{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T03:58:10Z","timestamp":1773115090176,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T00:00:00Z","timestamp":1484697600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"emad mosa","award":["emad mosa"],"award-info":[{"award-number":["emad mosa"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s10772-017-9395-3","type":"journal-article","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T08:51:32Z","timestamp":1484729492000},"page":"163-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Security enhancement for AES encrypted speech in communications"],"prefix":"10.1007","volume":"20","author":[{"given":"Emad","family":"Mossa","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,18]]},"reference":[{"issue":"1","key":"9395_CR2","first-page":"121","volume":"31","author":"HEDH Ahmed","year":"2007","unstructured":"Ahmed, H. E. D. H., Kalash, H. M., & Allah, O. S. F. (2007). An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption. Informatica, 31(1), 121\u2013129.","journal-title":"Informatica"},{"key":"9395_CR3","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"C-23","author":"N Ahmed","year":"1974","unstructured":"Ahmed, N., Natarajan, T., & Rao, K. R. (1974). Discrete cosine transform. IEEE transactions on Computers, C-23, 90\u201393.","journal-title":"IEEE transactions on Computers"},{"issue":"2","key":"9395_CR4","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S Behnia","year":"2008","unstructured":"Behnia, S., Akhshani, A., Mahmodi, H., & Akhavan, A. (2008). A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons & Fractals, 35(2), 408\u2013419.","journal-title":"Chaos, Solitons & Fractals"},{"key":"9395_CR5","doi-asserted-by":"crossref","first-page":"2468","DOI":"10.1016\/j.comcom.2007.04.024","volume":"30","author":"M Boulmalf","year":"2007","unstructured":"Boulmalf, M., Barka, E., & Lakas, A. (2007). Analysis of the effect of security on data and voice traffic in WLAN. Computer Communications, 30, 2468\u20132477.","journal-title":"Computer Communications"},{"issue":"2","key":"9395_CR6","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/S0164-1212(01)00029-2","volume":"58","author":"CC Chang","year":"2001","unstructured":"Chang, C. C., Hwang, M. S., & Chen, T. S. (2001). A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), 83\u201391.","journal-title":"Journal of Systems and Software"},{"issue":"3","key":"9395_CR7","first-page":"137","volume":"26","author":"J Daemen","year":"2001","unstructured":"Daemen, J., & Rijndael, V. R. (2001). The advanced encryption standard. Dr. Dobb\u2019s\u00a0J., 26(3), 137\u2013139.","journal-title":"Dr. Dobb\u2019s\u00a0J."},{"key":"9395_CR8","doi-asserted-by":"crossref","unstructured":"Dalmisli, K. V., Ors, B. (2009). Design of new tiny circuits for AES encryption algorithm. In 3rd International conference on signals, circuits and systems (SCS) (pp. 1\u20135)","DOI":"10.1109\/ICSCS.2009.5414191"},{"issue":"1","key":"9395_CR9","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s10772-009-9056-2","volume":"12","author":"FEA El-Samie","year":"2009","unstructured":"El-Samie, F. E. A. (2009). An efficient singular value decomposition algorithm for digital audio watermarking. International Journal of Speech Technology, 12(1), 27\u201345.","journal-title":"International Journal of Speech Technology"},{"key":"9395_CR10","doi-asserted-by":"crossref","unstructured":"Farhan, S., Khan, S., & Jamal, H. (2004). Mapping of high-bit algorithm to low-bit for optimized hardware implementation. In 16th IEEE international conference on microelectronics (ICM 2004) (pp. 148\u2013151).","DOI":"10.1109\/ICM.2004.1434230"},{"issue":"1","key":"9395_CR11","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","volume":"152","author":"M Feldhofer","year":"2005","unstructured":"Feldhofer, M., Wolkerstorfer, J., & Rijmen, V. (2005). AES implementation on a grain of sand. IEE Proceedings of Information Security, 152(1), 13\u201320.","journal-title":"IEE Proceedings of Information Security"},{"key":"9395_CR12","doi-asserted-by":"crossref","unstructured":"Hamalainen, P., Alho, T., Hannikainen, M., & Hamalainen, T. D. (2006). Design and implementation of low-area and low-power aes encryption hardware core. In 9th euromicro conference on digital system design: Architectures, methods and tools (pp. 577\u2013583).","DOI":"10.1109\/DSD.2006.40"},{"issue":"4","key":"9395_CR13","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1117\/12.148572","volume":"2","author":"CJ Kuo","year":"1993","unstructured":"Kuo, C. J. (1993). Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging, 2(4), 345\u2013351.","journal-title":"Journal of Electronic Imaging"},{"key":"9395_CR14","unstructured":"Li, S., Chen, G., & Zheng, X. (2004). Chaos-based encryption for digital images and videos. In Multimedia security handbook, Chap. 4. Boca Raton, FL: CRC Press"},{"key":"9395_CR15","doi-asserted-by":"crossref","unstructured":"Li, S., Chen, G., & Zheng, X. (2004). Chaos-based encryption for digital images and videos. In Multimedia security handbook, Chap. 4. Boca Raton, FL: CRC Press","DOI":"10.1201\/9781420038262.ch4"},{"key":"9395_CR16","unstructured":"Luanlan (2011). The AES Encryption and Decryption Realization Based on FPGA. In Seventh international conference on computational intelligence and security (CIS) (pp. 603\u2013607)."},{"key":"9395_CR17","first-page":"231","volume-title":"Handbook of computational geometry for pattern recognition, computer vision, neuralcomputing and robotics","author":"YB Mao","year":"2005","unstructured":"Mao, Y. B., & Chen, G. (2005). Chaos-based image encryption. In E. Bayro (Ed.), Handbook of computational geometry for pattern recognition, computer vision, neuralcomputing and robotics (pp. 231\u2013265). Piscataway: IEEE."},{"issue":"10","key":"9395_CR18","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"YB Mao","year":"2004","unstructured":"Mao, Y. B., Chen, G., & Lian, S. G. (2004). A novel fast image encryption scheme based on the 3D chaotic baker map. International Journal of Bifurcation and Chaos, 14(10), 3613\u20133624.","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"9395_CR19","unstructured":"National Bureau of Standards. (1977). Data encryption standard, federal information processing standards Publication no.46, U.S. Government Printing Office, Washington, DC."},{"key":"9395_CR1","unstructured":"National Institute of Standards and Technology. (2001). The advanced encryption standard. Federal information processing standards publication (FIPS) 197, November 26."},{"key":"9395_CR20","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/j.cose.2009.01.004","volume":"28","author":"F Palmieri","year":"2009","unstructured":"Palmieri, F., & Fiore, U. (2009). Providing true end-to-end security in converged voice over IP infrastructures. Computers & Security, 28, 433\u2013449.","journal-title":"Computers & Security"},{"key":"9395_CR21","doi-asserted-by":"crossref","unstructured":"Pramstaller, N., Mangard, S., Dominikus, S., & Wolkerstorfer, J. (2005). Efficient \u201cAES implementations on ASICs and FPGAs\u201d. In Proceedings of the 4th conference on the advanced encryption standard (AES 2004) (pp. 98\u2013112). Bonn, Germany, May 10\u201312, 2005.","DOI":"10.1007\/11506447_9"},{"key":"9395_CR22","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C. E. (1949). Communication theory of secrecy system. Bell System Technical Journal, 28, 656\u2013715.","journal-title":"Bell System Technical Journal"},{"issue":"4","key":"9395_CR23","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0030-4018(03)01261-6","volume":"218","author":"A Sinha","year":"2003","unstructured":"Sinha, A., & Singh, K. (2003). A technique for image encryption using digital signature. Optics communications, 218(4), 229\u2013234.","journal-title":"Optics communications"}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-017-9395-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10772-017-9395-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-017-9395-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T08:30:48Z","timestamp":1498379448000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10772-017-9395-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,18]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["9395"],"URL":"https:\/\/doi.org\/10.1007\/s10772-017-9395-3","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,18]]}}}