期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Applying and Comparison of Chaotic-Based Permutation Algorithms for Audio Encryption 被引量:1
1
作者 Osama M.Abu Zaid Medhat A.Tawfeek Saad Alanazi 《Computers, Materials & Continua》 SCIE EI 2021年第6期3161-3176,共16页
This research presents,and claries the application of two permutation algorithms,based on chaotic map systems,and applied to a le of speech signals.They are the Arnold cat map-based permutation algorithm,and the Baker... This research presents,and claries the application of two permutation algorithms,based on chaotic map systems,and applied to a le of speech signals.They are the Arnold cat map-based permutation algorithm,and the Baker’s chaotic map-based permutation algorithm.Both algorithms are implemented on the same speech signal sample.Then,both the premier and the encrypted le histograms are documented and plotted.The speech signal amplitude values with time signals of the original le are recorded and plotted against the encrypted and decrypted les.Furthermore,the original le is plotted against the encrypted le,using the spectrogram frequencies of speech signals with the signal duration.These permutation algorithms are used to shufe the positions of the speech les signals’values without any changes,to produce an encrypted speech le.A comparative analysis is introduced by using some of sundry statistical and experimental analyses for the procedures of encryption and decryption,e.g.,the time of both procedures,the encrypted audio signals histogram,the correlation coefcient between specimens in the premier and encrypted signals,a test of the Spectral Distortion(SD),and the Log-Likelihood Ratio(LLR)measures.The outcomes of the different experimental and comparative studies demonstrate that the two permutation algorithms(Baker and Arnold)are sufcient for providing an efcient and reliable voice signal encryption solution.However,the Arnold’s algorithm gives better results in most cases as compared to the results of Baker’s algorithm. 展开更多
关键词 Arnold’s cat map chaotic maps permutation algorithms speech encryption baker’s chaotic map
在线阅读 下载PDF
Secret Key Optimization for Secure Speech Communications
2
作者 Osama S.Faragallah Mahmoud Farouk Hala S.El-Sayed 《Computers, Materials & Continua》 SCIE EI 2022年第8期3025-3037,共13页
This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains.The first question is,what are the best values of sub-keys that must be used to get the best quality a... This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains.The first question is,what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform domains.The second question is the relation between the number of sub-keys,the number of secret keys used,and the audio speech signal block’s size.Finally,how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform domains.An audio cryptosystem discussed before in recent research is applied to answer the three previous inquiries.Accurate simulation results and analysis answer all three questions;first,there is no specific,well-defined format or rule for sub-key values that must be used to get a better cryptosystem.For the second question,yes,there is a direct relationship between the number of applicable keys,number of available sub-keys,and block size of speech audio signal and formulated into a first-order equation.For the third question,each discrete transform domain has a specific acceptable range of sub-keys that imply a particular number of keys that can be used to get a better cryptosystem. 展开更多
关键词 Audio cryptosystem chaotic baker map secret key size
在线阅读 下载PDF
Security analysis of image encryption based on twodimensional chaotic maps and improved algorithm
3
作者 Feng HUANG Yong FENG 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2009年第1期5-9,共5页
The article proposes a new algorithm to improve the security of image encryption based on twodimensional chaotic maps.Chaotic maps are often used in encrypting images.However,the encryption has periodicity,no diffusio... The article proposes a new algorithm to improve the security of image encryption based on twodimensional chaotic maps.Chaotic maps are often used in encrypting images.However,the encryption has periodicity,no diffusion,and at the same time,the real keys space of encryption are fewer than the theoretical keys space,which consequently results in potential security problems.Thus,this article puts forward several ways to solve the problems including adding diffusion mechanism,changing the design of keys and developing a composite encryption system.It designs an algorithm for the version B of the discretized baker map,which is one of the most prevalent chaotic maps,based on which a new image encryption is proposed to avoid the above problems.The simulation results show that the new encryption algorithm is valid and the result can be applied to other two-dimensional chaotic maps,such as the cat map. 展开更多
关键词 chaotic map baker map image encryption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部