{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:27:52Z","timestamp":1743154072068,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031288920"},{"type":"electronic","value":"9783031288937"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28893-7_59","type":"book-chapter","created":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T05:02:50Z","timestamp":1680066170000},"page":"498-505","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Two-Dimensional Code Information Security Design Based on Hash Function and Encryption Algorithm"],"prefix":"10.1007","author":[{"given":"Xingwei","family":"Chen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,30]]},"reference":[{"issue":"02","key":"59_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1142\/S0219467821500224","volume":"21","author":"K Panwar","year":"2021","unstructured":"Panwar, K., Purwar, R.K., Srivastava, G.: A fast encryption scheme suitable for video surveillance applications using SHA-256 hash function and 1D sine-sine chaotic map. Int. J. Image Graph. 21(02), 50\u201354 (2021)","journal-title":"Int. J. Image Graph."},{"issue":"12","key":"59_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.164949","volume":"219","author":"AA Abbasi","year":"2020","unstructured":"Abbasi, A.A., Mazinani, M., Hosseini, R.: Evolutionary-based image encryption using biomolecules operators and non-coupled map lattice. Optik \u2013 Int. J. Light Electron Opt. 219(12), 164949 (2020)","journal-title":"Optik \u2013 Int. J. Light Electron Opt."},{"issue":"10","key":"59_CR3","first-page":"2280","volume":"99","author":"Y Sbaytri","year":"2021","unstructured":"Sbaytri, Y., Lazaar, S.: A design of a new hash function based on cellular automata. J. Theor. Appl. Inf. Technol. 99(10), 2280\u20132289 (2021)","journal-title":"J. Theor. Appl. Inf. Technol."},{"issue":"3","key":"59_CR4","first-page":"1739","volume":"21","author":"S Abed","year":"2021","unstructured":"Abed, S., Waleed, L., Aldamkhi, G., et al.: Enhancement in data security and integrity using minhash technique. Indones. J. Electr. Eng. Comput. Sci. 21(3), 1739\u20131750 (2021)","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"issue":"1","key":"59_CR5","doi-asserted-by":"publisher","first-page":"16","DOI":"10.15575\/join.v4i1.304","volume":"4","author":"R Fitriyanto","year":"2019","unstructured":"Fitriyanto, R., Yudhana, A., Sunardi, S.: Implementation SHA512 hash function and Boyer-Moore string matching algorithm for Jpeg\/exif message digest compilation. Jurnal Online Informatika 4(1), 16 (2019)","journal-title":"Jurnal Online Informatika"},{"key":"59_CR6","doi-asserted-by":"publisher","unstructured":"Pieprzyk, J., Suriadi, S.: A QR code watermarking approach based on the DWT-DCT technique. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10343, pp. 314\u2013331. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59870-3_18","DOI":"10.1007\/978-3-319-59870-3_18"},{"issue":"4","key":"59_CR7","doi-asserted-by":"publisher","first-page":"3485","DOI":"10.1007\/s11277-021-09096-6","volume":"122","author":"V Sharma","year":"2021","unstructured":"Sharma, V., Joshi, A.M.: VLSI implementation of reliable and secure face recognition system. Wirel. Pers. Commun. 122(4), 3485\u20133497 (2021). https:\/\/doi.org\/10.1007\/s11277-021-09096-6","journal-title":"Wirel. Pers. Commun."},{"issue":"2","key":"59_CR8","doi-asserted-by":"publisher","first-page":"86","DOI":"10.11591\/APTIKOM.J.CSIT.109","volume":"2","author":"M Soltani","year":"2017","unstructured":"Soltani, M., Bardsiri, A.K.: A new secure hybrid algorithm for QR-code images encryption and steganography. APTIKOM J. Comput. Sci. Inf. Technol. 2(2), 86\u201396 (2017)","journal-title":"APTIKOM J. Comput. Sci. Inf. Technol."},{"issue":"3","key":"59_CR9","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1080\/01611194.2018.1549122","volume":"43","author":"P Mathivanan","year":"2019","unstructured":"Mathivanan, P., Ganesh, A.B., Venkatesan, R.: QR code\u2013based ECG signal encryption\/decryption algorithm. Cryptologia 43(3), 233\u2013253 (2019)","journal-title":"Cryptologia"},{"key":"59_CR10","doi-asserted-by":"crossref","unstructured":"Maetouq, A., Daud, S.M.: HMNT: hash function based on new Mersenne number transform. IEEE Access 8, 80395\u201380407 (2020)","DOI":"10.1109\/ACCESS.2020.2989820"},{"key":"59_CR11","doi-asserted-by":"crossref","unstructured":"Avrylova, A. H., Korol, O., Milevskyi, S.: Mathematical model of authentication of a transmitted message based on a McEliece scheme on shorted and extended modified elliptic codes using UMAC modified algorithm. Cybersecur. Educ. Sci. Tech. 1(5), 40\u201351 (2019)","DOI":"10.28925\/2663-4023.2019.5.4051"},{"key":"59_CR12","doi-asserted-by":"crossref","unstructured":"El-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E., et al.: Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Futur. Gener. Comput. Syst. 100(Nov.), 893\u2013906 (2019)","DOI":"10.1016\/j.future.2019.05.053"},{"issue":"13","key":"59_CR13","doi-asserted-by":"publisher","first-page":"16031","DOI":"10.1007\/s11042-017-5178-8","volume":"77","author":"L Rosales-Roldan","year":"2017","unstructured":"Rosales-Roldan, L., Chao, J., Nakano-Miyatake, M., Perez-Meana, H.: Color image ownership protection based on spectral domain watermarking using QR codes and QIM. Multimedia Tools Appl. 77(13), 16031\u201316052 (2017). https:\/\/doi.org\/10.1007\/s11042-017-5178-8","journal-title":"Multimedia Tools Appl."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28893-7_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T05:14:18Z","timestamp":1680066858000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28893-7_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031288920","9783031288937"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28893-7_59","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"30 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICATCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Cyber Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fuyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icatci2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/atci.com.cn\/atci2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}