Design and Implementation Voice Scrambling Model Based on Hybrid Chaotic Signals

Sattar B. Sadkhab, Ammar M. Raheema, Sinan M. Abdul Sattar
{"title":"Design and Implementation Voice Scrambling Model Based on Hybrid Chaotic Signals","authors":"Sattar B. Sadkhab, Ammar M. Raheema, Sinan M. Abdul Sattar","doi":"10.1109/CAS47993.2019.9075626","DOIUrl":null,"url":null,"abstract":"One of the most common theories used in cryptography is chaos theory, as it has sufficient encryption properties. Such properties can be used to analyse diffusion and confusion processes, which is one of cryptography's key features; a speech scrambling is an important tool in wireless communication systems for enhancing data security. The main target is achieving security to resist malicious eavesdroppers and attacks. This paper presents a speech scrambling model using three various chaotic maps/flows (standard map SM, Unified system US and Chen system CS). The use of the chaotic keys in scrambling techniques are to enhance the transmitted data security, which is strong over the effects of AWGN. Five different tests were included in the evaluation measures: cepstral distance dCD, Linear predict coding distance dLPC, Mean Square Error MSE, Entropy H, and Correlation Factor Rc. The important criteria are residual intelligibility of speech signal between the (original and scrambling/descrambling signal) for the proposed models. The results are good enough to protect the encryption signal of the brute force attack, and when applying a model, the results are being evaluated. The offered model was carried out using SIMULINK (R2018b) by using MATLAB.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 First International Conference of Computer and Applied Sciences (CAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAS47993.2019.9075626","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

One of the most common theories used in cryptography is chaos theory, as it has sufficient encryption properties. Such properties can be used to analyse diffusion and confusion processes, which is one of cryptography's key features; a speech scrambling is an important tool in wireless communication systems for enhancing data security. The main target is achieving security to resist malicious eavesdroppers and attacks. This paper presents a speech scrambling model using three various chaotic maps/flows (standard map SM, Unified system US and Chen system CS). The use of the chaotic keys in scrambling techniques are to enhance the transmitted data security, which is strong over the effects of AWGN. Five different tests were included in the evaluation measures: cepstral distance dCD, Linear predict coding distance dLPC, Mean Square Error MSE, Entropy H, and Correlation Factor Rc. The important criteria are residual intelligibility of speech signal between the (original and scrambling/descrambling signal) for the proposed models. The results are good enough to protect the encryption signal of the brute force attack, and when applying a model, the results are being evaluated. The offered model was carried out using SIMULINK (R2018b) by using MATLAB.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于混合混沌信号的语音置乱模型的设计与实现
混沌理论是密码学中最常用的理论之一,因为它具有足够的加密特性。这些属性可以用来分析扩散和混淆过程,这是密码学的关键特征之一;语音置乱是无线通信系统中提高数据安全性的重要手段。主要目标是实现安全,抵御恶意窃听和攻击。本文提出了一种基于三种不同混沌映射/流(标准映射SM、统一系统US和陈系统CS)的语音置乱模型。在加扰技术中使用混沌密钥是为了提高传输数据的安全性,这比AWGN的影响强。评价指标包括倒谱距离dCD、线性预测编码距离dLPC、均方误差MSE、熵H和相关因子Rc。对于所提出的模型,重要的标准是语音信号在(原始信号和置乱/解扰信号)之间的剩余可理解性。该结果足以保护暴力攻击的加密信号,并在应用模型时对结果进行了评估。利用MATLAB软件SIMULINK (R2018b)对所提供的模型进行了仿真。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Melanoma Skin Cancer Detection Based on ABCD Rule Three Prior and Double Prior Selection to Comparison Estimate Parameter Rayleigh Distribution under Data Type II Censoring Speaker identification using convolutional neural network for clean and noisy speech samples Surface Patch Detection of 3D Point Cloud Using Local Shape Descriptor The trade-off between security and quality using permutation and substitution techniques in speech scrambling system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1