2022
DOI: 10.1007/s11042-022-13317-w
|View full text |Cite
|
Sign up to set email alerts
|

Voice encryption using a unified hyper-chaotic system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…However, amidst this challenge, the advent of deep learning, a burgeoning branch of machine learning research, offers a glimmer of hope. Deep learning models, including Recurrent Neural Networks (RNNs), have demonstrated remarkable efficacy across various application domains [5][6][7][8][9][10][11]. RNNs, in particular, stand out for their capacity to handle sequential data and capture temporal dependencies, thereby offering a flexible framework for analyzing the dynamic behavior of chaotic systems [12][13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…However, amidst this challenge, the advent of deep learning, a burgeoning branch of machine learning research, offers a glimmer of hope. Deep learning models, including Recurrent Neural Networks (RNNs), have demonstrated remarkable efficacy across various application domains [5][6][7][8][9][10][11]. RNNs, in particular, stand out for their capacity to handle sequential data and capture temporal dependencies, thereby offering a flexible framework for analyzing the dynamic behavior of chaotic systems [12][13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…Sensitive data security and privacy are essential to maintaining today's digital environment [1][2][3]. Encryption techniques are widely used to protect data from unauthorized access or interception.…”
Section: Introductionmentioning
confidence: 99%
“…There has been a growing interest in using chaotic systems for secure communication and encryption. Chaotic systems, with their complex dynamics, sensitivity to initial conditions, and deterministic nature, provide inherent randomness and unpredictability that can enhance the security of communication channels [20]. The application of chaos theory to cryptography, known as chaotic cryptology, has attracted much interest in recent years.…”
Section: Introductionmentioning
confidence: 99%