نتایج جستجو برای: audio scrambling system
تعداد نتایج: 2278870 فیلتر نتایج به سال:
ABSTEACT Digital watermarking is the process that imperceptibly watermarks the multimedia product with a specific watermark for the purpose of content authentication, data monitoring and tracking, and copyright protection. Amongst the applications, the most prominent usage of watermarking technique is helping in identifying the origins of different multimedia files and resolving ownership dispu...
Sudoku puzzles are now popular among people in many countries across the world with simple constraints that no repeated digits in each row, each column, or each block. In this paper, we demonstrate that the Sudoku configuration provides us a new alternative way of matrix element representation by using block-grid pair besides the conventional row-column pair. Moreover, we discover six more matr...
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
this paper presents a new audio encryption algorithm based on permutation and residue number system. in the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. then, the audio signal is combined with the noise, generated by the algorithm, to produce a silence signal. for this purpose, the algorithm uses a predef...
Pseudorandom bit generators play an essential role in high-security audio/video scrambling and addressing systems which allow pay-TV programs to be viewed only by authorized subscribers. This paper evaluated cryptographic strength of the bit generators proposed by the European Broadcast Unit and the Japan's Ministry of Posts and Telecommunications and some security weakness was found on the gen...
Today at a time of globalization in which the whole planet become look like a small village and transport information through it with a push button in keyboard and at a time of huge evaluation in the digital world and for the millions of users to international net and some application importance, let us to use both cryptography and steganography as a means to protect the information from hackin...
چکیده ندارد.
The scrambling scheme is a part of the conditional access system (CAS) that is used to prevent unauthorized access to Pay-TV systems. In this paper, we propose a new scrambling scheme and key distribution scheme. The scrambling scheme is used in conjunction with ordinary encryption techniques, for protecting the digital video streams from unauthorized viewing. A hash function and a pseudo-rando...
Overloading is a method to extend capacity limitation of multiple access techniques. The system becomes overloaded, when the number of users exceeds the signal dimensions. One of the efficient schemes to overload a CDMA system is to use two sets of orthogonal signal waveforms (O/O). In this paper, the BER performance of a new overloading scheme using scrambled orthogonal Gold code (OG/OG) sets ...
Most speech scrambling systems are either linear periodic filters or can be modeled as such. It is well-known that from an input-output point of view, a periodic filter is equivalent to a multi-input multi-output linear time-invariant system and thus a rational transfer matrix. In this paper, we propose a framework, based on transfer matrices and frequency domain descriptions, for analysis and ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید