{"id":"https://openalex.org/W4388240461","doi":"https://doi.org/10.1109/jiot.2023.3325223","title":"Securing Dual-Channel Audio Communication With a 2-D Infinite Collapse and Logistic Map","display_name":"Securing Dual-Channel Audio Communication With a 2-D Infinite Collapse and Logistic Map","publication_year":2023,"publication_date":"2023-11-02","ids":{"openalex":"https://openalex.org/W4388240461","doi":"https://doi.org/10.1109/jiot.2023.3325223"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3325223","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3325223","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hdl.handle.net/11492/8505","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100449415","display_name":"Rui Wu","orcid":"https://orcid.org/0000-0003-0941-2688"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rui Wu","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025237430","display_name":"Suo Gao","orcid":"https://orcid.org/0000-0002-0020-6469"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Suo Gao","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017703480","display_name":"Herbert Ho\u2010Ching Iu","orcid":"https://orcid.org/0000-0002-0687-4038"},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"The University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Herbert Ho-Ching Iu","raw_affiliation_strings":["School of Electrical, Electronic and Computer Engineering, The University of Western Australia, Perth, WA, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical, Electronic and Computer Engineering, The University of Western Australia, Perth, WA, Australia","institution_ids":["https://openalex.org/I177877127"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015285865","display_name":"Shuang Zhou","orcid":"https://orcid.org/0000-0001-6399-643X"},"institutions":[{"id":"https://openalex.org/I126924076","display_name":"Chongqing Normal University","ror":"https://ror.org/01dcw5w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I126924076"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuang Zhou","raw_affiliation_strings":["School of Mathematical Sciences, Chongqing Normal University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Chongqing Normal University, Chongqing, China","institution_ids":["https://openalex.org/I126924076"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083632599","display_name":"U\u011fur Erkan","orcid":"https://orcid.org/0000-0002-2481-0230"},"institutions":[{"id":"https://openalex.org/I46464968","display_name":"Karamano\u011flu Mehmetbey University","ror":"https://ror.org/037vvf096","country_code":"TR","type":"education","lineage":["https://openalex.org/I46464968"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"U\u011fur Erkan","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering, Karamanoglu Mehmetbey University, Karaman, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering, Karamanoglu Mehmetbey University, Karaman, Turkey","institution_ids":["https://openalex.org/I46464968"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021161141","display_name":"Abdurrahim Tokta\u015f","orcid":"https://orcid.org/0000-0002-7687-9061"},"institutions":[{"id":"https://openalex.org/I149218525","display_name":"Ankara University","ror":"https://ror.org/01wntqw50","country_code":"TR","type":"education","lineage":["https://openalex.org/I149218525"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Abdurrahim Toktas","raw_affiliation_strings":["Department of Artificial Intelligence and Data Engineering, Engineering Faculty, Ankara University, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence and Data Engineering, Engineering Faculty, Ankara University, Ankara, Turkey","institution_ids":["https://openalex.org/I149218525"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002376817","display_name":"Xianglong Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianglong Tang","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100449415"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":2.6479,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.91960456,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"11","issue":"6","first_page":"10214","last_page":"10223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9502000212669373,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7598367929458618},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.703682541847229},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.5141482949256897},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49588093161582947},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.47111204266548157},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4639752507209778},{"id":"https://openalex.org/keywords/keystream","display_name":"Keystream","score":0.45639297366142273},{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.4188064932823181},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.41868856549263},{"id":"https://openalex.org/keywords/watermarking-attack","display_name":"Watermarking attack","score":0.4178640842437744},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4175453782081604},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.30130481719970703},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2671366035938263},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.2479335367679596}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7598367929458618},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.703682541847229},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5141482949256897},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49588093161582947},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.47111204266548157},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4639752507209778},{"id":"https://openalex.org/C2776132008","wikidata":"https://www.wikidata.org/wiki/Q1509893","display_name":"Keystream","level":4,"score":0.45639297366142273},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.4188064932823181},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.41868856549263},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.4178640842437744},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4175453782081604},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.30130481719970703},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2671366035938263},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.2479335367679596}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/jiot.2023.3325223","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3325223","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/4dba5763-769b-47c5-bb8b-8d1790a194be","is_oa":false,"landing_page_url":"https://research-repository.uwa.edu.au/en/publications/4dba5763-769b-47c5-bb8b-8d1790a194be","pdf_url":null,"source":{"id":"https://openalex.org/S4306402523","display_name":"UWA Profiles and Research Repository (University of Western Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177877127","host_organization_name":"The University of Western Australia","host_organization_lineage":["https://openalex.org/I177877127"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wu, R, Gao, S, Iu, H H C, Zhou, S, Erkan, U, Toktas, A & Tang, X 2024, 'Securing Dual-Channel Audio Communication With a 2-D Infinite Collapse and Logistic Map', IEEE Internet of Things Journal, vol. 11, no. 6, pp. 10214-10223. https://doi.org/10.1109/JIOT.2023.3325223","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:earsiv.kmu.edu.tr:11492/8505","is_oa":true,"landing_page_url":"https://hdl.handle.net/11492/8505","pdf_url":null,"source":{"id":"https://openalex.org/S4377196479","display_name":"eAr\u015fiv - KM\u00dc (Karamano\u011flu Mehmetbey University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I46464968","host_organization_name":"Karamano\u011flu Mehmetbey University","host_organization_lineage":["https://openalex.org/I46464968"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:earsiv.kmu.edu.tr:11492/8505","is_oa":true,"landing_page_url":"https://hdl.handle.net/11492/8505","pdf_url":null,"source":{"id":"https://openalex.org/S4377196479","display_name":"eAr\u015fiv - KM\u00dc (Karamano\u011flu Mehmetbey University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I46464968","host_organization_name":"Karamano\u011flu Mehmetbey University","host_organization_lineage":["https://openalex.org/I46464968"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2464017635","display_name":null,"funder_award_id":"CSC202306120290","funder_id":"https://openalex.org/F4320322725","funder_display_name":"China Scholarship Council"},{"id":"https://openalex.org/G6239764539","display_name":null,"funder_award_id":"61672190","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1975805105","https://openalex.org/W2013503531","https://openalex.org/W2062086221","https://openalex.org/W2141635413","https://openalex.org/W2156908589","https://openalex.org/W2207621483","https://openalex.org/W2400803188","https://openalex.org/W2747850105","https://openalex.org/W2765682908","https://openalex.org/W2767875127","https://openalex.org/W2897664099","https://openalex.org/W2984482121","https://openalex.org/W2998699567","https://openalex.org/W3003512042","https://openalex.org/W3017932443","https://openalex.org/W3081784818","https://openalex.org/W3097162638","https://openalex.org/W3111390859","https://openalex.org/W3169884214","https://openalex.org/W3175385336","https://openalex.org/W3193322324","https://openalex.org/W3201693477","https://openalex.org/W4200233568","https://openalex.org/W4283742020","https://openalex.org/W4289813026","https://openalex.org/W4291163833","https://openalex.org/W4293221284","https://openalex.org/W4293386063","https://openalex.org/W4302290883","https://openalex.org/W4306667010","https://openalex.org/W4307040954","https://openalex.org/W4310067968","https://openalex.org/W4310553162","https://openalex.org/W4312197525","https://openalex.org/W4312677948","https://openalex.org/W4312819330","https://openalex.org/W4312959255","https://openalex.org/W4313594959","https://openalex.org/W4316660727","https://openalex.org/W4319068553","https://openalex.org/W4324092325","https://openalex.org/W4360981026","https://openalex.org/W4367395110"],"related_works":["https://openalex.org/W4245054042","https://openalex.org/W4394009573","https://openalex.org/W2889213958","https://openalex.org/W2175086517","https://openalex.org/W2966184072","https://openalex.org/W2039893264","https://openalex.org/W2389724189","https://openalex.org/W2090951139","https://openalex.org/W4399703225","https://openalex.org/W3005779010"],"abstract_inverted_index":{"To":[0],"provide":[1,67],"robust":[2,185],"security":[3,186],"measures":[4],"for":[5,98,104,134],"audio":[6,17,82,116,132,173,195],"data":[7],"during":[8],"transmission,":[9],"this":[10,41],"article":[11],"has":[12],"developed":[13],"a":[14,25,52,88,130],"novel":[15],"dual-channel":[16],"encryption":[18,80,145,158,174],"scheme":[19],"based":[20],"on":[21],"chaos":[22],"theory.":[23],"Specifically,":[24],"new":[26,131],"2-D":[27,31,46],"chaotic":[28,47],"system":[29],"called":[30],"infinite":[32],"collapse":[33],"with":[34,60,147],"logistic":[35],"map":[36],"(2-D-ICLM)":[37],"is":[38,126,196,202,210],"designed":[39],"in":[40,72,143,156],"article.":[42],"Compared":[43],"to":[44,87,128],"traditional":[45],"systems,":[48],"the":[49,73,78,93,99,102,105,109,112,118,121,144,148,152,157,160,168,171,198,208],"2-D-ICLM":[50],"exhibits":[51],"larger":[53],"parameter":[54],"space,":[55],"complexity,":[56],"and":[57,63,70,96,123,137,182,200,205,207],"richness,":[58],"along":[59],"high":[61],"unpredictability":[62],"randomness.":[64],"These":[65],"characteristics":[66],"potential":[68],"advantages":[69],"applications":[71],"field":[74],"of":[75,115,159,170,190,193],"encryption.":[76,135],"In":[77],"proposed":[79],"scheme,":[81],"information":[83,119,150],"serves":[84],"as":[85],"input":[86],"hash":[89],"function,":[90],"which":[91],"generates":[92],"initial":[94],"values":[95],"parameters":[97],"2-D-ICLM,":[100],"producing":[101],"keystream":[103],"cryptographic":[106],"system.":[107],"Considering":[108],"correlation":[110,189],"between":[111],"two":[113],"channels":[114,125],"information,":[117],"from":[120,151],"left":[122,153],"right":[124,161],"fused":[127],"create":[129],"signal":[133],"Scrambling":[136],"diffusion":[138],"processes":[139],"are":[140],"performed":[141],"synchronously":[142],"algorithm,":[146],"ciphertext":[149,194],"channel":[154,162],"utilized":[155],"audio.":[163],"The":[164,188],"experimental":[165],"results":[166],"prove":[167],"effectiveness":[169],"suggested":[172],"technique,":[175],"effectively":[176],"countering":[177],"various":[178],"conventional":[179],"attack":[180],"methods":[181],"showcasing":[183],"its":[184],"features.":[187],"adjacent":[191],"elements":[192],"0.0013,":[197],"NSCR":[199],"UACI":[201],"around":[203],"0.9960":[204],"0.3345,":[206],"efficiency":[209],"0.0003":[211],"s/KB.":[212]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":10}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
