{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T21:51:13Z","timestamp":1774648273438,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T00:00:00Z","timestamp":1654905600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T00:00:00Z","timestamp":1654905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11042-022-13317-w","type":"journal-article","created":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T01:02:32Z","timestamp":1654909352000},"page":"1067-1085","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Voice encryption using a unified hyper-chaotic system"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1111-0304","authenticated-orcid":false,"given":"Talal","family":"Bonny","sequence":"first","affiliation":[]},{"given":"Wafaa Al","family":"Nassan","sequence":"additional","affiliation":[]},{"given":"Abdullatif","family":"Baba","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,11]]},"reference":[{"issue":"27","key":"13317_CR1","doi-asserted-by":"publisher","first-page":"19615","DOI":"10.1007\/s11042-020-08869-8","volume":"79","author":"ZN Al-kateeb","year":"2020","unstructured":"Al-kateeb Z N, Mohammed S J (2020) A novel approach for audio file encryption using hand geometry. Multimed Tools Applic 79(27):19615\u201319628","journal-title":"Multimed Tools Applic"},{"key":"13317_CR2","doi-asserted-by":"crossref","unstructured":"Al Nassan W, Bonny T, Baba A (2020) A new chaos-based cryptoystem for voice encryption. In: 2020 3rd International conference on signal processing and information security (ICSPIS). IEEE, pp 1\u20134","DOI":"10.1109\/ICSPIS51252.2020.9340132"},{"key":"13317_CR3","doi-asserted-by":"crossref","unstructured":"AlMutairi F, Bonny T (2019) New image encryption algorithm based on switching-type chaotic oscillator. In: 2019 International conference on electrical and computing technologies and applications (ICECTA). IEEE, pp 1\u20135","DOI":"10.1109\/ICECTA48151.2019.8959567"},{"key":"13317_CR4","doi-asserted-by":"crossref","unstructured":"AlMutairi F, Bonny T (2020) Image encryption based on Chua chaotic oscillator. In: 2020 3rd International conference on signal processing and information security (ICSPIS). IEEE, pp 1\u20134","DOI":"10.1109\/ICSPIS51252.2020.9340157"},{"key":"13317_CR5","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.ins.2022.02.020","volume":"594","author":"K Babanli","year":"2022","unstructured":"Babanli K, Kabao\u011flu R O (2022) Fuzzy modeling of desired chaotic behavior in secure communication systems. Inf Sci 594:217\u2013232","journal-title":"Inf Sci"},{"key":"13317_CR6","unstructured":"Bashier EBM (2013) Speech scrambling based on chaotic maps and one-time pad, computing, electrical and electronics engineering (icceee). In: International Conference on, pp 128\u2013133"},{"key":"13317_CR7","doi-asserted-by":"crossref","unstructured":"Bonny T (2020) Chaotic or hyper-chaotic oscillator? numerical solution, circuit design, matlab hdl-coder implementation, vhdl code, security analysis, and fpga realization. Circuits, Systems, and Signal Processing, 1\u201328","DOI":"10.1007\/s00034-020-01521-8"},{"issue":"3","key":"13317_CR8","doi-asserted-by":"publisher","first-page":"1342","DOI":"10.1007\/s00034-018-0905-6","volume":"38","author":"T Bonny","year":"2019","unstructured":"Bonny T, Al Debsi R, Majzoub S, Elwakil A S (2019) Hardware optimized fpga implementations of high-speed true random bit generators based on switching-type chaotic oscillators. Circ Syst Signal Process 38(3):1342\u20131359","journal-title":"Circ Syst Signal Process"},{"issue":"2","key":"13317_CR9","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1007\/s11071-018-4229-7","volume":"93","author":"T Bonny","year":"2018","unstructured":"Bonny T, Elwakil A S (2018) Fpga realizations of high-speed switching-type chaotic oscillators using compact vhdl codes. Nonlin Dyn 93(2):819\u2013833","journal-title":"Nonlin Dyn"},{"issue":"3","key":"13317_CR10","doi-asserted-by":"publisher","first-page":"2087","DOI":"10.1007\/s11071-019-04907-9","volume":"96","author":"T Bonny","year":"2019","unstructured":"Bonny T, Nasir Q (2019) Clock glitch fault injection attack on an fpga-based non-autonomous chaotic oscillator. Nonlin Dyn 96(3):2087\u20132101","journal-title":"Nonlin Dyn"},{"issue":"07","key":"13317_CR11","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.1142\/S0218127404010655","volume":"14","author":"G Chen","year":"2004","unstructured":"Chen G, Zhou J, Liu Z (2004) Global synchronization of coupled delayed neural networks and applications to chaotic cnn models. Int J Bifur Chaos 14(07):2229\u20132240","journal-title":"Int J Bifur Chaos"},{"issue":"1","key":"13317_CR12","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1103\/PhysRevLett.71.65","volume":"71","author":"KM Cuomo","year":"1993","unstructured":"Cuomo K M, Oppenheim A V (1993) Circuit implementation of synchronized chaos with applications to communications. Phys Rev Lett 71(1):65","journal-title":"Phys Rev Lett"},{"issue":"10","key":"13317_CR13","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1109\/82.246163","volume":"40","author":"KM Cuomo","year":"1993","unstructured":"Cuomo K M, Oppenheim A V, Strogatz S H (1993) Synchronization of lorenz-based chaotic circuits with applications to communications. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing 40 (10):626\u2013633","journal-title":"IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing"},{"issue":"5","key":"13317_CR14","doi-asserted-by":"publisher","first-page":"963","DOI":"10.1088\/1009-1963\/15\/5\/016","volume":"15","author":"W Fa-Qiang","year":"2006","unstructured":"Fa-Qiang W, Chong-Xin L (2006) Hyperchaos evolved from the Liu chaotic system. Chin Phys 15(5):963","journal-title":"Chin Phys"},{"key":"13317_CR15","doi-asserted-by":"crossref","unstructured":"Farsana FJ, Devi VR, Gopakumar K (2020) An audio encryption scheme based on fast walsh hadamard transform and mixed chaotic keystreams. Applied Computing and Informatics","DOI":"10.1016\/j.aci.2019.10.001"},{"key":"13317_CR16","doi-asserted-by":"crossref","unstructured":"Farsana FJ, Gopakumar K (2020) Speech encryption algorithm based on nonorthogonal quantum state with hyperchaotic keystreams. Advances in Mathematical Physics, 2020","DOI":"10.1155\/2020\/8050934"},{"issue":"1","key":"13317_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.21608\/ejle.2017.59392","volume":"4","author":"M Fawzy","year":"2017","unstructured":"Fawzy M, Shalaby M, Kamal Y, Elramly S H (2017) A speech cryptosystem based on chaotic modulation technique. Egypt J Lang Eng 4(1):1\u201310","journal-title":"Egypt J Lang Eng"},{"issue":"1\u20132","key":"13317_CR18","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.physleta.2006.09.042","volume":"361","author":"T Gao","year":"2007","unstructured":"Gao T, Chen G, Chen Z, Cang S (2007) The generation and circuit implementation of a new hyper-chaos based upon lorenz system. Phys Lett A 361(1\u20132):78\u201386","journal-title":"Phys Lett A"},{"key":"13317_CR19","doi-asserted-by":"crossref","unstructured":"Goel N, Raman B, Gupta I (2014) Chaos based joint compression and encryption framework for end-to-end communication systems. Advances in Multimedia, 2014","DOI":"10.1155\/2014\/910106"},{"issue":"5","key":"13317_CR20","doi-asserted-by":"publisher","first-page":"530","DOI":"10.3390\/electronics8050530","volume":"8","author":"K Kordov","year":"2019","unstructured":"Kordov K (2019) A novel audio encryption algorithm with permutation-substitution architecture. Electronics 8(5):530","journal-title":"Electronics"},{"issue":"9","key":"13317_CR21","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1631\/FITEE.1601253","volume":"18","author":"C-h Li","year":"2017","unstructured":"Li C-h, Song Y, Wang F-y, Wang Z-q, Li Y-b (2017) A chaotic coverage path planner for the mobile robot based on the Chebyshev map for special missions. Front Inform Technol Electron Eng 18(9):1305\u20131319","journal-title":"Front Inform Technol Electron Eng"},{"key":"13317_CR22","doi-asserted-by":"crossref","unstructured":"Liu X, Tong X, Wang Z, Zhang M (2022) Uniform non-degeneracy discrete chaotic system and its application in image encryption. Nonlinear Dynamics, 1\u201330","DOI":"10.1007\/s11071-021-07198-1"},{"issue":"2","key":"13317_CR23","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","volume":"20","author":"EN Lorenz","year":"1963","unstructured":"Lorenz E N (1963) Deterministic nonperiodic flow. J Atmos Sci 20 (2):130\u2013141","journal-title":"J Atmos Sci"},{"issue":"05","key":"13317_CR24","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1142\/S0218127410026514","volume":"20","author":"B Muthuswamy","year":"2010","unstructured":"Muthuswamy B (2010) Implementing memristor based chaotic circuits. Int J Bifur Chaos 20(05):1335\u20131350","journal-title":"Int J Bifur Chaos"},{"issue":"6","key":"13317_CR25","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/70.976022","volume":"17","author":"Y Nakamura","year":"2001","unstructured":"Nakamura Y, Sekiguchi A (2001) The chaotic mobile robot. IEEE Trans Robot Autom 17(6):898\u2013904","journal-title":"IEEE Trans Robot Autom"},{"key":"13317_CR26","doi-asserted-by":"publisher","first-page":"103826","DOI":"10.1016\/j.robot.2021.103826","volume":"143","author":"E Petavratzis","year":"2021","unstructured":"Petavratzis E, Moysis L, Volos C, Stouboulos I, Nistazakis H, Valavanis K (2021) A chaotic path planning generator enhanced by a memory technique. Robot Auton Syst 143:103826","journal-title":"Robot Auton Syst"},{"issue":"9","key":"13317_CR27","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","volume":"13","author":"M Preishuber","year":"2018","unstructured":"Preishuber M, H\u00fctter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inform Forens Secur 13(9):2137\u20132150","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"13317_CR28","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.aeue.2018.06.043","volume":"94","author":"K Rajagopal","year":"2018","unstructured":"Rajagopal K, Jahanshahi H, Varan M, Bay\u0131r I, Pham V-T, Jafari S, Karthikeyan A (2018) A hyperchaotic memristor oscillator with fuzzy based chaos control and lqr based chaos synchronization. AEU-Int J Electron Commun 94:55\u201368","journal-title":"AEU-Int J Electron Commun"},{"key":"13317_CR29","doi-asserted-by":"crossref","unstructured":"Razmara S, Yahyazadeh M (2022) Design of an analog time-varying audio cryptography system based on sliding mode synchronization of non-identical chaotic systems described with time-delayed fractional-order dynamics. Arab J Sci Eng, 1\u201314","DOI":"10.1007\/s13369-022-06606-x"},{"issue":"1","key":"13317_CR30","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1111\/j.1749-6632.1979.tb29482.x","volume":"316","author":"OE R\u00f6ssler","year":"1979","unstructured":"R\u00f6ssler O E (1979) Continuous chaos\u2014four prototype equations. Ann N Y Acad Sci 316(1):376\u2013392","journal-title":"Ann N Y Acad Sci"},{"issue":"1","key":"13317_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13636-017-0118-0","volume":"2017","author":"P Sathiyamurthi","year":"2017","unstructured":"Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio Speech Music Process 2017(1):1\u201311","journal-title":"EURASIP J Audio Speech Music Process"},{"issue":"25","key":"13317_CR32","doi-asserted-by":"publisher","first-page":"17817","DOI":"10.1007\/s11042-020-08729-5","volume":"79","author":"P Sathiyamurthi","year":"2020","unstructured":"Sathiyamurthi P, Ramakrishnan S (2020) Speech encryption algorithm using fft and 3d-lorenz\u2013logistic chaotic map. Multimed Tools Applic 79(25):17817\u201317835","journal-title":"Multimed Tools Applic"},{"key":"13317_CR33","doi-asserted-by":"crossref","unstructured":"Shah D, Shah T, Jamal S S (2019) Digital audio signals encryption by mobius transformation and h\u00e9non map. Multimedia Systems, 1\u201311","DOI":"10.1007\/s00530-019-00640-w"},{"key":"13317_CR34","doi-asserted-by":"crossref","unstructured":"Sheela SJ, Suresh KV, Tandur D (2017) Chaos based speech encryption using modified henon map. In: 2017 Second international conference on electrical, computer and communication technologies (ICECCT). IEEE, pp 1\u20137","DOI":"10.1109\/ICECCT.2017.8117918"},{"issue":"2","key":"13317_CR35","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s11042-011-0837-7","volume":"61","author":"N Taneja","year":"2012","unstructured":"Taneja N, Raman B, Gupta I (2012) Chaos based cryptosystem for still visual data. Multimed Tools Applic 61(2):281\u2013298","journal-title":"Multimed Tools Applic"},{"issue":"3","key":"13317_CR36","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s11042-011-0775-4","volume":"59","author":"N Taneja","year":"2012","unstructured":"Taneja N, Raman B, Gupta I (2012) Combinational domain encryption for still visual data. Multimed Tools Applic 59(3):775\u2013793","journal-title":"Multimed Tools Applic"},{"key":"13317_CR37","first-page":"102421","volume":"50","author":"JS Teh","year":"2020","unstructured":"Teh J S, Alawida M, Sii Y C (2020) Implementation and practical problems of chaos-based cryptography revisited. J Inform Secur Applic 50:102421","journal-title":"J Inform Secur Applic"},{"issue":"23","key":"13317_CR38","doi-asserted-by":"publisher","first-page":"4619","DOI":"10.1142\/S0217979210053847","volume":"24","author":"X-Y Wang","year":"2010","unstructured":"Wang X-Y, Zhao G-B (2010) Hyperchaos generated from the unified chaotic system and its control. Int J Modern Phys B 24(23):4619\u20134637","journal-title":"Int J Modern Phys B"},{"issue":"17","key":"13317_CR39","doi-asserted-by":"publisher","first-page":"6392","DOI":"10.36478\/jeasci.2019.6392.6399","volume":"14","author":"SF Yousif","year":"2019","unstructured":"Yousif S F (2019) Speech encryption based on Zaslavsky map. J Eng Appl Sci 14(17):6392\u20136399","journal-title":"J Eng Appl Sci"},{"key":"13317_CR40","doi-asserted-by":"crossref","unstructured":"Zghair H K, Mehdi S A, Sadkhan S B (2021) Speech scrambler based on discrete cosine transform and novel seven-dimension hyper chaotic system. In: Journal of physics: conference series, vol 1804. IOP Publishing, p 012048","DOI":"10.1088\/1742-6596\/1804\/1\/012048"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13317-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13317-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13317-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T01:24:08Z","timestamp":1672277048000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13317-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,11]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["13317"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13317-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,11]]},"assertion":[{"value":"13 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Consent for Publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Consent for Publication"}}]}}