{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T12:30:10Z","timestamp":1723379410096},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T00:00:00Z","timestamp":1499904000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s10772-017-9439-8","type":"journal-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T09:25:25Z","timestamp":1499937925000},"page":"685-698","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A novel approach based on stream cipher for selective speech encryption"],"prefix":"10.1007","volume":"20","author":[{"given":"Aissa","family":"Belmeguenai","sequence":"first","affiliation":[]},{"given":"Zahir","family":"Ahmida","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Ouchtati","sequence":"additional","affiliation":[]},{"given":"Rafik","family":"Djemii","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,13]]},"reference":[{"issue":"9","key":"9439_CR1","first-page":"0975","volume":"135","author":"MF Abd Elzaher","year":"2016","unstructured":"Abd Elzaher, M. F., Shalaby, M., & El Ramly, S. H. (2016). Securing modern voice communication systems using multilevel chaotic approach. International Journal of Computer Applications, 135(9), 0975\u20138887.","journal-title":"International Journal of Computer Applications"},{"issue":"2","key":"9439_CR2","first-page":"1668","volume":"2","author":"M Ashtiyani","year":"2012","unstructured":"Ashtiyani, M., Moradi Birgani, P., & Karimi Madahi, S. S. (2012). Speech signal encryption using chaotic symmetric cryptography. Journal of Basic and Applied Scientific Research, 2(2), 1668\u20131674.","journal-title":"Journal of Basic and Applied Scientific Research"},{"issue":"1","key":"9439_CR3","doi-asserted-by":"crossref","first-page":"107","DOI":"10.9734\/BJAST\/2015\/14744","volume":"8","author":"A Belmeguenai","year":"2015","unstructured":"Belmeguenai, A., Mansouri, K., & Lashab, M. (2015). Speech encryption using stream cipher. British Journal of Applied Science and Technology, 8(1), 107\u2013125.","journal-title":"British Journal of Applied Science and Technology"},{"key":"9439_CR4","doi-asserted-by":"crossref","unstructured":"Belmeguenai, A., Berrak, O. & Mansouri, K. (2015). Selective encryption of medical images, In Proceedings of the 10th International Conference on Computer Vision Theory and Applications (VISAPP-2015), pp. 93-99, ISBN: 978-989-758-091-8, Berlin.","DOI":"10.5220\/0005301200930099"},{"key":"9439_CR5","unstructured":"Belmeguenai, A., Mansouri, K., & Medoued, A. (2015). Speech encryption using the nonlinear filter generator, 16th international Conference on Sciences and Techniques of Automatic control and computer engineering STA'2015, pp. 58\u201362, IEEE conference (STA conference is indexed scopus), Tunisia."},{"key":"9439_CR6","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1016\/j.dsp.2012.02.005","volume":"22","author":"G Bhatnagar","year":"2012","unstructured":"Bhatnagar, G., & Jonathan Wu, Q. M. (2012). Selective image encryption based on pixels of interest and singular value decomposition. Digital Signal Processing, 22, 648\u2013663.","journal-title":"Digital Signal Processing"},{"key":"9439_CR7","doi-asserted-by":"crossref","unstructured":"Burileanu, D., Pascalin, L., Burileanu, C., & Puchiu, M. (2000). An adaptive and fast speech detection algorithm. Proceedings of the 3rd International Workshop on Text, Speech and Dialogue, p. 177182.","DOI":"10.1007\/3-540-45323-7_30"},{"key":"9439_CR8","doi-asserted-by":"crossref","unstructured":"Cid, C., Kiyomoto, S., & Kurihara, J. (2009). The rakaposhi stream cipher, Proceedings of the 11th international conference on Information and Communications Security, ICICS'09, Berlin, Heidelberg, Springer, pp. 32\u201346.","DOI":"10.1007\/978-3-642-11145-7_5"},{"key":"9439_CR9","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1016\/j.procs.2016.07.302","volume":"93","author":"FJ Farsana","year":"2016","unstructured":"Farsana, F. J., & Gopakumar, K. (2016). A novel approach for speech encryption: Zaslavsky map as pseudorandom number generator, 6th International Conference on Advances In Computing and Communications, ICACC 2016. Procedia Computer Science, 93, 816\u2013823.","journal-title":"Procedia Computer Science"},{"key":"9439_CR10","unstructured":"Gammel, B. M., G\u00f6ttfert, R., & Kniffler, O. (2006). Achterbahn-128\/80, eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/001."},{"key":"9439_CR11","doi-asserted-by":"crossref","unstructured":"Garofolo, John, et al. (1993). TIMIT Acoustic-Phonetic Continuous Speech Corpus LDC93S1, Web Download. Philadelphia: Linguistic Data Consortium.","DOI":"10.6028\/NIST.IR.4930"},{"key":"9439_CR12","doi-asserted-by":"crossref","unstructured":"Hell, M., Johansson, T., & Meier, W. (2006). A stream cipher proposal: Grain-128, In IEEE International Symposium on Information Theory (ISIT 2006).","DOI":"10.1109\/ISIT.2006.261549"},{"key":"9439_CR13","first-page":"17","volume":"2008","author":"NS Kulkarni","year":"2008","unstructured":"Kulkarni, N. S., Raman, B., & Gupta, I. (2008). Selective encryption of multimedia images. NSC, 2008, 17\u201319.","journal-title":"NSC"},{"key":"9439_CR14","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1109\/TASSP.1981.1163642","volume":"29","author":"L Lamel","year":"1981","unstructured":"Lamel, L., Labiner, L., Rosenberg, A., & Wilpon, J. (1981). An improved endpoint detector for isolated word recognition. IEEE ASSP Magazine, 29, 777\u2013785.","journal-title":"IEEE ASSP Magazine"},{"issue":"2","key":"9439_CR15","first-page":"68","volume":"39","author":"A Maysaa","year":"2013","unstructured":"Maysaa, A., & Iman Qays, A. (2013). Speech encryption using chaotic map and blowfish algorithms. Journal of Basrah Researches Sciences, 39(2), 68\u201376.","journal-title":"Journal of Basrah Researches Sciences"},{"key":"9439_CR16","unstructured":"Musheer, A., Bashir, A., & Omar, F. (2012). Chaos based mixed key stream generator for voice data encryption. International Journal on Cryptography and Information Security (IJCIS), 2(1), 36\u201345."},{"issue":"3","key":"9439_CR17","first-page":"74","volume":"12","author":"Md M Rahman","year":"2012","unstructured":"Rahman, Md. M., Saha, T. K., & Bhuiyan, Md. A. (2012). Implementation of RSA algorithm for speech data encryption and decryption. IJCSNS International Journal of Computer Science and Network Security, 12(3), 74\u201382.","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"9439_CR18","unstructured":"Ramirez, J., Gorriz, J. M., & Segura, J. C. (2007). Voice activity detection, fundamentals and speech recognition system robustness, robust speech recognition and understanding, In M. Grimm & K. Kroschel (Eds.), ISBN: 978-3-902613-08-0."}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10772-017-9439-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-017-9439-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-017-9439-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T00:16:48Z","timestamp":1569802608000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10772-017-9439-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,13]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["9439"],"URL":"https:\/\/doi.org\/10.1007\/s10772-017-9439-8","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,13]]}}}