2022
DOI: 10.48084/etasr.4912
|View full text |Cite
|
Sign up to set email alerts
|

A Combined Chaotic System for Speech Encryption

Abstract: This paper presents a speech encryption scheme by performing a combination of modified chaotic maps inspired by classic logistic and cubic maps. The main idea was to enhance the performance of classical chaotic maps by extending the range of the chaotic parameter. The resulted combining map was applied to a speech encryption scheme by using the confusion and diffusion architecture. The evaluation results showed a good performance regarding the chaotic behaviors such as initial value, control parameter, Lyapuno… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…However, the generation of long chaotic signals with chaotic maps can lead to undesirable outcomes, including increased computational costs in terms of memory and execution time. Previous studies [12][13][14][15] have explored cryptography systems employing scrambling techniques to encrypt data, often permuting data elements based on the arrangement of chaotic signals. While effective for signals of limited length, generating long chaotic signals may result in sequences with duplicated values, thereby constraining scrambling possibilities.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the generation of long chaotic signals with chaotic maps can lead to undesirable outcomes, including increased computational costs in terms of memory and execution time. Previous studies [12][13][14][15] have explored cryptography systems employing scrambling techniques to encrypt data, often permuting data elements based on the arrangement of chaotic signals. While effective for signals of limited length, generating long chaotic signals may result in sequences with duplicated values, thereby constraining scrambling possibilities.…”
Section: Related Workmentioning
confidence: 99%
“…In the pursuit of enhanced security, recent research [15] has proposed encryption strategies for speech signals, involving fragmentation of input speech and permutation based on chaotic generators such as the Logistic map, Tent map, Quadratic map, Bernoulli's map, and the Chen map. Another approach [12] combines classical maps, namely the Logistic map and Cubic map, to encrypt speech signals, producing a chaotic vector for permutation and subsequent diffusion using XOR operation.…”
Section: Related Workmentioning
confidence: 99%
“…Spectrogram points to a visual image of the spectrum for audio signal frequency when it changes with time [12]. Figure 3…”
Section: Spectrogram Analysismentioning
confidence: 99%
“…After that, shuffling/diffusion architecture is carried out to realize the encrypting operation. Modified chaotic map is designed in [12] by merging two classical chaotic maps. The random sequence produced by the new map is used to perform the confusion-diffusion encryption structure upon the input speech file.…”
Section: Introductionmentioning
confidence: 99%
“…Some symmetric systems have an infinite number of periodic orbits or aperiodic trajectories [39][40][41]. The diverse and flexible evolutionary attributes of symmetric chaotic systems give them extensive application value in various fields, such as image encryption [42][43][44][45], speech encryption [46][47][48] and random number generating [49,50].…”
Section: Introductionmentioning
confidence: 99%