{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T12:16:41Z","timestamp":1768479401141,"version":"3.49.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031079689","type":"print"},{"value":"9783031079696","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-07969-6_9","type":"book-chapter","created":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T22:02:29Z","timestamp":1656799349000},"page":"116-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["An RGB Image Encryption Algorithm Based on\u00a0Clifford Attractors with\u00a0a\u00a0Bilinear Transformation"],"prefix":"10.1007","author":[{"given":"Fouzia El","family":"Azzaby","sequence":"first","affiliation":[]},{"given":"Nabil El","family":"Akkad","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Sabour","sequence":"additional","affiliation":[]},{"given":"Samir","family":"Kabbaj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,3]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-2388-4","volume-title":"Dynamical Systems: Differential Equations, Maps, and Chaotic Behavior","author":"D Arrowsmith","year":"1992","unstructured":"Arrowsmith, D., Place, C.: Dynamical Systems: Differential Equations, Maps, and Chaotic Behavior. Chapman and Hall, New York (1992)"},{"key":"9_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20542-2","volume-title":"Chaos-Based Cryptography: Theory, Algorithms and Applications","author":"L Kocarev","year":"2011","unstructured":"Kocarev, L., Lian, S.: Chaos-Based Cryptography: Theory, Algorithms and Applications. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20542-2"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"8","author":"R Matthews","year":"1989","unstructured":"Matthews, R.: On the derivation of a chaotic encryption algorithm. Cryptology 8, 29\u201341 (1989)","journal-title":"Cryptology"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/3-540-46416-6_11","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201991","author":"T Habutsu","year":"1991","unstructured":"Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127\u2013140. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-46416-6_11"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1998","unstructured":"Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240, 50\u201354 (1998)","journal-title":"Phys. Lett. A"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Image encryption based on chaotic maps. In: Proceedings of IEEE Conference on Systems, Man, and Cybernetics, pp. 1105\u20131110 (1997)","DOI":"10.1109\/ICSMC.1997.638097"},{"issue":"6","key":"9_CR7","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(6), 1259\u20131284 (1998)","journal-title":"Int. J. Bifurcat. Chaos"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen, G., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Int. J. Chaos Solitons Fractals 21, 749\u2013761 (2004)","journal-title":"Int. J. Chaos Solitons Fractals"},{"issue":"10","key":"9_CR9","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"YB Mao","year":"2004","unstructured":"Mao, Y.B., Chen, G., Lian, S.G.: A novel fast image encryption scheme based on the 3D chaotic baker map. Int J Bifurcat. Chaos 14(10), 3613\u20133624 (2004)","journal-title":"Int J Bifurcat. Chaos"},{"issue":"2","key":"9_CR10","first-page":"19","volume":"9","author":"J Giesl","year":"2009","unstructured":"Giesl, J., Vlcek, K.: Image encryption based on strange attractors. ICGST-GVIP J. 9(2), 19\u201326 (2009)","journal-title":"ICGST-GVIP J."},{"issue":"1","key":"9_CR11","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S Lian","year":"2005","unstructured":"Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals 26(1), 117\u2013129 (2005)","journal-title":"Chaos Solitons Fractals"},{"key":"9_CR12","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/978-981-15-0947-6_56","volume-title":"Embedded Systems and Artificial Intelligence","author":"F Elazzaby","year":"2020","unstructured":"Elazzaby, F., El Akkad, N., Kabbaj, S.: A new encryption approach based on four-square and zigzag encryption (C4CZ). In: Bhateja, V., Satapathy, S.C., Satori, H. (eds.) Embedded Systems and Artificial Intelligence. AISC, vol. 1076, pp. 589\u2013597. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-0947-6_56"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Elazzaby, F., EL akkad, N., Kabbaj, S.: Advanced encryption of image based on S-box and chaos 2D (LSMCL). In: 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) (2020)","DOI":"10.1109\/IRASET48871.2020.9092254"},{"issue":"3","key":"9_CR14","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1007\/s11071-015-1957-9","volume":"80","author":"XJ Tong","year":"2015","unstructured":"Tong, X.J., Wang, Z., Zhang, M., Liu, Y., Xu, H., Ma, J.: An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn. 80(3), 1493\u20131508 (2015). https:\/\/doi.org\/10.1007\/s11071-015-1957-9","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"9_CR15","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s00530-013-0314-4","volume":"20","author":"B Norouzi","year":"2013","unstructured":"Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi, M.R.: A novel image encryption based on hash function with only two-round diffusion process. Multimedia Syst. 20(1), 45\u201364 (2013). https:\/\/doi.org\/10.1007\/s00530-013-0314-4","journal-title":"Multimedia Syst."},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"ZY Hua","year":"2015","unstructured":"Hua, Z.Y., Zhou, Y.C., Pun, C.M., Chen, C.L.: 2D Sine logistic modulation map for image encryption. Inf. Sci. 297, 80\u201394 (2015)","journal-title":"Inf. Sci."},{"issue":"3","key":"9_CR17","doi-asserted-by":"publisher","first-page":"309","DOI":"10.17706\/jcp.13.3.3","volume":"13","author":"B Fathi-Vajargah","year":"2018","unstructured":"Fathi-Vajargah, B., Kanafchian, M., Alexandrov, V.: Image encryption based on permutation and substitution using Clifford Chaotic System and logistic map. J. Comput. 13(3), 309\u2013326 (2018). https:\/\/doi.org\/10.17706\/jcp.13.3.3","journal-title":"J. Comput."},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"14081","DOI":"10.1109\/ACCESS.2019.2893538","volume":"7","author":"H Zhu","year":"2019","unstructured":"Zhu, H., Zhao, Y., Song, Y.: 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 7, 14081\u201314098 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2893538","journal-title":"IEEE Access"},{"issue":"11","key":"9_CR19","first-page":"356","volume":"10","author":"N El Akkad","year":"2013","unstructured":"El Akkad, N., Merras, M., Saaidi, A., Satori, K.: Camera self-calibration with varying parameters from two views. WSEAS Trans. Inf. Sci. Appl. 10(11), 356\u2013367 (2013)","journal-title":"WSEAS Trans. Inf. Sci. Appl."},{"issue":"1","key":"9_CR20","first-page":"57","volume":"50","author":"N El Akkad","year":"2013","unstructured":"El Akkad, N., Merras, M., Saaidi, A., Satori, K.: Robust method for self-calibration of cameras having the varying intrinsic parameters. J. Theor. Appl. Inf. Technol. 50(1), 57\u201367 (2013)","journal-title":"J. Theor. Appl. Inf. Technol."},{"issue":"1","key":"9_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13319-016-0082-y","volume":"7","author":"N El Akkad","year":"2016","unstructured":"El Akkad, N., El Hazzat, S., Saaidi, A., Satori, K.: Reconstruction of 3D scenes by camera self-calibration and using genetic algorithms. 3D Res. 7(1), 1\u201317 (2016)","journal-title":"3D Res."},{"key":"9_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-319-96292-4_7","volume-title":"Big Data, Cloud and Applications","author":"M Es-Sabry","year":"2018","unstructured":"Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A novel text encryption algorithm based on the two-square cipher and caesar cipher. In: Tabii, Y., Lazaar, M., Al Achhab, M., Enneya, N. (eds.) BDCA 2018. CCIS, vol. 872, pp. 78\u201388. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96292-4_7"},{"key":"9_CR23","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/978-981-15-0947-6_55","volume-title":"Embedded Systems and Artificial Intelligence","author":"M Es-sabry","year":"2020","unstructured":"Es-sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A new color image encryption algorithm using random number generation and linear functions. In: Bhateja, V., Satapathy, S.C., Satori, H. (eds.) Embedded Systems and Artificial Intelligence. AISC, vol. 1076, pp. 581\u2013588. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-0947-6_55"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: Grayscale image encryption using shift bits operations. In: International Conference on Intelligent Systems and Computer Vision, pp. 1\u20137 (2018)","DOI":"10.1109\/ISACV.2018.8354028"},{"issue":"5","key":"9_CR25","doi-asserted-by":"publisher","first-page":"3829","DOI":"10.1007\/s00500-019-04151-8","volume":"24","author":"M Es-Sabry","year":"2019","unstructured":"Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft Comput. 24(5), 3829\u20133848 (2019). https:\/\/doi.org\/10.1007\/s00500-019-04151-8","journal-title":"Soft Comput."},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"94","DOI":"10.25046\/aj020515","volume":"2","author":"M Essaid","year":"2017","unstructured":"Essaid, M., Akharraz, I., Saaidi, A., Mouhib, A., Mohamed, E., Ismail, A., Abderrahim, S., Ali, M.: A new color image encryption algorithm based on iterative mixing of color channels and chaos. Adv. Sci. Technol. Eng. Syst. J. 2, 94\u201399 (2017)","journal-title":"Adv. Sci. Technol. Eng. Syst. J."},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Touil, H., El Akkad, N., Satori, K.: Text encryption: hybrid cryptographic method using vigenere and hill ciphers. In: 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, Morocco, pp. 1\u20136 (2020)","DOI":"10.1109\/ISCV49265.2020.9204095"},{"issue":"6","key":"9_CR28","first-page":"785","volume":"10","author":"H Touil","year":"2020","unstructured":"Touil, H., El Akkad, N., Satori, K.: H-rotation: secure storage and retrieval of passphrases on the authentication process. Int. J. Saf. Secur. Eng. 10(6), 785\u2013796 (2020)","journal-title":"Int. J. Saf. Secur. Eng."},{"issue":"11","key":"9_CR29","doi-asserted-by":"publisher","first-page":"14055","DOI":"10.1007\/s11042-017-5012-3","volume":"77","author":"N El Akkad","year":"2017","unstructured":"El Akkad, N., Merras, M., Baataoui, A., Saaidi, A., Satori, K.: Camera self-calibration having the varying parameters and based on homography of the plane at infinity. Multimedia Tools Appl. 77(11), 14055\u201314075 (2017). https:\/\/doi.org\/10.1007\/s11042-017-5012-3","journal-title":"Multimedia Tools Appl."},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"El Akkad, N., Saaidi, A., Satori, K.: Self-calibration based on a circle of the cameras having the varying intrinsic parameters. In: Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS, pp. 161\u2013166 (2012)","DOI":"10.1109\/ICMCS.2012.6320196"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the 5th International Conference on Big Data and Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-07969-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T10:16:46Z","timestamp":1727518606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-07969-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031079689","9783031079696"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-07969-6_9","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BDIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference On Big Data and Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mohammed V University in Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bdiot2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.amers.org\/bdiot21\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}