SPEECH SIGNAL CRYPTOGRAPHY USING WPT

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Speech Enhancement using Laplacian Mixture Model under Signal Presence Uncertainty

In this paper an estimator for speech enhancement based on Laplacian Mixture Model has been proposed. The proposed method, estimates the complex DFT coefficients of clean speech from noisy speech using the MMSE  estimator, when the clean speech DFT coefficients are supposed mixture of Laplacians and the DFT coefficients of  noise are assumed zero-mean Gaussian distribution. Furthermore, the MMS...

متن کامل

Signal Processing Techniques in Cryptography

Security of cryptographic symmetric primitives is studied in this thesis. Pseudorandomness characteristics of cryptographic sequences are analyzed, resulting in new methods for constructing sequences with high linear complexity. Connections between nonlinear complexity and other cryptographic criteria are also established, whereas a new recursive algorithm for efficiently computing the minimal ...

متن کامل

Speech Signal Enhancement Using Firefly Optimization Algorithm

The speech signal enhancement is essential to obtain clean speech signal from noisy signal. For multimodal optimization, the natural-inspired algorithms such as Firefly Algorithm (FA) are better. The proposed algorithm contains preprocessing module, optimization module and spectral filtering module. Here, Loizou’s and Aurora databases are considered for signals. In this paper the Perceptional E...

متن کامل

Gender Recognition System Using Speech Signal

In this paper, a system, developed for speech encoding, analysis, synthesis and gender identification is presented. A typical gender recognition system can be divided into front-end system and back-end system. The task of the front-end system is to extract the gender related information from a speech signal and represents it by a set of vectors called feature. Features like power spectrum densi...

متن کامل

Kleptography: Using Cryptography Against Cryptography

The notion of a Secretly Embedded Trapdoor with Universal Protection (SETUP) has been recently introduced. In this paper we extend the study of stealing information securely and subliminally from black-box cryptosystems. The SETUP mechanisms presented here, in contrast with previous ones, leak secret key information without using an explicit subliminal channel. This extends this area of threats...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Engineering Technologies and Management Research

سال: 2020

ISSN: 2454-1907

DOI: 10.29121/ijetmr.v7.i7.2020.727