Chaotic elliptic map for speech encryption

نویسندگان

چکیده

Using a new key management system and Jacobian elliptic map, speech encryption scheme has been developed for secure communication data. map-based as novel method to improve the existing methods' drawbacks, such poor quality in decrypted signals, residual intelligibility, high computational complexity, low-key space. map solution, cryptosystem was created. The proposed scheme's performance is evaluated using spectrogram analysis, histogram space correlation sensitivity analysis randomness test analysis. results, we can conclude that provides better security with robust decryption quality.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chaotic Map based Block Encryption

Number of cryptosystems based on chaos has been proposed, in recent years. Tao Xiang , Kwok-wo Wong, Xiaofeng Liao in 2008 proposed an improved scheme by using a symmetric key block cipher algorithm in which one-dimensional chaotic maps are used, in order to obtain chaotic sequences with better cryptographic feature. In this system, an encryption /decryption scheme was proposed, a cryptographic...

متن کامل

Encryption of Image Using Chaotic Map

The advent of internet has paved the way for transmitting more and more information over the internet in a very less time and multimedia technology is also not untouched with it. Audio, images & other multimedia are being transmitted over the internet. The traditional encryption schemes appear not to be ideal for image applications, due to some intrinsic features of images such as bulk data cap...

متن کامل

Speech encryption using chaotic shift keying for secured speech communication

This paper throws light on chaotic shift keying-based speech encryption and decryption method. In this method, the input speech signals are sampled and its values are segmented into four levels, namely L0, L1, L2, and L3. Each level of sampled values is permuted using four chaotic generators such as logistic map, tent map, quadratic map, and Bernoulli’s map. A chaotic shift keying mechanism ass...

متن کامل

Image encryption using chaotic logistic map

In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this communication,wepropose a newapproach for image encryption basedon chaotic logisticmaps in order tomeet the requirements of the secure image transfer. In the proposed image encryption scheme, an external secret key of 80-bit and two chaotic ...

متن کامل

Chaotic Encryption Scheme Using 1-D Chaotic Map

This paper proposes three different chaotic encryption methods using 1-D chaotic map known as Logistic map named as Logistic, NLFSR and Modified NLFSR according to the name of chaotic map and non-linear function involved in the scheme. The designed schemes have been crypt analyzed for five different methods for testing its strength. Cryptanalysis has been performed for various texts using vario...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2022

ISSN: ['2502-4752', '2502-4760']

DOI: https://doi.org/10.11591/ijeecs.v25.i2.pp1103-1114