Abstract
The vast growths in mobile and wireless applications would contain lacks of using suitable security concepts during the development process which worries the information security research community. This paper reviews most of the encryption techniques which adopt chaos based cryptography, and illustrates the used of chaos based voice encryption techniques in wireless communication as well. The review in this paper summarized the traditional and modern techniques of voice/speech encryption and demonstrated the feasibility of adopting chaos based cryptography for in wireless communications.
Original language | English |
---|---|
Title of host publication | 2013 International Conference on Electrical, Communication, Computer, Power, and Control Engineering, ICECCPCE 2013 |
Place of Publication | Iraq |
Publisher | IEEE |
Pages | 191-197 |
Number of pages | 7 |
ISBN (Electronic) | 9781479956333 |
DOIs | |
Publication status | Published - 17 Dec 2013 |
Event | 2013 International Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE 2013) - Mosul, Iraq Duration: 17 Dec 2013 → 18 Dec 2013 |
Conference
Conference | 2013 International Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE 2013) |
---|---|
Country/Territory | Iraq |
City | Mosul |
Period | 17/12/13 → 18/12/13 |
Keywords
- Chaos based cryptography
- chaos based voice/speech encryption (analog and digital signal)
- chaotic communication
- encryption
- generators
- secure wireless communication
- wireless communication