About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Advances in Computer Science and Information Technology. Computer Science and Engineering. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part II

Research Article

Chaotic Masking of Voice Bitstream Using Mixed Sequences for Authorized Listening

Download(Requires a free EAI acccount)
323 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-27308-7_64,
        author={Musheer Ahmad and Bashir Alam and Omar Farooq},
        title={Chaotic Masking of Voice Bitstream Using Mixed Sequences for Authorized Listening},
        proceedings={Advances in Computer Science and Information Technology. Computer Science and Engineering. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part II},
        proceedings_a={CCSIT PATR II},
        year={2012},
        month={11},
        keywords={Voice communication security chaotic systems voice encryption},
        doi={10.1007/978-3-642-27308-7_64}
    }
    
  • Musheer Ahmad
    Bashir Alam
    Omar Farooq
    Year: 2012
    Chaotic Masking of Voice Bitstream Using Mixed Sequences for Authorized Listening
    CCSIT PATR II
    Springer
    DOI: 10.1007/978-3-642-27308-7_64
Musheer Ahmad1, Bashir Alam1, Omar Farooq2
  • 1: Jamia Millia Islamia
  • 2: AMU

Abstract

The voice-based communication becomes extensively vital in the application areas of military, voice over IP, voice-conferencing, phone banking, news telecasting etc. It greatly demands to preserve sensitive voice signals from the unauthorized listening and illegal usage over shared/open networks. To address the need, we propose a chaos-based symmetric encryption technique to protect voice bitstreams over insecure transmission channel. The technique utilizes the features of high dimensional chaos like Lorenz and Chen systems to generate highly unpredictable and random-like sequences. The encryption keys are dynamically extracted from the pretreated chaotic mixed sequences, which are then used to mask the voice bitstream for integrity protection of voice data. The experimental analyses like auto-correlation, signal distribution, parameter-residual deviation, key space and key-sensitivity demonstrate the effectiveness of the proposed technique for secure voice communication.

Keywords
Voice communication security chaotic systems voice encryption
Published
2012-11-09
http://dx.doi.org/10.1007/978-3-642-27308-7_64
Copyright © 2012–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL