[1]丁 然,王佳伟,马青玉.基于DSP的混沌语音加密[J].南京师大学报(自然科学版),2014,37(04):59.
 Ding Ran,Wang Jiawei,Ma Qingyu.DSP Based Chaotic Voice Encryption[J].Journal of Nanjing Normal University(Natural Science Edition),2014,37(04):59.
点击复制

基于DSP的混沌语音加密()
分享到:

《南京师大学报(自然科学版)》[ISSN:1001-4616/CN:32-1239/N]

卷:
第37卷
期数:
2014年04期
页码:
59
栏目:
物理学
出版日期:
2014-12-31

文章信息/Info

Title:
DSP Based Chaotic Voice Encryption
作者:
丁 然王佳伟马青玉
南京师范大学物理科学与技术学院,江苏 南京 210023
Author(s):
Ding RanWang JiaweiMa Qingyu
School of Physics and Technology,Nanjing Normal University,Nanjing 210023,China
关键词:
混沌语音加密Arnold变换Logistic映射DSP
Keywords:
chaotic voice encryptionArnold transformLogistic mappingDSP
分类号:
TP309.7
文献标志码:
A
摘要:
基于语音加密的特殊性,利用可逆二维Arnold变换和改进的Logistic映射进行了混沌加密算法研究,并以TMS320VC5509A为中央处理器提出了语音加密的系统方案,实现了语音的加密和解密.首先介绍了数据加密技术基本原理和方法,然后详细给出了混沌加密系统的软硬件设计方案,并通过DSP芯片实现了混沌语音加密和解密.最后对语音信号进行了模拟仿真和测试,加解密前后的信号和频谱取得了较好的一致性,证实了该混沌语音加密算法的可行性.
Abstract:
Combining with the technologies of invertible two-dimensional Arnold transform and improved algorithm Logistic mapping,a chaotic voice encryption algorithm is investigated based on the particularity of the encryption of voice,and then a voice encryption system solution is proposed to realize the voice encryption and decryption using the Digital Signal Processor TMS320VC5509A.The basic principle and method of data encryption is first introduced and a detailed design plan of software and hardware for the chaotic voice encryption system is presented,at the same time we realize the chaotic voice encryption and decryption using the DSP chip.Finally,through simulation and experimental test for voices,the waveforms and spectrums collected before encryption and after decryption show good agreements with each other,suggesting the feasibility of the proposed chaotic voice encryption algorithm.

参考文献/References:

[1] 陈诚,曹秀英,帅富强.数字跳频通信设备关键技术的研究与发现[J].南京师范大学学报:工程技术版,2007,7(4):80-83.
[2]樊雷.IP语音混沌加密算法研究[D].南京:南京理工大学自动化学院,2004.
[3]侯爽.语音加密算法及其在网络通信系统中的应用研究[D].南京:南京理工大学自动化学院,2007.
[4]Goldburg B,Sridharan S,Dawson E.On the use of a frequency domain vector codebook for the cryptanalysis of analog speech scramblers[J].IEEE International Symposium on Circuits and Systems,1991,1:328-331.
[5]Cox R V,Bock D E,Bauer K B,et al.The analog voice privacy system[J].AT&T Technical Journal,1987,66(1):119-131.
[6]田丽平.基于混沌复合映射的语音信号流安全通信仿真实现[J].计算机与现代化,2007(2):97-98.
[7]魏建香,罗军舟.基于哥德尔β函数的数据加密[J].南京师范大学学报:工程技术版,2002,2(1):14-17.
[8]刘爱华,陈钧,解芳.数据库敏感数据加密算法的研究与改进[J].南京师范大学学报:工程技术版,2012,12(3):68-70.
[9]Kocarev L,Jakimoski G,Stojanovski T,et al.From chaotic maps to encryption schemes[J].IEEE International Symposium on Circuits and Systems,1998,4:514-517.
[10]关新平,范正平,陈彩莲,等.混沌控制及其在保密通信中的应用[M].北京:国防工业出版社,2002.
[11]Cuomo K M,Oppenheim A V,Strogatz S H.Synchronization of Lorenz-based chaotic circuits with applications to communications[J].IEEE Transactions on Circuits and Systems II:Analog and Digital Signal Processing,1993,40:626-633.
[12]Shannon C E.Communication theory of secrecy system[J].Bell System Technical,1949,28(4):656-715.
[13]樊雷,茅耀武,孙金生.一种结合猫映射与Logistic映射的语音加密算法[J].控制与决策,2004,19(10):1 167-1 174.

[14]Dachselt F,Kelber K,Schwarz W,et al.Chaotic versus classical strean ciphers-a comparative study[C]//Proceedings of the 1998 IEEE International Symposium on Circuits and Systems.New York:IEEE,1998,4:518-521.
[15]Froyland J.Introduction to Chaos and Coherence[M].London:Institute of Physics Publishing Ltd.,1992.
[16]Jakimoski G,Kocarev L.Chaos and cryptography:block encryption ciphers based on chaotic maps[J].IEEE Transactions on Circuits and Systems I:Fundamental Theory and Applications,2001,48(2):163-169.
[17]Texas Instruments.TMS320C55x DSP Mnemonic Instruction Set Reference Guide[M].Texas:Texas Instruments,2000.
[18]孟勃,朱明.基于McBSP实现DSP与串行Flash之间的接口通讯[J].电子器件,2006,29(3):921-924.
[19]顾学乔,李杰,徐寅林.DSP与PC机的高速数据传输接口设计与实现[J].南京师范大学学报:工程技术版,2009,9(3):73-76.

备注/Memo

备注/Memo:
收稿日期:2014-04-03.
基金项目:国家自然科学基金(11274176).
通讯联系人:马青玉,博士,教授,研究方向:电子技术、声学和生物医学物理.E-mail:maqingyu@njnu.edu.cn
更新日期/Last Update: 2014-12-31