{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T19:34:42Z","timestamp":1776195282699,"version":"3.50.1"},"reference-count":34,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T00:00:00Z","timestamp":1640217600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008526","name":"Xinjiang University of Finance and Economics","doi-asserted-by":"publisher","award":["2019XTD002"],"award-info":[{"award-number":["2019XTD002"]}],"id":[{"id":"10.13039\/501100008526","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Xinjiang Uygur Autonomous Region Natural Science Fund","award":["2017D01A24"],"award-info":[{"award-number":["2017D01A24"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The data space for audio signals is large, the correlation is strong, and the traditional encryption algorithm cannot meet the needs of efficiency and safety. To solve this problem, an audio encryption algorithm based on Chen memristor chaotic system is proposed. The core idea of the algorithm is to encrypt the audio signal into the color image information. Most of the traditional audio encryption algorithms are transmitted in the form of noise, which makes it easy to attract the attention of attackers. In this paper, a special encryption method is used to obtain higher security. Firstly, the Fast Walsh\u2013Hadamar Transform (FWHT) is used to compress and denoise the signal. Different from the Fast Fourier Transform (FFT) and the Discrete Cosine Transform (DCT), FWHT has good energy compression characteristics. In addition, compared with that of the triangular basis function of the Fast Fourier Transform, the rectangular basis function of the FWHT can be more effectively implemented in the digital circuit to transform the reconstructed dual-channel audio signal into the R and B layers of the digital image matrix, respectively. Furthermore, a new Chen memristor chaotic system solves the periodic window problems, such as the limited chaos range and nonuniform distribution. It can generate a mask block with high complexity and fill it into the G layer of the color image matrix to obtain a color audio image. In the next place, combining plaintext information with color audio images, interactive channel shuffling can not only weaken the correlation between adjacent samples, but also effectively resist selective plaintext attacks. Finally, the cryptographic block is used for overlapping diffusion encryption to fill the silence period of the speech signal, so as to obtain the ciphertext audio. Experimental results and comparative analysis show that the algorithm is suitable for different types of audio signals, and can resist many common cryptographic analysis attacks. Compared with that of similar audio encryption algorithms, the security index of the algorithm is better, and the efficiency of the algorithm is greatly improved.<\/jats:p>","DOI":"10.3390\/sym14010017","type":"journal-article","created":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T21:40:21Z","timestamp":1640295621000},"page":"17","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":76,"title":["Audio Encryption Algorithm Based on Chen Memristor Chaotic System"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4267-0745","authenticated-orcid":false,"given":"Wanying","family":"Dai","sequence":"first","affiliation":[{"name":"School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin 541004, China"},{"name":"School of Data and Statistical Sciences, Xinjiang University of Finance and Economics, Urumqi 830012, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7675-113X","authenticated-orcid":false,"given":"Xiangliang","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin 541004, China"},{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5819-8289","authenticated-orcid":false,"given":"Xiaoming","family":"Song","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin 541004, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1275-2982","authenticated-orcid":false,"given":"Guodong","family":"Li","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin 541004, China"},{"name":"Guangxi Colleges and Universities Key Laboratory of Data Analysis and Computation, Guilin University of Electronic Technology, Guilin 541004, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,12,23]]},"reference":[{"key":"ref_1","first-page":"1","article-title":"Audio Steganography with AES for Real-Time Covert Voice over Internet Protocol Communications","volume":"57","author":"Tang","year":"2014","journal-title":"Sci. China Inf. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"26073","DOI":"10.1007\/s11042-019-07766-z","article-title":"An Image Encryption Method Based on Selective AES Coding of Wavelet Transform and Chaotic Pixel Shuffling","volume":"78","author":"Shakir","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_3","first-page":"333","article-title":"Performance Analysis of DES Algorithm and RSA Algorithm with Audio Steganography","volume":"Volume 137","author":"Iyer","year":"2017","journal-title":"Proceedings of the International Conference on Communication and Signal Processing 2016 (iccasp 2016)"},{"key":"ref_4","first-page":"012010","article-title":"Image Steganography In Securing Sound File Using Arithmetic Coding Algorithm, Triple Data Encryption Standard (3DES) and Modified Least Significant Bit (MLSB)","volume":"Volume 1007","author":"Nasution","year":"2018","journal-title":"Proceedings of the International Conference on Mechanical, Electronics, Computer, and Industrial Technology"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"6135","DOI":"10.1007\/s11042-019-08282-w","article-title":"Image Encryption Algorithm Using S-Box and Dynamic Henon Bit Level Permutation","volume":"79","author":"Idrees","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Zhu, S., Wang, G., and Zhu, C. (2019). A Secure and Fast Image Encryption Scheme Based on Double Chaotic S-Boxes. Entropy, 21.","DOI":"10.3390\/e21080790"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Singh, A., Agarwal, P., and Chand, M. (2019, January 25\u201326). Image Encryption and Analysis Using Dynamic AES. Proceedings of the 2019 5th International Conference on Optimization and Applications (ICOA), Kenitra, Morocco.","DOI":"10.1109\/ICOA.2019.8727711"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"6663","DOI":"10.1007\/s11227-019-02878-7","article-title":"An Image Encryption Method Based on Chaos System and AES Algorithm","volume":"75","author":"Arab","year":"2019","journal-title":"J. Supercomput."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"69894","DOI":"10.1109\/ACCESS.2020.2987197","article-title":"Audio Encryption Scheme Using Self-Adaptive Bit Scrambling and Two Multi Chaotic-Based Dynamic DNA Computations","volume":"8","author":"Abdelfatah","year":"2020","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s00530-019-00640-w","article-title":"Digital Audio Signals Encryption by Mobius Transformation and Henon Map","volume":"26","author":"Shah","year":"2020","journal-title":"Multimedia Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"166307","DOI":"10.1016\/j.ijleo.2021.166307","article-title":"A Dynamic Block Image Encryption Using Variable-Length Secret Key and Modified Henon Map","volume":"230","author":"Zhao","year":"2021","journal-title":"Optik"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Farsana, F.J., Devi, V.R., and Gopakumar, K. (2020). An Audio Encryption Scheme Based on Fast Walsh Hadamard Transform and Mixed Chaotic Keystreams. Appl. Comput. Informatics, ahead-of-print.","DOI":"10.1016\/j.aci.2019.10.001"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"25019","DOI":"10.1007\/s11042-019-7696-z","article-title":"DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data","volume":"78","author":"Naskar","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"25635","DOI":"10.1007\/s11042-020-09233-6","article-title":"Breaking a Chaotic Image Encryption Algorithm","volume":"79","author":"Noshadian","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"110502","DOI":"10.7498\/aps.67.20180025","article-title":"Memristor-based multi-scroll chaotic system and its pulse synchronization control","volume":"67","year":"2018","journal-title":"Acta Phys. Sin."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"070504","DOI":"10.1088\/0256-307X\/27\/7\/070504","article-title":"Initial State Dependent Dynamical Behaviors in a Memristor Based Chaotic Circuit","volume":"27","author":"Zhong","year":"2010","journal-title":"Chin. Phys. Lett."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2859","DOI":"10.1007\/s11071-020-05601-x","article-title":"A Novel Simple Chaotic Circuit Based on Memristor-Memcapacitor","volume":"100","author":"Ma","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"110504","DOI":"10.1088\/1674-1056\/abbbfe","article-title":"Memristor-Based Hyper-Chaotic Circuit for Image Encryption","volume":"29","author":"Chen","year":"2020","journal-title":"Chin. Phys. B"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.1007\/s11071-017-3752-2","article-title":"Multistability Analysis, Circuit Implementations and Application in Image Encryption of a Novel Memristive Chaotic Circuit","volume":"90","author":"Peng","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"110686","DOI":"10.1016\/j.chaos.2021.110686","article-title":"A Novel Fractional Nonautonomous Chaotic Circuit Model and Its Application to Image Encryption","volume":"144","author":"Kamal","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"111306","DOI":"10.1016\/j.chaos.2021.111306","article-title":"A Simple Fractional-Order Chaotic System Based on Memristor and Memcapacitor and Its Synchronization Application","volume":"152","author":"Akgul","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"110773","DOI":"10.1016\/j.chaos.2021.110773","article-title":"Chaotic Attractors Generated by a Memristor-Based Chaotic System and Julia Fractal","volume":"146","author":"Yan","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Xu, X., Li, G., and Dai, W. (2021). Multi-direction Chain and Grid Chaotic System based on Julia Fractal. Fractals.","DOI":"10.1142\/S0218348X21502455"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1250205","DOI":"10.1142\/S0218127412502057","article-title":"Memristor Model and Its Application for Chaos Generation","volume":"22","author":"Wang","year":"2012","journal-title":"Int. J. Bifurcation Chaos"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1142\/S0218127499001024","article-title":"Yet Another Chaotic Attractor","volume":"9","author":"Chen","year":"1999","journal-title":"Int. J. Bifurcation Chaos"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2338","DOI":"10.1103\/PhysRevA.14.2338","article-title":"Kolmogorov Entropy and Numerical Experiments","volume":"14","author":"Benettin","year":"1976","journal-title":"Phys. Rev. A"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"090501","DOI":"10.1088\/0256-307X\/30\/9\/090501","article-title":"Multi-Scale Permutation Entropy: A Complexity Measure for Discriminating Two-Phase Flow Dynamics","volume":"30","year":"2013","journal-title":"Chin. Phys. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1007\/s10772-017-9452-y","article-title":"A Novel Method in Audio Message Encryption Based on a Mixture of Chaos Function","volume":"20","author":"Ghasemzadeh","year":"2017","journal-title":"Int. J. Speech Technol."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"18043","DOI":"10.1007\/s11042-020-10288-8","article-title":"A Novel Audio Encryption Approach via Finite-Time Synchronization of Fractional Order Hyperchaotic System","volume":"80","author":"Babu","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Kordov, K. (2019). A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture. Electronics, 8.","DOI":"10.3390\/electronics8050530"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1504\/IJASS.2018.091847","article-title":"Audio Encryption\u2014A Chaos-Based Data Byte Scrambling Technique","volume":"8","author":"Parvees","year":"2018","journal-title":"Int. J. Appl. Syst. Stud."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"9260","DOI":"10.1109\/ACCESS.2019.2963329","article-title":"An Audio Encryption Algorithm Based on DNA Coding and Chaotic System","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"23995","DOI":"10.1007\/s11042-020-09200-1","article-title":"Video Encryption Based on Hyperchaotic System","volume":"79","author":"Li","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2019","DOI":"10.1007\/s11071-020-06164-7","article-title":"An Audio Encryption Based on Distinct Key Blocks along with PWLCM and ECA","volume":"103","author":"Naskar","year":"2021","journal-title":"Nonlinear Dyn."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/1\/17\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:52:24Z","timestamp":1760169144000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/1\/17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,23]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,1]]}},"alternative-id":["sym14010017"],"URL":"https:\/\/doi.org\/10.3390\/sym14010017","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,23]]}}}