{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T01:52:45Z","timestamp":1769392365128,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,8,20]],"date-time":"2017-08-20T00:00:00Z","timestamp":1503187200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s10772-017-9452-y","type":"journal-article","created":{"date-parts":[[2017,8,20]],"date-time":"2017-08-20T15:32:13Z","timestamp":1503243133000},"page":"829-837","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["A novel method in audio message encryption based on a mixture of chaos function"],"prefix":"10.1007","volume":"20","author":[{"given":"Ardalan","family":"Ghasemzadeh","sequence":"first","affiliation":[]},{"given":"Elham","family":"Esmaeili","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,20]]},"reference":[{"key":"9452_CR1","volume-title":"Complete binary tree structure block cipher for real-time multimedia","author":"NR Aathithan","year":"2013","unstructured":"Aathithan, N. R., & Venkatesulu, M. A. (2013). Complete binary tree structure block cipher for real-time multimedia. London: Science and Information Conference."},{"issue":"3","key":"9452_CR2","first-page":"213","volume":"10","author":"S Diaa","year":"2010","unstructured":"Diaa, S., Hatem, A. K., & Mohiy, H. (2010). Evaluating the performance of symmetric encryption algorithms. International Journal of Network Security, 10(3), 213\u2013219.","journal-title":"International Journal of Network Security"},{"key":"9452_CR3","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s10772-014-9253-5","volume":"18","author":"SMS Eldin","year":"2014","unstructured":"Eldin, S. M. S., Khamis, S. A., Hassanin, A. A. I. M., & Alsharqawy, M. A. (2014). New audio encryption package for TV cloud computing. International Journal of Speech Technology, 18, 131\u2013142.","journal-title":"International Journal of Speech Technology"},{"issue":"2","key":"9452_CR4","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","volume":"29","author":"H Gao","year":"2006","unstructured":"Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos Solitons Fractals, 29(2), 393\u2013399.","journal-title":"Chaos Solitons Fractals"},{"key":"9452_CR5","first-page":"103","volume":"1","author":"R Gnanajeyaraman","year":"2009","unstructured":"Gnanajeyaraman, R., & Prasadh, K. (2009). Audio encryption using higher dimensional chaotic map. International Journal of Recent Trends in Engineering, 1, 103\u2013107.","journal-title":"International Journal of Recent Trends in Engineering"},{"key":"9452_CR6","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.proeng.2011.11.2487","volume":"23","author":"FY Han","year":"2011","unstructured":"Han, F. Y., & Zhu, C. X. (2011). An novel chaotic image encryption algorithm based on tangent-delay ellipse reflecting cavity map system. Procedia Engineering, 23, 186\u2013191.","journal-title":"Procedia Engineering"},{"key":"9452_CR7","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11071-012-0440-0","volume":"70","author":"I Hussain","year":"2012","unstructured":"Hussain, I., Shah, T., & Gondal, M. A. (2012). Image encryption algorithm based on PGL(2,GF(2 8)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dynamics, 70, 181\u2013187.","journal-title":"Nonlinear Dynamics"},{"issue":"3","key":"9452_CR8","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1007\/s11042-011-0771-8","volume":"59","author":"GR Kwon","year":"2012","unstructured":"Kwon, G. R., Wang, C., Lian, S., & Hwang, S. S. (2012) Advanced partial encryption using watermarking and scrambling in MP3. Multimedia Tools and Applications, 59(3), 885\u2013895.","journal-title":"Multimedia Tools and Applications"},{"key":"9452_CR9","doi-asserted-by":"crossref","first-page":"8403","DOI":"10.1007\/s11042-015-2755-6","volume":"75","author":"JB Lima","year":"2016","unstructured":"Lima, J. B., & Da Silva Neto, E. F. (2016). Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75, 8403\u20138418.","journal-title":"Multimedia Tools and Applications"},{"key":"9452_CR10","doi-asserted-by":"crossref","first-page":"7431","DOI":"10.1016\/j.ijleo.2016.05.073","volume":"127","author":"H Liu","year":"2016","unstructured":"Liu, H., Kadir, A., & Li, Y. (2016). Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik, 127, 7431\u20137438.","journal-title":"Optik"},{"key":"9452_CR11","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/0022-5193(75)90078-8","volume":"51","author":"RM May","year":"1975","unstructured":"May, R. M. (1975). Biological populations obeying difference equations: Stable points, stable cycles, and chaos. Journal of Theoretical Biology, 51, 511\u2013524.","journal-title":"Journal of Theoretical Biology"},{"key":"9452_CR12","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"RM May","year":"1976","unstructured":"May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261, 459\u2013467.","journal-title":"Nature"},{"key":"9452_CR13","first-page":"78","volume":"11","author":"DSA Minaam","year":"2010","unstructured":"Minaam, D. S. A., Abdual-Kader, H. M., & Hadhoud, M. M. (2010). Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types. International Journal of Network Security, 11, 78\u201387.","journal-title":"International Journal of Network Security"},{"key":"9452_CR14","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1016\/j.procs.2016.02.108","volume":"78","author":"P Patil","year":"2016","unstructured":"Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617\u2013624.","journal-title":"Procedia Computer Science"},{"issue":"2","key":"9452_CR15","first-page":"1574","volume":"4","author":"S Pavithra","year":"2012","unstructured":"Pavithra, S., & Ramadevi, E. (2012). Throughput Analysis of Symmetric Algorithms. International Journal of Advanced Networking and Applications, 4(2), 1574\u20131577.","journal-title":"International Journal of Advanced Networking and Applications"},{"key":"9452_CR16","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1078\/0030-4026-00224","volume":"114","author":"X Peng","year":"2003","unstructured":"Peng, X., Cui, Z., Cai, L., & Yu, L. (2003). Digital audio signal encryption with a virtual optics scheme. Optik, 114, 69\u201375.","journal-title":"Optik"},{"issue":"6","key":"9452_CR17","first-page":"472","volume":"2","author":"R Raghu","year":"2013","unstructured":"Raghu, R., Radha, K. D., Sudeepa, K. B., & Ganesh, A. (2013). Efficient audio encryption algorithm for online applications using transposition and multiplicative non-binary system. International Journal of Engineering Research & Technology, 2(6), 472\u2013477.","journal-title":"International Journal of Engineering Research & Technology"},{"key":"9452_CR18","unstructured":"Verma, O. P., Agarwal, R., Dafouti, D., & Tyagi, S. (2011). Peformance analysis of data encryption algorithms in ICECT 2011\u20132011 3rd International Conference on Electronics Computer Technology 5, pp.\u00a0399\u2013403."},{"key":"9452_CR19","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TMM.2010.2041102","volume":"12","author":"H Wang","year":"2010","unstructured":"Wang, H., et al. (2010). Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Transactions on Multimedia, 12, 215\u2013223.","journal-title":"IEEE Transactions on Multimedia"},{"key":"9452_CR20","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11, 514\u2013522.","journal-title":"Applied Soft Computing"}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10772-017-9452-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-017-9452-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-017-9452-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T11:07:17Z","timestamp":1509448037000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10772-017-9452-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,20]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["9452"],"URL":"https:\/\/doi.org\/10.1007\/s10772-017-9452-y","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,20]]}}}