{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:54:43Z","timestamp":1760784883574,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T00:00:00Z","timestamp":1601942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T00:00:00Z","timestamp":1601942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002386","name":"Cairo University","doi-asserted-by":"publisher","award":["16-120"],"award-info":[{"award-number":["16-120"]}],"id":[{"id":"10.13039\/501100002386","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09756-y","type":"journal-article","created":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T00:03:03Z","timestamp":1602028983000},"page":"5373-5402","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A switched chaotic encryption scheme using multi-mode generalized modified transition map"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8326-070X","authenticated-orcid":false,"given":"Wafaa S.","family":"Sayed","sequence":"first","affiliation":[]},{"given":"Mohammed F.","family":"Tolba","sequence":"additional","affiliation":[]},{"given":"Ahmed G.","family":"Radwan","sequence":"additional","affiliation":[]},{"given":"Salwa K.","family":"Abd-El-Hafiz","sequence":"additional","affiliation":[]},{"given":"Ahmed M.","family":"Soliman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,6]]},"reference":[{"key":"9756_CR1","unstructured":"(2018) ITU-T Test Signals for Telecommunication Systems, Test vectors associated to Rec. ITU-T P.501, accessed. https:\/\/www.itu.int\/net\/itu-t\/sigdb\/genaudio\/AudioForm-g.aspx?val=10000501"},{"key":"9756_CR2","unstructured":"(2018) We shall fight on the beaches (audio), accessed. https:\/\/www.winstonchurchill.org\/resources\/speeches\/1940-the-finest-hour\/we-shall-never-surrender\/"},{"key":"9756_CR3","unstructured":"(2018) The royer track (audio), accessed. https:\/\/www.prosoundtraining.com\/2010\/03\/10\/a-downloadable-speech-track-the-royer-track\/"},{"issue":"6","key":"9756_CR4","first-page":"3215","volume":"9","author":"SK Abd-El-Hafiz","year":"2015","unstructured":"Abd-El-Hafiz SK, Radwan AG, AbdEl-Haleem SH (2015) Encryption applications of a generalized chaotic map. Applied Mathematics & Information Sciences 9(6):3215","journal-title":"Applied Mathematics & Information Sciences"},{"key":"9756_CR5","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","volume":"160","author":"M Alawida","year":"2019","unstructured":"Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45\u201358","journal-title":"Signal Process"},{"issue":"19","key":"9756_CR6","doi-asserted-by":"publisher","first-page":"27569","DOI":"10.1007\/s11042-019-07852-2","volume":"78","author":"S Anwar","year":"2019","unstructured":"Anwar S, Meghana S (2019) A pixel permutation based image encryption technique using chaotic map. Multimedia tools and applications 78(19):27569\u201327590","journal-title":"Multimedia tools and applications"},{"key":"9756_CR7","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2d-LICM hyperchaotic map. Signal Process 143:122\u2013133","journal-title":"Signal Process"},{"issue":"3","key":"9756_CR8","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.1007\/s11042-019-08190-z","volume":"79","author":"OS Faragallah","year":"2020","unstructured":"Faragallah OS, AlZain MA, El-Sayed HS, Al-Amri JF, El-Shafai W, Afifi A, Naeem EA, Soh B (2020) Secure color image cryptosystem based on chaotic logistic in the frFT domain. Multimedia Tools and Applications 79(3):2495\u20132519","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"9756_CR9","doi-asserted-by":"publisher","first-page":"2363","DOI":"10.1364\/OE.20.002363","volume":"20","author":"C Fu","year":"2012","unstructured":"Fu C, Jj Chen, Zou H, Meng W h, Yf Zhan, Yw Y u (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics express 20(3):2363\u20132378","journal-title":"Optics express"},{"key":"9756_CR10","doi-asserted-by":"crossref","unstructured":"Garasym O, Taralova I (2013) High-speed encryption method based on switched chaotic model with changeable parameters. In: Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for, IEEE, pp 37\u201342","DOI":"10.1109\/ICITST.2013.6750158"},{"key":"9756_CR11","unstructured":"Garofolo JS (1993) TIMIT Acoustic phonetic continuous speech corpus. Linguistic Data Consortium, 1993"},{"issue":"19","key":"9756_CR12","doi-asserted-by":"publisher","first-page":"24751","DOI":"10.1007\/s11042-018-5675-4","volume":"77","author":"J Gayathri","year":"2018","unstructured":"Gayathri J, Subashini S (2018) A spatiotemporal chaotic image encryption scheme based on self adaptive model and dynamic keystream fetching technique. Multimedia Tools and Applications 77(19):24751\u201324787","journal-title":"Multimedia Tools and Applications"},{"issue":"2042","key":"9756_CR13","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1098\/rspa.2003.1183","volume":"460","author":"GA Gottwald","year":"2004","unstructured":"Gottwald GA, Melbourne I (2004) A new test for chaos in deterministic systems. Proceedings of the Royal Society of London Series a: Mathematical. Phys Eng Sci 460(2042):603\u2013611","journal-title":"Phys Eng Sci"},{"issue":"1-2","key":"9756_CR14","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.physd.2005.09.011","volume":"212","author":"GA Gottwald","year":"2005","unstructured":"Gottwald GA, Melbourne I (2005) Testing for chaos in deterministic systems with noise. Physica D: Nonlinear Phenomena 212(1-2):100\u2013110","journal-title":"Physica D: Nonlinear Phenomena"},{"issue":"1","key":"9756_CR15","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1137\/080718851","volume":"8","author":"GA Gottwald","year":"2009","unstructured":"Gottwald GA, Melbourne I (2009) On the implementation of the 0\u20131 test for chaos. SIAM J Appl Dyn Syst 8(1):129\u2013145","journal-title":"SIAM J Appl Dyn Syst"},{"key":"9756_CR16","doi-asserted-by":"crossref","unstructured":"Gottwald GA, Melbourne I (2016) The 0-1 test for chaos: A review. In: Chaos detection and predictability, Springer, pp 221\u2013247","DOI":"10.1007\/978-3-662-48410-4_7"},{"issue":"2","key":"9756_CR17","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JAS.2016.7510127","volume":"4","author":"J Hou","year":"2017","unstructured":"Hou J, Xi R, Liu P, Liu T (2017) The switching fractional order chaotic system and its application to image encryption. IEEE\/CAA Journal of Automatica Sinica 4(2):381\u2013388","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"5","key":"9756_CR18","doi-asserted-by":"publisher","first-page":"056207","DOI":"10.1103\/PhysRevE.72.056207","volume":"72","author":"J Hu","year":"2005","unstructured":"Hu J, Ww Tung, Gao J, Cao Y (2005) Reliability of the 0-1 test for chaos. Phys Rev E 72(5):056207","journal-title":"Phys Rev E"},{"key":"9756_CR19","unstructured":"Jankowski C, Kalyanswamy A, Basson S, Spitz J (1990) Ntimit: A phonetically balanced, continuous speech, telephone bandwidth speech database. In: 1990 International Conference on Acoustics, Speech, and Signal Processing, 1990. ICASSP-90., IEEE, pp 109\u2013112. https:\/\/catalog.ldc.upenn.edu\/LDC93S2"},{"issue":"18","key":"9756_CR20","doi-asserted-by":"publisher","first-page":"26203","DOI":"10.1007\/s11042-019-07818-4","volume":"78","author":"M Khan","year":"2019","unstructured":"Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimedia Tools and Applications 78(18):26203\u201326222","journal-title":"Multimedia Tools and Applications"},{"key":"9756_CR21","doi-asserted-by":"crossref","unstructured":"Lee TH, Park JH, Jung HY, Lee SM (2015) Improving security in communication switched chaotic systems. In: Consumer electronics (ICCE), 2015, IEEE International Conference on, IEEE, pp 283--284","DOI":"10.1109\/ICCE.2015.7066415"},{"key":"9756_CR22","doi-asserted-by":"crossref","unstructured":"Lian S (2008) Multimedia content encryption: techniques and applications. CRC press","DOI":"10.1201\/9781420065282"},{"issue":"12","key":"9756_CR23","doi-asserted-by":"publisher","first-page":"15997","DOI":"10.1007\/s11042-018-6996-z","volume":"78","author":"H Liu","year":"2019","unstructured":"Liu H, Wen F, Kadir A (2019) Construction of a new 2D Chebyshev-sine map and its application to color image encryption. Multimedia Tools and Applications 78(12):15997\u201316010","journal-title":"Multimedia Tools and Applications"},{"issue":"15","key":"9756_CR24","doi-asserted-by":"publisher","first-page":"22023","DOI":"10.1007\/s11042-019-7453-3","volume":"78","author":"Y Luo","year":"2019","unstructured":"Luo Y, Yu J, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimedia Tools and Applications 78(15):22023\u201322043","journal-title":"Multimedia Tools and Applications"},{"key":"9756_CR25","unstructured":"Matthews P (2020) On the implementation of the 0\u20131 test for chaos. 0 - 1 test for chaos, (https:\/\/www.mathworkscom\/matlabcentral\/fileexchange\/25050-0-1-test-for-chaos), MATLAB Central File Exchange Retrieved July 24, 2020"},{"issue":"9","key":"9756_CR26","doi-asserted-by":"publisher","first-page":"12027","DOI":"10.1007\/s11042-018-6739-1","volume":"78","author":"C Pak","year":"2019","unstructured":"Pak C, An K, Jang P, Kim J, Kim S (2019) A novel bit-level color image encryption using improved 1D chaotic map. Multimedia Tools and Applications 78(9):12027\u201312042","journal-title":"Multimedia Tools and Applications"},{"key":"9756_CR27","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s11235-011-9460-1","volume":"52","author":"A Pande","year":"2013","unstructured":"Pande A, Zambreno J (2013) A chaotic encryption scheme for real-time embedded systems: design and implementation. Telecommun Syst 52:551\u2013561. https:\/\/doi.org\/10.1007\/s11235-011-9460-1","journal-title":"Telecommun Syst"},{"key":"9756_CR28","doi-asserted-by":"crossref","unstructured":"Radwan AG, Abd-El-Hafiz SK, AbdElHaleem SH (2014) An image encryption system based on generalized discrete maps. In: IEEE International Conference on Electronics, Circuits and Systems (ICECS), 21st, IEEE, pp 283\u2013286","DOI":"10.1109\/ICECS.2014.7049977"},{"issue":"2","key":"9756_CR29","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.jare.2015.07.002","volume":"7","author":"AG Radwan","year":"2016","unstructured":"Radwan AG, AbdElHaleem SH, Abd-El-Hafiz SK (2016) Symmetric encryption algorithms using chaotic and non-chaotic generators: A review. Journal of advanced research 7(2):193\u2013208","journal-title":"Journal of advanced research"},{"issue":"7","key":"9756_CR30","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.1049\/iet-ipr.2019.0562","volume":"14","author":"S Rajagopalan","year":"2020","unstructured":"Rajagopalan S, Poori S, Narasimhan M, Rethinam S, Kuppusamy CV, Balasubramanian R, Annamalai VMP, Rengarajan A (2020) Chua\u2019s diode and strange attractor: a three-layer hardware\u2013software co-design for medical image confidentiality. IET Image Process 14(7):1354\u20131365","journal-title":"IET Image Process"},{"key":"9756_CR31","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep., DTIC Document","DOI":"10.6028\/NIST.SP.800-22"},{"issue":"1","key":"9756_CR32","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s13636-017-0118-0","volume":"2017","author":"P Sathiyamurthi","year":"2017","unstructured":"Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio Speech, and Music Processing 2017(1):20","journal-title":"EURASIP Journal on Audio Speech, and Music Processing"},{"key":"9756_CR33","doi-asserted-by":"crossref","unstructured":"Sathiyamurthi P, Ramakrishnan S (2020) Speech encryption algorithm using FFT and 3d-Lorenz\u2013logistic chaotic map. Multimedia Tools and Applications, pp 1\u201319","DOI":"10.1007\/s11042-020-08729-5"},{"issue":"01","key":"9756_CR34","doi-asserted-by":"publisher","first-page":"1730004","DOI":"10.1142\/S021812741730004X","volume":"27","author":"WS Sayed","year":"2017","unstructured":"Sayed WS, Fahmy HA, Rezk AA, Radwan AG (2017) Generalized smooth transition map between tent and logistic maps. International Journal of Bifurcation and Chaos 27(01):1730004","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"9756_CR35","doi-asserted-by":"crossref","unstructured":"Sayed WS, Henein MM, Abd-El-Hafiz SK, Radwan AG (2017) Generalized dynamic switched synchronization between combinations of fractional-order chaotic systems. Complexity 2017","DOI":"10.1155\/2017\/9189120"},{"key":"9756_CR36","doi-asserted-by":"crossref","unstructured":"Sayed WS, Radwan AG, Fahmy HA (2015) Design of positive, negative, and alternating sign generalized logistic maps Discrete Dynamics in Nature and Society","DOI":"10.1155\/2015\/586783"},{"key":"9756_CR37","doi-asserted-by":"crossref","unstructured":"Sayed WS, Radwan AG, Fahmy HA (2015) Design of a generalized bidirectional tent map suitable for encryption applications. In: 11Th international computer engineering conference (ICENCO), IEEE, pp 207--211","DOI":"10.1109\/ICENCO.2015.7416349"},{"issue":"12","key":"9756_CR38","doi-asserted-by":"publisher","first-page":"16097","DOI":"10.1007\/s11042-018-6946-9","volume":"78","author":"WS Sayed","year":"2019","unstructured":"Sayed WS, Tolba MF, Radwan AG, Abd-El-Hafiz SK (2019) FPGA Realization of a speech encryption system based on a generalized modified chaotic transition map and bit permutation. Multimedia Tools and Applications 78(12):16097\u201316127","journal-title":"Multimedia Tools and Applications"},{"issue":"19","key":"9756_CR39","doi-asserted-by":"publisher","first-page":"25223","DOI":"10.1007\/s11042-018-5782-2","volume":"77","author":"S Sheela","year":"2018","unstructured":"Sheela S, Suresh K, Tandur D (2018) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimedia Tools and Applications 77(19):25223\u201325251","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"9756_CR40","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1007\/s11042-018-6263-3","volume":"78","author":"S Thakur","year":"2019","unstructured":"Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia tools and Applications 78(3):3457\u20133470","journal-title":"Multimedia tools and Applications"},{"key":"9756_CR41","first-page":"1","volume":"315","author":"AG Weber","year":"1997","unstructured":"Weber AG (1997) The USC-SIPI image database version 5. USC-SIPI Report 315:1\u201324","journal-title":"USC-SIPI Report"},{"issue":"11","key":"9756_CR42","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1016\/j.sigpro.2013.04.021","volume":"93","author":"Y Zhou","year":"2013","unstructured":"Zhou Y, Bao L, Chen CP (2013) Image encryption using a new parametric switching chaotic system. Signal processing 93(11):3039\u20133052","journal-title":"Signal processing"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09756-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09756-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09756-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T07:08:41Z","timestamp":1633504121000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09756-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,6]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9756"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09756-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,10,6]]},"assertion":[{"value":"12 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}