Affiliation:
1. University of Babylon, Iraq
Abstract
Chaos theory was originally developed by mathematicians and physicists. The theory deals with the behaviors of nonlinear dynamic systems. Chaos theory has desirable features, such as deterministic, nonlinear, irregular, long-term prediction, and sensitivity to initial conditions. Therefore, and based on chaos theory features, the security research community adopts chaos theory in modern cryptography. However, there are challenges of using chaos theory with cryptography, and this chapter highlights some of those challenges. The voice information is very important compared with the information of image and text. This chapter reviews most of the encryption techniques that adopt chaos-based cryptography, and illustrates the uses of chaos-based voice encryption techniques in wireless communication as well. This chapter summarizes the traditional and modern techniques of voice/speech encryption and demonstrates the feasibility of adopting chaos-based cryptography in wireless communications.
Reference75 articles.
1. Speech Scrambling Based on Principal Component Analysis.;N.Abbas;MASAUM Journal of Computing,2009
2. Implementation of a Chaotically Encrypted Wireless Communication System
3. Agrawal, D., & Zeng, Q. (2005). Introduction to Wireless and Mobile Systems (2nd Ed.). Amazon.com.
4. Chaos Based Mixed Keystream Generation for Voice Data Encryption
5. SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS