{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:05:14Z","timestamp":1730343914299,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356353","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T23:01:01Z","timestamp":1525993261000},"page":"87-91","source":"Crossref","is-referenced-by-count":1,"title":["Speech encryption based on hybrid chaotic key generator for AMR-WB G.722.2 codec"],"prefix":"10.23919","author":[{"given":"Messaouda","family":"Boumaraf","sequence":"first","affiliation":[]},{"given":"Fatiha","family":"Merazka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Design and Implementation of Image Encryption Algorithm Using Chaos","volume":"4","author":"sandhya rani","year":"2014","journal-title":"International Journal of Advanced Computer Research"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2012.05.033"},{"key":"ref12","first-page":"658","article-title":"Wideband Speech Encryption based Arnold Cat Map for AMR-WB G. 722. 2 codec","author":"merazka","year":"2014","journal-title":"icisp"},{"key":"ref13","article-title":"An image encryption approach using chaos and stream cipher","author":"jolfaei","year":"0","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref14","article-title":"A New Fast Image Encryption Scheme Based on 2D Chaotic Maps","author":"boriga","year":"2014","journal-title":"IAENG International Journal of Computer Science"},{"journal-title":"Wideband coding of speech at around 16 kbps using Adaptive Multi-RateWideband (AMR-WB)","year":"2003","key":"ref15"},{"journal-title":"Logistic Equation","year":"2015","author":"gonze","key":"ref16"},{"key":"ref17","article-title":"A Simple Method for Image Encryption Using Chaotic Logistic Map","volume":"3","author":"aval","year":"2013","journal-title":"Scient Comput Computational Math"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/AIC-MITCSA.2016.7759941"},{"key":"ref19","first-page":"4492","article-title":"Chaos image encryption using pixel shuffling with henon map","volume":"38","author":"prasad","year":"2011","journal-title":"Elixir Elec Engg"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.11.009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1109\/ICSMC.1997.638097","article-title":"Image encryption based on chaotic maps","volume":"2","author":"fridrich","year":"1997","journal-title":"Systems Man and Cybernetics 1997 Computational Cybernetics and Simulation 1997 IEEE International Conference on"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.12.026"},{"key":"ref8","article-title":"A review of the H&#x00E9;non map and its physical interpretations","author":"wen","year":"2014","journal-title":"Advance Online Publication"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21402-8_42"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2008.03.004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-1959-1"},{"journal-title":"Timit Speech Corpus","year":"1990","key":"ref20"},{"journal-title":"Perceptual Evaluation of Speech Quality (PESQ) An Objective Method of End-to-end Speech Quality Assessment of Narrowband Telephone Networks and Speech Codecs","year":"2000","key":"ref22"},{"journal-title":"Enhanced modified bark spectral distortion (EMBS) An objective speech quality measure based on audible distortions and cognitive model","year":"1999","author":"yang","key":"ref21"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2017,12,11]]},"location":"Cambridge","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356353.pdf?arnumber=8356353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:24:08Z","timestamp":1527553448000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356353\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356353","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}