Theberge, 1996 - Google Patents
Security evaluation of transform domain speech scramblersTheberge, 1996
View PDF- Document ID
- 14074220493954075524
- Author
- Theberge M
- Publication year
External Links
Snippet
A number of new speech scrambling algorithms have been recently proposed. Few of them have had their security evaluated. Therefore, this work first concentrates on evaluating, on comparable grounds, various analog speech scramblers. Particular attention is placed on …
- 238000011156 evaluation 0 title description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Supervisory, monitoring, management, i.e. operation, administration, maintenance or testing arrangements
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/04—Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/56—Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Goldburg et al. | Design and cryptanalysis of transform-based analog speech scramblers | |
Sridharan et al. | Fast Fourier transform based speech encryption system | |
Mosa et al. | Chaotic encryption of speech signals | |
Habib et al. | Secure speech communication algorithm via DCT and TD-ERCS chaotic map | |
Anand et al. | Keyboard emanations in remote voice calls: Password leakage and noise (less) masking defenses | |
Alwahbani et al. | Speech scrambling based on chaotic maps and one time pad | |
Sadkhan et al. | Recent audio steganography trails and its quality measures | |
Mostafa et al. | Speech encryption using two dimensional chaotic maps | |
Sharma | Five level cryptography in speech processing using multi hash and repositioning of speech elements | |
Wahab et al. | Modify speech cryptosystem based on shuffling overlapping blocks technique | |
Theberge | Security evaluation of transform domain speech scramblers | |
Shahadi | Covert communication model for speech signals based on an indirect and adaptive encryption technique | |
Radhakrishnan et al. | Data masking: a secure-covert channel paradigm | |
Elshamy et al. | Secure VoIP System Based on Biometric Voice Authentication and Nested Digital Cryptosystem using Chaotic Baker's map and Arnold's Cat Map Encryption | |
Ghasemzadeh et al. | Cipher Text Only Attack on Speech Time Scrambling Systems Using Correction of Audio Spectrogram. | |
Sadkhan et al. | A proposed analog speech scrambler based on parallel structure of wavelet transforms | |
Qi et al. | A speech privacy protection method based on sound masking and speech corpus | |
Lin et al. | A speech encryption algorithm based on blind source separation | |
Neethu et al. | Efficient and robust audio watermarking for content authentication and copyright protection | |
Ghasemzadeh et al. | Jigsaw cryptanalysis of audio scrambling systems | |
Farhati et al. | Decryption of BSS based encrypted speech without a priori knowledge of the key signal | |
Enache et al. | Theoretical and practical implementation of scrambling algorithms for speech signals | |
Ballesteros L et al. | Speech scrambling based on imitation of a target speech signal with non-confidential content | |
Huang et al. | SecHeadset: A Practical Privacy Protection System for Real-time Voice Communication | |
Paniker | Enhancing data security using text cryptography and multimedia steganography |