{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:00:02Z","timestamp":1752984002443,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030622220"},{"type":"electronic","value":"9783030622237"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62223-7_25","type":"book-chapter","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:03:00Z","timestamp":1605002580000},"page":"297-306","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Color Image Encryption Scheme Based on Controlled Alternate Quantum Walks and DNA Sequence Operations"],"prefix":"10.1007","author":[{"given":"Ting","family":"Yan","sequence":"first","affiliation":[]},{"given":"Dan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"key":"25_CR1","first-page":"769","volume":"26","author":"C Pope","year":"2018","unstructured":"Pope, C.: Biometric data collection in an unprotected world: exploring the need for federal legislation protecting biometric data. JL Pol\u2019y 26, 769\u2013771 (2018)","journal-title":"JL Pol\u2019y"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.future.2018.04.076","volume":"87","author":"P Li","year":"2018","unstructured":"Li, P., Li, T., Ye, H., et al.: Privacy-preserving machine learning with multiple data providers. Future Gener. Comput. Syst. 87, 341\u2013350 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"100504","DOI":"10.1088\/1674-1056\/26\/10\/100504","volume":"26","author":"L Zhang","year":"2017","unstructured":"Zhang, L., et al.: A novel color image encryption scheme using fractionai-order hyperchaotic system and DNA sequence operations. Chin. Phys. B 26, 100504 (2017). https:\/\/doi.org\/10.1088\/1674-1056\/26\/10\/100504","journal-title":"Chin. Phys. B"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Wang, X., et al.: Image encryption scheme based on Chaos and DNA plane operations. Multimed. Tools Appl. 9 (2019)","DOI":"10.1007\/s11042-019-07794-9"},{"issue":"4","key":"25_CR5","doi-asserted-by":"publisher","first-page":"2050014","DOI":"10.1142\/S0217979220500149","volume":"34","author":"X Ouyang","year":"2020","unstructured":"Ouyang, X., Luo, Y., Liu, J., et al.: A color image encryption method based on memristive hyperchaotic system and DNA encryption. Int. J. Mod. Phys. B 34(4), 2050014 (2020)","journal-title":"Int. J. Mod. Phys. B"},{"issue":"2","key":"25_CR6","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/e22020158","volume":"22","author":"HG Mohamed","year":"2020","unstructured":"Mohamed, H.G., ElKamchouchi, D.H., Moussa, K.H.: A novel color image encryption algorithm based on hyperchaotic maps and mitochondrial DNA sequences. Entropy 22(2), 158 (2020)","journal-title":"Entropy"},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu, H., Wang, X.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12, 1457 (2012)","journal-title":"Appl. Soft Comput."},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"123869","DOI":"10.1016\/j.physa.2019.123869","volume":"547","author":"AA Abd El-Latif","year":"2019","unstructured":"Abd El-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E.: Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Phys. A 547, 123869 (2019)","journal-title":"Phys. A"},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1126\/science.1229957","volume":"339","author":"AM Childs","year":"2013","unstructured":"Childs, A.M., Gosset, D., Webb, Z.: Universal computation by multiparticle quantum walk. Science 339, 791 (2013)","journal-title":"Science"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"042330","DOI":"10.1103\/PhysRevA.81.042330","volume":"81","author":"NB Lovett","year":"2010","unstructured":"Lovett, N.B., Cooper, S., Everitt, M., Trevers, M., Kendon, V.: Universal quantum computation using the discrete-time quantum walk. Phys. Rev. A 81, 042330 (2010)","journal-title":"Phys. Rev. A"},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1007\/s11128-012-0421-8","volume":"12","author":"D Li","year":"2012","unstructured":"Li, D., et al.: Discrete-time interacting quantum walks and quantum hash schemes. Quant. Inf. Proc. 12, 1501\u20131513 (2012). https:\/\/doi.org\/10.1007\/s11128-012-0421-8","journal-title":"Quant. Inf. Proc."},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-017-18566-6","volume":"8","author":"D Li","year":"2017","unstructured":"Li, D., et al.: Controlled alternate quantum walks based quantum hash function. Sci. Rep. 8, 1\u20137 (2017). https:\/\/doi.org\/10.1038\/s41598-017-18566-6","journal-title":"Sci. Rep."},{"key":"25_CR13","first-page":"52","volume":"342","author":"X Wang","year":"2015","unstructured":"Wang, X., Zhang, H.: A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt. Commun. 342, 52 (2015)","journal-title":"Opt. Commun."},{"key":"25_CR14","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei, X., Guo, L.: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 85, 290 (2012)","journal-title":"J. Syst. Softw."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62223-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:22:37Z","timestamp":1605003757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62223-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030622220","9783030622237"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62223-7_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"360","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"118","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}