Provided by: Creative Commons
Date Added: Apr 2013
The number of techniques is used for speech encryption. However in the authors' approach the work is done on different kind of techniques i.e. MD-5, SHA-2 and Rinjdael these three popular techniques are used for text encryption. In this paper the speech is first converted into text then further the text is converted into cipher text. At the end the performance is analyzed of these three approaches respectively. The parameters calculated are encryption and delay time, throughput no of bits per second, complexity, packet lost, delay time, security level.