{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T10:24:40Z","timestamp":1774866280125,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T00:00:00Z","timestamp":1609632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T00:00:00Z","timestamp":1609632000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"NA","award":["NA"],"award-info":[{"award-number":["NA"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10223-x","type":"journal-article","created":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T06:02:38Z","timestamp":1609653758000},"page":"10927-10947","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Chaos-based joint speech encryption scheme using SHA-1"],"prefix":"10.1007","volume":"80","author":[{"given":"Gurvir","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Kuldeepak","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9605-0237","authenticated-orcid":false,"given":"Harsimranjit Singh","family":"Gill","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,3]]},"reference":[{"key":"10223_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad M, Khurna S, Singh S, AlSharari HD (2017) A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps. 3D research, Springer 8: 1\u201315","DOI":"10.1007\/s13319-017-0123-1"},{"key":"10223_CR2","doi-asserted-by":"crossref","unstructured":"Albahrani DEA (2017) A New Audio Encryption Algorithm Based on Chaotic Block Cipher. Annual Conference on New Trends in Information & Communications Technology Applications, pp. 7\u20139","DOI":"10.1109\/NTICT.2017.7976129"},{"key":"10223_CR3","first-page":"2455","volume":"3","author":"Aradhana","year":"2017","unstructured":"Aradhana, Ghosh DSM (2017) Review paper on secure hash algorithm with its variants. Int J Tech Innov Mod Eng Sci 3:2455\u20132584","journal-title":"Int J Tech Innov Mod Eng Sci"},{"key":"10223_CR4","first-page":"24","volume":"144","author":"HME Bakry","year":"2016","unstructured":"Bakry HME, Deen AETE, Tengy AHE (2016) Implementation of an encryption scheme for voice calls. Int J Comput Appl 144:24\u201327","journal-title":"Int J Comput Appl"},{"key":"10223_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4:3\u201372","journal-title":"J Cryptol"},{"key":"10223_CR6","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Khovratovich D, Rechberger C (2011) Biclique Cryptanalysis of the Full AES. International conference on the theory and application of cryptology and information security, pp. 344-371","DOI":"10.1007\/978-3-642-25385-0_19"},{"key":"10223_CR7","unstructured":"Chen CH, Lin CL (2010) Text Encryption using ECG Signals with Chaotic Logistic map. 5th IEEE conference on industrial electronics and applications, pp. 1741-1746"},{"issue":"2","key":"10223_CR8","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Danny","year":"1983","unstructured":"Danny D, Andrew CY (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"10223_CR9","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-71039-4_7","volume":"5086","author":"H Demirci","year":"2008","unstructured":"Demirci H, Selcuk AA (2008) A meet-in-the middle attack on 8- round AES. Int Work Fast Softw Encryption 5086:116\u2013126","journal-title":"Int Work Fast Softw Encryption"},{"key":"10223_CR10","unstructured":"Farsana FJ, Gopakumar KD (2016) A Novel Approach for Speech Encryption: Zaslavsky Map as Pseudo Random Number Generator. 6th International conference on advances in Computing & Communications, pp. 816-823"},{"key":"10223_CR11","unstructured":"Farsana FJ, Gopakumar KD (2017) Private Key Encryption of Speech Signal Based on three-dimensional Chaotic Map. International conference on communication and signal processing, pp. 2197-2201"},{"key":"10223_CR12","volume-title":"Secure hash standard, federal information processing standard (FIPS)","author":"FIPS 180-1","year":"1995","unstructured":"FIPS 180-1 (1995) Secure hash standard, federal information processing standard (FIPS). National Institute of Standard and Technology, Washington DC"},{"key":"10223_CR13","first-page":"1","volume":"2","author":"FIPS PUB 180\u20132 (with change Notice 1)","year":"2008","unstructured":"FIPS PUB 180\u20132 (with change Notice 1) (2008) Secure hash standard. Natl Inst Stand Technol 2:1\u201384","journal-title":"Natl Inst Stand Technol"},{"key":"10223_CR14","first-page":"671","volume":"4","author":"RA Gandhi","year":"2016","unstructured":"Gandhi RA, Gosai DAM (2016) Audio encryption with AES and blowfish. Int J Res Appl Sci Eng Technol 4:671\u2013679","journal-title":"Int J Res Appl Sci Eng Technol"},{"key":"10223_CR15","first-page":"434","volume":"59","author":"SM Hameed","year":"2018","unstructured":"Hameed SM, Sa\u2019adoon AH, Ani MA (2018) Image encryption using DNA encoding and RC4 algorithm. Iraqi J Sci 59:434\u2013446","journal-title":"Iraqi J Sci"},{"key":"10223_CR16","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/j.cpc.2012.11.017","volume":"184","author":"H Hu","year":"2012","unstructured":"Hu H, Liu L, Ding N (2012) Pseudorandom sequence generator based on the Chen chaotic system. Comput Phys Commun 184:765\u2013768","journal-title":"Comput Phys Commun"},{"key":"10223_CR17","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew-tent map and hyper chaotic system of 6th order CNN. Optik 125:1671\u20131675","journal-title":"Optik"},{"key":"10223_CR18","unstructured":"Kelsey J, Schneier B, Wagner D (2001) Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple DES. Annual international cryptology conference, pp. 237-251"},{"key":"10223_CR19","unstructured":"Kocarev L (2013) Chaos-based Cryptography: A brief Overview. IEEE circuits and magazines, pp. 5-21"},{"key":"10223_CR20","unstructured":"Lawande Q, Ivan B, Dhodapkar S (2005) Chaos based cryptography: a new approach to secure communications. BARC newsletter, pp. 1-12"},{"key":"10223_CR21","unstructured":"Lin CF, Liu CW (2017) Implementation of multimaps Chaos-based encryption software for EEG signals. Adv Secur Comput Commun 168-179"},{"key":"10223_CR22","doi-asserted-by":"crossref","unstructured":"Liu J, Gao F, Ma H (2008) A speech chaotic encryption algorithm based on network. International conference on intelligent information hiding and multimedia signal processing, pp. 283-286","DOI":"10.1109\/IIH-MSP.2008.91"},{"key":"10223_CR23","first-page":"442","volume":"8","author":"F Maqsood","year":"2017","unstructured":"Maqsood F, Ali MM, Ahmed M, Shah MA (2017) Cryptography: a comparative analysis for modern techniques. Int J Adv Comput Sci Appl 8:442\u2013448","journal-title":"Int J Adv Comput Sci Appl"},{"key":"10223_CR24","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes AJ, Oorschot PCV, Vanstone SA (1997) Handbook of applied cryptography. CRC Press, Boca Raton"},{"key":"10223_CR25","unstructured":"Mihir B, Rogaway P, (1993) Entity authentication and key distribution. Proceedings of Advances in Cryptology. Springer: Berlin, pp. 232\u2013249"},{"key":"10223_CR26","unstructured":"Mohammed RS, Sadkhan SB (2016) Speech scrambler based on Proposed Random Chaotic Maps. Al-Sadeq International conference on multidisciplinary in IT and communication science and applications, pp. 1-6"},{"key":"10223_CR27","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10772-011-9103-7","volume":"14","author":"E Mosa","year":"2011","unstructured":"Mosa E, Messiha N, Zahran O (2011) Chaotic Encryption of Speech Signals. Int J Speech Technol 14:285\u2013296","journal-title":"Int J Speech Technol"},{"key":"10223_CR28","first-page":"44","volume":"3","author":"A Mousa","year":"2014","unstructured":"Mousa A, Hamad A (2014) Evaluation of the RC4 algorithm for data encryption. Int J Comput Sci Appl 3:44\u201356","journal-title":"Int J Comput Sci Appl"},{"key":"10223_CR29","unstructured":"Mousa A, Rabaie M, Nigm EM, Faragallah OS (2013) Images Cryptography based on chaotic Maps for Databases Security. IEEE, pp. 154-158"},{"key":"10223_CR30","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"125","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 125:926\u2013934","journal-title":"Image Vis Comput"},{"key":"10223_CR31","unstructured":"Raheema AM, Sadkhan SB, Sattar SMA (2016) Design and implementation of speech encryption based on hybrid chaotic maps. Int Conf Eng Technol Appl 112-117"},{"key":"10223_CR32","unstructured":"Rahmawati WM, Liantoni F (2019) Image Compression and Encryption using DCT and Gaussian Map. The 1st International conference on advanced engineering and technology, pp. 1-6"},{"key":"10223_CR33","first-page":"1","volume":"6","author":"N Ramadan","year":"2016","unstructured":"Ramadan N, Ahmed HEH, El-Khamy SE, El-Samie FEA (2016) Chaos-based image encryption using an improved quadratic chaotic map. Am J Signal Process 6:1\u201313","journal-title":"Am J Signal Process"},{"key":"10223_CR34","doi-asserted-by":"publisher","first-page":"582","DOI":"10.14429\/dsj.66.10798","volume":"66","author":"HK Sahu","year":"2016","unstructured":"Sahu HK, Jadhav V, Sonavane S, Sharma RK (2016) Cryptanalytic attacks on international data encryption algorithm block cipher. Def Sci J 66:582\u2013589","journal-title":"Def Sci J"},{"issue":"2","key":"10223_CR35","first-page":"1","volume":"3","author":"GA Sathishkumar","year":"2011","unstructured":"Sathishkumar GA, Bagar DKB, Sriraam DN (2011) Image encryption based on diffusion and multiple chaotic maps. Int J Netw Secur Appl 3(2):1\u201317","journal-title":"Int J Netw Secur Appl"},{"key":"10223_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13636-017-0118-0","volume":"2017","author":"P Sathiyamurthi","year":"2017","unstructured":"Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio Speech Music Process 2017:1\u201311","journal-title":"EURASIP J Audio Speech Music Process"},{"key":"10223_CR37","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-642-17881-8_28","volume":"133","author":"GA Satishkumar","year":"2011","unstructured":"Satishkumar GA, Bhoopathybagan K, Sriraam N, Venkatachalam SP, Vignesh R (2011) A novel image encryption algorithm using two chaotic maps for medical application. Adv Comput 133:290\u2013299","journal-title":"Adv Comput"},{"key":"10223_CR38","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/3-540-58108-1_24","volume":"809","author":"B Schneier","year":"2005","unstructured":"Schneier B (2005) Description of a new variable-length key, 64-bit block cipher (Blowfish). Int Work Fast Softw Encryption 809:191\u2013204","journal-title":"Int Work Fast Softw Encryption"},{"key":"10223_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/2721910","volume":"2017","author":"SJ Sheela","year":"2017","unstructured":"Sheela SJ, Suresh KV, Tandur D (2017) A novel audio cryptosystem using chaotic maps and DNA encoding. J Comput Netw Commun 2017:1\u201312","journal-title":"J Comput Netw Commun"},{"key":"10223_CR40","first-page":"79","volume":"128","author":"D Slimani","year":"2018","unstructured":"Slimani D, Merazka F (2018) Encryption of speech signal with multiple secret keys. Int Conf Nat Lang Speech Process 128:79\u201388","journal-title":"Int Conf Nat Lang Speech Process"},{"key":"10223_CR41","doi-asserted-by":"crossref","unstructured":"Telem ANK, Segning CM, Kenne G, Fotsin HB (2014) A simple and robust Grey image encryption scheme using chaotic logistic map and artificial neural network. Adv Multimed 1\u201313","DOI":"10.1155\/2014\/602921"},{"key":"10223_CR42","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s11390-013-1317-5","volume":"28","author":"GL Wang","year":"2013","unstructured":"Wang GL (2013) Collision attack on the full extended MD4 and Pseudo-Preimage attack on RIPEMD. J Comput Sci Technol 28:129\u2013143","journal-title":"J Comput Sci Technol"},{"issue":"4","key":"10223_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218127413300115","volume":"23","author":"X Wang","year":"2013","unstructured":"Wang X, Chen G (2013) A gallery of Lorenz-like and Chen-like attractors. Int J Bifurcation Chaos 23(4):1\u201320","journal-title":"Int J Bifurcation Chaos"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10223-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10223-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10223-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T00:17:55Z","timestamp":1616717875000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10223-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,3]]},"references-count":43,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10223"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10223-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,3]]},"assertion":[{"value":"25 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}