Speech scrambling aims to distort speech signals to prevent unauthorized listeners from understanding them, but conventional techniques are vulnerable to attacks. Therefore, more robust and secure speech scrambling algorithms are needed to ensure sensitive communication security. A proposed scheme uses a particle swarm optimization algorithm to generate a random key and optimize the level of noise in the scrambled signal, along with two transformations Multiwavelet and Arnold techniques to improve complexity and security. The proposed algorithm has been evaluated using various performance measurements and has demonstrated superior encryption performance than other similar audio encryption schemes with key space equal to 128 × 2.718. Further research and development in speech scrambling are essential to guarantee secure communication in sensitive contexts such as military and intelligence.
A. M. Raheema, S. B. Sadkhan, and S. M. A. Satar, “Performance enhancement of speech scrambling techniques based on many chaotic signals,” in 2020 International Conference on Computer Science and Software Engineering, Duhok, Iraq, April 16–18, 2020, pp. 308–313.
Y. Du and R. Li, “Application of compound chaotic mapping in voice encryption algorithm,” Int. J. Comput. Sci. Netw. Security, vol. 14, no. 8, pp. 44–48, 2014.
J. B. Lima and E. F.da. Silva Neto, “Audio encryption based on the cosine number transform,” Multimedia Tools Appl., vol. 75, pp. 8403–8418, 2016.
F. J. Farsana and K. Gopakumar, “A novel approach for speech encryption: Zaslavsky map as pseudo random number generator,” Proced. Comput. Sci., vol. 93, pp. 816–823, 2016.
A. Belmeguenai, Z. Ahmida, S. Ouchtati, and R. Djemii, “A novel approach based on stream cipher for selective speech encryption,” Int. J. Speech Technol., vol. 20, pp. 685–698, 2017.
A. Ghasemzadeh and E. Esmaeili, “A novel method in audio message encryption based on a mixture of chaos function,” Int. J. Speech Technol., vol. 20, pp. 829–837, 2017.
K. Kordov, “A novel audio encryption algorithm with permutation-substitution architecture,” Electronics, vol. 8, no. 5, 2019, Paper no. 530.
P. K. Naskar, S. Paul, D. Nandy, and A. Chaudhuri, “DNA encoding and channel shuffling for secured encryption of audio data,” Multimedia Tools Appl., vol. 78, pp. 25019–25042, 2019.
Y. Zhu, C. Wang, J. Sun, and F. Yu, “A chaotic image encryption method based on the artificial fish swarms algorithm and the DNA coding,” Mathematics, vol. 11, no. 3, 2023, Paper no. p. 767.
S. B. Hebbale, V. S. G. Akula, and P. Baraki, “Tuna swarm optimization with 3D-chaotic map and DNA encoding for image encryption with lossless image compression based on FPGA,” Int. J. Electr. Comput. Eng. Syst., vol. 14, no. 1, pp. 59–72, 2023.
Z. A. Hasan, S. M. Hadi, and W. A. Mahmoud, “Time domain speech scrambler based on particle swarm optimization,” Pollack Period., vol. 18, no. 1, pp. 161–166, 2023.
M. M. Laftah, “Image denoising using multiwavelet transform with different filters and rules,” Int. J. Interact. Mobile Tech., vol. 15, no. 15, pp. 140–151, 2021.
G. K. Soni, H. Arora, and B. Jain, “A novel image encryption technique using Arnold transform and asymmetric RSA algorithm,” in International Conference on Artificial Intelligence: Advances and Applications ,2019, Springer Singapore, 2020, pp. 83–90.
T. M. Shami, A. A. El-Saleh, M. Alswaitti, Q. Al-Tashi, M. A. Summakieh, and S. Mirjalili, “Particle swarm optimization: A comprehensive survey,” IEEE Access, vol. 10, pp. 10031–10061, 2022.
L. Kota and K. Jármai, “Improving optimization using adaptive algorithms,” Pollack Period., vol. 16, no. 1, pp. 14–18, 2021.
S. Q. Salih, A. A. Alsewari, and Z. M. Yaseen, “Pressure vessel design simulation: Implementing of multi-swarm particle swarm optimization,” in Proceedings of the 2019 8th International Conference on Software and Computer Applications, Penang, Malaysia, February 19–21, 2019, pp. 120–124.
J. S. Garofolo, L. F. Lamel, W. M. Fisher, J. G. Fiscus, D. S. Pallett, N. L. Dahlgren, and V. Zue, “TIMIT acoustic-phonetic continuous speech corpus,” Report no. LDC93S1, Philadelphia: Linguistic Data Consortium, 1993.
P. Sathiyamurthi and S. Ramakrishnan, “Speech encryption using chaotic shift keying for secured speech communication,” EURASIP J. Audio, Speech, Music Process., vol. 2017, 2017, Paper no. 20.
A. Akgül, S. Kaçar, and İ. Pehlivan, “An audio data encryption with single and double dimension discrete-time chaotic systems,” Turkish Online J. Sci. Technol., vol. 5, no. 3, pp. 14–23, 2015.
H. Liu, A. Kadir, and Y. Li, “Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys,” Optik, vol. 127, no. 19, pp. 7431–7438, 2016.
H. K. Zghair, S. A. Mehdi, and S. B. Sadkhan, “Speech scrambler based on discrete cosine transform and novel seven-dimension hyper chaotic system,” J. Phys. Conf. Ser., vol. 1804, 2021, Paper no. 012048.
N. A. Abbas and S. B. Sadkhan, “A proposed voice encryption system based on off-line ICA algorithm,” J. Babylon University/Pure Appl. Sci., vol. 22, no. 7, pp. 1917–1923, 2014.