Binary discrete cosine and Hartley transforms

S Bouguezel, MO Ahmad… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
In this paper, a systematic method for developing a binary version of a given transform by
using the Walsh-Hadamard transform (WHT) is proposed. The resulting transform …

[PDF][PDF] An overview of speech encryption techniques

H Kohad, VR Ingle, MA Gaikwad - International journal of Engineering …, 2012 - Citeseer
Speech scrambling techniques are used to scramble clear speech into unintelligible signal
in order to avoid eavesdropping. Analog scramblers are intended in applications where the …

[PDF][PDF] A puzzle solver and its application in speech descrambling

YX Zhao, MC Su, ZL Chou, J Lee - … international conference on …, 2007 - researchgate.net
The security problem of speech communication has always been a demanding problem in
military and business areas. A common approach to realizing end-to-end security is the use …

Image scrambling without bandwidth expansion

D Van De Ville, W Philips… - … on Circuits and …, 2004 - ieeexplore.ieee.org
Image-scrambling schemes are designed to render the image content unintelligible. Wyner
has proposed an elegant one-dimensional (1-D) scrambling scheme without bandwidth …

Multiuser wireless speech encryption using synchronized chaotic systems

S Hashemi, MA Pourmina, S Mobayen… - International Journal of …, 2021 - Springer
This paper proposes a new and efficient chaos-based cryptosystem for multiuser speech
encryption. In this regards, Chua chaotic systems are added to the transmitters and receiver …

Secure communication method and apparatus and multimedia device employing the same

H Moon, HW Kim, SH Hwang - US Patent 10,530,571, 2020 - Google Patents
(57) ABSTRACT A secure communication apparatus may include a security module for
generating an encrypted bitstream by encrypting at least a portion of data forming a …

Speech privacy for modern mobile communication systems

JF de Andrade, MLR de Campos… - … on Acoustics, Speech …, 2008 - ieeexplore.ieee.org
Speech privacy techniques are used to scramble clear speech into an unintelligible signal in
order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have …

Scrambling-based speech encryption via compressed sensing

L Zeng, X Zhang, L Chen, Z Fan, Y Wang - EURASIP Journal on …, 2012 - Springer
Conventional speech scramblers have three disadvantages, including heavy
communication overhead, signal features underexploitation, and low attack resistance. In …

Progressive audio scrambling in compressed domain

WQ Yan, WG Fu, MS Kankanhalli - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Audio scrambling can be employed to ensure confidentiality in audio distribution. We first
describe scrambling for raw audio using the discrete wavelet transform (DWT) first and then …

[PDF][PDF] Watermark with Fast Encryption for FPGA Based Secured Realtime Speech Communication

HMD Kabir, S Anwar, ASM Ibrahim, ML Ali… - Consumer Electronics … - researchgate.net
(FPGA) based secured speech communication system. Data-size is one of the major
concerns of cryptographic systems. To maintain same data-rate compression is performed at …