2009 International Conference on Computer Engineering &Amp; Systems 2009
DOI: 10.1109/icces.2009.5383252
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic encryption of speech signals in transform domains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 8 publications
0
14
0
Order By: Relevance
“…An all-or-nothing system was implemented by Marnas et al [18] but they use quasigroup encryption only to replace the exclusive-or operation in the all-or-nothing system; the actual encryption is done with other cryptosystems. The quasigroup encryption system is primarily a substitution and permutation system, a type of cryptosystem used frequently in the encryption of speech [7], [19]. Public key systems such as elliptic curve and NTRU systems [6] have lower power consumption relative to computationally expensive secret key systems.…”
Section: Existing Methods and Motivationmentioning
confidence: 99%
“…An all-or-nothing system was implemented by Marnas et al [18] but they use quasigroup encryption only to replace the exclusive-or operation in the all-or-nothing system; the actual encryption is done with other cryptosystems. The quasigroup encryption system is primarily a substitution and permutation system, a type of cryptosystem used frequently in the encryption of speech [7], [19]. Public key systems such as elliptic curve and NTRU systems [6] have lower power consumption relative to computationally expensive secret key systems.…”
Section: Existing Methods and Motivationmentioning
confidence: 99%
“…Arnold cat map [4] proposed by Vladimir Arnold in 1960 is a double dimension chaotic system, therefore it is represented by two different equations (1,2).…”
Section: Arnold Cat Mapmentioning
confidence: 99%
“…There are many categories of voice encryption techniques which use chaotic system in [1] authors presented an encryption of voice signals in transform domain by chaos. This algorithm, divides the segments of voice into two blocks each with fixed size.…”
Section: Introductionmentioning
confidence: 99%
“…BFA KPA CPA COA DA CC ICR FC RT MLS TET SETD (Mosa et al, 2009) Table 4. Comparison of audio encryption algorithms…”
Section: Performance Comparisonmentioning
confidence: 99%
“…Mosa et al (Mosa et al, 2009) proposed a chaos based speech encryption system in transform domains (henceforth called SETD). The SETD consists of two stages: substitution and permutation.…”
Section: Analogue Audio Encryptionmentioning
confidence: 99%