Font Size: a A A

Secure Communication Based On Chaos Theory, Network Voice

Posted on:2005-04-14Degree:MasterType:Thesis
Country:ChinaCandidate:N HuFull Text:PDF
GTID:2208360152465014Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
Based on the chaos theory, this paper discusses the relative theories about chaos security communications, as well as the history and status quo of its development. The paper comes up with a solution to the point-to-point network communications system of speech encryption, which is performed on the general platforms of computer network. The system consists of the real-time processing of speech signals, the data encryption and the network transmissions. Firstly, the paper introduces the relative theories of chaotic security communications, as well as their developing history, and analyses the principles of data encryption and decryption; Secondly, the paper proposes the methods of data acquisition, processing and playing back of speech signals; Finally, the studies presents how to implement the point-to-point transmission system of network on the basis of the TCP/IP protocol. The specific implement is involved in some critical techniques such as the generation of chaotic time sequences, the data acquisition and compressing, the playing back of speech signals, and utilizing sockets to complete the reliable network transmissions, etc.This system implements the chaos iterative algorithm and the network communications of speech mainly by software. The system has the characteristics of high security, the anti-pervasion of error code and the well anti-jamming ability and so on. It has some innovations in terms of the security and utility. In the field of network security communications, the applications of chaos theory have already stridden forward to the practical stage.
Keywords/Search Tags:Chaos sequence, point-to-point, Speech communications, Network transmissions, TCP/IP
PDF Full Text Request
Related items