speech encryption
Recently Published Documents


TOTAL DOCUMENTS

87
(FIVE YEARS 27)

H-INDEX

10
(FIVE YEARS 3)

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Qiuyu Zhang ◽  
Zhenyu Zhao ◽  
Minrui Fu

In order to ensure the confidentiality and secure sharing of speech data, and to solve the problems of slow deployment of attribute encryption systems and fine-grained access control in cloud storage, a speech encryption scheme based on ciphertext policy hierarchical attributes was proposed. First, perform hierarchical processing of the attributes of the speech data to reflect the hierarchical structure and integrate the hierarchical access structure into a single-access structure. Second, use the attribute fast encryption framework to construct the attribute encryption scheme of the speech data, and use the integrated access to the speech data; thus, the structure is encrypted and uploaded to the cloud for storage and sharing. Finally, use the hardness of decisional bilinear Diffie–Hellman (DBDH) assumption to prove that the proposed scheme is secure in the random oracle model. The theoretical security analysis and experimental results show that the proposed scheme can achieve efficient and fine-grained access control and is secure and extensible.


TEM Journal ◽  
2021 ◽  
pp. 1429-1434
Author(s):  
Sarah Mohammed Abdullah ◽  
Iman Qays Abduljaleel

This paper proposes the establishment of a secure encryption system for data transmission that includes three stages: first stage is a scrambling stage that is divided into scrambling of different sizes blocks and scrambling bits, the second stage is the use of DNA code to flip the bits and the third stage is the encryption using the Substitution box by 256 keys. The scheme is analysed using a variety of metrics. The findings demonstrate that the proposed system is significantly more reliable and robust against various forms of attacks than several recent related speech signal encryption systems.


Author(s):  
A.D. Buhantsov ◽  
◽  
A.Yu. Sadjiid ◽  
A.N. Ustinov ◽  
C.V. Rodionov ◽  
...  

Author(s):  
Obaida M. Al-hazaimeh

Over the past few decades, many algorithms have been proposed to improve the performance of speech encryption over un-secure channel (i.e., Internet). In this paper, the security level was enhanced using a dynamic dual chaotic based on Hénon chaotic map. In the proposed algorithm, the speech elements are shuffled in a random fashion. Moreover, when both Hénon state variables are free to be used for shuffling the index is toggled randomly between them according to toggle bit. After index shuffling each speech element is modified with XOR operation between the original speech element value and the key that is selected randomly from the updated key table. The same chaotic map is used to initiate the empty or full table and provide new table entries from the values that are already shuffled. The experimental results show that the proposed crypto-system is simple, fast with extra random toggling behavior. The high order of substitution make it sensitive to initial condition, common cryptanalysis attacks such as linear and differential attacks are infeasible.


Author(s):  
Somayeh Hashemi ◽  
Mohammad Ali Pourmina ◽  
Saleh Mobayen ◽  
Mahdi R. Alagheband

2021 ◽  
Vol 10 (1) ◽  
pp. 160-170
Author(s):  
Amal Hameed Khaleel ◽  
Iman Qays Abduljaleel

In information transmission such as speech information, higher security and confidentiality are specially required. Therefore, data encryption is a pre-requisite for a secure communication system to protect such information from unauthorized access. A new algorithm for speech encryption is introduced in this paper. It depends on the quantum chaotic map and k-means clustering, which are employed in keys generation. Also, two stages of scrambling were used: the first relied on bits using the proposed algorithm (binary representation scrambling BiRS) and the second relied on k-means using the proposed algorithm (block representation scrambling BlRS). The objective test used statistical analysis measures (signal-to-noise-ratio, segmental signal-to-noise-ratio, frequency-weighted signal-to-noise ratio, correlation coefficient, log-likelihood ratio) applied to evaluate the proposed system. Via MATLAB simulations, it is shown that the proposed technique is secure, reliable and efficient to be implemented in secure speech communication, as well as also being characterized by high clarity of the recovered speech signal.


Author(s):  
Gurvir Kaur ◽  
Kuldeepak Singh ◽  
Harsimranjit Singh Gill

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Mohammed F. Tolba ◽  
Hani Saleh ◽  
Yousuf Alsalami ◽  
Mahmoud Al-Qutayri ◽  
Baker Mohammad

Sign in / Sign up

Export Citation Format

Share Document