{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:48:06Z","timestamp":1743079686538,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031008276"},{"type":"electronic","value":"9783031008283"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-00828-3_18","type":"book-chapter","created":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T20:04:11Z","timestamp":1651608251000},"page":"184-193","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Combined Spatial and Frequency Domains in Algorithm of RGB Color Image Security for Telescope Images"],"prefix":"10.1007","author":[{"given":"Kung Chuang","family":"Ting","sequence":"first","affiliation":[]},{"given":"Kim Ho","family":"Yeap","sequence":"additional","affiliation":[]},{"given":"Peh Chiong","family":"Teh","sequence":"additional","affiliation":[]},{"given":"Koon Chun","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Florence","family":"Francis-Lothai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,4]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Abd El-Samie, F.E., et al.: Image Encryption: A Communication Perspective. CRC Press, London, New York (2013)","DOI":"10.1201\/b16309"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1016\/j.ijleo.2019.02.007","volume":"185","author":"W Gao","year":"2019","unstructured":"Gao, W., Sun, J., Qiao, W., Zhang, X.: Digital image encryption scheme based on generalized mandelbrot-julia set. Optik 185, 917\u2013929 (2019)","journal-title":"Optik"},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.image.2015.06.009","volume":"40","author":"G Gu","year":"2016","unstructured":"Gu, G., Ling, J., Xie, G., Li, Z.: A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images. Signal Process. Image Commun. 40, 52\u201364 (2016)","journal-title":"Signal Process. Image Commun."},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1016\/j.ijleo.2018.06.112","volume":"171","author":"M Xu","year":"2018","unstructured":"Xu, M., Tian, Z.: A novel image encryption algorithm based on self-orthogonal latin squares. Optik 171, 891\u2013903 (2018)","journal-title":"Optik"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu, Y., Zhou, Y., Noonan, J.P., Agaian, S.: Design of image cipher using latin squares. Inf. Sci. 264, 317\u2013339 (2014)","journal-title":"Inf. Sci."},{"issue":"5","key":"18_CR6","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir, A., Hamdulla, A., Guo, W.Q.: Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125(5), 1671\u20131675 (2014)","journal-title":"Optik"},{"issue":"2","key":"18_CR7","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei, X., Guo, L., Zhang, Q., Zhang, J., Lian, S.: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 85(2), 290\u2013299 (2012)","journal-title":"J. Syst. Softw."},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-24635-0_12","volume-title":"Aspects of Molecular Computing","author":"A Gehani","year":"2003","unstructured":"Gehani, A., LaBean, T., Reif, J.: DNA-based cryptography. In: Jonoska, N., P\u0103un, G., Rozenberg, G. (eds.) Aspects of Molecular Computing. Lecture Notes in Computer Science, vol. 2950, pp. 167\u2013188. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-24635-0_12"},{"key":"18_CR9","unstructured":"Ning, K.: A pseudo DNA cryptography method. ArVix. abs\/0903.2 (2009)"},{"issue":"10","key":"18_CR10","doi-asserted-by":"publisher","first-page":"3653","DOI":"10.1016\/j.cnsns.2014.03.016","volume":"19","author":"LY Zhang","year":"2014","unstructured":"Zhang, L.Y., Hu, X., Liu, Y., Wong, K.W., Gan, J.: A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simul. 19(10), 3653\u20133659 (2014)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"3","key":"18_CR11","first-page":"237","volume":"13","author":"KH Yeap","year":"2017","unstructured":"Yeap, K.H., Lai, K.C., Ting, K.C., Teh, P.C., Nisar, H., Yeo, W.L.: Optimization of reflector antennas in radio telescope. Mal. J. Fund. App. Sci. 13(3), 237\u2013239 (2017)","journal-title":"Mal. J. Fund. App. Sci."},{"issue":"6","key":"18_CR12","doi-asserted-by":"publisher","first-page":"997","DOI":"10.18517\/ijaseit.6.6.1071","volume":"6","author":"KH Yeap","year":"2016","unstructured":"Yeap, K.H., Yiam, C.Y., Lai, K.C., Loh, M.C., Lim, S.K., Rizman, Z.I.: Analysis of offset antennas in radio telescopes. Int. J. Adv. Sci. Eng. Inf. Technol. 6(6), 997\u20131004 (2016)","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"key":"18_CR13","first-page":"54","volume":"5","author":"DBL Bong","year":"2009","unstructured":"Bong, D.B.L., Lai, K.C., Joseph, A.: Automatic road network recognition and extraction for urban planning. Int. J. Appl. Sci. Eng. Technol. 5, 54\u201359 (2009)","journal-title":"Int. J. Appl. Sci. Eng. Technol."},{"issue":"2","key":"18_CR14","doi-asserted-by":"publisher","first-page":"1950016","DOI":"10.1142\/S0218127419500160","volume":"29","author":"X Liu","year":"2019","unstructured":"Liu, X., Song, Y., Jiang, G.P.: Hierarchical bit-level image encryption based on chaotic map and feistel network. Int. J. Bifurcat. Chaos. 29(2), 1950016 (2019)","journal-title":"Int. J. Bifurcat. Chaos."},{"key":"18_CR15","series-title":"Advances in Intelligent and Soft Computing","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-540-89619-7_47","volume-title":"Applications of Soft Computing","author":"BLB David","year":"2009","unstructured":"David, B.L.B., Ting, K.C., Wang, Y.C.: Novel face recognition approach using bit-level information and dummy blank images in feedforward neural network. In: Mehnen, J., K\u00f6ppen, M., Saad, A., Tiwari, A. (eds.) Applications of Soft Computing. Advances in Intelligent and Soft Computing, vol. 58, pp. 483\u2013490. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-540-89619-7_47"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"107441","DOI":"10.1016\/j.sigpro.2019.107441","volume":"170","author":"F Chapeau-Blondeau","year":"2020","unstructured":"Chapeau-Blondeau, F., Belin, E.: Fourier-transform quantum phase estimation with quantum phase noise. Int. J. Signal Process. 170, 107441 (2020)","journal-title":"Int. J. Signal Process."},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"164562","DOI":"10.1016\/j.ijleo.2020.164562","volume":"208","author":"F Kahlessenane","year":"2020","unstructured":"Kahlessenane, F., Khaldi, A., Euschi, S.: A robust blind color image watermarking based on fourier transform domain. Optik. 208, 164562 (2020)","journal-title":"Optik."},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.physa.2018.09.028","volume":"513","author":"J Olbrys","year":"2019","unstructured":"Olbrys, J., Mursztyn, M.: Measuring stock market resiliency with discrete fourier transform for high frequency data. Phys. A Stat. Mech. Its Appl. 513, 248\u2013256 (2019)","journal-title":"Phys. A Stat. Mech. Its Appl."},{"key":"18_CR19","doi-asserted-by":"publisher","first-page":"110102","DOI":"10.1016\/j.chaos.2020.110102","volume":"139","author":"X Wang","year":"2020","unstructured":"Wang, X., Li, Y., Jin, J.: A new one-dimensional chaotic system with applications in image encryption. Chaos. Solitons Fractals. 139, 110102 (2020)","journal-title":"Chaos. Solitons Fractals."},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.image.2019.08.014","volume":"79","author":"APA Jose","year":"2019","unstructured":"Jose, A.P.A., Daniel, P.B.C., Cecilio, P.: Image encryption using block cipher and chaotic sequence. Signal Process. Image Commun. 79, 24\u201331 (2019)","journal-title":"Signal Process. Image Commun."},{"key":"18_CR21","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/978-981-16-2406-3_42","volume-title":"Proceedings of the 12th National Technical Seminar on Unmanned System Technology 2020","author":"KC Ting","year":"2022","unstructured":"Ting, K.C., Yeap, K.H., Teh, P.C., Lai, K.C.: Bit-levels encryption for RGB telescope images. In: Isa, K., et al. (eds.) Proceedings of the 12th National Technical Seminar on Unmanned System Technology 2020. LNEE, vol. 770, pp. 551\u2013561. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-2406-3_42"}],"container-title":["Lecture Notes in Networks and Systems","Recent Advances in Soft Computing and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-00828-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T20:29:01Z","timestamp":1651609741000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-00828-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031008276","9783031008283"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-00828-3_18","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SCDM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Soft Computing and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scdm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/scdm.uthm.edu.my\/scdm2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}