{"title":"基于切比雪夫映射的音频无损加密方法","authors":"Mehmet Demirtaş","doi":"10.56038/oprd.v2i1.234","DOIUrl":null,"url":null,"abstract":"This paper presents a lossless and secure audio encryption method based on the chaotic Chebyshev map. Firstly, the input audio samples are preprocessed to obtain the integer and decimal parts. The integer parts are rescaled to the interval [0,255]. By iterating the Chebyshev map in the chaotic range using plaintext-dependent variables, the integer parts of the input audio sample are scrambled and then diffused. Finally, a post-processing operation is applied to the diffused audio samples. Keyspace and key sensitivity analysis, histogram analysis, the correlation between adjacent samples analysis, information entropy analysis, number of sample change rate analysis, and speed analysis results are presented. These security analysis results show that the proposed audio encryption method can be used in secure voice transmission applications.","PeriodicalId":117452,"journal":{"name":"Orclever Proceedings of Research and Development","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Lossless Audio Encryption Method based on Chebyshev Map\",\"authors\":\"Mehmet Demirtaş\",\"doi\":\"10.56038/oprd.v2i1.234\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a lossless and secure audio encryption method based on the chaotic Chebyshev map. Firstly, the input audio samples are preprocessed to obtain the integer and decimal parts. The integer parts are rescaled to the interval [0,255]. By iterating the Chebyshev map in the chaotic range using plaintext-dependent variables, the integer parts of the input audio sample are scrambled and then diffused. Finally, a post-processing operation is applied to the diffused audio samples. Keyspace and key sensitivity analysis, histogram analysis, the correlation between adjacent samples analysis, information entropy analysis, number of sample change rate analysis, and speed analysis results are presented. These security analysis results show that the proposed audio encryption method can be used in secure voice transmission applications.\",\"PeriodicalId\":117452,\"journal\":{\"name\":\"Orclever Proceedings of Research and Development\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Orclever Proceedings of Research and Development\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.56038/oprd.v2i1.234\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Orclever Proceedings of Research and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.56038/oprd.v2i1.234","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Lossless Audio Encryption Method based on Chebyshev Map
This paper presents a lossless and secure audio encryption method based on the chaotic Chebyshev map. Firstly, the input audio samples are preprocessed to obtain the integer and decimal parts. The integer parts are rescaled to the interval [0,255]. By iterating the Chebyshev map in the chaotic range using plaintext-dependent variables, the integer parts of the input audio sample are scrambled and then diffused. Finally, a post-processing operation is applied to the diffused audio samples. Keyspace and key sensitivity analysis, histogram analysis, the correlation between adjacent samples analysis, information entropy analysis, number of sample change rate analysis, and speed analysis results are presented. These security analysis results show that the proposed audio encryption method can be used in secure voice transmission applications.