[PDF][PDF] A Speech Cryptosystem Using the New Chaotic System with a Capsule-Shaped Equilibrium Curve.

MA Mohamed, T Bonny, A Sambas… - … Materials & Continua, 2023 - cdn.techscience.cn
In recent years, there are numerous studies on chaotic systems with special equilibrium
curves having various shapes such as circle, butterfly, heart and apple. This paper describes …

CESARAE: computationally efficient and statistical attack resistant audio encryption system

M Nabi, MO Ul Islam, SA Parah - Multimedia Tools and Applications, 2024 - Springer
Audio piracy in the real-time transmission has intensified with digital replication and
distribution, making unauthorized sharing effortless and widespread, leading to a significant …

Speech encryption using stream cipher

A Belmeguenai, K Mansouri… - British Journal of …, 2015 - publish.sub7journal.com
In this work, we have realized an efficient implementation of stream cipher algorithm for
speech data encryption and decryption. The design consists of a 128-bit non linear feedback …

Voice cipher using RC4 algorithm

MK Hussein - 2020 International Conference on Electrical …, 2020 - ieeexplore.ieee.org
Encryption plays a major role in achieving privacy, especially in communications and
information systems such as military systems, banks, telecommunications and individuals …

Speech encryption using the nonlinear filter generator

A Belmeguenai, K Mansouri… - 2015 16th International …, 2015 - ieeexplore.ieee.org
In this communication, we propose a stream cipher system based on nonlinear filter
generator for speech data encryption. The cipher is simple and highly efficient. It is …

Desktop application for crypto-protected voice communication

SМ Ivanović, MR Marković, SS Stanišić… - Vojnotehnički …, 2024 - aseestant.ceon.rs
Sažetak Uvod/cilj: Svi podaci razmenjeni preko interneta, kao i preko drugih računarskih
mreža, podložni su raznim tipovima bezbednosnih pretnji. Uzimajući to u obzir, prenos glasa …

Performance Comparison of Voice Encryption Algorithms Implemented on Blackfin Platform

CL Duta, L Gheorghe, N Tapus - … , ICISSP 2016, Rome, Italy, February 19 …, 2017 - Springer
Nowadays, secure speech communications have become a fundamental issue, due to the
rapid development of digital communications and networking technologies. People want …

[PDF][PDF] Twin Concept for stream cipher algorithms

AO Ibadi - Journal of Baghdad College of Economic sciences …, 2015 - iasj.net
Twin algorithm is a new concept of designing stream cipher algorithm using well-known pre-
tested algorithms to immune the known plaintext attack and the correlation attack. In this …

Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors

CL Duta, L Gheorghe, N Tapus - International Conference on …, 2016 - scitepress.org
A large part of the latest research in speech coding and speech encryption algorithms is
motivated by the need of obtaining secure military communications, to allow effective …

Enhancement of Stream Ciphers Security Using DNA

B Ramesh, SA Bhavani, P Muralidhar - Proceedings of the Second …, 2016 - Springer
This paper considers the problem of cryptanalysis of cipher streams. There are some tasks
that improve the existing attacks and attempt to make eminent the partitions of ciphertext …