Multi-tone encryption method based on chaos and zigzag transformation

An encryption method and multi-audio technology, which is applied in the direction of secure communication through chaotic signals, digital transmission systems, and secure communication devices, can solve problems such as weak security of single-audio encryption methods, and achieve improved encryption effects, encryption efficiency, and secure encryption. Effect, the effect of protecting safety

Active Publication Date: 2021-10-15
CHINA UNIV OF MINING & TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Purpose of the present invention: to propose a kind of multi-audio encryption method based on chaos and Zigzag transformation for the problem of weak security of existing single-audio encryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-tone encryption method based on chaos and zigzag transformation
  • Multi-tone encryption method based on chaos and zigzag transformation
  • Multi-tone encryption method based on chaos and zigzag transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The implementation process of the present invention will be further described in detail below in conjunction with specific drawings and examples.

[0031] figure 1 is the encryption flowchart of this method.

[0032] The programming software used is Matlab R2016b, and five audio files with a size of 73113×1 are selected as the original audio. Using this method, the detailed process of encrypting the original image is described as follows.

[0033] Step 1: Phoneme integerization: the specific operation is to add 1 to all phonemes, and then multiply by 10000 to make the range [0, 20000].

[0034] Step 2: Chaotic sequence generation: Let the 5 original audios be y 1 , y 2 , …, y 5 ; Select the initial value of PWLCM y 0 1 =0.78 and parameter p 1 =0.44, iterate the map 73113×5 times to obtain a chaotic sequence Y 1 ={ y i 1} 365565 ; similarly, using the initial value of PWLCM x 0 1 =0.32 and parameters p 2 =0.44, iterate the map 5 times to get anoth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-audio encryption method based on chaos and Zigzag transformation, which belongs to the field of information encryption. At present, the activities of transmitting multimedia information on the network are becoming more and more frequent, and audio is an important part of multimedia information. How to protect the security of audio content has become one of the important research directions for researchers. The invention proposes a multi-audio encryption method based on chaos and Zigzag transformation. First, use the random full permutation generated by the chaotic sequence to scramble the connection order of multiple audio files; secondly, use the Zigzag transformation to realize the scrambling of phonemes among multiple audio files; finally, use the chaotic sequence to scramble the phoneme matrix XOR operation to get the final encrypted audio set. Experiments show that this method can realize synchronous encryption of multiple audio files, with good encryption effect, high security and high efficiency.

Description

technical field [0001] This article involves an audio encryption method, mainly for encrypting multiple audio files. Background technique [0002] In recent years, the rapid update of mobile communication equipment and multimedia technology has drawn much attention to the security of multimedia data itself. As an important part of multimedia audio, audio has characteristics different from text and image information. Because there is greater redundancy and strong correlation between its signals, the method for audio protection is different from that of images and texts. Among them, audio encryption uses the matrix characteristics of digital audio to change the position or value of the phoneme in the spatial domain of the audio according to a certain transformation rule, so as to make the information of the original audio "disorganized". As a new multimedia security technology, multi-audio encryption has the characteristics of high efficiency and strong confidentiality, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L29/08
CPCH04L9/001H04L67/06H04L2209/60
Inventor 张晓强李泳锋
Owner CHINA UNIV OF MINING & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products