{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:11:48Z","timestamp":1751602308433,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877711"},{"type":"electronic","value":"9783031877728"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_15","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:32:53Z","timestamp":1745307173000},"page":"175-187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced Image Security in\u00a0Cloud Computing Using Hybrid Encryption with\u00a0ECC and\u00a0Spatiotemporal Cryptography"],"prefix":"10.1007","author":[{"given":"Ismehene","family":"Chaouch","sequence":"first","affiliation":[]},{"given":"Anis","family":"Naanaa","sequence":"additional","affiliation":[]},{"given":"Sadok","family":"El Asmi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"15_CR1","volume-title":"Concepts, Technology and Architecture, Cloud Computing","author":"T Erl","year":"2019","unstructured":"Erl, T., Puttini, R., Mahmood, Z.: Concepts, Technology and Architecture, Cloud Computing. The Pearson Service Technology, London (2019)"},{"key":"15_CR2","first-page":"2044","volume":"05","author":"J Selvanayagam","year":"2018","unstructured":"Selvanayagam, J., Singh, A., Michael, J., Jeswani, J.: Secure file storage on cloud using cryptography. Int. Res. J. Eng. Technol. (IRJET) 05, 2044 (2018)","journal-title":"Int. Res. J. Eng. Technol. (IRJET)"},{"key":"15_CR3","first-page":"30","volume":"12","author":"M Batra","year":"2018","unstructured":"Batra, M., et al.: Secure file storage in cloud computing using hybrid encryption algorithm. Int. J. Comput. Eng. App. 12, 30\u201336 (2018)","journal-title":"Int. J. Comput. Eng. App."},{"issue":"1","key":"15_CR4","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.gltp.2021.01.013","volume":"2","author":"F Thabit","year":"2021","unstructured":"Thabit, F., Alhomdy, S., Al-Ahdal, A.H., Jagtap, S.: A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transit. Proc. 2(1), 91\u201399 (2021)","journal-title":"Global Transit. Proc."},{"issue":"1","key":"15_CR5","doi-asserted-by":"publisher","first-page":"45","DOI":"10.14445\/22315373\/IJMTT-V60P509","volume":"60","author":"A Hussain","year":"2018","unstructured":"Hussain, A., Xu, C., Ali, M.: Security of cloud storage system using various cryptographic techniques. Int. J. Math. Trends Technol 60(1), 45\u201351 (2018)","journal-title":"Int. J. Math. Trends Technol"},{"issue":"2","key":"15_CR6","first-page":"638","volume":"6","author":"S Hakim","year":"2017","unstructured":"Hakim, S., Fouad, M.: Improving data integrity in communication systems by designing a new security hash algorithm. J. Inf. Sci. Comput. Technol. (JISCT) 6(2), 638\u2013647 (2017)","journal-title":"J. Inf. Sci. Comput. Technol. (JISCT)"},{"issue":"23","key":"15_CR7","first-page":"1","volume":"26","author":"MA Wei-Wei","year":"2018","unstructured":"Wei-Wei, M.A.: Research on security encryption for information acquisition under mobile Internet. Elect. Des. Eng. 26(23), 1\u201311 (2018)","journal-title":"Elect. Des. Eng."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Liu, Y., Tong, H., Si, N.: Privacy-preserving hybrid cryptosystem based on chaos theory and ECC algorithm. IEEE (2022)","DOI":"10.1109\/CCAI55564.2022.9807794"},{"issue":"13","key":"15_CR9","doi-asserted-by":"publisher","first-page":"19769","DOI":"10.1007\/s11042-021-10700-x","volume":"80","author":"A Hafsa","year":"2021","unstructured":"Hafsa, A., Sghaier, A., Malek, J., Machhout, M.: Image encryption method based on improved ECC and modified AES algorithm. Multimed. Tools App. 80(13), 19769\u201319801 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10700-x","journal-title":"Multimed. Tools App."},{"issue":"10","key":"15_CR10","first-page":"1","volume":"16","author":"ZR Saeed","year":"2018","unstructured":"Saeed, Z.R., Ayop, Z., Nurul Azma, M., Baharon, R.: Improved cloud storage security of using three layers cryptography algorithms. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 16(10), 1\u20136 (2018)","journal-title":"Int. J. Comput. Sci. Inf. Secur. (IJCSIS)"},{"issue":"1","key":"15_CR11","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.comcom.2019.12.041","volume":"15","author":"S Namasudra","year":"2020","unstructured":"Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., Shanthini, A.: Towards DNA based data security in the cloud computing environment. Comput. Commun. 15(1), 539\u2013547 (2020)","journal-title":"Comput. Commun."},{"key":"15_CR12","first-page":"355","volume":"11","author":"M Rafeek Khan","year":"2023","unstructured":"Rafeek Khan, M., et al.: Analysis of elliptic curvecryptography and RSA. J. ICT Standard. 11, 355\u2013378 (2023)","journal-title":"J. ICT Standard."},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"20037","DOI":"10.1007\/s11042-018-7110-2","volume":"78","author":"W Yu","year":"2019","unstructured":"Yu, W., Liu, Y., Gong, L., Tian, M., Tu, L.: Double-image encryption based on spatiotemporal chaos and DNA operations. Multimed. Tools App. 78, 20037\u201320064 (2019)","journal-title":"Multimed. Tools App."},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s10462-024-10719-0","volume":"57","author":"Sanjay Kumar","year":"2024","unstructured":"Kumar, Sanjay, Sharma, Deepmala: A chaotic based image encryption scheme using ellipticcurve cryptography and genetic algorithm. Artif. Intell. Rev. 57, 87 (2024)","journal-title":"Artif. Intell. Rev."},{"issue":"1","key":"15_CR15","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"X Chai","year":"2019","unstructured":"Chai, X., Gan, Z., Yuan, K., Chen, Y., Liu, X.: A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput. Appl. 31(1), 219\u2013237 (2019)","journal-title":"Neural Comput. Appl."},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s11071-016-3024-6","volume":"87","author":"T Hu","year":"2017","unstructured":"Hu, T., Liu, Y., Gong, L.H., Ouyang, C.J.: An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dyn. 87, 51\u201366 (2017)","journal-title":"Nonlinear Dyn."},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, H., He, S.: Analysis and comparison of permutation entropy, approximate entropy and sample entropy. In: IEEE (2018)","DOI":"10.1109\/IS3C.2018.00060"},{"issue":"2","key":"15_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/math11020457","volume":"11","author":"H Mahalingam","year":"2023","unstructured":"Mahalingam, H., Veeramalai, T., Menon, A.R., Amirtharajan, R.: Dual-domain image encryption in unsecure medium: a secure communication perspective. Mathematics 11(2), 1\u201323 (2023)","journal-title":"Mathematics"},{"issue":"8","key":"15_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/math11081769","volume":"11","author":"H Mahalingam","year":"2023","unstructured":"Mahalingam, H., et al.: Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments. Mathematics 11(8), 1\u201323 (2023)","journal-title":"Mathematics"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:38:12Z","timestamp":1751567892000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_15","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}