Con(dif)fused voice to convey secret: a dual-domain approach
Multimedia Systems, pp. 301-311, 2020.
Audio encryption Tent map Logistic map Discrete Fourier transform Discrete cosine transformMore(1+)
Owing to the rapid development and advancements in the field of networks and communication, sharing of multimedia contents over insecure networks has become vital. The confidentiality of audio signals is predominantly needed in military and intelligence bureau applications. The proposed algorithm addresses this issue by encrypting audio s...More
Full Text (Upload PDF)
PPT (Upload PPT)