{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:40:12Z","timestamp":1764783612118,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319077758"},{"type":"electronic","value":"9783319077765"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07776-5_28","type":"book-chapter","created":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T14:36:47Z","timestamp":1401115007000},"page":"267-275","source":"Crossref","is-referenced-by-count":6,"title":["Comparisons of Typical Discrete Logistic Map and Henon Map"],"prefix":"10.1007","author":[{"given":"Bingbing","family":"Song","sequence":"first","affiliation":[]},{"given":"Qun","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","first-page":"148","volume":"30","author":"M. Zhan","year":"2008","unstructured":"Zhan, M., Li, G.P.: Property Analysis of a Chaotic Sequence Generating Scheme and Its Improvement. J. Southwest University (Natural Science Edition)\u00a030, 148\u2013151 (2008)","journal-title":"J. Southwest University (Natural Science Edition)"},{"key":"28_CR2","first-page":"71","volume":"32","author":"B. Liu","year":"2005","unstructured":"Liu, B., Zhang, Y.Q., Liu, F.L.: A New Scheme on Perturbing Digital Chaotic Systems. J. Computer Science\u00a032, 71\u201374 (2005)","journal-title":"J. Computer Science"},{"key":"28_CR3","first-page":"628","volume":"28","author":"Y.P. Zhang","year":"2010","unstructured":"Zhang, Y.P., Zuo, F., Zhai, Z.J.: A Color Image Encryption Algorithm Based on Chaotic Chebychev and Variable Parameters Logistic Systems. J. Northwestern Polytechnical University\u00a028, 628\u2013632 (2010)","journal-title":"J. Northwestern Polytechnical University"},{"key":"28_CR4","first-page":"1654","volume":"30","author":"L.N. Ding","year":"2007","unstructured":"Ding, L.N., Ding, Q., Chen, Q.: Design and Statistical Tests for Lorenz Chaotic Sequences Based on FPGA. J. Electron Devices\u00a030, 1654\u20131657 (2007)","journal-title":"J. Electron Devices"},{"key":"28_CR5","first-page":"410","volume":"28","author":"C.H. Jin","year":"2006","unstructured":"Jin, C.H., Yang, Y., Qi, C.D.: A Related-Key Attack on Chaotic Stream Ciphers. J. Electronics & Information Technology\u00a028, 410\u2013414 (2006)","journal-title":"J. Electronics & Information Technology"},{"key":"28_CR6","first-page":"1337","volume":"34","author":"C.H. Jin","year":"2006","unstructured":"Jin, C.H., Yang, Y.: A Divide-and-Conquer Attack on Self-synchronous Chaotic Ciphers. J. Acta Electronica Sinica\u00a034, 1337\u20131341 (2006)","journal-title":"J. Acta Electronica Sinica"},{"key":"28_CR7","first-page":"62","volume":"30","author":"F. Zhang","year":"2013","unstructured":"Zhang, F.: A New Six-Dimensional Chaotic Algorithms and Its Application in Image Encryption. J. Microelectronics & Computer\u00a030, 62\u201365 (2013)","journal-title":"J. Microelectronics & Computer"},{"key":"28_CR8","first-page":"1403","volume":"30","author":"J.L. Wang","year":"2012","unstructured":"Wang, J.L., Cheng, L.Y.: Bifurcations and Chaos of the Model of Rossler System. J. Henan Science\u00a030, 1403\u20131406 (2012)","journal-title":"J. Henan Science"},{"key":"28_CR9","first-page":"82","volume":"40","author":"J.Q. Han","year":"2013","unstructured":"Han, J.Q., Lun, S.X.: Method of Realizing Chaotic Masking Communication Based on Duffing System. J. Computer Science\u00a040, 82\u201384 (2013)","journal-title":"J. Computer Science"},{"key":"28_CR10","first-page":"720","volume":"37","author":"J.L. Fan","year":"2009","unstructured":"Fan, J.L., Zhang, X.F.: Piecewise Logistic Chaotic Map and Its Performance Analysis. J. Acta Electronica Sinica\u00a037, 720\u2013725 (2009)","journal-title":"J. Acta Electronica Sinica"},{"key":"28_CR11","first-page":"396","volume":"32","author":"X.M. Tang","year":"2010","unstructured":"Tang, X.M., Zhao, D.F., Tan, M.C.: Study on an Improved Digital Chaotic Sequence of the Tent Map Applied in the DSSS. J. Yunnan University (Natural Science Edition)\u00a032, 396\u2013399 (2010)","journal-title":"J. Yunnan University (Natural Science Edition)"},{"key":"28_CR12","first-page":"54","volume":"27","author":"H.Z. Sun","year":"2011","unstructured":"Sun, H.Z., Mao, A.X., Su, X.Y., Liu, L., Wei, R.H., Liu, G.: Simulation of the Henon System\u2019s Dynamical Behavior\u2019s by Utlizing MATLAB. J. Shangqiu Teachers College\u00a027, 54\u201357 (2011)","journal-title":"J. Shangqiu Teachers College"},{"key":"28_CR13","first-page":"88","volume":"30","author":"X.Z. Zhao","year":"2009","unstructured":"Zhao, X.Z., Li, Y.R.: Research on the Digital Image Encryption Technology Based on the Logistic Sequence. J. Zhanjiang Normal College\u00a030, 88\u201391 (2009)","journal-title":"J. Zhanjiang Normal College"},{"key":"28_CR14","first-page":"5","volume":"12","author":"H.L. Zhang","year":"2012","unstructured":"Zhang, H.L., Min, F.H., Wang, E.R.: The Comparison for Lyapunov Exponets Calculation Methods. J. Nanjing Normal University (Engineering and Technology Edition)\u00a012, 5\u20139 (2012)","journal-title":"J. Nanjing Normal University (Engineering and Technology Edition)"},{"key":"28_CR15","first-page":"39","volume":"8","author":"D.W. Liao","year":"2008","unstructured":"Liao, D.W., Zhu, W.Q.: Research on Lyapunov Exponents Algorithm and Its Application. J. Wenzhou Vocational & Technical College\u00a08, 39\u201341 (2008)","journal-title":"J. Wenzhou Vocational & Technical College"},{"key":"28_CR16","first-page":"285","volume":"22","author":"L.J. Luo","year":"2005","unstructured":"Luo, L.J., Li, Y.S., Li, T., Dong, Q.T.: Research and Simulation of Lyapunov Exponents. J. Computer Simulation\u00a022, 285\u2013288 (2005)","journal-title":"J. Computer Simulation"},{"key":"28_CR17","first-page":"81","volume":"34","author":"S.L. He","year":"2012","unstructured":"He, S.L., Huang, Y., Huang, J.: Simulation Study on the Properties of Henon Mapping Sequences. J. Kunming University\u00a034, 81\u201383 (2012)","journal-title":"J. Kunming University"},{"key":"28_CR18","first-page":"338","volume":"19","author":"X.K. Liu","year":"2008","unstructured":"Liu, X.K., Sun, X.H., Wan, L.H.: A New Image Encryption Based on Henon Mapping. J. China Jiliang University\u00a019, 338\u2013341 (2008)","journal-title":"J. China Jiliang University"},{"key":"28_CR19","first-page":"61","volume":"16","author":"Y.H. Yu","year":"2004","unstructured":"Yu, Y.H., Liu, W.D.: Analysis of Balance of Chaotic Spreading Spectrum Sequences Based on Logistic-Map and Tent-Map. J. Chongqing University of Posts and Telecommunications (Natural Science)\u00a016, 61\u201364 (2004)","journal-title":"J. Chongqing University of Posts and Telecommunications (Natural Science)"},{"key":"28_CR20","first-page":"1255","volume":"28","author":"N.H. Liao","year":"2006","unstructured":"Liao, N.H., Gao, J.F.: The Chaotic Spreading Sequences Generated by the Extended Chaotic Map and Its Performance Analysis. J. Electronics & Information Technology\u00a028, 1255\u20131257 (2006)","journal-title":"J. Electronics & Information Technology"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data analysis and its Applications, Volume I"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07776-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T04:31:59Z","timestamp":1676867519000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07776-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319077758","9783319077765"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07776-5_28","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}