{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:23:59Z","timestamp":1775197439395,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T00:00:00Z","timestamp":1682726400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T00:00:00Z","timestamp":1682726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11227-023-05249-5","type":"journal-article","created":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T16:02:26Z","timestamp":1682784146000},"page":"16616-16646","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["New secure and efficient substitution and permutation method for audio encryption algorithm"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1535-0033","authenticated-orcid":false,"given":"Ekhlas Abbas","family":"Albahrani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8502-097X","authenticated-orcid":false,"given":"Tayseer Karam","family":"Alshekly","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7000-8337","authenticated-orcid":false,"given":"Sadeq H.","family":"Lafta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,29]]},"reference":[{"key":"5249_CR1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5554707","author":"H Aziz","year":"2021","unstructured":"Aziz H, Gilani SMM, Hussain I, Janjua AK, Khurram S (2021) A noise-tolerant audio encryption framework designed by the application of S8Symmetric group and chaotic systems. Math Probl Eng. https:\/\/doi.org\/10.1155\/2021\/5554707","journal-title":"Math Probl Eng"},{"key":"5249_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-021-00364-7","author":"RB Naik","year":"2022","unstructured":"Naik RB, Singh U (2022) A review on applications of chaotic maps in pseudo-random number generators and encryption. Ann Data Sci. https:\/\/doi.org\/10.1007\/s40745-021-00364-7","journal-title":"Ann Data Sci"},{"key":"5249_CR3","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/2721910","author":"SJ Sheela","year":"2017","unstructured":"Sheela SJ, Suresh KV, Tandur D (2017) A novel audio cryptosystem using chaotic maps and DNA encoding. J Comput Networks Commun. https:\/\/doi.org\/10.1155\/2017\/2721910","journal-title":"J. Comput. Networks Commun."},{"key":"5249_CR4","doi-asserted-by":"publisher","unstructured":"Albahrani EA (2017) A new audio encryption algorithm based on chaotic block cipher. In: 2017 Annu. Conf. New Trends Inf. Commun. Technol. Appl. NTICT 2017, no. March, pp 22\u201327.https:\/\/doi.org\/10.1109\/NTICT.2017.7976129.","DOI":"10.1109\/NTICT.2017.7976129"},{"issue":"12","key":"5249_CR5","doi-asserted-by":"publisher","first-page":"18043","DOI":"10.1007\/s11042-020-10288-8","volume":"80","author":"NR Babu","year":"2021","unstructured":"Babu NR, Kalpana M, Balasubramaniam P (2021) A novel audio encryption approach via finite-time synchronization of fractional order hyperchaotic system. Multimed Tools Appl 80(12):18043\u201318067. https:\/\/doi.org\/10.1007\/s11042-020-10288-8","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"5249_CR6","doi-asserted-by":"publisher","first-page":"1463","DOI":"10.1007\/s41870-021-00714-x","volume":"13","author":"S Adhikari","year":"2021","unstructured":"Adhikari S, Karforma S (2021) A novel audio encryption method using Henon-Tent chaotic pseudo random number sequence. Int J Inf Technol 13(4):1463\u20131471. https:\/\/doi.org\/10.1007\/s41870-021-00714-x","journal-title":"Int J Inf Technol"},{"key":"5249_CR7","doi-asserted-by":"publisher","unstructured":"Kakaei Kate H, Razmara J, Isazadeh A (2018) A novel fast and secure approach for voice encryption based on DNA computing. 3D Res. 9(2). https:\/\/doi.org\/10.1007\/s13319-018-0167-x.","DOI":"10.1007\/s13319-018-0167-x"},{"issue":"18","key":"5249_CR8","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.ifacol.2015.11.046","volume":"28","author":"V Lynnyk","year":"2015","unstructured":"Lynnyk V, Sakamoto N, \u010celikovsk\u00fd S (2015) Pseudo random number generator based on the generalized Lorenz chaotic system. IFAC-PapersOnLine 28(18):257\u2013261. https:\/\/doi.org\/10.1016\/j.ifacol.2015.11.046","journal-title":"IFAC-PapersOnLine"},{"issue":"1","key":"5249_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.cnsns.2013.06.017","volume":"19","author":"A Akhshani","year":"2014","unstructured":"Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101\u2013111. https:\/\/doi.org\/10.1016\/j.cnsns.2013.06.017","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5249_CR10","doi-asserted-by":"publisher","unstructured":"Sadkhan SB, Mohammed RS (2015) Proposed random unified chaotic map as prbg for voice encryption in wireless communication. Procedia Comput Sci; 65(Iccmit) 314\u2013323, 2015. https:\/\/doi.org\/10.1016\/j.procs.2015.09.089.","DOI":"10.1016\/j.procs.2015.09.089"},{"issue":"2","key":"5249_CR11","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1007\/s11071-021-06346-x","volume":"104","author":"S Krishnamoorthi","year":"2021","unstructured":"Krishnamoorthi S, Jayapaul P, Dhanaraj RK, Rajasekar V, Balusamy B, Islam SH (2021) Design of pseudo-random number generator from turbulence padded chaotic map. Nonlinear Dyn 104(2):1627\u20131643. https:\/\/doi.org\/10.1007\/s11071-021-06346-x","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"5249_CR12","doi-asserted-by":"publisher","first-page":"362","DOI":"10.24996\/ijs.2019.60.2.16","volume":"60","author":"A Yousif","year":"2019","unstructured":"Yousif A, Kashmar AH (2019) Key generator to encryption images based on chaotic maps. Iraqi J Sci 60(2):362\u2013370. https:\/\/doi.org\/10.24996\/ijs.2019.60.2.16","journal-title":"Iraqi J Sci"},{"key":"5249_CR13","unstructured":"Wang L, Cheng H (2019) Logistic chaotic system"},{"issue":"1","key":"5249_CR14","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1166\/jctn.2016.4883","volume":"13","author":"A Gaeini","year":"2016","unstructured":"Gaeini A, Mirghadri A, Jandaghi G, Keshavarzi B (2016) A new pseudo-random number generator based on chaotic maps and linear feedback shift register. J Comput Theor Nanosci 13(1):836\u2013845. https:\/\/doi.org\/10.1166\/jctn.2016.4883","journal-title":"J Comput Theor Nanosci"},{"key":"5249_CR15","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/CAS47993.2019.9075715","volume":"2019","author":"MM Al-Mhadawi","year":"2019","unstructured":"Al-Mhadawi MM, Albahrani AA (2019) Hybrid method as pseudo-random bits generator, 1st Int. Sci Conf Comput Appl Sci CAS 2019:250\u2013255. https:\/\/doi.org\/10.1109\/CAS47993.2019.9075715","journal-title":"Sci Conf Comput Appl Sci CAS"},{"issue":"2","key":"5249_CR16","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1109\/CAS47993.2019.9075731","volume":"2019","author":"NH Ghayad","year":"2019","unstructured":"Ghayad NH, Albahrani EA (2019) A combination of two-dimensional h\u00e9non map and two-dimensional rational map as key number generator. 1st Int Sci Conf Comput Appl Sci CAS 2019(2):107\u2013112. https:\/\/doi.org\/10.1109\/CAS47993.2019.9075731","journal-title":"1st Int Sci Conf Comput Appl Sci CAS"},{"issue":"2","key":"5249_CR17","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1007\/s11071-020-06164-7","volume":"103","author":"PK Naskar","year":"2021","unstructured":"Naskar PK, Bhattacharyya S, Chaudhuri A (2021) An audio encryption based on distinct key blocks along with PWLCM and ECA. Nonlinear Dyn 103(2):2019\u20132042. https:\/\/doi.org\/10.1007\/s11071-020-06164-7","journal-title":"Nonlinear Dyn"},{"key":"5249_CR18","doi-asserted-by":"publisher","unstructured":"Ding L, Ding Q (2020) The establishment and dynamic properties of a new 4d hyperchaotic system with its application and statistical tests in gray images. Entropy. https:\/\/doi.org\/10.3390\/e22030310.","DOI":"10.3390\/e22030310"},{"key":"5249_CR19","doi-asserted-by":"publisher","unstructured":"Sheela S, Sathyanarayana SV (2016) Application of chaos theory in data security-a survey. Accent Trans Inf Secur 2(5) 1\u201315, 2016. https:\/\/doi.org\/10.19101\/tis.2017.25001.","DOI":"10.19101\/tis.2017.25001"},{"issue":"4","key":"5249_CR20","first-page":"34","volume":"37","author":"A Awad","year":"2010","unstructured":"Awad A, Saadane A (2010) New chaotic permutation methods for image encryption. IAENG Int J Comput Sci 37(4):34\u201339","journal-title":"IAENG Int J Comput Sci"},{"key":"5249_CR21","unstructured":"Albhrany E, Alshekly T (2017) A new key stream generator based on 3D Henon map and 3D Cat map 8(February), pp 2114\u20132120"},{"key":"5249_CR22","doi-asserted-by":"publisher","unstructured":"Al-Zubaidy RN, Al-Bahrani E (2019) New key generation algorithm based on dynamical chaotic substitution box. NTCCIT 2018 - Al Mansour Int Conf New Trends Comput Commun Inf Technol. https:\/\/doi.org\/10.1109\/NTCCIT.2018.8681187.","DOI":"10.1109\/NTCCIT.2018.8681187"},{"key":"5249_CR23","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/CAS47993.2019.9075488","volume":"2019","author":"ZMJ Kubba","year":"2019","unstructured":"Kubba ZMJ, Hoomod HK (2019) A hybrid modified lightweight algorithm combined of two cryptography algorithms PRESENT and Salsa20 using chaotic system. 1st Int Sci Conf Comput Appl Sci CAS 2019:199\u2013203. https:\/\/doi.org\/10.1109\/CAS47993.2019.9075488","journal-title":"1st Int Sci Conf Comput Appl Sci CAS"},{"key":"5249_CR24","unstructured":"Albahrani EA,  Alshekly TK (2017) A Text encryption algorithm based on self-synchronizing stream cipher and chaotic maps.  3(5):579\u2013585"},{"issue":"1","key":"5249_CR25","doi-asserted-by":"publisher","first-page":"270","DOI":"10.21123\/bsj.2019.16.1(Suppl.).0270","volume":"16","author":"EA Al-Bahrani","year":"2019","unstructured":"Al-Bahrani EA, Kadhum RNJ (2019) A new cipher based on Feistel structure and chaotic maps. Baghdad Sci J 16(1):270\u2013280. https:\/\/doi.org\/10.21123\/bsj.2019.16.1(Suppl.).0270","journal-title":"Baghdad Sci J"},{"key":"5249_CR26","doi-asserted-by":"publisher","first-page":"9260","DOI":"10.1109\/ACCESS.2019.2963329","volume":"8","author":"X Wang","year":"2020","unstructured":"Wang X, Su Y (2020) An audio encryption algorithm based on DNA coding and chaotic system. IEEE Access 8:9260\u20139270. https:\/\/doi.org\/10.1109\/ACCESS.2019.2963329","journal-title":"IEEE Access"},{"key":"5249_CR27","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1186\/s13636-017-0118-0","volume":"1","author":"P Sathiyamurthi","year":"2017","unstructured":"Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. Eurasip. J Audio, Speech, Music Process. https:\/\/doi.org\/10.1186\/s13636-017-0118-0","journal-title":"Eurasip J Audio, Speech, Music Process"},{"issue":"4","key":"5249_CR28","doi-asserted-by":"publisher","first-page":"1884","DOI":"10.11591\/EEI.V10I4.2924","volume":"10","author":"IA Satam","year":"2021","unstructured":"Satam IA, Shahab SN, Kamel HA, Al-Hamadani MNA (2021) Execution of a smart street lighting system for energy saving enhancement. Bull Electr Eng Inf 10(4):1884\u20131892. https:\/\/doi.org\/10.11591\/EEI.V10I4.2924","journal-title":"Bull Electr Eng Inf"},{"issue":"1","key":"5249_CR29","doi-asserted-by":"publisher","first-page":"53","DOI":"10.13052\/jcsm2245-1439.1113","volume":"11","author":"EA Albahrani","year":"2022","unstructured":"Albahrani EA, Alshekly TK, Lafta SH (2022) A review on audio encryption algorithms using chaos maps-based techniques. J Cyber Secur Mobility 11(1):53\u201382. https:\/\/doi.org\/10.13052\/jcsm2245-1439.1113","journal-title":"J Cyber Secur Mobility"},{"key":"5249_CR30","doi-asserted-by":"publisher","unstructured":"Albahrani EA, Maryoosh AA, Lafta SH (2020) Block image encryption based on modified play fair and chaotic system. J Inf Secur Appl. https:\/\/doi.org\/10.1016\/j.jisa.2019.102445.","DOI":"10.1016\/j.jisa.2019.102445"},{"key":"5249_CR31","doi-asserted-by":"crossref","unstructured":"Chawla R (2015) A review on audio cryptography. 7, pp 14\u201316","DOI":"10.1002\/cala.30206"},{"key":"5249_CR32","unstructured":"Ngineering EC (2016) Literature survey on recent audio; 7(6): 91\u201395"},{"issue":"3","key":"5249_CR33","first-page":"22","volume":"4","author":"BE Students","year":"2018","unstructured":"Students BE (2018) A survey paper on audio security 1. J Inf Technol Sci 4(3):22\u201327","journal-title":"J Inf Technol Sci"},{"issue":"4","key":"5249_CR34","doi-asserted-by":"publisher","first-page":"4","DOI":"10.32523\/2306-6172-2019-7-4-4-17","volume":"7","author":"EA Abbas","year":"2019","unstructured":"Abbas EA, Karam TA, Abbas AK (2019) Image cipher system based on RSA and chaotic maps. Eurasian J Math Comput Appl 7(4):4\u201317. https:\/\/doi.org\/10.32523\/2306-6172-2019-7-4-4-17","journal-title":"Eurasian J Math Comput Appl"},{"key":"5249_CR35","doi-asserted-by":"publisher","first-page":"69894","DOI":"10.1109\/ACCESS.2020.2987197","volume":"8","author":"RI Abdelfatah","year":"2020","unstructured":"Abdelfatah RI (2020) Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8:69894\u201369907. https:\/\/doi.org\/10.1109\/ACCESS.2020.2987197","journal-title":"IEEE Access"},{"key":"5249_CR36","doi-asserted-by":"crossref","unstructured":"Hussain S, Shah T, Javeed A (2022) Modified advanced encryption standard (MAES) based on non-associative inverse property loop. Multimedia Tools Appl","DOI":"10.1007\/s11042-022-14064-8"},{"issue":"43\u201344","key":"5249_CR37","doi-asserted-by":"publisher","first-page":"32487","DOI":"10.1007\/s11042-020-09582-2","volume":"79","author":"A Javeed","year":"2020","unstructured":"Javeed A, Shah T, Ullah A (2020) A color image privacy scheme established on nonlinear system of coupled differential equations. Multimedia Tools Appl 79(43\u201344):32487\u201332501","journal-title":"Multimedia Tools Appl"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05249-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05249-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05249-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T15:12:33Z","timestamp":1693408353000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05249-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,29]]},"references-count":37,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["5249"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05249-5","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,29]]},"assertion":[{"value":"2 April 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}