Open Access Open Access  Restricted Access Subscription or Fee Access

Robust Audio Encryption Method for MPEG-2 AAC Audio Based on Module Arithmetic and Chaotic Maps


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v10i1.5126

Abstract


For audio distribution over the network, a secure audio compression format is required. In this paper a novel encryption scheme with low computational complexity is proposed to achieve security level for Advanced Audio Coding (AAC). In this scheme, the modular multiplication and circularly shifts are used to encrypt the selected quantized spectral coefficients and scale factors in the AAC encoding process. The proposed algorithm used chaos theory to generate the necessary random key for audio encryption. The Experimental results show that the encryption algorithms provide good audible distortion because each frame is encrypted by using different key. The proposed algorithms have very large key space and it's sensitive to any modification in the secret key. The proposed algorithms are strong against most attacks and have a high security which is due to combination of the quantized spectral coefficients encryption algorithm and the scale factors encryption algorithm depending on the characteristics of the chaotic system and it is suitable for transmit audio signal in secure way.
Copyright © 2015 Praise Worthy Prize - All rights reserved.

Keywords


Chaotic Map; MPEG Audio Encryption; AAC Encoding; Quantized Spectral

Full Text:

PDF


References


S, Lian, Multimedia content encryption: techniques and applications. CRC Press, 2008.
http://dx.doi.org/10.1201/9781420065282

Idbeaa, T., Jumari, K., Abd Samad, S., Data hiding based on quantized AC-coefficients of the I-Frame for MPEG-2 compressed domain, (2012) International Review on Computers and Software (IRECOS), 7 (4), pp. 1458-1462.

A. Servetti, C. Testa, and J. C. De Martin., Frequency-Selective Partial Encryption of Compressed Audio, Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on. (Pages: V - 668-671 Year of Publication: 2003).
http://dx.doi.org/10.1109/icassp.2003.1200059

Torrubia, A., & Mora, F., Perceptual cryptography on MPEG Layer III bit-streams, IEEE Transactions on Consumer Electronics, (Pages: 1046- 1050 Year of Publication: 2002).
http://dx.doi.org/10.1109/tce.2003.1196437

Yan, Wei-Qi, Wei-Gang Fu, and Mohan S. Kankanhalli. Progressive Audio Scrambling in Compressed Domain, IEEE Transactions on Multimedia, (Pages: 960-968 Year of Publication: 2008).
http://dx.doi.org/10.1109/tmm.2008.2001373

H. Wang, M. Hempel, D. Peng, W Wang, H. Sharif, and H.-H. Chen. Index-based Selective Audio Encryption for Wireless Multimedia Sensor Networks, IEEE Transactions on Multimedia, (Pages: 215- 223 Year of Publication: 2010).
http://dx.doi.org/10.1109/tmm.2010.2041102

Wang, Yujie, Li Guo, Yifang Wei, and Cuiping Wang. A Steganography Method for AAC Audio Based on Escape Sequences, In Multimedia Information Networking and Security (MINES), International Conference on, (Pages: 841- 845 Year of Publication: 2010).
http://dx.doi.org/10.1109/mines.2010.178

Brandenburg, Karlheinz., MP3 and AAC explained, In Audio Engineering Society Conference: 17th International Conference: High-Quality Audio Coding. Audio Engineering Society, 1999.

Pareek, Narendra K., Vinod Patidar, and Krishan K. Sud., Image encryption using chaotic logistic map, Image and Vision Computing, Vol. 24, n. 9, pp. 926-934, 2006.
http://dx.doi.org/10.1016/j.imavis.2006.02.021

Su, Zhaopin, Guofu Zhang, and Jianguo Jiang., Multimedia Security: A Survey of Chaos-Based Encryption Technology, Multimedia-A Multidisciplinary Approach to Complex Issues, Dr. Ioannis Karydis (Ed.), InTech, (Year of Publication: 2012 ISBN: 978-953-51-0216-8).
http://dx.doi.org/10.5772/36036

Quackenbush, S. R., and J. D. Johnston., Noiseless coding of quantized spectral components in MPEG-2 Advanced Audio Coding, Applications of Signal Processing to Audio and Acoustics, 1997. 1997 IEEE ASSP Workshop on. IEEE, 1997.
http://dx.doi.org/10.1109/aspaa.1997.625587

Xu, Shuzheng, Peng Zhang, Pengjun Wang, and Huazhong Yang., Performance analysis of data hiding in MPEG-4 AAC audio." Tsinghua Science & Technology, Vol. 14, n. 1, pp. 55-61, 2009.
http://dx.doi.org/10.1016/s1007-0214(09)70007-0

Wahid, K., Ko, S., Multiplication-Free Realization of 8-point Cosine Transform for H.264 Applications, (2014) International Journal on Numerical and Analytical Methods in Engineering (IRENA), 2 (1), pp. 9-18.

Balaji, V.R., Subramanian, S., A discrete fractional cosine transform based speech enhancement system through Adaptive Kalman filter Combined with perceptual weighting filter with pitch synchronous analysis, (2013) International Review on Computers and Software (IRECOS), 8 (9), pp. 2288-2295.

Thiruveni, M., Shanthi, D., Design of vedic architecture for high speed DCT, (2014) International Review on Computers and Software (IRECOS), 9 (2), pp. 330-336.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize