KEYWORDS: Binary data, Computer security, Data conversion, Information security, Cryptography, Data communications, Acoustics, Statistical analysis, Network security, Data hiding
In recent years, the random number generators in engineering applications have attracted the attention of many researchers. One of the most important aspects is to obtain some sequences of both truly random and pseudorandom numbers that can be applicated in the various fields of cryptography, signal processing, and in many other fields of engineering. At the production of pseudorandom number generators, chaotic maps are the source of entropy to create some randomness. Most of the methods based on chaotic maps have been attacked easily in recent years with the help of nonlinear prediction (forecasting), as well as analysis of the phase space on the map. A true random number generator is actual area of research when using in it the encryption. Encryption of any data with random source ensures the security of information. The purpose of this article is to develop the self-generated truly random numbers for audio encryption. For this aim, a sound encryption system was created. Digital audio data is converted to binary form. The XOR operation is performed to develop for truly random number generator. The testing systems NIST 800–22 Test Suite and TestU01 are ap-plied to the bit stream. The source data and the encryption key are evaluated for randomness. Audio encryption is performed with the generated bits. This article proves that the self–generated audio encryption system can be implemented. Statistical analysis and data distribution show that the encryption process with self–generation is successful. In this paper, the authors propose the model of sound encryption of self-generated true random number.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.