Research Article
BibTex RIS Cite

CHAOTIC AUDIO RESEARCH AND APPLICATION

Year 2025, Volume: 8 Issue: 1, 117 - 132, 26.08.2025
https://doi.org/10.56809/icujtas.1597765

Abstract

This paper introduces a novel chaotic stream encryption method developed for securing audio files. Chaotic systems offer significant advantages in encryption processes due to their sensitivity to initial conditions and nonlinear dynamic structures. Audio files encrypted using the proposed method were analyzed using PSNR, entropy, and National Institute of Standards and Technology randomness tests. Additionally, the security of the encrypted audio data was evaluated through spectrogram analysis. The spectrogram analysis and National Institute of Standards and Technology randomness tests demonstrated the algorithm's strong potential resistance to post-quantum security threats.

Ethical Statement

This article is based on the preliminary studies conducted within the scope of the master's thesis titled "Investigation and Application of Chaotic Voice Encryption," supervised by Assoc. Prof. Mustafa Cem KASAPBAŞI at Istanbul Commerce University, Graduate School of Natural and Applied Sciences, Cybersecurity Master's Program with Thesis, and carried out by Anıl Emre DURAK. The adaptation of chaotic systems into security technologies presents an innovative approach to addressing the growing needs for data protection. This study aims to contribute to academic knowledge and propose novel solutions for industrial applications by examining the effectiveness of chaotic algorithms in encrypting voice data through both theoretical and practical perspectives.

Thanks

The authors have contributed equally to this study. There are no potential conflicts of interest associated with this work. The research and publication ethics have been adhered to throughout the study.

References

  • Alvarez, G., & Li, S. (2006). "Some basic cryptographic requirements for chaos-based cryptosystems." International Journal of Bifurcation and Chaos, 16(8), 2129-2151.
  • Bao, W., Chen, G., & Meng, Q. (2005). "A novel image encryption algorithm based on logistic maps." Chaos, Solitons & Fractals.
  • Baptista, M. S. (1998). "Cryptography with chaos." Physics Letters A, 240(1-2), 50-54.
  • Bernstein, D. J., Buchmann, J., & Dahmen, E. (2009). Post-Quantum Cryptography. Springer.
  • Behnia, S., Akhshani, A., Mahmodi, H., & Akhavan, A. (2008). "A novel algorithm for image encryption based on mixture of chaotic maps." Chaos, Solitons & Fractals, 35(2), 408-419.
  • Chen, G., Mao, Y., & Chui, C. K. (2004). "A symmetric image encryption scheme based on 3D chaotic cat maps." Chaos, Solitons & Fractals.
  • Chaos-based cryptography: A new approach to secure communications.
  • Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications. Wiley.
  • Fridrich, J. (1998). "Symmetric ciphers based on two-dimensional chaotic maps." International Journal of Bifurcation and Chaos, 8(6), 1259-1284.
  • Liu, H., Liu, A., & Zhang, H. (2010). "Color image encryption based on one-time keys and chaos." Signal Processing.
  • Kocarev, L., & Jakimoski, G. (2001). "Logistic map as a block encryption algorithm." Physics Letters A, 289(4-5), 199-206.
  • Kolumbán, G., Kennedy, M. P., & Chua, L. O. (1998). "The role of synchronization in digital communications using chaos—Part II: Chaotic modulation and chaotic synchronization." IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 45(11), 1129-1140.
  • Kumar, P., & Kumar, A. (2016). "Chaotic cryptography: A comprehensive survey." Journal of Information Security and Applications, 29, 56-84.
  • Gallas, J. A. C. (1993). "Structure of the parameter space of a class of simple autonomous flows." Physics Letters A, 181(1), 1-8.
  • Li, C., Zhang, Y., & Chen, G. (2013). "Cryptanalysis of a chaotic image encryption algorithm." Signal Processing, 93(5), 1350-1359.
  • Liu, H., Wang, R., & Zhang, H. - Chaotic cryptography for real-time multimedia encryption (2022) Gerçek zamanlı medya şifrelemesi için kaotik sistemlerin uygulanabilirliği üzerine bir çalışma.
  • Lorenz system and chaos theory: Applications in cryptography.
  • Matthews, R. (1989). "On the derivation of a ‘chaotic’ encryption algorithm." Cryptologia.
  • National Institute of Standards and Technology (NIST), Randomness Test Suite.
  • NIST rastgelelik testlerinin kaotik şifreleme sistemlerindeki rolünü vurgulayan yakın tarihli bir çalışma.
  • Ott, E. (1993). Chaos in Dynamical Systems. Cambridge University Press.
  • Patidar, V., Pareek, N. K., & Sud, K. K. (2009). "A new substitution–diffusion based image cipher using chaotic standard and logistic maps." Communications in Nonlinear Science and Numerical Simulation.
  • Pareek, N. K., Patidar, V., & Sud, K. K. (2006). "Image encryption using chaotic logistic map." Image and Vision Computing, 24(9), 926-934.
  • Schneier, B. (2003). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley.
  • Strogatz, S. H. (2018). Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry, and Engineering. Westview Press.
  • Shannon, C. E. (1949). "Communication theory of secrecy systems." Bell System Technical Journal.
  • TÜBİTAK (2021). Kamu Sertifikasyon Merkezi Güvenlik Standartları. TÜBİTAK Bilgi Güvenliği Dairesi.
  • Xu, L., & Zhang, X. (2010). "Application of chaotic systems in digital watermarking." Chaos, Solitons & Fractals, 42(5), 3078-3084.
  • Wang, X., & Wong, K. W. (2012). "A chaotic cryptographic scheme for real-time communication." Communications in Nonlinear Science and Numerical Simulation, 17(11), 4104-4117.
  • Yang, X., & Yang, Z. (2014). "High-dimensional chaotic systems and their applications in cryptography." Nonlinear Dynamics, 78(1), 203-211.
  • Zhao, H., Wang, C., & Chen, G. (2006). "Chaos-based image encryption scheme combined with public-key cryptography." Signal Processing.
  • Zhang, L., & Yu, S. (2015). "An image encryption scheme using a chaotic system." Multimedia Tools and Applications, 74(24), 11455-11471.
  • Zhang, X., Liu, Q., & Yang, T. - Randomness evaluation of chaotic encryption systems using NIST test suite (2023)

KAOTİK SES ŞİFRELEME ARAŞTIRILMASI VE UYGULAMASI

Year 2025, Volume: 8 Issue: 1, 117 - 132, 26.08.2025
https://doi.org/10.56809/icujtas.1597765

Abstract

Bu makale, ses dosyalarını güvence altına almak için geliştirilmiş yeni bir kaotik akış şifreleme yöntemini tanıtmaktadır. Kaotik sistemler, başlangıç koşullarına duyarlılıkları ve doğrusal olmayan dinamik yapıları sayesinde şifreleme süreçlerinde önemli avantajlar sunar. Önerilen yöntemle şifrelenen ses dosyaları, tepe sinyal-gürültü oranı, entropi ve National Institute of Standards and Technology rastgelelik testleri kullanılarak. Algoritmanın kuantum sonrası güvenlik tehditlerine karşı güçlü bir direnç potansiyeline sahip olduğunu göstermiştir.

Ethical Statement

Bu makale, İstanbul Ticaret Üniversitesi Fen Bilimleri Enstitüsü, Siber Güvenlik Tezli Yüksek Lisans Programı kapsamında, ses şifreleme ve kaotik sistemler alanında uzman olan Doç. Dr. Mustafa Cem KASAPBAŞI danışmanlığında, Anıl Emre DURAK tarafından yürütülen "Kaotik Ses Şifreleme Araştırılması ve Uygulanması" başlıklı yüksek lisans tezinin ön çalışmalarından elde edilen bulgulara dayanmaktadır. Kaotik sistemlerin güvenlik teknolojilerine adaptasyonu, günümüzde giderek artan veri güvenliği ihtiyaçlarını karşılamada yenilikçi bir yaklaşım sunmaktadır. Bu çalışma, ses verilerinin şifrelenmesinde kaotik algoritmaların etkinliğini teorik ve uygulamalı olarak inceleyerek hem akademik bilgiye katkıda bulunmayı hem de endüstriyel kullanıma yönelik yeni çözümler sunmayı amaçlamaktadır.

Thanks

Yazarlar çalışmaya eşit oranda katkı sağlamıştır. Bu çalışmada herhangi bir potansiyel çıkar çatışması bulunmamaktadır. Yapılan çalışmada araştırma ve yayın etiğine uyulmuştur.

References

  • Alvarez, G., & Li, S. (2006). "Some basic cryptographic requirements for chaos-based cryptosystems." International Journal of Bifurcation and Chaos, 16(8), 2129-2151.
  • Bao, W., Chen, G., & Meng, Q. (2005). "A novel image encryption algorithm based on logistic maps." Chaos, Solitons & Fractals.
  • Baptista, M. S. (1998). "Cryptography with chaos." Physics Letters A, 240(1-2), 50-54.
  • Bernstein, D. J., Buchmann, J., & Dahmen, E. (2009). Post-Quantum Cryptography. Springer.
  • Behnia, S., Akhshani, A., Mahmodi, H., & Akhavan, A. (2008). "A novel algorithm for image encryption based on mixture of chaotic maps." Chaos, Solitons & Fractals, 35(2), 408-419.
  • Chen, G., Mao, Y., & Chui, C. K. (2004). "A symmetric image encryption scheme based on 3D chaotic cat maps." Chaos, Solitons & Fractals.
  • Chaos-based cryptography: A new approach to secure communications.
  • Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications. Wiley.
  • Fridrich, J. (1998). "Symmetric ciphers based on two-dimensional chaotic maps." International Journal of Bifurcation and Chaos, 8(6), 1259-1284.
  • Liu, H., Liu, A., & Zhang, H. (2010). "Color image encryption based on one-time keys and chaos." Signal Processing.
  • Kocarev, L., & Jakimoski, G. (2001). "Logistic map as a block encryption algorithm." Physics Letters A, 289(4-5), 199-206.
  • Kolumbán, G., Kennedy, M. P., & Chua, L. O. (1998). "The role of synchronization in digital communications using chaos—Part II: Chaotic modulation and chaotic synchronization." IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 45(11), 1129-1140.
  • Kumar, P., & Kumar, A. (2016). "Chaotic cryptography: A comprehensive survey." Journal of Information Security and Applications, 29, 56-84.
  • Gallas, J. A. C. (1993). "Structure of the parameter space of a class of simple autonomous flows." Physics Letters A, 181(1), 1-8.
  • Li, C., Zhang, Y., & Chen, G. (2013). "Cryptanalysis of a chaotic image encryption algorithm." Signal Processing, 93(5), 1350-1359.
  • Liu, H., Wang, R., & Zhang, H. - Chaotic cryptography for real-time multimedia encryption (2022) Gerçek zamanlı medya şifrelemesi için kaotik sistemlerin uygulanabilirliği üzerine bir çalışma.
  • Lorenz system and chaos theory: Applications in cryptography.
  • Matthews, R. (1989). "On the derivation of a ‘chaotic’ encryption algorithm." Cryptologia.
  • National Institute of Standards and Technology (NIST), Randomness Test Suite.
  • NIST rastgelelik testlerinin kaotik şifreleme sistemlerindeki rolünü vurgulayan yakın tarihli bir çalışma.
  • Ott, E. (1993). Chaos in Dynamical Systems. Cambridge University Press.
  • Patidar, V., Pareek, N. K., & Sud, K. K. (2009). "A new substitution–diffusion based image cipher using chaotic standard and logistic maps." Communications in Nonlinear Science and Numerical Simulation.
  • Pareek, N. K., Patidar, V., & Sud, K. K. (2006). "Image encryption using chaotic logistic map." Image and Vision Computing, 24(9), 926-934.
  • Schneier, B. (2003). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley.
  • Strogatz, S. H. (2018). Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry, and Engineering. Westview Press.
  • Shannon, C. E. (1949). "Communication theory of secrecy systems." Bell System Technical Journal.
  • TÜBİTAK (2021). Kamu Sertifikasyon Merkezi Güvenlik Standartları. TÜBİTAK Bilgi Güvenliği Dairesi.
  • Xu, L., & Zhang, X. (2010). "Application of chaotic systems in digital watermarking." Chaos, Solitons & Fractals, 42(5), 3078-3084.
  • Wang, X., & Wong, K. W. (2012). "A chaotic cryptographic scheme for real-time communication." Communications in Nonlinear Science and Numerical Simulation, 17(11), 4104-4117.
  • Yang, X., & Yang, Z. (2014). "High-dimensional chaotic systems and their applications in cryptography." Nonlinear Dynamics, 78(1), 203-211.
  • Zhao, H., Wang, C., & Chen, G. (2006). "Chaos-based image encryption scheme combined with public-key cryptography." Signal Processing.
  • Zhang, L., & Yu, S. (2015). "An image encryption scheme using a chaotic system." Multimedia Tools and Applications, 74(24), 11455-11471.
  • Zhang, X., Liu, Q., & Yang, T. - Randomness evaluation of chaotic encryption systems using NIST test suite (2023)
There are 33 citations in total.

Details

Primary Language Turkish
Subjects Audio Processing, Information Security and Cryptology, Cryptography
Journal Section Research Articles
Authors

Anıl Emre Durak 0000-0001-7100-1332

Mustafa Cem Kasapbaşı 0000-0001-6444-6659

Publication Date August 26, 2025
Submission Date December 7, 2024
Acceptance Date January 16, 2025
Published in Issue Year 2025 Volume: 8 Issue: 1

Cite

APA Durak, A. E., & Kasapbaşı, M. C. (2025). KAOTİK SES ŞİFRELEME ARAŞTIRILMASI VE UYGULAMASI. İstanbul Ticaret Üniversitesi Teknoloji Ve Uygulamalı Bilimler Dergisi, 8(1), 117-132. https://doi.org/10.56809/icujtas.1597765