{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T10:44:53Z","timestamp":1772361893482,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,10,10]],"date-time":"2017-10-10T00:00:00Z","timestamp":1507593600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s10772-017-9435-z","type":"journal-article","created":{"date-parts":[[2017,10,10]],"date-time":"2017-10-10T08:06:03Z","timestamp":1507622763000},"page":"977-1004","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Performance enhancement of speaker identification systems using speech encryption and cancelable features"],"prefix":"10.1007","volume":"20","author":[{"given":"Naglaa F.","family":"Soliman","sequence":"first","affiliation":[]},{"given":"Zhraa","family":"Mostfa","sequence":"additional","affiliation":[]},{"given":"Fathi E. Abd","family":"El-Samie","sequence":"additional","affiliation":[]},{"given":"Mahmoud I.","family":"Abdalla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,10]]},"reference":[{"key":"9435_CR1","unstructured":"Ahmed, J., & Ikram, N. Frequency-domain speech scrambling\/descrambling techniques implementation and evaluation on DSP, INMIC 2003. 7th International Multi Topic Conference, pp.\u00a044\u201348, 9-9 Dec 2003."},{"key":"9435_CR2","doi-asserted-by":"crossref","unstructured":"Al Saad, S. N., & Eman, H. (2014) A speech encryption based on chaotic maps. International Journal of Computer Applications, 93(4).","DOI":"10.5120\/16203-5488"},{"issue":"9","key":"9435_CR3","doi-asserted-by":"crossref","first-page":"1437","DOI":"10.1109\/5.628714","volume":"85","author":"JP Campbell","year":"1997","unstructured":"Campbell, J. P. (1997). Speaker recognition: a tutorial. Proceedings of the IEEE, 85(9), 1437\u20131462.","journal-title":"Proceedings of the IEEE"},{"key":"9435_CR4","first-page":"474","volume":"7","author":"E Del Re","year":"1989","unstructured":"Del Re, E., Fantacci, R., & Maffucci, D. (1989). A new speech signal scrambling method for secure communications: theory, implementation, and security evaluation. IEEE Journal, 7, 474\u2013480.","journal-title":"IEEE Journal"},{"key":"9435_CR5","volume-title":"Neural networks methodology and applications","author":"G Dreyfus","year":"2005","unstructured":"Dreyfus, G. (2005). Neural networks methodology and applications. Berlin: Springer-Verlag."},{"key":"9435_CR6","doi-asserted-by":"crossref","unstructured":"Ding, H., Xie, C., & Zeng, L. The correlation between signal distance and consonant pronunciation in mandarin words, Chinese Spoken Language Processing (ISCSLP), 2016 10th International Symposium Conference: 17\u201320 Oct. 2016, IEEE Xplore: 04 May 2017.","DOI":"10.1109\/ISCSLP.2016.7918482"},{"issue":"4","key":"9435_CR7","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1109\/5.488705","volume":"84","author":"M Farge","year":"1996","unstructured":"Farge, M., Kevlahan, N., Perrier, V., & Goirand, E. (1996). Wavelets and turbulence. IEEE, 84(4), 639\u2013669.","journal-title":"IEEE"},{"key":"9435_CR8","doi-asserted-by":"crossref","unstructured":"Flayh N. A., & Ahson S. I. Wavelet based image encryption, Proceedings of the 9th International Conference on Signal Processing (ICSP), pp.\u00a0797\u2013800, 2008.","DOI":"10.1109\/ICOSP.2008.4697770"},{"issue":"6","key":"9435_CR9","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259\u20131284.","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"2","key":"9435_CR10","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/TASSP.1981.1163530","volume":"29","author":"S Furui","year":"1981","unstructured":"Furui, S. (1981). Cepstral analysis technique for automatic speaker verification. IEEE Transactions of Acoustics and Signal Processing, 29(2), 254\u2013272.","journal-title":"IEEE Transactions of Acoustics and Signal Processing"},{"key":"9435_CR11","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-1-4613-1367-0_2","volume":"355","author":"S Furui","year":"1996","unstructured":"Furui, S. (1996). An overview of speaker recognition technology. The Kluwer International Series in Engineering and Computer Science, 355, 31\u201355.","journal-title":"The Kluwer International Series in Engineering and Computer Science"},{"key":"9435_CR12","doi-asserted-by":"crossref","unstructured":"Ganesan, K., Muthukumar, R., & Murali, K. Look up table based chaotic for audio, IEEE Asia Pacific Conference on Circuits and Systems APCCAS 2006, pp.\u00a01951\u20131954, 4-7 Dec 2006.","DOI":"10.1109\/APCCAS.2006.342243"},{"key":"9435_CR13","unstructured":"Ghosh, J., Love, B. J., Vining, J., & Sun, X. Automatic speaker recognition using neural network, EE371D Intro. To Neural Networks Electrical and Computer Engineering Department, The University of Texas at Austin, Spring 2004, pp. 1\u201325, 2004."},{"key":"9435_CR14","first-page":"328","volume":"1","author":"B Goldburg","year":"1991","unstructured":"Goldburg, B., Sridharan, S., & Dawson, E. (1991). On the use of a frequency domain vector codebook for the cryptanalysis of analog speech scramblers. IEEE International Symposium on Circuits and Systems, 1, 328\u2013331.","journal-title":"IEEE International Symposium on Circuits and Systems"},{"issue":"10","key":"9435_CR15","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1049\/el:19900429","volume":"26","author":"B Goldburg","year":"1990","unstructured":"Goldburg, B., Sridharan, S., & Dawson, E. (1990). Speech encryption in the transform domain. Electronics Letters, 26(10), 655\u2013657.","journal-title":"Electronics Letters"},{"issue":"5","key":"9435_CR16","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1109\/49.223875","volume":"11","author":"B Goldburg","year":"1993","unstructured":"Goldburg, B., Sridharan, S., & Dawson, E. (1993) Design and cryptanalysis of transform-based analog speech scramblers. IEEE on Select Areas on Communications, 11(5), 735\u2013744.","journal-title":"IEEE on Select Areas on Communications"},{"issue":"40","key":"9435_CR17","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1049\/ip-i-2.1993.0035","volume":"140","author":"B Goldburg","year":"1993","unstructured":"Goldburg, B., Sridharan, S., & Dawson, E. (1993). Cryptanalysis of frequency domain analogue speech scramblers. IEEE Proceedings Communications Speech and Vision, 140(40), 235\u2013239.","journal-title":"IEEE Proceedings Communications Speech and Vision"},{"issue":"5","key":"9435_CR18","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/49.56385","volume":"8","author":"A Goniotakis","year":"1990","unstructured":"Goniotakis, A., & Elhakeem, A. (1990). Security evaluation of a new analog speech privacy\/scrambling device using hopping filters. IEEE Journal on Selected Areas in Communications, 8(5), 781\u2013799.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"9435_CR19","first-page":"101","volume":"4","author":"S Gupta","year":"2013","unstructured":"Gupta, S., Jaafar, J., Ahmad, W. F. W., & Bansal A. (2013) Feature extraction using MFCC. Signal & Image Processing: An International Journal (SIPIJ), 4(4), 101.","journal-title":"Signal & Image Processing: An International Journal (SIPIJ)"},{"key":"9435_CR20","volume-title":"Neural networks: A comprehensive foundation","author":"S Haykin","year":"2007","unstructured":"Haykin, S. (2007). Neural networks: A comprehensive foundation (3rd\u00a0edn.). Upper Saddle River: Prentice Hall International, Inc.","edition":"3"},{"issue":"4","key":"9435_CR21","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1142\/S0129065794000372","volume":"5","author":"S Haykin","year":"1994","unstructured":"Haykin, S. (1994). Neural networks: A comprehensive foundation. International Journal of Neural Systems, 5(4), 363\u2013364.","journal-title":"International Journal of Neural Systems"},{"key":"9435_CR22","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/BF01608556","volume":"50","author":"M Henon","year":"1976","unstructured":"Henon, M. (1976). A two-dimensional mapping with a strange attractor. Communications in Mathematical Physics, 50, 69\u201377.","journal-title":"Communications in Mathematical Physics"},{"key":"9435_CR23","doi-asserted-by":"crossref","unstructured":"Hossain, M. M., Ahmed, B., & Asrafi, M. A real time speaker identification using artificial neural network, IEEE Computer and information technology, pp. 1\u20135, 27\u201329, Dec 2007.","DOI":"10.1109\/ICCITECHN.2007.4579414"},{"issue":"4","key":"9435_CR24","first-page":"29","volume":"3","author":"H Kohad","year":"2012","unstructured":"Kohad H., Ingle V. R., & Gaikwad M. A. (2012). An overview of speech encryption techniques, International Journal of Engineering Research and Development, 3(4), 29\u201332.","journal-title":"International Journal of Engineering Research and Development"},{"key":"9435_CR25","doi-asserted-by":"crossref","first-page":"18006","DOI":"10.15680\/IJIRSET.2014.0312034","volume":"3","author":"PK Kurzekar","year":"2014","unstructured":"Kurzekar, P. K., Deshmukh, R. R., Waghmare, V. B., & Shrishrimal, P. P. (2014). A comparative study of feature extraction techniques for speech recognition system. IJIRSET, 3, 18006\u201318016.","journal-title":"IJIRSET"},{"issue":"4","key":"9435_CR26","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/TCOM.1984.1096078","volume":"32","author":"LS Lee","year":"1984","unstructured":"Lee, L. S., Chou, G. C., & Chang, C. S. (1984). A new frequency domain speech scrambling system which does not require frame synchronization. IEEE Transactions on Communications, 32(4), 444\u2013456.","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"9435_CR27","first-page":"443","volume":"2","author":"LS Lee","year":"2006","unstructured":"Lee, L. S., & Chou, G. C. (2006) A new time domain speech scrambling system which does not require frame synchronization. IEEE Journal on Selected Areas in Communications, 2(3), 443\u2013455.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"9435_CR28","doi-asserted-by":"crossref","unstructured":"Li, H., Qin, Z., Shao, L., & Wang, B. A Novel Audio Scrambling Algorithm in Variable Dimension Space, 11th International Conference on Advanced Communication Technology ICACT 2009, vol.\u00a003, pp.\u00a01647\u20131651, 15\u201318 February, 2009.","DOI":"10.1109\/IIS.2009.105"},{"issue":"8","key":"9435_CR29","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1049\/el:19960471","volume":"32","author":"F Ma","year":"1996","unstructured":"Ma, F., Cheng, J., & Wang, Y. (1996) Wavelet transform-based analogue speech scrambling scheme. Electronics Letters, 32(8), 719\u2013721.","journal-title":"Electronics Letters"},{"key":"9435_CR30","doi-asserted-by":"crossref","unstructured":"Manjunath, G., & Anand, G. V. (2002). Speech encryption using circulant transformations. Proceedings IEEE, International Conference Multimedia and Expo, vol.\u00a01, pp.\u00a0553\u2013556, August, 2002.","DOI":"10.1109\/ICME.2002.1035841"},{"key":"9435_CR31","unstructured":"Milton, R. M. A time and frequency-domain speech scrambler, COMSIG 1989 Proceedings, Southern African Conference, pp.\u00a0125\u2013130, June 1989"},{"key":"9435_CR32","unstructured":"Muda, L., Begam, M., & Elamvazuthi, I. (2010). Voice recognition algorithms using mel frequency cepstral coefficient (MFCC) and dynamic time warping (DTW) techniques. Journal of Computing, 2."},{"key":"9435_CR33","unstructured":"Neville, K. L., & Hussain, Z. M. Effect of wavelet compression of speech on its Mel Cepstral coefficients, international Conference on Communication, Computer and Power (ICCCP\u201909), Muscat, PP. 387\u2013390, Feb 2009."},{"key":"9435_CR34","unstructured":"Pawar, R. V., Kajave, P. P., & Mali, S. N., Speaker Identification using Neural Networks, Proceedings of World academy of science, Engineering and technology, Vol. 7, ISSN 1307\u20136884, 2005."},{"key":"9435_CR35","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1049\/ree.1971.0038","volume":"41","author":"VJ Phillips","year":"1971","unstructured":"Phillips, V. J., Lee, M. H., & Thomas, J. E. (1971) Speech scrambling by the re-ordering of amplitude samples. Radio and Electronic Engineer, 41, 99\u2013112.","journal-title":"Radio and Electronic Engineer"},{"key":"9435_CR36","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1080\/014311698215748","volume":"19","author":"C Pohl","year":"1998","unstructured":"Pohl, C., & van Genderen, J. L. (1998). Multisensor image fusion in remote sensing: Concepts, methods and application. International Journal of Remote Sensing, 19, 823\u2013854.","journal-title":"International Journal of Remote Sensing"},{"key":"9435_CR37","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1768-8","volume-title":"Signal analysis and prediction","author":"A Prochazka","year":"1998","unstructured":"Prochazka, A., Uhlir, J., Payner, P. J. W., & Kingsbury, N. J. (1998). Signal analysis and prediction. New York: Birkhauser Inc."},{"key":"9435_CR38","unstructured":"Reynolds, D. A. An overview of automatic speaker recognition technology, Proceedings IEEE international conference on Acoustics, Speech and Signal Processing (ICASSP), Vol. 4, pp. 4072\u20134075, 13\u201317 May 2002."},{"key":"9435_CR39","first-page":"1192","volume-title":"A comparative study of feature extraction algorithms on ANN based speaker model for speaker recognition application","author":"G Saha","year":"2004","unstructured":"Saha, G., & Kumar, P. (2004). A comparative study of feature extraction algorithms on ANN based speaker model for speaker recognition application (Vol. 3773, pp. 1192\u20131197). Berlin: LNCS, Springer-verlag."},{"key":"9435_CR40","doi-asserted-by":"crossref","unstructured":"Sharma, A., Singh, S. P., & Kumar, V. Text-independent speaker identification using backpropagation MLP network classifier for a closed set of speakers, IEEE International Symposium on Signal Processing and Information Technology, pp. 665\u2013669, 2005.","DOI":"10.1109\/ISSPIT.2005.1577176"},{"key":"9435_CR41","unstructured":"Shuling, L., & Wang, C. Nonspecific speech recognition method based on composite LV and LVQ2 network, Chinese Control and Decision Conference (CCDC), pp. 2304\u20132388, 2009."},{"key":"9435_CR42","volume-title":"Cryptography and network, security: Principles and practice","author":"W Stallings","year":"2017","unstructured":"Stallings, W. (2017) Cryptography and network, security: Principles and practice (7th edn.). Upper Saddle River: Prentice-Hall.","edition":"7"},{"key":"9435_CR43","volume-title":"Cryptography and network, security: Principles and practice","author":"W Stallings","year":"1999","unstructured":"Stallings, W. (1999) Cryptography and network, security: Principles and practice. Upper Saddle River: Prentice-Hall."},{"key":"9435_CR44","doi-asserted-by":"crossref","unstructured":"Wang, A., Sun, H. J., & Guan, Y. Y. The application of wavelet transform to multi-modality medical image fusion, Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, (ICNSC), pp. 270\u2013274, 2006.","DOI":"10.1109\/ICNSC.2006.1673156"},{"issue":"1","key":"9435_CR45","doi-asserted-by":"crossref","first-page":"013014","DOI":"10.1117\/1.JEI.21.1.013014","volume":"21","author":"W Yue","year":"2012","unstructured":"Yue, W., Gelan, Y., Huixia, J., & Joseph, P. N. (2012). Image encryption using the two-dimensional logistic chaotic map. Journal of Electronic Imaging, 21(1):013014","journal-title":"Journal of Electronic Imaging"}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10772-017-9435-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-017-9435-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-017-9435-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T11:42:22Z","timestamp":1570189342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10772-017-9435-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,10]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["9435"],"URL":"https:\/\/doi.org\/10.1007\/s10772-017-9435-z","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,10]]}}}