Audio encryption using two chaotic map based dynamic diffusion and double DNA encoding

A Kumar, M Dua - Applied Acoustics, 2023 - Elsevier
A large amount of data in the form of audios are communicated all over the world. However,
the attacker can steal this data, and then misuse this information. Hence, it is necessary to …

A multilayered audio signal encryption approach for secure voice communication

HA Abdallah, S Meshoul - Electronics, 2022 - mdpi.com
In this paper, multilayer cryptosystems for encrypting audio communications are proposed.
These cryptosystems combine audio signals with other active concealing signals, such as …

Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-based Cryptography, and Chaotic Cryptography Techniques

AA Pekerti, A Sasongko, A Indrayanto - IEEE Access, 2024 - ieeexplore.ieee.org
Secure end-to-end voice communication is crucial, but it has several issues. Researchers in
this field can benefit from a review paper with broader evaluation parameters than existing …

An innovative approach based on optimization for the determination of initial conditions of continuous-time chaotic system as a random number generator

G Yildirim, E Tanyildizi - Chaos, Solitons & Fractals, 2023 - Elsevier
Security has been one of the important problems in the processing, storage and
transmission of information. The transfer of information to virtual environments with …

Fractional photodamage triggered by chaotic attractors in human lung epithelial cancer cells

H Martines-Arano, S Palacios-Barreto… - International Journal of …, 2022 - Elsevier
Modification in thermal transfer mechanisms induced by light in human lung epithelial
cancer cells was experimentally controlled by chaotic attractors dependent on optical …

New secure and efficient substitution and permutation method for audio encryption algorithm

EA Albahrani, TK Alshekly, SH Lafta - The Journal of Supercomputing, 2023 - Springer
A new substitution and permutation method for the encryption/decryption of two-channel
audio files based on chaotic maps is presented. The proposed scheme's structure depends …

A secure healthcare data sharing scheme based on two-dimensional chaotic mapping and blockchain

Z Xu, E Zheng, H Han, X Dong, X Dang, Z Wang - Scientific Reports, 2024 - nature.com
Enhancing data privacy security in medical data sharing is crucial for the informatization
development in the healthcare sector. This paper proposes a healthcare data sharing …

The role of analog signal processing in upcoming telecommunication systems: Concept, challenges, and outlook

MM Safari, J Pourrostam - Signal Processing, 2024 - Elsevier
With the increasing demands in modern communications, the concepts of energy-efficient
and low-cost processors have received a lot of attention from researchers in recent years …

Multilayer symmetric and asymmetric technique for audiovisual cryptography

A Parekh, M Antani, K Suvarna, R Mangrulkar… - Multimedia Tools and …, 2024 - Springer
In order to ensure the secure transmission and storage of video content, this research work
provides a video encryption algorithm using symmetric and asymmetric encryption methods …

[PDF][PDF] Evaluation of rijndael algorithm for audio encryption by brute force attack

SG Mohammed, NS Al-Mothafar - Journal of Engineering, 2024 - iasj.net
The use of information transfer is a major reason for the spread of information piracy,
especially digital information that includes audio or other information, to preserve data …