2009 International Conference on Computer Engineering &Amp; Systems 2009
DOI: 10.1109/icces.2009.5383253
|View full text |Cite
|
Sign up to set email alerts
|

Random encryption of speech signal

Abstract: This paper presents an analog speech cryptosystem based on permutation and substitution of speech segments. Permutations processes and substitutions masks are variables which changed with changing the secret key. The main target of proposed system is to get non standard processes to decrease the complexity and diffusion of the system without affecting its security and depend on different security aspects like hidden block size and algorithm. We present a security analysis for the proposed cryptosystem against … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Time-Segment Permutation, TSP, Frequency-Domain Scrambling, FDS, and Time-Frequency Scrambling, TFS, are techniques of permutation-based speech scrambling. In the first case, TSP, the speech signal is divided in small blocks (typically 16 to 32 ms) and the permutations are made into the blocks according to a scrambling key, generated usually by a Pseudo-Noise (PN) generator [42], [60], [61]. Although it is a simple technique, it has some disadvantages as a small key-space, not low enough residual intelligibility, and low resistance to cryptanalysis.…”
Section: Motivationmentioning
confidence: 99%
“…Time-Segment Permutation, TSP, Frequency-Domain Scrambling, FDS, and Time-Frequency Scrambling, TFS, are techniques of permutation-based speech scrambling. In the first case, TSP, the speech signal is divided in small blocks (typically 16 to 32 ms) and the permutations are made into the blocks according to a scrambling key, generated usually by a Pseudo-Noise (PN) generator [42], [60], [61]. Although it is a simple technique, it has some disadvantages as a small key-space, not low enough residual intelligibility, and low resistance to cryptanalysis.…”
Section: Motivationmentioning
confidence: 99%