ÄÚÈÝ·¢²¼¸üÐÂʱ¼ä : 2025/8/12 16:39:32ÐÇÆÚÒ» ÏÂÃæÊÇÎÄÕµÄÈ«²¿ÄÚÈÝÇëÈÏÕæÔĶÁ¡£
±ÏÒµÉè¼Æ
ѧ Ôº£º ÐÅÏ¢¹¤³ÌѧԺ ϵ(רҵ)£º ͨÐŹ¤³Ì
Ìâ Ä¿£º ÓïÒô¼ÓÃܽâÃÜËã·¨Ñо¿¡¢·ÂÕæºÍʵÏÖ
1
±ÏÒµÉè¼Æ£¨ÂÛÎÄ£©ÖÐÎÄÕªÒª
ÓïÒô¼ÓÃܽâÃÜËã·¨Ñо¿¡¢·ÂÕæºÍʵÏÖ ÕªÒª£º ÓïÒôÐźŵĴ«ÊäÔÚµ±´úͨÐÅÖÐ×÷Óúܴ󣬼¸ºõÉæ¼°Éú»îµÄ·½·½ÃæÃ棬ÀýÈçÿÌìÓÃÊÖ»ú´òµç»°£¬ÓïÒôÃüÁî²Ù×÷ÒÔ¼°¸èÇúµÄÂ¼ÖÆÓë²¥·Å¡£ÔÚÓïÒôÓ¦ÓõÄijЩ·½ÃæÎÒÃDz¢²»Ï£ÍûÐÅÏ¢Íâй£¬Òò´ËÎÒÃǽ«ÓïÒôÐźÅÔÚ·¢ËͶ˽øÐмÓÃܺóÔÙ´«Êä²¢¸ù¾Ý·¢ËͶ˵ļÓÃÜ·½Ê½ÔÚ½ÓÊն˽øÐнâÃָܻ´ÔÏȵÄÓïÒôÐźš£ÕâÑù¾ÍËãÔÚ´«Êä¹ý³ÌÖÐËù´«ÊäµÄÐÅÏ¢±»½Ø»ñ£¬ÓÉÓÚ²»ÖªµÀÈçºÎ½âÃÜÒ²²»ÄÜ»ñÖª¶ÔÓ¦µÄÓïÒôÐÅÏ¢£¬´Ó¶øÆðµ½ÁËÓïÒôÐÅÏ¢µÄ±£»¤×÷Óá£ÎªÁ˼ÓÇ¿ÓïÒôÐźŵĴ«Ê䰲ȫ£¬²ÉÓûìãçÌØÐÔ½«ÓïÒôÐźŽøÐмÓÃÜ£¬²¢ÀûÓöԳÆÃÜÂëÌåÖÆ½øÐнâÃÜ¡£»ìãçϵͳ¶Ô³õʼֵºÍϵͳ²ÎÊý·Ç³£Ãô¸Ð,¼´Ê¹ÊÇÁ½¸öÏàͬµÄ»ìãçϵͳ,Èç¹û³õʼֵ´æÔÚ΢СµÄ²îÒì,¾¹ý¶à´Îµü´úºó,ϵͳ»á±äµÃ²î¾àºÜ´ó¡£¼ÓÃܹý³ÌʹÓÃÀëÉ¢»ìãçÓ³Éä¼ÓÃÜϵͳµÄlogisticÓ³É䡣ͨ¹ý¹Û²ì¶Ô±ÈÔÓïÒôÐźš¢¼ÓÃܺóµÄÓïÒôÐźÅÓë»Ö¸´ºóÓïÒôÐźŵIJ¨ÐÎͼ£¬Á˽â»ìãçϵͳÔÚÓïÒô¼ÓÃÜ·½ÃæµÄÓÅȱµã¡£ ¹Ø¼ü´Ê£º ÓïÒô´«Êä »ìãçϵͳ logisticÓ³Éä ¶Ô³ÆÃÜÂëÌåÖÆ
±ÏÒµÉè¼Æ£¨ÂÛÎÄ£©ÍâÎÄÕªÒª
Title VOICE ENCRYPTION AND DECRYPTION ALGORITHMS,SIMULATION AND IMPLEMENTATION Abstract£¨ÈýºÅºÚÌ壬¾Ó×ó£© The transmission of the voice signal which involves almost all aspects of life plays an important role in modern communication£¬such as calling everyday with the mobilephone ,voice command operation and playing the songs which is recorded in. Sometimes we do not want to leak the voice information so we encrypt it before transmission and decrypt it after reception according to encryption at the transmit side. Therefore, the information can not be obtained even if the information is intercepted in the transmission for decryption is unknown to the attacker, thus protecting the information. In order to enhance the safety of the transmission of voice information, we adopt the system of chaos to encrypt it and the system of symmetrical cipher to decrypt. The characteristic of chaos is extremely sensitive to initial value and the system parameters. It will be a large gap between two chaos systems even if they are identical when there is a slightly difference in initial value or system parameter after several iteration. The encryption process uses logistic mapping of discrete chaotic encryption system. By observing the waveform comparison of the original voice signal, encrypted voice signal and decrypted voice signal, we can voice encryption and decryption. Keywords£º the transmission of the voice system of chaos logistic mapping symmetrical cipher system
Ŀ ¼
1 ÒýÑÔ£¨»òÐ÷ÂÛ£© ............................................... - 1 - 1£®1 ¿ÎÌâÀ´Ô´¼°ÒâÒå .......................................... - 1 - 1.2 »ìãç¼ÓÃܼò½é¼°Ñо¿ÏÖ×´ .................................... - 1 -
1.2.1 »ìãç¼ò½é ............................................ - 1 - 1.2.2 »ìãç¼ÓÃÜÑо¿ÏÖ×´ ..................................... - 2 - 1.3¼ÓÃܽâÃܽéÉÜ ............................................... - 2 - 1.4 ±¾ÂÛÎĵÄÖ÷Òª¹¤×÷¼°ÄÚÈݰ²ÅÅ ................................ - 3 - 2 ÓïÒôÐźŶÁÈ¡ÓëÔ¤´¦Àí ......................................... - 4 - 2.1 ÓïÒôÐźŵÄÌØµãÓëѡȡ ..................................... - 4 - 2.2 ÓïÒôÐźŵÄÔ¤´¦Àí ......................................... - 6 -
2.2.1 ÓïÒôÐÅºÅµÄÆµÆ×Ó뵹ƵÆ×·ÖÎö .......................... - 6 - 2.2.2 ÓïÒôÐźŵÄmatlab·ÖÎö ............................... - 8 - 3
ÓïÒôÐźżÓÃܽâÃÜÉè¼Æ ...................................... - 10 -
3.1 ¼ÓÃÜ·½°¸Éè¼Æ ............................................ - 10 -
3.1.1 ¼ÓÃÜ·½°¸µÄÑ¡Ó÷ÖÎö .................................. - 11 - 3.1.2 »ìãç¼ÓÃÜ·½°¸µÄ¾ßÌåÁ÷³Ì ............................. - 12 - 3.2 ½âÃÜ·½·¨ ................................................ - 15 - 4 ÓïÒôÐźżÓÃܽâÃÜËã·¨³ÌÐòÉè¼Æ ................................ - 16 - 4.1Ëã·¨²½Öè .................................................. - 16 - 4.2 Ëã·¨Á÷³Ìͼ ............................................... - 16 - ½á ÂÛ ......................................................... - 18 - ²Î ¿¼ ÎÄ Ï× .................................................... - 22 - Ö л ......................................................... - 23 - ¸½Â¼ ........................................................... - 24 -