{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:46:49Z","timestamp":1743155209655,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031290961"},{"type":"electronic","value":"9783031290978"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-29097-8_100","type":"book-chapter","created":{"date-parts":[[2023,4,7]],"date-time":"2023-04-07T11:02:55Z","timestamp":1680865375000},"page":"845-851","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Network Camouflage Technology that Randomly Adds False Information to Real Information"],"prefix":"10.1007","author":[{"given":"Dongling","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Fei","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Haohua","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Guoru","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Jundong","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhaofeng","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Rongtao","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,8]]},"reference":[{"key":"100_CR1","doi-asserted-by":"publisher","unstructured":"Huang, Q., Gao, H., Yang, S., Ding, D., Lin, Z., Ling, Q.: Ultrastable and colorful afterglow from organic luminophores in amorphous nanocomposites: advanced anti-counterfeiting and in vivo imaging application. Nano Research 13(4), 1035\u20131043 (2020). https:\/\/doi.org\/10.1007\/s12274-020-2740-x","DOI":"10.1007\/s12274-020-2740-x"},{"issue":"5","key":"100_CR2","doi-asserted-by":"publisher","first-page":"1710","DOI":"10.17762\/turcomat.v12i5.2166","volume":"12","author":"EAMY Darus","year":"2021","unstructured":"Darus, E.A.M.Y.: A case study on digital divide and access to Information Communication Technologies (Icts) in Pulau Tuba, Langkawi, Malaysia. Turkish J. Comput. Math. Educ. 12(5), 1710\u20131718 (2021)","journal-title":"Turkish J. Comput. Math. Educ."},{"issue":"1","key":"100_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/LSP.2018.2825959","volume":"26","author":"Y Zheng","year":"2019","unstructured":"Zheng, Y., Zhang, X., Wang, F., et al.: Detection of people with camouflage pattern via dense deconvolution network. IEEE Signal Process. Lett. 26(1), 29\u201333 (2019)","journal-title":"IEEE Signal Process. Lett."},{"issue":"10","key":"100_CR4","doi-asserted-by":"publisher","first-page":"5022","DOI":"10.1007\/s11227-018-2346-1","volume":"74","author":"S Ubaid","year":"2018","unstructured":"Ubaid, S., Shafeeq, M.F., Hussain, M., et al.: SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks. J. Supercomput. 74(10), 5022\u20135040 (2018)","journal-title":"J. Supercomput."},{"key":"100_CR5","doi-asserted-by":"crossref","unstructured":"Chen, Y.-K., Chen, C.-H., et al.: Color adjustment for video-see-through AR and camouflage application. SID Int. Symp. Digest Technol. Papers 49(2), 1064\u20131067 (2018)","DOI":"10.1002\/sdtp.12145"},{"issue":"3","key":"100_CR6","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1177\/0162243917724515","volume":"43","author":"RA Adelman","year":"2018","unstructured":"Adelman, R.A.: Security glitches: the failure of the universal camouflage pattern and the fantasy of \u201cidentity intelligence.\u201d Sci. Technol. Hum. Values 43(3), 431\u2013463 (2018)","journal-title":"Sci. Technol. Hum. Values"},{"issue":"6","key":"100_CR7","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1631\/FITEE.1900709","volume":"21","author":"LP Chen","year":"2020","unstructured":"Chen, L.P., Yin, H., Yuan, L.G., et al.: A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations. Front. Inform. Technol. Electron. Eng. 21(6), 866\u2013879 (2020)","journal-title":"Front. Inform. Technol. Electron. Eng."},{"issue":"5","key":"100_CR8","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1016\/j.net.2018.01.018","volume":"50","author":"MA Elakrat","year":"2018","unstructured":"Elakrat, M.A., Jung, J.C.: Development of field programmable gate array-based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network-science direct. Nucl. Eng. Technol. 50(5), 780\u2013787 (2018)","journal-title":"Nucl. Eng. Technol."},{"key":"100_CR9","first-page":"1","volume":"99","author":"Q Li","year":"2020","unstructured":"Li, Q., Wang, X., Wang, X., et al.: A novel grayscale image steganography scheme based on chaos encryption and generative adversarial networks. IEEE Access 99, 1 (2020)","journal-title":"IEEE Access"},{"key":"100_CR10","doi-asserted-by":"crossref","unstructured":"Tabash, F.K., Izharuddin, M., Tabash, M.I.: Encryption techniques for H.264\/AVC videos: a literature review. J. Inform. Secur. Appl. 45(Apr), 20\u201334 (2019)","DOI":"10.1016\/j.jisa.2019.01.001"},{"key":"100_CR11","doi-asserted-by":"crossref","unstructured":"Ratnavelu, K., Kalpana, M., Balasubramaniam, P., et al.: Image encryption method based on chaotic fuzzy cellular neural networks. Signal Process. 140(nov), 87\u201396 (2017)","DOI":"10.1016\/j.sigpro.2017.05.002"},{"key":"100_CR12","doi-asserted-by":"crossref","unstructured":"Soon, J.M., Manning, L.: Developing anti-counterfeiting measures: the role of smart packaging. Food Res. Int. 123(Sep), 135\u2013143 (2019)","DOI":"10.1016\/j.foodres.2019.04.049"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-29097-8_100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T18:39:12Z","timestamp":1684262352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-29097-8_100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031290961","9783031290978"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-29097-8_100","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICATCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Cyber Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fuyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icatci2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/atci.com.cn\/atci2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}