基于混合混沌信号的语音置乱模型的设计与实现

Sattar B. Sadkhab, Ammar M. Raheema, Sinan M. Abdul Sattar
{"title":"基于混合混沌信号的语音置乱模型的设计与实现","authors":"Sattar B. Sadkhab, Ammar M. Raheema, Sinan M. Abdul Sattar","doi":"10.1109/CAS47993.2019.9075626","DOIUrl":null,"url":null,"abstract":"One of the most common theories used in cryptography is chaos theory, as it has sufficient encryption properties. Such properties can be used to analyse diffusion and confusion processes, which is one of cryptography's key features; a speech scrambling is an important tool in wireless communication systems for enhancing data security. The main target is achieving security to resist malicious eavesdroppers and attacks. This paper presents a speech scrambling model using three various chaotic maps/flows (standard map SM, Unified system US and Chen system CS). The use of the chaotic keys in scrambling techniques are to enhance the transmitted data security, which is strong over the effects of AWGN. Five different tests were included in the evaluation measures: cepstral distance dCD, Linear predict coding distance dLPC, Mean Square Error MSE, Entropy H, and Correlation Factor Rc. The important criteria are residual intelligibility of speech signal between the (original and scrambling/descrambling signal) for the proposed models. The results are good enough to protect the encryption signal of the brute force attack, and when applying a model, the results are being evaluated. The offered model was carried out using SIMULINK (R2018b) by using MATLAB.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Design and Implementation Voice Scrambling Model Based on Hybrid Chaotic Signals\",\"authors\":\"Sattar B. Sadkhab, Ammar M. Raheema, Sinan M. Abdul Sattar\",\"doi\":\"10.1109/CAS47993.2019.9075626\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most common theories used in cryptography is chaos theory, as it has sufficient encryption properties. Such properties can be used to analyse diffusion and confusion processes, which is one of cryptography's key features; a speech scrambling is an important tool in wireless communication systems for enhancing data security. The main target is achieving security to resist malicious eavesdroppers and attacks. This paper presents a speech scrambling model using three various chaotic maps/flows (standard map SM, Unified system US and Chen system CS). The use of the chaotic keys in scrambling techniques are to enhance the transmitted data security, which is strong over the effects of AWGN. Five different tests were included in the evaluation measures: cepstral distance dCD, Linear predict coding distance dLPC, Mean Square Error MSE, Entropy H, and Correlation Factor Rc. The important criteria are residual intelligibility of speech signal between the (original and scrambling/descrambling signal) for the proposed models. The results are good enough to protect the encryption signal of the brute force attack, and when applying a model, the results are being evaluated. The offered model was carried out using SIMULINK (R2018b) by using MATLAB.\",\"PeriodicalId\":202291,\"journal\":{\"name\":\"2019 First International Conference of Computer and Applied Sciences (CAS)\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 First International Conference of Computer and Applied Sciences (CAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CAS47993.2019.9075626\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 First International Conference of Computer and Applied Sciences (CAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAS47993.2019.9075626","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

混沌理论是密码学中最常用的理论之一,因为它具有足够的加密特性。这些属性可以用来分析扩散和混淆过程,这是密码学的关键特征之一;语音置乱是无线通信系统中提高数据安全性的重要手段。主要目标是实现安全,抵御恶意窃听和攻击。本文提出了一种基于三种不同混沌映射/流(标准映射SM、统一系统US和陈系统CS)的语音置乱模型。在加扰技术中使用混沌密钥是为了提高传输数据的安全性,这比AWGN的影响强。评价指标包括倒谱距离dCD、线性预测编码距离dLPC、均方误差MSE、熵H和相关因子Rc。对于所提出的模型,重要的标准是语音信号在(原始信号和置乱/解扰信号)之间的剩余可理解性。该结果足以保护暴力攻击的加密信号,并在应用模型时对结果进行了评估。利用MATLAB软件SIMULINK (R2018b)对所提供的模型进行了仿真。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Design and Implementation Voice Scrambling Model Based on Hybrid Chaotic Signals
One of the most common theories used in cryptography is chaos theory, as it has sufficient encryption properties. Such properties can be used to analyse diffusion and confusion processes, which is one of cryptography's key features; a speech scrambling is an important tool in wireless communication systems for enhancing data security. The main target is achieving security to resist malicious eavesdroppers and attacks. This paper presents a speech scrambling model using three various chaotic maps/flows (standard map SM, Unified system US and Chen system CS). The use of the chaotic keys in scrambling techniques are to enhance the transmitted data security, which is strong over the effects of AWGN. Five different tests were included in the evaluation measures: cepstral distance dCD, Linear predict coding distance dLPC, Mean Square Error MSE, Entropy H, and Correlation Factor Rc. The important criteria are residual intelligibility of speech signal between the (original and scrambling/descrambling signal) for the proposed models. The results are good enough to protect the encryption signal of the brute force attack, and when applying a model, the results are being evaluated. The offered model was carried out using SIMULINK (R2018b) by using MATLAB.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信