Reproducible Audio Chaotic Masking With a Chua-Type Oscillator and Key-Sensitivity Analysis
Online First: 12/05/2026
Corressponding author's email:
duchung.pham@utehy.edu.vnDOI:
https://doi.org/10.54644/jte.2026.2108Keywords:
Chaotic masking, Audio encryption, Chua-type oscillator, Key sensitivity, Numerical integration (ode45)Abstract
This paper presents a reproducible software-based demonstration of audio chaotic masking using a Chua-type chaotic oscillator. A discrete chaotic keystream is generated by numerically integrating a nonlinear ordinary differential equation with the ode45 solver, using sample-aligned short-interval integration. The recorded audio signal is encrypted through linear additive masking with a scaled chaotic state sequence and recovered by subtracting an identically regenerated sequence using the same system parameters and initial conditions. The study emphasizes the sensitivity of decryption accuracy to key mismatch, where even slight perturbations of the initial condition lead to significant reconstruction degradation. Quantitative evaluation metrics including normalized RMSE, reconstruction SNR, and correlation coefficient are employed to assess masking effectiveness and recovery fidelity. The proposed implementation serves as a transparent and replicable educational baseline for chaos-based communication research, while also highlighting the inherent security limitations of simple additive chaotic masking schemes.
Downloads: 0
References
N. Ali-Pacha, N. Hadj-Said, A. M’Hamed, and A. Belghoraf, “Lorenz’s attractor applied to the stream cipher (Ali-Pacha generator),” Chaos, Solitons & Fractals, vol. 33, no. 5, pp. 1762–1766, 2007. DOI: https://doi.org/10.1016/j.chaos.2006.03.009
A. Abel and W. Schwarz, “Chaos communications—principles, schemes and systems,” Proc. IEEE, vol. 90, no. 5, pp. 691–710, 2002. DOI: https://doi.org/10.1109/JPROC.2002.1015002
D. Zhang, Q. Wang, G. Feng, Y. Shi, and A. V. Vasilakos, “A survey on attack detection, estimation and control of industrial cyber-physical systems,” ISA Trans., vol. 116, pp. 1–16, 2021. DOI: https://doi.org/10.1016/j.isatra.2021.01.036
J. P. Farwell and R. Rohozinski, “Stuxnet and the future of cyber war,” Survival, vol. 53, no. 1, pp. 23–40, 2011. DOI: https://doi.org/10.1080/00396338.2011.555586
S. Bendoukha, S. Abdelmalek, and A. Ouannas, “Secure communication systems based on the synchronization of chaotic systems,” in Mathematics Applied to Engineering, Modelling, and Social Issues, Springer, pp. 281–311, 2019 DOI: https://doi.org/10.1007/978-3-030-12232-4_9
C. M. Lin, D. H. Pham, and T. T. Huynh, "Synchronization of Chaotic System Using a Brain-Imitated Neural Network Controller and Its Applications for Secure Communications," in IEEE Access, vol. 9, pp. 75923-75944, 2021 DOI: https://doi.org/10.1109/ACCESS.2021.3080696
C. M. Lin, D. H. Pham, and T. T. Huynh, "Encryption and Decryption of Audio Signal and Image Secure Communications Using Chaotic System Synchronization Control by TSK Fuzzy Brain Emotional Learning Controllers," in IEEE Transactions on Cybernetics, vol. 52, no. 12, pp. 13684-13698, Dec. 2022 DOI: https://doi.org/10.1109/TCYB.2021.3134245
T. Bonny and W. A. Nassan, “Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization,” Multimedia Tools and Applications, vol. 82, pp. 34229–34258, 2023, doi: 10.1007/s11042-023-14643-3. DOI: https://doi.org/10.1007/s11042-023-14643-3
Q. D. Nguyen, V. N. Giap, D. H. Pham, and S. C. Huang, "Fast Speed Convergent Stability of T-S Fuzzy Sliding-Mode Control and Disturbance Observer for a Secure Communication of Chaos-Based System," in IEEE Access, vol. 10, pp. 95781-95790, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3205027
D. H. Pham, T. T. Huynh, and C. M. Lin, “Secure transmission of medical image using a wavelet interval type-2 TSK fuzzy brain-imitated neural network,” Soft Computing, vol. 29, pp. 2311–2329, 2025. DOI: https://doi.org/10.1007/s00500-025-10449-7
K. Cho and T. Miyano, “Chaotic cryptography using augmented Lorenz equations aided by quantum key distribution,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 62, no. 2, pp. 478–487, 2015, doi: 10.1109/TCSI.2014.2365767. DOI: https://doi.org/10.1109/TCSI.2014.2365767
X. Wu, K. Hu, S. He, H. Wang, and Z. Zhang, “A fractional-order Chua’s system: System model, numerical simulations, hidden dynamics, DSP implementation and voice encryption application,” AEU - International Journal of Electronics and Communications, vol. 192, art. no. 155691, 2025, doi: 10.1016/j.aeue.2025.155691. DOI: https://doi.org/10.1016/j.aeue.2025.155691
P. Ketthong, W. San-Um, B. Srisuchinwong, and M. Tachibana, “A simple current-reversible chaotic jerk circuit using inherent tanh(x) of an op-amp,” IEICE Electron. Express, vol. 14, no. 17, pp. 1–7, 2017. DOI: https://doi.org/10.1587/elex.14.20170192
S. N. Lagmiri, N. Elalami, and J. Elalami, “New Eight Dimensional Hyperchaotic Cryptosystem,” International Journal of Computer Applications, vol. 7, no. 5, pp. 19–24, Sep.–Oct. 2017, doi: 10.26808/rs.ca.i7v5.03. DOI: https://doi.org/10.26808/rs.ca.i7v5.03
M. Elkholy, H. M. El Hennawy, and A. Elkouny, “Real-time implementation of secure communication system based on synchronization of hyperchaotic systems,” in Proc. 33rd Nat. Radio Sci. Conf. (NRSC), Aswan, Egypt, 2016, doi: 10.1109/NRSC.2016.7450849. DOI: https://doi.org/10.1109/NRSC.2016.7450849
A. Almali and D. Ikici, “The simulation of sound signal masking with different chaotic oscillations and its circuit application,” Turk. J. Electr. Eng. Comput. Sci., vol. 24, pp. 4284–4293, 2016. DOI: https://doi.org/10.3906/elk-1504-264
Y. Cao and H. Liu, “An audio encryption algorithm based on a non-degenerate 2D integer domain hyper chaotic map over GF(2n),” Multimedia Tools and Applications, vol. 83, pp. 79377–79396, 2024. DOI: https://doi.org/10.1007/s11042-024-18746-3
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2026 Journal of Technical Education Science

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright © JTE.


