This paper answers three essential questions for audio speech cryptosystems in time and discrete transform *** first question is,what are the best values of sub-keys that must be used to get the best quality and secur...
详细信息
This paper answers three essential questions for audio speech cryptosystems in time and discrete transform *** first question is,what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform *** second question is the relation between the number of sub-keys,the number of secret keys used,and the audio speech signal block’s ***,how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform *** audio cryptosystem discussed before in recent research is applied to answer the three previous *** simulation results and analysis answer all three questions;first,there is no specific,well-defined format or rule for sub-key values that must be used to get a better *** the second question,yes,there is a direct relationship between the number of applicable keys,number of available sub-keys,and block size of speech audio signal and formulated into a first-order *** the third question,each discrete transform domain has a specific acceptable range of sub-keys that imply a particular number of keys that can be used to get a better cryptosystem.
作者:
Rothkrantz, LeonFaculty of Electronic Engineering
Mathematics and Computer Science Delft University of Technology Netherlands and Faculty of Transportation Sciences Czech Technical University in Prague Czech Republic
At many times we observed disturbances of traffic flow on highways. This may be caused by traffic accidents, bad weather conditions, road maintenance or rush hours. The Road Traffic Management takes many rules and reg...
详细信息
Advancing memory circuitry has heightened the performance criteria for memory in diverse chip applications. Decoders, serving as peripheral circuits to memory devices, have be a prominent area of academic interest. Th...
详细信息
This research presents an automatic system for the detection of stop line violations. Stop line violation is defined as a condition in which a vehicle does not appropriately stop behind a stop line. This research uses...
详细信息
This paper presents an adaptive rate reaching law based sliding mode control method for a three-phase F-type converter. Unlike the existing reaching laws in which the gain is always constant, the proposed reaching law...
详细信息
Crude nyamplung Calophyllum inophyllum is a potential non-edible feedstock for biodiesel production. Calophyllum Inophyllum oil (CCIO) is a non-edible oil that has a high content of triglyceride (TG) and free fatty ac...
详细信息
The paper considers two main applications of the transducers in the form of a piezoelectric disk with two metal plate end-caps, which are usually called cymbal transducers. The first variant of the cymbal transducer i...
详细信息
In modern healthcare systems, physicians often diagnose and prescribe within their specific fields of expertise. However, this compartmentalized approach may not fully assess the overall health condition of patients, ...
详细信息
Improving technology in the field of education will greatly help teachers and students in various ways, one of which is attendance. An attendance system generally leaks security and verification which may lead to frau...
详细信息
In the era of precision agriculture, effective and efficient monitoring of rice paddy fields is vital for optimizing crop yield and ensuring environmental sustainability. This study presents a novel approach utilizing...
详细信息
暂无评论