Chaos-based multi-audio high-dimensional encryption method

文档序号:1172710 发布日期:2020-09-18 浏览:7次 中文

阅读说明:本技术 基于混沌的多音频高维加密方法 (Chaos-based multi-audio high-dimensional encryption method ) 是由 张晓强 尹涛 李泳锋 于 2020-06-05 设计创作,主要内容包括:一种基于混沌的多音频高维加密方法,属于信息加密领域。目前,在网络上传递音频文件和用语音进行交流的活动日益频繁,为保护多个音频内容的安全性,本发明提出一种基于混沌的多音频高维加密方法。首先,将多个同长度的音频拼接成一个音素矩阵;其次,将矩阵中的音素整数化,并将矩阵中的音素转化成二进制数;再次,通过混沌序列对三维音素矩阵进行置乱;最后,将置乱音素矩阵与混沌序列进行异或运算,实现音素的扩散。实验表明:该方法可实现多个音频文件同步加密,且加密效果良好,安全性高且高效。(A chaos-based multi-audio high-dimensional encryption method belongs to the field of information encryption. At present, activities of transmitting audio files and communicating by voice are increasingly frequent on the network, and in order to protect the safety of a plurality of audio contents, the invention provides a chaos-based multi-audio high-dimensional encryption method. Firstly, splicing a plurality of audios with the same length into a phoneme matrix; secondly, performing integral treatment on the phonemes in the matrix, and converting the phonemes in the matrix into binary numbers; thirdly, scrambling the three-dimensional phoneme matrix through the chaotic sequence; and finally, carrying out XOR operation on the scrambled phoneme matrix and the chaotic sequence to realize the diffusion of the phonemes. Experiments show that: the method can realize synchronous encryption of a plurality of audio files, and has the advantages of good encryption effect, high safety and high efficiency.)

1. The chaos-based multi-audio high-dimensional encryption method is characterized in that the encryption process comprises the following steps:

step 1: and (3) phoneme integer quantization: order tokAn interactive audio isA 1,A 2, …,A k Of a size ofm×1,mIs the number of phonemes, 1 means that the audio file is mono;A j j=1, 2, …,k) The range of the middle element is [ -1,1 [)]Adding 1 to all elements to make their range become [0, 2 ]]Then multiply by a specified coefficientdMaking each phoneme value availablenIs represented by a binary bit, i.e.

b i j =(a i j +1)×di=1, 2, …,mj=1, 2, …,k, (1)

Wherein the content of the first and second substances,a i j A j B j ={b i j is a phoneme integer matrix, and can be obtainedkAnm× 1 phoneme integer matrixB 1,B 2, …,B k

Step 2: and (3) chaotic sequence generation: randomly selecting an initial valuex 0∈ (0, 1) and control parametersp 1∈ (0, 0.5), piecewise linear Chaotic Map (PWLCM) shown in iterative formula (2)mNext, the process of the present invention,

, (2)

can generate a chaotic sequenceX 1={x i 1}; similarly, the initial value is randomly choseny 0∈(0, 1),z 0∈(0, 1),w 0∈ (0, 1) and control parametersp 2∈(0, 0.5),p 3∈(0, 0.5),p 4∈ (0, 0.5), respectively iteratedknAndm×kthen, three chaotic sequences can be generatedY 1={y i 1},Z 1={z i 1AndW 1={w i 1};

and step 3: and (3) integer transformation of the chaotic sequence: the calculation is carried out according to the calculation,

x i 2=mod(floor(x i 1×1016),m), (3)

y i 2=mod(floor(y i 1×1016),k), (4)

z i 2=mod(floor(z i 1×1016),n), (5)

w i 2=mod(floor(w i 1×1016), 2 n ), (6)

wherein the content of the first and second substances,mod() Andfloor() Respectively a modulo and an integer function,x i 1X 1X 2={x i 2},y i 1Y 1Y 2={y i 2},z i 1Z 1Z 2={z i 2},w i 1W 1andW 2={w i 2};

and 4, step 4: audio data upscaling: according toB 1,B 2, …,B k In order to reshape it into onem×kIs a matrix of integersC(ii) a Will be provided withCAll the elements in (1) are usednA binary bit representation; with a single binary bit as an element, a size ofm×k×nThree-dimensional matrix ofD

And 5: bit-level scrambling: by usingX 2Y 2AndZ 2are respectively pairedDSequentially performing bit-level row scrambling, bit-level column scrambling and bit-level plane scrambling to obtain a scrambling resultE

Step 6: audio data dimensionality reduction: to be provided withnEach binary bit is a unit ofEDecimal the Chinese data, canEIs converted into a size ofm×kPhoneme matrix ofF(ii) a Will be provided withFThe medium elements are separated according to columns to obtainkThe scrambling result is:G 1,G 2, …,G k

and 7: phoneme diffusion: the calculation is carried out according to the calculation,

H 1=G 1W 2H i =G i Y 2H i-1i=2, 3, …,k, (7)

where ⊕ represents an exclusive-or operation, the diffusion result can be:H 1,H 2, …,H k

and 8: phonemic decimal transformation: to pairH 1,H 2, …,H k All elements in (1) are divided bydThen decrease 1 to make its range to [ -1,1 [)]I.e. by

q i j =h i j /d-1,i=1, 2, …,mj=1, 2, …,k, (8)

Wherein the content of the first and second substances,h i j H j Q j ={q i j the phoneme matrix is used as the phoneme matrix; can obtain the productkPersonal encrypted audioQ 1,Q 2, …,Q k

2. The method of claim 1, wherein: in step 5, bit-level row scrambling means: if it isii=1, 2,…,m) For odd rows, then pairDTo middleiLine element go onx i 2X 2Bit left cyclic shift operations; if it isiEven number of rows, then pairDTo middleiLine element go onx i 2Bit is circularly shifted to the right.

3. The method of claim 1, wherein: in step 5, the bit-level column-set random finger: if it isjj=1, 2,…,k) Odd columns, then pairDTo middlejColumn element to proceedy i 2Y 2Is positioned upwardsA cyclic shift operation; if it isiEven number of rows, then pairDTo middlejColumn element to proceedy i 2A bit down cyclic shift operation.

4. The method of claim 1, wherein: in the step 5, the bit level faces are provided with disorder fingers: if it isss=1, 2,…,n) Odd columns, then pairDTo middlesElement on bit planez i 2A bit forward cyclic shift operation; if it issEven number of rows, then pairDTo middlesElement on bit planez i 2A bit backward cyclic shift operation.

Technical Field

The present document relates to an audio encryption method, which mainly encrypts a plurality of audio files.

Background

In recent years, with the progress of science and technology, the smart phone industry and the APP industry are greatly developed, along with the popularization of social networks, people increasingly communicate with other people through the mobile phone internet, meanwhile, the information security problem is gradually concerned by people, and the information encryption security technology is forced to be strengthened urgently due to the occurrence of the problems of data leakage, privacy theft and the like. The encryption of audio data is to change the position of the phoneme or the value of the phoneme in the spatial domain of the audio according to a certain transformation rule by using the matrix property of digital audio, so as to make the information of the original audio "hash". As a new multimedia security technology, multi-audio encryption has the characteristics of high efficiency and strong confidentiality, and gradually draws the attention of researchers.

The traditional audio encryption mode mainly has two types: phoneme scrambling and phoneme diffusion. Wherein the purpose of phoneme scrambling is to change the location of phonemes; the purpose of phoneme diffusion is to change the value of the phoneme. In order to improve the safety and efficiency of audio encryption and ensure the safe and efficient transmission of audio, a chaos-based multi-audio high-dimensional encryption method is designed by utilizing a chaos theory and a multi-audio theory. The method effectively protects the network transmission and storage safety of the audio files by utilizing the good scrambling effect of the audio files and the good randomness and complexity of chaos.

Disclosure of Invention

The purpose of the invention is as follows: aiming at the problem of weak security of the existing single audio encryption method, a chaos-based multi-audio encryption method is provided.

The technical scheme of the invention is as follows: in order to achieve the aim of the invention, the adopted scheme is a chaos-based multi-audio encryption method.

Step 1: and (3) phoneme integer quantization: order tokAn interactive audio isA 1,A 2, …,A k Of a size ofm×1,mIs the number of phonemes, 1 means that the audio file is mono;A j j=1, 2, …,k) The range of the middle element is [ -1,1 [)]Adding 1 to all elements to make their range become [0, 2 ]]Then multiply by a specified coefficientdMaking each phoneme value availablenIs represented by a binary bit, i.e.

b i j =(a i j +1)×di=1, 2, …,mj=1, 2, …,k, (1)

Wherein the content of the first and second substances,a i j A j B j ={b i j is a phoneme integer matrix, and can be obtainedkAnm× 1 phoneme integer matrixB 1,B 2, …,B k

Step 2: and (3) chaotic sequence generation: randomly selecting an initial valuex 0∈ (0, 1) and control parametersp 1∈ (0, 0.5), Piecewise Linear Chaotic Map (PWLCM) shown in iterative formula (2)mNext, the process of the present invention,

, (2)

can generate a chaotic sequenceX 1={x i 1}; similarly, the initial value is randomly choseny 0∈(0, 1),z 0∈(0, 1),w 0∈ (0, 1) and control parametersp 2∈(0, 0.5),p 3∈(0, 0.5),p 4∈ (0, 0.5), respectively iteratedknAndm×kthen, three chaotic sequences can be generatedY 1={y i 1},Z 1={z i 1AndW 1={w i 1};

and step 3: and (3) integer transformation of the chaotic sequence: the calculation is carried out according to the calculation,

x i 2=mod(floor(x i 1×1016),m), (3)

y i 2=mod(floor(y i 1×1016),k), (4)

z i 2=mod(floor(z i 1×1016),n), (5)

w i 2=mod(floor(w i 1×1016), 2 n ), (6)

wherein the content of the first and second substances,mod() Andfloor() Respectively a modulo and an integer function,x i 1X 1X 2={x i 2},y i 1Y 1Y 2={y i 2},z i 1Z 1Z 2={z i 2},w i 1W 1andW 2={w i 2};

and 4, step 4: audio data upscaling: according toB 1,B 2, …,B k In order to reshape it into onem×kIs a matrix of integersC(ii) a Will be provided withCAll the elements in (1) are usednA binary bit representation; with a single binary bit as an element, a size ofm×k×nThree-dimensional matrix ofD

And 5: bit-level scrambling: by usingX 2Y 2AndZ 2are respectively pairedDSequentially performing bit-level row scrambling, bit-level column scrambling and bit-level plane scrambling to obtain a scrambling resultE

Step 6: audio data dimensionality reduction: to be provided withnEach binary bit is a unit ofEDecimal the Chinese data, canEIs converted into a size ofm×kPhoneme matrix ofF(ii) a Will be provided withFThe medium elements are separated according to columns to obtainkThe scrambling result is:G 1,G 2, …,G k

and 7: phoneme diffusion: the calculation is carried out according to the calculation,

H 1=G 1W 2H i =G i Y 2H i-1i=2, 3, …,k, (7)

where ⊕ represents an exclusive-or operation, the diffusion result can be:H 1,H 2, …,H k

and 8: phonemic decimal transformation: to pairH 1,H 2, …,H k All elements in (1) are divided bydThen decrease 1 to make its range to [ -1,1 [)]I.e. by

q i j =h i j /d-1,i=1, 2, …,mj=1, 2, …,k, (8)

Wherein the content of the first and second substances,h i j H j Q j ={q i j the phoneme matrix is used as the phoneme matrix; can obtain the productkPersonal encrypted audioQ 1,Q 2, …,Q k

Further, in step 5, the bit-level row scrambling means: if it isii=1, 2, …,m) For odd rows, then pairDTo middleiLine element go onx i 2X 2Bit left cyclic shift operations; if it isiEven number of rows, then pairDTo middleiLine element go onx i 2Bit is circularly shifted to the right.

Further, in step 5, the bit level column is scrambled: if it isjj=1, 2, …,k) Odd columns, then pairDTo middlejColumn element to proceedy i 2Y 2A bit-up cyclic shift operation; if it isiEven number of rows, then pairDTo middlejColumn element to proceedy i 2A bit down cyclic shift operation.

Further, in step 5, the bit level is set to be random: if it isss=1, 2, …,n) Odd columns, then pairDTo middlesOn a bit planeBy the elements ofz i 2A bit forward cyclic shift operation; if it issEven number of rows, then pairDTo middlesElement on bit planez i 2A bit backward cyclic shift operation.

Has the advantages that: the invention provides a chaos-based multi-audio high-dimensional encryption method aiming at the defects of weak safety of a single audio encryption method and the problem of low efficiency of an inherent audio encryption method. The main contributions are: (1) encrypting by using a plurality of audios, wherein before encrypting the audios, the phonemes have a better scrambling effect by using the irrelevance of the audios; (2) the chaos sequence generated by the PWLCM piecewise chaos mapping system is used for scrambling and diffusing the original audio matrix, so that different encryption effects can be generated when the initial key is changed, and the confidentiality of the method is improved; (3) the synchronous encryption of a plurality of audio files is realized, and the efficiency of audio encryption is improved; (4) the method utilizes the randomness and the complexity of the chaos and improves the encryption effect of the audio. Therefore, the multi-audio encryption method has the characteristics of high efficiency, safety and good encryption effect, and can effectively protect the network transmission and storage safety of a plurality of audio files.

Drawings

FIG. 1: a chaos-based multi-audio encryption flow chart;

FIG. 2: a time domain waveform of the original audio;

FIG. 3: a time domain waveform map of the encrypted audio.

Detailed Description

The following detailed description of the embodiments of the present invention is provided in connection with the accompanying drawings and examples.

Fig. 1 is an encryption flow diagram of the method.

The adopted programming software is Matlab R2017b, and 5 audio files with the size of 40000 multiplied by 1 are selected as original audio. The detailed process of encrypting the original image by using the method is described as follows.

Step 1: open 5 Audio files A1, A2, …, A5(ii) a The time domain waveform is shown in FIG. 2, and the steps are performedObtaining B after integral treatment1, B2, …, B5

Step 2: and (3) chaotic sequence generation: the initial value of the key is taken and,x 0=0.85678246971354、y 0=0.74158763482146、z 0=0.45213648764128、w 0=0.368421795243678、p 1=0.3642871348521、p 2=0.25136478213497、p 3=0.35964785134952、p 4=0.40258126971254 chaos sequence generated by PLWCM segment mapping system of formula (2)X 1Y 1Z 1W 1

And step 3: the chaos sequence generated in the step 2 is processed into integersX 1Y 1Z 1W 1Obtaining the chaos sequence through the rounding of the formulas (3) to (6) shown in the step threeX 2Y 2Z 2W 2

And 4, step 4: phoneme data ascending: b is to be1,B2,…, B5According to the sequence numbers, the two-dimensional matrix C of 40000 × 5 is combined, each element in the matrix is converted into a 16-bit binary representation, and the three-dimensional matrix D of 40000 × 5 × 16 is formed, and the matrix elements are 0 or 1.

And 5: phoneme high-dimensional scrambling: the obtained three-dimensional matrix D passes through the chaotic matrix generated in the third stepX 2Y 2Z 2Performing row and column face scrambling, specifically: (1) line scrambling: to the second of the matrix DiLine (1 is less than or equal toi40000) or less, ifiIs odd, theniCyclic shift of line to rightX i 2Bit, ifiIs even number, theniCyclic shift of rows to leftX i 2A bit; (2) and (3) column scrambling: to the second of the matrix DjColumn (1. ltoreq. j. ltoreq.5), if j is an odd number, the firstjCyclic shift in columnY j 2Bit, ifjIs even number, thenjColumn down cyclic shiftY j 2A bit; (3) surface scrambling: to the second of the matrix DsColumn (1 ≤s16) ifsIs odd, thensWith cyclic displacement of the pages forwardsZ s 2Bit, ifsIs even number, thensCyclic shift of pages backwardsZ s 2A bit.

Step 6, phoneme data dimensionality reduction, namely performing decimal transformation on a matrix D subjected to phoneme high-dimensional scrambling, converting binary system of each 16 bits into decimal system of 1 bit, finally combining the decimal system into a two-dimensional matrix F of 40000 × 5, and then splitting the F into 5 matrixes G of 40000 × 1 according to columns1, G2, …, G5

And 7: phoneme diffusion: for G generated in step 61, G2, …, G5H can be obtained by performing the operation shown in the formula (7)1, H2, …, H5

And 8: to H1, H2,…, H 55 encrypted audio files Q can be obtained by performing the operation shown in the formula (8)1,Q2, …, Q5(ii) a Time domain waveforms, as shown in fig. 3.

Audio decryption: the decryption process is the reverse of the encryption process.

9页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种基于混合混沌映射的单轮图像加密方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!