Skip to main content

Chaos based cryptography for voice encryption in wireless communication


Chaos based cryptography for voice encryption in wireless communication
Sadkhan, S., Al-Sherbaz, A. and Mohammed, R. 
International Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE).
 Iraq: IEEE. 
pp. 191-197


Abstract
The vast growths in mobile and wireless applications would contain lacks of using suitable security concepts during the development process which worries the information security research community. This paper reviews most of the encryption techniques which adopt chaos based cryptography, and illustrates the used of chaos based voice encryption techniques in wireless communication as well. The review in this paper summarized the traditional and modern techniques of voice/speech encryption and demonstrated the feasibility of adopting chaos based cryptography for in wireless communications.



citation: Sadkhan, S.Al-Sherbaz, A. and Mohammed, R. (2015) Chaos based cryptography for voice encryption in wireless communication. In: International Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE). Iraq: IEEE. pp. 191-197


If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Popular posts from this blog

Experiments in teaching Neural Networks

Excel Based







Scratch-based
More details available at https://computingnorthampton.blogspot.co.uk/2016/11/miniproject-using-scratch-to-build-and.html including links to the code.


All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with. Twitter: @scottturneruon

Social Analysis of Publications

The Computing staff's network of co-authors, at the University of Northampton, based on the University's  research repository NECTAR - http://nectar.northampton.ac.uk/view/divisions/SSTCT.html on 12th November 2016. The data goes back to 2010.




The data was analysed using the software VOSviewer - http://www.vosviewer.com/ free software for visualising networks. Differences in colours represents, the clusters of publications with those authors picked out by the software. The relative size of the circles is the relative number of publications listed; so for the two biggest circles/hubs it relates to 55 and 34 publications in this time period. Some relatively new authors, to the University but not to research, explains some of the 'islands' and the number of publications within it - it only reflects publications whilst at the University of Northampton.

To dig a little deeper, going to  look at the two biggest 'hubs' through their NECTAR records, so potentially going …

Computer lecturer’s research helps improve the next generation of technology

Taken from: http://www.northampton.ac.uk/news/computer-lecturers-research-helps-improve-the-next-generation-of-technology/ A computing lecturer at the University of Northampton, who is researching into how the efficiency of our everyday devices, such as mobile phones, can be improved, has been awarded the best paper at two recent conferences. Dr Michael Opoku Agyeman has written several journal papers focusing on how the next generation of technology can meet the ever increasing demands from consumers. He was invited to present his work at the 19th Euromicro Conference on Digital System Design in Cyprus and the Institute of Electrical and Electronics Engineers’ 14th International Conference in Paris. Part of his research concentrates on whether several processing elements can be incorporated on a single chip, known as System-On-Chip, to improve the efficiency and speed of the computing systems that we use every day, from mobile phones to video-game consoles and even medical equipment…