Quality Analysis of Matrix Masking of Digital Audio Data

Cover Page

Cite item

Full Text

Abstract

This article considered the guarantee of confidentiality task of audio information transmitted over a packet communication channel. Domain analysis showed, that in most cases cryptographical method used for guarantee of confidentiality of audio information, however, along with them, matrix methods of protective coding used, with implementation on FPGA or DSP processors. These methods, using random matrices, impose additional instrumental errors during decoding. The purpose of the study: is to assess the quality of protective coding ‒ masking of audio data by quasi-orthogonal structured matrices. The proposed method of masking digital audio information by quasi-orthogonal matrices differs from the known ones in predictable results and simplity of implementation. An alternative approach to the classical use of metrics is proposed for evaluating the result of masking. It is based on the analysis of the spectral component of the signal. It is shown that masking with a square Mersenne ‒ Walsh matrix brings digital audio information, presented in the form of a matrix, to a form close in spectrum to white noise. This reliably protects it in the communication channel from unauthorized access. The obtained results showed that the proposed method is promising and suggests the study of the influence of the choice of orthogonal matrix structures and their sizes on the results of masking.

About the authors

E. K. Grigoriev

Saint-Petersburg State University of Aerospace Instrumentation

Email: ev.grig95@gmail.com
ORCID iD: 0000-0001-5981-4074

A. M. Sergeev

Saint-Petersburg State University of Aerospace Instrumentation

Email: aleks.asklab@gmail.com
ORCID iD: 0000-0002-4788-9869

References

  1. Владимиров С.С., Когновицкий О.С. Обработка широкополосных последовательностей Гордона – Миллса – Велча с использованием двойственного базиса на основе двух регистров // Труды учебных заведений связи. 2019. Т. 5. № 2. С. 49‒58. doi: 10.31854/1813-324X-2019-5-2-49-58
  2. Advanced encryption standard (AES) // FIPS 197. URL: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf (дата обращения 22.03.2023)
  3. Rahman Md. M., Saha T.K., Bhuiyan Md. A. Implementation of RSA Algorithm for Speech Data Encryption and Decryption // International Journal of Computer Science and Network Security. 2012. Vol. 12. Iss. 3. PP. 74‒82.
  4. Gnanajeyaraman R., Prasadh K. Audio encryption using higher dimensional chaotic map // International Journal of Recent Trends in Engineering. 2009. Vol. 1. Iss. 2. PP. 103‒107.
  5. Hassan N.A., Al-Mukhtar F.S., Ali E.H. Encrypt Audio File using Speech Audio File As a key // Proceedings of the 2nd International Scientific Conference of Al-Ayen University (ISCAU-2020, Thi-Qar, Iraq, 15‒16 July 2020). IOP Conference Series: Materials Science and Engineering. 2020. Vol. 928 032066. PP. 79‒84. doi: 10.1088/1757-899X/928/3/032066
  6. Farsana F.J., Devi V.R., Gopakumar K. An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams // Applied Computing and Informatics. 2020. Vol. 16. Iss. 2. doi: 10.1016/j.aci.2019.10.001
  7. Adhikari S., Karforma S. A novel audio encryption method using Henon–Tent chaotic pseudo random number sequence // International Journal of Information Technology. 2021. Vol. 13. PP. 1463–1471. doi: 10.1007/s41870-021-00714-x
  8. Cai C., Bai E., Jiang X.Q., Wu Y. Simultaneous Audio Encryption and Compression Using Parallel Compressive Sensing and Modified Toeplitz Measurement Matrix // Electronics. 2021. Vol. 10. Iss. 23. P. 2902. doi: 10.3390/electronics10232902
  9. Al-laham M.M. A Method for Encrypting and Decryptingwave Files // International Journal of Network Security & Its Applications. 2018. Vol. 10. Iss. 4. PP. 11‒21.
  10. Abdallah H.A., Meshoul S.A. Multilayered Audio Signal Encryption Approach for Secure Voice Communication // Electronics. 2023. Vol. 12. Iss. 1. P. 2. doi: 10.3390/electronics12010002
  11. Hameed Y.M., Ali N.H.M. An efficient audio encryption based on chaotic logistic map with 3D matrix // Journal of Theoretical and Applied Information Technology. 2018. Vol. 96. Iss. 16. PP. 5142‒5152.
  12. Luis M., Daniel L., Isabel A., Deicy A. A new multimedia cryptosystem using chaos, quaternion theory and modular arithmetic // Multimedia Tools and Applications. 2023. doi: 10.1007/s11042-023-14475-1
  13. Ge X., Sun G., Zheng B., Nan R. FPGA-Based Voice Encryption Equipment under the Analog Voice Communication Channel // Information. 2021. Vol. 12. Iss. 11. PP. 456. doi: 10.3390/info12110456
  14. Donoho D.L. Compressed sensing // IEEE Transactions on Information Theory. 2006. Vol. 52. Iss. 4. PP. 1289‒1306. doi: 10.1109/TIT.2006.871582
  15. Востриков А.А., Сергеев М.Б., Литвинов М.Ю. Маскирование цифровой визуальной информации: термин и основные определения // Информационно-управляющие системы. 2015. №5(78). С. 116‒123. doi: 10.15217/issn1684-8853.2015.5.116
  16. Vostrikov A., Sergeev M. Expansion of the Quasi-Orthogonal Basis to Mask Images // Proceedings of the 8th International KES Conference on Intelligent Interactive Multimedia Systems and Services (KES-IIMSS-15, Sorrento, Italy, 17‒19 June 2015). Smart Innovation, Systems and Technologies. Vol. 40. Cham: Springer, 2015. PP. 161‒168. doi: 10.1007/978-3-319-19830-9_15
  17. Sergeev A. M., Grigoriev E. K. Quasiorthogonal Structured Mersenne Matrices for Masking Digital Video and Audio Data in Distributed Systems // Proceedings of the International Conference on Information Processes and Systems Development and Quality Assurance (IPSQDA-2023). 2023. PP. 57–59.
  18. Сергеев А.М. Связь симметрии и антисимметрии квазиортогональных циклических матриц с простыми числами // Труды учебных заведений связи. 2022. Т. 8. № 4. С. 14‒19. doi: 10.31854/1813-324X-2022-8-4-14-19
  19. Балонин Н.А., Балонин Ю.Н., Востриков А.А., Сергеев М.Б. Вычисление матриц Мерсенна ‒ Уолша // Вестник компьютерных и информационных технологий. 2014. № 11. С. 51–55.
  20. UrbanSound8K dataset. URL: https://urbansounddataset.weebly.com/urbansound8k.html (дата обращения 04.04.2023)
  21. Григорьев Е.К., Сергеев М.Б., Сергеев А.М. Программа маскирования и демаскирования звуковой цифровой информации. Модуль маскирования. Свидетельство о регистрации программы для ЭВМ № RU 2023614623 от 03.03.2023. Опубл. 03.03.2023.
  22. Григорьев Е.К., Сергеев М.Б., Сергеев А.М. Программа маскирования и демаскирования звуковой цифровой информации. Модуль демаскирования. Свидетельство о регистрации программы для ЭВМ № RU 2023614622 от 03.03.2023. Опубл. 03.03.2023.

Supplementary files

Supplementary Files
Action
1. JATS XML


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Согласие на обработку персональных данных

 

Используя сайт https://journals.rcsi.science, я (далее – «Пользователь» или «Субъект персональных данных») даю согласие на обработку персональных данных на этом сайте (текст Согласия) и на обработку персональных данных с помощью сервиса «Яндекс.Метрика» (текст Согласия).