Binary discrete cosine and Hartley transforms
S Bouguezel, MO Ahmad… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
In this paper, a systematic method for developing a binary version of a given transform by
using the Walsh-Hadamard transform (WHT) is proposed. The resulting transform …
using the Walsh-Hadamard transform (WHT) is proposed. The resulting transform …
[PDF][PDF] An overview of speech encryption techniques
H Kohad, VR Ingle, MA Gaikwad - International journal of Engineering …, 2012 - Citeseer
Speech scrambling techniques are used to scramble clear speech into unintelligible signal
in order to avoid eavesdropping. Analog scramblers are intended in applications where the …
in order to avoid eavesdropping. Analog scramblers are intended in applications where the …
[PDF][PDF] A puzzle solver and its application in speech descrambling
The security problem of speech communication has always been a demanding problem in
military and business areas. A common approach to realizing end-to-end security is the use …
military and business areas. A common approach to realizing end-to-end security is the use …
Image scrambling without bandwidth expansion
D Van De Ville, W Philips… - … on Circuits and …, 2004 - ieeexplore.ieee.org
Image-scrambling schemes are designed to render the image content unintelligible. Wyner
has proposed an elegant one-dimensional (1-D) scrambling scheme without bandwidth …
has proposed an elegant one-dimensional (1-D) scrambling scheme without bandwidth …
Multiuser wireless speech encryption using synchronized chaotic systems
This paper proposes a new and efficient chaos-based cryptosystem for multiuser speech
encryption. In this regards, Chua chaotic systems are added to the transmitters and receiver …
encryption. In this regards, Chua chaotic systems are added to the transmitters and receiver …
Secure communication method and apparatus and multimedia device employing the same
H Moon, HW Kim, SH Hwang - US Patent 10,530,571, 2020 - Google Patents
(57) ABSTRACT A secure communication apparatus may include a security module for
generating an encrypted bitstream by encrypting at least a portion of data forming a …
generating an encrypted bitstream by encrypting at least a portion of data forming a …
Speech privacy for modern mobile communication systems
JF de Andrade, MLR de Campos… - … on Acoustics, Speech …, 2008 - ieeexplore.ieee.org
Speech privacy techniques are used to scramble clear speech into an unintelligible signal in
order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have …
order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have …
Scrambling-based speech encryption via compressed sensing
L Zeng, X Zhang, L Chen, Z Fan, Y Wang - EURASIP Journal on …, 2012 - Springer
Conventional speech scramblers have three disadvantages, including heavy
communication overhead, signal features underexploitation, and low attack resistance. In …
communication overhead, signal features underexploitation, and low attack resistance. In …
Progressive audio scrambling in compressed domain
WQ Yan, WG Fu, MS Kankanhalli - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Audio scrambling can be employed to ensure confidentiality in audio distribution. We first
describe scrambling for raw audio using the discrete wavelet transform (DWT) first and then …
describe scrambling for raw audio using the discrete wavelet transform (DWT) first and then …
[PDF][PDF] Watermark with Fast Encryption for FPGA Based Secured Realtime Speech Communication
(FPGA) based secured speech communication system. Data-size is one of the major
concerns of cryptographic systems. To maintain same data-rate compression is performed at …
concerns of cryptographic systems. To maintain same data-rate compression is performed at …