Chaotic encryption of speech signals

E. Mosa1, Nagy W. Messiha1, O. Zahran1, Fathi E. Abd El‐Samie1
1Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menofia University, Menouf, Egypt

Tóm tắt

Từ khóa


Tài liệu tham khảo

Abd El-Samie, F. E. (2009). An efficient singular value decomposition algorithm for digital audio watermarking. International Journal of Speech Technology, 12(1), 27–45.

Advanced Encryption System (2001). Federal Information Processing Standards Publication, 197.

Ahmed, N., Natarajan, T., Rao, K. R. (1974). Discrete cosine transfom. IEEE Transactions on Computers, C-23, 90–93.

Behnia, S., Akhshani, A., Mahmodi, H., & Akhavan, A. (2006). Novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals.

Beker, H. J., & Piper, F. C. (1985). Secure speech communications. London: Academic Press.

Cheng, L. Z. (2001). On computing the two-dimensional (2-D) type IV discrete cosine transform (2-D DCT-IV). IEEE Signal Processing Letters, 8, 239–241.

Daemen, J., & Rijndael, V. R. (2001). The advanced encryption standard. Doctor Dobb’s Journal, 26(3), 137–139.

Fridrich, J. (1997). Secure image ciphering based on chaos (Final report).

Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.

Goldburg, B., Sridharan, S., & Dawson, E. (1993). Design and cryptanalysis of transform-based analog speech scramblers. IEEE Journal on Selected Areas in Communications, 11(5), 735–744.

Koduru, S. C., & Chandrasekaran, V. (2008). Integrated confusion-diffusion mechanisms for chaos based image encryption. In IEEE 8th international conference on computer and information technology workshops.

Kuo, C. J. (1993). Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging, 2(4), 345–351.

Lee, L. S., Chou, G. C., & Chang, C. S. (1984). A new frequency domain speech scrambling system which does not require frame synchronization. IEEE Transactions on Communications, 32, 444–456.

Lin, Q. H., Yin, F. L., Mei, T. M., & Liang, H. (2006). A blind source separation based method for speech encryption. IEEE Transactions on Circuits and Systems. I, 53(6), 1320–1328.

Ma, F., Cheng, J., & Wang, Y. (1996). Wavelet transform-based analogue speech scrambling scheme. Electronics Letters, 32(8), 719–721.

Manjunath, G., & Anand, G. V. (2002). Speech encryption using circulant transformations. In Proc. IEEE, Int. conf. multimedia and exp. (Vol. 1, pp. 553–556).

Mao, Y. B., Chen, G., & Lian, S. G. (2004). A novel fast image encryption scheme based on the 3D chaotic baker map. International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 14(10), 3613–3624.

Meng-En, L., Chien-Feng, C., Tsung-Nan, L., & Chun-Nan, C. (2009). The application of discrete cosine transform (DCT) combined with the nonlinear regression routine on optical auto-focusing. In Digest of technical papers international conference on consumer electronics ICCE 2009 (pp. 1–2).

Milton, R. M. (1989). A time and frequency-domain speech scrambler. In COMSIG 1989 proceedings, Southern African conference (pp. 125–130).

Murthy, N. R., & Swamy, M. N. (1991). Efficient algorithms for the computation of running discrete cosine and sine transforms. IEEE International Symposium on Circuits and Systems, 1, 634–637.

Shannon, C. E. (1949). Communication theory of secrecy system. The Bell System Technical Journal, 28, 656–715.

Tseng (2007). An OFDM speech scrambler without residual intelligibility. In TENCON 2007 (pp. 1–4).

Wu, Y., & Ng, B. P. (2002). Speech scrambling with Hadamard transform in frequency domain. Proceedings of the 6th International Conference on Signal Processing, 2, 1560–1563.

Yip, P., Rao, K. (1987). On the shift property of DCT’s and DST’s. Acoustics, Speech and Signal Processing, 35, 404–406.