A Novel Approach for Speech Encryption: Zaslavsky Map as Pseudo Random Number Generator
Tóm tắt
Từ khóa
Tài liệu tham khảo
Ambika, 2012, Secure speech Review, International Journal of Engineering Research and application (IJERA), 2, 1044
Gonzalo Alvarez, 2006, Some basic cryptographic requirement for chaos based cryptosystems, International Journal of Bifurcation and Chaos
Alwahbani, 2013, Speech scrambling based on chaotic maps and one time pad, Proceedings of IEEE International Conference on computing electrical and electronics engineering
Mosa, 2010, Chaotic encryption of speech signals in transform domain”, Proceedings of IEEE International Conference on computing electrical and electronics engineering
Sadkhan, 2015, A proposed voice encryption based on Random Lorenz map with DCT permutation, International Journal of Advancement in Computing Technology, 7
Mohamed Salah Azzaz, Camel Tanougast, Said sadoudi, Ahmed Bouridane, “synchronized hybrid chaotic generators: Application to real time wireless speech encryption”Numerical simulations. Vol 18, issue 8 August 2013, PP 2035-2047,.
Borislav Stoyanov, 2014, Novel Zaslavsky Map BasedPseudorandom Bit Generation Scheme, Applied Mathematical Sciences, 8, 8883, 10.12988/ams.2014.410879
Zaslavskii, 1978, The Simplest case of a strange attractor, Phys. Lett. A, 69, 145, 10.1016/0375-9601(78)90195-0
Xianyong Wu, 2007, A Novel digital Watermark algorithm based on chaotic maps, physics Letters A, 365, 403, 10.1016/j.physleta.2007.01.034
Li; X. Mou and Y. Cai, “Pseudo-Random Bit Generator Based on Couple Chaotic Systems and its Applications in Stream Cipher Cryptography”, Proc. LNCS, Vol. 2247, PP: 316-329, Springer-Verlag, Berlin, 2001 INDOCRYPT 2001.
Hamdan.O. Alanazi, B.B. Zaidan, A.A. Zaidan, Hamid A. Jalab, M. Shabbir and Y. Al-Nabhani “New Comparative Study between DES, 3DES and AESwithin Nine Factors”. Journal of Computing,Volume 2, Issue 3, March 2010, ISSN 2151-9617
Jawad Ahmad and Fawad Ahmed, “Efficiency Analysis and Security Evaluation ofImage Encryption Schemes”. International Journal of Video & Image Processing and Network SecurityIJVIPNS-IJENS Vol: 12 No: 04.