2020
DOI: 10.1016/j.procs.2020.03.402
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of El-Gamal algorithm for speech signals encryption and decryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(22 citation statements)
references
References 12 publications
0
20
0
2
Order By: Relevance
“…The statistical measures used to assess the performance of the system in the encryption and decryption processes included (SNR, SNRseg, fwSNRseg, CC, LLR) [25], [26], [27], the statistical measures in compression used included (CR, SNR, SSSNR, PSNR, MSE). The equations of these measures were [2], [9], [10], [28]…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The statistical measures used to assess the performance of the system in the encryption and decryption processes included (SNR, SNRseg, fwSNRseg, CC, LLR) [25], [26], [27], the statistical measures in compression used included (CR, SNR, SSSNR, PSNR, MSE). The equations of these measures were [2], [9], [10], [28]…”
Section: Resultsmentioning
confidence: 99%
“…Encryption and compression technologies are, therefore, needed to overcome difficulties in handling huge amounts of data that need to be stored and transferred [1]. Speech-based communication has developed in numerous applications such as teleconferencing, the military, e-learning, and other sectors [2]. Speech is a fundamental way in which humans communicate information to each other.…”
Section: Introductionmentioning
confidence: 99%
“…Even if an attacker intercepts the transmitted data, he will not be able to extract any information from these files. data encrypted by the modified El-Gamal method [5,[7][8][9]. Now there is a transfer from the client device to the server of the public key y and his login at the same time.…”
Section: Description Of the Work Of The Import-substituting Software Package For Secure File Transfermentioning
confidence: 99%
“…To do this, before encrypting the file and uploading it to the server, the VirusTotal service is contacted by sending the hash of the client's file to a public service. If a confirmation comes that the file contains malware, the client will be denied to send the file [10][11][12][13].…”
Section: Fig 2 Welcome Windowmentioning
confidence: 99%
“…It was invented in 1985 by Taher El-Gamal relied on Davy-Helmen principle for exchanging keys [18], [19]. The encryption steps of this method are [20]: 1. Set essential parameters: g to generate a cyclic group of order p, x (secret key): a number <p-1 2.…”
Section: El-gamal Algorithmmentioning
confidence: 99%