A multilayered audio signal encryption approach for secure voice communication

HA Abdallah, S Meshoul - Electronics, 2022 - mdpi.com
In this paper, multilayer cryptosystems for encrypting audio communications are proposed.
These cryptosystems combine audio signals with other active concealing signals, such as …

The SPN network for digital audio data based on elliptic curve over a finite field

I Khalid, T Shah, KA Almarhabi, D Shah, M Asif… - IEEE …, 2022 - ieeexplore.ieee.org
The mathematical operation of the Elliptic Curve over the prime finite field is wildly used for
secure data communication as it provides high security while utilizing the same size as the …

Secure audio signal encryption based on triple compound-combination synchronization of fractional-order dynamical systems

Nasreen, P Muthukumar - International Journal of Dynamics and Control, 2022 - Springer
In the recent past, information security has been a gradually fundamental problem. This
paper proposed a new audio encryption algorithm based on a novel dynamical system with …

A new Secure Speech Communication Scheme Based on Hyperchaotic Masking and Modulation.

SA Gebereselassie, BK Roy - IFAC-PapersOnLine, 2022 - Elsevier
This paper presents a new, effective, simple, and more secure speech communication
technique based on the combination of hyperchaotic masking and modulation. One …

Chaotic driven gorilla troops optimizer based NMF approach for integrative analysis of multiple source data

B Bansal, A Sahoo - International Journal of Information Technology, 2022 - Springer
High-dimensional multiple source data integration has become an important approach for
exploratory data analysis. For integrative clustering analysis joint non-negative matrix …

一类图像载体与多混沌系统的动态音频加密算法.

巫朝霞, 妥永强 - Application Research of Computers …, 2022 - search.ebscohost.com
针对单一混沌系统在加密中有密钥空间小, 安全性较低等问题, 提出了图像载体与多混沌系统的
动态音频加密算法. 首先对明文音频进行分块以提升算法运行效率. 通过初始密钥与明文音频 …

[HTML][HTML] 基于一维卷积神经网络与改进DS 证据理论的警务云安全数据融合技术

李伟, 何明, 徐兵 - 计算机应用研究, 2022 - arocmag.com
摘要In order to solve the problems about single source of evaluation information, large
deviation of accuracy and insufficient extraction fusion of heterogeneous data, this paper …

Efficient Audio Encryption Using a Discrete Cosine Transform and Baker Map

G Alzeer, H Alhumyani - 2022 Fifth National Conference of …, 2022 - ieeexplore.ieee.org
With the expansion and improvement of technology and communication in recent years, the
necessity to secure and defend these communications from various threats has increased. In …

A Survey on Speech Encryption Using Chaos Map

EH Haseeb, SA Kadhim… - 2022 Fifth College of …, 2022 - ieeexplore.ieee.org
Due to the ease of compromising communication channels by attackers, Wireless
communications confront considerable challenges in having high security. As a result …

Securing critical information: An image cryptography digital based on multi level cryptographic

LJ Ibrahim - 2022 - openaccess.altinbas.edu.tr
The importance of image encryption has considerably increased specially after the
spectacular growth of internet of things (IoT) and due to the simplicity of capturing and …