Proceedings of Meetings on Acoustics

Similar documents
Wideband Speech Encryption Based Arnold Cat Map for AMR-WB G Codec

Speech Coding Technique And Analysis Of Speech Codec Using CS-ACELP

Simulation of Conjugate Structure Algebraic Code Excited Linear Prediction Speech Coder

Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System

An objective method for evaluating data hiding in pitch gain and pitch delay parameters of the AMR codec

Overview of Code Excited Linear Predictive Coder

Audio Compression using the MLT and SPIHT

techniques are means of reducing the bandwidth needed to represent the human voice. In mobile

Cellular systems & GSM Wireless Systems, a.a. 2014/2015

Data Transmission at 16.8kb/s Over 32kb/s ADPCM Channel

Speech Coding using Linear Prediction

An Introduction to Compressive Sensing and its Applications

EUROPEAN pr ETS TELECOMMUNICATION March 1996 STANDARD

NOISE SHAPING IN AN ITU-T G.711-INTEROPERABLE EMBEDDED CODEC

Transcoding of Narrowband to Wideband Speech

ON THE PERFORMANCE OF WTIMIT FOR WIDE BAND TELEPHONY

4. Design Principles of Block Ciphers and Differential Attacks

Information. LSP (Line Spectrum Pair): Essential Technology for High-compression Speech Coding. Takehiro Moriya. Abstract

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

Chapter IV THEORY OF CELP CODING

Wideband Speech Coding & Its Application

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1

Synchronous Overlap and Add of Spectra for Enhancement of Excitation in Artificial Bandwidth Extension of Speech

Adaptive time scale modification of speech for graceful degrading voice quality in congested networks

Flexible and Scalable Transform-Domain Codebook for High Bit Rate CELP Coders

Transcoding free voice transmission in GSM and UMTS networks

3GPP TS V5.0.0 ( )

Final draft ETSI EN V1.2.0 ( )

A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map

COMPARATIVE REVIEW BETWEEN CELP AND ACELP ENCODER FOR CDMA TECHNOLOGY

ElGamal Public-Key Encryption and Signature

International Journal of Advanced Engineering Technology E-ISSN

JOINT BINARY CODE COMPRESSION AND ENCRYPTION

CHAPTER 7 ROLE OF ADAPTIVE MULTIRATE ON WCDMA CAPACITY ENHANCEMENT

CDMA Physical Layer Built-in Security Enhancement

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System

The Optimization of G.729 Speech codec and Implementation on the TMS320VC5402

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Chaos Encryption Method Based on Large Signal Modulation in Additive Nonlinear Discrete-Time Systems

Communications Theory and Engineering

Speech Compression Using Voice Excited Linear Predictive Coding

Random Bit Generation and Stream Ciphers

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

TMA4155 Cryptography, Intro

Call Quality Measurement for Telecommunication Network and Proposition of Tariff Rates

Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm

QUANTIZATION NOISE ESTIMATION FOR LOG-PCM. Mohamed Konaté and Peter Kabal

DUBLIN CITY UNIVERSITY

Image Encryption using Pseudo Random Number Generators

Enhancement of Speech Signal Based on Improved Minima Controlled Recursive Averaging and Independent Component Analysis

Lecture Outline. Data and Signals. Analogue Data on Analogue Signals. OSI Protocol Model

Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels

Audio Signal Compression using DCT and LPC Techniques

Performance study of Text-independent Speaker identification system using MFCC & IMFCC for Telephone and Microphone Speeches

Efficient Statistics-Based Algebraic Codebook Search Algorithms Derived from RCM for an ACELP Speech Coder

Digital Speech Processing and Coding

EUROPEAN pr ETS TELECOMMUNICATION November 1996 STANDARD

Spatial Audio Transmission Technology for Multi-point Mobile Voice Chat

A New Chaotic Secure Communication System

An Improved Version of Algebraic Codebook Search Algorithm for an AMR-WB Speech Coder

Using RASTA in task independent TANDEM feature extraction

Implementation and Comparative analysis of Orthogonal Frequency Division Multiplexing (OFDM) Signaling Rashmi Choudhary

LOSS CONCEALMENTS FOR LOW-BIT-RATE PACKET VOICE IN VOIP. Outline

sensors ISSN

Perceptual wideband speech and audio quality measurement. Dr Antony Rix Psytechnics Limited

Image Encryption Based on New One-Dimensional Chaotic Map

RECOMMENDATION ITU-R M

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol

6/29 Vol.7, No.2, February 2012

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

Ninad Bhatt Yogeshwar Kosta

OFDM Based Low Power Secured Communication using AES with Vedic Mathematics Technique for Military Applications

Non-Uniform Speech/Audio Coding Exploiting Predictability of Temporal Evolution of Spectral Envelopes

Audio Signal Encryption Based on Permutation Relations and Residue Number System

University of Washington Department of Electrical Engineering Computer Speech Processing EE516 Winter 2005

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

Acoustic Echo Cancellation using LMS Algorithm

HIGH QUALITY AUDIO CODING AT LOW BIT RATE USING WAVELET AND WAVELET PACKET TRANSFORM

ETSI TS V ( )

Journal of American Science 2015;11(7)

NOISE ESTIMATION IN A SINGLE CHANNEL

APPLICATIONS OF DSP OBJECTIVES

Auditory modelling for speech processing in the perceptual domain

Chapter 4 MASK Encryption: Results with Image Analysis

Surveillance Transmitter of the Future. Abstract

Copyright S. K. Mitra

Mel Spectrum Analysis of Speech Recognition using Single Microphone

A NEW FEATURE VECTOR FOR HMM-BASED PACKET LOSS CONCEALMENT

Apex Group of Institution Indri, Karnal, Haryana, India

Chapter 4 The Data Encryption Standard

Audio and Speech Compression Using DCT and DWT Techniques

Performance Analysis of WiMAX Physical Layer Model using Various Techniques

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

Improving Sound Quality by Bandwidth Extension

10 Speech and Audio Signals

Low Bit Rate Speech Coding Using Differential Pulse Code Modulation

Perceptual Speech Enhancement Using Multi_band Spectral Attenuation Filter

Design of a High Throughput 128-bit AES (Rijndael Block Cipher)

Open Access Improved Frame Error Concealment Algorithm Based on Transform- Domain Mobile Audio Codec

Transcription:

Proceedings of Meetings on Acoustics Volume 19, 213 http://acousticalsociety.org/ ICA 213 Montreal Montreal, Canada 2-7 June 213 Signal Processing in Acoustics Session 2pSP: Acoustic Signal Processing for Various Applications 2pSP6. Efficient speech encryption using chaotic cat map for code-excited linear prediction (CELP) based coders in packet networks Fatiha Merazka* *Corresponding author's address: Telecommunications, University of Science & Technology Houari Boumediene, P.O.Box 32 El Alia, Algiers, 16111, Bab Ezzouar, Algeria, fmerazka@usthb.dz The increasing importance of multimedia applications is placing a great insist on content protection and customer privacy. Communications can be intercepted, especially over wireless links. Since encryption can effectively prevent eavesdropping, its use is widely advocated. The codec G. 729 based CS-ACELP algorithm is standardized as voice codec by ITU-T for multimedia and Voice over Internet Protocol (VoIP) applications. In this paper we introduce a speech encryption method based chaotic cat map algorithm. Cat map extended to two-dimensional NxN matrix. It takes concepts from linear algebra and uses them to change the positions of the values of the matrix. The result after applying the Cat Map will be shuffled signals that contain the same values of the original signals. We applied our encryption scheme to the standard ITU-T G.729 standard speech coder to evaluate its performance. Simulation results show that G.729 based cat map encryption is very efficient since the encrypted speech is similar to a white noise. The perceptual evaluation of speech quality (PESQ) and enhanced modified bark spectral distortion (EMBSD) tests for speech extracted from TIMIT database confirm the efficiency of our proposed scheme. Published by the Acoustical Society of America through the American Institute of Physics 213 Acoustical Society of America [DOI: 1.1121/1.48747] Received 23 Jan 213; published 2 Jun 213 Proceedings of Meetings on Acoustics, Vol. 19, 5563 (213) Page 1

INTRODUCTION Most multimedia applications such as speech and audio are essential, and their service is the basis in telephony industry, video conference and news broadcasting. Thus, the encryption of speech or audio is very important. The field of encryption and security is becoming very important in the twenty first century when a massive amount of information is transmitted over the Local Area Networks as well as the Internet. Encryption is the process of transforming information (plaintext) into a special form called Cipher by using some type of algorithm to make it unreadable to anyone except those who have the knowledge of the algorithm and its secret keys [1]. Militaries, governments, private companies have used the encryption for a long time to facilitate secret communication. Traditional symmetric key algorithms like Advanced Encryption Standard (AES) and Data Encryption Standard (DES) use small blocks size with complex permutations process to give secure ciphertext [2-4]. The Linear Feedback Shift Register (LFSR) has been one of the most popular encryption techniques widely used in speech communication. LFSR algorithms have found wide applications in wireless communication, including scrambling, error correction coding, encryption, testing, and random number generation [5-8]. Chaotic maps algorithms are very suitable for various data encryption schemes. In particular, chaotic maps are easy to be implemented by microprocessors and personal computers. Therefore, chaotic cryptosystems generally have high speed with low cost, which makes them better candidates than many traditional ciphers for multimedia data encryption. In this work, we consider the use of chaotic cat map encryption, first proposed by Vladimir Arnold in the 196s, for the standard ITU-T G.729. The paper is organized as follows. In section 2, we derive the chaotic cat map algorithm. We give a brief description the standard IUT-T G.729 in section 3. We present the simulation results to demonstrate its performance in section 4. Concluding remarks are provided in section 4. ENCRYPTION BASED CHAOTIC CAT MAP The signal is scaled by a matrix NxN. If M is the message size, N M of 8 bits. The encryption function is represented by the equation 1 1 2. In our case, we work with frames x y n1 n1 xn A mod( N) yn (1) The matrix A is chosen such as A 1. Thus, the confusion key of cat map is composed of the parameter a and b. The matrix A is of the form given by equation 2 ab 1 a A (2) b 1 where a and b are two values selected randomly between and 256. Indeed, the Cat Map performs a permutation. The coordinates x n, y n of a given bit in the original signal become x n1, yn1 in the encrypted signal. The matrix obtained from encryption equation is transformed into encrypted vector to generate the encrypted message. Decryption is done by the same equation except that the matrix A is replaced by its inverse [9]. Decryption is done by the same equation except that the matrix A is replaced by its inverse [9] OVERVIEW OF THE STANDARD G.729 The standard G.729 speech coder is an 8 kbps Conjugate-Structure Algebraic-Code-Excited Linear Prediction (CS-ACELP) speech compression algorithm approved by ITU-T. G.729 offers high quality, robust speech performance at the price of complexity. It requires 1 ms input frames and generates frames of 8 bits in length. With the G.729 coder processing signals in 1 ms frames and 5 ms look-ahead, the total algorithmic delay is 15 ms. Proceedings of Meetings on Acoustics, Vol. 19, 5563 (213) Page 2

each 8 bit frame produced contains linear prediction coefficients, excitation code book indices, and gain parameters that are used by the decoder in order to reproduce speech. The inputs/outputs of this algorithm are 16 bit linear PCM samples that are converted from/to an 8 kbps compressed data stream. G.729 is mostly used in Voice over IP (VoIP) applications for its low bandwidth requirement [1]. SIMULATIONS AND RESULTS In this section, several experiments are carried out to test the encryption efficiency of the proposed speech cryptosystem. The quality of both the encrypted and decrypted speech signals is assessed. Simulations and results of our implemented method are given in this section. The speech used is extracted from TIMIT database [11]. The original speech and its spectrogram are given in FIGURES 1 and 2 respectively for comparison later with the decrypted speech. After the speech is coded with the ITU-T G.729, it is encrypted based chaotic cat map algorithm. The encrypted speech and its spectrogram are presented in FIGURES 3 and 4 respectively..3 Original speech.1 Amplitude -.1 - -.3 -.4 2 4 6 8 1 12 14 16 x 1 4 FIGURE 1. Waveform of original speech 1 Spectrogram of original speech.8 Frequency.6.4 1 2 3 4 5 6 7 FIGURE 2. Spectrogram of original speech. x 1 4 Proceedings of Meetings on Acoustics, Vol. 19, 5563 (213) Page 3

.8 Encrypted speech with chaotic cat map for G.729 Amplitude.7.6.5.4.3.1 2 4 6 8 1 12 14 16 18 FIGURE 3. Speech encrypted based chaotic cat map algorithm 1 Spectrogram of encrypted speech with chaotic cat map for G.729.8 Frequency.6.4 1 2 3 4 5 6 7 8 x 1 4 FIGURE 4. Spectrogram of speech encrypted based chaotic cat map algorithm We can see from FIGURES 3 and 4 that the encrypted speeches signal is obviously similar to the white noise which indicates that no residual intelligibility can be useful for eavesdroppers at the communication channel. The decrypted and decoded speech with G.729 and its spectrogram are presented in FIGURES 5 and 6 respectively. decoded speech with G.729 after chaotic cat map decryption.1 Amplitude -.1 - -.3 2 4 6 8 1 12 14 16 x 1 4 FIGURE 5. Waveform of decrypted speech Proceedings of Meetings on Acoustics, Vol. 19, 5563 (213) Page 4

1 Spectrogram of decoded speech with G.729 after chaotic cat map decryption.8 Frequency.6.4 1 2 3 4 5 6 7 FIGURE 6. Spectrogram of decrypted speech x 1 4 Comparing FIGURES 1 and 5, we can see clearly that the decoded speech signal is the same as the original one with hardly noticeable differences. The spectrograms of the original speech (FIGURE 2) and the decrypted speech (FIGURE 6) are identical and also with unnoticeable differences. We use PESQ for an objective quality measure [12] and EMBSD tests [13]. The obtained results are summarized in TABLE 1. TABLE 1. PESQ and EMBSD results Algorithm PESQ EMBSD G. 729 alone 3.322 1.636 G. 729 + chaotic cat map 3.322 1.636 Results from TABLE 1 confirm the efficiency of the chaotic cat map based algorithm for the standard ITU-T G.729 since the same values are obtained with and without encryption with the chaotic cat map algorithm. CONCLUSION We have presented an efficient way of encryption and decryption of speech signals for the ITU-TG. 729 codec based on chaotic cat map. From our results, it is obvious that even with insignificant differences in speech quality; the presented method performs well with the standard ITU-T G. 729 for the encryption and decryption of speech. REFERENCES 1. U. Sahu, K. S. Dash, Image Encryption, and Authentication Using Orthogonal Transformation on Residual Number System, National Institute of Technology of Rourkela, 28. 2. Advanced Encryption System, Federal Information Processing Standards Publication 197, 21 3. J. Daemen and V. R. Rijndael, "The advanced encryption standard", Dr. Dobb s J. volume 26 No 3, pp. 137 139, 21. 4. National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publication. 46, U.S. Government Printing Office, Washington, DC (1977) 5. IEEE Std. 82.11 27, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std. 82.11, 27. 6. G. C. Ahlquist, M. Rice, and B. Nelson, Error Control Coding in Software Radios: An FPGA Approach, in Proc. of the IEEE Personal Communications, 1999; 6( 4): 35-39. Proceedings of Meetings on Acoustics, Vol. 19, 5563 (213) Page 5

7. V. Sriram and D. Kearney, An FPGA Implementation of a Parallelized MT19937 Uniform Random Number Generator, EURASIP Journal on Embedded Systems. 7, 1-6. (29). 8. K. K. Saluja and C.-F. See, "An Efficient Signature Computation Method," IEEE Design and Test of Computers, 9(4), 22-26 (1992). 9. Zhaopin Su, Selective Encryption for G.729 Speech Using Chaotic Maps, International Conference on Multimedia Information Networking and Security, 488 492 (29). 1. ITU, ITU-T G.729: CS-ACELP Speech Coding at 8 kbit/s (ITU 1998). 11. NIST,Timit Speech Corpus (NIST 199). 12. ITU-T Draft Rec P.862 Perceptual evaluation of speech quality (PESQ), an objective method of end-to-end speech quality assessment of narrowband telephone networks and speech codecs (May. 2). 13. W. Yang, Enhanced Modified Bark Spectral Distortion (EMBSD): An Objective Speech Quality Measurement Based on Audible Distortion and Cognition Model (Ph.D. dissertation, Temple University, USA, May 1999). Proceedings of Meetings on Acoustics, Vol. 19, 5563 (213) Page 6