A Novel Approach for Speech Encryption: Zaslavsky Map as Pseudo Random Number Generator

Procedia Computer Science - Tập 93 - Trang 816-823 - 2016
F.J. Farsana1, K. Gopakumar2
1Research scholar,LBS Centre for Science and Technology, Kerala University, Trivandrum, India
2Professor, TKMCollege of Engineering, Kollam, India

Tóm tắt

Từ khóa


Tài liệu tham khảo

Ambika, 2012, Secure speech Review, International Journal of Engineering Research and application (IJERA), 2, 1044

Gonzalo Alvarez, 2006, Some basic cryptographic requirement for chaos based cryptosystems, International Journal of Bifurcation and Chaos

Alwahbani, 2013, Speech scrambling based on chaotic maps and one time pad, Proceedings of IEEE International Conference on computing electrical and electronics engineering

Mosa, 2010, Chaotic encryption of speech signals in transform domain”, Proceedings of IEEE International Conference on computing electrical and electronics engineering

Sadkhan, 2015, A proposed voice encryption based on Random Lorenz map with DCT permutation, International Journal of Advancement in Computing Technology, 7

Mohamed Salah Azzaz, Camel Tanougast, Said sadoudi, Ahmed Bouridane, “synchronized hybrid chaotic generators: Application to real time wireless speech encryption”Numerical simulations. Vol 18, issue 8 August 2013, PP 2035-2047,.

Borislav Stoyanov, 2014, Novel Zaslavsky Map BasedPseudorandom Bit Generation Scheme, Applied Mathematical Sciences, 8, 8883, 10.12988/ams.2014.410879

Zaslavskii, 1978, The Simplest case of a strange attractor, Phys. Lett. A, 69, 145, 10.1016/0375-9601(78)90195-0

Xianyong Wu, 2007, A Novel digital Watermark algorithm based on chaotic maps, physics Letters A, 365, 403, 10.1016/j.physleta.2007.01.034

Li; X. Mou and Y. Cai, “Pseudo-Random Bit Generator Based on Couple Chaotic Systems and its Applications in Stream Cipher Cryptography”, Proc. LNCS, Vol. 2247, PP: 316-329, Springer-Verlag, Berlin, 2001 INDOCRYPT 2001.

Hamdan.O. Alanazi, B.B. Zaidan, A.A. Zaidan, Hamid A. Jalab, M. Shabbir and Y. Al-Nabhani “New Comparative Study between DES, 3DES and AESwithin Nine Factors”. Journal of Computing,Volume 2, Issue 3, March 2010, ISSN 2151-9617

Jawad Ahmad and Fawad Ahmed, “Efficiency Analysis and Security Evaluation ofImage Encryption Schemes”. International Journal of Video & Image Processing and Network SecurityIJVIPNS-IJENS Vol: 12 No: 04.