{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:05:15Z","timestamp":1760079915327},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,10,8]],"date-time":"2015-10-08T00:00:00Z","timestamp":1444262400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s10772-015-9279-3","type":"journal-article","created":{"date-parts":[[2015,10,8]],"date-time":"2015-10-08T11:56:34Z","timestamp":1444305394000},"page":"619-631","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Efficient audio cryptosystem based on chaotic maps and double random phase encoding"],"prefix":"10.1007","volume":"18","author":[{"given":"Elsayed M.","family":"Elshamy","sequence":"first","affiliation":[]},{"given":"El-Sayed M.","family":"El-Rabaie","sequence":"additional","affiliation":[]},{"given":"Osama S.","family":"Faragallah","sequence":"additional","affiliation":[]},{"given":"Osama A.","family":"Elshakankiry","sequence":"additional","affiliation":[]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[]},{"given":"Hala S.","family":"El-sayed","sequence":"additional","affiliation":[]},{"given":"S. F.","family":"El-Zoghdy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,8]]},"reference":[{"issue":"1","key":"9279_CR1","doi-asserted-by":"crossref","first-page":"39","DOI":"10.5121\/ijcis.2012.2104","volume":"2","author":"M Ahmad","year":"2012","unstructured":"Ahmad, M., Alam, B., & Farooq, O. (2012). Chaos based mixed keystream generation for voice data encryption. International Journal on Cryptography and Information Security (IJCIS), 2(1), 39\u201348.","journal-title":"International Journal on Cryptography and Information Security (IJCIS)"},{"key":"9279_CR2","unstructured":"Al Saad, S.N., Hato, E. (2014). A speech encryption based on chaotic maps. In Int. J. of Computer Applications (Vol. 93, pp. 19\u201328)."},{"key":"9279_CR3","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M Barni","year":"2001","unstructured":"Barni, M., Bartolini, F., & Piva, A. (2001). Improved wavelet based watermarking through pixel-wise masking. IEEE Transactions on Image Processing, 10, 783\u2013791.","journal-title":"IEEE Transactions on Image Processing"},{"key":"9279_CR4","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1016\/S0262-8856(03)00067-2","volume":"21","author":"LH Chen","year":"2003","unstructured":"Chen, L. H., & Lin, J. J. (2003). Mean quantization based image watermarking. Image and Vision Computing, 21, 717\u2013727.","journal-title":"Image and Vision Computing"},{"key":"9279_CR5","doi-asserted-by":"crossref","first-page":"125403","DOI":"10.1088\/2040-8978\/16\/12\/125403","volume":"16","author":"J-X Chen","year":"2014","unstructured":"Chen, J.-X., Zhu, Z.-L., Fu, C., Zhang, L.-B., & Zhang, Y. (2014). Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding. Journal of Optics, 16, 125403.","journal-title":"Journal of Optics"},{"key":"9279_CR6","first-page":"474","volume":"7","author":"E Re Del","year":"1989","unstructured":"Del Re, E., Fantacci, R., & Maffucci, D. (1989). A new speech signal scrambling method for secure communications: theory, implementation, and security evaluation. IEEE Journal, 7, 474\u2013480.","journal-title":"IEEE Journal"},{"issue":"15","key":"9279_CR7","doi-asserted-by":"crossref","first-page":"2533","DOI":"10.1109\/JLT.2013.2267891","volume":"31","author":"AM Elshamy","year":"2013","unstructured":"Elshamy, A. M., Rashed, A. N. Z., Mohamed, A. A., Faragalla, O. S., Mu, Y., Alshebeili, S. A., & El-Samie, F. A. (2013). Optical image encryption based on chaotic baker map and double random phase encoding. Journal of Lightwave Technology, 31(15), 2533\u20132539.","journal-title":"Journal of Lightwave Technology"},{"issue":"6","key":"9279_CR8","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259\u20131284.","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"9279_CR9","volume-title":"Introduction to Fourier optics","author":"JW Goodman","year":"1996","unstructured":"Goodman, J. W. (1996). Introduction to Fourier optics (2nd ed.). New York: McGraw-Hill.","edition":"2"},{"key":"9279_CR10","doi-asserted-by":"crossref","unstructured":"Hedelin, P., Norden, F., Skoglund, J. (1999). SD optimization of spectral coders. In IEEE Workshop on Speech Coding Proc (pp. 28\u201330).","DOI":"10.1109\/SCFT.1999.781473"},{"key":"9279_CR11","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1117\/1.601144","volume":"36","author":"B Javidi","year":"1997","unstructured":"Javidi, B., Sergent, A., Zhang, G., & Guibert, L. (1997). Fault tolerance properties of a double phase encoding encryption technique. Optical Engineering, 36, 992\u2013998.","journal-title":"Optical Engineering"},{"key":"9279_CR12","unstructured":"Kohad, H., Ingle, V.R., Gaikwad, M.A. (2012). An overview of speech encryption techniques. In Int. J. of Engineering Research and Development (Vol. 3, pp. 29\u201332)."},{"key":"9279_CR13","doi-asserted-by":"crossref","unstructured":"Kwon, J.S.K, Park, S., Sung, D.K. (2006) Collision mitigation by log-likelihood ratio (LLR) conversion in orthogonal code-hopping multiplexing. In IEEE Transactions on Vehicular Technology (Vol. 55, pp. 709\u2013717).","DOI":"10.1109\/TVT.2005.863358"},{"issue":"5","key":"9279_CR14","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"GC Langelaar","year":"2000","unstructured":"Langelaar, G. C., Setyawan, I., & Lagendijk, R. I. (2000). Watermarking digital image and video data. IEEE Signal Processing Magazine, 17(5), 20\u201346.","journal-title":"IEEE Signal Processing Magazine"},{"key":"9279_CR15","unstructured":"Li, H., Qin, Z., Shao, L., Wang, B. (2009). A novel audio scrambling algorithm in variable dimension space. In 11th Int. Con. on Advanced Communication Technology ICACT 2009 (Vol. 03, pp. 1647\u20131651)."},{"key":"9279_CR16","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","volume":"11","author":"CY Lin","year":"2001","unstructured":"Lin, C. Y., & Chang, S. F. (2001). A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE Transactions on Circuits and Systems of Video Technology, 11, 153\u2013168.","journal-title":"IEEE Transactions on Circuits and Systems of Video Technology"},{"key":"9279_CR51","doi-asserted-by":"crossref","unstructured":"Manjunath, G., & Anand, G. V. (2002) Speech encryption using circulant transformations, In Proc. IEEE, Int. Conf. Multimedia and Exp (Vol. 1, pp. 553\u2013556).","DOI":"10.1109\/ICME.2002.1035841"},{"issue":"2","key":"9279_CR17","first-page":"68","volume":"39","author":"AAJ Maysaa","year":"2013","unstructured":"Maysaa, A. A. J., & Qays, I. (2013). Speech encryption using chaotic map and blow fish algorithms. Journal of Basrah Researches, 39(2), 68\u201376.","journal-title":"Journal of Basrah Researches"},{"key":"9279_CR18","doi-asserted-by":"crossref","unstructured":"Mermoul, A., Belouchrani, A. (2010). A Subspace-based method for speech encryption. In Proc. of IEEE 10th Int. Conference on Information Science, Signal Processing and their Applications (ISSPA 2010) (pp. 351\u2013541).","DOI":"10.1109\/ISSPA.2010.5605593"},{"key":"9279_CR19","volume-title":"A chaotic encryption scheme for real-time embedded systems: design and implementation","author":"A Pande","year":"2011","unstructured":"Pande, A., & Zambreno, J. (2011). A chaotic encryption scheme for real-time embedded systems: design and implementation. New York: Springer."},{"key":"9279_CR20","unstructured":"Pascal, J. (2005). Statistical cryptanalysis of block ciphers, Ph. D. Thesis."},{"key":"9279_CR21","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FA Petitcolas","year":"1999","unstructured":"Petitcolas, F. A., Anderson, R., & Kuhn, M. (1999). Information hiding: A survey. Proceedings of the IEEE, 87, 1062\u20131078.","journal-title":"Proceedings of the IEEE"},{"key":"9279_CR22","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier, P., & Javidi, B. (1995). Optical image encryption based on input plane and Fourier plane random encoding. Optics Letters, 20, 767\u2013769.","journal-title":"Optics Letters"},{"key":"9279_CR23","doi-asserted-by":"crossref","unstructured":"Sang, W.K., Young, G.K., Simon, M.K. (2003). Generalized selection combining based on the log-likelihood ratio. In IEEE Int. Con. on Communications ICC 2003 (Vol. 4, pp. 2789\u20132794).","DOI":"10.1109\/ICC.2003.1204505"},{"key":"9279_CR24","unstructured":"Sharma, D. (2012). Five level cryptography in speech processing using multi hash and repositioning of speech elements. In Int. J. of Emerging Technology and Advanced Engineering (Vol. 2)."},{"key":"9279_CR25","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s11071-010-9877-1","volume":"65","author":"L-J Sheu","year":"2011","unstructured":"Sheu, L.-J. (2011). A speech encryption using fractional chaotic systems\u201d. Nonlinear Dynamics, 65, 103\u2013108.","journal-title":"Nonlinear Dynamics"},{"key":"9279_CR26","unstructured":"Shumei, W., Yong Fan, F., Ping, Y. (2009). A watermarking algorithm of gray image based on histogram. In 2nd International Congress on Image and Signal Processing CISP 2009 (pp. 1\u20135)."},{"key":"9279_CR27","unstructured":"Wu, Y., Ng, B.P. (2002). Speech scrambling with Hadamard transform in frequency domain. In Proc. 6th Int. Conf. on Signal Processing (Vol. 2, pp. 1560\u20131563)."},{"key":"9279_CR28","unstructured":"Yang, W., Benbouchta, M., Yantorno, R. (1998). Performance of the modified bark spectral distortion as an objective speech quality measure. In Proc. IEEE International Conference on Acoustic, Speech and Signal Processing (Vol. 1, pp. 541\u2013544), Washington, USA."},{"key":"9279_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-6180-2012-1","volume":"257","author":"L Zeng","year":"2012","unstructured":"Zeng, L., Zhang, X., Chen, L., Fan, Z., & Wang, Y. (2012). Scrambling-based speech encryption via compressed sensing. EURASIP Journal on Advances in Signal Processing, 257, 1\u201312.","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"9279_CR30","doi-asserted-by":"crossref","unstructured":"Zhai, Y., Lin, S., Zhang, Q. (2008). Improving image encryption using multi-chaotic map. In Workshop on Power Electronics and Intelligent Transportation System, 2008. PEITS \u201808 (pp. 143\u2013148), August 2\u20133, 2008.","DOI":"10.1109\/PEITS.2008.10"},{"key":"9279_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, C. et al. (2008). Digital image watermarking with double encryption by Arnold transform and logistic. In 4th Int. Con. on networked computing & advanced information management (pp. 329\u2013334).","DOI":"10.1109\/NCM.2008.121"},{"key":"9279_CR32","doi-asserted-by":"crossref","unstructured":"Zhao, H., He, S., Chen, Z., Zhang, X. (2014). Dual key speech encryption algorithm based underdetermined BSS. In The Scientific World Journal (pp. 1\u20137).","DOI":"10.1155\/2014\/974735"}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-015-9279-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10772-015-9279-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-015-9279-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T09:32:50Z","timestamp":1567243970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10772-015-9279-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,8]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["9279"],"URL":"https:\/\/doi.org\/10.1007\/s10772-015-9279-3","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,8]]}}}