Design and implementation of voice encryption system using XOR based on Hénon map

Published on May 9, 2016
· DOI :10.1109/AIC-MITCSA.2016.7759915
Amina Mahdi2
Estimated H-index: 2
(University College of Engineering),
Saad S. Hreshee2
Estimated H-index: 2
(University College of Engineering)
Sources
Abstract
With the significant development in communication systems especially in the public channels through which our information travels, there are more increasing in the channels problems. Among these problems, the information security is the important object that should be enhanced. In this paper a security model based on chaotic system has been designed to be used to encrypt voice signal. An exclusive OR operation used between the digital input signal and chaotic map which is also convert to binary bits. The simulation results show that the Cpestral Distance Measure (CD) in the proposed system is increased by (4.5778) in comparing with the time domain scrambling. Also dlpc increased by (4.336) in comparing with time domain. The key space in the first two methods ADCs is 1.96 χ 1064 χ range of parameters, while in the third method is 3.8426 χ 10128 χ (range of parameters)2.
📖 Papers frequently viewed together
2017
3 Citations
2019
3 Citations
References12
Newest
A signal masking technique based on Lorentz System is presented in this paper which uses Lorentz equation generated Chaotic Signals are used as a base carrier signal for information signal modulation in the transmitter system. The scheme recovers the information signal exactly at the receiver. The mixing property of the implemented scheme investigated by Computer Simulations shows better performance than that of the conventional method
7 CitationsSource
This paper presents techniques of speech scrambling based-fractional order chaotic system which is used due to many properties; first of all using fractional order as key will increase key space which makes it is very difficult to decrypt by a 3d-party. It is a random like noise behavior; it is defined over continuous number fields, which leads to possibility of using many nonlinear functions in encryption. A one channel with chaotic masking is used to encrypt low level speech signal. The low le...
4 Citations
Security is considered the most important requirement for the success of electronic commerce, which is built based on the security of hash functions, encryption algorithms and pseudorandom number generators. Chaotic systems and security algorithms have similar properties including sensitivity to any change or changes in the initial parameters, unpredictability, deterministic nature and random-like behaviour. Several security algorithms based on chaotic systems have been proposed; unfortunately s...
12 Citations
#1Branislav JovicH-Index: 1
From the content: Introduction to multi-user mobile communication systems.- Chaotic signals and their use in secure communications.- Chaotic synchronization, conditional Lyapunov exponents and Lyapunov's direct method.- Chaotic synchronization of maps.- A novel mathematical analysis for predicting master-slave chaotic synchronization.- Application of chaotic synchronization to secure communications.
34 Citations
This paper attempts to undertake the study of segmentation image techniques by using five threshold methods as Mean method, P-tile method, Histogram Dependent Technique (HDT), Edge Maximization Technique (EMT) and visual Technique and they are compared with one another so as to choose the best technique for threshold segmentation techniques image. These techniques applied on three satellite images to choose base guesses for threshold segmentation image.
165 Citations
#1R. GnanajeyaramanH-Index: 1
#2K. PrasadhH-Index: 1
In Chaotic the properties of sensitivity to initial conditions, control parameters and pseudo- randomness chaotic maps have been widely used in data encryption recently. The chaotic based cryptosystems are suitable for large-scale data encryption such as images, videos or audio data. This paper propose a novel higher dimensional chaotic system for audio encryption, in which variables are treated as encryption keys in order to achieve secure transmission of audio signals. Since the highly sensiti...
29 Citations
#1David L. Levy (University of Massachusetts Boston)H-Index: 32
This paper argues that chaos theory provides a useful theorectical framework for understanding the dynamic evolution of industries and the complex interactions among industry actors. It is argued that industries can be conceptualized and modeled as complex, dynamic systems, which exhibit both unpredictability and underlying order. The relevance of chaos theory for strategy is discussed, and a number of managerial implications are suggested. To illustrate the application of chaos theory, a simula...
365 CitationsSource
#1Ljupco Kocarev (UCSD: University of California, San Diego)H-Index: 52
#2Janusz SzczepanskiH-Index: 15
Last. Igor TomovskiH-Index: 6
view all 4 authors...
We propose a definition of the discrete Lyapunov exponent for an arbitrary permutation of a finite lattice. For discrete-time dynamical systems, it measures the local (between neighboring points) average spreading of the system. We justify our definition by proving that, for large classes of chaotic maps, the corresponding discrete Lyapunov exponent approaches the largest Lyapunov exponent of a chaotic map when Mrarrinfin, where M is the cardinality of the discrete phase space. In analogy with c...
74 CitationsSource
#1Zhengguo LiH-Index: 34
#2Kun LiH-Index: 9
Last. Yeng Chai SohH-Index: 67
view all 4 authors...
The paper proposes a digital chaotic secure communication by introducing a magnifying glass concept, which is used to enlarge and observe minor parameter mismatch so as to increase the sensitivity of the system. The encryption method is based on a one-time pad encryption scheme, where the random key sequence is replaced by a chaotic sequence generated via a Chua's circuit. We make use of an impulsive control strategy to synchronize two identical chaotic systems embedded in the encryptor and the ...
66 CitationsSource
The use of chaotic sequences as spectral spreading sequences in direct-sequence spread-spectrum (DS/SS) communication systems is proposed. The error probabilities of such systems are investigated and shown to be, for all practical purposes, identical to the conventional DS/SS systems which use binary signature sequences. Among the advantages of the use of chaotic sequences in DS/SS are the availability of a great number of them, the ease of their generation, as well as their inherent improvement...
429 CitationsSource
Cited By2
Newest
Due to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive datafrom illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, ...
Source
view all 3 authors...
Efficient and simple design of speech encryption-based stream cipher is produced and suggested in this paper with name finite precision chaotic map-based stream cipher (FPCM-SC) system. Two pseudo random bits generator (PRBG) are built by hybrid chaotic maps using finite precision format and named finite precision chaotic XOR based PRBG (FPCXOR-BRPB) and finite precision chaotic hopping based PRBG(FPCH-PRBG). The statistical security analysis and speech residual unintelligibility measures are pr...
Source