Visible to the public Speech and Audio Cryptography System using Chaotic Mapping and Modified Euler's System

TitleSpeech and Audio Cryptography System using Chaotic Mapping and Modified Euler's System
Publication TypeConference Paper
Year of Publication2018
AuthorsSathiyamurthi, P, Ramakrishnan, S, Shobika, S, Subashri, N, Prakavi, M
Conference Name2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)
Keywords2D mapping function, 3D mapping function, audio cryptography system, audio file, audio signal processing, chaos, chaotic communication, chaotic cryptography, Chaotic Mapping, composability, Conferences, cryptography, Encryption, euler numerical resolution, Henon mapping, information technology, Lorenz 3D mapping, modified Euler system, Predictive Metrics, pubcrawl, Resiliency, speech coding, speech cryptography, Three-dimensional displays, Two dimensional displays
AbstractSecurity often requires that the data must be kept safe from unauthorized access. And the best line of speech communication is security. However, most computers are interconnected with each other openly, thereby exposing them and the communication channels that person uses. Speech cryptography secures information by protecting its confidentiality. It can also be used to protect information about the integrity and authenticity of data. Stronger cryptographic techniques are needed to ensure the integrity of data stored on a machine that may be infected or under attack. So far speech cryptography is used in many forms but using it with Audio file is another stronger technique. The process of cryptography happens with audio file for transferring more secure sensitive data. The audio file is encrypted and decrypted by using Lorenz 3D mapping and then 3D mapping function is converted into 2D mapping function by using euler's numerical resolution and strong algorithm provided by using henon mapping and then decrypted by using reverse of encryption. By implementing this, the resultant audio file will be in secured form.
DOI10.1109/ICICCT.2018.8473183
Citation Keysathiyamurthi_speech_2018