{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T21:56:06Z","timestamp":1766267766316,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61803322","11747141"],"award-info":[{"award-number":["61803322","11747141"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2018JJ3512"],"award-info":[{"award-number":["2018JJ3512"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific Research Fund of Hunan Provincial Education Department","award":["21B0178"],"award-info":[{"award-number":["21B0178"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s00500-022-07335-x","type":"journal-article","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T20:02:38Z","timestamp":1658520158000},"page":"9761-9774","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A two-layer networks-based audio encryption\/decryption scheme via fixed-time cluster synchronization"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8602-2141","authenticated-orcid":false,"given":"Lili","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Xiaohui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Weina","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,22]]},"reference":[{"issue":"6","key":"7335_CR1","doi-asserted-by":"publisher","first-page":"3080","DOI":"10.1016\/j.apm.2010.12.020","volume":"35","author":"MP Aghababa","year":"2011","unstructured":"Aghababa MP, Khanmohammadi S, Alizadeh G (2011) Finite-time synchronization of two different chaotic systems with unknown parameters via sliding mode technique. Appl Math Model 35(6):3080\u20133091","journal-title":"Appl Math Model"},{"key":"7335_CR2","doi-asserted-by":"crossref","unstructured":"Albahrani EA (2017) A new audio encryption algorithm based on chaotic block cipher. In: Proceedings of the annual conference on new trends in information & communications technology applications, Baghdad, Iraq, pp 22\u201327","DOI":"10.1109\/NTICT.2017.7976129"},{"issue":"5439","key":"7335_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509\u2013512","journal-title":"Science"},{"key":"7335_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.aeue.2018.03.007","volume":"88","author":"D Chang","year":"2018","unstructured":"Chang D, Li ZJ, Wang MJ, Zeng YC (2018) A novel digital programmable multi-scroll chaotic system and its application in FPGA-based audio secure communication. AEU-Int J Electron Commun 88:20\u201329","journal-title":"AEU-Int J Electron Commun"},{"issue":"7","key":"7335_CR5","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1142\/S0218127499001024","volume":"9","author":"GR Chen","year":"1999","unstructured":"Chen GR, Ueta T (1999) Yet another chaotic attractor. Int J Bifurc chaos 9(7):1465\u20131466","journal-title":"Int J Bifurc chaos"},{"issue":"11","key":"7335_CR6","doi-asserted-by":"publisher","first-page":"3246","DOI":"10.1109\/TNNLS.2018.2890269","volume":"30","author":"HB Chen","year":"2019","unstructured":"Chen HB, Shi P, Lim CC (2019) Cluster synchronization for neutral stochastic delay networks via intermittent adaptive control. IEEE Trans Neural Netw Learn Syst 30(11):3246\u20133259","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"7335_CR7","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.ins.2020.08.085","volume":"547","author":"JW Feng","year":"2021","unstructured":"Feng JW, Xie JM, Wang JY, Zhao Y (2021) Secure synchronization of stochastic complex networks subject to deception attack with nonidentical nodes and internal disturbance. Inf Sci 547:514\u2013525","journal-title":"Inf Sci"},{"issue":"4","key":"7335_CR8","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1007\/s10772-017-9452-y","volume":"20","author":"A Ghasemzadeh","year":"2017","unstructured":"Ghasemzadeh A, Esmaeili E (2017) A novel method in audio message encryption based on a mixture of chaos function. Int J Speech Technol 20(4):829\u2013837","journal-title":"Int J Speech Technol"},{"issue":"7","key":"7335_CR9","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/TNB.2017.2738324","volume":"16","author":"ZH Guan","year":"2017","unstructured":"Guan ZH, Yue DD, Hu B, Li T, Liu F (2017) Cluster synchronization of coupled genetic regulatory networks with delays via aperiodically adaptive intermittent control. IEEE Trans Nanobiosci 16(7):585\u2013599","journal-title":"IEEE Trans Nanobiosci"},{"issue":"4","key":"7335_CR10","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1137\/0324047","volume":"24","author":"VT Haimo","year":"1986","unstructured":"Haimo VT (1986) Finite time controllers. SIAM J Control Optim 24(4):760\u2013770","journal-title":"SIAM J Control Optim"},{"issue":"3","key":"7335_CR11","doi-asserted-by":"publisher","first-page":"1847","DOI":"10.1007\/s00500-020-05258-z","volume":"25","author":"M Hamdi","year":"2021","unstructured":"Hamdi M, Miri J, Moalla B (2021) Hybrid encryption algorithm (HEA) based on chaotic system. Soft Comput 25(3):1847\u20131858","journal-title":"Soft Comput"},{"issue":"16","key":"7335_CR12","doi-asserted-by":"publisher","first-page":"7045","DOI":"10.1007\/s00500-018-3345-0","volume":"23","author":"HQ Huang","year":"2019","unstructured":"Huang HQ, Yang SZ, Ye RS (2019) Image encryption scheme combining a modified Gerchberg\u2013Saxton algorithm with hyper-chaotic system. Soft Comput 23(16):7045\u20137053","journal-title":"Soft Comput"},{"issue":"8","key":"7335_CR13","doi-asserted-by":"publisher","first-page":"1306","DOI":"10.1109\/TCOMM.2003.815058","volume":"51","author":"ZG Li","year":"2003","unstructured":"Li ZG, Li K, Wen CY, Soh YC (2003) A new chaotic secure communication system. IEEE Trans Commun 51(8):1306\u20131312","journal-title":"IEEE Trans Commun"},{"issue":"4","key":"7335_CR14","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MMUL.2018.2873472","volume":"25","author":"CQ Li","year":"2018","unstructured":"Li CQ, Lin DD, Lu JH, Hao F (2018) Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimed 25(4):46\u201356","journal-title":"IEEE Multimed"},{"issue":"1","key":"7335_CR15","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s11071-019-04970-2","volume":"97","author":"N Li","year":"2019","unstructured":"Li N, Wu XQ, Feng JW, Xu YH (2019) Fixed-time synchronization in probability of drive-response networks with discontinuous nodes and noise disturbances. Nonlinear Dyn 97(1):297\u2013311","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"7335_CR16","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s00500-021-06500-y","volume":"26","author":"XH Li","year":"2021","unstructured":"Li XH, Zhou LL, Tan F (2021a) An image encryption scheme based on finite-time cluster synchronization of two-layer complex dynamic networks. Soft Comput 26(2):511\u2013525","journal-title":"Soft Comput"},{"issue":"4","key":"7335_CR17","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1109\/TCSII.2020.3027592","volume":"68","author":"WY Li","year":"2021","unstructured":"Li WY, Zhou J, Li JQ, Xie T, Lu JA (2021b) Cluster synchronization of two-layer networks via aperiodically intermittent pinning control. IEEE Trans Circuits Syst II Exp Briefs 68(4):1338\u20131342","journal-title":"IEEE Trans Circuits Syst II Exp Briefs"},{"issue":"6","key":"7335_CR18","doi-asserted-by":"publisher","first-page":"2398","DOI":"10.1109\/TCYB.2018.2821119","volume":"49","author":"XY Liu","year":"2019","unstructured":"Liu XY, Ho DWC, Song Q, Xu WY (2019) Finite\/fixed-time pinning synchronization of complex networks with stochastic disturbances. IEEE Trans Cybern 49(6):2398\u20132403","journal-title":"IEEE Trans Cybern"},{"issue":"1","key":"7335_CR19","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1504\/IJASS.2018.091847","volume":"8","author":"MYM Parvees","year":"2018","unstructured":"Parvees MYM, Samath JA, Bose BP (2018) Audio encryption-a chaos-based data byte scrambling technique. Int J Appl Syst Stud 8(1):51\u201375","journal-title":"Int J Appl Syst Stud"},{"issue":"8","key":"7335_CR20","doi-asserted-by":"publisher","first-page":"2106","DOI":"10.1109\/TAC.2011.2179869","volume":"57","author":"A Polyakov","year":"2012","unstructured":"Polyakov A (2012) Nonlinear feedback design for fixed-time stabilization of linear control systems. IEEE Trans Autom Control 57(8):2106\u20132110","journal-title":"IEEE Trans Autom Control"},{"issue":"5","key":"7335_CR21","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1007\/s00034-012-9395-0","volume":"31","author":"RR Rachh","year":"2012","unstructured":"Rachh RR, Mohan PVA, Anami BS (2012) Efficient implementations for AES encryption and decryption. Circuits Syst Signal Process 31(5):1765\u20131785","journal-title":"Circuits Syst Signal Process"},{"issue":"2","key":"7335_CR22","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) Method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120\u2013126","journal-title":"Commun ACM"},{"issue":"5","key":"7335_CR23","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/0375-9601(76)90101-8","volume":"57","author":"OE R\u00f6ssler","year":"1976","unstructured":"R\u00f6ssler OE (1976) An equation for continuous chaos. Phys Lett A 57(5):397\u2013398","journal-title":"Phys Lett A"},{"issue":"8","key":"7335_CR24","doi-asserted-by":"publisher","first-page":"6415","DOI":"10.1007\/s00500-021-05636-1","volume":"25","author":"A Soleimanizadeh","year":"2021","unstructured":"Soleimanizadeh A, Nekoui MA (2021) Optimal type-2 fuzzy synchronization of two different fractional-order chaotic systems with variable orders with an application to secure communication. Soft Comput 25(8):6415\u20136426","journal-title":"Soft Comput"},{"key":"7335_CR25","unstructured":"Tamimi AA, Abdalla AM (2014) An audio shuffle-encryption algorithm. In: Proceedings of the World Congress on engineering and computer science, San Francisco, USA, pp 1\u20134"},{"key":"7335_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2022.01.023","author":"F Tan","year":"2022","unstructured":"Tan F, Zhou LL (2022) Analysis of random synchronization under bilayer derivative and nonlinear delay networks of neuron nodes via fixed time policies. ISA Trans. https:\/\/doi.org\/10.1016\/j.isatra.2022.01.023","journal-title":"ISA Trans"},{"issue":"2","key":"7335_CR27","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1080\/00207721.2019.1703057","volume":"51","author":"F Tan","year":"2020","unstructured":"Tan F, Zhou LL, Yu F, Lu JW (2020) Fixed-time continuous stochastic synchronisation of two-layer dynamical networks. Int J Syst Sci 51(2):242\u2013257","journal-title":"Int J Syst Sci"},{"key":"7335_CR28","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.neunet.2015.10.009","volume":"73","author":"Y Wan","year":"2016","unstructured":"Wan Y, Cao JD, Wen GH, Yu WW (2016) Robust fixed-time synchronization of delayed Cohen\u2013Grossberg neural networks. Neural Netw 73:86\u201394","journal-title":"Neural Netw"},{"issue":"17","key":"7335_CR29","doi-asserted-by":"publisher","first-page":"12773","DOI":"10.1007\/s00500-020-05161-7","volume":"24","author":"YG Wang","year":"2020","unstructured":"Wang YG, Li D (2020) Adaptive synchronization of chaotic systems with time-varying delay via aperiodically intermittent control. Soft Comput 24(17):12773\u201312780","journal-title":"Soft Comput"},{"key":"7335_CR30","volume-title":"Mathematical analysis methods and examples","author":"L Xu","year":"1983","unstructured":"Xu L, Wang X (1983) Mathematical analysis methods and examples. Higher Education Press, Beijing"},{"issue":"4","key":"7335_CR31","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1109\/TCSII.2019.2920035","volume":"67","author":"YH Xu","year":"2020","unstructured":"Xu YH, Wu XQ, Li N, Liu L, Xie CR, Li CB (2020) Fixed-time synchronization of complex networks with a simpler nonchattering controller. IEEE Trans Circuits Syst II Exp Briefs 67(4):700\u2013704","journal-title":"IEEE Trans Circuits Syst II Exp Briefs"},{"issue":"11","key":"7335_CR32","doi-asserted-by":"publisher","first-page":"5511","DOI":"10.1109\/TAC.2017.2691303","volume":"62","author":"XS Yang","year":"2017","unstructured":"Yang XS, Lam J, Ho DWC, Feng ZG (2017) Fixed-time synchronization of complex networks with impulsive effects via nonchattering control. IEEE Trans Autom Control 62(11):5511\u20135521","journal-title":"IEEE Trans Autom Control"},{"issue":"8","key":"7335_CR33","doi-asserted-by":"publisher","first-page":"2153","DOI":"10.1109\/TAC.2012.2183190","volume":"57","author":"WW Yu","year":"2012","unstructured":"Yu WW, DeLellis P, Chen GR, di Bernardo M, Kurths J (2012) Distributed adaptive control of synchronization in complex networks. IEEE Trans Autom Control 57(8):2153\u20132158","journal-title":"IEEE Trans Autom Control"},{"key":"7335_CR34","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.sigpro.2013.11.006","volume":"97","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Shi P, Nguang SK, Karimi HR (2014) Observer-based finite-time fuzzy H-infinity control for discrete-time systems with stochastic jumps and time-delays. Signal Process 97:252\u2013261","journal-title":"Signal Process"},{"key":"7335_CR35","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.neucom.2019.05.077","volume":"359","author":"LL Zhou","year":"2019","unstructured":"Zhou LL, Tan F, Yu F, Liu W (2019a) Cluster synchronization of two-layer nonlinearly coupled multiplex networks with multi-links and time-delays. Neurocomputing 359:264\u2013275","journal-title":"Neurocomputing"},{"issue":"2","key":"7335_CR36","doi-asserted-by":"publisher","first-page":"2508","DOI":"10.1109\/JSYST.2019.2927495","volume":"14","author":"LL Zhou","year":"2019","unstructured":"Zhou LL, Tan F, Yu F (2019b) A robust synchronization-based chaotic secure communication scheme with double-layered and multiple hybrid networks. IEEE Syst J 14(2):2508\u20132519","journal-title":"IEEE Syst J"},{"key":"7335_CR37","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.neucom.2020.12.033","volume":"433","author":"LL Zhou","year":"2021","unstructured":"Zhou LL, Tan F, Li XH, Zhou L (2021a) A fixed-time synchronization-based secure communication scheme for two-layer hybrid coupled networks. Neurocomputing 433:131\u2013141","journal-title":"Neurocomputing"},{"issue":"2","key":"7335_CR38","doi-asserted-by":"publisher","first-page":"2043","DOI":"10.1007\/s11071-021-06206-8","volume":"103","author":"Y Zhou","year":"2021","unstructured":"Zhou Y, Li CL, Li W, Li HM, Feng W, Qian K (2021b) Image encryption algorithm with circle index table scrambling and partition diffusion. Nonlinear Dyn 103(2):2043\u20132061","journal-title":"Nonlinear Dyn"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07335-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-022-07335-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07335-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T15:15:40Z","timestamp":1662995740000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-022-07335-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,22]]},"references-count":38,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["7335"],"URL":"https:\/\/doi.org\/10.1007\/s00500-022-07335-x","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2022,7,22]]},"assertion":[{"value":"22 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}