A Semi- One Time Pad Using Blind Source Separation for Speech Encryption
We propose a new perspective on speech
communication using blind source separation. The original speech is
mixed with key signals which consist of the mixing matrix, chaotic
signals and a random noise. However, parts of the keys (the mixing
matrix and the random noise) are not necessary in decryption. In
practice implement, one can encrypt the speech by changing the noise
signal every time. Hence, the present scheme obtains the advantages
of a One Time Pad encryption while avoiding its drawbacks in key
exchange. It is demonstrated that the proposed scheme is immune
against traditional attacks.
[1] Grangetto, M., Magli, E., Olmo, G.: Multimedia selective encryption by
means of randomized arithmetic coding IEEE Trans. Multimed. 8, 905-
917 (2006)
[2] Lee, J., Vijaykrishnan, N., Irwin, M.J., Chandramouli, R.: Block-based
frequency scalable technique for efficient hierarchical coding. IEEE
Trans. Signal Process. 54, 2559- 2566 (2006)
[3] Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to
multimedia encryption. IEEE Trans. Image Process. 15, 2061-
2075 (2006)
[4] Ashtiyani, M., Behbahani, S., Asadi, S., Birgani, P.M.: Transmitting
encrypted data by wavelet transform and neural network. In: IEEE Int.
Symposium on Signal Processing and Information Technology, pp. 385-
389 (2007)
[5] Manjunath, G., Anand, G.V.: Speech encryption using circulant
transformations. In: IEEE Int. Conf. Multimedia and Expo., vol. 1, pp.
553- 556 (2002)
[6] Lin, Q.H., Yin, F.L., Mei, T.M., Liang, H.: A blind source separation
based method for speech encryption. IEEE Trans. Circuits Syst. 53,
1320- 1328 (2006)
[7] S. Li, C. Li, K. T. Lo and G. Chen, "Cryptanalyzing an encryption scheme
based on blind source separation," IEEE Trans. Circuits Syst. 55,
1055-1062 (2008).
[8] B. Schneier, Applied Cryptography: Protocols, Alorithms and Source
Code in C. Wiley Computer Publishing, John Wiley and Sons, Inc, 1996.
[9] C. Jutten and J. Herault, "Blind separation of sources, Part 1: an adaptive
algorithm based on neuromimetic architecture," Signal Processing, Vol.
24, pp. 1-10, 1991
[10] T. W. Lee, A. J. Bell, and R. H. Lambert, " Blind separation of delayed
and convolved sources," Adv. Neural Inf. Process. Syst., vol. 9, pp.
758-764, 1996.
[11] Chen HK, Lee CI. Anti-control of chaos in rigid body motion. Chaos,
Solitons & Fractals 2004;21:957-65.
[12] .F. Cardoso and A. Souloumiac, "Blind beamforming for non-Gaussian
signals," IEE Proceedings F, Vol. 140, pp. 771-774, 1993.
[1] Grangetto, M., Magli, E., Olmo, G.: Multimedia selective encryption by
means of randomized arithmetic coding IEEE Trans. Multimed. 8, 905-
917 (2006)
[2] Lee, J., Vijaykrishnan, N., Irwin, M.J., Chandramouli, R.: Block-based
frequency scalable technique for efficient hierarchical coding. IEEE
Trans. Signal Process. 54, 2559- 2566 (2006)
[3] Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to
multimedia encryption. IEEE Trans. Image Process. 15, 2061-
2075 (2006)
[4] Ashtiyani, M., Behbahani, S., Asadi, S., Birgani, P.M.: Transmitting
encrypted data by wavelet transform and neural network. In: IEEE Int.
Symposium on Signal Processing and Information Technology, pp. 385-
389 (2007)
[5] Manjunath, G., Anand, G.V.: Speech encryption using circulant
transformations. In: IEEE Int. Conf. Multimedia and Expo., vol. 1, pp.
553- 556 (2002)
[6] Lin, Q.H., Yin, F.L., Mei, T.M., Liang, H.: A blind source separation
based method for speech encryption. IEEE Trans. Circuits Syst. 53,
1320- 1328 (2006)
[7] S. Li, C. Li, K. T. Lo and G. Chen, "Cryptanalyzing an encryption scheme
based on blind source separation," IEEE Trans. Circuits Syst. 55,
1055-1062 (2008).
[8] B. Schneier, Applied Cryptography: Protocols, Alorithms and Source
Code in C. Wiley Computer Publishing, John Wiley and Sons, Inc, 1996.
[9] C. Jutten and J. Herault, "Blind separation of sources, Part 1: an adaptive
algorithm based on neuromimetic architecture," Signal Processing, Vol.
24, pp. 1-10, 1991
[10] T. W. Lee, A. J. Bell, and R. H. Lambert, " Blind separation of delayed
and convolved sources," Adv. Neural Inf. Process. Syst., vol. 9, pp.
758-764, 1996.
[11] Chen HK, Lee CI. Anti-control of chaos in rigid body motion. Chaos,
Solitons & Fractals 2004;21:957-65.
[12] .F. Cardoso and A. Souloumiac, "Blind beamforming for non-Gaussian
signals," IEE Proceedings F, Vol. 140, pp. 771-774, 1993.
@article{"International Journal of Information, Control and Computer Sciences:55295", author = "Long Jye Sheu and Horng-Shing Chiou and Wei Ching Chen", title = "A Semi- One Time Pad Using Blind Source Separation for Speech Encryption", abstract = "We propose a new perspective on speech
communication using blind source separation. The original speech is
mixed with key signals which consist of the mixing matrix, chaotic
signals and a random noise. However, parts of the keys (the mixing
matrix and the random noise) are not necessary in decryption. In
practice implement, one can encrypt the speech by changing the noise
signal every time. Hence, the present scheme obtains the advantages
of a One Time Pad encryption while avoiding its drawbacks in key
exchange. It is demonstrated that the proposed scheme is immune
against traditional attacks.", keywords = "one time pad, blind source separation, independentcomponent analysis, speech encryption.", volume = "5", number = "8", pages = "879-4", }