|Table of Contents|

DSP Based Chaotic Voice Encryption(PDF)

《南京师大学报(自然科学版)》[ISSN:1001-4616/CN:32-1239/N]

Issue:
2014年04期
Page:
59-
Research Field:
物理学
Publishing date:

Info

Title:
DSP Based Chaotic Voice Encryption
Author(s):
Ding RanWang JiaweiMa Qingyu
School of Physics and Technology,Nanjing Normal University,Nanjing 210023,China
Keywords:
chaotic voice encryptionArnold transformLogistic mappingDSP
PACS:
TP309.7
DOI:
-
Abstract:
Combining with the technologies of invertible two-dimensional Arnold transform and improved algorithm Logistic mapping,a chaotic voice encryption algorithm is investigated based on the particularity of the encryption of voice,and then a voice encryption system solution is proposed to realize the voice encryption and decryption using the Digital Signal Processor TMS320VC5509A.The basic principle and method of data encryption is first introduced and a detailed design plan of software and hardware for the chaotic voice encryption system is presented,at the same time we realize the chaotic voice encryption and decryption using the DSP chip.Finally,through simulation and experimental test for voices,the waveforms and spectrums collected before encryption and after decryption show good agreements with each other,suggesting the feasibility of the proposed chaotic voice encryption algorithm.

References:

[1] 陈诚,曹秀英,帅富强.数字跳频通信设备关键技术的研究与发现[J].南京师范大学学报:工程技术版,2007,7(4):80-83.
[2]樊雷.IP语音混沌加密算法研究[D].南京:南京理工大学自动化学院,2004.
[3]侯爽.语音加密算法及其在网络通信系统中的应用研究[D].南京:南京理工大学自动化学院,2007.
[4]Goldburg B,Sridharan S,Dawson E.On the use of a frequency domain vector codebook for the cryptanalysis of analog speech scramblers[J].IEEE International Symposium on Circuits and Systems,1991,1:328-331.
[5]Cox R V,Bock D E,Bauer K B,et al.The analog voice privacy system[J].AT&T Technical Journal,1987,66(1):119-131.
[6]田丽平.基于混沌复合映射的语音信号流安全通信仿真实现[J].计算机与现代化,2007(2):97-98.
[7]魏建香,罗军舟.基于哥德尔β函数的数据加密[J].南京师范大学学报:工程技术版,2002,2(1):14-17.
[8]刘爱华,陈钧,解芳.数据库敏感数据加密算法的研究与改进[J].南京师范大学学报:工程技术版,2012,12(3):68-70.
[9]Kocarev L,Jakimoski G,Stojanovski T,et al.From chaotic maps to encryption schemes[J].IEEE International Symposium on Circuits and Systems,1998,4:514-517.
[10]关新平,范正平,陈彩莲,等.混沌控制及其在保密通信中的应用[M].北京:国防工业出版社,2002.
[11]Cuomo K M,Oppenheim A V,Strogatz S H.Synchronization of Lorenz-based chaotic circuits with applications to communications[J].IEEE Transactions on Circuits and Systems II:Analog and Digital Signal Processing,1993,40:626-633.
[12]Shannon C E.Communication theory of secrecy system[J].Bell System Technical,1949,28(4):656-715.
[13]樊雷,茅耀武,孙金生.一种结合猫映射与Logistic映射的语音加密算法[J].控制与决策,2004,19(10):1 167-1 174.

[14]Dachselt F,Kelber K,Schwarz W,et al.Chaotic versus classical strean ciphers-a comparative study[C]//Proceedings of the 1998 IEEE International Symposium on Circuits and Systems.New York:IEEE,1998,4:518-521.
[15]Froyland J.Introduction to Chaos and Coherence[M].London:Institute of Physics Publishing Ltd.,1992.
[16]Jakimoski G,Kocarev L.Chaos and cryptography:block encryption ciphers based on chaotic maps[J].IEEE Transactions on Circuits and Systems I:Fundamental Theory and Applications,2001,48(2):163-169.
[17]Texas Instruments.TMS320C55x DSP Mnemonic Instruction Set Reference Guide[M].Texas:Texas Instruments,2000.
[18]孟勃,朱明.基于McBSP实现DSP与串行Flash之间的接口通讯[J].电子器件,2006,29(3):921-924.
[19]顾学乔,李杰,徐寅林.DSP与PC机的高速数据传输接口设计与实现[J].南京师范大学学报:工程技术版,2009,9(3):73-76.

Memo

Memo:
-
Last Update: 2014-12-31