{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:10:30Z","timestamp":1743045030590,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030519704"},{"type":"electronic","value":"9783030519711"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-51971-1_44","type":"book-chapter","created":{"date-parts":[[2020,8,8]],"date-time":"2020-08-08T17:03:00Z","timestamp":1596906180000},"page":"534-553","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Study and Evaluation of Novel Chaotic System Applied to Image Encryption with Security and Statistical Analyses"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1495-8204","authenticated-orcid":false,"given":"Hany A. A.","family":"Mansour","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6382-9199","authenticated-orcid":false,"given":"Mohamed M.","family":"Fouad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,9]]},"reference":[{"key":"44_CR1","unstructured":"http:\/\/www.imageprocessingplace.com\/root_files_V3\/image_databases.htm"},{"key":"44_CR2","doi-asserted-by":"publisher","unstructured":"Abdelrahman, A.A., Fouad, M.M., Dahshan, H., Mousa, A.M.: High performance CUDA AES implementation: a quantitative performance analysis approach. In: 2017 Computing Conference, pp. 1077\u20131085, July 2017. https:\/\/doi.org\/10.1109\/SAI.2017.8252225","DOI":"10.1109\/SAI.2017.8252225"},{"issue":"3","key":"44_CR3","doi-asserted-by":"publisher","first-page":"526","DOI":"10.15598\/aeee.v15i3.2324","volume":"15","author":"AA Abdelrahman","year":"2017","unstructured":"Abdelrahman, A.A., Fouad, M.M., Dahshan, H.: Analysis on the AES implementation with various granularities on different GPU architectures. Adv. Electr. Electron. Eng. 15(3), 526\u2013535 (2017). https:\/\/doi.org\/10.15598\/aeee.v15i3.2324","journal-title":"Adv. Electr. Electron. Eng."},{"issue":"08","key":"44_CR4","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(08), 2129\u20132151 (2006). https:\/\/doi.org\/10.1142\/S0218127406015970","journal-title":"Int. J. Bifurcat. Chaos"},{"key":"44_CR5","unstructured":"Bassham, L.E., Rukhin, A.L., Nechvatal, J.S.J.R., Smid, M.E., Leigh, S.D., Levenson, M., Vangeland, M., Heckert, N.A., Banks, D.L.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report 800-22 Rev 1a, National Institute of Standards and Technology (NIST, Gaithersburg, MD, USA (2010)"},{"key":"44_CR6","doi-asserted-by":"publisher","unstructured":"Ben Jemaa, Z., Belghith, S.: Chaotic sequences with good correlation properties for MIMO radar application. In: the 24th International Conference on Software, Telecommunications and Computer Networks, pp.\u00a01\u20135, September 2016. https:\/\/doi.org\/10.1109\/SOFTCOM.2016.7772127","DOI":"10.1109\/SOFTCOM.2016.7772127"},{"key":"44_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2012\/940276","volume":"2012","author":"DI Curiac","year":"2012","unstructured":"Curiac, D.I., Volosencu, C.: Chaotic trajectory design for monitoring an arbitrary number of specified locations using points of interest. Math. Probl. Eng. 2012, 1\u201318 (2012)","journal-title":"Math. Probl. Eng."},{"key":"44_CR8","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi, R., Farah, M., Kachouri, A., Samet, M.: A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn. 83, 1123\u20131136 (2016)","journal-title":"Nonlinear Dyn."},{"key":"44_CR9","doi-asserted-by":"publisher","first-page":"46322","DOI":"10.1109\/ACCESS.2018.2862862","volume":"6","author":"FS Hasan","year":"2018","unstructured":"Hasan, F.S., Valenzuela, A.A.: Design and analysis of an OFDM-based orthogonal chaotic vector shift keying communication system. IEEE Access 6, 46322\u201346333 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2862862","journal-title":"IEEE Access"},{"key":"44_CR10","doi-asserted-by":"publisher","unstructured":"Wang, J., Wang, Y.: Analysis performance of MC-CDMA communication system based on improved Chebyshev sequence. In: the 2nd IEEE International Conference on Computer and Communications, pp. 2277\u20132280, October 2016. https:\/\/doi.org\/10.1109\/CompComm.2016.7925105","DOI":"10.1109\/CompComm.2016.7925105"},{"key":"44_CR11","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1007\/s13369-013-0713-z","volume":"39","author":"H Khanzadi","year":"2014","unstructured":"Khanzadi, H., Eshghi, M., Borujeni, S.: Image encryption using random bit sequence based on chaotic maps. Arab. J. Sci. Eng. 39, 1039\u20131047 (2014)","journal-title":"Arab. J. Sci. Eng."},{"key":"44_CR12","doi-asserted-by":"publisher","unstructured":"Kolosovs, D., Bekeris, E.: Chaos code division multiplexing communication system. In: the 7th International Conference on Computational Intelligence, Communication Systems and Networks, pp. 65\u201369, June 2015. https:\/\/doi.org\/10.1109\/CICSyN.2015.22","DOI":"10.1109\/CICSyN.2015.22"},{"key":"44_CR13","doi-asserted-by":"publisher","unstructured":"Ksheerasagar, T.K., Anuradha, S., Avadhootha, G., Charan, K.S.R., Sri Hari Rao, P: Performance analysis of DS-CDMA using different chaotic sequences. In: International Conference on Wireless Communications, Signal Processing and Networking, pp. 2421\u20132425, March 2016. https:\/\/doi.org\/10.1109\/WiSPNET.2016.7566577","DOI":"10.1109\/WiSPNET.2016.7566577"},{"issue":"1","key":"44_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-014-2221-x","volume":"75","author":"A Kulsoom","year":"2016","unstructured":"Kulsoom, A., Xiao, D., Aqeel Ur, R., Abbas, S.: An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed. Tools Appl. 75(1), 1\u201323 (2016)","journal-title":"Multimed. Tools Appl."},{"key":"44_CR15","doi-asserted-by":"publisher","unstructured":"Litvinenko, A., Aboltins, A.: Use of cross-correlation minimization for performance enhancement of chaotic spreading sequence based asynchronous DS-CDMA system. In: the IEEE 4th Workshop on Advances in Information, Electronic and Electrical Engineering, pp.\u00a01\u20136, November 2016. https:\/\/doi.org\/10.1109\/AIEEE.2016.7821812","DOI":"10.1109\/AIEEE.2016.7821812"},{"issue":"9","key":"44_CR16","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/s11517-014-1177-3","volume":"52","author":"G Liu","year":"2014","unstructured":"Liu, G., Liu, H., Kadir, A.: Hiding message into DNA sequence through DNA coding and chaotic maps. Med. Biol. Eng. Comput. 52(9), 741\u2013747 (2014). https:\/\/doi.org\/10.1007\/s11517-014-1177-3","journal-title":"Med. Biol. Eng. Comput."},{"key":"44_CR17","unstructured":"Makris, G., Antoniou, I.: Cryptography with chaos. In: the 5th Chaotic Modeling and Simulation International Conference, June 2012"},{"issue":"6","key":"44_CR18","doi-asserted-by":"publisher","first-page":"3378","DOI":"10.1016\/j.jfranklin.2014.03.007","volume":"351","author":"S Manoharan","year":"2014","unstructured":"Manoharan, S., Bhaskar, V.: Pn codes versus chaotic codes: performance comparison in a Gaussian approximated wideband CDMA system over weibull fading channels. J. Franklin Inst. 351(6), 3378\u20133404 (2014). https:\/\/doi.org\/10.1016\/j.jfranklin.2014.03.007","journal-title":"J. Franklin Inst."},{"issue":"3","key":"44_CR19","doi-asserted-by":"publisher","first-page":"345","DOI":"10.14257\/ijhit.2014.7.3.32","volume":"7","author":"HAA Mansour","year":"2014","unstructured":"Mansour, H.A.A., Fu, Y.: A new method for generating a zero mean self-balanced orthogonal chaotic spread spectrum codes. Int. J. Hybrid Inf. Technolo. 7(3), 345\u2013354 (2014). https:\/\/doi.org\/10.14257\/ijhit.2014.7.3.32","journal-title":"Int. J. Hybrid Inf. Technolo."},{"issue":"13","key":"44_CR20","doi-asserted-by":"publisher","first-page":"4655","DOI":"10.1007\/s11042-013-1828-7","volume":"74","author":"A Rehman","year":"2015","unstructured":"Rehman, A., Liao, X., Kulsoom, A., Abbas, S.: Selective encryption for gray images based on chaos and DNA complementary rules. Multimed. Tools Appl. 74(13), 4655\u20134677 (2015)","journal-title":"Multimed. Tools Appl."},{"key":"44_CR21","doi-asserted-by":"publisher","unstructured":"Shu, X., Wang, H., Wang, J.: Underwater chaos-based DS-CDMA system. In: the IEEE International Conference on Signal Processing, Communications and Computing, pp.\u00a01\u20136, September 2015. https:\/\/doi.org\/10.1109\/ICSPCC.2015.7338899","DOI":"10.1109\/ICSPCC.2015.7338899"},{"key":"44_CR22","doi-asserted-by":"publisher","unstructured":"Swetha, A., Krishna, B.T.: Generation of biphase sequences using different logistic maps. In: International Conference on Communication and Signal Processing, pp. 2102\u20132104, April 2016. https:\/\/doi.org\/10.1109\/ICCSP.2016.7754549","DOI":"10.1109\/ICCSP.2016.7754549"},{"issue":"12","key":"44_CR23","doi-asserted-by":"publisher","first-page":"4350","DOI":"10.1007\/s00034-016-0266-y","volume":"35","author":"A Tayebi","year":"2016","unstructured":"Tayebi, A., Berber, S., Swain, A.: Performance analysis of chaotic DSSS-CDMA synchronization under jamming attack. Circ. Syst. Signal Process. 35(12), 4350\u20134371 (2016). https:\/\/doi.org\/10.1007\/s00034-016-0266-y","journal-title":"Circ. Syst. Signal Process."},{"key":"44_CR24","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.optlaseng.2017.06.015","volume":"107","author":"X Wang","year":"2017","unstructured":"Wang, X., Zhu, X., Wu, X., Zhang, Y.: Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt. Lasers Eng. 107, 370\u2013379 (2017)","journal-title":"Opt. Lasers Eng."},{"issue":"2","key":"44_CR25","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1109\/TCSII.2017.2709347","volume":"65","author":"C Zhou","year":"2018","unstructured":"Zhou, C., Hu, W., Wang, L., Chen, G.: Turbo trellis-coded differential chaotic modulation. IEEE Trans. Circ. Syst. II Express Brief. 65(2), 191\u2013195 (2018). https:\/\/doi.org\/10.1109\/TCSII.2017.2709347","journal-title":"IEEE Trans. Circ. Syst. II Express Brief."},{"issue":"9","key":"44_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e20090716","volume":"20,716","author":"S Zhu","year":"2018","unstructured":"Zhu, S., Zhu, C., Wang, W.: A new image encryption algorithm based on chaos and secure hash SHA-256. Entropy 20,716(9), 1\u201318 (2018). https:\/\/doi.org\/10.3390\/e20090716","journal-title":"Entropy"}],"container-title":["Advances in Intelligent Systems and Computing","Artificial Intelligence and Bioinspired Computational Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51971-1_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T19:32:02Z","timestamp":1618255922000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-51971-1_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030519704","9783030519711"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51971-1_44","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computer Science On-line Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csolc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csoc.openpublish.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}