A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture
暂无分享,去创建一个
[1] S. Ramakrishnan,et al. Speech encryption using chaotic shift keying for secured speech communication , 2017, EURASIP J. Audio Speech Music. Process..
[2] Stefan Katzenbeisser,et al. Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[3] Ayman M. Abdalla,et al. An Audio Shuffle-Encryption Algorithm , 2014 .
[4] Krasimir Kordov,et al. Using Circle Map for Audio Encryption Algorithm , 2017 .
[5] Krasimir Kordov. Modified pseudo-random bit generation scheme based on two circle maps and XOR function , 2015 .
[6] Juliano B. Lima,et al. Audio encryption based on the cosine number transform , 2016, Multimedia Tools and Applications.
[7] Borislav Stoyanov,et al. Using circle map in pseudorandom bit generation , 2014 .
[8] A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application , 2001 .
[9] Eman Hato,et al. Lorenz and Rossler Chaotic System for Speech Signal Encryption , 2015 .
[10] J. Abdul Samath,et al. Cryptographically Secure Diffusion Sequences—An Attempt to Prove Sequences Are Random , 2019 .
[11] Christos Skiadas. Mathematical Models of Chaos , 2005 .
[12] Hongjun Liu,et al. Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys , 2016 .
[13] Krasimir Kordov. Modified Chebyshev map based pseudo-random bit generator , 2014 .
[14] James Demmel,et al. IEEE Standard for Floating-Point Arithmetic , 2008 .
[15] SOCIETY , 2008, Society.
[16] H. Rohling,et al. Comparison of Two Algorithms for Signal Detection in Pulsarbased FSR , 2018, 2018 19th International Radar Symposium (IRS).
[17] K. Kordov,et al. Signature Attractor Based Pseudorandom Generation Algorithm , 2015 .
[18] Dmitriy A. Belkin,et al. Novel normalization technique for chaotic Pseudo-random number generators based on semi-implicit ODE solvers , 2017, 2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS).
[19] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[20] Christos H. Skiadas,et al. Chaotic Modelling and Simulation: Analysis of Chaotic Models, Attractors and Forms , 2008 .
[21] Borislav Stoyanov,et al. Pseudo-random bit generation algorithm based on Chebyshev polynomial and Tinkerbell map , 2014 .