Communication Security: The Degree Of Security Of A Scrambling Algorithm

937 words - 4 pages

A Communication scheme is said to be secure if it is capable to protect the data from any kind of eavesdropping. Scrambling is a technique which is used to obscure the content of transmission and is mainly employed in data hiding, water marking and encryption applications for providing information security against illegal surveillance and wire tapping. In the time domain scrambling process, a segment of time domain samples are taken and scrambles them into a different segment of samples. This scrambled data is transmitted and at the receiving end it is descrambled into its original form. The scrambling and descrambling operations are based on a scrambling/descrambling matrix. The ...view middle of the document...

Key space is the number of keys available for scrambling. Bigger the key space better will be the degree of security.

An efficient scrambling method should be channel-saving, attack-resistant and should provide high scrambling degree. Since compressive sensing (CS) \cite{donoho2006compressed} provides very good compression and robustness whereas Arnold scrambling \cite{madain2012audio} provides very good scrambling degree, by combining both these techniques, an effective audio scrambling method can be developed.

Compressive sensing performs both sampling as well as compression, along with encryption of the source information simultaneously. CS seeks to represent a signal using a number of linear, non-adaptive measurements. Usually, the number of measurements is much lower than the number of samples needed if the signal is sampled at the Nyquist rate. CS requires that the signal is sparse in some basis and it combines the steps of sampling and compression. CS stores and transmits only a few non-zero coefficients and enables the recovery of signals from these few measurements. This greatly reduce the time of data acquisition, storage and the amount of data needed to be transmitted. This is the prominent advantage of CS \cite{sreenivas2009compressive}. The random measurements are taken by using a measurement matrix of suitable size and the receiver should know this matrix for the reconstruction. A key based measurement matrix not only provides security, but also eliminates the necessity of transmission of the same.

Arnold transform is a transformation technique which is commonly used in image scrambling to rearrange the pixels of the image randomly. A two dimensional Arnold transform can also be used for scrambling audio data. An algorithm based on a 64 bit key and a logistic map is used for constructing the Arnold matrix which is used for rearranging the data. Arnold scrambling offers excellent scrambling degree and breaks the correlation between audio samples effectively.

The rest of the ...

Find Another Essay On Communication Security: The Degree of Security of a Scrambling Algorithm

The Necessity of Computer Security Essay

1743 words - 7 pages security depended in part on concealing the algorithm, confidentiality of a computer encrypted message hinges solely on the secrecy of the keys. Each system is thought to encrypt a message so inscrutably that the step-by-step mathematical algorithms can be made public without compromising security. The single key system, named the Data Encryption Standard - DES for short - was designed in 1977 as the official method for protecting unclassified

The Role of Security Policy Essay

1089 words - 4 pages All companies and organizations have information that must be secured. This information is secured using security policies and standards. These security policies are practiced by the employees and written for the information systems. The employees will use the policies for the system to protect the information. The roles of the employees are also considered for the protection of information. Role-based access control (RBAC) is another way that a

The State of PC Security

3791 words - 15 pages IntroductionPrivacy and security is the number one concern of Computer users today. Survey after survey indicates people's mounting concern for the protection of their identities and the safeguard of their data. While our computer security and privacy faces threats from both private and probably governmental intrusions, the existing patchwork of laws and practices fails to provide comprehensive protection. Instead, we live in a confusion of

Security Requirements of the Organization

1155 words - 5 pages Security requirements of the organization First we will ensure that the system is physically secured. The room that will house the server will be in a secured area with multi-leveled security such as a keypad and additional locks. The room will have an air conditioner to ensure that the system remains cool and secured. Once the routers have been configured and secured, the next thing we will put in place is ACL list. This list would

The Future of Social Security

744 words - 3 pages As the baby boomers continue to reach the Social Security-drawing age, the American government’s surplus of finances will gradually fall to a dearth of funds unless intervention is made quickly. Plans for reform have been mentioned, but so far nothing has been done to supplement the future’s inevitable lack of funds. The sooner the government takes action on Social Security, the less severe the reform will have to be. Well- planned

Security of the United States

664 words - 3 pages Security of the United States      Over the last several years the United States has suffered several losses and devastating events. Most of these could have and should have been at a minimal level if the government would have done its job correctly. Terrorist attacks on the United States have shown the rest of the world our weakness.      In a recent newspaper article there was information that the governmental agencies that are

Eternal Security of the Believer

1389 words - 6 pages Of all the past and present theological debates within Orthodox Christianity, few have managed to claim the perpetual debate as has the discussion surrounding the eternal security of the believer. For many generations, faithful Christians have stood on opposite sides of this issue, decrying the view of those standing opposite them. Broadly, some view the Bible as teaching that a man who has experienced a genuine conversion can, by his own will

The History of Social Security and Social Security Administration

1452 words - 6 pages Social Security and Social Security Administration Michael Jones worked his whole life. At the age of 15 he started as a dishwasher at a restaurant a mile away from his house. He never graduated high school because he had to quit school to help his single mom support a family of six. There were many times in his life where he worked two jobs, but at minimum-wage, if that, 80 hours a week still did not go far. By the age of 20 he was married, and

The importance of a comprehensive security policy for modern businesses

2140 words - 9 pages The information age went international in the 1980s. However, the fact is that a series of corresponding security weaknesses also came. For example, electronic mails are widely applied in today's daily life and business, while the virus of one computer connected to many others in a honeycomb arrangement may affect another, as usually how great they are interconnected is unknown (Shain, 1996). Therefore, information security is increasingly

A Brief Analysis Of Social Security In The United States

820 words - 4 pages In the United States, before 1935, very few workers in the United States worked in jobs covered by pensions. Of those with coverage, many never received any benefits because their benefits were not guaranteed.The original Social Security Act was passed in 1935. It had two components: a Social Security retirement benefit that applied only to workers and a welfare program for the needy elderly called Old Age Assistance. The welfare program was

Cloud Computing Virtualization – A Threat to Security of the System

2040 words - 9 pages security loop hole in the virtualization system is that the communication between two guests is not visible. Setting up virtual IDS and IPS can be helpful. 5. CONCLUSION Security is a core challenge in every system, whether physical or virtualized but virtualization environment is more vulnerable to attacks and no doubt that it is a threat to the entire system. There are many pros and cons of adopting virtualization and if this technology is

Similar Essays

Wireless Communication Security Essay

1832 words - 7 pages would also mean that the industry manufacturers of these systems will need to keep in mind that they should make these security protocols affordable in order to maintain their customer base and eventually have it to grow to a much higher degree. Conclusion There are many ways to discuss wireless security, but the problem is this? Data is radiated over an area that may exceed the limits of systems control”. The question I will answer in

The Scrambling Of Time In Faulkner's A Rose For Emily

1502 words - 6 pages The Scrambling of Time in Faulkner's A Rose for Emily In, A Rose for Emily, Faulkner uses the element of time to enhance details of the setting and vice versa. By avoiding the chronological order of events of Miss Emily's life, Faulkner first gives the reader a finished puzzle, and then allows the reader to examine this puzzle piece by piece, step by step. By doing so, he enhances the plot and presents two different perspectives of time

Security Of A Shift Cipher Essay

721 words - 3 pages Shift ciphers are the most basic form of cipher that can be used, the only problem is, they are not very secure ciphers. The only time a shift cipher can be secure, it is also perfectly secure. This “perfect security” only happens when a shift cipher is used on a single letter of plaintext and no more. If practicality is being considered, then this is not an efficient use of enciphering a message. It simply isn’t practical to send a single

A Comparison Of Contract Security And Proprietary Security

870 words - 4 pages private security to control access, an authority which by 2012 requires reduction in private or contract security by 50 percent. In the Congressional Research Service report to Congress, the author highlighted: The United States relies on contractors to provide a wide variety of services in Afghanistan and Iraq, including armed security. While DOD has previously contracted for security in Bosnia and elsewhere, it appears that in Afghanistan and