Abstract

The information to be exchanged between two parties can be text data or speech data. This data is encrypted for its security and communicated (to the other end). When an adversary intercepts these encrypted data then in order to recover the actual information, his first step is to identify whether intercepted data is encrypted text or encrypted speech are used. The next step is to get the actual information from encrypted text or encrypted speech. In this paper, pattern recognition techniques are applied for identification of encrypted text and encrypted speech. Some new and modified feature extraction techniques have been used to convert the text and speech data into three-dimensional, four-dimensional, and five-dimensional measurement vectors. These multi-dimensional measurement vectors are converted into two-dimensional vectors using projection pursuit technique based on Sammon.s algorithm and Chien.s algorithm. The quantified classification performances using minimum distance classifier and maximum likelihood classifier have also been given. Defence Science Journal, 2010, 60(4), pp.420-422 , DOI:http://dx.doi.org/10.14429/dsj.60.497

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.