CN114142991A - Linear regular domain voice encryption system based on cascade chaotic modulation - Google Patents

Linear regular domain voice encryption system based on cascade chaotic modulation Download PDF

Info

Publication number
CN114142991A
CN114142991A CN202111473912.7A CN202111473912A CN114142991A CN 114142991 A CN114142991 A CN 114142991A CN 202111473912 A CN202111473912 A CN 202111473912A CN 114142991 A CN114142991 A CN 114142991A
Authority
CN
China
Prior art keywords
module
transformation
linear regular
linear
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111473912.7A
Other languages
Chinese (zh)
Inventor
徐丽云
李伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi University
Original Assignee
Shanxi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi University filed Critical Shanxi University
Priority to CN202111473912.7A priority Critical patent/CN114142991A/en
Publication of CN114142991A publication Critical patent/CN114142991A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis

Abstract

The invention provides a linear regular domain voice encryption system based on cascade chaotic modulation, and belongs to the technical field of voice communication encryption. The voice signal encryption and decryption device comprises a voice signal acquisition module (1), a linear regular transformation module (2), a cascade chaotic system module (3), a transform domain encryption module (4), a linear regular inverse transformation module (5) and an encrypted voice storage module (6). The chaotic Lyapunov exponent can be improved by arranging the cascade chaotic system module, the key space is enlarged, and the safety performance is improved; the linear regular transformation is subjected to chaotic modulation of the cascaded chaotic system module, and dynamic change acts on the segmented signals, so that the complexity of an encryption algorithm can be increased, the cracking difficulty of the algorithm is improved, and the safety of voice signals is improved.

Description

Linear regular domain voice encryption system based on cascade chaotic modulation
Technical Field
The invention relates to the technical field of voice communication encryption, in particular to a linear regular domain voice encryption system based on cascade chaotic modulation.
Background
In recent years, communication technology has been rapidly developed, and voice communication in a communication system is one of the most common ways for people to exchange and transmit information. Although there are many researches on the voice encryption method, the cracking technology is continuously developed, and the research on the voice encryption method which is more convenient and faster and has higher security performance is still one of the important contents in the communication security. The secret communication technology based on the chaos theory is an important research direction in the communication security field, and although the chaos encryption method is easy to realize, the attack of selecting a plain (secret) text cannot be resisted.
Encryption of the speech signal may be implemented in the time domain, frequency domain, or time-frequency hybrid domain. The time domain encryption method usually mainly uses scrambling and pure chaotic encryption, is easily attacked by selected plaintext and has low voice security. The frequency domain encryption method is generally to perform scrambling encryption in the frequency domain after performing fourier transform, wavelet transform, cosine transform, etc. on the signal. Such transform domain encryption is usually a fixed transform, and the role of the transform method in the encryption effect has limitations.
Disclosure of Invention
The invention provides a linear regular domain voice encryption system based on cascade chaotic modulation, which utilizes the cascade chaotic system to modulate linear regular transformation parameters and improves the encryption safety performance.
In order to solve the technical problems, the invention adopts the technical scheme that:
a linear regular domain voice encryption system based on cascade chaotic modulation comprises a voice signal acquisition module, a linear regular transformation module, a cascade chaotic system module, a transformation domain encryption module, a linear regular inverse transformation module and an encrypted voice storage module, wherein: the first signal input end of the linear regular transformation module is connected with the signal output end of the voice signal acquisition module, the first signal input end of the transformation domain encryption module is connected with the signal output end of the linear regular transformation module, the first signal input end of the linear regular inverse transformation module is connected with the signal output end of the transformation domain encryption module, the signal input end of the encryption voice storage module is connected with the signal output end of the linear regular inverse transformation module, and the signal output end of the cascade chaotic system module is connected with the second signal input ends of the linear regular transformation module, the transformation domain encryption module and the linear regular inverse transformation module;
the voice signal acquisition module acquires voice signals and transmits the voice signals to the linear regular transformation module; the linear regular transformation module is used for obtaining the random segment length of the signal from the cascade chaotic system module and modulating the random sequence of the linear regular transformation parameter corresponding to each segmented signal, segmenting the voice signal according to the random segment length of the signal, modulating the linear regular transformation parameter corresponding to each segmented signal through each random sequence, performing linear regular transformation on each segmented signal through the linear regular transformation parameter corresponding to each modulated segmented signal, obtaining a linear regular transformation domain spectrum, and transmitting the linear regular transformation domain spectrum to the transformation domain encryption module; the transformation domain encryption module encrypts a linear regular transformation domain spectrum through a random sequence acquired from the cascade chaotic system module and transmits an encrypted transformation domain signal to the linear regular inverse transformation module; the linear regular inverse transformation module modulates linear regular inverse transformation parameters through random sequences obtained from the cascade chaotic system module and carries out linear regular inverse transformation of corresponding parameters on the encrypted transformation domain signals to obtain encrypted time domain voice signals, and the encrypted voice storage module stores the encrypted time domain voice signals.
Optionally, the cascaded chaotic system module is formed by sequentially connecting five chaotic systems, the output of a front chaotic system is used as the input of a rear chaotic system, and the output of the last chaotic system is used as the input of the first chaotic system; the first chaotic system is used for the sectional processing of the voice signal so as to carry out the sectional encryption in the following; the second chaotic system to the fourth chaotic system are used for generating random sequences to respectively modulate three variable parameters of linear regular transformation so as to perform linear regular transformation on the segmented signals under different parameters; and the fifth chaotic system is used for encrypting the linear regular transform domain spectrum.
Optionally, the transform domain encryption module performs an exclusive or operation on the linear regular transform domain spectrum through a random sequence acquired from the cascaded chaotic system module to implement encryption.
Optionally, the linear regular transformation of the linear regular transformation module and the inverse transformation of the linear regular inverse transformation module use discrete methods that are fast algorithms based on basis decomposition.
The invention has the beneficial effects that:
the chaotic Lyapunov exponent can be improved by arranging the cascade chaotic system module, the key space is enlarged, and the safety performance is improved; the linear regular transformation is subjected to chaotic modulation of the cascaded chaotic system module, and dynamic change acts on the segmented signals, so that the complexity of an encryption algorithm can be increased, the cracking difficulty of the algorithm is improved, and the safety of voice signals is improved.
Drawings
FIG. 1 is a schematic diagram of the system components of the present invention.
Fig. 2 is a schematic diagram of a composition structure of the cascaded chaotic system module in fig. 1.
Fig. 3, a and B, are a time-domain waveform diagram and a linear canonical transform domain spectrogram of an original speech signal, respectively.
Fig. 4 a and B are respectively an encrypted linear canonical transform domain spectrogram and a corresponding time domain waveform.
Fig. 5, a and B, are respectively a linear canonical transform domain spectrogram and a time domain waveform of the decrypted speech signal.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples.
As shown in fig. 1, the linear regular domain voice encryption system based on the cascaded chaotic modulation in this embodiment includes a voice signal acquisition module 1, a linear regular transformation module 2, a cascaded chaotic system module 3, a transformation domain encryption module 4, a linear regular inverse transformation module 5, and an encrypted voice storage module 6, where: the first signal input end of the linear regular transformation module 2 is connected with the signal output end of the voice signal acquisition module 1, the first signal input end of the transformation domain encryption module 4 is connected with the signal output end of the linear regular transformation module 2, the first signal input end of the linear regular inverse transformation module 5 is connected with the signal output end of the transformation domain encryption module 4, the signal input end of the encryption voice storage module 6 is connected with the signal output end of the linear regular inverse transformation module 5, and the signal output end of the cascade chaotic system module 3 is connected with the second signal input ends of the linear regular transformation module 2, the transformation domain encryption module 4 and the linear regular inverse transformation module 5;
the voice signal acquisition module 1 acquires voice signals and transmits the voice signals to the linear regular transformation module 2; the linear regular transformation module 2 is used for obtaining the random segment length of the signal from the cascade chaotic system module 3 and modulating the random sequence of the linear regular transformation parameter corresponding to each segmented signal, segmenting the voice signal according to the random segment length of the signal, modulating the linear regular transformation parameter corresponding to each segmented signal through each random sequence, performing linear regular transformation on each segmented signal through the linear regular transformation parameter corresponding to each modulated segmented signal, obtaining a linear regular transformation domain spectrum, and transmitting the linear regular transformation domain spectrum to the transformation domain encryption module 4; as shown in fig. 3, a diagram a and a diagram B in fig. 3 are a time domain waveform diagram and a linear canonical transform domain spectrogram of an original speech signal, respectively. The transform domain encryption module 4 encrypts a linear regular transform domain spectrum through a random sequence acquired from the cascade chaotic system module 3, and transmits an encrypted transform domain signal to the linear regular inverse transform module 5; the linear regular inverse transformation module 5 performs linear regular inverse transformation on the encrypted transformation domain signal through the random sequence obtained from the cascade chaotic system module 3 to obtain an encrypted time domain voice signal; fig. 4 a and B are respectively an encrypted linear canonical transform domain spectrogram and a corresponding time domain waveform. The encrypted voice storage module 6 stores the encrypted time-domain voice signal.
For a voice signal receiving end, a cascade chaotic system with the same key space is utilized, and the recovery of an encrypted voice signal can be realized through the reverse process of an encryption process. The linear canonical transform domain spectrogram and the time domain oscillogram of the restored speech signal are respectively shown as a graph and B graph in fig. 5.
Comparing fig. 3 and fig. 4, the encrypted spectrum has the characteristic of relatively uniform distribution, and no longer has the linear regular transform domain spectrum characteristic of the original speech signal. Correspondingly, the waveform of the encrypted time domain voice signal has a larger difference with the waveform of the original signal, the original signal information remained by the encrypted signal is less, a better confidentiality effect can be achieved, and the voice communication safety can be ensured.
Compared with fig. 3 and fig. 5, the restored speech signal has relatively high consistency intuitively in both the time domain and the linear canonical transform domain; objectively, for the recovered voice signal and the original voice signal, the mean square error is calculated to be 6.30e-08, the signal-to-noise ratio is 29.72, and the MOS value in the PESQ method is 2.66, which shows that the method provided by the invention can recover a better voice signal under the condition of correct decryption.
Optionally, as shown in fig. 2, the cascaded chaotic system module 3 is formed by sequentially connecting five chaotic systems, an output of a front chaotic system is used as an input of a rear chaotic system, and an output of a last chaotic system is used as an input of a first chaotic system; the first chaotic system is used for the sectional processing of the voice signal so as to carry out the sectional encryption in the following; the second chaotic system to the fourth chaotic system are used for generating random sequences to respectively modulate three variable parameters of linear regular transformation so as to perform linear regular transformation on the segmented signals under different parameters; and the fifth chaotic system is used for encrypting the linear regular transform domain spectrum. Specifically, the initial value parameters of the cascaded chaotic system module 3 are set through (input tools such as a keyboard) to obtain the random segment length of the signal and the linear regular transformation parameters corresponding to each segmented signal.
Optionally, the transform domain encryption module 4 performs an exclusive or operation on the linear regular transform domain spectrum through the random sequence acquired from the cascaded chaotic system module 3 to implement encryption.
Optionally, the linear regular transformation of the linear regular transformation module 2 and the inverse transformation of the linear regular inverse transformation module 5 use a discrete method which is a fast algorithm based on basis decomposition, which not only approximates to continuous transformation, but also has a display expression, and at the same time, has a computational complexity equal to that of fast fourier transformation, and improves the complexity and security of the encryption and decryption algorithm, and at the same time, uses the least amount of computation, and improves the algorithm efficiency.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (4)

1. The linear regular domain voice encryption system based on cascade chaotic modulation is characterized by comprising a voice signal acquisition module (1), a linear regular transformation module (2), a cascade chaotic system module (3), a transformation domain encryption module (4), a linear regular inverse transformation module (5) and an encrypted voice storage module (6), wherein: a first signal input end of the linear regular transformation module (2) is connected with a signal output end of the voice signal acquisition module (1), a first signal input end of the transformation domain encryption module (4) is connected with a signal output end of the linear regular transformation module (2), a first signal input end of the linear regular inverse transformation module (5) is connected with a signal output end of the transformation domain encryption module (4), a signal input end of the encryption voice storage module (6) is connected with a signal output end of the linear regular inverse transformation module (5), and a signal output end of the cascade chaotic system module (3) is connected with second signal input ends of the linear regular transformation module (2), the transformation domain encryption module (4) and the linear regular inverse transformation module (5);
the voice signal acquisition module (1) acquires voice signals and transmits the voice signals to the linear regular transformation module (2); the linear regular transformation module (2) is used for obtaining the random segment length of the signal from the cascade chaotic system module (3) and modulating the random sequence of the linear regular transformation parameter corresponding to each segment signal, segmenting the voice signal according to the random segment length of the signal, modulating the linear regular transformation parameter corresponding to each segment signal through each random sequence, performing linear regular transformation on each segment signal through the linear regular transformation parameter corresponding to each modulated segment signal, obtaining a linear regular transformation domain spectrum, and transmitting the linear regular transformation domain spectrum to the transformation domain encryption module (4); the transform domain encryption module (4) encrypts a linear regular transform domain spectrum through a random sequence acquired from the cascade chaotic system module (3), and transmits an encrypted transform domain signal to the linear regular inverse transform module (5); the linear regular inverse transformation module (5) modulates linear regular inverse transformation parameters through random sequences obtained from the cascade chaotic system module (3), and carries out linear regular inverse transformation of corresponding parameters on the encrypted transformation domain signals to obtain encrypted time domain voice signals, and the encrypted voice storage module (6) stores the encrypted time domain voice signals.
2. The system according to claim 1, wherein the cascaded chaotic system module (3) is composed of five chaotic systems connected in sequence, the output of a front chaotic system is used as the input of a rear chaotic system, and the output of the last chaotic system is used as the input of the first chaotic system; the first chaotic system is used for the sectional processing of the voice signal so as to carry out the sectional encryption in the following; the second chaotic system to the fourth chaotic system are used for generating random sequences to respectively modulate three variable parameters of linear regular transformation so as to perform linear regular transformation on the segmented signals under different parameters; and the fifth chaotic system is used for encrypting the linear regular transform domain spectrum.
3. The system according to claim 1, wherein the transform domain encryption module (4) encrypts the linear canonical transform domain spectrum by xoring a random sequence obtained from the cascaded chaotic system module (3).
4. The system according to claim 1, characterized in that the linear canonical transform of the linear canonical transform module (2) and the inverse transform of the linear canonical inverse transform module (5) use discrete methods that are fast algorithms based on basis decomposition.
CN202111473912.7A 2021-12-03 2021-12-03 Linear regular domain voice encryption system based on cascade chaotic modulation Pending CN114142991A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111473912.7A CN114142991A (en) 2021-12-03 2021-12-03 Linear regular domain voice encryption system based on cascade chaotic modulation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111473912.7A CN114142991A (en) 2021-12-03 2021-12-03 Linear regular domain voice encryption system based on cascade chaotic modulation

Publications (1)

Publication Number Publication Date
CN114142991A true CN114142991A (en) 2022-03-04

Family

ID=80383884

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111473912.7A Pending CN114142991A (en) 2021-12-03 2021-12-03 Linear regular domain voice encryption system based on cascade chaotic modulation

Country Status (1)

Country Link
CN (1) CN114142991A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080063185A1 (en) * 2006-01-31 2008-03-13 Tansu Alpcan Symmetric cryptosystem using cascaded chaotic maps
CN106067182A (en) * 2016-06-06 2016-11-02 西安电子科技大学 Based on double random phase and the linear domain of holomorphy image encryption method of composite chaotic
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
CN109977686A (en) * 2019-04-01 2019-07-05 桂林电子科技大学 A kind of image encryption method and image processing equipment based on Composite Chaotic System
CN112511899A (en) * 2020-10-21 2021-03-16 山东科技大学 Video image encryption method based on cascade chaos technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080063185A1 (en) * 2006-01-31 2008-03-13 Tansu Alpcan Symmetric cryptosystem using cascaded chaotic maps
CN106067182A (en) * 2016-06-06 2016-11-02 西安电子科技大学 Based on double random phase and the linear domain of holomorphy image encryption method of composite chaotic
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
CN109977686A (en) * 2019-04-01 2019-07-05 桂林电子科技大学 A kind of image encryption method and image processing equipment based on Composite Chaotic System
CN112511899A (en) * 2020-10-21 2021-03-16 山东科技大学 Video image encryption method based on cascade chaos technology

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
LIYUN XU ET AL.: "Speech Encryption in Linear Canonical Transform Domain Based on Chaotic Dynamic Modulation", 《JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY》, pages 2 - 4 *
周黎: "基于混沌的物联网加密算法的安全分析", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
徐丽云 等: "基于级联混沌系统的分数域语音加密算法", 《计算机应用》, pages 1 *

Similar Documents

Publication Publication Date Title
Chien et al. Design of secure digital communication systems using chaotic modulation, cryptography and chaotic synchronization
CN109672517B (en) Encryption and decryption method of OFDM-PON system based on cellular neural network
CN112019321B (en) Five-dimensional optical probability shaping encryption method based on high-dimensional chaotic system
Akgül et al. Text encryption by using one-dimensional chaos generators and nonlinear equations
CN105846947B (en) A kind of encryption in physical layer method introducing Latin battle array
CN109688143B (en) Clustering data mining method for privacy protection in cloud environment
CN115022102B (en) Transmission line monitoring data transmission method and device, computer equipment and storage medium
Biswas et al. A DNA cryptographic technique based on dynamic DNA encoding and asymmetric cryptosystem
Al-Arjan et al. Intelligent security in the era of AI: The key vulnerability of RC4 algorithm
Chen et al. Text encryption using ECG signals with chaotic Logistic map
Raheema et al. Performance Comparison of Hybrid Chaotic Maps Based on Speech Scrambling for OFDM Techniques
Sadkhan et al. A proposed speech scrambling based on hybrid chaotic key generators
Aziz et al. A noise-tolerant audio encryption framework designed by the application of S8 symmetric group and chaotic systems
CN112804048B (en) Physical layer chaotic encryption optical transmission method based on generation countermeasure network
Chen et al. A novel digital color image encryption algorithm based on a new 4-D hyper-chaotic system and an improved S-box
CN114142991A (en) Linear regular domain voice encryption system based on cascade chaotic modulation
Ogras et al. Digital image encryption scheme using chaotic sequences with a nonlinear function
Sadkhan et al. Chaos based cryptography for voice encryption in wireless communication
Dhanya et al. Speech scrambling based on chaotic mapping and random permutation for modern mobile communication systems
Oktivasari et al. Analysis of ECG Image File Encryption using ECDH and AES-GCM Algorithm
Abbas et al. Review of dct and chaotic maps in speech scrambling
Wang et al. Image encryption algorithm based on cross-scrambling and rapid-mode diffusion
Chattopadhyay et al. Reduction of dynamical degradation in chaotic image encryption system by coupling multiple chaotic maps and perturbation
CN216625755U (en) Transform domain voice encryption and decryption device based on multiple chaos
CN113949503B (en) WFRFT (Wireless Fidelity-rft) secure communication method based on DNA dynamic coding

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination