The vast growths in mobile and wireless applications would contain lacks of using suitable security concepts during the development process which worries the information security research community. This paper reviews most of the encryption techniques which adopt chaos based cryptography, and illustrates the used of chaos based voice encryption techniques in wireless communication as well. The review in this paper summarized the traditional and modern techniques of voice/speech encryption and demonstrated the feasibility of adopting chaos based cryptography for in wireless communications
Communication techniques have witnessed rapid development in recent years, especially the internet a...
In this paper, we present a new voice encryption for voice communication system. It is based on perm...
There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twi...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...
This thesis deals with voice encryption in wireless communication. First, the necessary theoretical ...
AbstractIt is well known that the wireless communications have great challenges in ensuring high sec...
Abstract:- In this paper, we have developed a chaos-based unequal encryption mechanism which can be ...
Security and secrecy are some of the significant concerns in the communications world. In the last y...
In this paper, a new stream key generator Hybrid Discrete Continuous Chaotic System (HDCCS) based on...
There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twi...
Over the past decade, there has been significant interest in exploiting chaotic dynamics in communic...
Wireless communication networks use interconnected devices within a relatively small area that is ge...
Since the 1970's, there has been a great deal of research effort spent on studying chaotic systems a...
Abstract This paper throws light on chaotic shift keying-based speech encryption and decryption meth...
Abstract— Recently, with the development multimedia technologies and wireless telecommunication, Voi...
Communication techniques have witnessed rapid development in recent years, especially the internet a...
In this paper, we present a new voice encryption for voice communication system. It is based on perm...
There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twi...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...
This thesis deals with voice encryption in wireless communication. First, the necessary theoretical ...
AbstractIt is well known that the wireless communications have great challenges in ensuring high sec...
Abstract:- In this paper, we have developed a chaos-based unequal encryption mechanism which can be ...
Security and secrecy are some of the significant concerns in the communications world. In the last y...
In this paper, a new stream key generator Hybrid Discrete Continuous Chaotic System (HDCCS) based on...
There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twi...
Over the past decade, there has been significant interest in exploiting chaotic dynamics in communic...
Wireless communication networks use interconnected devices within a relatively small area that is ge...
Since the 1970's, there has been a great deal of research effort spent on studying chaotic systems a...
Abstract This paper throws light on chaotic shift keying-based speech encryption and decryption meth...
Abstract— Recently, with the development multimedia technologies and wireless telecommunication, Voi...
Communication techniques have witnessed rapid development in recent years, especially the internet a...
In this paper, we present a new voice encryption for voice communication system. It is based on perm...
There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twi...