CN111865553B - Multi-audio encryption method based on chaos and Zigzag transformation - Google Patents

Multi-audio encryption method based on chaos and Zigzag transformation Download PDF

Info

Publication number
CN111865553B
CN111865553B CN202010502514.2A CN202010502514A CN111865553B CN 111865553 B CN111865553 B CN 111865553B CN 202010502514 A CN202010502514 A CN 202010502514A CN 111865553 B CN111865553 B CN 111865553B
Authority
CN
China
Prior art keywords
audio
phoneme
matrix
chaos
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010502514.2A
Other languages
Chinese (zh)
Other versions
CN111865553A (en
Inventor
张晓强
李泳锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Mining and Technology CUMT
Original Assignee
China University of Mining and Technology CUMT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Mining and Technology CUMT filed Critical China University of Mining and Technology CUMT
Priority to CN202010502514.2A priority Critical patent/CN111865553B/en
Publication of CN111865553A publication Critical patent/CN111865553A/en
Application granted granted Critical
Publication of CN111865553B publication Critical patent/CN111865553B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Transmission Systems Not Characterized By The Medium Used For Transmission (AREA)

Abstract

A multi-audio encryption method based on chaos and Zigzag transformation belongs to the field of information encryption. At present, activities of delivering multimedia information over a network are increasingly frequent, and audio is an important component of multimedia information, and how to protect the security of audio content becomes one of important research directions for researchers. The invention provides a multi-audio encryption method based on chaos and Zigzag transformation. Firstly, scrambling the connection sequence of a plurality of audio files by utilizing random full arrangement generated by a chaotic sequence; secondly, scrambling of phonemes among the multi-audio files is achieved by using Zigzag transformation; and finally, performing exclusive-or operation on the phoneme matrix by using the chaotic sequence to obtain a final encrypted audio set. Experiments show that: the method can realize synchronous encryption of a plurality of audio files, and has the advantages of good encryption effect, high safety and high efficiency.

Description

Multi-audio encryption method based on chaos and Zigzag transformation
Technical Field
The present document relates to an audio encryption method, which mainly encrypts a plurality of audio files.
Background
In recent years, the security of multimedia data itself has been receiving attention due to the rapidly updated mobile communication devices and multimedia technologies. Audio is an important component of multimedia audio, which has features different from text and image information. Because of the large redundancy and strong correlation between signals, the method for protecting the audio is different from the image and the text. The audio encryption is to change the position of the phoneme or the phoneme value in the spatial domain of the audio according to a certain transformation rule by using the matrix characteristic of the digital audio, so as to make the information of the original audio be "disordered". As a new multimedia security technology, multi-audio encryption has the characteristics of high efficiency and strong confidentiality, and gradually draws the attention of researchers.
The audio encryption technology mainly comprises two means of phoneme scrambling and phoneme diffusing. Wherein the purpose of the phoneme scrambling changes the location of the phonemes; the purpose of phoneme diffusion is to change the value of the phoneme. In order to improve the safety and efficiency of audio encryption and ensure the safe and efficient transmission of audio, a chaos and Zigzag transformation-based multi-audio encryption method is designed by utilizing a chaos theory and a Zigzag transformation theory. The method utilizes the characteristics of multi-audio data, high speed of Zigzag transformation, good encryption effect, good randomness and complexity of chaos, and effectively protects the security of network transmission and storage of multi-audio files.
Disclosure of Invention
The purpose of the invention is as follows: aiming at the problem of weak security of the existing single audio encryption method, a multi-audio encryption method based on chaos and Zigzag transformation is provided.
The technical scheme of the invention is as follows: in order to realize the aim of the invention, the adopted scheme is a multi-audio encryption method based on chaos and Zigzag transformation.
The multi-audio encryption method based on chaos and Zigzag transformation is characterized in that the encryption process comprises the following steps:
step 1: and (3) phoneme integer quantization: order tokAn interactive audio file isA 1, A 2, …, A k Of a size ofm×1,mIs the number of phonemes, 1 means that the audio file is mono;A j the range of the middle element is [ -1, 1 [)]Adding 1 to all elements to make their range become [0, 2 ]]Then multiply by a specified coefficientdMaking each phoneme value availablenIs represented by a binary bit, i.e.
b i j =(a i j +1)×di=1, 2, …, mj=1, 2, …, k, (1)
Wherein,a i j A j B j ={b i j the phoneme integer matrix is used as the phoneme integer matrix; can obtain the productkAnmA phoneme integer matrix of x 1B 1, B 2, …, B k
Step 2: and (3) chaotic sequence generation: randomly selecting an initial valuex 0E (0, 1) and control parameterp 1E.g. (0, 0.5), Piecewise Linear chaos mapping (PWLCM) shown in iterative formula (2)kThen, a chaotic sequence can be generatedX 1={x i 1};
Figure 887060DEST_PATH_IMAGE001
, (2)
Randomly selecting an initial valuey 0E (0, 1) and control parameterp 2E (0, 0.5), iterative formula (2)k×m×nThen, a chaotic sequence can be generatedY 1={y i 1};
And step 3: and (3) integer transformation of the chaotic sequence: the calculation is carried out according to the calculation,
y i 2=mod(floor(y i 1×1016), 2 n ), (3)
wherein,mod() Andfloor() Respectively a modulo and an integer function,y i 1Y 1Y 2={y i 2};
and 4, step 4: file level scrambling: by usingX 1The sequence of sequences 1, 2, …,ka full array ofP(ii) a According toPIn the order of (1) toB 1, B 2, …, B kIs reshaped into onem×kIs a matrix of integersC
And 5: phoneme level scrambling: using a two-dimensional Zigzag transform, willCConverted into a length ofmkAudio vector ofV
Step 6: audio frequency segmentation: to be provided withmTaking individual phoneme as unit, willVAre equally divided intokAn audio vectorD 1, D 2, …, D k
And 7: phoneme diffusion: and (3) calculating:
E 1=D 1Y 2E i =D i Y 2E i-1i=2, 3, …, k, (4)
wherein ≧ represents an exclusive or operation; the diffusion result can be obtained asE 1, E 2, …, E k
And 8: phonemic decimal transformation: to pairE 1, E 2, …, E k Each element in (1) divided bydThen decrease 1 to make its range to [ -1, 1 [)]I.e. by
f i j = e i j /d-1,i=1, 2, …, mj=1, 2, …, k, (5)
Wherein,e i j E j F j ={f i j the phoneme matrix is used as the phoneme matrix; can obtain the productkPersonal encrypted audioF 1, F 2, …, F k
Further, in the step 5, Zigzag transform: zigzag transform is a common scrambling method, and data is replaced by scanning elements in a matrix from the top left according to a Zigzag pattern. And then, sequentially storing the scanned elements into a one-dimensional array, and converting into a two-dimensional matrix according to a certain mode. Its advantages are simple implementation and low time complexity.
Has the advantages that: the invention provides a multi-audio encryption method based on chaos and Zigzag transformation, aiming at the problem of poor safety of a single audio encryption method. The main contributions are: (1) the synchronous encryption of the multi-audio file is realized; (2) using the chaos sequence to realize file level scrambling; (3) scrambling the phoneme matrix by utilizing two-dimensional Zigzag transformation; (4) the diffusion of phonemes is realized by utilizing the chaotic sequence and the XOR operation; (5) the method utilizes the randomness and complexity of chaos and the simplicity and high efficiency of Zigzag transformation, and improves the encryption effect and the encryption efficiency of the audio. Therefore, the proposed multi-audio encryption method has the characteristics of high efficiency, safety and good encryption effect, and can effectively protect the safety of network transmission and storage of a plurality of audio files.
Drawings
FIG. 1: an encryption flow chart of a multi-audio-frequency encryption method based on chaos and Zigzag transformation;
FIG. 2: a time domain waveform of the original audio;
FIG. 3: a time domain waveform map of the encrypted audio.
Detailed Description
The following detailed description of the embodiments of the present invention is provided in connection with the accompanying drawings and examples.
Fig. 1 is an encryption flow diagram of the method.
The adopted programming software is Matlab R2016b, and 5 audio files with the size of 73113 x 1 are selected as original audio. The detailed process of encrypting the original image by using the method is described as follows.
Step 1: and (3) phoneme integer quantization: the specific operation is to add 1 to all phonemes and then multiply by 10000 so that the range becomes [0, 20000 ].
Step 2: and (3) chaotic sequence generation: let 5 original tones bey 1, y 2, …, y 5(ii) a Selecting initial value of PWLCMy 0 1=0.78 and parametersp 1=0.44, iterate the mapping 73113 × 5 times, and obtain a chaotic sequenceY 1={y i 1}365565(ii) a Similarly, initial values of PWLCM are utilizedx 0 1=0.32 and parametersp 2=0.44, iterate the mapping 5 times, and obtain another chaotic sequenceX 1={x i 1}5(ii) a To pairX 1And sorting to obtain an index value.
And step 3: and (3) integer transformation of the chaotic sequence:
y i 2=mod(floor(y i 1×1016), 28),
wherein,mod() Andfloor() Respectively a modulo and an integer function,y i 1Y 1Y 2={y i 2is asY 1The result of the integer transformation.
And 4, step 4: and (3) carrying out file level scrambling: by usingX 1Generating a full array of sequences 1, 2 …, 5P(ii) a According toPIn the order of (1) toB 1, B 2,…, B 5Reshaped into an 73113 x 5 integer matrixC
And 5: phoneme level scrambling: using a two-dimensional Zigzag transform, willCConverted into an audio vector of length 73113 x 5V
Step 6: audio frequency segmentation: taking 73113 phonemes as a unit, the method will be usedVSplitting into 5 audio vectorsD 1, D 2,…, D 5
And 7: and (3) performing phoneme diffusion: the calculation is carried out according to the calculation,
E 1=D 1Y 2E i =D i Y 2E i-1i=2, 3, …, 5
wherein [ ] indicates XOR operation, the obtained diffusion result isE 1, E 2,…, E 5
And 8: phonemic decimal transformation: dividing each phoneme by 10000, then subtracting 1 to change the range to [ -1, 1], and obtaining 5 encrypted audios; their time domain waveform diagrams are shown in fig. 3.
In the decryption process, the same chaos sequence, chaos matrix and corresponding decryption method are used for acting on the encrypted audio, and the time domain waveform diagram of the decrypted audio can be obtained as shown in fig. 2. The decryption process is the reverse of encryption.

Claims (1)

1. The multi-audio encryption method based on chaos and Zigzag transformation is characterized in that the encryption process comprises the following steps:
step 1: and (3) phoneme integer quantization: order tokAn interactive audio file isA 1, A 2, …, A k Of a size ofm×1,mIs the number of phonemes, 1 means that the audio file is mono;A j middle elementIn the range of [ -1, 1]Adding 1 to all elements to make their range become [0, 2 ]]Then multiply by a specified coefficientdMaking each phoneme value availablenIs represented by a binary bit, i.e.
b i j =(a i j +1)×di=1, 2, …, mj=1, 2, …, k, (1)
Wherein,a i j A j B j ={b i j the phoneme integer matrix is used as the phoneme integer matrix; can obtain the productkAnmA phoneme integer matrix of x 1B 1, B 2, …, B k
Step 2: and (3) chaotic sequence generation: randomly selecting an initial valuey 0E (0, 1) and control parameterp 1E.g. (0, 0.5), Piecewise Linear chaos mapping (PWLCM) shown in iterative formula (2)m×kThen, a chaotic sequence can be generatedY 1={y i 1};
Figure 640698DEST_PATH_IMAGE001
, (2)
Randomly selecting an initial valuex 0E (0, 1) and control parameterp 2E (0, 0.5), iterative formula (2)kThen, a chaotic sequence can be generatedX 1={x i 1};
And step 3: and (3) integer transformation of the chaotic sequence: the calculation is carried out according to the calculation,
y i 2=mod(floor(y i 1×1016), 2 n ), (3)
wherein,mod() Andfloor() Respectively a modulo and an integer function,y i 1Y 1Y 2={y i 2};
and 4, step 4: file level scrambling: by usingX 1The sequence of sequences 1, 2, …,ka full array ofP(ii) a According toPIn the order of (1) toB 1,B 2, …, B kIs reshaped into onem×kIs a matrix of integersC
And 5: phoneme level scrambling: using a two-dimensional Zigzag transform, willCConverted into a length ofmkAudio vector ofV
Step 6: audio frequency segmentation: to be provided withmTaking individual phoneme as unit, willVAre equally divided intokAn audio vectorD 1, D 2, …, D k
And 7: phoneme diffusion: and (3) calculating:
E 1=D 1Y 2E i =D i Y 2E i-1i=2, 3, …, k, (4)
wherein ≧ represents an exclusive or operation; the diffusion result can be obtained asE 1, E 2, …, E k
And 8: phonemic decimal transformation: to pairE 1, E 2, …, E k Each element in (1) divided bydThen decrease 1 to make its range to [ -1, 1 [)]I.e. by
f i j = e i j /d-1,i=1, 2, …, mj=1, 2, …, k, (5)
Wherein,e i j E j F j ={f i j the phoneme matrix is used as the phoneme matrix; can obtain the productkPersonal encrypted audioF 1, F 2, …, F k
CN202010502514.2A 2020-06-05 2020-06-05 Multi-audio encryption method based on chaos and Zigzag transformation Active CN111865553B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010502514.2A CN111865553B (en) 2020-06-05 2020-06-05 Multi-audio encryption method based on chaos and Zigzag transformation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010502514.2A CN111865553B (en) 2020-06-05 2020-06-05 Multi-audio encryption method based on chaos and Zigzag transformation

Publications (2)

Publication Number Publication Date
CN111865553A CN111865553A (en) 2020-10-30
CN111865553B true CN111865553B (en) 2021-10-15

Family

ID=72984976

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010502514.2A Active CN111865553B (en) 2020-06-05 2020-06-05 Multi-audio encryption method based on chaos and Zigzag transformation

Country Status (1)

Country Link
CN (1) CN111865553B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114239037B (en) * 2021-12-27 2024-06-04 中国矿业大学 Multi-image encryption method based on sand road rule
CN114999504A (en) * 2022-05-12 2022-09-02 中国矿业大学 Audio scrambling method based on windmill transformation
CN117040940B (en) * 2023-10-10 2023-12-19 成都运荔枝科技有限公司 Equipment data encryption method based on Internet of things

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080506A (en) * 2020-01-06 2020-04-28 中国矿业大学 Multi-image encryption method based on bit plane and chaos

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4964162A (en) * 1985-09-09 1990-10-16 Trw Inc. Secure television signal encoding and decoding system
US7215776B1 (en) * 1999-11-09 2007-05-08 University Of New Hampshire Method and apparatus for the compression and decompression of audio files using a chaotic system
US20070055861A1 (en) * 2005-08-24 2007-03-08 Wen-Wei Lin System and method for hyper-chaos secure communication
CN104618091B (en) * 2015-02-16 2017-08-15 哈尔滨理工大学 Double chaos system dynamic key and the united Streaming Media secret communication methods of RSA
CN106600518B (en) * 2016-11-23 2019-06-21 河南大学 Compressed sensing based visual security and the image encryption of data safety, decryption method
CN111147688B (en) * 2020-01-06 2021-08-06 中国矿业大学 Color image encryption method based on stereo scrambling model and chaos
CN111031193B (en) * 2020-01-06 2021-08-06 中国矿业大学 Image encryption method based on three-dimensional composite scrambling model and chaos

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080506A (en) * 2020-01-06 2020-04-28 中国矿业大学 Multi-image encryption method based on bit plane and chaos

Also Published As

Publication number Publication date
CN111865553A (en) 2020-10-30

Similar Documents

Publication Publication Date Title
CN111865553B (en) Multi-audio encryption method based on chaos and Zigzag transformation
CN107659751B (en) Multi-image encryption method based on DNA coding and chaos
CN111031193B (en) Image encryption method based on three-dimensional composite scrambling model and chaos
CN112019321B (en) Five-dimensional optical probability shaping encryption method based on high-dimensional chaotic system
CN107659752B (en) Multi-image encryption method based on DNA coding and chaos
CN112714235A (en) Image encryption method based on filling curve and adjacent pixel bit scrambling
CN111682931B (en) Chaos-based multi-audio high-dimensional encryption method
CN111008383B (en) Image encryption method based on multidirectional diffusion and DNA coding
CN112202545B (en) Image encryption method based on Y-type filling curve and variable-step Joseph traversal
CN106604040A (en) Multi-image encryption method based on mixed primitives and full permutation
Gabr et al. A combination of decimal-and bit-level secure multimedia transmission
Acharya Image encryption using a new chaos based encryption algorithm
CN111682932B (en) Single-round image encryption method based on mixed chaotic mapping
US6301361B1 (en) Encoding and decoding information using randomization with an alphabet of high dimensionality
CN117527984A (en) Image encryption method based on sine and cosine two-dimensional chaotic system
Ebrahim et al. Hybrid model for cloud data security using steganography
CN112073171B (en) Multi-audio encryption method based on chaos and DNA coding
CN115361109B (en) Homomorphic encryption method supporting bidirectional proxy re-encryption
Dweik et al. A survey of lightweight image encryption for IoT
Gnanachandra et al. AI-Driven Innovations in Cryptography: Enhancing Key Generation and Security
Yadav et al. A novel visual cryptography scheme based on substitution cipher
CN111682930B (en) Chaos-based bit-level audio encryption method
KR101076747B1 (en) Method and apparatus for random accessible encryption and decryption by using a hierarchical tree structure of stream cipher module
CN117114959B (en) Image encryption method based on key feedback mechanism of multi-parameter one-dimensional chaotic system
CN114239037B (en) Multi-image encryption method based on sand road rule

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant