Open Access
ARTICLE
Secure Audio Transmission Over Wireless Uncorrelated Rayleigh Fading Channel
1 Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif, 21944, Saudi Arabia
2 Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt
3 Department of Electrical Engineering, Faculty of Engineering, Menoufia University, Shebin El-Kom, 32511, Egypt
4 Department of Electronics Technology, Faculty of Technology and Education, Helwan University, Cairo, Egypt
* Corresponding Author: Osama S. Faragallah. Email:
Computers, Materials & Continua 2022, 70(1), 1603-1615. https://doi.org/10.32604/cmc.2022.019710
Received 23 April 2021; Accepted 08 June 2021; Issue published 07 September 2021
Abstract
Audio communications and computer networking play essential roles in our daily lives, including many domains with different scopes. Developments in these technologies are quick. In consequence, there is a dire need to secure these technologies up to date. This paper presents an efficient model for secure audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel. Also, the performance of the utilized multiple secret keys-based audio cryptosystem is analyzed in different transformation domains. The discrete cosine transform (DCT), the discrete sine transform (DST), and the discrete wavelet transform (DWT) are investigated in the utilized multiple secret key-based audio cryptosystem. Simulation results show consistent results with the wireless noisy channel. The performance of the proposed multiple secret keys-based audio cryptosystem can be ranked concerning the employed domain as DWT, DCT, and DST transform techniques. The simulation experiments proved that the presented multiple secret keys-based audio cryptosystem for audio signals transmitted over the wireless noisy uncorrelated Rayleigh fading channel achieves reliable and secure wireless link utilizing combined multi security layers.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.