Voice Encryption
dc.contributor.advisor | Ashraf Armoush | |
dc.contributor.author | Tawfiq hamidi | |
dc.contributor.author | Mahmmoud Saleman | |
dc.date.accessioned | 2017-11-21T12:29:58Z | |
dc.date.available | 2017-11-21T12:29:58Z | |
dc.date.issued | 2007 | |
dc.description.abstract | The project: is to encrypt the voice and decrypting it using hardware.The main steps:1. Take the voice from microphone.2. Convert it to digital value.3. Encrypt it using Encryption algorithm with secret key.4. Send the voice to second site digitally.5. The other site will receive the cipher (encrypted voice).6. Using the encryption algorithm with secret key to decrypt the voice.7. Play it again. | en |
dc.description.abstract | The project: is to encrypt the voice and decrypting it using hardware.The main steps:1. Take the voice from microphone.2. Convert it to digital value.3. Encrypt it using Encryption algorithm with secret key.4. Send the voice to second site digitally.5. The other site will receive the cipher (encrypted voice).6. Using the encryption algorithm with secret key to decrypt the voice.7. Play it again. | ar |
dc.identifier.uri | https://hdl.handle.net/20.500.11888/12018 | |
dc.title | Voice Encryption | en |
dc.title | Voice Encryption | ar |
dc.type | Graduation Project |
Files
Original bundle
1 - 1 of 1