§3.4.2 加密性能分析以及仿真结果.................................................................21
§3.5 本章小结........................................................................................................24
第四章 基于混沌的音频加密算法改进...................................................................25
§4.1 混沌密码........................................................................................................25
§4.1.1 混沌流密码..............................................................................................25
§4.2 混沌序列........................................................................................................26
§4.2.1 常用的混沌映射.....................................................................................26
§4.2.2 混沌序列的生成.....................................................................................27
§4.3 基于 Logistic 映射的音频加密算法介绍 .................................................... 28
§4.3.1 混沌二值序列生成.................................................................................28
§4.3.2 音频文件加解密.....................................................................................29
§4.4 加解密性能分析............................................................................................30
§4.4.1 加解密速度.............................................................................................30
§4.4.2 密钥空间.................................................................................................30
§4.4.3 密钥敏感性.............................................................................................31
§4.5 本章小结........................................................................................................33
第五章 基于 Logistic 映射的音频加密新算法 ....................................................... 34
§5.1 Logistic 映射 .................................................................................................. 34
§5.1.1 Logistic 映射的混沌特性 ....................................................................... 34
§5.1.2 Logistic 映射的分布 ............................................................................... 36
§5.1.3 Logistic 映射的相关性 ........................................................................... 36
§5.2 算法介绍........................................................................................................38
§5.2.1 音频信号置乱.........................................................................................38
§5.2.2 音频信号替代.........................................................................................38
§5.2.3 音频信号扩散.........................................................................................39
§5.2.4 音频文件的加密和解密.........................................................................39
§5.3 算法效果极其性能分析.................................................................................40
§5.3.1 加解密的时域结果分析.........................................................................40
§5.3.2 加密速度分析.........................................................................................41
§5.3.3 密钥敏感性测试.....................................................................................42
§5.3.4 相邻音频信号的相关性分析.................................................................45
§5.3.5 音频信号的密钥空间的分析.................................................................47
§5.4 本章小结........................................................................................................48