Abstract

Chaos theory was originally developed by mathematicians and physicists. The theory deals with the behaviors of nonlinear dynamic systems. Chaos theory has desirable features, such as deterministic, nonlinear, irregular, long-term prediction, and sensitivity to initial conditions. Therefore, and based on chaos theory features, the security research community adopts chaos theory in modern cryptography. However, there are challenges of using chaos theory with cryptography, and this chapter highlights some of those challenges. The voice information is very important compared with the information of image and text. This chapter reviews most of the encryption techniques that adopt chaos-based cryptography, and illustrates the uses of chaos-based voice encryption techniques in wireless communication as well. This chapter summarizes the traditional and modern techniques of voice/speech encryption and demonstrates the feasibility of adopting chaos-based cryptography in wireless communications.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.