{"title":"An iterative speech encryption scheme based on subspace technique","authors":"Atef Mermoul","doi":"10.1109/WOSSPA.2011.5931512","DOIUrl":null,"url":null,"abstract":"Among the cryptographic approaches, signal processing techniques has become recently an interesting one. Blind source separation (BSS)-based encryption schemes have been built up using the intractability of the under determined BSS problem. In this paper, we propose a new encryption method. The proposed approach is iterative and based on the subspace concept together with the use of nonlinear functions and key signals. The proposed technique presents an interesting feature: only a part of the secret key parameters used during encryption is necessary for decryption. Furthermore, the iterative encryption algorithm will provide no contents if no plain-text is fed in the input.","PeriodicalId":343415,"journal":{"name":"International Workshop on Systems, Signal Processing and their Applications, WOSSPA","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Workshop on Systems, Signal Processing and their Applications, WOSSPA","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOSSPA.2011.5931512","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Among the cryptographic approaches, signal processing techniques has become recently an interesting one. Blind source separation (BSS)-based encryption schemes have been built up using the intractability of the under determined BSS problem. In this paper, we propose a new encryption method. The proposed approach is iterative and based on the subspace concept together with the use of nonlinear functions and key signals. The proposed technique presents an interesting feature: only a part of the secret key parameters used during encryption is necessary for decryption. Furthermore, the iterative encryption algorithm will provide no contents if no plain-text is fed in the input.