A proposed speech scrambling based on hybrid chaotic key generators
暂无分享,去创建一个
[1] Jing Liu,et al. A Speech Chaotic Encryption Algorithm Based on Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[2] Predrag Cvitanović. A Two-dimensional Mapping with a Strange Attractor , 2017 .
[3] Jacques M. Bahi,et al. Improving random number generators by chaotic iterations application in data hiding , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[4] Bashir Alam,et al. Chaos Based Mixed Keystream Generation for Voice Data Encryption , 2014, ArXiv.
[5] Marc Theberge. Security evaluation of transform domain speech scramblers , 1996 .
[6] Jaafar Qassim Kadhim جعفر قاسم كاظم,et al. Speech Scrambling Employing Lorenz Fractional Order Chaotic System , 2013 .
[7] Larry A. Pace,et al. Beginning R: An Introduction to Statistical Programming , 2012 .
[8] Nagy W. Messiha,et al. Chaotic encryption of speech signals in transform domains , 2009, 2009 International Conference on Computer Engineering & Systems.
[9] M. Hénon,et al. A two-dimensional mapping with a strange attractor , 1976 .
[10] Sattar B. Sadkhan,et al. Proposed Random Unified Chaotic Map as PRBG for Voice Encryption in Wireless Communication , 2015 .
[11] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[12] Georgiana Mateescu,et al. A hybrid approach of system security for small and medium enterprises: Combining different cryptography techniques , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[13] Wieslaw Marszalek,et al. A hybrid chaos-based pseudo-random bit generator in VHDL-AMS , 2014, 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS).
[14] Yihong Du,et al. The Logistic Equation , 2006 .
[15] Sattar B. Sadkhan Al Maliky,et al. Chaos-Based Cryptography for Voice Secure Wireless Communication , 2014 .
[16] Varghese Paul,et al. A Hybrid Crypto System based on a new Circle- Symmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications , 2011 .
[17] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..