Speech encryption using chaotic shift keying for secured speech communication

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Speech encryption using chaotic shift keying for secured speech communication

This paper throws light on chaotic shift keying-based speech encryption and decryption method. In this method, the input speech signals are sampled and its values are segmented into four levels, namely L0, L1, L2, and L3. Each level of sampled values is permuted using four chaotic generators such as logistic map, tent map, quadratic map, and Bernoulli’s map. A chaotic shift keying mechanism ass...

متن کامل

Modified Chaotic Shift Keying using Indirect Coupled Chaotic Synchronization for Secure Digital Communication

In this paper, a modified chaotic shift keying method is proposed to transmit digital bits securely over a communication channel. The scheme is based upon encrypting the digital bits 0 and 1 into infinite levels by applying the keystream such that there is no recognisable pattern in the encoded transmitted signal. The encoded transmitting signal generated is shown to resist popular attack metho...

متن کامل

On an Improved Chaotic Shift Keying Communication Scheme

There is a great interest in secure communications within industry and various sectors of society. One common approach of achieving this is by encoding the information using shift-keying methods such as Binary Phase Shift Keying and Quadrature Phase Shift Keying. Proposed in this paper is a new robust yet simple multilevel differential chaotic shift-keying scheme. Compared with the schemes curr...

متن کامل

Digital Communication Using a Novel Combination of Chaotic Shift Keying and Duffing Oscillators

In this paper, an improved technique for constructing Chaotic Shift Keying (CSK) for transmitting digital signals is introduced. In contrast to the classical methods where only two chaotic attractors, representing logic 0 and logic 1 are used to build CSK, the proposed system allows the chaotic transmitted signal to alternate among four different chaotic attractors. In addition, the transmitter...

متن کامل

Speech encryption using circulant transformations

A new analog encryption technique using unitary circulant transformations of the sampled analog signal is proposed. This technique is less vulnerable to attack than other known schemes based on transposition(scramhling) of the signal components in time or frequency domain. The new technique introduces primarily a phase distortion. A new distonion measure capable of quantifying phase distortion ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EURASIP Journal on Audio, Speech, and Music Processing

سال: 2017

ISSN: 1687-4722

DOI: 10.1186/s13636-017-0118-0