AUDIO ENCRYPTION ALGORITHM USING HYPERCHAOTIC SYSTEMS OF DIFFERENT DIMENSIONS

@inproceedings{Lagmiri2018AUDIOEA,
  title={AUDIO ENCRYPTION ALGORITHM USING HYPERCHAOTIC SYSTEMS OF DIFFERENT DIMENSIONS},
  author={S. N. Lagmiri and H. Bakhous},
  year={2018}
}
Data security has become an important concern for communication through an insecure channel because the information transferred across the networks has a large chance of unauthorized access. The available encryption algorithms that are primarily used for text data may not be suitable for multimedia data such as sound. Hyperchaotic systems are generally proposed as a solution to multimedia encryption, because of their random properties and the high sensitivity of initial conditions and system… 

Encryption & Decryption Audio Communications in Mobile Networks based on a New Hyperchaotic System

The experimental results on audio data encryption / decryption over open networks, key sensitivity tests, and statistical analysis show that the proposed cryptosystem have excellent encryption performance, high sensitivity to the security keys and can be applied for secure real time encryption.

Transmission and Decryption of the Audio Signal Masked with ECG by FDM Method

These analyses showed that the ECG encoding method has faster unit change, reduces synchronization time, minimizes losses and improves the security of the masked signal compared to other methods sent from two channels.

References

SHOWING 1-10 OF 26 REFERENCES

Hyperchaos for improving the security of medical data

This paper proposes an efficient encryption scheme for medical data using a new hyperchaotic system applied with two algorithms: the first based on random key generation from initial conditions to encrypt a brain MRI and the second algorithm using chaotic masking technique to encrypt the heartbeat signal.

Color Image Encryption Based on Hyper-Chaos

The experimental results demonstrate that the proposed improved logistic map has advantages of large key space and high security, and moreover, it is sensitive to the secret keys and can resist against noise and cutting attack.

AN IMPROVED COLOR IMAGE ENCRYPTION ALGORITHM WITH PIXEL PERMUTATION AND BIT SUBSTITUTION

This paper is an implementation of a color image encrypt ion algorithm based on Rubik’s cube technique that can be used to identify the rep lay attack.

Encryption key distribution via chaos synchronization

A novel encryption scheme, wherein an encryption key is generated by two distant complex nonlinear units, forced into synchronization by a chaotic driver, and the obtained bit series fulfill the randomness conditions as defined by the National Institute of Standards test suite.

Cryptography based on delayed chaotic neural networks

Hardware based realtime, fast and highly secured speech communication using FPGA

  • H. M. Dipu KabirS. Alam
  • Computer Science
    2010 IEEE International Conference on Information Theory and Information Security
  • 2010
This paper presents a FPGA (Field Programmable Gate Array) based secured speech signal communication system. The system consists of compression, encryption and water- marking. Watermark provides

3D Extensions of Some 2D Chaotic Maps and Their Usage in Data Encryption

A cryptosystem combining 3D chaotic map with spreading function is proposed and the experiment results show that the algorithm is security against known-plaintext attacks, suitable for multimedia encryption which is of real-time requirement.

A new speech hiding scheme based upon subband coding

A speech hiding technique that protects the speech signal from the peeping of illegal users and embeds the secret speech into another speech called the cover speech and generates the stego speech, which is meaningful and has good compression effect.

Baptista-type chaotic cryptosystems: problems and countermeasures

Chaotic Electronic Circuits in Cryptography

This paper focuses on chaotic electronic circuits, which represent deterministic systems which can be used as random number generators in cryptography and total inversion of the encryption and decryption sides can only be achieved by using digital chaotic circuits.