{"id":"https://openalex.org/W7118184060","doi":"https://doi.org/10.1109/jiot.2025.3650529","title":"Quaternion-Oriented Multistructure Attractor: Generation and Audio Encryption Application With Hardware Implementation","display_name":"Quaternion-Oriented Multistructure Attractor: Generation and Audio Encryption Application With Hardware Implementation","publication_year":2026,"publication_date":"2026-01-05","ids":{"openalex":"https://openalex.org/W7118184060","doi":"https://doi.org/10.1109/jiot.2025.3650529"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3650529","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3650529","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102401910","display_name":"Xinyu Bao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210153482","display_name":"Changzhou University","ror":"https://ror.org/04ymgwq66","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153482"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinyu Bao","raw_affiliation_strings":["Wang Zheng School of Microelectronics, Changzhou University, Changzhou, China"],"affiliations":[{"raw_affiliation_string":"Wang Zheng School of Microelectronics, Changzhou University, Changzhou, China","institution_ids":["https://openalex.org/I4210153482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102675224","display_name":"Mengkai Cui","orcid":"https://orcid.org/0009-0001-2652-1571"},"institutions":[{"id":"https://openalex.org/I4210153482","display_name":"Changzhou University","ror":"https://ror.org/04ymgwq66","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153482"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengkai Cui","raw_affiliation_strings":["Wang Zheng School of Microelectronics, Changzhou University, Changzhou, China"],"affiliations":[{"raw_affiliation_string":"Wang Zheng School of Microelectronics, Changzhou University, Changzhou, China","institution_ids":["https://openalex.org/I4210153482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101370399","display_name":"Quan Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210153482","display_name":"Changzhou University","ror":"https://ror.org/04ymgwq66","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153482"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quan Xu","raw_affiliation_strings":["Wang Zheng School of Microelectronics, Changzhou University, Changzhou, China"],"affiliations":[{"raw_affiliation_string":"Wang Zheng School of Microelectronics, Changzhou University, Changzhou, China","institution_ids":["https://openalex.org/I4210153482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111633125","display_name":"Han Bao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210153482","display_name":"Changzhou University","ror":"https://ror.org/04ymgwq66","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153482"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Han Bao","raw_affiliation_strings":["Wang Zheng School of Microelectronics, Changzhou University, Changzhou, China"],"affiliations":[{"raw_affiliation_string":"Wang Zheng School of Microelectronics, Changzhou University, Changzhou, China","institution_ids":["https://openalex.org/I4210153482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008148332","display_name":"IU Herbert Ho-Ching","orcid":null},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"The University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Herbert Ho-Ching Iu","raw_affiliation_strings":["School of Electrical, Electronic and Computer Engineering, The University of Western Australia, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical, Electronic and Computer Engineering, The University of Western Australia, Perth, Australia","institution_ids":["https://openalex.org/I177877127"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121973762","display_name":"Ning Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210153482","display_name":"Changzhou University","ror":"https://ror.org/04ymgwq66","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153482"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Wang","raw_affiliation_strings":["Wang Zheng School of Microelectronics, Changzhou University, Changzhou, China"],"affiliations":[{"raw_affiliation_string":"Wang Zheng School of Microelectronics, Changzhou University, Changzhou, China","institution_ids":["https://openalex.org/I4210153482"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102401910"],"corresponding_institution_ids":["https://openalex.org/I4210153482"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02268999,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"7","first_page":"14912","last_page":"14922"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.7540000081062317,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.7540000081062317,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10244","display_name":"Chaos control and synchronization","score":0.20630000531673431,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11349","display_name":"Music Technology and Sound Studies","score":0.0031999999191612005,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7378000020980835},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5486000180244446},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.5160999894142151},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.41679999232292175},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.41370001435279846},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.39809998869895935},{"id":"https://openalex.org/keywords/microcontroller","display_name":"Microcontroller","score":0.3377000093460083},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.32199999690055847}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8511999845504761},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7378000020980835},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5486000180244446},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.5160999894142151},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4408999979496002},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.41679999232292175},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.41370001435279846},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.39809998869895935},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.3377000093460083},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.328900009393692},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.32199999690055847},{"id":"https://openalex.org/C164380108","wikidata":"https://www.wikidata.org/wiki/Q507187","display_name":"Attractor","level":2,"score":0.32100000977516174},{"id":"https://openalex.org/C2781089630","wikidata":"https://www.wikidata.org/wiki/Q21856745","display_name":"Realization (probability)","level":2,"score":0.31779998540878296},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3100999891757965},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.3100000023841858},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3091999888420105},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.3091000020503998},{"id":"https://openalex.org/C36561122","wikidata":"https://www.wikidata.org/wiki/Q4819874","display_name":"Audio over Ethernet","level":5,"score":0.3066999912261963},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.3001999855041504},{"id":"https://openalex.org/C200127275","wikidata":"https://www.wikidata.org/wiki/Q173853","display_name":"Quaternion","level":2,"score":0.2800999879837036},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.26489999890327454},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.2547999918460846},{"id":"https://openalex.org/C64922751","wikidata":"https://www.wikidata.org/wiki/Q4650799","display_name":"Audio signal","level":3,"score":0.25130000710487366},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3650529","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3650529","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.40349259972572327,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,8,75,132,153],"widespread":[2],"application":[3],"of":[4,10,80,141,156],"audio":[5,15,101,121],"communication":[6],"in":[7,30,83,162],"internet":[9],"things,":[11],"secure":[12],"and":[13,36,44,78,89,104,115,126,149],"efficient":[14],"data":[16],"transmission":[17,111,161],"has":[18],"become":[19],"increasingly":[20],"critical.":[21],"However,":[22],"existing":[23],"chaos-based":[24,100],"encryption":[25,102,107],"schemes":[26],"often":[27],"face":[28],"challenges":[29],"flexibly":[31],"generating":[32,58],"complex":[33],"chaotic":[34,60,143],"attractors":[35,61,84],"achieving":[37],"a":[38,53,64,98,113],"practical":[39,154],"balance":[40],"between":[41],"security,":[42,148],"flexibility,":[43],"efficiency.":[45],"To":[46],"address":[47],"these":[48],"limitations,":[49],"this":[50],"paper":[51],"proposes":[52],"novel":[54],"universal":[55],"method":[56,70],"for":[57,109,159],"multi-structure":[59],"based":[62],"on":[63],"quaternion":[65,87],"rotation":[66],"matrix":[67],"transformation.":[68],"This":[69],"enables":[71],"flexible":[72,142],"control":[73],"over":[74],"position,":[76],"scale,":[77],"number":[79],"wing":[81],"units":[82],"by":[85],"configuring":[86],"parameters":[88],"multi-level":[90],"pulse":[91],"function.":[92],"Building":[93],"upon":[94],"this,":[95],"we":[96],"design":[97],"high-performance":[99],"algorithm,":[103],"implement":[105],"an":[106],"system":[108,119],"wireless":[110,124],"using":[112],"microcontroller":[114],"LoRa":[116],"module.":[117],"The":[118,138],"integrates":[120],"recording,":[122],"encryption,":[123],"transmission,":[125],"decryption.":[127],"Comprehensive":[128],"security":[129],"analyses":[130],"demonstrate":[131],"proposed":[133],"algorithm":[134],"achieves":[135],"robust":[136,146],"performance.":[137],"successful":[139],"integration":[140],"attractor":[144],"design,":[145],"cryptographic":[147],"hardware":[150],"realization":[151],"confirms":[152],"viability":[155],"our":[157],"scheme":[158],"information":[160],"resource-constrained":[163],"environments.":[164]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2026-01-05T00:00:00"}
