{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:52:29Z","timestamp":1726037549879},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_53","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"596-608","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen\u2019s Chaos"],"prefix":"10.1007","author":[{"given":"Qianning","family":"Dai","sequence":"first","affiliation":[]},{"given":"Jingbing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Uzair Aslam","family":"Bhatti","sequence":"additional","affiliation":[]},{"given":"Jieren","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Xiaobo","family":"Bai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"53_CR1","unstructured":"Wang, W.W.: Research and application of commodity anti-counterfeiting system based on mobile QR code technology. Beijing University of Posts and Telecommunications (2012)"},{"key":"53_CR2","doi-asserted-by":"crossref","unstructured":"Liu, S.Y.: Anti-counterfeit system based on mobile phone QR code and fingerprint. In: Intelligent Human-Machine Systems and Cybernetics (IHMSC), pp. 236\u2013240 (2010)","DOI":"10.1109\/IHMSC.2010.159"},{"key":"53_CR3","doi-asserted-by":"crossref","unstructured":"Sun, A.D., Sun, Y., Liu, C.X.: The QR-code reorganization in illegible snapshots taken by mobile phones. In: Fifth International Conference on Computational Science and Applications (ICCSA), pp. 532\u2013538 (2007)","DOI":"10.1109\/ICCSA.2007.86"},{"key":"53_CR4","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.compind.2015.01.004","volume":"68","author":"SH Choi","year":"2015","unstructured":"Choi, S.H., Yang, B., Cheung, H.H., et al.: RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting. Comput. Ind. 68, 148\u2013161 (2015)","journal-title":"Comput. Ind."},{"key":"53_CR5","unstructured":"Yan, B., Huang, G.W., et al.: Application of RFID and internet of things in monitoring and anti-counterfeiting for products. In: Business and Information Management (ISBIM), pp. 392\u2013395 (2008)"},{"key":"53_CR6","doi-asserted-by":"crossref","unstructured":"Chen, C.L., Chen, Y.Y., Shih, T.-F., et.al.: An RFID authentication and anti-counterfeit transaction Protocol. In: Computer, Consumer and Control (IS3C), pp. 419\u2013422 (2012)","DOI":"10.1109\/IS3C.2012.112"},{"key":"53_CR7","unstructured":"Zhang, Y.: Research on the automatic identification algorithm of genuine and anti-counterfeiting tags. Hainan University (2017)"},{"key":"53_CR8","unstructured":"Li, F.: Text security, bar code combination identification structure and methods, China, 2012101185260 [P] (2012)"},{"key":"53_CR9","first-page":"135","volume":"10","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Li, J.B.: An automatic identification authentic work anti-counterfeiting algorithm based on DWT-DCT. Int. J. Secur. Appl. 10, 135\u2013144 (2016)","journal-title":"Int. J. Secur. Appl."},{"issue":"5","key":"53_CR10","first-page":"39","volume":"16","author":"XF Liao","year":"2017","unstructured":"Liao, X.F.: Analysis and improvement of image encryption algorithm based on Logistic chaotic system. Softw. Guide 16(5), 39\u201341 (2017)","journal-title":"Softw. Guide"},{"key":"53_CR11","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.compeleceng.2017.04.004","volume":"62","author":"MJ Rostami","year":"2017","unstructured":"Rostami, M.J., Shahba, A., Saryazdi, S., et al.: A novel parallel image encryption with chaotic windows based on logistic map. Comput. Electr. Eng. 62, 348\u2013400 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"53_CR12","doi-asserted-by":"crossref","unstructured":"Sabery K, M., Yaghoobi, M.: A new approach for image encryption using chaotic logistic map. In: Proceedings of 2008 International Conference of the IEEE on Advanced Computer Theory and Engineering, pp. 585\u2013590 (2008)","DOI":"10.1109\/ICACTE.2008.177"},{"issue":"5","key":"53_CR13","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/S0960-0779(02)00007-3","volume":"14","author":"JH L\u00fc","year":"2002","unstructured":"L\u00fc, J.H., Chen, G.R., Zhang, S.C.: The compound structure of a new chaotic attractor. Chaos, Solitons Fractals 14(5), 669\u2013672 (2002)","journal-title":"Chaos, Solitons Fractals"},{"issue":"5","key":"53_CR14","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1016\/j.chaos.2004.02.060","volume":"22","author":"CX Liu","year":"2004","unstructured":"Liu, C.X., Liu, T., Liu, L., et al.: A new chaotic attractor. Chaos, Solitons Fractals 22(5), 1031\u20131038 (2004)","journal-title":"Chaos, Solitons Fractals"},{"key":"53_CR15","volume-title":"Chaos Time Series Analysis and Its Application","author":"JH L\u00fc","year":"2002","unstructured":"L\u00fc, J.H., Lu, A., Chen, S.H.: Chaos Time Series Analysis and Its Application. Wuhan University Press, Wuhan (2002)"},{"key":"53_CR16","first-page":"1142","volume":"37","author":"CX Zhu","year":"2006","unstructured":"Zhu, C.X., Chen, Z.G., et al.: A new image encryption algorithm based on generalized Chen\u2019s chaotic system. J. Cent. S. Univ. (Nat. Sci. Ed.) 37, 1142\u20131148 (2006)","journal-title":"J. Cent. S. Univ. (Nat. Sci. Ed.)"},{"issue":"1","key":"53_CR17","first-page":"95","volume":"55","author":"JR Cheng","year":"2018","unstructured":"Cheng, J.R., Xu, R.M., Tang, X.Y., et al.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput. Mater. Contin. 55(1), 95\u2013119 (2018)","journal-title":"Comput. Mater. Contin."},{"issue":"7","key":"53_CR18","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1093\/comjnl\/bxy025","volume":"61","author":"JR Cheng","year":"2018","unstructured":"Cheng, J.R., Zhou, J.H., Liu, Q., Tang, X.Y., Guo, Y.X.: A DDoS detection method for socially aware networking based on forecasting fusion feature sequence. Comput. J. 61(7), 959\u2013970 (2018). https:\/\/doi.org\/10.1093\/comjnl\/bxy025","journal-title":"Comput. J."},{"issue":"1","key":"53_CR19","first-page":"017","volume":"55","author":"JH Cui","year":"2018","unstructured":"Cui, J.H., Zhang, Y.Y., Cai, Z.P., et al.: Securing display path for security-sensitive applications on mobile devices. CMC: Comput. Mater. Contin. 55(1), 017\u2013035 (2018)","journal-title":"CMC: Comput. Mater. Contin."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T03:33:15Z","timestamp":1575430395000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}