2012
DOI: 10.5120/4964-7227
|View full text |Cite
|
Sign up to set email alerts
|

Audio Encryption in Hand sets

Abstract: A novel method to encrypt audio(sound) stream of data by applying chaos is discussed. A pair of one-dimensional logistic maps is used for generating a chaotic sequence. The routine tests of encryption are performed and the results are observed. The proposed scheme is then implemented in real time on a mobile phone and the robustness of the idea is established.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…That means any change even if very slight change in the starting condition lead to make change in output of the system, this called the sensitivity of the initial state [10]. Lorenz system has the characteristic of the chaotic system which mathematically represented in the three dimensional equations as the following [11]:…”
Section: Lorenz Systemmentioning
confidence: 99%
“…That means any change even if very slight change in the starting condition lead to make change in output of the system, this called the sensitivity of the initial state [10]. Lorenz system has the characteristic of the chaotic system which mathematically represented in the three dimensional equations as the following [11]:…”
Section: Lorenz Systemmentioning
confidence: 99%
“…The output values of chaotic systems vary depending on specific parameters and initial conditions. Different parameter values yield different periods of oscillations at the output of the systems [5].…”
Section: Chaotic Systemmentioning
confidence: 99%
“…Encryption manages mixed the substance of a safe message to make it disjointed or undecipherable for any unapproved individual or program. Where decryption is a process of converting the encrypted message to its identical plaintext [3,4].…”
Section: Introductionmentioning
confidence: 99%