2019
DOI: 10.36478/jeasci.2019.6392.6399
|View full text |Cite
|
Sign up to set email alerts
|

Speech Encryption Based on Zaslavsky Map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Two different "16 KHZ" frequency messages were used from the database, one of which included only vowels (voiced) speech, and the other included voiced and voiceless continuous speech. The statistical measures used to assess the performance of the system in the encryption and decryption processes included (SNR, SNRseg, fwSNRseg, CC, LLR) [25], [26], [27], the statistical measures in compression used included (CR, SNR, SSSNR, PSNR, MSE). The equations of these measures were [2], [9], [10], [28]…”
Section: Resultsmentioning
confidence: 99%
“…Two different "16 KHZ" frequency messages were used from the database, one of which included only vowels (voiced) speech, and the other included voiced and voiceless continuous speech. The statistical measures used to assess the performance of the system in the encryption and decryption processes included (SNR, SNRseg, fwSNRseg, CC, LLR) [25], [26], [27], the statistical measures in compression used included (CR, SNR, SSSNR, PSNR, MSE). The equations of these measures were [2], [9], [10], [28]…”
Section: Resultsmentioning
confidence: 99%
“…e diffusion operation is done through the permutation of rows and columns of A d (u, v) and permuted value is denoted as A p . Suppose (23,56,12) are initial values of chaotic sequence o; then, the first three rows of A d will be positioned at (23,56,12) rows of A p . e permuted value A p is acquired by row and column permutation on A d .…”
Section: Proposed Audio Encryption Algorithmmentioning
confidence: 99%
“…erefore, the development of audio encryption algorithms with low power consumption, high presence for real-time systems, and fast multimedia processing is a significant area in the current research arena [7][8][9][10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Speech cryptography literature has recently shown an increased utilization of chaos theory as well. For example, a speech cryptographic method -based on a combination of permutation and substitution of speech samples using a chaotic Zaslavsky map was developed by Yousif et al [12]. Their scheme demonstrated high-security features with low correlation.…”
Section: Introductionmentioning
confidence: 99%