joshua adadevoh ece-3551 project audio signal encryption
DESCRIPTION
The basic idea was simple, the signal is received, passed through the codec, converted to hex values, then passed through my algorithm where it is scrambled, passed to the output buffers and back out through the codecTRANSCRIPT
![Page 1: Joshua Adadevoh ECE-3551 Project Audio Signal Encryption](https://reader035.vdocument.in/reader035/viewer/2022081806/5a4d1b527f8b9ab0599a8064/html5/thumbnails/1.jpg)
Joshua Adadevoh
ECE-3551Project
Audio Signal Encryption
![Page 2: Joshua Adadevoh ECE-3551 Project Audio Signal Encryption](https://reader035.vdocument.in/reader035/viewer/2022081806/5a4d1b527f8b9ab0599a8064/html5/thumbnails/2.jpg)
• The purpose of this project is basically to implement a strong audio encryption algorithm that has not been covered in the labs
![Page 3: Joshua Adadevoh ECE-3551 Project Audio Signal Encryption](https://reader035.vdocument.in/reader035/viewer/2022081806/5a4d1b527f8b9ab0599a8064/html5/thumbnails/3.jpg)
• The basic idea was simple, the signal is received, passed through the codec, converted to hex values, then passed through my algorithm where it is scrambled, passed to the output buffers and back out through the codec
![Page 4: Joshua Adadevoh ECE-3551 Project Audio Signal Encryption](https://reader035.vdocument.in/reader035/viewer/2022081806/5a4d1b527f8b9ab0599a8064/html5/thumbnails/4.jpg)
The encryption process
![Page 5: Joshua Adadevoh ECE-3551 Project Audio Signal Encryption](https://reader035.vdocument.in/reader035/viewer/2022081806/5a4d1b527f8b9ab0599a8064/html5/thumbnails/5.jpg)
I also monitored the graphs of the signals I was working with
• This next slide shows the input and output before encryption, as it should be
![Page 6: Joshua Adadevoh ECE-3551 Project Audio Signal Encryption](https://reader035.vdocument.in/reader035/viewer/2022081806/5a4d1b527f8b9ab0599a8064/html5/thumbnails/6.jpg)
![Page 7: Joshua Adadevoh ECE-3551 Project Audio Signal Encryption](https://reader035.vdocument.in/reader035/viewer/2022081806/5a4d1b527f8b9ab0599a8064/html5/thumbnails/7.jpg)
These next two slides show the graphs before and after encryption respectively
![Page 8: Joshua Adadevoh ECE-3551 Project Audio Signal Encryption](https://reader035.vdocument.in/reader035/viewer/2022081806/5a4d1b527f8b9ab0599a8064/html5/thumbnails/8.jpg)
![Page 9: Joshua Adadevoh ECE-3551 Project Audio Signal Encryption](https://reader035.vdocument.in/reader035/viewer/2022081806/5a4d1b527f8b9ab0599a8064/html5/thumbnails/9.jpg)
![Page 10: Joshua Adadevoh ECE-3551 Project Audio Signal Encryption](https://reader035.vdocument.in/reader035/viewer/2022081806/5a4d1b527f8b9ab0599a8064/html5/thumbnails/10.jpg)
The graphs confirm that the signal was scrambled adequately and the project was a success.