Speech encryption using generalized modified chaotic logistic and tent maps

Wafaa S. Sayed, Mohammed F. Tolba, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations

    Abstract

    This paper presents a speech encryption application, which utilizes several proposed generalized modified discrete chaotic maps based on the logistic and tent maps for pseudo-random number generation. The generalization scales the output range and the key space. The modification controls the bounds on the output range through a parameter such that chaotic output exists for almost all values of the parameter. Consequently, the modified maps do not suffer from the inherited problems of conventional chaotic generators such as islands of stability and drifting from chaos due to dynamical degradation induced by finite precision. The security and efficiency of the speech encryption scheme is validated through perceptual and statistical aspects, key sensitivity, resistance to brute force and differential attacks and computational complexity.

    Original languageBritish English
    Title of host publicationProceedings - 2018 IEEE International Conference on Industrial Technology, ICIT 2018
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages1526-1531
    Number of pages6
    ISBN (Electronic)9781509059492
    DOIs
    StatePublished - 27 Apr 2018
    Event19th IEEE International Conference on Industrial Technology, ICIT 2018 - Lyon, France
    Duration: 19 Feb 201822 Feb 2018

    Publication series

    NameProceedings of the IEEE International Conference on Industrial Technology
    Volume2018-February

    Conference

    Conference19th IEEE International Conference on Industrial Technology, ICIT 2018
    Country/TerritoryFrance
    CityLyon
    Period19/02/1822/02/18

    Keywords

    • Logistic map
    • Scaling parameters
    • Speech encryption
    • Tent map

    Fingerprint

    Dive into the research topics of 'Speech encryption using generalized modified chaotic logistic and tent maps'. Together they form a unique fingerprint.

    Cite this