{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:07Z","timestamp":1772039467683,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,9]],"date-time":"2016-05-09T00:00:00Z","timestamp":1462752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,9]]},"DOI":"10.1145\/2908446.2908508","type":"proceedings-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T12:49:08Z","timestamp":1478263748000},"page":"329-331","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["An Arnold Cat Map-Based Chaotic Approach for Securing Voice Communication"],"prefix":"10.1145","author":[{"given":"Mahmoud F. Abd","family":"Elzaher","sequence":"first","affiliation":[{"name":"Department of Electronics and Electrical communications, Ain Shams University, Cairo, Egypt"}]},{"given":"Mohamed","family":"Shalaby","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Arab Academy for Science, Technology, Maritime Transport, Cairo, Egypt"}]},{"given":"Salwa H.","family":"El Ramly","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical communications, Ain Shams University, Cairo, Egypt"}]}],"member":"320","published-online":{"date-parts":[[2016,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ICCES 2009. International Conference, PP. 300 - 305 (Dec.","author":"Mosa E.","year":"2009","unstructured":"E. Mosa , O. Zahran ,\" Chaotic Encryption of Speech Signals in Transform Domains\" Computer Engineering & Systems , 2009 . ICCES 2009. International Conference, PP. 300 - 305 (Dec. 2009). E.Mosa, O.Zahran,\" Chaotic Encryption of Speech Signals in Transform Domains\" Computer Engineering & Systems, 2009. ICCES 2009. International Conference, PP. 300 - 305 (Dec. 2009)."},{"key":"e_1_3_2_1_2_1","first-page":"314","article-title":"Proposed random unified chaotic map as PRBG for voice encryption in wireless communication","volume":"65","author":"Sadkhan Sattar B.","year":"2015","unstructured":"Sattar B. Sadkhan , Rana Saad Mohammed \" Proposed random unified chaotic map as PRBG for voice encryption in wireless communication \" International Conference on Communication, Management and Information Technology (ICCMIT) ,Vol. 65 , pp. 314 -- 323 ( 2015 ). Sattar B. Sadkhan, Rana Saad Mohammed\" Proposed random unified chaotic map as PRBG for voice encryption in wireless communication\" International Conference on Communication, Management and Information Technology (ICCMIT),Vol. 65, pp. 314--323 (2015).","journal-title":"International Conference on Communication, Management and Information Technology (ICCMIT)"},{"key":"e_1_3_2_1_3_1","first-page":"93","article-title":"A Speech Encryption on Chaotic Maps","volume":"0975","author":"Al Saad Saad Najim","unstructured":"Saad Najim Al Saad , Eman Hato \" A Speech Encryption on Chaotic Maps \" International Journal of Computer Application ( 0975-8887 ), volume 93 -No 4, PP. 19--28 (May, 2014). Saad Najim Al Saad, Eman Hato \"A Speech Encryption on Chaotic Maps\" International Journal of Computer Application (0975-8887), volume 93-No 4, PP. 19--28 (May, 2014).","journal-title":"International Journal of Computer Application ("}],"event":{"name":"INFOS '16: The 10th International Conference on Informatics and Systems","location":"Giza Egypt","acronym":"INFOS '16"},"container-title":["Proceedings of the 10th International Conference on Informatics and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908446.2908508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2908446.2908508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:13Z","timestamp":1750221553000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908446.2908508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,9]]},"references-count":3,"alternative-id":["10.1145\/2908446.2908508","10.1145\/2908446"],"URL":"https:\/\/doi.org\/10.1145\/2908446.2908508","relation":{},"subject":[],"published":{"date-parts":[[2016,5,9]]},"assertion":[{"value":"2016-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}