Chaos-Based Cryptography for Voice Secure Wireless Communication

Chaos-Based Cryptography for Voice Secure Wireless Communication

Copyright: © 2015 |Pages: 34
DOI: 10.4018/978-1-4666-8468-3.ch026
(Individual Chapters)
No Current Special Offers


Chaos theory was originally developed by mathematicians and physicists. The theory deals with the behaviors of nonlinear dynamic systems. Chaos theory has desirable features, such as deterministic, nonlinear, irregular, long-term prediction, and sensitivity to initial conditions. Therefore, and based on chaos theory features, the security research community adopts chaos theory in modern cryptography. However, there are challenges of using chaos theory with cryptography, and this chapter highlights some of those challenges. The voice information is very important compared with the information of image and text. This chapter reviews most of the encryption techniques that adopt chaos-based cryptography, and illustrates the uses of chaos-based voice encryption techniques in wireless communication as well. This chapter summarizes the traditional and modern techniques of voice/speech encryption and demonstrates the feasibility of adopting chaos-based cryptography in wireless communications.
Chapter Preview

Multidisciplinary In Chaos Based Cryptography

Multidisciplinary is composed of several separate branches of learning or fields of expertise. These different disciplines (fields) can use chaos theory in their applications as illustrated in Figure 1 (David et al., 2012) .

Figure 1.

Different disciplines (fields) used within the chaos applications


Figure 2 gives the schematic presentation of the chaos behavior. It shows the detail of these applications that exploit the chaos behavior. The behavior of chaos can be seen in the labs, in the nature, in an economics (Kyrtsou & Labys, 2006), in finance (Hristu-Varsakelis & Kyrtsou, 2008), in different other studies such as medical studies (White, 1999), quantum chaos theory study (Berry, 2003), electrical engineering and computer science chaotic systems as well as numerical analysis (Strang, 1991).

Figure 2.

The different applications use chaos


Complete Chapter List

Search this Book: