• Home
  • Browse
    • Current Issue
    • By Issue
    • By Author
    • By Subject
    • Author Index
    • Keyword Index
  • Journal Info
    • About Journal
    • Aims and Scope
    • Editorial and International Advisory Board
    • Editorial Staff
    • Publication Ethics
    • Indexing and Abstracting
    • Related Links
    • FAQ
    • Peer Review Process
    • News
  • Guide for Authors
  • Submit Manuscript
  • Reviewers
  • Contact Us
 
  • Login
  • Register
Home Articles List Article Information
  • Save Records
  • |
  • Printable Version
  • |
  • Recommend
  • |
  • How to cite Export to
    RIS EndNote BibTeX APA MLA Harvard Vancouver
  • |
  • Share Share
    CiteULike Mendeley Facebook Google LinkedIn Twitter Telegram
The ISC International Journal of Information Security
Articles in Press
Current Issue
Journal Archive
Volume Volume 10 (2018)
Volume Volume 9 (2017)
Issue Issue 2
Issue Issue 1
Volume Volume 8 (2016)
Volume Volume 7 (2015)
Volume Volume 6 (2014)
Volume Volume 5 (2013)
Volume Volume 4 (2012)
Volume Volume 3 (2011)
Volume Volume 2 (2010)
Volume Volume 1 (2009)
Ghasemzadeh, H., Tajik Khasss, M., Mehrara, H. (2017). Cipher text only attack on speech time scrambling systems using correction of audio spectrogram. The ISC International Journal of Information Security, 9(2), 33-47.
H. Ghasemzadeh; M. Tajik Khasss; H. Mehrara. "Cipher text only attack on speech time scrambling systems using correction of audio spectrogram". The ISC International Journal of Information Security, 9, 2, 2017, 33-47.
Ghasemzadeh, H., Tajik Khasss, M., Mehrara, H. (2017). 'Cipher text only attack on speech time scrambling systems using correction of audio spectrogram', The ISC International Journal of Information Security, 9(2), pp. 33-47.
Ghasemzadeh, H., Tajik Khasss, M., Mehrara, H. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram. The ISC International Journal of Information Security, 2017; 9(2): 33-47.

Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

Article 5, Volume 9, Issue 2, Summer and Autumn 2017, Page 33-47  XML PDF (3137 K)
Document Type: ORIGINAL RESEARCH PAPER
Authors
H. Ghasemzadeh* ; M. Tajik Khasss; H. Mehrara
Abstract
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities of speech are extracted in time and frequency using short time Fourier transform. We show that spectrograms of cipher-texts are in fact scrambled puzzles. Then, different techniques including estimation, image processing, and graph theory are fused together in order to create and solve these puzzles. Conducted tests show that the proposed method achieves accuracy of 87.8% and intelligibility of 92.9%. These scores are 50.9% and 34.6%, respectively, higher than scores of previous method. Finally a novel method, based on moving spectrogram distance, is proposed that can give accurate estimation of segment length of the scrambler system.
Keywords
cryptanalysis; Cipher text only attack; Audio scrambling system; Multimedia encryption systems; Jigsaw puzzle; Spectrogram
Statistics
Article View: 5,397
PDF Download: 8,150
Home | Glossary | News | Aims and Scope | Sitemap
Top Top

The ISC International Journal of Information Security is licensed under a
"Creative Commons Attribution 4.0 International (CC-BY 4.0)"

Live stats by GoStats.  Real Time Web Analytics

Journal Management System. Designed by sinaweb.