咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Secret Key Optimization for Se... 收藏

Secret Key Optimization for Secure Speech Communications

作     者:Osama S.Faragallah Mahmoud Farouk Hala S.El-Sayed 

作者机构:Department of Information TechnologyCollege of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia Department of Computer Science and EngineeringFaculty of Electronic EngineeringMenoufia UniversityMenouf 32952Egypt Department of Electrical EngineeringFaculty of EngineeringMenoufia UniversityShebin El-Kom 32511Egypt 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2022年第72卷第8期

页      面:3025-3037页

核心收录:

学科分类:0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 0805[工学-材料科学与工程(可授工学、理学学位)] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:This study was funded by the Deanship of Scientific Research Taif University Researchers Supporting Project Number(TURSP-2020/08) Taif University Taif Saudi Arabia 

主  题:Audio cryptosystem chaotic baker map secret key size 

摘      要:This paper answers three essential questions for audio speech cryptosystems in time and discrete transform *** first question is,what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform *** second question is the relation between the number of sub-keys,the number of secret keys used,and the audio speech signal block’s ***,how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform *** audio cryptosystem discussed before in recent research is applied to answer the three previous *** simulation results and analysis answer all three questions;first,there is no specific,well-defined format or rule for sub-key values that must be used to get a better *** the second question,yes,there is a direct relationship between the number of applicable keys,number of available sub-keys,and block size of speech audio signal and formulated into a first-order *** the third question,each discrete transform domain has a specific acceptable range of sub-keys that imply a particular number of keys that can be used to get a better cryptosystem.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分