{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T12:45:07Z","timestamp":1770468307949,"version":"3.49.0"},"reference-count":22,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067524","type":"journal-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T07:22:23Z","timestamp":1753946543000},"page":"1653-1674","source":"Crossref","is-referenced-by-count":1,"title":["A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation"],"prefix":"10.32604","volume":"85","author":[{"given":"Ibtisam A.","family":"Taqi","sequence":"first","affiliation":[]},{"given":"Sarab M.","family":"Hameed","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13636-017-0118-0","article-title":"Speech encryption using chaotic shift keying for secured speech communication","volume":"2017","author":"Sathiyamurthi","year":"2017","journal-title":"EURASIP J Audio Speech Music Process"},{"key":"ref2","first-page":"5142","article-title":"An efficient audio encryption based on chaotic logistic map with 3D matrix","volume":"96","author":"Hameed","year":"2018","journal-title":"J Theor Appl Inf Technol"},{"key":"ref3","first-page":"25","article-title":"Lorenz and Rossler chaotic system for speech signal encryption","volume":"128","author":"Hato","year":"2015","journal-title":"Int J Comput Appl"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"9260","DOI":"10.1109\/ACCESS.2019.2963329","article-title":"An audio encryption algorithm based on DNA coding and chaotic system","volume":"8","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref5","first-page":"2721910","article-title":"A novel audio cryptosystem using chaotic maps and DNA encoding","volume":"2017","author":"Sheela","year":"2017","journal-title":"J Comput Netw Commun"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"530","DOI":"10.3390\/electronics8050530","article-title":"A novel audio encryption algorithm with permutation-substitution architecture","volume":"8","author":"Kordov","year":"2019","journal-title":"Electronics"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"16616","DOI":"10.1007\/s11227-023-05249-5","article-title":"New secure and efficient substitution and permutation method for audio encryption algorithm","volume":"79","author":"Albahrani","year":"2023","journal-title":"J Supercomput"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"28","DOI":"10.56038\/oprd.v2i1.234","article-title":"A lossless audio encryption method based on Chebyshev map","volume":"2","author":"Demirta\u015f","year":"2023","journal-title":"Orclever Proc Res Dev"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"3824","DOI":"10.3390\/math11183824","article-title":"An efficient audio encryption scheme based on elliptic curve over finite fields","volume":"11","author":"Ur Rehman","year":"2023","journal-title":"Mathematics"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.aci.2019.10.001","article-title":"An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams","volume":"19","author":"Farsana","year":"2023","journal-title":"Appl Comput Inform"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"25675","DOI":"10.1007\/s11042-023-16493-5","article-title":"An intelligent homomorphic audio signal encryption algorithm for secure interacting","volume":"83","author":"Hu","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"110152","DOI":"10.1016\/j.apacoust.2024.110152","article-title":"Audio encryption framework based on chaotic map and DNA encoding","volume":"224","author":"Roy","year":"2024","journal-title":"Appl Acoust"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/TLA.2024.10472959","article-title":"An audio encryption scheme based on empirical mode decomposition and 2D cosine logistic map","volume":"22","author":"Maity","year":"2024","journal-title":"IEEE Lat Am Trans"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"5523","DOI":"10.1007\/s00500-023-09349-5","article-title":"A technique for securing digital audio files based on rotation and XOR operations","volume":"28","author":"Joshi","year":"2024","journal-title":"Soft Comput"},{"key":"ref15","unstructured":"Sample WAV Audio File Download [Internet]. [cited 2025 Jul 6]. Available from: https:\/\/getsamplefiles.com\/sample-audio-files\/wav\/."},{"key":"ref16","unstructured":"Sample WAV Files [Internet]. [cited 2025 Jul 6]. Available from: https:\/\/toolsfairy.com\/tools\/audio-test\/sample-wav-files."},{"key":"ref17","unstructured":"Sample Focus. Exotic Fiesta Tropical Rhythms [Internet]. [cited 2025 Jul 6]. Available from: https:\/\/samplefocus.com\/samples\/exotic-fiesta-tropical-rhythms."},{"key":"ref18","unstructured":"Sample Focus. Synth Buzz Uprise [Internet]. [cited 2025 Jul 6]. Available from: https:\/\/samplefocus.com\/samples\/synth-buzz-uprise."},{"key":"ref19","unstructured":"Sample Focus. Rave Keys Synthstabs [Internet]. [cited 2025 Jul 6]. Available from: https:\/\/samplefocus.com\/samples\/rave-keys-synth-stabs."},{"key":"ref20","unstructured":"Sample Focus. How Wet Guitar Passionate Loop [Internet]. [cited 2025 Jul 6]. Available from: https:\/\/samplefocus.com\/samples\/how-wet-guitar-passionate-loop."},{"key":"ref21","unstructured":"Sample MP3 audio files. [cited 2025 Jul 6]. Available from: https:\/\/samplelib.com\/sample-mp3.html."},{"key":"ref22","unstructured":"Beethoven LV. Classical MP3 Files [Internet]. [cited 2025 Jul 6]. Available from: https:\/\/www.mfiles.co.uk\/mp3-downloads\/beethoven-symphony6-1.mp3."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_67524\/TSP_CMC_67524.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:02:33Z","timestamp":1763344953000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63567"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":22,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067524","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}