0% found this document useful (0 votes)
74 views5 pages

Audio Encryption Optimization: Harsh Bijlani Dikshant Gupta Mayank Lovanshi

The document discusses audio encryption and compares the performance of the AES and DES encryption algorithms on audio files of different sizes. It provides background on audio encryption and describes the AES and DES algorithms. The research aims to analyze the encryption time for different sized audio files encrypted with AES and DES to determine which algorithm performs better.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views5 pages

Audio Encryption Optimization: Harsh Bijlani Dikshant Gupta Mayank Lovanshi

The document discusses audio encryption and compares the performance of the AES and DES encryption algorithms on audio files of different sizes. It provides background on audio encryption and describes the AES and DES algorithms. The research aims to analyze the encryption time for different sized audio files encrypted with AES and DES to determine which algorithm performs better.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

2018 8th International Conference on Communication Systems and Network Technologies

Audio Encryption Optimization


Harsh Bijlani Dikshant Gupta Mayank Lovanshi
B.E Student, Department of B.E Student, Department of Assistant Professor, Department
Information Technology, Information Technology, of Information Technology,
Medicaps University Medicaps University Medicaps University
Indore(M.P) , India Indore(M.P) , India Indore(M.P) , India
harsh.bijlani09@gmail.com dikshantgupta07@gmail.com mayank.lovanshi@gmail.com

Abstract— The issue of security and privacy of data due to known only to sender and receiver), usually a short string of
interception and improper manipulation by eavesdropper has characters, which is used to decrypt the ciphertext. The user
a consequential effect based on the value of the information who receives the encrypted message can access the
being transmitted. Many techniques are needed to protect the information from the message using permitted secret keys as
transmitted data which is in the form of text, image or even
an agreement between the sender and receiver. Decryption,
audio signals. Cryptography has a defining role in the field of
network security. Various cryptographic algorithms have been on the other hand, is a reverse process in which the ciphertext
designed, but still, there is a trade-off between security and is being converted to plain text using the receiver key.
performance. Our research work would be focusing on the
performance of two existing encryption techniques such A. Audio Encryption
as AES and DES algorithm on the audio sample values Audio encryption is a cryptographic term in which the audio
obtained from the simulator MATLAB generated by the audio signals or voice is being transmitted securely from one point
files of different size. Based on the results obtained this paper to another. Instead of text, audio signals are being encrypted
suggests the secure algorithm for audio file encryption and also so as to be completely undetected from the hacker or third-
to analyze the performance of other algorithms too as a factor
party groups. In two way communication system, encryption
of time taken. Through this paper we have proposed the model
based on comparison of different size of audio files by taking modifies an audio signal using an algorithm. This algorithm
into account of decimation factor through which the sample is controlled by an encryption key. Audio encryption is the
rate changes and we obtained a time taken to encrypt such method of using the key (which could be noise) to the
generated audio files and thus we provide our analysis on AES plaintext audio and while decryption is the process of taking
and DES algorithm for the audio file encryption and suggesting out the original plaintext back by using the same key.
which have better performance based on our results obtained. Various encryption techniques are being used to encode
audio signals so as to ensure secure audio transmission to the
Keywords- Cryptography, AES, DES, MATLAB destination. But still, there is a trade-off between security and
performance of the different algorithms. As security
I. Introduction increases performance decreases. This problem is acute in
case of Audio files.
In the current world scenario, with the increase in growing
domination of the digital world, comes the concern for
B. Encryption Algorithms
ensuring security within the system so as to enable effective
Some encryption algorithms used in the field of
communication without any breach of data. Thus, the
cryptography to ensure security are:
importance of information system is being augmented by the
1. DES (Data Encryption Standard)
increasing efficacy of information present in the system.
DES was developed in the 1970s and it used the Feistel
Cryptography is the art of forming algorithms to encapsulate
Structure. It is a symmetric algorithm and thus uses the same
data confidentiality, data integrity, authentication, and non-
key for both encryption and decryption. So the sender end
repudiation criteria within the system to encrypt the data in
and receiver end must know the private key.
such a manner that it becomes difficult for any unauthorized
The DES performs various operations which includes
access. It is the study of mathematical techniques of applying
permutation, substitution, and recombination on
algorithms onto the message so that it could be read by the
blocks(Size-64 bits) of data and 56 bits of key (eight 7-bit
intended user only and in this way it protects the data from
characters). [8]
the eavesdropper. Cryptography involves the Encryption and
The 64 bits of input are permuted initially and are then input
Decryption process. Cryptography involves the code (or
to a function using static tables of permutations and
cipher) in which the message is being converted to readable
substitutions (called S-boxes).
to unreadable form. The original message which is being sent
The bits are permuted in combination with 48 bits of the key
to the receiver is called plaintext. This message is being
in each round.
converted into the encrypted message or ciphertext through
a key, process called Encryption. Key is a secret (which is

978-1-5386-5956-4/18/$31.00 ©2018 IEEE 199


DOI: 10.1109/CSNT.2018.38
This process is iterated 16 times (rounds), each time with a It also involves the throwing away of the samples to lower
different set of tables and different bits from the key. The down the sampling rate at the output of one system to a
algorithm then performs a final permutation, and 64 bits of system operating at a lower sampling rate can input the
output are provided. [9] signal. Decimation factor M has been used to downsample
The algorithm is structured in such a way that changing any the signal and the required result of the signal will reduce
bit in the input has a major effect on almost all of the output storage and consumption requirements.
bits. Interpolation also known as upsampling at times is a process
of increasing the number of samples of a discrete time signal.
2. AES (Advanced Encryption Standard) Interpolation is a mathematical construct which is used to
AES was originally called Rijndael. This standard was increase the sampling frequency by estimating the value of
created by Joan Daemen and Vincent Rijmen in 1998.The the signal between samples. The new sampling frequency is
Advanced Encryption Standard (AES) algorithm is a greater than the old sampling frequency. An appropriate
symmetric block. filter is being used to increase the sampling rate at the output
AES algorithm was seen as the alternative to DES algorithm of one system so that another system operating at a higher
because of the vulnerabilities to the brute force attack sampling rate can input the signal. Interpolation factor L has
associated with this algorithm. AES acts as a robust security been used to perform upsampling and preserves correctness.
measure for its ability to resist the attacks. In addition to this,
higher key length sizes such as 128, 192 and 256 bits are used II. Proposed Explanation
in the encryption
AES is based on ‘substitution-permutation network’. It
comprises of a series of various operations, which involve
substituting inputs by specific outputs (substitutions) and
others involve shuffling or randomizing bits (permutations).
[8]
The computation of AES is done on the bytes, which are
being arranged in rows and columns to form the matrix, say
a 128-bit plaintext block is taken as 16-byte block.
AES uses different rounds for different bit keys:
10 rounds for a 128-bit key
12 rounds for a 192-bit key
14 rounds for a 256-bit key

C.Tool (Simulator)
x MATLAB: Figure1. Proposed Algorithm
MATLAB stands for Matrix Laboratory. The basic building Devised Algorithm
block for MATLAB is a matrix. MATLAB is a high-level 1. Encryption Part:
language which has many toolboxes which make our task x Take the audio file(A).
easier. It is a software package for numerical computation x Decimate the audio file (A) by a factor of integer
and visualization to visualize the output in the figure ‘x’ that is decimate (A, x).
window. Along with the several built-in functions, we can x Store the decimated file in the audio file (B),
also define our functions. It is an convenient environment B=decimate (A, x).
where everything can be expressed as familiar mathematical x Encrypt this audio file (B) containing samples
notations. We can even plot 2D and 3D plots. Some using cryptographic algorithms such as AES, DES,
applications include algorithm development, modeling, etc.
simulation, and prototyping, data analysis, exploration, and
visualization. 2. Decryption Part:
x Decrypt and generate the audio file (B).
Some operations are also being performed through
x Interpolate the audio signal (B) by the factor of
MATLAB which results in a change in the size of the audio
‘x’, interpolate(B, x).
signal.
x Store the interpolated audio file in A, where
A=interpolate (B, x)
D. Decimation and Interpolation
Decimation is a process of reducing the number of samples x Original file A is being recovered.
or sampling rate of a discrete time signal. It therefore only
downsample the signal by an integer factor. [7] A digital anti- Evaluation Parameters:
aliasing filter has to be applied to remove higher frequencies.

200
Encryption Time: Encryption Time: Encryption is the obtained, they are being stored in a text file(cipher text) and
conversion of originally readable plaintext into another form, different algorithms have been applied to get encryption time
called ciphertext, which cannot be easily understood by for each file size and through this, we could determine the
anyone and is only intended to the authorized receivers. It performance of algorithm as a parameter of encryption time
may also be performed with a set of keys or passwords. The and decryption time and analyze the values by plotting a
time taken to encrypt any file is called Encryption Time. In graph.
this experiment, the encryption time is being measured in
nanoseconds (ns). 1. Original file size: 20.7 MB
III. Literature Survey Table 1. Average Encryption time for the audio file of size
Mansi, Mrs. Raman Chawla in their research paper [1] has 20.7 MB
proposed the method that would provide highly secure audio
using random permutation with multiple key applications
taking six audio files of different sizes and evaluate
parameters such as PSNR vs size of different files taken.In
this, audio is first encrypted using advanced random D AES( % DE %
permutation method and then decrypted using reverse ecim Time in Decrease S Decrease
process.It also discussed various encryption techniques for ation ns) in (Time in
audio data and some of the encryption standards which are Facto Encrypti in ns ) Encrypti
generally used for network security purposes. r (x) on on Time
M.I.Khalil in his research paper [2] proposed a new time
1 2792 - 491 -
algorithm based on the symmetric cryptography and it is
774358.2 290356
being compared and evaluated with the RSA
1.2
encryption/decryption technique using a simulator software
2 2021 27.85 353 28.02
MATLAB on the basis of simulation result obtained. In the 117725.2 % 374690 %
proposed algorithm the acquired audio samples are 3.2
encrypted using a secret key which is same for both 4 1520 45.71 232 52.65
encryption and decryption. This key would yield encrypted 719365.4 % 485931 %
samples which are transmitted and then received at the 2.8
receiver using the same secret key. This ciphered and 10 1046 62.5 165 66.25
deciphered audio sample are traced and compared with the 297393.2 % 734215 %
original acquired signal. 6.6
Manpreet Kaur, Ms. Sukhpreet Kaur in [3] has compared 20 8533 69.53 138 71.9
different encryption algorithms such as DES, triple DES, 30505.4 % 900604 %
AES, etc and provides the comparison table based on the 2.2
factors such as Key size, block size, security and attacks.
These techniques are applied to audio data, for securely Table 1 shows the observation of average encryption time (in
transmitting audio data over the network. In the survey done nanoseconds) for algorithms AES and DES for the audio file
by them, AES algorithm is considered to be Strong Against size taken as 20.7 MB and by applying a decimating function
Differential, Brute, Linear Force Attacks and is secured than to the audio samples for different decimation factor (x)
the DES algorithm which is being vulnerable to such attacks. different file size are obtained and the average time is being
Rashmi Gandhi and Atul Gosai in [4] provides a noted for each file size. The file size decreases with the
comprehensive introduction to some of the existing increase in decimation factor. The observation shows more
cryptographic techniques and their performance for all data time taken to encrypt an audio file using DES than AES.
types particularly audio files. This paper is intended to
provide an overview of the different algorithms used for
Audio Encryption. 2. Original file size: 1.55 MB

Table 2. Average Encryption time for the audio file of size


IV. Experimental Results 1.55 MB
MATLAB R2015a has been used a simulator to generate the
audio samples obtained from audio files of different size in
.mp3 format. The original file sizes taken are 1.55MB and
20.7MB and taking integer factor for sampling as D AES % DES %
(x=1,2,5,10) respectively. Based on the value of samples ecim (Time in Decrease (Time in Decrea
ation ns) in ns) se in

201
Facto Encrypti Enc
r on time ryption
time
1 8792 - 1514 -
94405 042318
2 6707 23.86 1159 23.3
34739.2 % 086343.2 8%
5 4330 50.78 9325 38.4
42770.6 % 27234 4%
10 4226 51.96 8569 43.4
70280.4 % 75742.4 %

Table 2 shows the observation of average encryption time (in


nanoseconds) for algorithms AES and DES for the audio file
size taken as 1.55 MB and by applying a decimating function
to the audio samples for different decimation factor (x)
different file size are obtained and the average time is being
noted for each file size. The observation shows more time Figure 2. AES encryption with different size of
taken to encrypt an audio file using DES than AES. audio files after sampling the 1.55 MB file

Figure 1. AES encryption with different size of audio files Figure 3. DES encryption with different size of audio files
after sampling the 20.7 MB file after sampling the 20.7 MB file

202
VI. Conclusion
The proposed system for the encryption and decryption
through decimation and interpolation by using MATLAB
simulator could provide us a way to find out the efficiency
of cryptographic algorithm on the audio file of various size.
In the future scope, such methodology could be tested using
other algorithms such as Triple DES, RSA, Blowfish and
many more along with evaluation of different parameters
other than the average encryption time taken. With the
analysis of these algorithms, one can generate its own
algorithm by making modifications into existing algorithms
to make audio data more secure. More secure and faster
encryption techniques will always work.

References
[1] Mansi ,Mrs Raman Chawla, “An Audio Multiple Shuffle
Encryption Algorithm”, International Journal Of Engineering
And Computer Science ISSN: 2319-7242 Volume 4 Issue 9
Sep 2015, Page No. 14098-14104.
Figure 4. DES encryption with different size of audio files [2] M.I.Khalil, “Real Time Encryption/Decryption of Audio
after sampling the 1.55 MB file Signal”, I.J. Computer Network and Information Security, Feb
2016,2, 25-31.
[3] Manpreet Kaur, Ms. Sukhpreet Kaur, “Survey of Various
Encryption Techniques for Audio Data”, Volume 4, Issue 5,
V. Results May 2014 ISSN: 2277 128X International Journal of
The analysis of the line plots shows that: Advanced Research in Computer Science and Software
1. File Size (20.7MB) Engineering.
Type of File: Medium Size [4] Rashmi Gandhi and Atul Gosai, ”A Study on Current Scenario
of Audio Encryption”,International Journal of Computer
The plot exhibits non-linear relationship between decimation Applications (0975 – 8887) Volume 116 – No. 7, April 2015.
factor(x) and encryption time. As, we can see that steep slope [5] Shraddha More and Rajesh Bansode, “Implementation of AES
in case of less decimation factor and as decimation factor with Time Complexity Measurement for Various Input”,
increases the slope decreases. Global Journal of Computer Science and Technology: E
Medium length files exhibit higher decrease in rates of Network, Web & Security Volume 15 Issue 4 Version 1.0 Year
2015 Type: Double Blind Peer Reviewed International
encryption time at same decimation factor than the small Research Journal Publisher: Global Journals Inc. (USA)
length files. Online ISSN: 0975-4172 & Print ISSN: 0975-4350.
[6] Farheen Sultana , Bikiran Choudhury , Shobha M.S
2. File Size (1.55MB) ,Dr.Jitendranath Mungara, “A Study on Data Encryption Using AES
and RSA”, International Journal of Innovative Research in Computer
Type of File: Small Size and Communication Engineering (An ISO 3297: 2007 Certified
The plot exhibits non-linear relationship between decimation Organization) Vol. 5, Issue 4, April 2017.
factor(x) and encryption time. But, as the decimation factor [7] Krishna Bhowal, Anindya Jyoti Pal, G.S. Tomar& P.P.
increases the slope becomes constant at the end. Sarkar, “Audio Steganography using GA”, IEEE
Small length files exhibit lower decrease in rates of International Conference on Computational Intelligence
and Communication Networks CICN 2010, pp 449-453,
encryption time at same decimation factor than the medium Nov 2010.
length files and also tends to become constant after achieving [8] www.mathworks.com/MATLAB
threshold. [9] www.tutorialspoint.com/cryptograp

203

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy