Chaotic based multimedia encryption: a survey for network and internet security

OM Al-Hazaimeh, AA Abu-Ein, MM Al-Nawashi… - Bulletin of Electrical …, 2022 - beei.org
Nowadays the security of multimedia data storage and transfer is becoming a major
concern. The traditional encryption methods such as DES, AES, 3-DES, and RSA cannot be …

A novel Sine–Tangent–Sine chaotic map and dynamic S-box-based video encryption scheme

D Dhingra, M Dua - The Imaging Science Journal, 2023 - Taylor & Francis
In this work, we propose a novel one-dimensional (1D) Sine–Tangent–Sine (STS) chaotic
map. The proposed STS map exhibits a wider, continuous chaotic range, complex …

[PDF][PDF] Chaotic elliptic map for speech encryption

OM Al-Hazaimeh, AA Abu-Ein, KM Nahar… - Indonesian Journal of …, 2022 - academia.edu
Using a new key management system and Jacobian elliptic map, a new speech encryption
scheme has been developed for secure speech communication data. Jacobian elliptic map …

Secure speech communication based on the combination of chaotic oscillator and logistic map

SA Gebereselassie, BK Roy - Multimedia Tools and Applications, 2022 - Springer
This paper uses a combination of a logistic map and a five-term chaotic oscillator to develop
a secure speech communication technique. Firstly, an active controller is designed to …

A high-performance speech BioHashing retrieval algorithm based on audio segmentation

YB Huang, DH Chen, BR Hua, QY Zhang - Computer Speech & Language, 2024 - Elsevier
As one of the research hotspots in the field of speech recognition, content-based speech
retrieval algorithms can detect speech information with the same content features, which …

基于改进Henon 映射和超混沌的双重语音加密算法

张秋余, 宋宇杰 - 电信科学, 2021 - infocomm-journal.com
针对现有语音混沌加密算法密钥空间小, 安全性差, 加密效率低且无法实现密钥复杂度与加密
效率的权衡等问题, 提出了一种改进Henon 映射和超混沌的双重语音加密算法. 首先 …

A simple chaotic system using signum function

BE Tatlıcıoğlu - Mathematics and Computers in Simulation, 2024 - Elsevier
Abstract Starting from Lorenz System, a simpler system using signum function was obtained,
which shows chaotic behavior. The conditions for stability were explained. Lyapunov and …

Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain

Y Huang, B Wang, X Pu, Y Li, Q Zhang - The Journal of Supercomputing, 2024 - Springer
Existing biohashing authentication schemes usually store bioinformation in the cloud, whose
storage method can face the problems of bioinformation leakage and tampering, and single …

[PDF][PDF] Analytical Approach for Data Encryption Standard Algorithm.

OM Al-hazaimeh, Moy'awiah Al-Shannaq… - Int. J. Interact. Mob …, 2023 - researchgate.net
Although it was first developed and studied in the late 1970s and early 1977s, the Data
Encryption Standard (DES) algorithm has grown in popularity. There are two causes for this …

Encrypted speech authentication and recovery scheme based on fragile watermarking

Q Zhang, F Xu - Telecommunication Systems, 2023 - Springer
In order to solve the problems that most of the existing speech authentication algorithms can
only realize tamper localization of frames, and need to the additional recovery information …