{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:54:44Z","timestamp":1743011684234,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030755287"},{"type":"electronic","value":"9783030755294"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75529-4_4","type":"book-chapter","created":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T19:02:43Z","timestamp":1621969363000},"page":"42-56","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Image Encryption Method Using Chaos and DNA Encoding"],"prefix":"10.1007","author":[{"given":"Mukul","family":"Biswas","sequence":"first","affiliation":[]},{"given":"Sujit Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Bibhas Chandra","family":"Dhara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,26]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"55405","DOI":"10.1109\/ACCESS.2018.2871557","volume":"6","author":"A Alzaidi","year":"2018","unstructured":"Alzaidi, A., Ahmad, M., Doja, M., Solami, E., Beg, M.: A new 1D chaotic map and $$\\beta $$-hill climbing for generating substitution-boxes. IEEE Access 6, 55405\u201355418 (2018)","journal-title":"IEEE Access"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"36667","DOI":"10.1109\/ACCESS.2019.2906292","volume":"7","author":"A Belazi","year":"2019","unstructured":"Belazi, A., Talha, M., Kharbech, S., Xiang, W.: Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7, 36667\u201336681 (2019)","journal-title":"IEEE Access"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Biswas, P., Kandar, S., Dhara, B.C.: A novel image encryption technique using one dimensional chaotic map and circular shift technique. In: Proceedings of the 6th International Conference on Software and Computer Applications, pp. 112\u2013116 (2017)","DOI":"10.1145\/3056662.3056685"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-019-7523-6","volume":"79","author":"P Biswas","year":"2020","unstructured":"Biswas, P., Kandar, S., Dhara, B.C.: An image encryption scheme using sequence generated by interval bisection of polynomial function. Multimed. Tools Appl. 79, 1\u201324 (2020)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"4_CR5","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/0898-1221(79)90039-7","volume":"5","author":"G Blakley","year":"1979","unstructured":"Blakley, G., Borosh, I.: Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages. Comput. Math. Appl. 5(3), 169\u2013178 (1979)","journal-title":"Comput. Math. Appl."},{"issue":"6","key":"4_CR6","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1038\/nsmb.2294","volume":"19","author":"II Cisse","year":"2012","unstructured":"Cisse, I.I., Kim, H., Ha, T.: A rule of seven in Watson-Crick base-pairing of mismatched sequences. Nat. Struct. Mol. Biol. 19(6), 623 (2012)","journal-title":"Nat. Struct. Mol. Biol."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Das, S.K., Dhara, B.C.: An image encryption technique using sine curve. In: 2017 Ninth International Conference on Advances in Pattern Recognition (ICAPR), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICAPR.2017.8592943"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Das, S.K., Dhara, B.C.: A new image encryption method using circle. In: 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICCCNT.2017.8203912"},{"key":"4_CR9","first-page":"144","volume":"41","author":"S El Assad","year":"2016","unstructured":"El Assad, S., Farajallah, M.: A new chaos-based image encryption system. Sig. Process.: Image Commun. 41, 144\u2013157 (2016)","journal-title":"Sig. Process.: Image Commun."},{"issue":"3","key":"4_CR10","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi, R., Farah, M., Kachouri, A., Samet, M.: A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn. 83(3), 1123\u20131136 (2016). https:\/\/doi.org\/10.1007\/s11071-015-2392-7","journal-title":"Nonlinear Dyn."},{"key":"4_CR11","first-page":"117","volume":"44","author":"S Kandar","year":"2019","unstructured":"Kandar, S., Chaudhuri, D., Bhattacharjee, A., Dhara, B.C.: Image encryption using sequence generated by cyclic group. J. Inf. Secur. Appl. 44, 117\u2013129 (2019)","journal-title":"J. Inf. Secur. Appl."},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li, Y., Wang, C., Chen, H.: A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt. Lasers Eng. 90, 238\u2013246 (2017)","journal-title":"Opt. Lasers Eng."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Maiti, C., Dhara, B.C.: Image encryption with a new Fibonacci transform. In: 2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT), pp. 1\u20134. IEEE (2018)","DOI":"10.1109\/EAIT.2018.8470437"},{"key":"4_CR14","unstructured":"NIST FIPS PUB 197: Advanced Encryption Standard (AES) (2001)"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.compbiomed.2016.03.020","volume":"72","author":"D Ravichandran","year":"2016","unstructured":"Ravichandran, D., Praveenkumar, P., Rayappan, J.B.B., Amirtharajan, R.: Chaos based crossover and mutation for securing DICOM image. Comput. Biol. Med. 72, 170\u2013184 (2016)","journal-title":"Comput. Biol. Med."},{"issue":"2","key":"4_CR16","first-page":"1","volume":"10","author":"S Sun","year":"2018","unstructured":"Sun, S.: A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling. IEEE Photon. J. 10(2), 1\u201314 (2018)","journal-title":"IEEE Photon. J."},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"106355","DOI":"10.1016\/j.optlastec.2020.106355","volume":"132","author":"T Wang","year":"2020","unstructured":"Wang, T., Wang, M.H.: Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding. Opt. Laser Technol. 132, 106355 (2020)","journal-title":"Opt. Laser Technol."},{"issue":"5","key":"4_CR18","doi-asserted-by":"publisher","first-page":"6243","DOI":"10.1007\/s11042-017-4534-z","volume":"77","author":"XY Wang","year":"2018","unstructured":"Wang, X.Y., Li, P., Zhang, Y.Q., Liu, L.Y., Zhang, H., Wang, X.: A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed. Tools Appl. 77(5), 6243\u20136265 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang, X.Y., Zhang, Y.Q., Bao, X.M.: A novel chaotic image encryption scheme using DNA sequence operations. Opt. Lasers Eng. 73, 53\u201361 (2015)","journal-title":"Opt. Lasers Eng."},{"issue":"1","key":"4_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-019-56847-4","volume":"10","author":"X Wang","year":"2020","unstructured":"Wang, X., Guan, N., Zhao, H., Wang, S., Zhang, Y.: A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Sci. Rep. 10(1), 1\u201315 (2020)","journal-title":"Sci. Rep."},{"issue":"3","key":"4_CR21","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/s11071-013-1086-2","volume":"75","author":"X Wang","year":"2014","unstructured":"Wang, X., Wang, Q.: A novel image encryption algorithm based on dynamic s-boxes constructed by chaos. Nonlinear Dyn. 75(3), 567\u2013576 (2014). https:\/\/doi.org\/10.1007\/s11071-013-1086-2","journal-title":"Nonlinear Dyn."},{"key":"4_CR22","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","volume":"342","author":"X Wang","year":"2015","unstructured":"Wang, X., Zhang, H.: A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt. Commun. 342, 51\u201360 (2015)","journal-title":"Opt. Commun."},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"J Wu","year":"2018","unstructured":"Wu, J., Liao, X., Yang, B.: Image encryption using 2D H\u00e9non-Sine map and DNA approach. Sig. Process. 153, 11\u201323 (2018)","journal-title":"Sig. Process."},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y.: The unified image encryption algorithm based on chaos and cubic S-box. Inf. Sci. 450, 361\u2013377 (2018)","journal-title":"Inf. Sci."}],"container-title":["Communications in Computer and Information Science","Computational Intelligence in Communications and Business Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75529-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T19:02:57Z","timestamp":1621969377000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75529-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030755287","9783030755294"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75529-4_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"26 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICBA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Intelligence in Communications and Business Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiniketan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 January 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 January 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicba2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cicba.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"84","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.44","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.54","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}