Pub Date : 2023-01-01DOI: 10.14569/ijacsa.2023.0140554
Shuangyuan Li, Qichang Li, Meng Li
—As network attacks are more and more frequent and network security is more and more serious, it is important to detect network intrusion accurately and efficiently. With the continuous development of deep learning, a lot of research achievements are applied to intrusion detection. Deep learning is more accurate than machine learning, but in the face of a large amount of data learning, the performance will be degraded due to data imbalance. In view of the serious imbalance of network traffic data sets at present, this paper proposes to process data expansion with GAN to solve data imbalance and detect network intrusion in combination with CNN and BiLSTM. In order to verify the efficiency of the model, the CIC-IDS 2017 data set is used for evaluation, and the model is compared with machine learning methods such as Random Forest and Decision Tree. The experiment shows that the performance of this model is significantly improved over other traditional models, and the GAN-CNN-BiLSTM model can improve the efficiency of intrusion detection, and its overall accuracy is improved compared with SVM, DBN, CNN, BiLSTM and other models.
{"title":"A Method for Network Intrusion Detection Based on GAN-CNN-BiLSTM","authors":"Shuangyuan Li, Qichang Li, Meng Li","doi":"10.14569/ijacsa.2023.0140554","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140554","url":null,"abstract":"—As network attacks are more and more frequent and network security is more and more serious, it is important to detect network intrusion accurately and efficiently. With the continuous development of deep learning, a lot of research achievements are applied to intrusion detection. Deep learning is more accurate than machine learning, but in the face of a large amount of data learning, the performance will be degraded due to data imbalance. In view of the serious imbalance of network traffic data sets at present, this paper proposes to process data expansion with GAN to solve data imbalance and detect network intrusion in combination with CNN and BiLSTM. In order to verify the efficiency of the model, the CIC-IDS 2017 data set is used for evaluation, and the model is compared with machine learning methods such as Random Forest and Decision Tree. The experiment shows that the performance of this model is significantly improved over other traditional models, and the GAN-CNN-BiLSTM model can improve the efficiency of intrusion detection, and its overall accuracy is improved compared with SVM, DBN, CNN, BiLSTM and other models.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74080741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.14569/ijacsa.2023.0140103
M. Torky, Ali Bakhiet, Mohamed Bakrey, Ahmed Adel Ismail, A. I. E. Seddawy
.
.
{"title":"Recognizing Safe Drinking Water and Predicting Water Quality Index using Machine Learning Framework","authors":"M. Torky, Ali Bakhiet, Mohamed Bakrey, Ahmed Adel Ismail, A. I. E. Seddawy","doi":"10.14569/ijacsa.2023.0140103","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140103","url":null,"abstract":".","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75623841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.14569/ijacsa.2023.0140356
Giat Karyono, Asmala Ahmad, S. A. Asmai
—Removing as much noise as possible in an image while preserving its fine details is a complex and challenging task. We propose a wavelet-based and non-local means (NLM) denoising method to overcome the problem. Two well-known wavelets: dual-tree complex wavelet transform (DT-CWT) and discrete wavelet transform (DWT), have been used to change the noise image into several wavelet coefficients sequentially. NLM filtering and universal hard thresholding with cycle spinning have been used for thresholding on its approximation and detail coefficients, respectively. The inverse two-dimensional DWT was applied to the modified wavelet coefficients to obtain the denoised image. We conducted experiments with twelve test images on the set12 data set, adding the additive Gaussian white noise with variances of 10 to 90 in increments of 10. Three evaluation metrics, such as peak signal noise to rate (PSNR), structural similarity index metric (SSIM), and mean square error (MSE), have been used to evaluate the effectiveness of the proposed denoising method. From these measurement results, the proposed denoising method outperforms DT-CWT, DWT, and NLM almost in all noise levels except for the noise level of 10. At that noise level, the proposed denoising method is lower than NLM but better than DT-CWT and DWT.
{"title":"Image Denoising using Wavelet Cycle Spinning and Non-local Means Filter","authors":"Giat Karyono, Asmala Ahmad, S. A. Asmai","doi":"10.14569/ijacsa.2023.0140356","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140356","url":null,"abstract":"—Removing as much noise as possible in an image while preserving its fine details is a complex and challenging task. We propose a wavelet-based and non-local means (NLM) denoising method to overcome the problem. Two well-known wavelets: dual-tree complex wavelet transform (DT-CWT) and discrete wavelet transform (DWT), have been used to change the noise image into several wavelet coefficients sequentially. NLM filtering and universal hard thresholding with cycle spinning have been used for thresholding on its approximation and detail coefficients, respectively. The inverse two-dimensional DWT was applied to the modified wavelet coefficients to obtain the denoised image. We conducted experiments with twelve test images on the set12 data set, adding the additive Gaussian white noise with variances of 10 to 90 in increments of 10. Three evaluation metrics, such as peak signal noise to rate (PSNR), structural similarity index metric (SSIM), and mean square error (MSE), have been used to evaluate the effectiveness of the proposed denoising method. From these measurement results, the proposed denoising method outperforms DT-CWT, DWT, and NLM almost in all noise levels except for the noise level of 10. At that noise level, the proposed denoising method is lower than NLM but better than DT-CWT and DWT.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74449077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.14569/ijacsa.2023.0140416
Amit Moondra, P. Chahal
org
org
{"title":"Improved Speaker Recognition for Degraded Human Voice using Modified-MFCC and LPC with CNN","authors":"Amit Moondra, P. Chahal","doi":"10.14569/ijacsa.2023.0140416","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140416","url":null,"abstract":"org","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74458282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.14569/ijacsa.2023.01403103
Pardeep Kumar, Ankit Kumar
—In recent decades, cardiovascular diseases have eclipsed all others as the main reason for death in both low and middle income countries. Early identification and continuous clinical monitoring can reduce the death rate associated with heart disorders. Neither service is yet accessible, as it requires more intellect, time, and skill to effectively detect cardiac disorders in all circumstances and to advise a patient for 24 hours. In this study, researchers suggested a Machine Learning-based approach to forecast the development of cardiac disease. For precise identification of cardiac disease, an efficient ML technique is required. The proposed method works on five classes, one normal and four diseases. In the research, all classes were assigned a primary task, and recommendations were made based on that. The proposed method optimises feature weighting and selects efficient features. Following feature optimization, adaptive boost learning using tree and KNN bases is used. In the trial, sensitivity improved by 3-4%, specificity by 4-5%, and accuracy by 3-4% compared to the previous approach.
{"title":"Heart Disease Classification and Recommendation by Optimized Features and Adaptive Boost Learning","authors":"Pardeep Kumar, Ankit Kumar","doi":"10.14569/ijacsa.2023.01403103","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.01403103","url":null,"abstract":"—In recent decades, cardiovascular diseases have eclipsed all others as the main reason for death in both low and middle income countries. Early identification and continuous clinical monitoring can reduce the death rate associated with heart disorders. Neither service is yet accessible, as it requires more intellect, time, and skill to effectively detect cardiac disorders in all circumstances and to advise a patient for 24 hours. In this study, researchers suggested a Machine Learning-based approach to forecast the development of cardiac disease. For precise identification of cardiac disease, an efficient ML technique is required. The proposed method works on five classes, one normal and four diseases. In the research, all classes were assigned a primary task, and recommendations were made based on that. The proposed method optimises feature weighting and selects efficient features. Following feature optimization, adaptive boost learning using tree and KNN bases is used. In the trial, sensitivity improved by 3-4%, specificity by 4-5%, and accuracy by 3-4% compared to the previous approach.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74665844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.14569/ijacsa.2023.0140638
El Mehdi Ben Laoula, M. Midaoui, M. Youssfi, O. Bouattane
The rising number of automobiles has led to an increased demand for a reliable license plate identification system that can perform effectively in diverse conditions. This applies to local authorities, public organizations, and private companies in Morocco, as well as worldwide. To meet this need, a strong License Plate Recognition (LPR) system is required, taking into account local plate specifications and fonts used by plate manufacturers. This paper presents an intelligent LPR system based on the YOLOv5 framework, trained on a customized dataset encompassing multiple fonts and circumstances such as illumination, climate, and lighting. The system incorporates an intelligent region segmentation level that adapts to the plate's type, improving recognition accuracy and addressing separator issues. Remarkably, the model achieves an impressive precision rate of 99.16% on problematic plates with specific illumination, separators, and degradations. This research represents a significant advancement in the field of license plate recognition, providing a reliable solution for accurate identification and paving the way for broader applications in Morocco and beyond. Keywords—License plate recognition; YOLOv5; intelligent region segmentation; customized dataset; Moroccan license plate issues; fonts-based data
{"title":"Intelligent Moroccan License Plate Recognition System Based on YOLOv5 Build with Customized Dataset","authors":"El Mehdi Ben Laoula, M. Midaoui, M. Youssfi, O. Bouattane","doi":"10.14569/ijacsa.2023.0140638","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140638","url":null,"abstract":"The rising number of automobiles has led to an increased demand for a reliable license plate identification system that can perform effectively in diverse conditions. This applies to local authorities, public organizations, and private companies in Morocco, as well as worldwide. To meet this need, a strong License Plate Recognition (LPR) system is required, taking into account local plate specifications and fonts used by plate manufacturers. This paper presents an intelligent LPR system based on the YOLOv5 framework, trained on a customized dataset encompassing multiple fonts and circumstances such as illumination, climate, and lighting. The system incorporates an intelligent region segmentation level that adapts to the plate's type, improving recognition accuracy and addressing separator issues. Remarkably, the model achieves an impressive precision rate of 99.16% on problematic plates with specific illumination, separators, and degradations. This research represents a significant advancement in the field of license plate recognition, providing a reliable solution for accurate identification and paving the way for broader applications in Morocco and beyond. Keywords—License plate recognition; YOLOv5; intelligent region segmentation; customized dataset; Moroccan license plate issues; fonts-based data","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73240481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
—Anomalous trajectory detection is an important approach to detecting taxi fraud behaviors in urban traffic systems. The existing methods usually ignore the integration of the trajectory access location with the time and trajectory structure, which incorrectly detects normal trajectories that bypass the congested road as anomalies and ignores circuitous travel of trajectories. Therefore, this study proposes an anomalous trajectory detection algorithm using the popular routes in different traffic periods to solve this problem. First, to obtain popular routes in different time periods, this study divides the time according to the time distribution of the traffic trajectories. Second, the spatiotemporal frequency values of the nodes are obtained by combining the trajectory point moments and time span to exclude the interference of the temporal anomaly trajectory on the frequency. Finally, a gridded distance measurement method is designed to quantitatively measure the anomaly between the trajectory and the popular routes by combining the trajectory position and trajectory structure. Extensive experiments are conducted on real taxi trajectory datasets; the results show that the proposed method can effectively detect anomalous trajectories. Compared to the baseline algorithms, the proposed algorithm has a shorter running time and a significant improvement in F-Score , with the highest improvement rate of 7.9%, 5.6%, and 10.7%, respectively.
{"title":"Anomalous Taxi Trajectory Detection using Popular Routes in Different Traffic Periods","authors":"Lina Xu, Yonglong Luo, Qingying Yu, Xiao Zhang, Wen Zhang, Zhonghao Lu","doi":"10.14569/ijacsa.2023.0140739","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140739","url":null,"abstract":"—Anomalous trajectory detection is an important approach to detecting taxi fraud behaviors in urban traffic systems. The existing methods usually ignore the integration of the trajectory access location with the time and trajectory structure, which incorrectly detects normal trajectories that bypass the congested road as anomalies and ignores circuitous travel of trajectories. Therefore, this study proposes an anomalous trajectory detection algorithm using the popular routes in different traffic periods to solve this problem. First, to obtain popular routes in different time periods, this study divides the time according to the time distribution of the traffic trajectories. Second, the spatiotemporal frequency values of the nodes are obtained by combining the trajectory point moments and time span to exclude the interference of the temporal anomaly trajectory on the frequency. Finally, a gridded distance measurement method is designed to quantitatively measure the anomaly between the trajectory and the popular routes by combining the trajectory position and trajectory structure. Extensive experiments are conducted on real taxi trajectory datasets; the results show that the proposed method can effectively detect anomalous trajectories. Compared to the baseline algorithms, the proposed algorithm has a shorter running time and a significant improvement in F-Score , with the highest improvement rate of 7.9%, 5.6%, and 10.7%, respectively.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73716696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.14569/ijacsa.2023.0140589
Qinyan Gao
—With the development of virtual technology, posture recognition technology has been integrated into virtual technology. This new technology allows users to further understand and observe the activities carried out in life scenes based on their original observation of the external world. And it enables them to make intelligent decisions. Existing posture recognition cannot meet the requirements of precise positioning in virtual environments. Therefore, a two-stage three-dimensional pose recognition model is proposed. The experiment illustrates that the three-dimensional gesture recognition performance is excellent. In addition, under the ablation experiment, the error accuracy of the research model decreased by more than 5 mm, and the overall error accuracy decreased by 10%. In the P-R curve, the accuracy rate of the model reaches 0.741, and the recall rate reaches 0.65. When conducting empirical analysis, the virtual posture disassembly action is complete; the disassembly error is less than 5%, and the disassembly error accuracy is good. The fit degree of the leg bending amplitude reaches over 96%, and the fit degree of the arm bending amplitude reaches over 95%. When the model is applied to actual teaching, the overall satisfaction score of teachers and students reaches 94.6 points. This has effectively improved the teaching effect of art design and is of great significance to the development of education in China.
{"title":"The Application of Virtual Technology Based on Posture Recognition in Art Design Teaching","authors":"Qinyan Gao","doi":"10.14569/ijacsa.2023.0140589","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140589","url":null,"abstract":"—With the development of virtual technology, posture recognition technology has been integrated into virtual technology. This new technology allows users to further understand and observe the activities carried out in life scenes based on their original observation of the external world. And it enables them to make intelligent decisions. Existing posture recognition cannot meet the requirements of precise positioning in virtual environments. Therefore, a two-stage three-dimensional pose recognition model is proposed. The experiment illustrates that the three-dimensional gesture recognition performance is excellent. In addition, under the ablation experiment, the error accuracy of the research model decreased by more than 5 mm, and the overall error accuracy decreased by 10%. In the P-R curve, the accuracy rate of the model reaches 0.741, and the recall rate reaches 0.65. When conducting empirical analysis, the virtual posture disassembly action is complete; the disassembly error is less than 5%, and the disassembly error accuracy is good. The fit degree of the leg bending amplitude reaches over 96%, and the fit degree of the arm bending amplitude reaches over 95%. When the model is applied to actual teaching, the overall satisfaction score of teachers and students reaches 94.6 points. This has effectively improved the teaching effect of art design and is of great significance to the development of education in China.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72593355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.14569/ijacsa.2023.0140426
Xiuli Yan
Recommendation algorithms can greatly improve the efficiency of information retrieval for users. This article briefly introduced recommendation algorithms based on association rules and algorithms based on interest and emotion analysis. After crawling music and comment data from the NetEase Cloud platform, a simulation experiment was conducted. Firstly, the performance of the Back-Propagation Neural Network (BPNN) in the interest and emotion-based algorithm for recommending music was tested, and then the impact of the proportion of emotion weight between comments and music on the emotion analysis-based algorithm was tested. Finally, the three recommendation algorithms based on association rules, user ratings, and interest and emotion analysis were compared. The results showed that when the BPNN used the dominant interest and emotion and secondary interest and emotion as judgment criteria, the accuracy of interest and emotion recognition for music and comments was higher. When the proportion of interest and emotion weight between comments and music was 6:4, the interest and emotion analysis-based recommendation algorithm had the highest accuracy. The interest and emotion-based recommendation algorithm had higher recommendation accuracy than the association rule-based and user rating-based algorithms, and could provide users with more personalized and emotional music recommendations. Keywords—Interest and emotion; recommendation algorithm; music; personalization
{"title":"Personalized Music Recommendation Based on Interest and Emotion: A Comparison of Multiple Algorithms","authors":"Xiuli Yan","doi":"10.14569/ijacsa.2023.0140426","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140426","url":null,"abstract":"Recommendation algorithms can greatly improve the efficiency of information retrieval for users. This article briefly introduced recommendation algorithms based on association rules and algorithms based on interest and emotion analysis. After crawling music and comment data from the NetEase Cloud platform, a simulation experiment was conducted. Firstly, the performance of the Back-Propagation Neural Network (BPNN) in the interest and emotion-based algorithm for recommending music was tested, and then the impact of the proportion of emotion weight between comments and music on the emotion analysis-based algorithm was tested. Finally, the three recommendation algorithms based on association rules, user ratings, and interest and emotion analysis were compared. The results showed that when the BPNN used the dominant interest and emotion and secondary interest and emotion as judgment criteria, the accuracy of interest and emotion recognition for music and comments was higher. When the proportion of interest and emotion weight between comments and music was 6:4, the interest and emotion analysis-based recommendation algorithm had the highest accuracy. The interest and emotion-based recommendation algorithm had higher recommendation accuracy than the association rule-based and user rating-based algorithms, and could provide users with more personalized and emotional music recommendations. Keywords—Interest and emotion; recommendation algorithm; music; personalization","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78602295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.14569/ijacsa.2023.0140269
X. Zhou, C. Wei, Xiaotang Shao
—Driven by the development of multimedia, the encryption of multimedia digital audio has received more attention; however, cryptography-based encryption methods have many shortcomings in encryption of multimedia information, and new encryption methods are urgently needed. This paper briefly introduced cryptography and chaos theory, designed a chaos-based encryption algorithm that combined Logistic mapping and Sine mapping for confusion and used a Hopfield chaos neural network for diffusion, explained the encryption and decryption process of the algorithm, and tested the algorithm. It was found that the keys obtained by the proposed algorithm passed the SP800-22 test, and the correlation between the three encrypted audio and the original audio was 0.0261, -0.0536, and 0.0237, respectively, all of which were small, and the peak signal-to-noise ratio (PSNR) values were -0.348 dB, -7.645 dB, and -3.636 dB, respectively, which were significantly different from the original audio. The NSCR and UACI were also closer to the original values. The results prove that the proposed algorithm has good security and can encrypt the actual multimedia digital audio.
{"title":"A Study of Encryption for Multimedia Digital Audio Security","authors":"X. Zhou, C. Wei, Xiaotang Shao","doi":"10.14569/ijacsa.2023.0140269","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140269","url":null,"abstract":"—Driven by the development of multimedia, the encryption of multimedia digital audio has received more attention; however, cryptography-based encryption methods have many shortcomings in encryption of multimedia information, and new encryption methods are urgently needed. This paper briefly introduced cryptography and chaos theory, designed a chaos-based encryption algorithm that combined Logistic mapping and Sine mapping for confusion and used a Hopfield chaos neural network for diffusion, explained the encryption and decryption process of the algorithm, and tested the algorithm. It was found that the keys obtained by the proposed algorithm passed the SP800-22 test, and the correlation between the three encrypted audio and the original audio was 0.0261, -0.0536, and 0.0237, respectively, all of which were small, and the peak signal-to-noise ratio (PSNR) values were -0.348 dB, -7.645 dB, and -3.636 dB, respectively, which were significantly different from the original audio. The NSCR and UACI were also closer to the original values. The results prove that the proposed algorithm has good security and can encrypt the actual multimedia digital audio.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78716038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}