integer step-size: h=0.01. And fraction-order Chua system is based on these qualifications:- Fraction order: y 1=0. 97, y2=l, y3=1.01. The control parameters: a c =10, p c =14.78, p c =0.0385, m 0 =-1.27, mi=-0.68. The initial conditions: jc(0)= 0.2, y(0)= 0.1, z(0)= 0.1. Integer step-size: h=0. 01. The encrypted and decrypted speech generated by using chaotic key has these parameters are shown in Fig. 5. 1111 II I II II 1 1 III 1 1 1 II lllllllll'll^llllllllll Encrypted Speech 0.5 - 0.4 - Decrypted Speech Fig. 5 Encrypted and Decrypted Speech using Chaotic Key. 5.1.1 Sensitivity to Fractional Orders: The sequences response of Chaos is very sensitive to any small change in fraction-order values. To show that, for the Lorenz, x time response for two identical systems with the IJER@2015 Page 167 International Journal of Engineering Research Volume No.4, Issue No.4, pp : 165-172 ISSN:2319-6890(online),2347-5013(print) 01 April 2015 same parameters but starting from different fractional orders, 10" 6 to be difference, is shown in Fig. 6. Fig. 6 Time series of variables x for Lorenz system. As well, Fig. 7 shows x time response for two Chua system with the same parameters but starting from different fractional orders, 10" 6 to be difference. Fig. 7 Time series of variables x for Chua system. Also, test effect of all fraction-order of Lorenz system on the decrypted speech signal is done. Fig. 8 shows the decrypted process of the signal that is generation with chaotic key has default parameters, with three chaotic keys have same parameters except only one parameter of key is changed at a time by 10 ° respectively. as ai=0.960001, a 2 =0.980001, and =0.1OOO01 0 10 20 30 40 50 60 Time Decrypted Speech with y(0}= -0.100001 Fig. 10 Decrypted Process with Deference in Initial Values of Lorenz System. As well, to show the key sensitivity for initial values of Chua system, three chaotic keys will be tested in decrypted process. Each of them only changes the one of initial vales at a time and keeping all other parameters of chaotic key unchanged as Jt(tf)=0.200001, y(0)= 0.100001, and z(0)=0A0000l respectively. The results are shown in Fig. 11. 0 10 20 30 40 50 60 Time Decrypted Speech with xfO) =0.200001 Time Decrypted Speech with \(0)= 0.100001 0 10 20 30 40 50 60 Decrypted Speech with zCO)=0. 100001 Fig. 11 Decrypted Process with Deference in Initial Values of Chua System. 5.1.3 Sensitivity to control parameters: To test the effect of small change in control parameters for Lorenz or Chua system, Fig. 12 shows decrypted speech by the two chaotic key generated with small change in one control parameter at atime compared with defualt parameter used to generate chaotic key at transmitted side as a L = 10.000001, p c = 14.780001 respectively, as example, at the received side. 0 10 20 30 40 50 60 Time Decrypted Speech with O |_ = 10 000001 IJER@2015 Page 169 International Journal of Engineering Research Volume No.4, Issue No.4, pp : 165-172 ISSN:2319-6890(online),2347-5013(print) 01 April 2015 Decrypted Speech with P C = 14 780001 Fig. 12 Decrypted Process with Deference in a L , p c of Lorenz and Chua System Table 1 , summarized the similarity between extracted secret speech message and original secret speech corresponding to a tiny amount of 10" 6 change in one parameters only at a time for received chaotic key. The similarity is computed using normalized correlation NC between them according to Eq. 10. NC = (10) where M and M' are original and extracted secret speech messages respectively, QN represents number of samples in each one of them [ 16] Table 1, summarized the similarity between original and recovered speech. Parameter Parameter changed by NC changed by NC 10" 6 10" 6 Hi -0.041 yl -0.0022 a2 -0.0313 y2 -0.0056 a3 0.0034 y3 -0.015 X (O)Lorenz -0.0416 x (0)chua -0.0022 y(P) Lorenz 0.061 y(0) Chua -0.0123 Lorenz 0.013 Z(0) Chua 0.0598 0.0813 °c 0.081 PL 0.0177 Pc -0.003 PL 0.005 Pc -0.0029 No parameters changed NC = 1 Table 1, shows highly sensitivity for a tiny change in any parameters of chaotic key system. 5.2 Test of Steganography Using MA CM: The Modified Arnold Cat Mapping (MACM) used to increase and ensure high security implementation for data hiding in images by introducing new parameters (a, b, c, and p) used to shuffle the coordinate values of cover image pixel to a new coordinates corresponding to these parameters and Eq. 9. The values of MACM parameters will be used in this work are: a=2, b=3, c=5, and p=3 iteration. Fig. 13 shows the image generated by using MACM before embedded the encrypted speech message, the transmitted stego image with secret speech message, and decrypted speech extracted from received stego image after applied MACM on it. Cover Image after Applied MACM Transmitted Stego Image with secret speech message Time Decrypted Speech from Stego Image Fig. 13 MACM Image, Transmitted Stego Image, and received Speech. From Fig. 13, The received speech signal is similar to transmitted signal shown in Fig. 3 with NC=l at used the same parameters of MACM and same chaotic key in the received side. Also, PSNR= 40.35 dB, calculated as in [15], for shown stego image. To test the effect of incorrect control parameters of MACM, the image generated by using MACM at received side and decrypted speech extracted from it will be shown in Fig. 14 and Fig. 15. In each figure the stego image is processed with the same chaotic key and same parameters of MACM except only one parameter is changed at a time as a=3 and c=4, as example, respectively. IJER@2015 Page 170 0 10 20 30 40 50 60 Decrypted Speech from Stego Image Fig. 14 MACM Image with a=3, and received Speech from it. 0 10 20 30 40 50 60 Decrypted Speech from Stego Image Fig. 15 MACM Image with c=4, and received Speech from it. From these figures, extracted correct data from stego image in received side will be highly difficult process without used same MCAM parameters that is used in transmitted side. ISSN:2319-6890(online),2347-5013(print) 01 April 2015 5.3 Key Space and System Security: Key space size is the total number of different keys that are used in the encryption. The chaotic key used in this work is highly sensitive to fraction- order for Lorenz (al, a2, a3) and Chua (yl, y2, y3) systems, Lorenz parameters (a L , Pl ? Pl), Chua parameters (a c , Pc ? Pc> and also to initial values of the system. All parameters and initial conditions constitute the secret key of encryption system. Also, the (a, b, c) parameters and p iteration used in MACM to hiding the encrypted speech are provide addition system security space. Hence, the space of the key and system, in general, will be a very high dimensional space. Large secret key parameters space is very important to resist the exhaustive attack. 6. Conclusions: In this paper, fractional derivative order of Lorenz and Chua are employed as a high dimensional chaotic system to generate more complex and unpredictable six chaotic sequences. These sequences used to produce highly complicated security chaotic key can be used in the secure cryptography and steganography of speech message. This system has a large key sensitivity because a small change in the secret key causes a large change in the decrypted signal as shown by low normalized correlation value when compared the similarity between extracted secret speech message using incorrect key with original secret speech. Also, additional security is guaranteed by using Modified Arnold Cat Map to hiding the speech message in image. With the use of fractional derivative order as the keys, and Modified Arnold Cat Map parameters makes the key space expanded and warranty to high security References: i. S. A. Laskar, and K. Hemachandran," Secure Data Transmission Using Steganography And Encryption Technique", International Journal on Cryptography and Information Security (IJCIS), vol2, No.3, pp. 161-172, September 2012. ii. B. Nagaria, A. Parikh, S. Mandliya, and N. shrivastav, " Stegano graphic Approach for Data Hiding using LSB Techniques", International Journal of Advanced Computer Research, vol. 2, No. 4, pp. 441-445, December 2012. Hi. R. Nivedhitha, T. Meyyappan, and M. Phil, " Image Security Using Steganography And Cryptographic Techniques ", International Journal of Engineering Trends and Technology, vol. 3, pp. 366 - 371, 2012. iv. S. H. Strogatz, "Nonlinear dynamics and chaos", PreseusBooks Publishing, LLC, 1994. v. R. Nicholas, "Introduction to Lorenz' s System of Equations", Math 6100, December 2003. vi. K. Sakthidasan, and B. V. Santhosh," A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images, " International Journal of Information and Education Technology, vol. 1, No. 2, pp. 137-141, June 2011. vii. Edward N. Lorenz," Deterministic Nonperiodic flow", Massachusetts Institute of Technology Journal Of The Atmospheric Science , Vol.20, 1963. viii. K. K. Kabi, C. Pradhan, B.J. Saha, and A. Kumar Bisoi, " Comparative study of image encryption using 2D chaotic map", Proceedings of IEEE, International Conference of Information Systems and Computer Networks, pp. 105 - 108, March 2014. ix. Leon O. Chua, Chai W. Wu& A. Huang, "A Universal Circuit for Studying and Generating Chaos — Part I: Routes to Chaos ", Circuits and Systems Fundamental Theory and Applications, IEEE Transactions, vol.40, pp. 7 32 -7 44, 199 3. IJER@2015 Page 171 International Journal of Engineering Research Volume No.4, Issue No.4, pp : 165-172 x. M. Henon 'A Two -Dimensional Mapping With A Strange Attr actor", Springer -Verlag Communications In Mathematical Physics, Vol.50, pp. 69 -77, 197 6. xi. V. Arnold, "mathematical methods of classical mechanics", springer Graduate Texts in Mathematics, Vol. 60,1985. xii. Leon O. Chua, "The Genesis of Chua's Circuit", CiteSeerX - Scientific documents, vol. 46, No. 4, pp. 250-257, 1992. xiii. K. Sun, and X. Wang, "Bifurcations and Chaos in Fractional Order Simplified Lorenz System", International Journal of Bifurcation and chaos, vol. 20, No. 4, pp. 1209-1219, 2010. ISSN:2319-6890(online),2347-5013(print) 01 April 2015 xiv. M. U. Celik, GSharma, A.M. Tekalp, and E. Saber, " Lossless generalized -LSB data embedding ", Image Processing, IEEE Transactions, vol. 14, pp. 253 - 266, 2005 xv. M. Mishra, A. R. Routray, and S. Kumar", High Security Image Steganography with Modified Arnold's Cat Map ", International Journal of Computer Applications, vol. 37, No.9, Jane 2012. xvi. Sreejith.V, Srijith.K, Rajesh Cherian Roy, " Robust Blind Digital Watermarking in Contourlet Domain ", International Journal of Computer Applications, vol. 58, No. 12, November 2012. IJER@2015 Page 172