期刊文献+

过抽样混沌序列的语音通信加密应用 被引量:1

Voice Communication Encryption Application of Oversampled Chebyshev Chaotic Sequences
原文传递
导出
摘要 通过对混沌系统特性的研究,设计出一种安全性高、加密速度快的通信加密方案。首先根据数字混沌序列的特性对混沌的迭代过程进行改进,实现对Chebyshev混沌序列的过抽样处理。设计语音信号传输系统,在发送端实现混沌序列对语音信号的加密,调制后进入高斯白噪声信道,在接收端接收到密文后对加密语音信号进行解调和解密,得到解密后的语音信号。实验证明,过抽样技术应用在混沌扩频通信中,可以极大地提高无线通信的保密性。 With the development of the multimedia and digital communication,people obtain increasingly more information and communicate with each other much more easily.For protecting information from eavesdropper,the encryption processing for large amounts of data is necessary.Although there are different demands for the encryption algorithm in different applications,however the demand for security and speediness are common.By studying the characteristic of chaotic system,a communication encryption program with high speed and security is designed.To construct encryption algorithm,some improvement has done on the chaotic iteration process according to the characteristic of digital chaotic,the oversampled to the Chebyshev chaotic maps(OSCM) is realized.Also,voice signal transmission systems were designed to encrypt the original voice signals by using the oversample of chaotic sequence at the sending port.After the modulation,the signals passed through the AWGN channel.The encrypted voice signals are demodulated and decrypted after receiving the ciphertext at the receiving port,and then the decrypted voice signal are received.Experiments show that the application of over sampling technology in the chaotic spread spectrum communication can greatly increase the confidentiality of wireless communications.
出处 《科技导报》 CAS CSCD 北大核心 2011年第7期62-65,共4页 Science & Technology Review
关键词 混沌系统 过抽样混沌映射 混沌加密 系统仿真 chaotic system oversampled chaotic map chaotic encryption system simulation
  • 相关文献

参考文献5

二级参考文献30

  • 1赵春明,尤肖虎,程时昕.混沌序列的数字发生及其在通信中的应用[J].东南大学学报(自然科学版),1995,25(4):137-142. 被引量:12
  • 2周红,凌燮亭.有限精度混沌系统的m序列扰动实现[J].电子学报,1997,25(7):95-97. 被引量:99
  • 3郝柏林.从抛物线谈起--混沌动力学引论[M].上海:上海科技教育出版社,1995..
  • 4王亥,胡健栋.改进型Logistic-Map混沌扩频序列[J].通信学报,1997,18(8):71-77. 被引量:78
  • 5Dang P P, Chan P M. Image encryption for secure Internet multimedia applications [J]. IEEE Transactions on Consumer Electronics, 2000,46 (3) :395--403.
  • 6Cheng Howard, Li Xiaobo. Partial encryption of compressed images and videos[J]. IEEE Transactionson Signal Processing, 2000,48(8) : 2439-- 2551.
  • 7YenJuicheng, Guo Jiunin. A new chaotic key-based design for image encryption and decryption [Z].ISCAS 2000 IEEE-International Symposium on Circuits and Systems, Geneva, SwitzerLand, 2000.
  • 8LING CONG,LI SHAO QIAN.Chaotic spreading sequences with multiple access performance better than random sequences [J].IEEE Trans on Circuit and System-I:Fundamental Theory and Application,2000,47(3):394-397.
  • 9MAKOTO I.Spread spectrum communication via chaos [J].International Journal of Bifurcation and Chaos,1999,9(1):15-213.
  • 10GHOBAD HEIDAR-BATENI,CLARE D MCGILLEM.A chaotic direct-spread communication system[J].IEEE Trans onComm,1994,42(2,3,4):1 524-1 527.

共引文献33

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部