Linear regular domain voice encryption system based on cascade chaotic modulation

A chaotic system and chaotic modulation technology, applied in the direction of secure communication, speech analysis, transmission system through chaotic signals, etc., to achieve the effects of improving security performance, expanding key space, and improving the difficulty of cracking

Pending Publication Date: 2022-03-04
SHANXI UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of transformation domain encryption is usually a fixed transformation,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Linear regular domain voice encryption system based on cascade chaotic modulation
  • Linear regular domain voice encryption system based on cascade chaotic modulation
  • Linear regular domain voice encryption system based on cascade chaotic modulation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be further described in detail with reference to the accompanying drawings and embodiments.

[0019] Such as figure 1 As shown, the linear regular domain voice encryption system based on cascaded chaotic modulation in this embodiment includes a voice signal acquisition module 1, a linear regular transformation module 2, a cascaded chaotic system module 3, a transform domain encryption module 4, a linear regular Inverse transformation module 5 and encrypted speech storage module 6, wherein: the first signal input end of described linear canonical transformation module 2 is connected with the signal output end of speech signal acquisition module 1, the first signal input end of transformation domain encryption module 4 is connected with The signal output end of the linear regular transformation module 2 is connected, the first signal input end of the linear regular inverse transformation module 5 is connected with the signal output end of the tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a linear regular domain voice encryption system based on cascade chaotic modulation, and belongs to the technical field of voice communication encryption. Comprising a voice signal acquisition module (1), a linear canonical transformation module (2), a cascade chaotic system module (3), a transform domain encryption module (4), a linear canonical inverse transformation module (5) and an encrypted voice storage module (6). By arranging the cascaded chaotic system module, the chaotic Lyapunov index can be improved, the key space is expanded, and the safety performance is improved; the used linear canonical transformation acts on segmented signals through chaotic modulation and dynamic change of the cascaded chaotic system module, the complexity of an encryption algorithm can be increased, the cracking difficulty of the algorithm is improved, and the safety of voice signals is improved.

Description

technical field [0001] The invention relates to the technical field of voice communication encryption, in particular to a linear regular domain voice encryption system based on cascade chaotic modulation. Background technique [0002] In recent years, with the rapid development of communication technology, voice communication in the communication system has become one of the most common ways for people to exchange and transmit information. Although there have been many researches on voice encryption methods, the cracking technology is also developing continuously. Research on voice encryption methods that are more convenient, faster and have higher security performance is still one of the important contents in communication security. The secure communication technology based on chaos theory is an important research direction in the field of communication security. Although the chaotic encryption method is easy to implement, it cannot resist chosen plaintext (ciphertext) atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00G10L19/00
CPCH04L9/001G10L19/00
Inventor 徐丽云李伟
Owner SHANXI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products