In our paper we are using the multiple
mapping techniques. Our proposed system provides
robustness across open/shared network. The Speech signals
are encrypted by means of various effective one
dimensional chaotic mapping techniques which provides
greater security. Various testing methods are employed to
estimate the efficiency of the system. The results from the
analysis show that our proposed system of Speech
encryption guarantees stronger protection against various
security attacks.
Today speech encryption is most important one to secure
the speech from various attacks. Since our system is
implemented with different chaotic maps like Logistic,
Quadratic and Sine mapping technique, it is more robust
and efficient than other existing systems.
[1] Y. Niu, X. Wang, “An anonymous key agreement
protocol based on chaotic maps”, Elsevier Journal on
Communication in Nonlinear Science and Numerical
Simulator 16 (2011) pp.13-15
[2] EmadMosa, Nagy W.Messiha, Osama Zahran, Fathi
E. Abd El-Samie, “Chaotic encryption of speech
signals”, International Journal of Speech Technology
(2011) pp.285-296
[3] Musheer Ahmad, Bashir Alam and Omar Farooq ,”
Chaos Based Mixed Keystream Generation for Voice
Data Encryption”, International Journal on
Cryptography and Information Security (2012) Vol.
2, No. 1, pp.36-45
[4] Dora M.BallesterosL, JuanM.Moreno A, “Real-time,
speech-in-speech hiding scheme based on least
significant bit substitution and adaptive key”,
Elsevier International Journal (2013)
[5] SK Hafizul Islam, “Design and analysis of a three
party password based authenticated key exchange
protocol using extended chaotic maps”, Elsevier
International Journal on Information Sciences (2015)
pp. 104-130
[6] Iasonas Kokkinos, Petros Maragos, “Nonlinear
Speech Analysis Using Models for Chaotic
Systems“, IEEE Transactions on Speech and Audio
Processing (2005)
[7] Howard M. Heys and Stafford E. Tavares,
“Avalanche Characteristics of Substitution-
Permutation Encryption Networks”, IEEE
transactions on computers (2005) vol.44, pp. 9
[8] Barboza R, “Dynamics of a hyper chaotic Lorenz
system”, Springer International Journal on
Bifurcation Chaos (2007) pp.4285–4294
[9] Azzaz MS, Tanougast C, Sadoudi S, Dandache A,
Monteiro F, “Real-time image encryption based
chaotic synchronized embedded cryptosystems”, 8th
IEEE international NEWCAS conference (2010) pp.
61–64
[10] Kumar KJJ, Salivahanan S, Reddy KCK,
“Implementation of low power scalable encryption
algorithm”, International Journal on Computer
Applications (2010) pp.14–18
[11] K. W. Tang, and W. K. S. Tang, “A Chaos-based
Secure Voice Communication System”,International
Conference on Industrial Technology (2005) pp.
571–576
[12] K. P. Man, K. W. Wong and K. F. Man, “Security
Enhancement on VoIP using Chaotic Cryptography”,
International Conference on Industrial Electronics
(2006) pp. 3703–3708
[13] Mosa E, Messiha NW, Zahran O, “Chaotic
encryption of speech signals in transform domains”,
International conference on computer engineering &
systems (2009) pp.300–305
[14] H. Tseng, R. Jan, W. Yang, “A chaotic maps-based
key agreement protocol that preserves user
anonymity”, IEEE International Conference in
Communications (ICC09) (2009) pp. 1–6
[15] Zhaopin Su, Jianguo Jiang, ShiguoLian, Donghui
Hu, Changyong Liang, Guofu Zhang, “Selective
Encryption for G.729 Speech Using Chaotic Maps”,
International Conference on Multimedia Information
Networking and Security, (2009) pp. 488- 492.