audio signal encryption based on permutation relations and residue number system

نویسندگان

fereshteh ghanbari adivi

m.sc. computer systems architecture, dezfoul branch, islamic azad university, dezfoul, iran mohammad mehrnia

m.sc. computer systems architecture, dezfoul branch, islamic azad university, dezfoul, iran

چکیده

this paper presents a new audio encryption algorithm based on permutation and residue number system. in the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. then, the audio signal is combined with the noise, generated by the algorithm, to produce a silence signal. for this purpose, the algorithm uses a predefined permutation format and a modular set in the form of {2n-1, 2n, 2n+1} to encrypt the main signal. consequently, the proposed algorithm converts the input signal into a silence signal and increases its security. the signal-to-noise ratio (snr) was used to evaluate the algorithm. the results indicated very low values of snr pertaining to audio signals in the proposed method.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Permutation-based encryption, authentication and authenticated encryption

While mainstream symmetric cryptography has been dominated by block ciphers, we have proposed an alternative based on fixed-width permutations with modes built on top of the sponge and duplex construction, and our concrete proposal K . Our permutationbased approach is scalable and suitable for high-end CPUs as well as resource-constrained platforms. The la er is illustrated by the small K insta...

متن کامل

A Smith-Waterman Algorithm Accelerator Based on Residue Number System

One of the biggest challenges confronting the bioinformatics community is fast and accurate sequence alignment. The Smith-Waterman algorithm (SWA) is one of the several algorithms used in addressing some of these challenges. Though very sensitive in doing sequence alignment, SWA is not used in real life applications due to the computational cost associated with the software implementation. Heur...

متن کامل

Permutation based Image Encryption Technique

Information security is the key in the era of electronic data exchange. Images constitute a large portion of the electronic data. Confidentiality of color images is a difficult process. Most of the image encryption algorithms are complex and compromise on the quality of the image. This paper proposes a new image encryption based on random pixel permutation with the motivation to maintain the qu...

متن کامل

Constant-Coefficient FIR Filters Based on Residue Number System Arithmetic

In this paper, the design of a Finite Impulse Response (FIR) filter based on the residue number system (RNS) is presented. We chose to implement it in the (RNS), because the RNS offers high speed and low power dissipation. This architecture is based on the single RNS multiplier-accumulator (MAC) unit. The three moduli set 1 {2 ,2 ,2 1} n n n + − , which avoids 2 1 n + modulus, is used to design...

متن کامل

Digital FIR Filter Architecture Based on the Residue Number System

In this paper, architecture of residue number system used in FIR filters, is presented. For many years residue number coding has been recognized as a system which provides capability for implementation of a high speed addition and multiplication. These advantages of residue number system coding for the high speed FIR filters design results from the fact that an digital FIR filter requires only ...

متن کامل

Efficient Signal Encryption using Chaos-based System

Signal encryption algorithm based on the Chaotic system has been increasingly used, but the drawbacks of small key space, less security in low dimensional chaotic crypto systems, simple chaotic and inconvenient for hardware implementation, are obvious. This paper presents a new signal encryption algorithm based on higher dimensional electronic chaos with the simple electronic system. The attack...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
journal of advances in computer research

جلد ۷، شماره ۳، صفحات ۶۷-۷۶

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023