{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T06:02:39Z","timestamp":1718344959235},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2014,5,15]],"date-time":"2014-05-15T00:00:00Z","timestamp":1400112000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s00034-014-9810-9","type":"journal-article","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T10:10:08Z","timestamp":1400062208000},"page":"3475-3498","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Speech Scrambling Based on Imitation of a Target Speech Signal with Non-confidential Content"],"prefix":"10.1007","volume":"33","author":[{"given":"Dora M.","family":"Ballesteros L","sequence":"first","affiliation":[]},{"given":"Juan M.","family":"Moreno A","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,15]]},"reference":[{"key":"9810_CR1","unstructured":"S.M.H. Alwahbani, E.B.M. Bashier, in Speech scrambling based on chaotic maps and one time pad. Proceedings of International Conference on Computing, Electrical and Electronics Engineering (2013), pp. 128\u2013133"},{"key":"9810_CR2","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"RJ Anderson","year":"1998","unstructured":"R.J. Anderson, F.A.P. Petitcolas, On the limits of steganography. IEEE J. Sel. Areas Commun. 16, 474\u2013481 (1998)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9810_CR3","doi-asserted-by":"crossref","first-page":"9141","DOI":"10.1016\/j.eswa.2012.02.066","volume":"39","author":"DM Ballesteros L","year":"2012","unstructured":"D.M. Ballesteros L, J.M. Moreno A, Highly transparent steganography model of speech signals using Efficient Wavelet Masking. Expert Syst. Appl. 39, 9141\u20139149 (2012)","journal-title":"Expert Syst. Appl."},{"key":"9810_CR4","doi-asserted-by":"crossref","first-page":"12574","DOI":"10.1016\/j.eswa.2012.05.027","volume":"39","author":"DM Ballesteros L","year":"2012","unstructured":"D.M. Ballesteros L, J.M. Moreno A, On the ability of adaptation of speech signals and data hiding. Expert Syst. Appl. 39, 12574\u201312579 (2012)","journal-title":"Expert Syst. Appl."},{"key":"9810_CR5","doi-asserted-by":"crossref","first-page":"82","DOI":"10.17533\/udea.redin.15042","volume":"66","author":"DM Ballesteros L","year":"2013","unstructured":"D.M. Ballesteros L, J.M. Moreno A, A bit more on the ability of adaptation of speech signals. Rev. Fac. Ing. Univ. Antioq. 66, 82\u201390 (2013)","journal-title":"Rev. Fac. Ing. Univ. Antioq."},{"key":"9810_CR6","doi-asserted-by":"crossref","first-page":"1192","DOI":"10.1016\/j.compeleceng.2013.02.006","volume":"39","author":"DM Ballesteros L","year":"2013","unstructured":"D.M. Ballesteros L, J.M. Moreno A, Real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key. Comput. Electr. Eng. 39, 1192\u20131203 (2013)","journal-title":"Comput. Electr. Eng."},{"key":"9810_CR7","volume-title":"Pearson Correlation Coefficient, Noise Reduction in Speech Processing","author":"J Benesty","year":"2009","unstructured":"J. Benesty, J. Chen, Y. Huang, I. Cohen, Pearson Correlation Coefficient, Noise Reduction in Speech Processing (Springer, Berlin, 2009)"},{"key":"9810_CR8","unstructured":"J. Benesty, C. Jingdong, H. Yiteng, On the importance of the pearson correlation coefficient in noise reduction. IEEE Trans. Audio Speech Lang. Process. 16, 757\u2013765 (2008)"},{"key":"9810_CR9","unstructured":"J.F. de Andrade, M.L.R. De Campos, J.A. Apolinario, in Speech Privacy for Modern Mobile Communication Systems. Proceedings of IEEE international conference on acoustics, speech and signal processing, ICASSP, (2008), pp. 1777\u20131780"},{"key":"9810_CR10","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1109\/49.17710","volume":"7","author":"E Re Del","year":"1989","unstructured":"E. Del Re, R. Fantacci, D. Maffucci, A new speech signal scrambling method for secure communications: theory, implementation, and security evaluation. IEEE J. Sel. Areas Commun. 7, 474\u2013480 (1989)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9810_CR11","unstructured":"F. Djebbar, B. Ayad, K. Meraim, H. Hamam, Comparative study of digital audio steganography techniques. Eurasip J. Audio Speech Music Process. 2012, 1\u201316 (2012)"},{"key":"9810_CR12","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1049\/ep.1972.0196","volume":"18","author":"RC French","year":"1972","unstructured":"R.C. French, Speech scrambling. Electron. Power 18, 263\u2013264 (1972)","journal-title":"Electron. Power"},{"key":"9810_CR13","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1049\/el:19960471","volume":"32","author":"M Fulong","year":"1996","unstructured":"M. Fulong, C. Jun, W. Yumin, Wavelet transform-based analogue speech scrambling scheme. Electron. Lett. 32, 719\u2013721 (1996)","journal-title":"Electron. Lett."},{"key":"9810_CR14","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1049\/ip-i-2.1993.0035","volume":"140","author":"B Goldburg","year":"1993","unstructured":"B. Goldburg, S. Sridharan, E. Dawson, Cryptanalysis of frequency domain analogue speech scramblers. IEE Proc. I Commun. Speech Vis. 140, 235\u2013239 (1993)","journal-title":"IEE Proc. I Commun. Speech Vis."},{"key":"9810_CR15","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1109\/49.223875","volume":"11","author":"B Goldburg","year":"1993","unstructured":"B. Goldburg, S. Sridharan, E. Dawson, Design and cryptanalysis of transform-based analog speech scramblers. IEEE J. Sel. Areas Commun. 11, 735\u2013744 (1993)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9810_CR16","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1016\/j.micpro.2006.12.001","volume":"31","author":"A Jameel","year":"2007","unstructured":"A. Jameel, M.Y. Siyal, N. Ahmed, Transform-domain and DSP based secure speech communication system. Microprocess. Microsyst. 31, 335\u2013346 (2007)","journal-title":"Microprocess. Microsyst."},{"key":"9810_CR17","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/0167-4048(82)90047-5","volume":"1","author":"NS Jayant","year":"1982","unstructured":"N.S. Jayant, Analog scramblers for speech privacy. Comput. Secur. 1, 275\u2013289 (1982)","journal-title":"Comput. Secur."},{"key":"9810_CR18","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1049\/piee.1978.0282","volume":"125","author":"SC Kak","year":"1978","unstructured":"S.C. Kak, Encryption of signals using data transpositions. Proc. Inst. Electr. Eng. 125, 1327\u20131328 (1978)","journal-title":"Proc. Inst. Electr. Eng."},{"key":"9810_CR19","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1007\/978-3-642-03095-6_81","volume-title":"Algorithms and Architectures for Parallel Processing","author":"H Li","year":"2009","unstructured":"H. Li, Z. Qin, L. Shao, S. Zhang, B. Wang, Variable Dimension Space Audio Scrambling Algorithm Against MP3 Compression, in Algorithms and Architectures for Parallel Processing, ed. by A. Hua, S.-L. Chang (Springer, Berlin, 2009), pp. 866\u2013876"},{"key":"9810_CR20","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s00034-009-9113-8","volume":"29","author":"YC Lim","year":"2010","unstructured":"Y.C. Lim, J.W. Lee, S.W. Foo, Quality analog scramblers using frequency-response masking filter banks. Circuits Syst. Signal Process. 29, 135\u2013154 (2010)","journal-title":"Circuits Syst. Signal Process."},{"key":"9810_CR21","doi-asserted-by":"crossref","unstructured":"A. Madain, A. Abu, Dalhoum, H. Hiary, A. Ortega, M. Alfonseca, Audio scrambling technique based on cellular automata. Multimed. Tools Appl. (2012). doi: 10.1007\/s11042-012-1306-7","DOI":"10.1007\/s11042-012-1306-7"},{"key":"9810_CR22","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1109\/49.17718","volume":"7","author":"A Matsunaga","year":"1989","unstructured":"A. Matsunaga, K. Koga, M. Ohkawa, An analog speech scrambling system using the FFT technique with high-level security. IEEE J. Sel. Areas Commun. 7, 540\u2013547 (1989)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9810_CR23","unstructured":"E. Mosa, N.W. Messiha, O. Zahran, in Random Encryption of Speech Signal. Proceedings of international conference on computer engineering & systems, ICCES, (2009), pp. 306\u2013311"},{"key":"9810_CR24","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/TASL.2012.2215602","volume":"21","author":"MA Pathak","year":"2013","unstructured":"M.A. Pathak, B. Raj, Privacy-preserving speaker verification and identification using Gaussian mixture models. IEEE Trans. Audio Speech Lang. Process. 21, 397\u2013406 (2013)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"9810_CR25","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MSP.2012.2230222","volume":"30","author":"MA Pathak","year":"2013","unstructured":"M.A. Pathak, B. Raj, S.D. Rane, P. Smaragdis, Privacy-preserving speech processing: cryptographic and string-matching frameworks show promise. IEEE Signal Process. Mag. 30, 62\u201374 (2013)","journal-title":"IEEE Signal Process. Mag."},{"key":"9810_CR26","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1049\/ree.1971.0038","volume":"41","author":"VJ Phillips","year":"1971","unstructured":"V.J. Phillips, M.H. Lee, J.E. Thomas, Speech scrambling by the re-ordering of amplitude samples. Radio Electr. Eng. 41, 99 (1971)","journal-title":"Radio Electr. Eng."},{"key":"9810_CR27","unstructured":"S.B. Sadkhan, N. Abdulmuhsen, N.F. Al-Tahan, in A Proposed Analog Speech Scrambler Based on Parallel Structure of Wavelet Transforms. Proceedings of national radio science conference, NRSC (2007), pp. 1\u201312"},{"key":"9810_CR28","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"9810_CR29","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","volume-title":"Advances in Cryptology","author":"G Simmons","year":"1984","unstructured":"G. Simmons, The prisoners\u2019 problem and the subliminal channel, in Advances in Cryptology, ed. by D. Chaum (Springer, US, 1984), pp. 51\u201367"},{"key":"9810_CR30","unstructured":"SLT, Class-Talk: A University teaching phrasebook., Universitat Politecnica de Catalunya. http:\/\/www.upc.edu\/slt\/classtalk\/a.php?idioma%5B%5D=1&idioma%5B%5D=7&tematica=2&fer=guianova"},{"key":"9810_CR31","unstructured":"B.K. Sy, in Slice-based Architecture for Biometrics: Prototype Illustration on Privacy Preserving Voice Verification. Proceedings of IEEE 3rd international conference on biometrics: theory, applications, and systems, BTAS (2009), pp. 1\u20136"},{"key":"9810_CR32","unstructured":"D.C. Tseng, J.H. Chiu, in An OFDM Speech Scrambler Without Residual Intelligibility. Proceedings of IEEE region 10 conference TENCON (2007), pp. 1\u20134"},{"key":"9810_CR33","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1109\/26.602572","volume":"45","author":"RW Woo","year":"1997","unstructured":"R.W. Woo, C. Leung, A new key generation method for frequency-domain speech scramblers. IEEE Trans. Commun. 45, 749\u2013752 (1997)","journal-title":"IEEE Trans. Commun."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-014-9810-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00034-014-9810-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-014-9810-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T17:21:26Z","timestamp":1716744086000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00034-014-9810-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,15]]},"references-count":33,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["9810"],"URL":"https:\/\/doi.org\/10.1007\/s00034-014-9810-9","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,15]]}}}