• Home
  • Browse
    • Current Issue
    • By Issue
    • By Author
    • By Subject
    • Author Index
    • Keyword Index
  • Journal Info
    • About Journal
    • Aims and Scope
    • Editorial Board
    • Publication Ethics
    • Peer Review Process
  • Guide for Authors
  • Submit Manuscript
  • Contact Us
 
  • Login
  • Register
Home Articles List Article Information
  • Save Records
  • |
  • Printable Version
  • |
  • Recommend
  • |
  • How to cite Export to
    RIS EndNote BibTeX APA MLA Harvard Vancouver
  • |
  • Share Share
    CiteULike Mendeley Facebook Google LinkedIn Twitter
The Egyptian Journal of Language Engineering
arrow Articles in Press
arrow Current Issue
Journal Archive
Volume Volume 11 (2024)
Volume Volume 10 (2023)
Volume Volume 9 (2022)
Volume Volume 8 (2021)
Volume Volume 7 (2020)
Volume Volume 6 (2019)
Volume Volume 5 (2018)
Volume Volume 4 (2017)
Issue Issue 2
Issue Issue 1
Volume Volume 3 (2016)
Volume Volume 2 (2015)
Volume Volume 1 (2014)
Fawzy, M., Shalaby, M., Kamal, Y., Elramly, S. (2017). A Speech Cryptosystem Based on Chaotic Modulation Technique. The Egyptian Journal of Language Engineering, 4(1), 1-10. doi: 10.21608/ejle.2017.59392
Mahmoud Fawzy; Mohamed Shalaby; Yasser Kamal; Salwa Hussein Elramly. "A Speech Cryptosystem Based on Chaotic Modulation Technique". The Egyptian Journal of Language Engineering, 4, 1, 2017, 1-10. doi: 10.21608/ejle.2017.59392
Fawzy, M., Shalaby, M., Kamal, Y., Elramly, S. (2017). 'A Speech Cryptosystem Based on Chaotic Modulation Technique', The Egyptian Journal of Language Engineering, 4(1), pp. 1-10. doi: 10.21608/ejle.2017.59392
Fawzy, M., Shalaby, M., Kamal, Y., Elramly, S. A Speech Cryptosystem Based on Chaotic Modulation Technique. The Egyptian Journal of Language Engineering, 2017; 4(1): 1-10. doi: 10.21608/ejle.2017.59392

A Speech Cryptosystem Based on Chaotic Modulation Technique

Article 1, Volume 4, Issue 1, April 2017, Page 1-10  XML PDF (1.1 MB)
Document Type: Original Article
DOI: 10.21608/ejle.2017.59392
View on SCiNiTO View on SCiNiTO
Authors
Mahmoud Fawzy email 1; Mohamed Shalaby2; Yasser Kamal2; Salwa Hussein Elramly3
1Air Force Defence
2Arab Academy for Science, Technology & Maritime Transport
3Electronics& Communications Engineering Dept., Faculty of Engineering, Ain Shams University
Abstract
In this paper, an encryption approach for Speech communication based on direct chaotic modulation (non-autonomous
modulation) is presented, in which speech signal is injected into one variable of the master system (using Lorenz system) without changing the value of any control parameter. This approach is based on the change of chaotic signal by injecting Speech samples into one variable in chaotic system and hence generating a new chaotic signal. The Speech signal is then extracted from the chaotic signal on the receiver side. Furthermore, a high dimension chaotic system is used, which increases the security of the encrypted signal. Non-autonomous modulation technique is suitable for securing real-time applications. A comparative study of approach and Speech masking technique is also presented. Experimental results show that non-autonomous methods give better performance than their chaotic masking counterparts when they are analyzed against Signal-to-Noise-Ratio (-38.55 dB vs. -35.51 dB), Segmental signal-to-Noise-Ratio (-38.91 dB vs. -35.84 dB), Log-Likelihood Ratio (0.89 vs. 0.80), and Correlation Coefficient Analysis (0.0345 vs. 0.021). Non-autonomous techniques overcome the chaotic masking break and considered more secure.
Keywords
Encryption; Speech encryption; Chaotic Modulation; Non-autonomous modulation; Lorenz system
Statistics
Article View: 158
PDF Download: 488
Home | Glossary | News | Aims and Scope | Sitemap
Top Top

Journal Management System. Designed by NotionWave.