scholarly journals A NOVEL METHOD FOR GENERATING DIGITAL IMAGE OF ENCRYPTED SPEECH SIGNAL BASED ON FWHT AND WPLCM

2021 ◽  
Vol 03 (04) ◽  
pp. 35-46
Author(s):  
Alyaa M. Abdul MAJEED

This paper suggests a novel algorithm for encrypting speech signals in common image formats and retrieve them from these image files. The speech signal is encrypted in three levels. In the first level,the sample positions are permuted based on keys generated using Game of Life matrix and Piecewise linear Chaotic Map (PWLCM) in order to reduce the correlation between adjust samples. In the second level, the resulting samples are then converted to Fast Walsh Hadamard Transform (FWHT) and their transactions are encrypted by using circular transformations in the row and column depending on the generated key. At the third level, the values of encrypted samples are converted to color pixels, which are then arranged in a puzzled manner and put in a 2-D matrix to achieve the secured data transfer across networks, with the image file contains the encrypted speech signal. Several objective measures have been used to evaluate the performance of the suggested method. The experimental results and numerical analyses show that the algorithm gives a high degree of security and robust against brute force attackers, statistical attack, strong diffusion and ambiguity so that the encrypted message has been saved in a different format from the original signal, and finally give the good quality of the reconstructed speech signal from image files.

2012 ◽  
Vol 22 (10) ◽  
pp. 1250256 ◽  
Author(s):  
QIUZHEN LIN ◽  
KWOK-WO WONG ◽  
JIANYONG CHEN

Making use of the Lebesgue measure preserving property of the piecewise linear chaotic map, a discrete piecewise linear chaotic map is employed to perform the generalized arithmetic coding, which is an optimal entropy coding algorithm adopted by international standards. After a number of message symbols have been encoded by the reverse interval mapping, an enlargement on the encoding interval is performed and some codeword bits are exported accordingly. Based on the enlarged encoding interval, the subsequent symbols are encoded with the modified chaotic maps, the lower and upper bounds of which are determined by the final encoding interval of the symbols already encoded. In the decoding process, the message symbols are recovered by iterating the corresponding chaotic map from an appropriate initial value. The encoding interval enlargement is tracked by performing reverse interval mapping on the decoded symbols. More codeword bits are shifted into the register to form the initial value for decoding the subsequent symbols. Simulation results verify that the compression performance of our scheme is very close to the entropy bound and is comparable to traditional finite-precision arithmetic coding. In addition, cryptographic capability can be integrated into our scheme to make it a joint compression and encryption scheme. Its security is enhanced when compared with the existing schemes based on traditional arithmetic coding.


2016 ◽  
Vol 13 (10) ◽  
pp. 7137-7143
Author(s):  
Bin Wang ◽  
Shihua Zhou ◽  
Changjun Zhou ◽  
Xuedong Zheng

Due to the features of chaotic maps, they are widely used into encrypting and coding information. Inspired by the tent map which is used to code and encrypt binary data, a novel joint for image encryption and coding based on piecewise linear chaotic map is proposed in this paper. We divide piecewise linear chaotic map into 256 parts according to the property of gray level image. In order to enhance the security of image, the image is subsequently encrypted by the piecewise linear chaotic map in which the secret key of image encryption is determined by the initial of chaotic map. This stage of image encryption possesses high key and plain-image sensitivities which results from the secret key related to plain-image. Finally, the encrypted image is coded by the piecewise linear chaotic map with a different initial value. The experimental results validate the effect of the proposed system and demonstrate that the encrypted and coded image is secure for transmission.


1998 ◽  
Vol 58 (6) ◽  
pp. 8009-8012 ◽  
Author(s):  
Sitabhra Sinha ◽  
Bikas K. Chakrabarti

2014 ◽  
Vol 6 (2) ◽  
pp. 1-22
Author(s):  
Lin Gao ◽  
Tiegang Gao

A novel medical image tamper detection and recovery scheme based on Least Significant Bit (LSB) embedding and Piecewise Linear Chaotic Map (PWLCM) is proposed in the paper. To meet the demand of medical usage, the proposed scheme not only improved the precision of detection compared with block-wise scheme of watermark embedding, but also guaranteed the security of the scheme by applying PWLCM. To evaluate the proposed scheme, a former scheme proposed by Xiao et al is used for comparison; the two scheme's visual quality, accuracy of detection, recovery quality and security are tested during the experiment. The experimental results suggest that the proposed scheme meets the demand of visual quality and security for using in medical image tamper detection and recovery.


Author(s):  
Sharifah Azma Syed Mustaffa ◽  
Ismail Musirin ◽  
Mohd. Murthada Othman ◽  
Mohd. Helmi Mansor

<p>Due to environmental concern and certain constraint on building a new power plant, renewable energy particularly distributed generation photovoltaic (DGPV) has becomes one of the promising sources to cater the increasing energy demand of the power system. Furthermore, with appropriate location and sizing, the integration of DGPV to the grid will enhance the voltage stability and reduce the system losses. Hence, this paper proposed a new algorithm for DGPV optimal location and sizing of a transmission system based on minimization of Fast Voltage Stability Index (FVSI) with considering the system constraints. Chaotic Mutation Immune Evolutionary Programming (CMIEP) is developed by integrating the piecewise linear chaotic map (PWLCM) in the mutation process in order to increase the convergence rate of the algorithm. The simulation was applied on the IEEE 30 bus system with a variation of loads on Bus 30. The simulation results are also compared with Evolutionary Programming (EP) and Chaotic Evolutionary Programming (CEP) and it is found that CMIEP performed better in most of the cases.</p>


Sign in / Sign up

Export Citation Format

Share Document