{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T04:15:27Z","timestamp":1729311327157,"version":"3.27.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T00:00:00Z","timestamp":1727222400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T00:00:00Z","timestamp":1727222400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,25]]},"DOI":"10.23919\/spa61993.2024.10715600","type":"proceedings-article","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T17:29:18Z","timestamp":1729186158000},"page":"149-154","source":"Crossref","is-referenced-by-count":0,"title":["Memristive Coupled Neural Network Based Audio Signal Encryption"],"prefix":"10.23919","volume":"8","author":[{"given":"Farah","family":"Hamed","sequence":"first","affiliation":[{"name":"German University in Cairo,Faculty of MET,Cairo,Egypt"}]},{"given":"Mohamed","family":"Gabr","sequence":"additional","affiliation":[{"name":"German University in Cairo,Faculty of MET,Cairo,Egypt"}]},{"given":"Eyad","family":"Mamdouh","sequence":"additional","affiliation":[{"name":"German University in Cairo,Physics Department,Cairo,Egypt"}]},{"given":"Amr","family":"Aboshousha","sequence":"additional","affiliation":[{"name":"German University in Cairo,Physics Department,Cairo,Egypt"}]},{"given":"Wassim","family":"Alexan","sequence":"additional","affiliation":[{"name":"German University in Cairo,Faculty of IET,Cairo,Egypt"}]},{"given":"Dina","family":"El-Damak","sequence":"additional","affiliation":[{"name":"German University in Cairo,Faculty of IET,Cairo,Egypt"}]},{"given":"Abdallah","family":"Fathy","sequence":"additional","affiliation":[{"name":"ElSewedy University of Technology - Polytechnic of Egypt,Faculty of Engineering Technology,Department of Electronic Engineering Technology,Cairo,Egypt"}]},{"given":"Marvy Badr Monir","family":"Mansour","sequence":"additional","affiliation":[{"name":"The British University in Egypt,Faculty of Engineering,Department of Electrical Engineering,Cairo,Egypt"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2987197"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/sym14030443"},{"issue":"5","key":"ref3","doi-asserted-by":"crossref","DOI":"10.3390\/electronics8050530","article-title":"A novel audio encryption algorithm with permutation-substitution architecture","volume":"8","author":"Kordov","year":"2019","journal-title":"Electronics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-020-06164-7"},{"key":"ref5","first-page":"5142","article-title":"An efficient audio encryption based on chaotic logistic map with 3d matrix","volume":"96","author":"Hameed","year":"2018","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"1","key":"ref6","doi-asserted-by":"crossref","first-page":"28","DOI":"10.56038\/oprd.v2i1.234","article-title":"A lossless audio encryption method based on chebyshev map","volume":"2","author":"Demirta\u015f","year":"2023","journal-title":"Orclever Proceedings of Research and Development"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15289-x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3155599"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3301460"},{"volume-title":"Network security with openSSL: cryptography for secure communications","year":"2002","author":"Viega","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/fractalfract7040287"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-9563-2_14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/sym15051081"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7023-7"},{"volume-title":"\u201dfibonacci q-matrix.\u201d from mathworld\u2013a wolfram web resource","author":"Weisstein","key":"ref15"},{"issue":"9","key":"ref16","doi-asserted-by":"crossref","DOI":"10.3390\/electronics10091066","article-title":"New image encryption algorithm using hyperchaotic system and fibonacci q-matrix","volume":"10","author":"Hosny","year":"2021","journal-title":"Electronics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10091066"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3326848"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3226322"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963329"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3319335"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/sym14122559"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07818-4"}],"event":{"name":"2024 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA)","start":{"date-parts":[[2024,9,25]]},"location":"Poznan, Poland","end":{"date-parts":[[2024,9,27]]}},"container-title":["2024 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10715565\/10715594\/10715600.pdf?arnumber=10715600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T17:27:28Z","timestamp":1729272448000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10715600\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,25]]},"references-count":23,"URL":"https:\/\/doi.org\/10.23919\/spa61993.2024.10715600","relation":{},"subject":[],"published":{"date-parts":[[2024,9,25]]}}}