Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. Results show that the pseudo-random keys created by using chaotic maps for cryptographic speech file have an acceptable characteristic concerning randomness tests, which is confirmed in this paper by using five statistical tests. The final evaluation of the speech encryption algorithm is measured by using different quality metrics, and the results show that the algorithm can achieve resist encryption.
we conclude that Alaotaby in his Designation, with respect to defects in speech or speech pathology, he cited a number of terms function on speech defects in voice and accent like , Aphasia, Alokla, Alaay, Alramz, Alhasr, Alfadm,and Alaghop, and pointed to the sound stop as a result of an accident or a problem or the speech organ deny the will of the speech, which refers to the refrain defect in sound organic.
He also marked the disorders individual sound caused by the bug of sample and disability among individual like Alokla, node and aphasia - which hinders communication as well as other factors such as irregular sound product and not reporting to be into the future toward the Aljamjamah and whispering, and it can be said that he po
The mind map represents a system to solve problems including design problems, because it depends on employing the complex and purposeful mental activity, which starts from a desire based on the search and investigation in order to reach integrated results of scientific thinking, utilizing the objective view of the scientific and practical aspects from various angles. This visual system can develop thinking and shorten the retrieval time of the previous information in order to employ it in the solution finding system, that it evokes past experiences and relates them to current situations, then enables the user to choose a suitable solution for the problems. This visual, educational and circulatory means, at the same time, has speci
... Show MoreWith the development of information technology and means for information transfer it has become necessary to protect sensitive information. The current research presents a method to protect secret colored images which includes three phases: The first phase calculates hash value using one of hash functions to ensure that no tampering with or updating the contents of the secret image. The second phase is encrypting image and embedding it randomly into appropriate cover image using Random Least Significant Bit (RLSB) technique. Random hiding provides protection of information embedded inside cover image for inability to predict the hiding positions, as well as the difficult of determining the concealment positions through the analysis of im
... Show MoreIn this paper, an experimental study has been conducted regarding the indication of resonance in chaotic semiconductor laser. Resonant perturbations are effective for harnessing nonlinear oscillators for various applications such as inducing chaos and controlling chaos. Interesting results have been obtained regarding to the effect of the chaotic resonance by adding the frequency on the systems. The frequency changes nonlinear dynamical system through a critical value, there is a transition from a periodic attractor to a strange attractor. The amplitude has a very relevant impact on the system, resulting in an optimal resonance response for appropriate values related to correlation time. The chaotic system becomes regular under
... Show MoreLet be a metric space and be a continuous map. The notion of the -average shadowing property ( ASP ) for a continuous map on –space is introduced and the relation between the ASP and average shadowing property(ASP)is investigated. We show that if has ASP, then has ASP for every . We prove that if a map be pseudo-equivariant with dense set of periodic points and has the ASP, then is weakly mixing. We also show that if is a expansive pseudo-equivariant homeomorphism that has the ASP and is topologically mixing, then has a -specification. We obtained that the identity map on has the ASP if and only if th
... Show MoreIn this paper, two different chaotic dynamic systems are coupled using a semiconductor laser to produce a new chaotic system. These two chaotic systems are Rossler and Chua systems. X-dynamic of Rossler system was coupled optically using optical fiber as a carrier of signal with x, y, and z-dynamics of Chua system. The results were analyzed and the behavior of Chua system was found to be changing in time series which, in turn, changed the attractor. The Chua attractor was converted from double scroll to single scroll. The results obtained from connecting two different systems in chaotic behavior showed a remarkable increase in the bandwidth of Chua system. This increase in bandwidth opens up a wide field for many
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MorePeople are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show More