CN111865553B - Multi-audio encryption method based on chaos and Zigzag transformation - Google Patents
Multi-audio encryption method based on chaos and Zigzag transformation Download PDFInfo
- Publication number
- CN111865553B CN111865553B CN202010502514.2A CN202010502514A CN111865553B CN 111865553 B CN111865553 B CN 111865553B CN 202010502514 A CN202010502514 A CN 202010502514A CN 111865553 B CN111865553 B CN 111865553B
- Authority
- CN
- China
- Prior art keywords
- audio
- phoneme
- matrix
- chaos
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 230000009466 transformation Effects 0.000 title claims abstract description 24
- 239000011159 matrix material Substances 0.000 claims abstract description 19
- 230000000739 chaotic effect Effects 0.000 claims abstract description 15
- 238000009792 diffusion process Methods 0.000 claims description 8
- 238000004364 calculation method Methods 0.000 claims description 6
- 239000013598 vector Substances 0.000 claims description 6
- 238000013507 mapping Methods 0.000 claims description 4
- 238000013139 quantization Methods 0.000 claims description 3
- 230000011218 segmentation Effects 0.000 claims description 3
- 230000002452 interceptive effect Effects 0.000 claims description 2
- 230000000694 effects Effects 0.000 abstract description 5
- 230000001360 synchronised effect Effects 0.000 abstract description 2
- 230000005540 biological transmission Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000005291 chaos (dynamical) Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Transmission Systems Not Characterized By The Medium Used For Transmission (AREA)
Abstract
A multi-audio encryption method based on chaos and Zigzag transformation belongs to the field of information encryption. At present, activities of delivering multimedia information over a network are increasingly frequent, and audio is an important component of multimedia information, and how to protect the security of audio content becomes one of important research directions for researchers. The invention provides a multi-audio encryption method based on chaos and Zigzag transformation. Firstly, scrambling the connection sequence of a plurality of audio files by utilizing random full arrangement generated by a chaotic sequence; secondly, scrambling of phonemes among the multi-audio files is achieved by using Zigzag transformation; and finally, performing exclusive-or operation on the phoneme matrix by using the chaotic sequence to obtain a final encrypted audio set. Experiments show that: the method can realize synchronous encryption of a plurality of audio files, and has the advantages of good encryption effect, high safety and high efficiency.
Description
Technical Field
The present document relates to an audio encryption method, which mainly encrypts a plurality of audio files.
Background
In recent years, the security of multimedia data itself has been receiving attention due to the rapidly updated mobile communication devices and multimedia technologies. Audio is an important component of multimedia audio, which has features different from text and image information. Because of the large redundancy and strong correlation between signals, the method for protecting the audio is different from the image and the text. The audio encryption is to change the position of the phoneme or the phoneme value in the spatial domain of the audio according to a certain transformation rule by using the matrix characteristic of the digital audio, so as to make the information of the original audio be "disordered". As a new multimedia security technology, multi-audio encryption has the characteristics of high efficiency and strong confidentiality, and gradually draws the attention of researchers.
The audio encryption technology mainly comprises two means of phoneme scrambling and phoneme diffusing. Wherein the purpose of the phoneme scrambling changes the location of the phonemes; the purpose of phoneme diffusion is to change the value of the phoneme. In order to improve the safety and efficiency of audio encryption and ensure the safe and efficient transmission of audio, a chaos and Zigzag transformation-based multi-audio encryption method is designed by utilizing a chaos theory and a Zigzag transformation theory. The method utilizes the characteristics of multi-audio data, high speed of Zigzag transformation, good encryption effect, good randomness and complexity of chaos, and effectively protects the security of network transmission and storage of multi-audio files.
Disclosure of Invention
The purpose of the invention is as follows: aiming at the problem of weak security of the existing single audio encryption method, a multi-audio encryption method based on chaos and Zigzag transformation is provided.
The technical scheme of the invention is as follows: in order to realize the aim of the invention, the adopted scheme is a multi-audio encryption method based on chaos and Zigzag transformation.
The multi-audio encryption method based on chaos and Zigzag transformation is characterized in that the encryption process comprises the following steps:
step 1: and (3) phoneme integer quantization: order tokAn interactive audio file isA 1, A 2, …, A k Of a size ofm×1,mIs the number of phonemes, 1 means that the audio file is mono;A j the range of the middle element is [ -1, 1 [)]Adding 1 to all elements to make their range become [0, 2 ]]Then multiply by a specified coefficientdMaking each phoneme value availablenIs represented by a binary bit, i.e.
b i j =(a i j +1)×d,i=1, 2, …, m;j=1, 2, …, k, (1)
Wherein,a i j ∈A j ,B j ={b i j the phoneme integer matrix is used as the phoneme integer matrix; can obtain the productkAnmA phoneme integer matrix of x 1B 1, B 2, …, B k ;
Step 2: and (3) chaotic sequence generation: randomly selecting an initial valuex 0E (0, 1) and control parameterp 1E.g. (0, 0.5), Piecewise Linear chaos mapping (PWLCM) shown in iterative formula (2)kThen, a chaotic sequence can be generatedX 1={x i 1};
Randomly selecting an initial valuey 0E (0, 1) and control parameterp 2E (0, 0.5), iterative formula (2)k×m×nThen, a chaotic sequence can be generatedY 1={y i 1};
And step 3: and (3) integer transformation of the chaotic sequence: the calculation is carried out according to the calculation,
y i 2=mod(floor(y i 1×1016), 2 n ), (3)
wherein,mod() Andfloor() Respectively a modulo and an integer function,y i 1∈Y 1,Y 2={y i 2};
and 4, step 4: file level scrambling: by usingX 1The sequence of sequences 1, 2, …,ka full array ofP(ii) a According toPIn the order of (1) toB 1, B 2, …, B kIs reshaped into onem×kIs a matrix of integersC;
And 5: phoneme level scrambling: using a two-dimensional Zigzag transform, willCConverted into a length ofmkAudio vector ofV;
Step 6: audio frequency segmentation: to be provided withmTaking individual phoneme as unit, willVAre equally divided intokAn audio vectorD 1, D 2, …, D k ;
And 7: phoneme diffusion: and (3) calculating:
E 1=D 1⊕Y 2,E i =D i ⊕Y 2⊕E i-1,i=2, 3, …, k, (4)
wherein ≧ represents an exclusive or operation; the diffusion result can be obtained asE 1, E 2, …, E k ;
And 8: phonemic decimal transformation: to pairE 1, E 2, …, E k Each element in (1) divided bydThen decrease 1 to make its range to [ -1, 1 [)]I.e. by
f i j = e i j /d-1,i=1, 2, …, m;j=1, 2, …, k, (5)
Wherein,e i j ∈E j ,F j ={f i j the phoneme matrix is used as the phoneme matrix; can obtain the productkPersonal encrypted audioF 1, F 2, …, F k 。
Further, in the step 5, Zigzag transform: zigzag transform is a common scrambling method, and data is replaced by scanning elements in a matrix from the top left according to a Zigzag pattern. And then, sequentially storing the scanned elements into a one-dimensional array, and converting into a two-dimensional matrix according to a certain mode. Its advantages are simple implementation and low time complexity.
Has the advantages that: the invention provides a multi-audio encryption method based on chaos and Zigzag transformation, aiming at the problem of poor safety of a single audio encryption method. The main contributions are: (1) the synchronous encryption of the multi-audio file is realized; (2) using the chaos sequence to realize file level scrambling; (3) scrambling the phoneme matrix by utilizing two-dimensional Zigzag transformation; (4) the diffusion of phonemes is realized by utilizing the chaotic sequence and the XOR operation; (5) the method utilizes the randomness and complexity of chaos and the simplicity and high efficiency of Zigzag transformation, and improves the encryption effect and the encryption efficiency of the audio. Therefore, the proposed multi-audio encryption method has the characteristics of high efficiency, safety and good encryption effect, and can effectively protect the safety of network transmission and storage of a plurality of audio files.
Drawings
FIG. 1: an encryption flow chart of a multi-audio-frequency encryption method based on chaos and Zigzag transformation;
FIG. 2: a time domain waveform of the original audio;
FIG. 3: a time domain waveform map of the encrypted audio.
Detailed Description
The following detailed description of the embodiments of the present invention is provided in connection with the accompanying drawings and examples.
Fig. 1 is an encryption flow diagram of the method.
The adopted programming software is Matlab R2016b, and 5 audio files with the size of 73113 x 1 are selected as original audio. The detailed process of encrypting the original image by using the method is described as follows.
Step 1: and (3) phoneme integer quantization: the specific operation is to add 1 to all phonemes and then multiply by 10000 so that the range becomes [0, 20000 ].
Step 2: and (3) chaotic sequence generation: let 5 original tones bey 1, y 2, …, y 5(ii) a Selecting initial value of PWLCMy 0 1=0.78 and parametersp 1=0.44, iterate the mapping 73113 × 5 times, and obtain a chaotic sequenceY 1={y i 1}365565(ii) a Similarly, initial values of PWLCM are utilizedx 0 1=0.32 and parametersp 2=0.44, iterate the mapping 5 times, and obtain another chaotic sequenceX 1={x i 1}5(ii) a To pairX 1And sorting to obtain an index value.
And step 3: and (3) integer transformation of the chaotic sequence:
y i 2=mod(floor(y i 1×1016), 28),
wherein,mod() Andfloor() Respectively a modulo and an integer function,y i 1∈Y 1,Y 2={y i 2is asY 1The result of the integer transformation.
And 4, step 4: and (3) carrying out file level scrambling: by usingX 1Generating a full array of sequences 1, 2 …, 5P(ii) a According toPIn the order of (1) toB 1, B 2,…, B 5Reshaped into an 73113 x 5 integer matrixC。
And 5: phoneme level scrambling: using a two-dimensional Zigzag transform, willCConverted into an audio vector of length 73113 x 5V。
Step 6: audio frequency segmentation: taking 73113 phonemes as a unit, the method will be usedVSplitting into 5 audio vectorsD 1, D 2,…, D 5。
And 7: and (3) performing phoneme diffusion: the calculation is carried out according to the calculation,
E 1=D 1⊕Y 2,E i =D i ⊕Y 2⊕E i-1,i=2, 3, …, 5,
wherein [ ] indicates XOR operation, the obtained diffusion result isE 1, E 2,…, E 5。
And 8: phonemic decimal transformation: dividing each phoneme by 10000, then subtracting 1 to change the range to [ -1, 1], and obtaining 5 encrypted audios; their time domain waveform diagrams are shown in fig. 3.
In the decryption process, the same chaos sequence, chaos matrix and corresponding decryption method are used for acting on the encrypted audio, and the time domain waveform diagram of the decrypted audio can be obtained as shown in fig. 2. The decryption process is the reverse of encryption.
Claims (1)
1. The multi-audio encryption method based on chaos and Zigzag transformation is characterized in that the encryption process comprises the following steps:
step 1: and (3) phoneme integer quantization: order tokAn interactive audio file isA 1, A 2, …, A k Of a size ofm×1,mIs the number of phonemes, 1 means that the audio file is mono;A j middle elementIn the range of [ -1, 1]Adding 1 to all elements to make their range become [0, 2 ]]Then multiply by a specified coefficientdMaking each phoneme value availablenIs represented by a binary bit, i.e.
b i j =(a i j +1)×d,i=1, 2, …, m;j=1, 2, …, k, (1)
Wherein,a i j ∈A j ,B j ={b i j the phoneme integer matrix is used as the phoneme integer matrix; can obtain the productkAnmA phoneme integer matrix of x 1B 1, B 2, …, B k ;
Step 2: and (3) chaotic sequence generation: randomly selecting an initial valuey 0E (0, 1) and control parameterp 1E.g. (0, 0.5), Piecewise Linear chaos mapping (PWLCM) shown in iterative formula (2)m×kThen, a chaotic sequence can be generatedY 1={y i 1};
Randomly selecting an initial valuex 0E (0, 1) and control parameterp 2E (0, 0.5), iterative formula (2)kThen, a chaotic sequence can be generatedX 1={x i 1};
And step 3: and (3) integer transformation of the chaotic sequence: the calculation is carried out according to the calculation,
y i 2=mod(floor(y i 1×1016), 2 n ), (3)
wherein,mod() Andfloor() Respectively a modulo and an integer function,y i 1∈Y 1,Y 2={y i 2};
and 4, step 4: file level scrambling: by usingX 1The sequence of sequences 1, 2, …,ka full array ofP(ii) a According toPIn the order of (1) toB 1,B 2, …, B kIs reshaped into onem×kIs a matrix of integersC;
And 5: phoneme level scrambling: using a two-dimensional Zigzag transform, willCConverted into a length ofmkAudio vector ofV;
Step 6: audio frequency segmentation: to be provided withmTaking individual phoneme as unit, willVAre equally divided intokAn audio vectorD 1, D 2, …, D k ;
And 7: phoneme diffusion: and (3) calculating:
E 1=D 1⊕Y 2,E i =D i ⊕Y 2⊕E i-1,i=2, 3, …, k, (4)
wherein ≧ represents an exclusive or operation; the diffusion result can be obtained asE 1, E 2, …, E k ;
And 8: phonemic decimal transformation: to pairE 1, E 2, …, E k Each element in (1) divided bydThen decrease 1 to make its range to [ -1, 1 [)]I.e. by
f i j = e i j /d-1,i=1, 2, …, m;j=1, 2, …, k, (5)
Wherein,e i j ∈E j ,F j ={f i j the phoneme matrix is used as the phoneme matrix; can obtain the productkPersonal encrypted audioF 1, F 2, …, F k 。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010502514.2A CN111865553B (en) | 2020-06-05 | 2020-06-05 | Multi-audio encryption method based on chaos and Zigzag transformation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010502514.2A CN111865553B (en) | 2020-06-05 | 2020-06-05 | Multi-audio encryption method based on chaos and Zigzag transformation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111865553A CN111865553A (en) | 2020-10-30 |
CN111865553B true CN111865553B (en) | 2021-10-15 |
Family
ID=72984976
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010502514.2A Active CN111865553B (en) | 2020-06-05 | 2020-06-05 | Multi-audio encryption method based on chaos and Zigzag transformation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111865553B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114239037B (en) * | 2021-12-27 | 2024-06-04 | 中国矿业大学 | Multi-image encryption method based on sand road rule |
CN114999504A (en) * | 2022-05-12 | 2022-09-02 | 中国矿业大学 | Audio scrambling method based on windmill transformation |
CN117040940B (en) * | 2023-10-10 | 2023-12-19 | 成都运荔枝科技有限公司 | Equipment data encryption method based on Internet of things |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111080506A (en) * | 2020-01-06 | 2020-04-28 | 中国矿业大学 | Multi-image encryption method based on bit plane and chaos |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4964162A (en) * | 1985-09-09 | 1990-10-16 | Trw Inc. | Secure television signal encoding and decoding system |
US7215776B1 (en) * | 1999-11-09 | 2007-05-08 | University Of New Hampshire | Method and apparatus for the compression and decompression of audio files using a chaotic system |
US20070055861A1 (en) * | 2005-08-24 | 2007-03-08 | Wen-Wei Lin | System and method for hyper-chaos secure communication |
CN104618091B (en) * | 2015-02-16 | 2017-08-15 | 哈尔滨理工大学 | Double chaos system dynamic key and the united Streaming Media secret communication methods of RSA |
CN106600518B (en) * | 2016-11-23 | 2019-06-21 | 河南大学 | Compressed sensing based visual security and the image encryption of data safety, decryption method |
CN111147688B (en) * | 2020-01-06 | 2021-08-06 | 中国矿业大学 | Color image encryption method based on stereo scrambling model and chaos |
CN111031193B (en) * | 2020-01-06 | 2021-08-06 | 中国矿业大学 | Image encryption method based on three-dimensional composite scrambling model and chaos |
-
2020
- 2020-06-05 CN CN202010502514.2A patent/CN111865553B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111080506A (en) * | 2020-01-06 | 2020-04-28 | 中国矿业大学 | Multi-image encryption method based on bit plane and chaos |
Also Published As
Publication number | Publication date |
---|---|
CN111865553A (en) | 2020-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111865553B (en) | Multi-audio encryption method based on chaos and Zigzag transformation | |
CN107659751B (en) | Multi-image encryption method based on DNA coding and chaos | |
CN111031193B (en) | Image encryption method based on three-dimensional composite scrambling model and chaos | |
CN112019321B (en) | Five-dimensional optical probability shaping encryption method based on high-dimensional chaotic system | |
CN107659752B (en) | Multi-image encryption method based on DNA coding and chaos | |
CN112714235A (en) | Image encryption method based on filling curve and adjacent pixel bit scrambling | |
CN111682931B (en) | Chaos-based multi-audio high-dimensional encryption method | |
CN111008383B (en) | Image encryption method based on multidirectional diffusion and DNA coding | |
CN112202545B (en) | Image encryption method based on Y-type filling curve and variable-step Joseph traversal | |
CN106604040A (en) | Multi-image encryption method based on mixed primitives and full permutation | |
Gabr et al. | A combination of decimal-and bit-level secure multimedia transmission | |
Acharya | Image encryption using a new chaos based encryption algorithm | |
CN111682932B (en) | Single-round image encryption method based on mixed chaotic mapping | |
US6301361B1 (en) | Encoding and decoding information using randomization with an alphabet of high dimensionality | |
CN117527984A (en) | Image encryption method based on sine and cosine two-dimensional chaotic system | |
Ebrahim et al. | Hybrid model for cloud data security using steganography | |
CN112073171B (en) | Multi-audio encryption method based on chaos and DNA coding | |
CN115361109B (en) | Homomorphic encryption method supporting bidirectional proxy re-encryption | |
Dweik et al. | A survey of lightweight image encryption for IoT | |
Gnanachandra et al. | AI-Driven Innovations in Cryptography: Enhancing Key Generation and Security | |
Yadav et al. | A novel visual cryptography scheme based on substitution cipher | |
CN111682930B (en) | Chaos-based bit-level audio encryption method | |
KR101076747B1 (en) | Method and apparatus for random accessible encryption and decryption by using a hierarchical tree structure of stream cipher module | |
CN117114959B (en) | Image encryption method based on key feedback mechanism of multi-parameter one-dimensional chaotic system | |
CN114239037B (en) | Multi-image encryption method based on sand road rule |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |