An Enhanced Audio Encryption Method using Unicode and Dynamic Message Mapping in Elliptic Curve Cryptography
Main Article Content
Abstract
This paper presents a novel paradigm for audio cryptosystems that uses elliptic curve encryption to secure audio data. It has the goal of increasing the level of security in digital audio transmission. The suggested method works by mapping an audio message into an Elliptic Curve, then encrypting and decrypting it. This work's uniqueness stems from the use of ECC for encryption, which is the first of its type in audio streaming. The choice of an acceptable mapping method was difficult; hence the dynamic mapping method was used. ECC was chosen for encryption because it is a discrete logarithm problem that is not susceptible to attack by quantum computers. Different audio samples representing bird sound, lion sound, and music sound were used to assess the performance of the recommended cryptosystem. The proposed model's usefulness for quick audio encryption and computational simplicity has been demonstrated. Various statistical analyses have been performed on the suggested model, and the results show that audio signals are better protected from various security risks.
Article Details
Upon receipt of accepted manuscripts, authors will be invited to complete a copyright license to publish the paper. At least the corresponding author must send the copyright form signed for publication. It is a condition of publication that authors grant an exclusive licence to the the INFOCOMP Journal of Computer Science. This ensures that requests from third parties to reproduce articles are handled efficiently and consistently and will also allow the article to be as widely disseminated as possible. In assigning the copyright license, authors may use their own material in other publications and ensure that the INFOCOMP Journal of Computer Science is acknowledged as the original publication place.
References
A. Luma, B. Selimi, and L. Ameti, “Using Elliptic Curve Encryption and Decryption for Securing Audio Messages,” in Transactions on Engineering Technologies, G.-C. Yang, S.-I. Ao, and L. Gelman, Eds. Dordrecht: Springer Netherlands, 2015, pp. 599–613. doi: 10.1007/978-94-017-9804-4_42.
V. Kapoor, V. S. Abraham, and R. Singh, “Elliptic Curve Cryptography,” vol. 9, no. 20, p. 8, 2008.
“Message mapping and reverse mapping in elliptic curve cryptosystem.” https://onlinelibrary.wiley.com/doi/epdf/10.1002/sec.1702 (accessed Jan. 15, 2022).
S. Ganesh Babu and P. Ilango, “Higher dimensional chaos for Audio encryption,” in 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), Apr. 2013, pp. 52–58. doi: 10.1109/CICYBS.2013.6597206.
M. Arnold, “Audio watermarking: features, applications and algorithms,” in 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532), Jul. 2000, vol. 2, pp. 1013–1016 vol.2. doi: 10.1109/ICME.2000.871531.
S. B. Asok, P. Karthigaikumar, R. Sandhya, K. Naveen Jarold, and N. M. S. Mangai, “A secure cryptographic scheme for audio signals,” in 2013 International Conference on Communication and Signal Processing, Apr. 2013, pp. 748–752. doi: 10.1109/iccsp.2013.6577156.
H. Wang, M. Hempel, D. Peng, W. Wang, H. Sharif, and H.-H. Chen, “Index-Based Selective Audio Encryption for Wireless Multimedia Sensor Networks,” IEEE Trans. Multimed., vol. 12, no. 3, pp. 215–223, Apr. 2010, doi: 10.1109/TMM.2010.2041102.
A. Tamimi and A. Abdalla, Audio Shuffle-Encryption Algorithm, vol. 1. 2014.
H. Gupta and D. V. K. Sharma, “Role of Multiple Encryption in Secure Voice Communication,” vol. 1, no. 2, p. 5, 2013.
A. Luma and L. Ameti, “ECC Secured Voice Transmitter,” 2014, doi: 10.13140/2.1.4960.4482.
R. Singh, R. Chauhan, V. K. Gunjan, and P. Singh, “Implementation of Elliptic Curve Cryptography for Audio Based Application,” Int. J. Eng. Res., vol. 3, no. 1, p. 5, 2014.
A. Luma, B. Selimi, and L. Ameti, “Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem,” Int. J. Appl. Math. Electron. Comput., vol. 2, no. 4, p. 54, Dec. 2014, doi: 10.18100/ijamec.68742.
R. Shelke and M. Nemade, “Audio Encryption Algorithm Using Modified Elliptical Curve Cryptography and Arnold Transform for Audio Watermarking,” in 2018 3rd International Conference for Convergence in Technology (I2CT), Pune, Apr. 2018, pp. 1–4. doi: 10.1109/I2CT.2018.8529329.
K. Kordov, “A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture,” Electronics, vol. 8, no. 5, p. 530, May 2019, doi: 10.3390/electronics8050530.
D. Shah, T. Shah, M. M. Hazzazi, M. I. Haider, A. Aljaedi, and I. Hussain, “An Efficient Audio Encryption Scheme Based on Finite Fields,” IEEE Access, vol. 9, pp. 144385–144394, 2021, doi: 10.1109/ACCESS.2021.3119515.
F. Amounas, el kinani el hassan, and E. El, “Fast Mapping Method based on Matrix Approach For Elliptic Curve Cryptography Corresponding Author,” Jan. 2022.