SPEECH SIGNAL CRYPTOGRAPHY USING WPT
نویسندگان
چکیده
منابع مشابه
Speech Enhancement using Laplacian Mixture Model under Signal Presence Uncertainty
In this paper an estimator for speech enhancement based on Laplacian Mixture Model has been proposed. The proposed method, estimates the complex DFT coefficients of clean speech from noisy speech using the MMSE estimator, when the clean speech DFT coefficients are supposed mixture of Laplacians and the DFT coefficients of noise are assumed zero-mean Gaussian distribution. Furthermore, the MMS...
متن کاملSignal Processing Techniques in Cryptography
Security of cryptographic symmetric primitives is studied in this thesis. Pseudorandomness characteristics of cryptographic sequences are analyzed, resulting in new methods for constructing sequences with high linear complexity. Connections between nonlinear complexity and other cryptographic criteria are also established, whereas a new recursive algorithm for efficiently computing the minimal ...
متن کاملSpeech Signal Enhancement Using Firefly Optimization Algorithm
The speech signal enhancement is essential to obtain clean speech signal from noisy signal. For multimodal optimization, the natural-inspired algorithms such as Firefly Algorithm (FA) are better. The proposed algorithm contains preprocessing module, optimization module and spectral filtering module. Here, Loizou’s and Aurora databases are considered for signals. In this paper the Perceptional E...
متن کاملGender Recognition System Using Speech Signal
In this paper, a system, developed for speech encoding, analysis, synthesis and gender identification is presented. A typical gender recognition system can be divided into front-end system and back-end system. The task of the front-end system is to extract the gender related information from a speech signal and represents it by a set of vectors called feature. Features like power spectrum densi...
متن کاملKleptography: Using Cryptography Against Cryptography
The notion of a Secretly Embedded Trapdoor with Universal Protection (SETUP) has been recently introduced. In this paper we extend the study of stealing information securely and subliminally from black-box cryptosystems. The SETUP mechanisms presented here, in contrast with previous ones, leak secret key information without using an explicit subliminal channel. This extends this area of threats...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering Technologies and Management Research
سال: 2020
ISSN: 2454-1907
DOI: 10.29121/ijetmr.v7.i7.2020.727