کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
4955716 | 1364640 | 2017 | 8 صفحه PDF | دانلود رایگان |
عنوان انگلیسی مقاله ISI
Securing digital voice communication using non-autonomous modulated chaotic signal
ترجمه فارسی عنوان
برقراری ارتباط صوتی دیجیتال با استفاده از سیگنال بی نظم مدولاسیون غیر وابسته
دانلود مقاله + سفارش ترجمه
دانلود مقاله ISI انگلیسی
رایگان برای ایرانیان
کلمات کلیدی
رمزگذاری صوتی، مدولاسیون هرج و مرج، مدولای غیر مستقل، جریان لرزان هرج و مرج، جی چی جالب
موضوعات مرتبط
مهندسی و علوم پایه
مهندسی کامپیوتر
شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی
In this paper, we present an encryption approach for voice communication systems based on direct chaotic modulation (non-autonomous modulation), in which voice is injected into one variable of the master system (using either Lorenz chaotic flow or Qi hyperchaotic flow) without changing the value of any control parameter. This approach is based on the change of chaotic signal by injecting voice samples into one variable in chaotic system and hence generating a new chaotic signal. The voice signal is then extracted from the chaotic signal in the receiver side. Furthermore, we use a high dimension chaotic flow which increases the security of the encrypted signal. Non-autonomous modulation technique is suitable for secure real-time applications. We also presented a comparative study between the two approaches with their conventional chaotic masking counterparts. Experimental results show that non-autonomous methods give better performance than their chaotic masking counterparts when they are analyzed against Signal-to-Noise-Ratio (â38.55Â dB vs. 38.51Â dB and 59.22Â dB vs. 58.11Â dB), Segmental signal-to-Noise-Ratio (38.91Â dB vs. 38.84Â dB and 54.20Â dB vs. 53.16Â dB), Log-Likelihood Ratio (0.88Â vs. 0.80 and 1.59Â vs. 1.50), and Correlation Coefficient Analysis (0.0345Â vs. 0.021 and 0.0002Â vs. 0.01012). Statistical analyses show that the second proposed approach has the best results for the encrypted signal. Modifying conventional chaotic approaches increases the security of the encryption system.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Information Security and Applications - Volume 34, Part 2, June 2017, Pages 243-250
Journal: Journal of Information Security and Applications - Volume 34, Part 2, June 2017, Pages 243-250
نویسندگان
Mahmoud F. Abd Elzaher, Mohamed Shalaby, Yasser Kamal, Salwa El Ramly,