Journal ArticleDOI
Encryption VoIP based on Generated Biometric Key for RC4 Algorithm
Reads0
Chats0
TLDR
The experimental work shows that the proposed system offers secrecy to speech data with voice cipher is unintelligible and the recovered voice has perfect quality with MSR equal to zero and PSNR equal to infinity.Abstract:
Voice over Internet Protocol (VoIP) calls are susceptible to interfere at many points by many attackers, thus encryption considered an important part in keeping VoIP.
In this paper, Encryption VoIP based on Generated Biometric Key for RC4 Algorithm is proposed to encrypt the voice data before transmitting it over the network. The system uses a stream algorithm based on RC4 encryption with the new method of biometrics based Key generation technique. This system has generated complex keys in offline phase which is formed depend on features extracted using Linear Discernment Analysis (LDA) from face images.
The experimental work shows that the proposed system offers secrecy to speech data with voice cipher is unintelligible and the recovered voice has perfect quality with MSR equal to zero and PSNR equal to infinity.read more
Citations
More filters
Journal ArticleDOI
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
TL;DR: This article was withdrawn and retracted by the Journal of Fundamental and Applied Sciences and has been removed from AJOL at the request of the journal Editor in Chief and the organisers of the conference at which the articles were presented.
Journal ArticleDOI
Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps
TL;DR: Results show that the pseudo-random keys created by using chaotic maps for cryptographic speech file have an acceptable characteristic concerning randomness tests, which is confirmed in this paper by using five statistical tests.
Journal ArticleDOI
Lightweight RC4 Algorithm
TL;DR: A lightweight variation of the well-known RC4 algorithm that is exceptionally appropriate for resources of computational compelled gadgets and energy in remote systems, when contrasted with RC4 and its variations like, HC128, Grain-128, and so on.
Journal ArticleDOI
IMGTXT: Image to Text Encryption Based on Encoding Pixel Contrasts
TL;DR: A new approach called IMGTXT is proposed that converts the image to text by coding the pixel values depending on locations then encrypts them by any trust encryption text algorithm, so that this method provides resistance to a variety of attacks such as histogram attacks and brute force attack.
Proceedings ArticleDOI
Encryption Image Based on Z-Fractal and Hash Function with Grigorchuk’s Group
TL;DR: In this paper , the authors proposed an encryption method that depends primarily on the sensitivity of the key and the randomness of the encryption, which is used to improve the security in the face of malicious attacks.
References
More filters
Book ChapterDOI
A Comprehensive Review on Face Recognition Methods and Factors Affecting Facial Recognition Accuracy
Shahina Anwarul,Susheela Dahiya +1 more
TL;DR: A point-by-point outline of some imperative existing strategies which are accustomed to managing the issues of face recognition has been introduced along with their face recognition accuracy and the factors responsible to degrade the performance of the study.
Journal ArticleDOI
Lorenz and Rossler Chaotic System for Speech Signal Encryption
Eman Hato,Dalya Shihab +1 more
TL;DR: The proposed algorithm has the advantages of very low residual intelligibility, key sensitivity and high quality recovered signal, and moreover the proposed algorithm can resist known- plaintext attacks and supports large key space make brute-force attacks infeasible.
Proceedings ArticleDOI
A new audio encryption algorithm based on chaotic block cipher
TL;DR: The results from key space analysis, statistical analysis, MSE (mean square error) analyses, PSNR (Peak signal to noise ratio) analyses and entropy analyses showed that the algorithm is not vulnerable to brute force attacks, statistical attacks and achieve higher level of security.
Journal ArticleDOI
A Novel Fast and Secure Approach for Voice Encryption Based on DNA Computing
TL;DR: The proposed algorithm uses an innovative encoding scheme, the DNA encryption technique and a permutation function to provide a secure and fast solution for voice encryption.
Journal ArticleDOI
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
TL;DR: This article was withdrawn and retracted by the Journal of Fundamental and Applied Sciences and has been removed from AJOL at the request of the journal Editor in Chief and the organisers of the conference at which the articles were presented.