Font Size: a A A

Technology Of Voice Chaotic Encryption And Decryption Via Bluetooth Real-time Wireless Transmission

Posted on:2016-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:X N WangFull Text:PDF
GTID:2308330461455991Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
With the coming of information age, protection of the security of information has become the most important research topic. The voice of information is the base on mutual communication between people; the encrypted voice communication is a way to avoid stolen. Over the years, the chaotic system obtains a very wide range of applications in the field of information security. Chaos and cryptography has a natural connection, so chaotic sequence has broad application prospects in the field of data encryption. Characteristics of aperiodic, noise-like of chaotic system has make it get a natural concealment. Extreme sensitivity of chaotic systems for initial values, not convergence characteristics that make it have long-term unpredictable nature. Therefore, the signal of chaotic is very appropriate secure for communication. Today, chaotic digital voice secure communication on digital devices platform implemented most of the data transmission cable. Although cable transmission reliability and stability is high, but cable transmission defect cannot be ignored, that is very susceptible to the aging problem and distance limitations and other related issues. Therefore, choosing the right wireless communications technology to achieve chaotic secure digital voice communication is very important research value. This paper studies a chaotic digital voice encryption Bluetooth wireless technology and the completion of its hardware implementation on S3C2440A platform, opening of this paper introduces some important theoretical basics of chaos theory and digital voice encryption technology, and designed a Digital voice encryption algorithm based on Chaotic. This method is the use of chaotic cat map to achieve the position of scrambling matrix data, voice encryption in order to achieve results. Secondly Bluetooth protocol system works with Bluetooth serial module, described the speech data in the Bluetooth master and slave implementations transmission between modules. The main feature of this method is that it can achieve point to point data acquisition and wireless transmission, which will solve the problem successfully such as cable transmission. At the end of this article, by building embedded platforms using Bluetooth technology on which the realization of the digital voice transmission on ChaoticEncryption and after the experimental results and analysis. The results show that this scheme can achieve good encryption effect, and can be more widely used in Chaotic Secure Communication digital devices.
Keywords/Search Tags:Bluetooth Technology, Voice, Secure Communications, Embedded
PDF Full Text Request
Related items