2020
DOI: 10.1016/j.apacoust.2020.107481
|View full text |Cite
|
Sign up to set email alerts
|

Self-generated encryption model of acoustics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 22 publications
0
4
0
1
Order By: Relevance
“…Histogram analysis graph of the stone imageThe histogram contains valuable statistical data on the image and also finds relevance in other applications like image compression and segmentation. Images that are encrypted should have a consistently balanced histogram as stated in literatures[8,9]. Figures3 and 4, we display sample images in their original, encrypted, and decrypted formats.…”
mentioning
confidence: 87%
See 2 more Smart Citations
“…Histogram analysis graph of the stone imageThe histogram contains valuable statistical data on the image and also finds relevance in other applications like image compression and segmentation. Images that are encrypted should have a consistently balanced histogram as stated in literatures[8,9]. Figures3 and 4, we display sample images in their original, encrypted, and decrypted formats.…”
mentioning
confidence: 87%
“…The author proposed a scheme, which is generating 256 bits keys based on human voice or speech data and demonstrated that the proposed scheme passed 13 NIST tests [8]. In literature [9], a random bit sequence generated by using acoustic data as the entropy source. Audio encryption was performed with a sequence generated.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Information encryption is to use mathematical or physical means to protect electronic information in the process of transmission and storage for preventing leakage. Essentially, encryption is the conversion of data through cipher arithmetic, which makes that no one can understand a message without the correct key [6][7][8][9][10]. Information security is usually achieved by information encryption technology.…”
Section: Introductionmentioning
confidence: 99%
“…İstenilen tasarım türüne göre tercih yapılması ve rastgele sayı üreteci türünün seçilmesi gerekir. [25][26][27][28][29].…”
unclassified