Dissertation > Excellent graduate degree dissertation topics show

Voice over IP Chaotic Encryption Algorithm

Author: FanLei
Tutor: SunJinSheng;MaoYaoBin
School: Nanjing University of Technology and Engineering
Course: Control Theory and Control Engineering
Keywords: chaotic secure communication voice encryption cryptography IP voice code VoIP
CLC: TN918
Type: Master's thesis
Year: 2004
Downloads: 303
Quote: 5
Read: Download Dissertation


The advance of the digital signal processing technology and the prevalence of the network communication have brought about a crisis of multimedia security, which triggered an avalanche of attentions either paid by the government or by the general public. Since the multimedia data like image, video and audio have certain intrinsic properties such as high redundancy and bulk capacities, special concerns on operation speed, computational payload and many other security issues have to be made in the construction of the encryption algorithms that would not be taken into account in that of text encryption. In this regards, currently existing cryptological methods are not appropriate for the applications of nowadays multimedia encryption.At the same time, the combination of the cutting-edge chaotic theory and the cryptography has led to the birth of a span-new technology, chaotic cryptology, which has become a novel and effective way to accomplish the task of multimedia security.In this thesis, chaos based IP voice secure transmission technique is studied. Several chaotic encryption methods that incorperated with voice coding are brought forth, which includes an block cipher algorithm jointly using Cat map and Logistic map, two G. 729 based chaotic encryption methods and an ameliorated algorithm improved upon previous two. The security analysises, the emperimental results as well as details on software implementation are reported in the paper.Finally, the thesis is concluded by pointing out some further research directions on the research of IP voice encryption.

Related Dissertations

  1. Resrarch on Multisignatures and Multisigncryptions from Identity-based,TN918.1
  2. Research on Iris Based Cryptography,TP309.7
  3. The Studt of ILBC Speech Coding’s Key Technology and Its DSP Design and Optimization,TN912.3
  4. Design of VoIP Gateway Based on DSP,TN916.2
  5. Research and Application on Security Authentication Technologies in Internet of Things,TN929.5
  6. The Research of Attack Source Traceback in Distributed Denial-of-Service Attacks Based on VoIP,TP393.08
  7. Henan Public Security System Network Design and Implementation,TP393.09
  8. Research and Implementation of Softphone Based on SIP,TN916.2
  9. VoIP Security Mechamism Research and Implementation Based on the Mobile Network,TN916.2
  10. Research and Design of Secure Comunication of NVD on Demand System,TP309
  11. Research and Implementation of SIP Server Based on the Multimedia Trunking and Dispatching Plateform,TP368.5
  12. Mobile terminal identity digital signature scheme based on research,TN918.1
  13. Identity-based NVD remote key system design and implementation,TN918.2
  14. Identity-Based Authentication System Research and Implementation,TN918.1
  15. New SIP-based voice gateway system design and implementation,TN916.2
  16. E-government network security instant messaging system design and implementation,TP393.08
  17. Several digital chaotic cryptography analysis,O415.5
  18. TMS320VC5509A voice encryption system based Design and Implementation,TN918.4
  19. Research and Implementation of covert communication of multimedia data network communication system,TP393.08
  20. Research and Implement of Self-adaptive Image Encryption Algorithm Based on Chaos,TP309.7
  21. Forward-secure encryption technology,TN918.2

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security
© 2012 www.DissertationTopic.Net  Mobile