Speech Encryption Technique Based on Bio-Chaotic Algorithm

نویسنده

  • Iman Qays Abduljaleel
چکیده

In today world of advancement, it is mandatory task to share, distribute and exchange the information like image, speech, text files throw public wired/wireless networks. Therefore, security gains more and more importance especially in those organizations where information is more critical and more important. Instead of using the traditional encryption techniques, Biometrics like speech uniquely identifies a person and a secure method for stream cipher, because Biometric characteristics are ever living and unstable in nature. In this paper wavelet packet transform used to decomposition each frame in the speech signal, then present anew algorithm used two steps: (1) addition of noise derived from three chaotic maps (Henon, Logistical, and Ikeda) to the decomposition signal. (2) Chosen bio-chaotic stream cipher which encrypted the speech signal to stored it into the databases to make it more secure by using a biometric key and a bio-chaotic function. In this paper present how to generate the bio-chaotic key by using any chosen frame (each frame is that of 256 sample long) to make it the security key. Chaotic function is used to make the algorithm more secure and make the process of the encryption and decryption more complex. Experimental result of the algorithm shows that the algorithm is faster, stronger and more secure. Use the matlab version of eighth in the different treatments stage.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

متن کامل

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

A New Method for Encryption of Color Images based on Combination of Chaotic Systems

This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...

متن کامل

An Efficient speech scrambling technique based on chaotic mapping and pseudorandom binary scrambling

To enhance the information security in network communications, this paper suggests a new speech scrambling algorithm based on random permutation, chaotic mapping and pseudo random binary scrambling.Firstly random permutation algorithm is used to shuffle the rows of the original speech followed by shuffling the rows using chaotic Bernoulli mapping. This produces an intermediary scrambled speech....

متن کامل

Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption

In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012