[go: up one dir, main page]

Theberge, 1996 - Google Patents

Security evaluation of transform domain speech scramblers

Theberge, 1996

View PDF
Document ID
14074220493954075524
Author
Theberge M
Publication year

External Links

Snippet

A number of new speech scrambling algorithms have been recently proposed. Few of them have had their security evaluated. Therefore, this work first concentrates on evaluating, on comparable grounds, various analog speech scramblers. Particular attention is placed on …
Continue reading at open.library.ubc.ca (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Supervisory, monitoring, management, i.e. operation, administration, maintenance or testing arrangements
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/04Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/56Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities

Similar Documents

Publication Publication Date Title
Goldburg et al. Design and cryptanalysis of transform-based analog speech scramblers
Sridharan et al. Fast Fourier transform based speech encryption system
Mosa et al. Chaotic encryption of speech signals
Habib et al. Secure speech communication algorithm via DCT and TD-ERCS chaotic map
Anand et al. Keyboard emanations in remote voice calls: Password leakage and noise (less) masking defenses
Alwahbani et al. Speech scrambling based on chaotic maps and one time pad
Sadkhan et al. Recent audio steganography trails and its quality measures
Mostafa et al. Speech encryption using two dimensional chaotic maps
Sharma Five level cryptography in speech processing using multi hash and repositioning of speech elements
Wahab et al. Modify speech cryptosystem based on shuffling overlapping blocks technique
Theberge Security evaluation of transform domain speech scramblers
Shahadi Covert communication model for speech signals based on an indirect and adaptive encryption technique
Radhakrishnan et al. Data masking: a secure-covert channel paradigm
Elshamy et al. Secure VoIP System Based on Biometric Voice Authentication and Nested Digital Cryptosystem using Chaotic Baker's map and Arnold's Cat Map Encryption
Ghasemzadeh et al. Cipher Text Only Attack on Speech Time Scrambling Systems Using Correction of Audio Spectrogram.
Sadkhan et al. A proposed analog speech scrambler based on parallel structure of wavelet transforms
Qi et al. A speech privacy protection method based on sound masking and speech corpus
Lin et al. A speech encryption algorithm based on blind source separation
Neethu et al. Efficient and robust audio watermarking for content authentication and copyright protection
Ghasemzadeh et al. Jigsaw cryptanalysis of audio scrambling systems
Farhati et al. Decryption of BSS based encrypted speech without a priori knowledge of the key signal
Enache et al. Theoretical and practical implementation of scrambling algorithms for speech signals
Ballesteros L et al. Speech scrambling based on imitation of a target speech signal with non-confidential content
Huang et al. SecHeadset: A Practical Privacy Protection System for Real-time Voice Communication
Paniker Enhancing data security using text cryptography and multimedia steganography