Voice Scrambling Algorithm based on 3D Chaotic Map System (VSA3DCS) to Encrypt Audio Files
نویسندگان
چکیده
منابع مشابه
Digital Chaotic Scrambling of Voice Based on Duffing Map
With the significant development in communication systems especially in the public channels through which our information travels, there are more increasing in the channels problems. The information security is the important one that should be enhanced. This paper presents a chaos-based speech scrambling system. Chaotic maps have been successfully used for large-scale data encryption such as im...
متن کاملChaotic Image Scrambling Algorithm Based on S-DES
With the security requirement improvement of the image on the network, some typical image encryption methods can’t meet the demands of encryption, such as Arnold cat map and Hilbert transformation. S-DES system can encrypt the input binary flow of image, but the fixed system structure and few keys will still bring some risks. However, the sensitivity of initial value that Logistic chaotic map c...
متن کاملDigital Watermarking of Audio in Time Domain Multiple Bit Plane based on Chaotic Scrambling
The swift progression in internet networking services has led to massive growth in various multimedia applications such as images, audio files, video files etc. This web revolution has made it feasible and simpler to transmit digital media from one point to another with paramount speed and accuracy. Besides this, it is easier to misuse and exploit the valuable information through hacking at the...
متن کاملA novel parallel hash function based on 3D chaotic map
As the core of cryptography, hash function is one of the basic techniques for information security. During the last few years, considerable effort has been devoted to research on chaos-based hash functions. Nevertheless, the corresponding analysis of them lag far behind. In this paper, a new efficient scheme for parallel hash function based on high-dimensional chaotic map is proposed. In the pr...
متن کاملA Novel Image Encryption Algorithm Based on a 3D Chaotic Map
Recently Solak et al. [International Journal of Bifurcation and Chaos, 20 (2010), 1405–1413] cryptanalyzed the chaotic image encryption algorithm of Fridrich [International Journal of Bifurcation and Chaos, 8 (1998), 1259–1284], which was considered a benchmark for measuring security of many image encryption algorithms. This attack can also be applied to other encryption algorithms that have a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2020
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2020.0110571