Secure Audio Transmission Over Wireless Uncorrelated Rayleigh Fading Channel

Published on Jan 1, 2022in Cmc-computers Materials & Continua3.772
· DOI :10.32604/CMC.2022.019710
Osama S. Faragallah16
Estimated H-index: 16
Mahmoud Mohamed Farouk8
Estimated H-index: 8
+ 1 AuthorsMohsen A. M. El-Bendary9
Estimated H-index: 9
#1Amita Singha (Chittagong University of Engineering & Technology)H-Index: 3
#2Muhammad Ahsan Ullah (Chittagong University of Engineering & Technology)H-Index: 7
Abstract In this paper, a digital watermarking technique for ensuring security to an audio signal is presented. The proposed technique is developed by using discrete wavelet transform (DWT) and singular value decomposition (SVD). The proposed technique is executed by incorporating multi-level DWT along with the use of multiple images with different sizes as watermarks. The proposed technique is developed by keeping in mind the distribution of watermark signals’ energy throughout the entire host ...
#1P. Sathiyamurthi (Dr. Mahalingam College of Engineering and Technology)H-Index: 3
#2S. Ramakrishnan (Dr. Mahalingam College of Engineering and Technology)H-Index: 12
In this paper a new speech encryption method using Fast Fourier Transform (FFT) and multiple chaotic maps has been developed for secured speech communication. In order to improve the drawbacks namely residual intelligibility in encrypted signal, poor quality in decrypted signal, low key space and high computational complexity that prevail in the exist speech encryption methods, a novel speech encryption algorithm based on a three dimension (3D) Lorenz-Logistic map has been developed. A new 3D Lo...
#1Amit Pande (UC Davis: University of California, Davis)H-Index: 18
#2Prasant Mohapatra (UC Davis: University of California, Davis)H-Index: 66
Last. Joseph Zambreno (Iowa State University)H-Index: 22
view all 3 authors...
Algorithmic parameterization and hardware architectures can ensure secure transmission of multimedia data in resource-constrained environments such as wireless video surveillance networks, telemedicine frameworks for distant health care support in rural areas, and Internet video streaming. Joint multimedia compression and encryption techniques can significantly reduce the computational requirements of video processing systems. The authors present an approach to reduce the computational cost of m...
#1Musheer AhmadH-Index: 22
#2Bashir AlamH-Index: 10
Last. Omar Farooq (AMU: Aligarh Muslim University)H-Index: 18
view all 3 authors...
In this paper, a high dimensional chaotic systems based mixed keystream generator is proposed to secure the voice data. As the voice-based communication becomes extensively vital in the application areas of military, voice over IP, voice-conferencing, phone banking, news telecasting etc. It greatly demands to preserve sensitive voice signals from the unauthorized listening and illegal usage over shared/open networks. To address the need, the designed keystream generator employed to work as a sym...
#1Carmen Sanchez-Avila (ETSI)H-Index: 14
#2R. Sanchez-ReillolH-Index: 1
In October 2000, after three years of competition between 15 candidate algorithms, the National Standards and Technology (NIST) chose the Rijndael algorithm to be adopted as Advanced Encryption Standard (AES) by the U.S. Department of Commerce, replacing to Data Encryption Algorithm (DES), which has been the standard since 1977. The authors analyze the structure and design of new AES, following three criteria: a) resistance against all known attacks; b) speed and code compactness on a wide range...
#1Shahram Etemadi Borujeni (UI: University of Isfahan)H-Index: 8
This paper deals with the permutation of FFT (Fast Fourier Transform) coefficients in a speech encryption system. The scrambling algorithm is based on the permutation of the FFT coefficients and provides a highly secured scrambled signal by permuting a large number of those coefficients. The algorithm for the generation the permutation matrices is explained. This system is useful for a band limited telephone channel and mobile communication. Choice and construction of permutation matrices in the...
Cited By0
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.