Digital communications: fundamentals and applications
Digital communications: fundamentals and applications
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Modern Cryptography, Probabilistic Proofs, and Pseudorandomness
Modern Cryptography, Probabilistic Proofs, and Pseudorandomness
Cryptographic security architecture design and verification
Cryptographic security architecture design and verification
Hidden Image Separation from Incomplete Image Mixtures by Independent Component Analysis
ICPR '96 Proceedings of the 13th International Conference on Pattern Recognition - Volume 2
On underdetermined source separation
ICASSP '99 Proceedings of the Acoustics, Speech, and Signal Processing, 1999. on 1999 IEEE International Conference - Volume 03
A blind source separation technique using second-order statistics
IEEE Transactions on Signal Processing
Underdetermined Blind Separation of Nondisjoint Sources in the Time-Frequency Domain
IEEE Transactions on Signal Processing
Blind source separation based on time-frequency signalrepresentations
IEEE Transactions on Signal Processing
Hi-index | 0.00 |
The use of signal processing techniques in cryptographic field is an attractive approach in recent years. As an example, the intractability of the under-determined blind source separation (BSS) problem has been used for the proposal of BSS-based speech encryption. However, some weaknesses of this proposal from a cryptographic point of view have been recently published. In this paper, we propose a new encryption method that bypass these weaknesses. The proposed approach is based on the subspace concept together with the use of nonlinear functions and key signals. An interesting feature of the proposed technique is that only a part of the secret key parameters used during encryption is necessary for decryption. Furthermore, if no plain-text is fed to the encryption algorithm, the latter will provide no contents. Analysis results show that the proposed method significantly enhances the security level of existing BSS-based speech encryption methods.