{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:53:02Z","timestamp":1757454782630},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,7]],"date-time":"2021-03-07T00:00:00Z","timestamp":1615075200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,7]],"date-time":"2021-03-07T00:00:00Z","timestamp":1615075200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s10772-021-09821-3","type":"journal-article","created":{"date-parts":[[2021,3,7]],"date-time":"2021-03-07T09:02:26Z","timestamp":1615107746000},"page":"651-663","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Multiuser wireless speech encryption using synchronized chaotic systems"],"prefix":"10.1007","volume":"24","author":[{"given":"Somayeh","family":"Hashemi","sequence":"first","affiliation":[]},{"given":"Mohammad Ali","family":"Pourmina","sequence":"additional","affiliation":[]},{"given":"Saleh","family":"Mobayen","sequence":"additional","affiliation":[]},{"given":"Mahdi R.","family":"Alagheband","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,7]]},"reference":[{"key":"9821_CR1","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.mejo.2019.05.005","volume":"90","author":"AJ Abd El-Maksoud","year":"2019","unstructured":"Abd El-Maksoud, A. J., Abd El-Kader, A. A., Hassan, B. G., Rihan, N. G., Tolba, M. F., Said, L. A., et al. (2019). FPGA implementation of sound encryption system based on fractional-order chaotic systems. Microelectronics Journal, 90, 323\u2013335.","journal-title":"Microelectronics Journal"},{"key":"9821_CR2","doi-asserted-by":"crossref","unstructured":"Albin, C., Narayan, D., Varu, R., & Thanikaiselvan, V. (2018). DWT based audio encryption scheme. In 2018 second international conference on electronics, communication and aerospace technology (ICECA). IEEE, pp. 920\u2013924.","DOI":"10.1109\/ICECA.2018.8474602"},{"issue":"6","key":"9821_CR3","first-page":"5658","volume":"10","author":"Y Alemami","year":"2020","unstructured":"Alemami, Y., Mohamed, M. A., Atiewi, S., & Mamat, M. (2020). Speech encryption by multiple chaotic maps with fast fourier transform. International Journal of Electrical & Computer Engineering (2088-8708), 10(6), 5658\u20135664.","journal-title":"International Journal of Electrical & Computer Engineering (2088-8708)"},{"key":"9821_CR4","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.cnsns.2017.09.008","volume":"57","author":"GA Al-Suhail","year":"2018","unstructured":"Al-Suhail, G. A., Tahir, F. R., Abd, M. H., Pham, V.-T., & Fortuna, L. (2018). Modelling of long-wave chaotic radar system for anti-stealth applications. Communications in Nonlinear Science and Numerical Simulation, 57, 80\u201396.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"8","key":"9821_CR5","doi-asserted-by":"publisher","first-page":"2035","DOI":"10.1016\/j.cnsns.2012.12.018","volume":"18","author":"MS Azzaz","year":"2013","unstructured":"Azzaz, M. S., Tanougast, C., Sadoudi, S., & Bouridane, A. (2013). Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption. Communications in Nonlinear Science and Numerical Simulation, 18(8), 2035\u20132047.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"9821_CR6","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Rondoni, L., & Mitra, M. (2015). Applications of chaos and nonlinear dynamics in science and engineering (Vol. 4, p. 4). Applications of Chaos and Nonlinear Dynamics in Science and Engineering.","DOI":"10.1007\/978-3-319-17037-4"},{"key":"9821_CR7","volume-title":"Secure speech communications","author":"H Beker","year":"1985","unstructured":"Beker, H., & Piper, F. C. (1985). Secure speech communications. London: Academic Press."},{"key":"9821_CR8","doi-asserted-by":"publisher","first-page":"103251","DOI":"10.1016\/j.engappai.2019.103251","volume":"87","author":"Y-J Chen","year":"2020","unstructured":"Chen, Y.-J., Chou, H.-G., Wang, W.-J., Tsai, S.-H., Tanaka, K., Wang, H. O., et al. (2020). A polynomial-fuzzy-model-based synchronization methodology for the multi-scroll Chen chaotic secure communication system. Engineering Applications of Artificial Intelligence, 87, 103251.","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"9821_CR9","unstructured":"Chen, Y., Hao, J., Chen, J., & Zhang, Z. (2015). End-to-end speech encryption algorithm based on speech scrambling in frequency domain."},{"key":"9821_CR10","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.sigpro.2016.10.025","volume":"133","author":"RA da Costa","year":"2017","unstructured":"da Costa, R. A., Loiola, M. B., & Eisencraft, M. (2017). Correlation and spectral properties of chaotic signals generated by a piecewise-linear map with multiple segments. Signal Processing, 133, 187\u2013191.","journal-title":"Signal Processing"},{"key":"9821_CR11","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1016\/j.amc.2014.09.031","volume":"247","author":"MZ De la Hoz","year":"2014","unstructured":"De la Hoz, M. Z., Acho, L., & Vidal, Y. (2014). A modified Chua chaotic oscillator and its application to secure communications. Applied Mathematics and Computation, 247, 712\u2013722.","journal-title":"Applied Mathematics and Computation"},{"issue":"12","key":"9821_CR12","doi-asserted-by":"publisher","first-page":"e2592","DOI":"10.1016\/j.na.2009.05.071","volume":"71","author":"M Eisencraft","year":"2009","unstructured":"Eisencraft, M., & Kato, D. M. (2009). Spectral properties of chaotic signals with applications in communications. Nonlinear Analysis: Theory, Methods & Applications, 71(12), e2592\u2013e2599.","journal-title":"Nonlinear Analysis: Theory, Methods & Applications"},{"key":"9821_CR13","doi-asserted-by":"publisher","first-page":"153347","DOI":"10.1016\/j.aeue.2020.153347","volume":"125","author":"AH Elsafty","year":"2020","unstructured":"Elsafty, A. H., Tolba, M. F., Said, L. A., Madian, A. H., & Radwan, A. G. (2020). Enhanced hardware implementation of a mixed-order nonlinear chaotic system and speech encryption application. AEU-International Journal of Electronics and Communications, 125, 153347.","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"2","key":"9821_CR14","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., & Micali, S. (1984). Probabilistic encryption. Journal of Computer and System Sciences, 28(2), 270\u2013299.","journal-title":"Journal of Computer and System Sciences"},{"key":"9821_CR15","doi-asserted-by":"crossref","unstructured":"Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017). Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th international conference on electrical and electronic engineering (ICEEE) (pp. 246\u2013250). IEEE.","DOI":"10.1109\/ICEEE2.2017.7935827"},{"issue":"1","key":"9821_CR16","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1080\/00207217.2018.1523474","volume":"106","author":"M Herceg","year":"2019","unstructured":"Herceg, M., Vranje\u0161, D., Grbi\u0107, R., & Job, J. (2019). Chaos-Based transmitted-reference ultra-wideband communications. International Journal of Electronics, 106(1), 160\u2013172.","journal-title":"International Journal of Electronics"},{"issue":"1","key":"9821_CR17","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1007\/s11042-015-3030-6","volume":"76","author":"H Hermassi","year":"2017","unstructured":"Hermassi, H., Hamdi, M., Rhouma, R., & Belghith, S. M. (2017). A joint encryption-compression codec for speech signals using the ITU-T G. 711 standard and chaotic map. Multimedia Tools and Applications, 76(1), 1177\u20131200.","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"9821_CR18","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MSEC.2018.2888776","volume":"17","author":"G Horsman","year":"2019","unstructured":"Horsman, G. (2019). A call for the prohibition of encryption: Panacea or problem? IEEE Security & Privacy, 17(2), 59\u201366.","journal-title":"IEEE Security & Privacy"},{"issue":"4","key":"9821_CR19","first-page":"3217","volume":"66","author":"S Hu","year":"2019","unstructured":"Hu, S., Wang, L., Mao, J., Gao, C., Zhang, B., & Yang, S. (2019). Synchronous online diagnosis of multiple cable intermittent faults based on chaotic spread spectrum sequence. IEEE Transactions on Industrial Electronics, 66(4), 3217\u20133226.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"9821_CR20","doi-asserted-by":"crossref","unstructured":"Huang, Y.-B., Wang, S.-H., Wang, Y., & Li, H. (2020) A new four-dimensional chaotic system and its application in speech encryption. In 2020 information communication technologies conference (ICTC) (pp. 171\u2013175). IEEE.","DOI":"10.1109\/ICTC49638.2020.9123294"},{"key":"9821_CR21","volume-title":"Advances in information and communication technologies: Processing and control in information and communication systems","author":"M Ilchenko","year":"2018","unstructured":"Ilchenko, M. (2018). Advances in information and communication technologies: Processing and control in information and communication systems. Berlin: Springer."},{"key":"9821_CR22","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1049\/iet-bmt.2018.5188","volume":"8","author":"M Jampour","year":"2019","unstructured":"Jampour, M., & Naserasadi, A. (2019). Chaos game theory and its application for offline signature identification. IET Biometrics, 8, 316\u2013324.","journal-title":"IET Biometrics"},{"issue":"24","key":"9821_CR23","doi-asserted-by":"publisher","first-page":"5703","DOI":"10.1016\/j.ijleo.2015.09.091","volume":"126","author":"J Kalpana","year":"2015","unstructured":"Kalpana, J., & Murali, P. (2015). An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos. Optik, 126(24), 5703\u20135709.","journal-title":"Optik"},{"issue":"2","key":"9821_CR24","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","volume":"30","author":"JS Khan","year":"2019","unstructured":"Khan, J. S., & Ahmad, J. (2019). Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing, 30(2), 943\u2013961.","journal-title":"Multidimensional Systems and Signal Processing"},{"key":"9821_CR25","first-page":"637","volume":"2012","author":"A Kipnis","year":"2012","unstructured":"Kipnis, A., & Hibshoosh, E. (2012). Efficient methods for practical fully homomorphic symmetric-key encrypton, randomization and verification. IACR Cryptology ePrint Archive, 2012, 637.","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"4","key":"9821_CR26","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1109\/TCOM.1984.1096078","volume":"32","author":"L-S Lee","year":"1984","unstructured":"Lee, L.-S., Chou, G.-C., & Chang, C.-S. (1984). A new frequency domain speech scrambling system which does not require frame synchronization. IEEE Transactions on Communications, 32(4), 444\u2013456.","journal-title":"IEEE Transactions on Communications"},{"key":"9821_CR27","doi-asserted-by":"crossref","unstructured":"Manjunath, G., & Anand, G. V. (2002). Speech encryption using circulant transformations. In Proceedings. IEEE international conference on multimedia and expo (pp. 553\u2013556). IEEE.","DOI":"10.1109\/ICME.2002.1035841"},{"key":"9821_CR28","unstructured":"Milton, R. (1989). A time and frequency-domain speech scrambler. In COMSIG 1989 proceedings: Southern African conference on communications and signal processing (pp. 125\u2013130). IEEE."},{"key":"9821_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.micpro.2018.12.003","volume":"65","author":"Y Naseer","year":"2019","unstructured":"Naseer, Y., Shah, D., & Shah, T. (2019). A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocessors and Microsystems, 65, 1\u20136.","journal-title":"Microprocessors and Microsystems"},{"key":"9821_CR30","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4079793","author":"Y Niu","year":"2017","unstructured":"Niu, Y., Zhang, X., & Han, F. (2017). Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Computational Intelligence and Neuroscience. https:\/\/doi.org\/10.1155\/2017\/4079793.","journal-title":"Computational Intelligence and Neuroscience"},{"key":"9821_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2884952","author":"C Peng","year":"2019","unstructured":"Peng, C., Sun, H., Yang, M., & Wang, Y. (2019). A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems. https:\/\/doi.org\/10.1109\/TSMC.2018.2884952.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"9","key":"9821_CR32","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","volume":"13","author":"M Preishuber","year":"2018","unstructured":"Preishuber, M., H\u00fctter, T., Katzenbeisser, S., & Uhl, A. (2018). Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Transactions on Information Forensics and Security, 13(9), 2137\u20132150.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9821_CR33","doi-asserted-by":"crossref","unstructured":"Qian, Q., Wang, H., Shi, C., & Wang, H. (2016). An efficient content authentication scheme in encrypted speech based on integer wavelet transform. 2016 Asia-Pacific signal and information processing association annual summit and conference (APSIPA) (pp. 1\u20138). IEEE.","DOI":"10.1109\/APSIPA.2016.7820814"},{"key":"9821_CR34","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.jisa.2019.02.010","volume":"46","author":"D Renza","year":"2019","unstructured":"Renza, D., & Mendoza, S. (2019). High-uncertainty audio signal encryption based on the Collatz conjecture. Journal of Information Security and Applications, 46, 62\u201369.","journal-title":"Journal of Information Security and Applications"},{"issue":"10","key":"9821_CR35","doi-asserted-by":"publisher","first-page":"2072","DOI":"10.1109\/LCOMM.2018.2864146","volume":"22","author":"OA Ridha","year":"2018","unstructured":"Ridha, O. A., Jawad, G. N., & Kadhim, S. F. (2018). Modified blind source separation for securing end-to-end mobile voice calls. IEEE Communications Letters, 22(10), 2072\u20132075.","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"9821_CR36","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s13636-017-0118-0","volume":"2017","author":"P Sathiyamurthi","year":"2017","unstructured":"Sathiyamurthi, P., & Ramakrishnan, S. (2017a). Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech, and Music Processing, 2017(1), 20. https:\/\/doi.org\/10.1186\/s13636-017-0118-0.","journal-title":"EURASIP Journal on Audio, Speech, and Music Processing"},{"issue":"1","key":"9821_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13636-017-0118-0","volume":"2017","author":"P Sathiyamurthi","year":"2017","unstructured":"Sathiyamurthi, P., & Ramakrishnan, S. (2017b). Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech, and Music Processing, 2017(1), 1\u201311.","journal-title":"EURASIP Journal on Audio, Speech, and Music Processing"},{"key":"9821_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6946-9","author":"WS Sayed","year":"2018","unstructured":"Sayed, W. S., Tolba, M. F., Radwan, A. G., & Abd-El-Hafiz, S. K. (2018). FPGA realization of a speech encryption system based on a generalized modified chaotic transition map and bit permutation. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-018-6946-9.","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"9821_CR39","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/97.586036","volume":"4","author":"V Senk","year":"1997","unstructured":"Senk, V., Delic, V., & Milosevic, V. (1997). A new speech scrambling concept based on Hadamard matrices. IEEE Signal Processing Letters, 4(6), 161\u2013163.","journal-title":"IEEE Signal Processing Letters"},{"key":"9821_CR40","doi-asserted-by":"publisher","DOI":"10.1201\/9780429492563","volume-title":"Nonlinear dynamics and chaos with student solutions manual: With applications to physics, biology, chemistry, and engineering","author":"SH Strogatz","year":"2018","unstructured":"Strogatz, S. H. (2018). Nonlinear dynamics and chaos with student solutions manual: With applications to physics, biology, chemistry, and engineering. Boca Raton: CRC Press."},{"key":"9821_CR41","doi-asserted-by":"crossref","unstructured":"Thein, N., Nugroho, H. A., Adji, T. B., & Mustika, I. W. (2017). Comparative performance study on ordinary and chaos image encryption schemes. In 2017 international conference on advanced computing and applications (ACOMP) (pp. 122\u2013126). IEEE.","DOI":"10.1109\/ACOMP.2017.25"},{"issue":"3","key":"9821_CR42","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1007\/s11071-017-3543-9","volume":"89","author":"B Vaseghi","year":"2017","unstructured":"Vaseghi, B., Pourmina, M. A., & Mobayen, S. (2017). Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control. Nonlinear Dynamics, 89(3), 1689\u20131704.","journal-title":"Nonlinear Dynamics"},{"issue":"13","key":"9821_CR43","doi-asserted-by":"publisher","first-page":"3788","DOI":"10.1177\/0142331217731617","volume":"40","author":"B Vaseghi","year":"2018","unstructured":"Vaseghi, B., Pourmina, M. A., & Mobayen, S. (2018). Finite-time chaos synchronization and its application in wireless sensor networks. Transactions of the Institute of Measurement and Control, 40(13), 3788\u20133799.","journal-title":"Transactions of the Institute of Measurement and Control"}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-021-09821-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10772-021-09821-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-021-09821-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T11:27:11Z","timestamp":1629199631000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10772-021-09821-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,7]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["9821"],"URL":"https:\/\/doi.org\/10.1007\/s10772-021-09821-3","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,7]]},"assertion":[{"value":"10 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}