2021
DOI: 10.18421/tem103-54
|View full text |Cite
|
Sign up to set email alerts
|

Speech Encryption Technique using S - box based on Multi Chaotic Maps

Abstract: This paper proposes the establishment of a secure encryption system for data transmission that includes three stages: first stage is a scrambling stage that is divided into scrambling of different sizes blocks and scrambling bits, the second stage is the use of DNA code to flip the bits and the third stage is the encryption using the Substitution box by 256 keys. The scheme is analysed using a variety of metrics. The findings demonstrate that the proposed system is significantly more reliable and robust agains… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…The quadratic map is expressed as shown in Eq 1 below [ 46 ]: where n is the number of iterations and u is the additive element of chaos, when ∂ ∈ [0, 2], Q ∈ [0, 1] in which the chaotic is realized when ∂ ∈ [1.5, 2] [ 46 ].…”
Section: Section 3: Methodologymentioning
confidence: 99%
“…The quadratic map is expressed as shown in Eq 1 below [ 46 ]: where n is the number of iterations and u is the additive element of chaos, when ∂ ∈ [0, 2], Q ∈ [0, 1] in which the chaotic is realized when ∂ ∈ [1.5, 2] [ 46 ].…”
Section: Section 3: Methodologymentioning
confidence: 99%
“…A DNA molecule comprises four nucleotides: A, T, C, and G. There is a complementary relationship between these nucleotides; if the value '00' is assigned to A, then the value '11' should be assigned to T. Likewise, if the value '01' is assigned to C, then the value '10' should be assigned to G. Thus, there are 24 types of DNA coding rules, but only eight of them meet the complementary relationship [12]. As shown in Table 1, there are eight rules for encoding and decoding the binary sequence.…”
Section: Dna Encodingmentioning
confidence: 99%
“…Cryptography involves using codes and ciphers to safeguard data and information from unauthorized access [1]. The encryption process transforms plain text into a form that only the intended recipient can understand.…”
Section: Introductionmentioning
confidence: 99%