Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Audio Encryption in Hand sets

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 40 - Number 6
Year of Publication: 2012
Authors:
A. V. Prabu
S. Srinivasarao
Tholada Apparao
M. Jaganmohan Rao
K. Babu Rao
10.5120/4964-7227

A V Prabu, S Srinivasarao, Tholada Apparao, Jaganmohan M Rao and Babu K Rao. Article: Audio Encryption in Hand sets. International Journal of Computer Applications 40(6):40-45, February 2012. Full text available. BibTeX

@article{key:article,
	author = {A. V. Prabu and S. Srinivasarao and Tholada Apparao and M. Jaganmohan Rao and K. Babu Rao},
	title = {Article: Audio Encryption in Hand sets},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {40},
	number = {6},
	pages = {40-45},
	month = {February},
	note = {Full text available}
}

Abstract

A novel method to encrypt audio(sound) stream of data by applying chaos is discussed. A pair of one-dimensional logistic maps is used for generating a chaotic sequence. The routine tests of encryption are performed and the results are observed. The proposed scheme is then implemented in real time on a mobile phone and the robustness of the idea is established.

References

  • K. Ganesan. K. Murali, R. Muthukumar, “Look-Up Table Based Chaotic Encryption of Audio Files”, IEEE Asia Pacific Conference on Circuits and Systems, 2006, pp. 1951-1954, APCCAS 2006.
  • M.S.Baptista, “Cryptography with chaos”, Physics Letters A, Vol. 240, pp. 50–54, 1998.
  • T. Yang, C.W. Wu and L.O. Chua, "Cryptography based on chaotic systems, “IEEE Transactions On Circuits & Sysems - I, Vol. 44, pp. 469-472, 1997.
  • Su Yong; Han Zhen; Luo Siwei; “A new method of the chaos encryption”, ICSP '98, Fourth International Conference on Signal Processing Proceedings, 1998, Vol.1, 12-16, pp. 233 – 236, Oct. 1998.
  • Luo, J.; Shi, H., “Research of Chaos Encryption Algorithm Based on Logistic Mapping”, IIH-MSP '06, International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2006, pp. 381-383, Dec 2006.
  • FIPS PUB 140-1 “Security requirements for cryptographic modules”, Federal Information Processing Standards Publication, 1994.
  • M.I. Sobhy and A.E.R. Shehata, “Methods of attacking chaotic encryption and Countermeasures”, IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 2, pp. 1001 – 1004, 7-11 May 2001.
  • Chin Yi Chee and Daolin Xu, “Secure digital communication using controlled projective synchronisation of chaos”, Chaos, Solitons & Fractals, Vol. 23, Issue 3, pp. 1063-1070, February 2005.
  • Xiaogang Wu, Hanping Hu and Baoliang Zhang, “Analyzing and improving a chaotic encryption method”, Chaos, Solitons & Fractals, Vol. 22, Issue 2, pp. 367-373, October 2004.
  • Kocarev, L., “Chaos-based cryptography: a brief overview”, IEEE Circuits and Systems Magazine, Vol. 1, Issue 3, pp. 6 – 21, 2001.
  • Nawal El-Fishawy and Osama Abu Zaid, “Quality of Encryption Measurement of Bitmap Images with RC6, MRC6 and Rijndael Block Cipher Algorithms”, International Journal of Network Security, Vol. 5, No. 3, pp. 241-251, Nov. 2007.
  • Ahmet Eskicioglu and Edward Delp, “An overview of multimedia content protection in consumer electronics devices”, Signal Processing Image Communication, Vol.16, pp.-681 – 699, 2001.
  • Ahmet Eskicioglu, John Town and Edward Delp, “Security of digital entertainment content from creation to consumption”, Signal Processing Image Communication, Vol.18, pp.-237 – 262, 2003.
  • M. Delgado-Restituto, M. Linan and A. Rodriguez-Vazquez, “CMOS 2.4pm chaotic oscillator: experimental verification of chaotic encryption of audio”, Electronics Letters, Vol. 32, Issue 9, pp.795-796, 1996.
  • Wenwu Yu and Jinde Cao, “Cryptography based on delayed chaotic neural networks”, Physics Letters A, Vol. 356, Issues 4-5, pp. 333-338, August 2006.
  • Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou and Yuanlong Cai, “Baptista-type chaotic cryptosystems: problems and countermeasures”, Physics Letters A, Vol. 332, Issue 5-6, pp 368-375, November 2004.
  • Yong Wang, Xiaofeng Liao, Tao Xiang, Kwok-Wo Wong and Degang Yang, “Cryptanalysis and improvement on a block cryptosystem based on iteration of a chaotic map”, Physics Letters A, Volume 363, Issue 4, pp 277-281, April 2007.