{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T21:51:33Z","timestamp":1774389093129,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,11,15]],"date-time":"2020-11-15T00:00:00Z","timestamp":1605398400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,15]],"date-time":"2020-11-15T00:00:00Z","timestamp":1605398400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-09986-0","type":"journal-article","created":{"date-parts":[[2020,11,15]],"date-time":"2020-11-15T22:02:26Z","timestamp":1605477746000},"page":"9877-9893","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Voice over internet protocol voicemail security system using two factor authentication and biometric prints with new efficient hybrid cryptosystem"],"prefix":"10.1007","volume":"80","author":[{"given":"Elsayed M.","family":"Elshamy","sequence":"first","affiliation":[]},{"given":"Aziza I.","family":"Hussein","sequence":"additional","affiliation":[]},{"given":"Hesham F. A.","family":"Hamed","sequence":"additional","affiliation":[]},{"given":"M. A.","family":"Abdelghany","sequence":"additional","affiliation":[]},{"given":"Hamdy M.","family":"Kelash","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,15]]},"reference":[{"issue":"1","key":"9986_CR1","doi-asserted-by":"publisher","first-page":"107","DOI":"10.9734\/BJAST\/2015\/14744","volume":"8","author":"B Aissa","year":"2015","unstructured":"Aissa B, Khaled M, Mohamed L (2015) Speech encryption using stream cipher. Br J Appl Sci Technol 8(1):107\u2013125","journal-title":"Br J Appl Sci Technol"},{"key":"9986_CR2","doi-asserted-by":"crossref","unstructured":"Albin C, Narayan D, Varu R, Thanikaiselvan V (2018) DWT based audio encryption scheme. In: International Conference of Electronics, Communication and Aerospace Technology (ICECA) Conference \u2013 IEEE Xplore, pp 29\u201331","DOI":"10.1109\/ICECA.2018.8474602"},{"key":"9986_CR3","unstructured":"Aleksandr O, Sergey B (2018) Multi-factor authentication: a survey. Cryptography, pp 1\u201331"},{"issue":"1","key":"9986_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1504\/IJTMCC.2015.072467","volume":"3","author":"N Augustine","year":"2015","unstructured":"Augustine N, George SN, Pattathil DP (2015) An audio encryption technique through compressive sensing and Arnold transform. Int J Trust Manag Comput Commun 3(1):74\u201392","journal-title":"Int J Trust Manag Comput Commun"},{"key":"9986_CR5","doi-asserted-by":"crossref","unstructured":"Dharavath K, Talukdar FA, Laskar RH (2013) Study on biometric authentication system, challenges and future trends. In: A review in International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, Enathi","DOI":"10.1109\/ICCIC.2013.6724278"},{"issue":"1","key":"9986_CR6","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10772-014-9253-5","volume":"18","author":"SMS Eldin","year":"2014","unstructured":"Eldin SMS, Khamis SA, Hassanin AAIM, Alsharqawy MA (2014) New audio encryption package for TV cloud computing. Int J Speech Technol 18(1):131\u2013142","journal-title":"Int J Speech Technol"},{"key":"9986_CR7","unstructured":"El-Fishawy N, Abu Zaid OM (2007) Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael Block cipher algorithms. Int J Netw Secur 5(3):241\u2013251"},{"issue":"4","key":"9986_CR8","first-page":"13","volume":"18","author":"M Elsayed","year":"2015","unstructured":"Elsayed M, Farag Allah EOS (2015) Efficient audio cryptosystem based on chaotic maps and double random phase encoding. Int J Speech Technol, Springer 18(4):13\u201315","journal-title":"Int J Speech Technol, Springer"},{"issue":"15","key":"9986_CR9","doi-asserted-by":"publisher","first-page":"2533","DOI":"10.1109\/JLT.2013.2267891","volume":"31","author":"AM Elshamy","year":"2013","unstructured":"Elshamy AM, Ahmed N, Abd E-NA, Osama S, Yi M, Saleh A, Fathi E (2013) Optical image encryption based on chaotic baker map and double random phase encoding. Light Wave Technol J-IEEE 31(15):2533\u20132539","journal-title":"Light Wave Technol J-IEEE"},{"issue":"3","key":"9986_CR10","first-page":"1","volume":"48","author":"AM Elshamy","year":"2016","unstructured":"Elshamy AM, Fathi E, El-Samie A, Osama S, Faragallah E, Elshamy M, El-sayed HS, El-zoghdy SF, Rashed ANZ, Abd El-Naser A, Alhamad AQ (2016) Optical image cryptosystem using double random phase encoding and Arnold\u2019s cat map. Springer J 48(3):1\u201318","journal-title":"Springer J"},{"key":"9986_CR11","doi-asserted-by":"crossref","unstructured":"Fujii H, Tsuruoka Y (2013) SV-2FA: Two-factor user authentication with sms and voiceprint challenge response. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST), Dec. 9\u201312, 2013. IEEE, London","DOI":"10.1109\/ICITST.2013.6750207"},{"issue":"3","key":"9986_CR12","first-page":"33","volume":"10","author":"Y Fyyaz","year":"2016","unstructured":"Fyyaz Y, Mohammad D (2016) The evaluation of voice-over internet protocol (VoIP) by means of Trixbox. Int J Nat Eng Sci 10(3):33\u201341","journal-title":"Int J Nat Eng Sci"},{"issue":"4","key":"9986_CR13","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1007\/s10772-017-9452-y","volume":"20","author":"A Ghasemzadeh","year":"2017","unstructured":"Ghasemzadeh A, Esmaeili E (2017) Anovel method in audio message encryption based on a mixture of chaos function. Int J Speech Technol 20(4):829\u2013837","journal-title":"Int J Speech Technol"},{"key":"9986_CR14","doi-asserted-by":"crossref","unstructured":"Honglei Y, Guang-shou W, Ting W, Diantao L, Jun Y, Weitao M, Shaolei FY, Yuankao M (2009) An image encryption algorithm based on two dimensional baker map. In: Proc. International Conference on Intelligent Computation Technology and Automation ICICTA. IEEE, Changsha, pp 536\u2013540","DOI":"10.1109\/ICICTA.2009.136"},{"key":"9986_CR15","volume-title":"3D Research Center","author":"KH Kakaei","year":"2018","unstructured":"Kakaei KH, Jafar R, Ayaz I (2018) A novel fast and secure approach for voice encryption based on DNA computing. In: 3D Research Center. Kwangwoon University and Springer-Verlag, GmbH Germany"},{"key":"9986_CR16","doi-asserted-by":"crossref","unstructured":"Kataria AN, Adhyaru DM, Sharma AK, Zaveri TH (2013) A survey of Automated Biometric Authentication Techniques. In: Engenerring (NUiCONE), Nirma University Conference. IEEE, Ahmedabad","DOI":"10.1109\/NUiCONE.2013.6780190"},{"issue":"19","key":"9986_CR17","first-page":"225","volume":"5","author":"NH Khanapur","year":"2015","unstructured":"Khanapur NH, Patro A (2015) Design and implementation of enhanced version of MRC6 algorithm for data security. Int J Adv Comput Res 5(19):225\u2013232","journal-title":"Int J Adv Comput Res"},{"issue":"8","key":"9986_CR18","first-page":"44","volume":"14","author":"RDY Li","year":"2014","unstructured":"Li RDY (2014) Application of compound chaotic mapping in voice encryption algorithm. International Journal of Computer Science and Network Security (IJCSNS) 14(8):44","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"9986_CR19","doi-asserted-by":"crossref","unstructured":"Li P, Zhang R, Li H (2019) A research on transmission performance of MIMO-OFDM Wireless Channel. In: Signal Processing, and Systems Springer, International Conference in Communications, pp 308\u2013316","DOI":"10.1007\/978-981-13-6264-4_37"},{"issue":"14","key":"9986_CR20","doi-asserted-by":"publisher","first-page":"8403","DOI":"10.1007\/s11042-015-2755-6","volume":"75","author":"JB Lima","year":"2016","unstructured":"Lima JB, Da Silva Neto EF (2016) Audio encryption based on the cosine number transform. Multimed Tools Appl 75(14):8403\u20138418","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"9986_CR21","doi-asserted-by":"publisher","first-page":"7431","DOI":"10.1016\/j.ijleo.2016.05.073","volume":"127","author":"H Liu","year":"2016","unstructured":"Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one time keys. Optik 127(19):7431\u20137438","journal-title":"Optik"},{"key":"9986_CR22","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1049\/iet-spr.2016.0708","volume":"12","author":"K Maher","year":"2018","unstructured":"Maher K, Al-Azawi M, Gaze AM (2018) Combined speech compression and encryption using chaotic compressive sensing with large key size. IET Signal Process 12:214\u2013218","journal-title":"IET Signal Process"},{"issue":"7","key":"9986_CR23","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1109\/TSA.2002.804303","volume":"10","author":"M Padmanabhan","year":"2002","unstructured":"Padmanabhan M, Saon G, Huang J, Kingsbury B, Mangu L (2002) Automatic speech recognition performance on a voicemail transcription task. IEEE Trans Speech Audio Process 10(7):433\u2013442","journal-title":"IEEE Trans Speech Audio Process"},{"key":"9986_CR24","unstructured":"Ramesh S, Milind N (2018) Audio encryption algorithm using modified elliptical curve cryptography and Arnold transform for audio watermarking. In: I2CT - IEEE Xplore, Pune, pp 1\u20134"},{"key":"9986_CR25","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1109\/TIFS.2016.2639340","volume":"12","author":"K Rohloff","year":"2017","unstructured":"Rohloff K, Cousins DB, Sumorok D (2017) Scalable, practical VoIP teleconferencing with end-to-end Homomorphic encryption. IEEE Trans Inf Forensic Secur 12:1031\u20131041","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"9986_CR26","doi-asserted-by":"publisher","unstructured":"Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. Eurasip J Audio Speech Music Process 20(2017). https:\/\/doi.org\/10.1186\/s13636-017-0118-0","DOI":"10.1186\/s13636-017-0118-0"},{"issue":"1","key":"9986_CR27","first-page":"1981","volume":"3","author":"K Sinha","year":"2017","unstructured":"Sinha K, Darshani MP, Kumari S (2017) Enhanced, efficient end-to-end voice encryption using A5\/3RC6 over GSM network. Imperial Journal of Interdisciplinary Research (IJIR) 3(1):1981\u20131984","journal-title":"Imperial Journal of Interdisciplinary Research (IJIR)"},{"key":"9986_CR28","unstructured":"Tamimi AA, Abdalla AM (2014) An audio shuffleencryption algorithm. In: The world congress on engineering and computer science. WCECS, San Francisco"},{"key":"9986_CR29","unstructured":"Wickramanayake DK, Brayant M (2011) Utilizing an Opensource VolP solution to replace traditional PBX systems at UTech. Paper presented at the IEEE Computer. Society-Jamaica Section Technical Session, Kingston, Jamaica"},{"key":"9986_CR30","doi-asserted-by":"publisher","first-page":"9260","DOI":"10.1109\/ACCESS.2019.2963329","volume":"8","author":"A Xingyuan Wang","year":"2019","unstructured":"Xingyuan Wang A, Yining Su B (2019) An audio encryption algorithm based on DNA coding and chaotic system. IEEE Access 8:9260\u20139270","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09986-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-09986-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09986-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T23:58:03Z","timestamp":1616716683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-09986-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,15]]},"references-count":30,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["9986"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09986-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,15]]},"assertion":[{"value":"30 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}