AUDIO ENCRYPTION ALGORITHM USING HYPERCHAOTIC SYSTEMS OF DIFFERENT DIMENSIONS
@inproceedings{Lagmiri2018AUDIOEA, title={AUDIO ENCRYPTION ALGORITHM USING HYPERCHAOTIC SYSTEMS OF DIFFERENT DIMENSIONS}, author={S. N. Lagmiri and H. Bakhous}, year={2018} }
Data security has become an important concern for communication through an insecure channel because the information transferred across the networks has a large chance of unauthorized access. The available encryption algorithms that are primarily used for text data may not be suitable for multimedia data such as sound. Hyperchaotic systems are generally proposed as a solution to multimedia encryption, because of their random properties and the high sensitivity of initial conditions and system…
Figures and Tables from this paper
2 Citations
Transmission and Decryption of the Audio Signal Masked with ECG by FDM Method
- Computer ScienceIranian Journal of Science and Technology, Transactions of Electrical Engineering
- 2022
These analyses showed that the ECG encoding method has faster unit change, reduces synchronization time, minimizes losses and improves the security of the masked signal compared to other methods sent from two channels.
Encryption & Decryption Audio Communications in Mobile Networks based on a New Hyperchaotic System
- Computer Science
- 2018
The experimental results on audio data encryption / decryption over open networks, key sensitivity tests, and statistical analysis show that the proposed cryptosystem have excellent encryption performance, high sensitivity to the security keys and can be applied for secure real time encryption.
References
SHOWING 1-10 OF 26 REFERENCES
Hyperchaos for improving the security of medical data
- Computer ScienceInternational Journal of Engineering & Technology
- 2018
This paper proposes an efficient encryption scheme for medical data using a new hyperchaotic system applied with two algorithms: the first based on random key generation from initial conditions to encrypt a brain MRI and the second algorithm using chaotic masking technique to encrypt the heartbeat signal.
Color Image Encryption Based on Hyper-Chaos
- Computer Science2009 2nd International Congress on Image and Signal Processing
- 2009
The experimental results demonstrate that the proposed improved logistic map has advantages of large key space and high security, and moreover, it is sensitive to the secret keys and can resist against noise and cutting attack.
AN IMPROVED COLOR IMAGE ENCRYPTION ALGORITHM WITH PIXEL PERMUTATION AND BIT SUBSTITUTION
- Computer Science
- 2013
This paper is an implementation of a color image encrypt ion algorithm based on Rubik’s cube technique that can be used to identify the rep lay attack.
A MULTILEVEL SECURITY SCHEME USING CHAOS BASED ENCRYPTION AND STEGANOGRAPHY FOR SECURE AUDIO COMMUNICATION
- Computer Science
- 2013
The improvised proposed approach works against steg analysis and decreases the probability of secret audio being extracted by an iChaos based encryption is used to secure saudio in case the stegnography technique breaks.
Encryption key distribution via chaos synchronization
- Computer ScienceScientific reports
- 2017
A novel encryption scheme, wherein an encryption key is generated by two distant complex nonlinear units, forced into synchronization by a chaotic driver, and the obtained bit series fulfill the randomness conditions as defined by the National Institute of Standards test suite.
Hardware based realtime, fast and highly secured speech communication using FPGA
- Computer Science2010 IEEE International Conference on Information Theory and Information Security
- 2010
This paper presents a FPGA (Field Programmable Gate Array) based secured speech signal communication system. The system consists of compression, encryption and water- marking. Watermark provides…
3D Extensions of Some 2D Chaotic Maps and Their Usage in Data Encryption
- Computer Science2003 4th International Conference on Control and Automation Proceedings
- 2003
A cryptosystem combining 3D chaotic map with spreading function is proposed and the experiment results show that the algorithm is security against known-plaintext attacks, suitable for multimedia encryption which is of real-time requirement.
A new speech hiding scheme based upon subband coding
- Computer Science, PhysicsFourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint
- 2003
A speech hiding technique that protects the speech signal from the peeping of illegal users and embeds the secret speech into another speech called the cover speech and generates the stego speech, which is meaningful and has good compression effect.
Baptista-type chaotic cryptosystems: problems and countermeasures
- Computer Science, MathematicsPhysics Letters A
- 2004
Chaotic Electronic Circuits in Cryptography
- Computer Science, Physics
- 2012
This paper focuses on chaotic electronic circuits, which represent deterministic systems which can be used as random number generators in cryptography and total inversion of the encryption and decryption sides can only be achieved by using digital chaotic circuits.