Audio Encryption Optimization: Harsh Bijlani Dikshant Gupta Mayank Lovanshi
Audio Encryption Optimization: Harsh Bijlani Dikshant Gupta Mayank Lovanshi
Abstract— The issue of security and privacy of data due to known only to sender and receiver), usually a short string of
interception and improper manipulation by eavesdropper has characters, which is used to decrypt the ciphertext. The user
a consequential effect based on the value of the information who receives the encrypted message can access the
being transmitted. Many techniques are needed to protect the information from the message using permitted secret keys as
transmitted data which is in the form of text, image or even
an agreement between the sender and receiver. Decryption,
audio signals. Cryptography has a defining role in the field of
network security. Various cryptographic algorithms have been on the other hand, is a reverse process in which the ciphertext
designed, but still, there is a trade-off between security and is being converted to plain text using the receiver key.
performance. Our research work would be focusing on the
performance of two existing encryption techniques such A. Audio Encryption
as AES and DES algorithm on the audio sample values Audio encryption is a cryptographic term in which the audio
obtained from the simulator MATLAB generated by the audio signals or voice is being transmitted securely from one point
files of different size. Based on the results obtained this paper to another. Instead of text, audio signals are being encrypted
suggests the secure algorithm for audio file encryption and also so as to be completely undetected from the hacker or third-
to analyze the performance of other algorithms too as a factor
party groups. In two way communication system, encryption
of time taken. Through this paper we have proposed the model
based on comparison of different size of audio files by taking modifies an audio signal using an algorithm. This algorithm
into account of decimation factor through which the sample is controlled by an encryption key. Audio encryption is the
rate changes and we obtained a time taken to encrypt such method of using the key (which could be noise) to the
generated audio files and thus we provide our analysis on AES plaintext audio and while decryption is the process of taking
and DES algorithm for the audio file encryption and suggesting out the original plaintext back by using the same key.
which have better performance based on our results obtained. Various encryption techniques are being used to encode
audio signals so as to ensure secure audio transmission to the
Keywords- Cryptography, AES, DES, MATLAB destination. But still, there is a trade-off between security and
performance of the different algorithms. As security
I. Introduction increases performance decreases. This problem is acute in
case of Audio files.
In the current world scenario, with the increase in growing
domination of the digital world, comes the concern for
B. Encryption Algorithms
ensuring security within the system so as to enable effective
Some encryption algorithms used in the field of
communication without any breach of data. Thus, the
cryptography to ensure security are:
importance of information system is being augmented by the
1. DES (Data Encryption Standard)
increasing efficacy of information present in the system.
DES was developed in the 1970s and it used the Feistel
Cryptography is the art of forming algorithms to encapsulate
Structure. It is a symmetric algorithm and thus uses the same
data confidentiality, data integrity, authentication, and non-
key for both encryption and decryption. So the sender end
repudiation criteria within the system to encrypt the data in
and receiver end must know the private key.
such a manner that it becomes difficult for any unauthorized
The DES performs various operations which includes
access. It is the study of mathematical techniques of applying
permutation, substitution, and recombination on
algorithms onto the message so that it could be read by the
blocks(Size-64 bits) of data and 56 bits of key (eight 7-bit
intended user only and in this way it protects the data from
characters). [8]
the eavesdropper. Cryptography involves the Encryption and
The 64 bits of input are permuted initially and are then input
Decryption process. Cryptography involves the code (or
to a function using static tables of permutations and
cipher) in which the message is being converted to readable
substitutions (called S-boxes).
to unreadable form. The original message which is being sent
The bits are permuted in combination with 48 bits of the key
to the receiver is called plaintext. This message is being
in each round.
converted into the encrypted message or ciphertext through
a key, process called Encryption. Key is a secret (which is
C.Tool (Simulator)
x MATLAB: Figure1. Proposed Algorithm
MATLAB stands for Matrix Laboratory. The basic building Devised Algorithm
block for MATLAB is a matrix. MATLAB is a high-level 1. Encryption Part:
language which has many toolboxes which make our task x Take the audio file(A).
easier. It is a software package for numerical computation x Decimate the audio file (A) by a factor of integer
and visualization to visualize the output in the figure ‘x’ that is decimate (A, x).
window. Along with the several built-in functions, we can x Store the decimated file in the audio file (B),
also define our functions. It is an convenient environment B=decimate (A, x).
where everything can be expressed as familiar mathematical x Encrypt this audio file (B) containing samples
notations. We can even plot 2D and 3D plots. Some using cryptographic algorithms such as AES, DES,
applications include algorithm development, modeling, etc.
simulation, and prototyping, data analysis, exploration, and
visualization. 2. Decryption Part:
x Decrypt and generate the audio file (B).
Some operations are also being performed through
x Interpolate the audio signal (B) by the factor of
MATLAB which results in a change in the size of the audio
‘x’, interpolate(B, x).
signal.
x Store the interpolated audio file in A, where
A=interpolate (B, x)
D. Decimation and Interpolation
Decimation is a process of reducing the number of samples x Original file A is being recovered.
or sampling rate of a discrete time signal. It therefore only
downsample the signal by an integer factor. [7] A digital anti- Evaluation Parameters:
aliasing filter has to be applied to remove higher frequencies.
200
Encryption Time: Encryption Time: Encryption is the obtained, they are being stored in a text file(cipher text) and
conversion of originally readable plaintext into another form, different algorithms have been applied to get encryption time
called ciphertext, which cannot be easily understood by for each file size and through this, we could determine the
anyone and is only intended to the authorized receivers. It performance of algorithm as a parameter of encryption time
may also be performed with a set of keys or passwords. The and decryption time and analyze the values by plotting a
time taken to encrypt any file is called Encryption Time. In graph.
this experiment, the encryption time is being measured in
nanoseconds (ns). 1. Original file size: 20.7 MB
III. Literature Survey Table 1. Average Encryption time for the audio file of size
Mansi, Mrs. Raman Chawla in their research paper [1] has 20.7 MB
proposed the method that would provide highly secure audio
using random permutation with multiple key applications
taking six audio files of different sizes and evaluate
parameters such as PSNR vs size of different files taken.In
this, audio is first encrypted using advanced random D AES( % DE %
permutation method and then decrypted using reverse ecim Time in Decrease S Decrease
process.It also discussed various encryption techniques for ation ns) in (Time in
audio data and some of the encryption standards which are Facto Encrypti in ns ) Encrypti
generally used for network security purposes. r (x) on on Time
M.I.Khalil in his research paper [2] proposed a new time
1 2792 - 491 -
algorithm based on the symmetric cryptography and it is
774358.2 290356
being compared and evaluated with the RSA
1.2
encryption/decryption technique using a simulator software
2 2021 27.85 353 28.02
MATLAB on the basis of simulation result obtained. In the 117725.2 % 374690 %
proposed algorithm the acquired audio samples are 3.2
encrypted using a secret key which is same for both 4 1520 45.71 232 52.65
encryption and decryption. This key would yield encrypted 719365.4 % 485931 %
samples which are transmitted and then received at the 2.8
receiver using the same secret key. This ciphered and 10 1046 62.5 165 66.25
deciphered audio sample are traced and compared with the 297393.2 % 734215 %
original acquired signal. 6.6
Manpreet Kaur, Ms. Sukhpreet Kaur in [3] has compared 20 8533 69.53 138 71.9
different encryption algorithms such as DES, triple DES, 30505.4 % 900604 %
AES, etc and provides the comparison table based on the 2.2
factors such as Key size, block size, security and attacks.
These techniques are applied to audio data, for securely Table 1 shows the observation of average encryption time (in
transmitting audio data over the network. In the survey done nanoseconds) for algorithms AES and DES for the audio file
by them, AES algorithm is considered to be Strong Against size taken as 20.7 MB and by applying a decimating function
Differential, Brute, Linear Force Attacks and is secured than to the audio samples for different decimation factor (x)
the DES algorithm which is being vulnerable to such attacks. different file size are obtained and the average time is being
Rashmi Gandhi and Atul Gosai in [4] provides a noted for each file size. The file size decreases with the
comprehensive introduction to some of the existing increase in decimation factor. The observation shows more
cryptographic techniques and their performance for all data time taken to encrypt an audio file using DES than AES.
types particularly audio files. This paper is intended to
provide an overview of the different algorithms used for
Audio Encryption. 2. Original file size: 1.55 MB
201
Facto Encrypti Enc
r on time ryption
time
1 8792 - 1514 -
94405 042318
2 6707 23.86 1159 23.3
34739.2 % 086343.2 8%
5 4330 50.78 9325 38.4
42770.6 % 27234 4%
10 4226 51.96 8569 43.4
70280.4 % 75742.4 %
Figure 1. AES encryption with different size of audio files Figure 3. DES encryption with different size of audio files
after sampling the 20.7 MB file after sampling the 20.7 MB file
202
VI. Conclusion
The proposed system for the encryption and decryption
through decimation and interpolation by using MATLAB
simulator could provide us a way to find out the efficiency
of cryptographic algorithm on the audio file of various size.
In the future scope, such methodology could be tested using
other algorithms such as Triple DES, RSA, Blowfish and
many more along with evaluation of different parameters
other than the average encryption time taken. With the
analysis of these algorithms, one can generate its own
algorithm by making modifications into existing algorithms
to make audio data more secure. More secure and faster
encryption techniques will always work.
References
[1] Mansi ,Mrs Raman Chawla, “An Audio Multiple Shuffle
Encryption Algorithm”, International Journal Of Engineering
And Computer Science ISSN: 2319-7242 Volume 4 Issue 9
Sep 2015, Page No. 14098-14104.
Figure 4. DES encryption with different size of audio files [2] M.I.Khalil, “Real Time Encryption/Decryption of Audio
after sampling the 1.55 MB file Signal”, I.J. Computer Network and Information Security, Feb
2016,2, 25-31.
[3] Manpreet Kaur, Ms. Sukhpreet Kaur, “Survey of Various
Encryption Techniques for Audio Data”, Volume 4, Issue 5,
V. Results May 2014 ISSN: 2277 128X International Journal of
The analysis of the line plots shows that: Advanced Research in Computer Science and Software
1. File Size (20.7MB) Engineering.
Type of File: Medium Size [4] Rashmi Gandhi and Atul Gosai, ”A Study on Current Scenario
of Audio Encryption”,International Journal of Computer
The plot exhibits non-linear relationship between decimation Applications (0975 – 8887) Volume 116 – No. 7, April 2015.
factor(x) and encryption time. As, we can see that steep slope [5] Shraddha More and Rajesh Bansode, “Implementation of AES
in case of less decimation factor and as decimation factor with Time Complexity Measurement for Various Input”,
increases the slope decreases. Global Journal of Computer Science and Technology: E
Medium length files exhibit higher decrease in rates of Network, Web & Security Volume 15 Issue 4 Version 1.0 Year
2015 Type: Double Blind Peer Reviewed International
encryption time at same decimation factor than the small Research Journal Publisher: Global Journals Inc. (USA)
length files. Online ISSN: 0975-4172 & Print ISSN: 0975-4350.
[6] Farheen Sultana , Bikiran Choudhury , Shobha M.S
2. File Size (1.55MB) ,Dr.Jitendranath Mungara, “A Study on Data Encryption Using AES
and RSA”, International Journal of Innovative Research in Computer
Type of File: Small Size and Communication Engineering (An ISO 3297: 2007 Certified
The plot exhibits non-linear relationship between decimation Organization) Vol. 5, Issue 4, April 2017.
factor(x) and encryption time. But, as the decimation factor [7] Krishna Bhowal, Anindya Jyoti Pal, G.S. Tomar& P.P.
increases the slope becomes constant at the end. Sarkar, “Audio Steganography using GA”, IEEE
Small length files exhibit lower decrease in rates of International Conference on Computational Intelligence
and Communication Networks CICN 2010, pp 449-453,
encryption time at same decimation factor than the medium Nov 2010.
length files and also tends to become constant after achieving [8] www.mathworks.com/MATLAB
threshold. [9] www.tutorialspoint.com/cryptograp
203