Page 105 - 2024-Vol20-Issue2
P. 105
101 | Shumran & Al-Hussein
Cyber Physical Engineering, pp. 1419–1427, Springer, for chaotic glucose-insulin regulatory system,” Interna-
2021. tional Journal of Bifurcation and Chaos, vol. 30, no. 12,
p. 2050178, 2020.
[7] W. Dutta, S. Mitra, and S. Kalaivani, “Audio encryption
and decryption algorithm in image format for secured [18] W. Dai, X. Xu, X. Song, and G. Li, “Audio encryp-
communication,” in 2017 International Conference on tion algorithm based on chen memristor chaotic system.
Inventive Computing and Informatics (ICICI), pp. 517– symmetry 14 (1): 17,” 2022.
521, IEEE, 2017.
[19] S. Fu, X. Cheng, and J. Liu, “Dynamics, circuit de-
[8] M. Kalpana, K. Ratnavelu, and P. Balasubramaniam, sign, feedback control of a new hyperchaotic system and
“An audio encryption based on synchronization of robust its application in audio encryption,” Scientific Reports,
bam fcnns with time delays,” Multimedia Tools and vol. 13, no. 1, p. 19385, 2023.
Applications, vol. 78, pp. 5969–5988, 2019.
[20] E. A. Hussein, M. K. Khashan, and A. K. Jawad, “A
[9] H. Liu, A. Kadir, and Y. Li, “Audio encryption scheme high security and noise immunity of speech based on
by confusion and diffusion based on multi-scroll chaotic double chaotic masking,” International Journal of Elec-
system and one-time keys,” Optik, vol. 127, no. 19, trical and Computer Engineering (IJECE), vol. 10, no. 4,
pp. 7431–7438, 2016. pp. 4270–4278, 2020.
[10] M. M. Rahman, T. K. Saha, and M. A.-A. Bhuiyan, [21] S. S. Hreshee, H. N. Abdullah, and A. K. Jawad, “A high
“Implementation of rsa algorithm for speech data encryp- security communication system based on chaotic scram-
tion and decryption,” IJCSNS International Journal of bling and chaotic masking,” Int. J. Commun. Antenna
Computer Science and Network Security, vol. 12, no. 3, Propag, vol. 8, no. 3, p. 257, 2018.
pp. 74–82, 2012.
[22] M. F. Abd Elzaher, M. Shalaby, and S. H. El Ramly,
[11] M. I. Khalil, “Real-time encryption/decryption of audio “Securing modern voice communication systems using
signal,” International Journal of Computer Network and multilevel chaotic approach,” International Journal of
Information Security, vol. 8, no. 2, pp. 25–31, 2016. Computer Applications, vol. 135, no. 9, pp. 17–21, 2016.
[12] S. F. Yousif, “Encryption and decryption of audio signal [23] E. Avarog?lu, “Pseudorandom number generator based
based on rsa algorithn,” International Journal of Engi- on arnold cat map and statistical analysis,” Turkish Jour-
neering Technologies and Management Research, vol. 5, nal of Electrical Engineering and Computer Sciences,
no. 7, pp. 57–64, 2018. vol. 25, no. 1, pp. 633–643, 2017.
[13] A. E. Taki El Deen, “Implementation of an encryption [24] K. Kordov, “A novel audio encryption algorithm
scheme for voice calls,” International Journal of Com- with permutation-substitution architecture,” Electronics,
puter Applications, vol. 975, p. 8887. vol. 8, no. 5, p. 530, 2019.
[14] A.-B. A. Al-Hussein, F. R. Tahir, and O. Boubaker, [25] H. Aziz, S. M. M. Gilani, I. Hussain, A. K. Janjua, and
“Chaos elimination in power system using synergetic S. Khurram, “A noise-tolerant audio encryption frame-
control theory,” in 2021 18th International Multi- work designed by the application of s8 symmetric group
Conference on Systems, Signals & Devices (SSD), and chaotic systems,” Mathematical Problems in Engi-
pp. 340–345, IEEE, 2021. neering, vol. 2021, pp. 1–15, 2021.
[15] A.-B. A. Al-Hussein, F. R. Tahir, and K. Rajagopal, [26] M. M. Parvees, J. A. Samath, and B. P. Bose, “Audio
“Chaotic power system stabilization based on novel in- encryption–a chaos-based data byte scrambling tech-
commensurate fractional-order linear augmentation con- nique,” International Journal of Applied Systemic Stud-
troller,” Complexity, vol. 2021, pp. 1–13, 2021. ies, vol. 8, no. 1, pp. 51–75, 2018.
[16] A.-B. A. Al-Hussein, “Chaos phenomenon in power [27] S. Sheela, K. Suresh, D. Tandur, et al., “A novel audio
systems: A review.,” Iraqi Journal for Electrical & Elec- cryptosystem using chaotic maps and dna encoding,”
tronic Engineering, vol. 17, no. 2, 2021. Journal of Computer Networks and Communications,
vol. 2017, 2017.
[17] A.-B. A. Al-Hussein, F. Rahma, L. Fortuna, M. Bucolo,
M. Frasca, and A. Buscarino, “A new time-delay model