Applying and Comparison of Chaotic-Based Permutation Algorithms for Audio Encryption
نویسندگان
چکیده
This research presents, and clarifies the application of two permutation algorithms, based on chaotic map systems, applied to a file speech signals. They are Arnold cat map-based algorithm, Baker’s algorithm. Both algorithms implemented same signal sample. Then, both premier encrypted histograms documented plotted. The amplitude values with time signals original recorded plotted against decrypted files. Furthermore, is file, using spectrogram frequencies duration. These used shuffle positions files signals’ without any changes, produce an file. A comparative analysis introduced by some sundry statistical experimental analyses for procedures encryption decryption, e.g., procedures, audio histogram, correlation coefficient between specimens in signals, test Spectral Distortion (SD), Log-Likelihood Ratio (LLR) measures. outcomes different studies demonstrate that (Baker Arnold) sufficient providing efficient reliable voice solution. However, Arnold’s algorithm gives better results most cases as compared
منابع مشابه
A stack-based chaotic algorithm for encryption of colored images
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...
متن کاملaudio signal encryption based on permutation relations and residue number system
this paper presents a new audio encryption algorithm based on permutation and residue number system. in the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. then, the audio signal is combined with the noise, generated by the algorithm, to produce a silence signal. for this purpose, the algorithm uses a predef...
متن کاملChaotic algorithms for data encryption
A system of encryption based on chaotic algorithms is described. The system is used for encrypting text and image files for the purpose of creating secure data bases and for sending secure email messages. The system is also implemented on an FPGA for real-time applications. Levels of security several orders of magnitude better than published systems have been achieved.
متن کاملCracking a hierarchical chaotic image encryption algorithm based on permutation
In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M×N with T possible value levels into K blocks of the same size and then operates position permutation on two levels: intra-block and inter-block. As a typical position permutation-only encryption algorithm, it has received intensive attention. The present paper an...
متن کاملA New Method for Encryption of Color Images based on Combination of Chaotic Systems
This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2021
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2021.015175