scispace - formally typeset
Journal ArticleDOI

Encryption VoIP based on Generated Biometric Key for RC4 Algorithm

Raya Wesam Abd Aljabar, +1 more
- 25 Mar 2021 - 
- Vol. 39, Iss: 5, pp 209-221
Reads0
Chats0
TLDR
The experimental work shows that the proposed system offers secrecy to speech data with voice cipher is unintelligible and the recovered voice has perfect quality with MSR equal to zero and PSNR equal to infinity.
Abstract
Voice over Internet Protocol (VoIP) calls are susceptible to interfere at many points by many attackers, thus encryption considered an important part in keeping VoIP. In this paper, Encryption VoIP based on Generated Biometric Key for RC4 Algorithm is proposed to encrypt the voice data before transmitting it over the network. The system uses a stream algorithm based on RC4 encryption with the new method of biometrics based Key generation technique. This system has generated complex keys in offline phase which is formed depend on features extracted using Linear Discernment Analysis (LDA) from face images. The experimental work shows that the proposed system offers secrecy to speech data with voice cipher is unintelligible and the recovered voice has perfect quality with MSR equal to zero and PSNR equal to infinity.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator

TL;DR: This article was withdrawn and retracted by the Journal of Fundamental and Applied Sciences and has been removed from AJOL at the request of the journal Editor in Chief and the organisers of the conference at which the articles were presented.
Journal ArticleDOI

Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps

TL;DR: Results show that the pseudo-random keys created by using chaotic maps for cryptographic speech file have an acceptable characteristic concerning randomness tests, which is confirmed in this paper by using five statistical tests.
Journal ArticleDOI

Lightweight RC4 Algorithm

TL;DR: A lightweight variation of the well-known RC4 algorithm that is exceptionally appropriate for resources of computational compelled gadgets and energy in remote systems, when contrasted with RC4 and its variations like, HC128, Grain-128, and so on.
Journal ArticleDOI

IMGTXT: Image to Text Encryption Based on Encoding Pixel Contrasts

TL;DR: A new approach called IMGTXT is proposed that converts the image to text by coding the pixel values depending on locations then encrypts them by any trust encryption text algorithm, so that this method provides resistance to a variety of attacks such as histogram attacks and brute force attack.
Proceedings ArticleDOI

Encryption Image Based on Z-Fractal and Hash Function with Grigorchuk’s Group

TL;DR: In this paper , the authors proposed an encryption method that depends primarily on the sensitivity of the key and the randomness of the encryption, which is used to improve the security in the face of malicious attacks.
References
More filters
Book ChapterDOI

A Comprehensive Review on Face Recognition Methods and Factors Affecting Facial Recognition Accuracy

TL;DR: A point-by-point outline of some imperative existing strategies which are accustomed to managing the issues of face recognition has been introduced along with their face recognition accuracy and the factors responsible to degrade the performance of the study.
Journal ArticleDOI

Lorenz and Rossler Chaotic System for Speech Signal Encryption

TL;DR: The proposed algorithm has the advantages of very low residual intelligibility, key sensitivity and high quality recovered signal, and moreover the proposed algorithm can resist known- plaintext attacks and supports large key space make brute-force attacks infeasible.
Proceedings ArticleDOI

A new audio encryption algorithm based on chaotic block cipher

TL;DR: The results from key space analysis, statistical analysis, MSE (mean square error) analyses, PSNR (Peak signal to noise ratio) analyses and entropy analyses showed that the algorithm is not vulnerable to brute force attacks, statistical attacks and achieve higher level of security.
Journal ArticleDOI

A Novel Fast and Secure Approach for Voice Encryption Based on DNA Computing

TL;DR: The proposed algorithm uses an innovative encoding scheme, the DNA encryption technique and a permutation function to provide a secure and fast solution for voice encryption.
Journal ArticleDOI

VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator

TL;DR: This article was withdrawn and retracted by the Journal of Fundamental and Applied Sciences and has been removed from AJOL at the request of the journal Editor in Chief and the organisers of the conference at which the articles were presented.