Speech encryption using chaotic shift keying for secured speech communication

P. Sathiyamurthi1, S. Ramakrishnan1
1Department of Information Technology, Dr. Mahalingam College of Engineering and Technology, Pollachi, 642003, India

Tóm tắt

Từ khóa


Tài liệu tham khảo

Fridrich J. (1998), Symmetric ciphers based on two-dimensional chaotic maps, International Journal of Bifurcation and Chaos, Volume 8(6), 1259–1284.

Anoop(2007), Public key cryptography—applications algorithm and mathematical explanations.

Thongpon, T., & Sinchai, K. (2009). Accelerating asymmetric-key cryptography using parallel-key cryptographic algorithm. 6th International Conference on Computer and Information Technology, 2, 812–815.

Ljupco Kocarev(2002), Chaos-based cryptography: a brief overview, IEEE Circuits and Systems Magazine, pp 7-21.

Azzaz, M. S., Tanougast, C., Sadoudi, S., & Bouridane, A. (2013). Synchronized hybrid chaotic generators: application to real-time wireless speech encryption. Elsevier: Communications in Nonlinear Science Numerical Simulation, Volume, 18, 2035–2047.

Yang, T., Wu, T. W., & Chua, L. O. (1997). Cryptography based on chaotic systems. IEEE Transactions on Circuits and Systems I, 44, 469–472.

Yang, T., & Chua, L. O. (1997). Impulsive stabilization for control and synchronization of chaotic systems: theory and application to secure communication. IEEE Transactions on Circuits and Systems I, 44, 976–988.

Osman Hilmi Koçal, Emrah Yürüklü, and ˙Ismail Avcıbas (2008), Chaotic-type features for speech steganalysis, IEEE Transactions on Information Forensics and Security, Volume 3, No. 4, pp 651-661.

Yang, T. (1999). Chaotic secure communication systems: history and new results. Telecomm. Rev., 9(4), 597–631.

Mosa, E., Messiha, N. W., Zahran, O., & Abd El-Samie, F. E. (2011). Chaotic encryption of speech signals. International Journal of Speech Technology, 14, 285–296.

Sheu, L. J. (2011). A speech encryption using fractional chaotic systems. Nonlinear dynamics, 65(1–2), 103–108.

Baker, H. J., & Piper, F. C. (1985). Secure Speech Communications, Academic Press Publisher.

Bianco M E, Reed D A (1991) Encryption system based on chaos theory, US Patent No. 5048086, USA, 1-12 http://www.google.co.in/patents/US5048086

Yau, H. T., Pu, Y. C., & Li, S. C. (2012). Application of chaotic synchronization systems to secure communication. International Journal of Information Technology and Control, Volume, 41, 274–282.

Alzharaa Mostafa, Naglaa F Soliman, Mohamoud Abdalluh, Fathi E Abd El-samie (2016), Speech encryption using two dimensional chaotic maps, IEEE Xplore, 11th International Conference on Computer Engineering (ICENCO), Feb 2016.

Mohammed, R. S., & Sadkhan, S. B. (2016). Speech scrambler based on proposed random chaotic maps. IEEE International Conference on Multidisciplinary in IT and Communication Science and Applications, Baghdad, 2016, 1–6.

Addabbo, T., Alioto, M., Bernardi, S., Fort, A., Rocchiand, S., & Vignoli, V. (2004). The digital tent map: performance analysis and optimized design as a source of pseudorandom bits. IEEE Transaction on Instruments and Measurements, Volume, 2, 1301–1304.

Yang, T., & Chua, L. O. (1997). Secure communication via chaotic parameter modulation. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 43(9), 817–819.

Mittal, A. K., Dwivedi, A., & Dwivedi, S. (2015). Secure communication based on chaotic switching and rapid synchronization using parameter adaptation. International Journal of Innovative Computing Information and Control, 11(2), 569–585.

Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.

Kocarev, L., & Lian, S. (2011). Chaos-Based Cryptography Theory, Algorithms and Applications, Springer-Verlag Publisher

Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal on Bifurcation Chaos, A, 44, 2129–2151.

Matej Salamon (2012), Chaotic Electronic Circuits in Cryptography, From the book Applied Cryptography and Network Security, InTech.

Li, K., Soh, Y. C., & Li, Z. G. (2013). Chaotic cryptosystem with high sensitivity to parameter mismatch. IEEE Transactions on Circuits and Systems—I: Fundamental Theory and Applications, 50(4), 579–583Publisher 13, pp 295-317.

Lima, J. B., & da Silva Neto, E. F. (2016). Audio encryption based on the cosine number transform. Springer Multimedia Tool Applications, 75, 8403–8848.