{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:11:57Z","timestamp":1742911917135,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030521899"},{"type":"electronic","value":"9783030521905"}],"license":[{"start":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T00:00:00Z","timestamp":1597708800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T00:00:00Z","timestamp":1597708800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-52190-5_17","type":"book-chapter","created":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T16:06:33Z","timestamp":1597680393000},"page":"241-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Comparative Study of Audio Encryption Analysis Using Dynamic AES and Standard AES Algorithms"],"prefix":"10.1007","author":[{"given":"Amandeep","family":"Singh","sequence":"first","affiliation":[]},{"given":"Praveen","family":"Agarwal","sequence":"additional","affiliation":[]},{"given":"Mehar","family":"Chand","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,18]]},"reference":[{"key":"17_CR1","first-page":"55","volume-title":"In Introduction to Cryptography and Network Security","author":"B Forouzan","year":"2008","unstructured":"Forouzan, B.: Traditional symmetric-key cipher. In Introduction to Cryptography and Network Security, 1st edn., pp. 55\u201396. McGraw-Hill, New York (2008)","edition":"1"},{"key":"17_CR2","first-page":"293","volume-title":"In Introduction to Cryptography and Network Security","author":"B Forouzan","year":"2008","unstructured":"Forouzan, B.: Traditional asymmetric-key cryptography. In Introduction to Cryptography and Network Security, 1st edn., pp. 293\u2013335. McGraw-Hill, New York (2008)","edition":"1"},{"issue":"2","key":"17_CR3","first-page":"78","volume":"11","author":"S Diaa","year":"2010","unstructured":"Diaa, S., Hatem, A.K., Mohiy, M.H.: Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types. IJNS 11(2), 78\u201387 (2010)","journal-title":"IJNS"},{"issue":"3","key":"17_CR4","first-page":"213","volume":"10","author":"S Diaa","year":"2010","unstructured":"Diaa, S., Hatem, A.K., Mohiy, M.H.: Evaluating the performance of symmetric encryption algorithms. IJNS 10(3), 213\u2013219 (2010)","journal-title":"IJNS"},{"key":"17_CR5","unstructured":"Akash, K.M., Chandra, P., Archana, T.: Performance evaluation of cryptographic algorithms: DES and AES. In: IEEE Students\u2019 Conference on Electrical, Electronics and Computer Science (2011)"},{"key":"17_CR6","unstructured":"Verma, O.P., Ritu, A., Dhiraj, D., Shobha, T.: Performance analysis of data encryption algorithms. IEEE (2011)"},{"key":"17_CR7","unstructured":"Radha, A.N., Venkatesulu, M.: A complete binary tree structure block cipher for real-time multimedia. In: Science and Information Conference (2013)"},{"key":"17_CR8","unstructured":"Sruthi, B.A., Karthigaikumar, P., Sandhya, R., Naveen, J.K., Siva Mangai, N.M.: A secure cryptographic scheme for audio signals (2013)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Ganesh Babu, S., IIango, P.: Higher dimensional chaos for audio encryption. IEEE (2013)","DOI":"10.1109\/CICYBS.2013.6597206"},{"issue":"2","key":"17_CR10","first-page":"1574","volume":"4","author":"S Pavithra","year":"2012","unstructured":"Pavithra, S., Ramadevi, E.: Throughput analysis of symmetric algorithms. IJANA 4(2), 1574\u20131577 (2012)","journal-title":"IJANA"},{"key":"17_CR11","unstructured":"Bismita, G., Chittaranjan, P.: Selective Encryption on MP3 compression. MES J. Technol. Manag. (2011)"},{"key":"17_CR12","unstructured":"Raghunandhan, K.R., Radhakrishna, D., Sudeepa, K.B., Ganesh, A.: Efficient audio encryption algorithm for online applications using transposition and multiplicative non-binary system. IJERT 2(6) (2013)"},{"key":"17_CR13","unstructured":"Majdi, A., Lin, Y.H.: Simple encryption\/decryption application. IJCSS, 1(1) (2007)"},{"issue":"6","key":"17_CR14","first-page":"658","volume":"2","author":"S Saurabh","year":"2012","unstructured":"Saurabh, S., Pushpendra, K.P.: A study on different approaches of selective encryption technique. IJCSCN 2(6), 658\u2013662 (2012)","journal-title":"IJCSCN"},{"key":"17_CR15","unstructured":"Shine, P.J., Sudhish, N.G., Deepthi, P.P.: An audio encryption technique based on LFSR based alternating step generator. IEEE Connect (2014)"},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"2006","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Labs Tech. J. 28, 656\u2013715 (2006)","journal-title":"Bell Labs Tech. J."},{"issue":"7","key":"17_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1687814018781638","volume":"10","author":"P Agarwal","year":"2018","unstructured":"Agarwal, P., Singh, A., Kilicman, A.: Development of key dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant. Adv. Mech. Eng. 10(7), 1\u201318 (2018)","journal-title":"Adv. Mech. Eng."}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52190-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T16:20:42Z","timestamp":1597681242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52190-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,18]]},"ISBN":["9783030521899","9783030521905"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52190-5_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,18]]},"assertion":[{"value":"18 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SOFA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop Soft Computing Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sofa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sofa2018.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}