Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30840
A Semi- One Time Pad Using Blind Source Separation for Speech Encryption

Authors: Long Jye Sheu, Horng-Shing Chiou, Wei Ching Chen


We propose a new perspective on speech communication using blind source separation. The original speech is mixed with key signals which consist of the mixing matrix, chaotic signals and a random noise. However, parts of the keys (the mixing matrix and the random noise) are not necessary in decryption. In practice implement, one can encrypt the speech by changing the noise signal every time. Hence, the present scheme obtains the advantages of a One Time Pad encryption while avoiding its drawbacks in key exchange. It is demonstrated that the proposed scheme is immune against traditional attacks.

Keywords: blind source separation, speech encryption, one time pad, independentcomponent analysis

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1229


[1] Grangetto, M., Magli, E., Olmo, G.: Multimedia selective encryption by means of randomized arithmetic coding IEEE Trans. Multimed. 8, 905- 917 (2006)
[2] Lee, J., Vijaykrishnan, N., Irwin, M.J., Chandramouli, R.: Block-based frequency scalable technique for efficient hierarchical coding. IEEE Trans. Signal Process. 54, 2559- 2566 (2006)
[3] Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Process. 15, 2061- 2075 (2006)
[4] Ashtiyani, M., Behbahani, S., Asadi, S., Birgani, P.M.: Transmitting encrypted data by wavelet transform and neural network. In: IEEE Int. Symposium on Signal Processing and Information Technology, pp. 385- 389 (2007)
[5] Manjunath, G., Anand, G.V.: Speech encryption using circulant transformations. In: IEEE Int. Conf. Multimedia and Expo., vol. 1, pp. 553- 556 (2002)
[6] Lin, Q.H., Yin, F.L., Mei, T.M., Liang, H.: A blind source separation based method for speech encryption. IEEE Trans. Circuits Syst. 53, 1320- 1328 (2006)
[7] S. Li, C. Li, K. T. Lo and G. Chen, "Cryptanalyzing an encryption scheme based on blind source separation," IEEE Trans. Circuits Syst. 55, 1055-1062 (2008).
[8] B. Schneier, Applied Cryptography: Protocols, Alorithms and Source Code in C. Wiley Computer Publishing, John Wiley and Sons, Inc, 1996.
[9] C. Jutten and J. Herault, "Blind separation of sources, Part 1: an adaptive algorithm based on neuromimetic architecture," Signal Processing, Vol. 24, pp. 1-10, 1991
[10] T. W. Lee, A. J. Bell, and R. H. Lambert, " Blind separation of delayed and convolved sources," Adv. Neural Inf. Process. Syst., vol. 9, pp. 758-764, 1996.
[11] Chen HK, Lee CI. Anti-control of chaos in rigid body motion. Chaos, Solitons & Fractals 2004;21:957-65.
[12] .F. Cardoso and A. Souloumiac, "Blind beamforming for non-Gaussian signals," IEE Proceedings F, Vol. 140, pp. 771-774, 1993.