2015
DOI: 10.9734/bjast/2015/14744
|View full text |Cite
|
Sign up to set email alerts
|

Speech Encryption Using Stream Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…The speech signal in the first is recorded with pulse code modulation (PCM) system of 8 KHz sampling frequency and 16 resolution bits for each sample. Pre-processing functions is process to convert the sampled speech signal (s) into positive normalized value ( ̆) between 0 and (2 16 -1) according to the following equation [3]:…”
Section: Figure (1) Block Diagram Of Proposed Fixed Point Chaos Based...mentioning
confidence: 99%
See 1 more Smart Citation
“…The speech signal in the first is recorded with pulse code modulation (PCM) system of 8 KHz sampling frequency and 16 resolution bits for each sample. Pre-processing functions is process to convert the sampled speech signal (s) into positive normalized value ( ̆) between 0 and (2 16 -1) according to the following equation [3]:…”
Section: Figure (1) Block Diagram Of Proposed Fixed Point Chaos Based...mentioning
confidence: 99%
“…In analog encryption the speech signal is scrambled or permutated either in time or in frequency domain or in both [2]. In digital speech encryption, the signal can be encrypted using digital cryptosystem such as stream ciphers [1,3]. Also encryption can be classified according to key distribution into public and secret key.…”
Section: Introductionmentioning
confidence: 99%
“…The most famous method of speech encryption methods is the scrambling technique [6], [7], in which either the speech signal is scrambled in the time domain or frequency domain or both the time and frequency domain. Another method to encrypt the speech signal is ciphering method [8][9][10][11], in which the stream cipher of the speech sequence is XORed with a pseudo-random bit generator (PRBG). The third method is the masking method [12,13] in which the scrambled speech signal is obtained by adding the speech signal with the chaotic signal.…”
Section: Introductionmentioning
confidence: 99%
“…In digital speech encryption, the analog speech signal is transformed over analog to digital converter into digital stream bits and then summed up with "pseudo random bit generators" (PRBG) in mode 2. [8]. The advantage of analog methods is that it can be used by telephone analogies and band-limited radio systems while digital encryption techniques being more secure than analog [9].…”
Section: Introductionmentioning
confidence: 99%