{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:29:00Z","timestamp":1726032540344},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030217297"},{"type":"electronic","value":"9783030217303"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-21730-3_22","type":"book-chapter","created":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T13:03:29Z","timestamp":1560603809000},"page":"204-217","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Trademark Graphic Encryption Algorithm Based on Discrete Chaotic System and Its Performance Analysis"],"prefix":"10.1007","author":[{"given":"Ji","family":"Xu","sequence":"first","affiliation":[]},{"given":"Bo","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xujiong","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Mou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,16]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Davison, M.: The legitimacy of plain packaging under international intellectual property law: why there is no right to use a trademark under either the paris convention or the trips agreement, pp. 81\u2013108. Social Science Electronic Publishing (2012)","DOI":"10.4337\/9781781952177.00009"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-1-4419-5906-5","volume-title":"Encyclopedia of Cryptography and Security","author":"A Biryukov","year":"2011","unstructured":"Biryukov, A., De Canni\u00e8re, C.: Data Encryption Standard (DES). In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, vol. 28(2), pp. 295\u2013301. Springer, Boston (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5"},{"issue":"3","key":"22_CR3","doi-asserted-by":"crossref","first-page":"97","DOI":"10.24297\/ijct.v9i3.3342","volume":"9","author":"A Singh","year":"2013","unstructured":"Singh, A., Marwaha, M., Singh, B., et al.: Comparative study of DES, 3DES, AES and RSA. Int. J. Comput. Technol. 9(3), 97\u2013102 (2013)","journal-title":"Int. J. Comput. Technol."},{"issue":"3","key":"22_CR4","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1007\/s11071-018-4100-x","volume":"92","author":"XL Ye","year":"2018","unstructured":"Ye, X.L., Mou, J., Luo, C.F., et al.: Dynamics analysis of Wien-bridge hyperchaotic memristive circuit system. Nonlinear Dyn. 92(3), 923\u2013933 (2018)","journal-title":"Nonlinear Dyn."},{"issue":"12","key":"22_CR5","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1140\/epjp\/i2018-12309-2","volume":"133","author":"XL Ye","year":"2018","unstructured":"Ye, X.L., Wang, X.Y., Mou, J., et al.: Characteristic analysis of the fractional-order hyperchaotic memristive circuit based on the Wien bridge oscillator. Eur. Phys. J. Plus 133(12), 516 (2018)","journal-title":"Eur. Phys. J. Plus"},{"issue":"4","key":"22_CR6","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1007\/s11071-017-3601-3","volume":"89","author":"W Liu","year":"2017","unstructured":"Liu, W., Sun, K., He, S.: SF-SIMM high-dimensional hyperchaotic map and its performance analysis. Nonlinear Dyn. 89(4), 2521\u20132532 (2017)","journal-title":"Nonlinear Dyn."},{"issue":"05","key":"22_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0129183117500693","volume":"28","author":"X Chai","year":"2017","unstructured":"Chai, X., Gan, Z., Lu, Y., et al.: A novel image encryption algorithm based on the chaotic system and DNA computing. Int. J. Mod. Phys. C 28(05), 1 (2017)","journal-title":"Int. J. Mod. Phys. C"},{"issue":"3","key":"22_CR8","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.cnsns.2014.06.032","volume":"20","author":"JX Chen","year":"2015","unstructured":"Chen, J.X., Zhu, Z.L., Fu, C., et al.: A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun. Nonlinear Sci. Numer. Simul. 20(3), 846\u2013860 (2015)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"Complete","key":"22_CR9","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai, X., Chen, Y., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88(Complete), 197\u2013213 (2017)","journal-title":"Opt. Lasers Eng."},{"issue":"3","key":"22_CR10","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/s11042-013-1699-y","volume":"74","author":"B Norouzi","year":"2015","unstructured":"Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., et al.: A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed. Tools Appl. 74(3), 781\u2013811 (2015)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"22_CR11","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.cnsns.2014.05.022","volume":"20","author":"Y Luo","year":"2015","unstructured":"Luo, Y., Du, M., Liu, J.: A symmetrical image encryption scheme in wavelet and time domain. Commun. Nonlinear Sci. Numer. Simul. 20(2), 447\u2013460 (2015)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Aqeel-ur-Rehman, Liao, X., Hahsmi, M.A., et al.: An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and Chaos. Opt. Int. J. Light. Electron Opt. S0030402617311695 (2017)","DOI":"10.1016\/j.ijleo.2017.09.099"},{"issue":"3","key":"22_CR13","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.aeue.2013.08.007","volume":"68","author":"X Wei","year":"2014","unstructured":"Wei, X., Zhang, Q., Liu, L.: Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEUE Int. J. Electron. Commun. 68(3), 186\u2013192 (2014)","journal-title":"AEUE Int. J. Electron. Commun."},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.optlaseng.2014.12.025","volume":"68","author":"XY Wang","year":"2015","unstructured":"Wang, X.Y., Gu, S.X., Zhang, Y.Q.: Novel image encryption algorithm based on cycle shift and chaotic system. Opt. Lasers Eng. 68, 126\u2013134 (2015)","journal-title":"Opt. Lasers Eng."},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"21589","DOI":"10.1007\/s11042-017-5585-x","volume":"77","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y.: The image encryption algorithm based on chaos and DNA computing. Multimedia Tools Appl. 77, 21589\u201321615 (2018)","journal-title":"Multimedia Tools Appl."},{"issue":"11","key":"22_CR16","doi-asserted-by":"publisher","first-page":"120511","DOI":"10.1142\/S0218127417501711","volume":"27","author":"W Liu","year":"2017","unstructured":"Liu, W., Sun, K., He, Y., et al.: Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations. Int. J. Bifurc. Chaos 27(11), 120511\u2013121743 (2017)","journal-title":"Int. J. Bifurc. Chaos"},{"key":"22_CR17","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu, W., Sun, K., Zhu, C.: A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 84, 26\u201336 (2016)","journal-title":"Opt. Lasers Eng."},{"issue":"1","key":"22_CR18","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s11042-012-1337-0","volume":"72","author":"R Huang","year":"2014","unstructured":"Huang, R., Rhee, K.H., Uchida, S.: A parallel image encryption method based on compressive sensing. Multimedia Tools Appl. 72(1), 71\u201393 (2014)","journal-title":"Multimedia Tools Appl."},{"issue":"23","key":"22_CR19","doi-asserted-by":"publisher","first-page":"10393","DOI":"10.1007\/s11042-014-2172-2","volume":"74","author":"SN George","year":"2015","unstructured":"George, S.N., Augustine, N., Pattathil, D.P.: Audio security through compressive sampling and cellular automata. Multimedia Tools Appl. 74(23), 10393\u201310417 (2015)","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"22_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11220-014-0085-9","volume":"15","author":"SN George","year":"2014","unstructured":"George, S.N., Pattathil, D.P.: A secure LFSR based random measurement matrix for compressive sensing. Sens. Imaging 15(1), 1\u201329 (2014)","journal-title":"Sens. Imaging"},{"issue":"10","key":"22_CR21","doi-asserted-by":"publisher","first-page":"5455","DOI":"10.1007\/s11042-015-2515-7","volume":"75","author":"A Jain","year":"2016","unstructured":"Jain, A., Rajpal, N.: A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimedia Tools Appl. 75(10), 5455\u20135472 (2016)","journal-title":"Multimedia Tools Appl."},{"issue":"11\u201312","key":"22_CR22","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang, Q., Guo, L., Wei, X.: Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52(11\u201312), 2028\u20132035 (2010)","journal-title":"Math. Comput. Model."},{"key":"22_CR23","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi, A., El-Latif, A.A.A., Belghith, S.: A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 128, 155\u2013170 (2016)","journal-title":"Signal Process."},{"issue":"2","key":"22_CR24","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s11071-014-1729-y","volume":"79","author":"X Wang","year":"2015","unstructured":"Wang, X., Wang, Q., Zhang, Y.: A fast image algorithm based on rows and columns switch. Nonlinear Dyn. 79(2), 1141\u20131149 (2015)","journal-title":"Nonlinear Dyn."},{"issue":"4","key":"22_CR25","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"WANG Xingyuan","year":"2012","unstructured":"Xingyuan, W.A.N.G., Teng, L.I.N., Qin, X.U.E.: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101\u20131108 (2012)","journal-title":"Signal Process."},{"key":"22_CR26","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"HUA Zhongyun","year":"2015","unstructured":"Zhongyun, H.U.A., et al.: 2D Sine Logistic modulation map for image encryption. Inf. Sci. 297, 80\u201394 (2015)","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Green Energy and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-21730-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,17]],"date-time":"2023-09-17T13:26:39Z","timestamp":1694957199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-21730-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030217297","9783030217303"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-21730-3_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"16 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GreeNets","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Green Communications and Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dalian","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"greenets2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/greenets.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}