IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 5 - Issue 10, November 2016 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Novel Chaos-Based Voice Controlled FTP Tool

[Full Text]

 

AUTHOR(S)

Muhammed Maruf Ozturk, Akif Akgul, Sezgin Kacar

 

KEYWORDS

Chaos, Logistic map, Encryption, FTP tool, Voice recognition, Web interface, Nonlinear equations

 

ABSTRACT

To manage file transfer operation, various tools have been developed so far. However, these tools can not respond adequately for conduct a secure transfer. Also few works have been done using encrypted voice controlled system yet. By regarding this lack, we investigate how to built a useful and secure tool. This work presents a novel improved voice controlled FTP tool (Wb-CFTP) using chaotic system. A chaotic system called as logistic map is associated with Wb-FTP designed on the basis of Asp.Net and C#. Here we depict the prominence of encryption in voice controlled systems.

 

REFERENCES

[1] M. Gien, “A file transfer protocol,” Computer Networks, vol. 2, pp. 312-319, 1978.

[2] L. Muda, B. Mumtaj, I. Elamvazuthi, “Voice recognition algorithms using mel frequency cepstral coefficient and dynamic time warping techniques,” arXiv preprint arXiv:1003.4083, 2010.

[3] Z. Lin, S. Yu, J. Lu, S. Cai, G. Chen, "Design and ARM-embedded implementation of a chaotic map-based real-time secure video communication system", Circuits and Systems for Video Technology, IEEE Transactions on, vol. 25, no. 7, pp. 1203-1216, 2015.

[4] JM. Amigo, L. Kocarev, J. Szczepanski, “Theory and practice of chaotic cryptography,” Physics Letters A, vol. 366, pp. 211-216, 2007.

[5] F. Yuan, GY. Wang, BZ. Cai, "Android SMS en- cryption system based on chaos", IEEE 16th International Conference on Communication Technology (ICCT), pp. 856-862, 2015.

[6] V. T. Pham, S. Vaidyanathan, C. K. Volos, S. Jafari, "Hidden attractors in a chaotic system with an exponential nonlinear term", The European Physical Journal Special Topics, vol. 224, no. 8, pp. 1507-1517, 2015.

[7] S. Lian, "Efficient image or video encryption based on spa- tiotemporal chaos system," Chaos Solitons and Fractals, vol. 40, pp. 2509-2519, 2009.

[8] B. Norouzi, S. Mirzakuchaki, SM. Seyedzadeh, MR. Mosavi, "A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process," Multimedia tools and applications, vol. 71, no. 3, pp. 1469-1497, 2014.

[9] L. Teng, H.H. Iu, X. Wang, X. Wang, "Chaotic be- havior in fractional-order memristor-based simplest chaotic circuit using fourth degree polynomial," Nonlinear Dynamics, vol. 77, no. 1-2, pp. 231-241, 2014.

[10] M. Khan, T. Shah, H. Mahmood, M. A. Gondal, "An efficient method for the construction of block cipher with multi-chaotic systems," Nonlinear Dynamics, vol. 71, no. 3, pp. 489-492, 2013.

[11] G.Troullinos, “A software based approach to secure voice applications," Proceedings of the Third IEEE International Conference on Electronics, pp. 176-182, Rodos, Greece, 1996.

[12] CH. Wang, MW. Li, W. Liao, “A distributed key-changing mechanism for secure voice,” IEEE International Conference on Multimedia and Expo., pp. 895-898, Beijing, China, 2007.

[13] K. Christian, “A comparison of voice controlled and mouse controlled web browsing”. Proceedings of the Fourth International ACM Conference on Assistive Technologies, pp. 72-79, Arlington, USA, 2000.

[14] MS. Hawley, P. Enderby, P. Green, SP. Cunningham, S. Brownsell, J. Carmichael, M. Parker, A. Hatzis, P. O’Neill, R. Palmer, “A speech-controlled environmental control system for people with severe dysarthria,” Medical Engineering Physics, vol. 29, pp. 586-593, 2007.

[15] H. Shi, A. Maier “Speech-enabled windows application using Microsoft SAPI,” International Journal of Computer Science and Network Security, vol. 6, pp. 33-37, 2006.

[16] MM. Mustaquim, “Automatic speech recognition an approach for designing inclusive games,” Multimedia Tools and Applications, vol. 66, pp. 131-146, 2013.

[17] B. House, J. Malkin, JA. Bilmes, “The voicebot: a voice controlled robot arm”. Proceedings of CHI, ACM Conference on Human Factors in Computing Systems, pp. 1-10, Boston, USA, 2009.

[18] A. Rudionis, K. Ratkeviius, T. Dumbliauskas, V. Rudionis, “Control of computer and electric devices by voice”. Elektronika Ir Elektrotechnika, vol. 6, pp. 11-16, 2008,.

[19] J. Ferreiros, JM. Pardo, R. de Córdoba, J. Macias-Guarasa, J.M. Montero, F. Fernández, V. Sama, L.F. d’Haro, G. González, “A speech interface for air traffic control terminals,” Aerospace Science and Technology, vol. 21, pp. 7-15, 2012.

[20] G. Cattaneo, L. Catuogno, F. Petagna, G. Roscigno, "Reliable Voice-based Transactions over VoIP Communi- cations", Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 101-108, 2015.

[21] A. Akgul, S. Kacar, I. Pehlivan, "An audio data encryption with single and double dimension discrete-Time chaotic systems“, Online J. Sci. Technol., vol. 5, no. 3, pp. 14-23, 2015.

[22] D. Bansal, M. Khan, AK. Salhan, "A computer based wireless system for online acquisition, monitoring and dig- ital processing of ECG waveforms," Computers in biology and medicine, vol. 39, no.4, pp. 361-367, 2009.

[23] QI. Ali, A. Abdulmaowjod, HM. Mohammed, "Sim- ulation & performance study of wireless sensor network (WSN) using MATLAB," Energy, Power and Control (EPC-IQ), pp. 307-314, 2010.

[24] I. Silva, GB. Moody, "An open-source toolbox for analysing and processing PhysioNet databases in MAT-LAB and Octave," Journal of Open Research Software, vol. 2, no. 1, 2014.

[25] EP. Larsen, R. Perez-Castillejos, "MATLAB interface for portable microelectrode impedance measurements," Biomedical Engineering Conference (NEBEC), 41st Annual Northeast, pp. 1-2, 2015.

[26] B. Morini, M. Porcelli, "TRESNEI, a Matlab trust-region solver for systems of nonlinear equalities and inequalities," Computational Optimization and Applications, vol. 51, no. 1, pp. 27- 49, 2012.

[27] N. Boumal, B. Mishra, P.A. Absil, R. Sepulchre, "Manopt, a Matlab toolbox for optimization on manifolds," The Journal of Machine Learning Research, vol. 15, no. 1, pp. 1455- 1459, 2014.

[28] S. Kacar, C. Bayilmis, “A web-based educational interface for an analog communication course based on MATLAB builder NE with web figures,” IEEE Transactions on Education, vol. 56, pp. 346-354, 2013.

[29] K. Tokuda, Y. Nankaku, T. Toda, H. Zen, J. Yamagishi, K. Oura, "Speech synthesis based on hidden Markov models," Proceedings of the IEEE, vol. 101, no.5, pp. 1234-1252, 2013.

[30] L. Xia, F. Chao-sheng, Y. Ding, W. Can, “Design of secure FTP system,” Communications, Circuits and Systems, International Conference on IEEE, pp. 270-273, Sichuan, China, 2010.