{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T06:35:36Z","timestamp":1768718136594,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,1,17]],"date-time":"2021-01-17T00:00:00Z","timestamp":1610841600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,17]],"date-time":"2021-01-17T00:00:00Z","timestamp":1610841600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10334-5","type":"journal-article","created":{"date-parts":[[2021,1,17]],"date-time":"2021-01-17T06:02:20Z","timestamp":1610863340000},"page":"13663-13676","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Speech compression and encryption based on discrete wavelet transform and chaotic signals"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8110-5215","authenticated-orcid":false,"given":"Abbas Salman","family":"Hameed","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,17]]},"reference":[{"key":"10334_CR1","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1049\/iet-spr.2016.0708","volume":"12","author":"MKM Al-Azawi","year":"2018","unstructured":"Al-Azawi MKM, Gaze AM (2018) Combined speech compression and encryption using chaotic compressive sensing with large key size. IET Signal Processing 12:214\u2013218. https:\/\/doi.org\/10.1049\/iet-spr.2016.0708","journal-title":"IET Signal Processing"},{"key":"10334_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/MSP.2017.2761895","volume":"35","author":"M Cernak","year":"2018","unstructured":"Cernak M, Asaei A, Hyafil A (2018) Cognitive speech coding. IEEE Signal Process Mag 35:97\u2013109. https:\/\/doi.org\/10.1109\/MSP.2017.2761895","journal-title":"IEEE Signal Process Mag"},{"key":"10334_CR3","doi-asserted-by":"publisher","unstructured":"Chelali FZ, Cherabit N, Djeradi A, Falek L (2018) Wavelet transform for speech compression and denoising. International Conference on Multimedia Computing and Systems -Proceedings 2018-May:1\u20137. https:\/\/doi.org\/10.1109\/ICMCS.2018.8525996","DOI":"10.1109\/ICMCS.2018.8525996"},{"key":"10334_CR4","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/TASL.2006.881705","volume":"15","author":"S Dusan","year":"2007","unstructured":"Dusan S, Flanagan JL, Karve A, Balaraman M (2007) Speech compression by polynomial approximation. IEEE Trans Audio Speech Lang Process 15:387\u2013395. https:\/\/doi.org\/10.1109\/TASL.2006.881705","journal-title":"IEEE Trans Audio Speech Lang Process"},{"key":"10334_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/99.388960","volume":"2","author":"A Graps","year":"1995","unstructured":"Graps A (1995) An introduction to wavelets. IEEE Comput Sci Eng 2:50\u201361. https:\/\/doi.org\/10.1109\/99.388960","journal-title":"IEEE Comput Sci Eng"},{"key":"10334_CR6","doi-asserted-by":"publisher","unstructured":"Gunawan TS, Khalifa OO, Shafie AA, Ambikairajah E (2011) Speech compression using compressive sensing on a multicore system. 2011 4th international conference on mechatronics: integrated engineering for industrial and societal development, ICOM\u201911 - conference proceedings 17\u201319. https:\/\/doi.org\/10.1109\/ICOM.2011.5937130","DOI":"10.1109\/ICOM.2011.5937130"},{"key":"10334_CR7","doi-asserted-by":"publisher","first-page":"81","DOI":"10.24237\/djes.2017.10108","volume":"10","author":"AS Hameed","year":"2017","unstructured":"Hameed AS (2017) Image encryption based on fractional order lorenz system and wavelet transform. Diyala journal of engineering sciences 10:81\u201391. https:\/\/doi.org\/10.24237\/djes.2017.10108","journal-title":"Diyala journal of engineering sciences"},{"key":"10334_CR8","unstructured":"ITU-T (2001) Perceptual evaluation of speech quality (PESQ). ITU-T Recommendation P862 862:749\u2013752"},{"key":"10334_CR9","doi-asserted-by":"publisher","unstructured":"Jawad AK, Abdullah HN, Hreshee SS (2018) Secure speech communication system based on scrambling and masking by chaotic maps. International conference on advances in sustainable engineering and applications, ICASEA 2018 - proceedings 7\u201312. https:\/\/doi.org\/10.1109\/ICASEA.2018.8370947","DOI":"10.1109\/ICASEA.2018.8370947"},{"key":"10334_CR10","doi-asserted-by":"publisher","unstructured":"Joseph SM, Anto PB (2011) Speech compression using wavelet transform. International Conference on Recent Trends in Information Technology, ICRTIT 2011 754\u2013758. https:\/\/doi.org\/10.1109\/ICRTIT.2011.5972258","DOI":"10.1109\/ICRTIT.2011.5972258"},{"key":"10334_CR11","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/s10772-014-9240-x","volume":"19","author":"SM Joseph","year":"2016","unstructured":"Joseph SM, Babu AP (2016) Wavelet energy based voice activity detection and adaptive thresholding for efficient speech coding. International Journal of Speech Technology 19:537\u2013550. https:\/\/doi.org\/10.1007\/s10772-014-9240-x","journal-title":"International Journal of Speech Technology"},{"key":"10334_CR12","doi-asserted-by":"publisher","first-page":"18395","DOI":"10.1007\/s11042-019-7214-3","volume":"78","author":"H Karajeh","year":"2019","unstructured":"Karajeh H, Khatib T, Rajab L, Maqableh M (2019) A robust digital audio watermarking scheme based on DWT and Schur decomposition. Multimed Tools Appl 78:18395\u201318418. https:\/\/doi.org\/10.1007\/s11042-019-7214-3","journal-title":"Multimed Tools Appl"},{"key":"10334_CR13","doi-asserted-by":"publisher","unstructured":"Katzberg F, Member S, Mazur R, et al (2018) A compressed sensing framework for dynamic sound-field measurements. IEEE\/ACM Transactions on audio, speech, and Language processing PP:1. https:\/\/doi.org\/10.1109\/TASLP.2018.2851144","DOI":"10.1109\/TASLP.2018.2851144"},{"key":"10334_CR14","doi-asserted-by":"publisher","unstructured":"Kornsing S, Srinonchat J (2012) Enhancement speech compression technique using modern wavelet transforms. Proceedings - 2012 international symposium on computer, consumer and control, IS3C 2012 393\u2013396. https:\/\/doi.org\/10.1109\/IS3C.2012.106","DOI":"10.1109\/IS3C.2012.106"},{"key":"10334_CR15","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.image.2018.09.004","volume":"70","author":"Y Lee","year":"2019","unstructured":"Lee Y, Seo Y, Kim D (2019) Digital blind watermarking based on depth variation prediction map and DWT for DIBR free-viewpoint image. Signal Process Image Commun 70:104\u2013113. https:\/\/doi.org\/10.1016\/j.image.2018.09.004","journal-title":"Signal Process Image Commun"},{"key":"10334_CR16","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1049\/iet-ipr.2014.0965","volume":"10","author":"NM Makbol","year":"2016","unstructured":"Makbol NM, Khoo BE, Rassem TH (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process 10:34\u201352. https:\/\/doi.org\/10.1049\/iet-ipr.2014.0965","journal-title":"IET Image Process"},{"key":"10334_CR17","doi-asserted-by":"crossref","unstructured":"Mehra M (2018) Wavelets theory and its applications. Springer Nature Singapore","DOI":"10.1007\/978-981-13-2595-3"},{"key":"10334_CR18","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.aeue.2019.05.028","volume":"107","author":"MO Meranza-Castill\u00f3n","year":"2019","unstructured":"Meranza-Castill\u00f3n MO, Murillo-Escobar MA, L\u00f3pez-Guti\u00e9rrez RM, Cruz-Hern\u00e1ndez C (2019) Pseudorandom number generator based on enhanced H\u00e9non map and its implementation. AEU - International Journal of Electronics and Communications 107:239\u2013251. https:\/\/doi.org\/10.1016\/j.aeue.2019.05.028","journal-title":"AEU - International Journal of Electronics and Communications"},{"key":"10334_CR19","doi-asserted-by":"publisher","unstructured":"Narkhedkar SG, Patel PK (2014) Recipe of speech compression using coiflet wavelet. Proceedings of 2014 international conference on contemporary computing and informatics, IC3I 2014 1135\u20131139. https:\/\/doi.org\/10.1109\/IC3I.2014.7019767","DOI":"10.1109\/IC3I.2014.7019767"},{"key":"10334_CR20","doi-asserted-by":"publisher","unstructured":"Ramdas V, Mishra D, Gorthi SS (2015) Speech coding and enhancement using quantized compressive sensing measurements. 2015 IEEE international conference on signal processing, Informatics, Communication and Energy Systems, SPICES 2015 2\u20136. https:\/\/doi.org\/10.1109\/SPICES.2015.7091436","DOI":"10.1109\/SPICES.2015.7091436"},{"key":"10334_CR21","doi-asserted-by":"publisher","first-page":"4875","DOI":"10.1109\/ACCESS.2018.2793851","volume":"6","author":"M Rani","year":"2018","unstructured":"Rani M, Dhok SB, Deshmukh RB (2018) A systematic review of compressive sensing: concepts, implementations and applications. IEEE Access 6:4875\u20134894. https:\/\/doi.org\/10.1109\/ACCESS.2018.2793851","journal-title":"IEEE Access"},{"key":"10334_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e01820","volume":"5","author":"MSA Sankar","year":"2019","unstructured":"Sankar MSA, Sathidevi PS (2019) A scalable speech coding scheme using compressive sensing and orthogonal mapping based vector quantization. Heliyon 5:e01820. https:\/\/doi.org\/10.1016\/j.heliyon.2019.e01820","journal-title":"Heliyon"},{"key":"10334_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/2721910","volume":"2017","author":"SJ Sheela","year":"2017","unstructured":"Sheela SJ, Suresh KV, Tandur D (2017) A novel audio cryptosystem using chaotic maps and DNA encoding. Journal of Computer Networks and Communications 2017:1\u201313. https:\/\/doi.org\/10.1155\/2017\/2721910","journal-title":"Journal of Computer Networks and Communications"},{"key":"10334_CR24","doi-asserted-by":"publisher","unstructured":"Stankovi L (2018) Analysis of the reconstruction of sparse signals in the DCT domain applied to audio signals. IEEE\/ACM TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING 9290:1\u201318. https:\/\/doi.org\/10.1109\/TASLP.2018.2819819","DOI":"10.1109\/TASLP.2018.2819819"},{"key":"10334_CR25","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1109\/LSP.2012.2224518","volume":"19","author":"T Strohmer","year":"2012","unstructured":"Strohmer T (2012) Measure what should be measured: Progress and challenges in compressive sensing. IEEE Signal Processing Letters 19:887\u2013893. https:\/\/doi.org\/10.1109\/LSP.2012.2224518","journal-title":"IEEE Signal Processing Letters"},{"key":"10334_CR26","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.optlaseng.2016.07.012","volume":"88","author":"Y Su","year":"2017","unstructured":"Su Y, Tang C, Chen X, Li B, Xu W, Lei Z (2017) Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map. Opt Lasers Eng 88:20\u201327. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.07.012","journal-title":"Opt Lasers Eng"},{"key":"10334_CR27","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1016\/j.procs.2018.05.070","volume":"132","author":"R Vig","year":"2018","unstructured":"Vig R, Chauhan SS (2018) Speech compression using multi-resolution hybrid wavelet using DCT and Walsh transforms. Procedia Computer Science 132:1404\u20131411. https:\/\/doi.org\/10.1016\/j.procs.2018.05.070","journal-title":"Procedia Computer Science"},{"key":"10334_CR28","doi-asserted-by":"publisher","first-page":"7911","DOI":"10.1007\/s11042-019-08279-5","volume":"79","author":"S Waldekar","year":"2020","unstructured":"Waldekar S, Saha G (2020) Analysis and classification of acoustic scenes with wavelet transform-based mel-scaled features. Multimed Tools Appl 79:7911\u20137926. https:\/\/doi.org\/10.1007\/s11042-019-08279-5","journal-title":"Multimed Tools Appl"},{"key":"10334_CR29","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/TASLP.2017.2779787","volume":"26","author":"SS Wang","year":"2018","unstructured":"Wang SS, Lin P, Tsao Y, Hung JW, Su B (2018) Suppression by selecting wavelets for feature compression in distributed speech recognition. IEEE\/ACM Transactions on Audio Speech and Language Processing 26:564\u2013579. https:\/\/doi.org\/10.1109\/TASLP.2017.2779787","journal-title":"IEEE\/ACM Transactions on Audio Speech and Language Processing"},{"key":"10334_CR30","doi-asserted-by":"publisher","first-page":"21653","DOI":"10.1007\/s11042-018-5613-5","volume":"77","author":"ZQ Yu","year":"2018","unstructured":"Yu ZQ, Bin QS, Bo HY, Zhang T (2018) A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multimed Tools Appl 77:21653\u201321669. https:\/\/doi.org\/10.1007\/s11042-018-5613-5","journal-title":"Multimed Tools Appl"},{"key":"10334_CR31","doi-asserted-by":"publisher","unstructured":"Zhao D, Ma SQ (2010) Speech compression with best wavelet packet transform and SPIHT algorithm. ICCMS 2010\u20132010 International Conference on Computer Modeling and Simulation 1:360\u2013363. https:\/\/doi.org\/10.1109\/ICCMS.2010.68","DOI":"10.1109\/ICCMS.2010.68"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10334-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10334-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10334-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T08:53:12Z","timestamp":1619340792000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10334-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,17]]},"references-count":31,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10334"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10334-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,17]]},"assertion":[{"value":"6 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}