{"title":"Chaos based cryptography for voice encryption in wireless communication","authors":"S. Sadkhan, Ali Al-Sherbaz, R. S. Mohammed","doi":"10.1109/ICECCPCE.2013.6998760","DOIUrl":null,"url":null,"abstract":"The vast growths in mobile and wireless applications would contain lacks of using suitable security concepts during the development process which worries the information security research community. This paper reviews most of the encryption techniques which adopt chaos based cryptography, and illustrates the used of chaos based voice encryption techniques in wireless communication as well. The review in this paper summarized the traditional and modern techniques of voice/speech encryption and demonstrated the feasibility of adopting chaos based cryptography for in wireless communications.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCPCE.2013.6998760","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
The vast growths in mobile and wireless applications would contain lacks of using suitable security concepts during the development process which worries the information security research community. This paper reviews most of the encryption techniques which adopt chaos based cryptography, and illustrates the used of chaos based voice encryption techniques in wireless communication as well. The review in this paper summarized the traditional and modern techniques of voice/speech encryption and demonstrated the feasibility of adopting chaos based cryptography for in wireless communications.