Dual-Level Security with Spiral Map** [DLSSM] Scheme for Secure Covert Transmission of Speech Signals in Various Indian Languages

  • Conference paper
  • First Online:
Information, Communication and Computing Technology (ICICCT 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1170))

  • 378 Accesses

Abstract

Security is essential to safeguard confidential data. Data in the form of signal, image, text etc. … can be hacked by intruders. Dual-Level Security with Spiral Map** [DLSSM] Scheme is proposed to secure the secret data in unsafe medium. DLSSM encompass cryptography and steganography along with strong spiral map** technique. Cryptographic techniques converts the secret data into cipher data, by which hacker doesn’t understand any information even if they get the data. Spiral map** method enhances the level of security provided to the secret signal. Steganography hides the secret data within another covering file with no traces of the hidden secret data. Hence, dual level security scheme strengthens the system in covert transmission. Speech signals of various Indian languages from IL-LDC and standard corpus are taken as samples to analyse the proposed DLSSM scheme effectiveness. Standard voice signals are considered as input to prove the novelty of the method. The proposed method [DLSSM] is compared with existing systems to prove its efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sathiyamurthi, P., Ramakrishnan, S.: Speech encryption using chaotic shift keying for secured speech communication. EURASIP J. Audio Speech Music Process. 2017(1), 1–11 (2017). https://doi.org/10.1186/s13636-017-0118-0

    Article  Google Scholar 

  2. Cohn-Gordon, K., Cremers, C., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. In: IEEE European Symposium on Security and Privacy, pp. 451–466 (2017)

    Google Scholar 

  3. Chithra, P.L., Aparna R.: Voice signal encryption scheme using transformation and embedding techniques for enhanced security. In: IEEE Conference on ICISPC 2018, pp. 149–154 (July 2018)

    Google Scholar 

  4. Kohata, M.: Secure speech encryption system using segments for speech synthesis, pp 264–267 (2014)

    Google Scholar 

  5. Farsana, F.J., Gopakumar, K.: A novel approach for speech encryption: Zaslavsky map as pseudo random number generator. In: 6th International Conference on Advances in Computing & Communications, ICACC 2016, pp. 6–8 (September 2016)

    Google Scholar 

  6. Lima, J.B., da Silva Neto, E.F.: Audio encryption based on the cosine number transform. Multimed. Tools Appl. 75(14), 8403–8418 (2015). https://doi.org/10.1007/s11042-015-2755-6

    Article  Google Scholar 

  7. Mostafa, A., Soliman, N.F., Abdalluh, M., Abd El-samie, F.E.: Speech encryption using two dimensional chaotic maps. In: 11th International Conference on Computer Engineering (ICENCO), February 2016. IEEE Xplore (2016)

    Google Scholar 

  8. Aarti, B., Kopparapu, S.: Spoken Indian language identification: a review of features and databases. Sādhanā 43(4), 53:1–53:14 (2018). https://doi.org/10.1007/s12046-018-0841-y. Indian Academy of Sciences

    Article  Google Scholar 

  9. Bhaskararao, P.: Salient phonetic features of Indian languages in speech technology. Sādhanā 36(Part 5), 587–599 (2011). https://doi.org/10.1007/s12046-011-0039-z. Indian Academy of Sciences

    Article  Google Scholar 

  10. Aparna, R., Chithra, P.I.: A review on cryptographic algorithms for speech signal security. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 5(5), 84–88 (2016)

    Google Scholar 

  11. Rajanarayanan, S., Pushparaghavan, A.: Recent developments in signal encryption – a critical survey. Int. J. Sci. Res. Publ. 2(6), 1–7 (2012)

    Google Scholar 

  12. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(6), 1259–1284 (1998)

    Article  MathSciNet  Google Scholar 

  13. Teerakanok, T., Kamolphiwong, S.: Accelerating asymmetric-key cryptography using Parallel-key Cryptographic Algorithm (PCA). In: 2009 6th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (2009)

    Google Scholar 

  14. Thomas, S.E., et al.: Advanced cryptographic steganography using multimedia files. In: International Conference on Electrical Engineering and Computer Science, ICEECS-2012, pp. 239–242 (2012)

    Google Scholar 

  15. Slimani, D., Merazka, F.: Encryption of speech signal with multiple secret keys. In: International Conference on Natural Language and Speech Processing, ICNLSP 2015, pp. 79–88 (2015)

    Google Scholar 

  16. Saad, N.A., Eman, H.: Speech encryption based on chaotic maps. Int. J. Comput. Appl. 93(4), 19–28 (2014)

    Google Scholar 

  17. Hato, E., Shihab, D.: Lorenz and Rossler chaotic system for speech signal encryption. Int. J. Comput. Appl. 128(11), 09758887 (2015)

    Google Scholar 

  18. Abdul-Majeed, A.M.: Speech encryption using genetic algorithm and Arnold cat map. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 14(12), 911–915 (2016)

    Google Scholar 

  19. Dutta, S., Das, T., Jash, S., Patra, D., Paul, P.: A cryptography algorithm using the operations of genetic algorithm & pseudo random sequence generating functions. Int. J. Adv. Comput. Sci. Technol. 3(5), 325–330 (2014)

    Google Scholar 

  20. Jhingran, R., Thada, V., Dhaka, S.: A study on cryptography using genetic algorithm. Int. J. Comput. Appl. 118(20), 10–14 (2015)

    Google Scholar 

  21. Chithra, P.L., Aparna, R.: Performance analysis of windowing techniques in automatic speech signal segmentation. Indian J. Sci. Technol. 8(29), 1–7 (2015)

    Article  Google Scholar 

  22. Aparna R., Chithra, P.L.: Role of windowing techniques in speech signal processing for enhanced signal cryptography, chap. 28. In: The Book Advanced Engineering Research and Applications, pp. 446–458 (2017)

    Google Scholar 

  23. Al-Azawi, M.K.M., Gaze, A.M.: Combined speech compression and encryption using chaotic compressive sensing with large key size. IET Sig. Process. 12(2), 214–218 (2018)

    Article  Google Scholar 

  24. Chen, J., Ling, B.W.-K., Feng, P., Lei, R.: Computer cryptography through performing chaotic modulation on intrinsic mode functions with non-dyadic number of encrypted signal. IET Sig. Process. 13(1), 7–13 (2019)

    Article  Google Scholar 

  25. Chen, Y., Hao, J., Chen, J.: End-to-end speech encryption algorithm based on speech scrambling in frequency domain. In: IET Signal Processing, 3rd International Conference on Cyberspace Technology, CCT 2015 (October 2015)

    Google Scholar 

Download references

Acknowledgment

We owe our sincere thanks to the Department of Computer Science & Applications, University of Madras & Shri Shankarlal Sundarbai Shasun Jain College for consistent support in carrying the research work.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to P. L. Chithra or R. Aparna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chithra, P.L., Aparna, R. (2020). Dual-Level Security with Spiral Map** [DLSSM] Scheme for Secure Covert Transmission of Speech Signals in Various Indian Languages. In: Badica, C., Liatsis, P., Kharb, L., Chahal, D. (eds) Information, Communication and Computing Technology. ICICCT 2020. Communications in Computer and Information Science, vol 1170. Springer, Singapore. https://doi.org/10.1007/978-981-15-9671-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9671-1_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9670-4

  • Online ISBN: 978-981-15-9671-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation