Chaotic elliptic map for speech encryption
نویسندگان
چکیده
Using a new key management system and Jacobian elliptic map, speech encryption scheme has been developed for secure communication data. map-based as novel method to improve the existing methods' drawbacks, such poor quality in decrypted signals, residual intelligibility, high computational complexity, low-key space. map solution, cryptosystem was created. The proposed scheme's performance is evaluated using spectrogram analysis, histogram space correlation sensitivity analysis randomness test analysis. results, we can conclude that provides better security with robust decryption quality.
منابع مشابه
Chaotic Map based Block Encryption
Number of cryptosystems based on chaos has been proposed, in recent years. Tao Xiang , Kwok-wo Wong, Xiaofeng Liao in 2008 proposed an improved scheme by using a symmetric key block cipher algorithm in which one-dimensional chaotic maps are used, in order to obtain chaotic sequences with better cryptographic feature. In this system, an encryption /decryption scheme was proposed, a cryptographic...
متن کاملEncryption of Image Using Chaotic Map
The advent of internet has paved the way for transmitting more and more information over the internet in a very less time and multimedia technology is also not untouched with it. Audio, images & other multimedia are being transmitted over the internet. The traditional encryption schemes appear not to be ideal for image applications, due to some intrinsic features of images such as bulk data cap...
متن کاملSpeech encryption using chaotic shift keying for secured speech communication
This paper throws light on chaotic shift keying-based speech encryption and decryption method. In this method, the input speech signals are sampled and its values are segmented into four levels, namely L0, L1, L2, and L3. Each level of sampled values is permuted using four chaotic generators such as logistic map, tent map, quadratic map, and Bernoulli’s map. A chaotic shift keying mechanism ass...
متن کاملImage encryption using chaotic logistic map
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this communication,wepropose a newapproach for image encryption basedon chaotic logisticmaps in order tomeet the requirements of the secure image transfer. In the proposed image encryption scheme, an external secret key of 80-bit and two chaotic ...
متن کاملChaotic Encryption Scheme Using 1-D Chaotic Map
This paper proposes three different chaotic encryption methods using 1-D chaotic map known as Logistic map named as Logistic, NLFSR and Modified NLFSR according to the name of chaotic map and non-linear function involved in the scheme. The designed schemes have been crypt analyzed for five different methods for testing its strength. Cryptanalysis has been performed for various texts using vario...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2022
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v25.i2.pp1103-1114