{"title":"使用简单的 Put_operation 和 Get_operation 对语音信号加密进行详细研究","authors":"","doi":"10.59018/1223310","DOIUrl":null,"url":null,"abstract":"Protecting digital speech files is an important issue. In this paper's research, a simplified method of speech file cryptography will be provided, and the encryption and decryption functions will require a reduced number of operations. The encryption function will perform a put_operation to reorder the speech sample to get the encrypted file, while the decryption function will perform a get_operation to reorder the encrypted samples to get the decrypted speech file; these operations will be implemented based on the generated secret indices key. The Put and get operations will affect the speech file by recording the samples keeping the histograms of the speech files (source, encrypted, and decrypted) the same and without any changes. The secret key generation phase will be analyzed for efficiency purposes, and two methods will be presented: The first one will use the chaotic logistic map model to generate the secret indices key, while the second method will use a selected secret image to generate the secret indices key, both methods will be tested and examined to give some recommendations for the users. Each of the introduced methods will provide a high level of security, the private keys will provide a huge key space and they will be very sensitive to resist any hacking attacks. The quality, sensitivity, security, and speed of the proposed methods will be examined, the method will be tested and implemented, and the obtained results will be analyzed to prove the achievements provided by the proposed method.","PeriodicalId":38652,"journal":{"name":"ARPN Journal of Engineering and Applied Sciences","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A detailed study of speech signal cryptography using simple Put _operation and Get_operation\",\"authors\":\"\",\"doi\":\"10.59018/1223310\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Protecting digital speech files is an important issue. In this paper's research, a simplified method of speech file cryptography will be provided, and the encryption and decryption functions will require a reduced number of operations. The encryption function will perform a put_operation to reorder the speech sample to get the encrypted file, while the decryption function will perform a get_operation to reorder the encrypted samples to get the decrypted speech file; these operations will be implemented based on the generated secret indices key. The Put and get operations will affect the speech file by recording the samples keeping the histograms of the speech files (source, encrypted, and decrypted) the same and without any changes. The secret key generation phase will be analyzed for efficiency purposes, and two methods will be presented: The first one will use the chaotic logistic map model to generate the secret indices key, while the second method will use a selected secret image to generate the secret indices key, both methods will be tested and examined to give some recommendations for the users. Each of the introduced methods will provide a high level of security, the private keys will provide a huge key space and they will be very sensitive to resist any hacking attacks. The quality, sensitivity, security, and speed of the proposed methods will be examined, the method will be tested and implemented, and the obtained results will be analyzed to prove the achievements provided by the proposed method.\",\"PeriodicalId\":38652,\"journal\":{\"name\":\"ARPN Journal of Engineering and Applied Sciences\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-02-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ARPN Journal of Engineering and Applied Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.59018/1223310\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ARPN Journal of Engineering and Applied Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.59018/1223310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
A detailed study of speech signal cryptography using simple Put _operation and Get_operation
Protecting digital speech files is an important issue. In this paper's research, a simplified method of speech file cryptography will be provided, and the encryption and decryption functions will require a reduced number of operations. The encryption function will perform a put_operation to reorder the speech sample to get the encrypted file, while the decryption function will perform a get_operation to reorder the encrypted samples to get the decrypted speech file; these operations will be implemented based on the generated secret indices key. The Put and get operations will affect the speech file by recording the samples keeping the histograms of the speech files (source, encrypted, and decrypted) the same and without any changes. The secret key generation phase will be analyzed for efficiency purposes, and two methods will be presented: The first one will use the chaotic logistic map model to generate the secret indices key, while the second method will use a selected secret image to generate the secret indices key, both methods will be tested and examined to give some recommendations for the users. Each of the introduced methods will provide a high level of security, the private keys will provide a huge key space and they will be very sensitive to resist any hacking attacks. The quality, sensitivity, security, and speed of the proposed methods will be examined, the method will be tested and implemented, and the obtained results will be analyzed to prove the achievements provided by the proposed method.
期刊介绍:
ARPN Journal of Engineering and Applied Sciences (ISSN 1819-6608) is an online peer-reviewed International research journal aiming at promoting and publishing original high quality research in all disciplines of engineering sciences and technology. All research articles submitted to ARPN-JEAS should be original in nature, never previously published in any journal or presented in a conference or undergoing such process across the globe. All the submissions will be peer-reviewed by the panel of experts associated with particular field. Submitted papers should meet the internationally accepted criteria and manuscripts should follow the style of the journal for the purpose of both reviewing and editing. Our mission is -In cooperation with our business partners, lower the world-wide cost of research publishing operations. -Provide an infrastructure that enriches the capacity for research facilitation and communication, among researchers, college and university teachers, students and other related stakeholders. -Reshape the means for dissemination and management of information and knowledge in ways that enhance opportunities for research and learning and improve access to scholarly resources. -Expand access to research publishing to the public. -Ensure high-quality, effective and efficient production and support good research and development activities that meet or exceed the expectations of research community. Scope of Journal of Engineering and Applied Sciences: -Engineering Mechanics -Construction Materials -Surveying -Fluid Mechanics & Hydraulics -Modeling & Simulations -Thermodynamics -Manufacturing Technologies -Refrigeration & Air-conditioning -Metallurgy -Automatic Control Systems -Electronic Communication Systems -Agricultural Machinery & Equipment -Mining & Minerals -Mechatronics -Applied Sciences -Public Health Engineering -Chemical Engineering -Hydrology -Tube Wells & Pumps -Structures