2013
DOI: 10.1016/j.cnsns.2012.12.018
|View full text |Cite
|
Sign up to set email alerts
|

Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 52 publications
(25 citation statements)
references
References 24 publications
0
25
0
Order By: Relevance
“…As previously mentioned, chaos generators and chaotic signals have been implemented extensively in the field of private communications [1,14,29,34]. However, we still search for a criterion for choosing the best chaotic masking signal.…”
Section: Selection Criteria For the Chaotic Signalmentioning
confidence: 98%
“…As previously mentioned, chaos generators and chaotic signals have been implemented extensively in the field of private communications [1,14,29,34]. However, we still search for a criterion for choosing the best chaotic masking signal.…”
Section: Selection Criteria For the Chaotic Signalmentioning
confidence: 98%
“…In recent year, the speech encryption signal has been widely used in civilian communication and military systems, so that the protection for these signals is a very important requirement [1], [2]. It is generally possible to classify speech encryption techniques into two kinds; analog and digital schemes [3].…”
Section: Introductionmentioning
confidence: 99%
“…The histogram analysis has been taken account to prove the strength of our algorithm, and the results are shown in Figs. 4,5,6,7,8,9, and 10. Histogram of input speech sample shown in Fig.…”
Section: Histogram Analysismentioning
confidence: 99%
“…The chaotic methods generally rely on large numbers (chaos) belong to nonlinear dynamics field [4]. Chaoticbased cryptographic functions follow deterministic dynamics, non-guessable behavior with non-linear functions and chaos properties [5][6][7]. Chaotic-based cryptography combines the traditional cryptographic techniques and the chaotic synchronization to enhance the degree of security [8][9][10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%