Arrows are used to represent the direction of signal flow. The overall response of the system is determined from a knowledge of the transfer functions of the blocks. The results of the various analyses including histogram, key space, key sensitivity, statistical, differential attack, entropy, mean-variance data bytes value and randomness analyses ensures the security of the audio encryption scheme against various kinds of attacks. A block diagram is a means of modeling a system by breaking it down into subsystems each represented by a block. The detailed study of chaotic maps with respect to Lyapunov exponent and bifurcate nature, supports the proposed cryptosystem to behave chaotically, thereby produce highly secured cipher audio. A repeated application of confusion and diffusion techniques on plain audio data bytes produces the cipher audio data bytes which can be stored or sent through the public channel. This inter-dependency will add more sensitivity and complexity to the proposed algorithm. The system uses an efficient algorithm which makes the sequences to interdependent with each other. The audio encryption scheme uses Henon map and chaotic economic map for creating sequences. This study proposes an efficient audio byte scrambling technique using multiple chaotic maps.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |