{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T05:20:21Z","timestamp":1736659221527,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540409298"},{"type":"electronic","value":"9783540409328"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11861201_73","type":"book-chapter","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T06:00:39Z","timestamp":1161151239000},"page":"627-635","source":"Crossref","is-referenced-by-count":0,"title":["A Protocol to Provide Assurance of Images Integrity Using Memory Cellular Automata"],"prefix":"10.1007","author":[{"given":"A. Mart\u00edn","family":"del Rey","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"73_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1142\/S0218127402004310","volume":"12","author":"R. Alonso-Sanz","year":"2002","unstructured":"Alonso-Sanz, R., Mart\u00edn, M.: One-dimensional cellular automata with memory: patterns from a single seed. Internat. J. Bifur. Chaos\u00a012, 205\u2013226 (2002)","journal-title":"Internat. J. Bifur. Chaos"},{"key":"73_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0167-2789(02)00693-0","volume":"175","author":"R. Alonso-Sanz","year":"2003","unstructured":"Alonso-Sanz, R.: Reversible cellular automata with memory: patterns starting with a single site seed. Physica D\u00a0175, 1\u201330 (2003)","journal-title":"Physica D"},{"key":"73_CR3","doi-asserted-by":"crossref","first-page":"99","DOI":"10.25088\/ComplexSystems.14.2.99","volume":"14","author":"R. Alonso-Sanz","year":"2003","unstructured":"Alonso-Sanz, R., Mart\u00edn, M.: Elementary cellular automata with memory. Complex Systems\u00a014, 99\u2013126 (2003)","journal-title":"Complex Systems"},{"key":"73_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1007\/978-3-540-45224-9_163","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"G. \u00c1lvarez Mara\u00f1\u00f3n","year":"2003","unstructured":"\u00c1lvarez Mara\u00f1\u00f3n, G., Hern\u00e1ndez Encinas, A., Hern\u00e1ndez Encinas, L., Mart\u00edn del Rey, A., Rodr\u00edguez S\u00e1nchez, G.: Graphic cryptography with pseudorandom bit generators and cellular automata. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol.\u00a02773, pp. 1207\u20131214. Springer, Heidelberg (2003)"},{"key":"73_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/11492429_50","volume-title":"Pattern Recognition and Image Analysis","author":"G. \u00c1lvarez Mara\u00f1\u00f3n","year":"2005","unstructured":"\u00c1lvarez Mara\u00f1\u00f3n, G., Hern\u00e1ndez Encinas, L., Mart\u00edn del Rey, A.: A new secret sharing scheme for images based on additive 2-dimensional cellular automata. In: Marques, J.S., P\u00e9rez de la Blanca, N., Pina, P. (eds.) IbPRIA 2005. LNCS, vol.\u00a03522, pp. 411\u2013418. Springer, Heidelberg (2005)"},{"key":"73_CR6","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.cpc.2005.07.002","volume":"173","author":"G. \u00c1lvarez","year":"2005","unstructured":"\u00c1lvarez, G., Hern\u00e1ndez Encinas, A., Hern\u00e1ndez Encinas, L., Mart\u00edn del Rey, A.: A secure scheme to share secret color images. Comput. Phys. Comm.\u00a0173, 9\u201316 (2005)","journal-title":"Comput. Phys. Comm."},{"key":"73_CR7","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1109\/TC.2004.94","volume":"53","author":"F. Bao","year":"2004","unstructured":"Bao, F.: Cryptanalysis of Partially Known Cellular Automaton Cryptosystem. IEEE Trans. Comput.\u00a053, 1493\u20131497 (2004)","journal-title":"IEEE Trans. Comput."},{"key":"73_CR8","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1016\/S0262-8856(98)00058-4","volume":"16","author":"M. Barni","year":"1998","unstructured":"Barni, M., Bartolini, F., Cappellini, V., Piva, A.: Copyright protection of digital images by embedded unperceivable marks. Image and Vision Computing\u00a016, 897\u2013906 (1998)","journal-title":"Image and Vision Computing"},{"key":"73_CR9","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/S1383-7621(00)00058-8","volume":"47","author":"P. Dasgupta","year":"2001","unstructured":"Dasgupta, P., Chattopadhyay, S., Sengupta, I.: Theory and application of non-group cellular automata for message authentication. J. Syst. Architecture\u00a047, 383\u2013404 (2001)","journal-title":"J. Syst. Architecture"},{"key":"73_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1007\/978-3-540-30479-1_63","volume-title":"Cellular Automata","author":"A. F\u00faster-Sabater","year":"2004","unstructured":"F\u00faster-Sabater, A., de la Gu\u00eda-Mart\u00ednez, D.: Cellular automata applications to the linearization of stream cipher generators. In: Sloot, P.M.A., Chopard, B., Hoekstra, A.G. (eds.) ACRI 2004. LNCS, vol.\u00a03305, pp. 612\u2013621. Springer, Heidelberg (2004)"},{"key":"73_CR11","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/S0164-1212(03)00239-5","volume":"73","author":"C. Lin","year":"2004","unstructured":"Lin, C., Tsai, W.: Secret image sharing with steganography and authentication. J. Syst. Soft.\u00a073, 405\u2013414 (2004)","journal-title":"J. Syst. Soft."},{"key":"73_CR12","doi-asserted-by":"crossref","unstructured":"Mart\u00edn del Rey, A.: Design of a Cryptosystem Based on Reversible Memory Cellular Automata. In: Proc. of 10th IEEE Symposium on Computers and Communications, pp. 482\u2013486 (2005)","DOI":"10.1109\/ISCC.2005.49"},{"key":"73_CR13","doi-asserted-by":"publisher","first-page":"1356","DOI":"10.1016\/j.amc.2005.01.026","volume":"170","author":"A. Mart\u00edn del Rey","year":"2005","unstructured":"Mart\u00edn del Rey, A., Pereira Mateus, J., Rodr\u00edguez S\u00e1nchez, G.: A secret sharing scheme based on cellular automata. Appl. Math. Comput.\u00a0170, 1356\u20131364 (2005)","journal-title":"Appl. Math. Comput."},{"key":"73_CR14","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"73_CR15","first-page":"40","volume":"E82-A","author":"M. Mihaljevic","year":"1999","unstructured":"Mihaljevic, M., Zheng, Y., Imai, H.: A family of fast dedicated one-way hash functions based on linear cellular automata over GF(q). IEICE Trans. Fundamentals\u00a0E82-A, 40\u201347 (1999)","journal-title":"IEICE Trans. Fundamentals"},{"key":"73_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/3-540-45830-1_25","volume-title":"Cellular Automata","author":"M. Mukherjee","year":"2002","unstructured":"Mukherjee, M., Ganguly, N., Chaudhuri, P.P.: Cellular automata based authentication. In: Bandini, S., Chopard, B., Tomassini, M. (eds.) ACRI 2002. LNCS, vol.\u00a02493, pp. 259\u2013269. Springer, Heidelberg (2002)"},{"key":"73_CR17","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.1109\/12.338094","volume":"43","author":"S. Nandi","year":"1994","unstructured":"Nandi, S., Kar, B.K., Chaudhuri, P.P.: Theory and applications of cellular automata in cryptography. IEEE Trans. Comput.\u00a043, 1346\u20131357 (1994)","journal-title":"IEEE Trans. Comput."},{"key":"73_CR18","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/S0267-3649(98)80007-1","volume":"14","author":"T. Page","year":"1998","unstructured":"Page, T.: Digital watermarking as a form of copyright protection. Computer Law & Security Report\u00a014, 390\u2013392 (1998)","journal-title":"Computer Law & Security Report"},{"key":"73_CR19","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/S0923-5965(00)00010-2","volume":"16","author":"M. Queluz","year":"2001","unstructured":"Queluz, M.: Authentication of digital images and video: Generic models and a new contribution. Signal Processing: Image Communication\u00a016, 461\u2013475 (2001)","journal-title":"Signal Processing: Image Communication"},{"key":"73_CR20","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/S0022-0000(72)80009-6","volume":"6","author":"D. Richardson","year":"1972","unstructured":"Richardson, D.: Tessellation with local transformations. J. Comput. Syst. Sci.\u00a06, 373\u2013388 (1972)","journal-title":"J. Comput. Syst. Sci."},{"key":"73_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1007\/978-3-540-30479-1_81","volume-title":"Cellular Automata","author":"M. Seredynski","year":"2004","unstructured":"Seredynski, M., Bouvry, P.: Block encryption using reversible cellular automata. In: Sloot, P.M.A., Chopard, B., Hoekstra, A.G. (eds.) ACRI 2004. LNCS, vol.\u00a03305, pp. 785\u2013792. Springer, Heidelberg (2004)"},{"key":"73_CR22","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/0196-8858(86)90028-X","volume":"7","author":"S. Wolfram","year":"1986","unstructured":"Wolfram, S.: Random sequence generation by cellular automata. Adv. Appl. Math.\u00a07, 123\u2013169 (1986)","journal-title":"Adv. Appl. Math."},{"key":"73_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/3-540-39799-X_32","volume-title":"Advances in Cryptology","author":"S. Wolfram","year":"1986","unstructured":"Wolfram, S.: Cryptography with cellular automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 429\u2013432. Springer, Heidelberg (1986)"},{"key":"73_CR24","unstructured":"Wolfram, S.: A New Kind of Science. Wolfram Media, Inc. (2002)"}],"container-title":["Lecture Notes in Computer Science","Cellular Automata"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11861201_73","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T15:56:22Z","timestamp":1736610982000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11861201_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540409298","9783540409328"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11861201_73","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}