{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:43:28Z","timestamp":1725857008272},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319393773"},{"type":"electronic","value":"9783319393780"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39378-0_7","type":"book-chapter","created":{"date-parts":[[2016,5,28]],"date-time":"2016-05-28T07:40:51Z","timestamp":1464421251000},"page":"70-80","source":"Crossref","is-referenced-by-count":1,"title":["Parallelization of Image Encryption Algorithm Based On Chaotic Neural Networks"],"prefix":"10.1007","author":[{"given":"Dariusz","family":"Burak","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,29]]},"reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1023\/A:1008337631906","volume":"10","author":"D Guo","year":"1999","unstructured":"Guo, D., Cheng, L., Cheng, L.: A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks. Appl. Intell. 10(1), 71\u201384 (1999)","journal-title":"Appl. Intell."},{"issue":"2","key":"7_CR2","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/72.914528","volume":"12","author":"C Chan","year":"2001","unstructured":"Chan, C., Cheng, L.: The convergence properties of a clipped hopfield network and its application in the design of keystream generator. IEEE Trans. Neural Netw. 12(2), 340\u2013348 (2001)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"11","key":"7_CR3","first-page":"118701\/1","volume":"91","author":"M Rachel","year":"2003","unstructured":"Rachel, M., Einat, K., Wolfgang, K.: Public channel cryptography by synchronization of neural networks and chaotic maps. Phys. Rev. Lett. 91(11), 118701\/1\u2013118701\/4 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"7_CR4","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1016\/S0893-6080(03)00124-2","volume":"16","author":"D Karras","year":"2003","unstructured":"Karras, D., Zorkadis, V.: On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators. Neural Netw. 16(5), 899\u2013905 (2003)","journal-title":"Neural Netw."},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1007\/978-3-540-28648-6_100","volume-title":"Advances in Neural Networks - ISNN 2004","author":"S Lian","year":"2004","unstructured":"Lian, S., Chen, G., Cheung, A., Wang, Z.: A chaotic-neural-network-based encryption algorithm for JPEG2000 encoded images. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 627\u2013632. Springer, Heidelberg (2004)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1007\/978-3-540-28648-6_101","volume-title":"Advances in Neural Networks - ISNN 2004","author":"D Xiao","year":"2004","unstructured":"Xiao, D., Liao, X.-F.: A combined hash and encryption scheme by chaotic neural network. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 633\u2013638. Springer, Heidelberg (2004)"},{"issue":"4\u20135","key":"7_CR7","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.physleta.2006.03.069","volume":"356","author":"W Yu","year":"2006","unstructured":"Yu, W., Cao, J.: Cryptography based on delayed chaotic neural networks. Phys. Lett. A 356(4\u20135), 333\u2013338 (2006)","journal-title":"Phys. Lett. A"},{"key":"7_CR8","doi-asserted-by":"crossref","first-page":"1296","DOI":"10.1016\/j.neucom.2008.11.005","volume":"72","author":"S Lian","year":"2009","unstructured":"Lian, S.: A block cipher based on chaotic neural networks. Neurocomputing 72, 1296\u20131301 (2009)","journal-title":"Neurocomputing"},{"issue":"7","key":"7_CR9","doi-asserted-by":"crossref","first-page":"4293","DOI":"10.1016\/j.asoc.2010.05.033","volume":"11","author":"S Lian","year":"2011","unstructured":"Lian, S., Chen, X.: Traceable content protection based on chaos and neural networks. Appl. Soft Comput. 11(7), 4293\u20134301 (2011)","journal-title":"Appl. Soft Comput."},{"issue":"4","key":"7_CR10","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1504\/IJAISC.2013.056841","volume":"3","author":"TA Fadil","year":"2013","unstructured":"Fadil, T.A., Yaakob, S.N., Ahmad, R.B., Yahya, A.: A chaotic neural network-based encryption algorithm for MPEG-2 encoded video signal. Int. J. Artif. Int. Soft Comput. 3(4), 360\u2013371 (2013)","journal-title":"Int. J. Artif. Int. Soft Comput."},{"issue":"5","key":"7_CR11","first-page":"125","volume":"1","author":"W Bielecki","year":"2006","unstructured":"Bielecki, W., Burak, D.: Exploiting loop-level parallelism in the AES algorithm. WSEAS Trans. Comput. 1(5), 125\u2013133 (2006)","journal-title":"WSEAS Trans. Comput."},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1007\/978-3-540-24685-5_108","volume-title":"Computational Science - ICCS 2004","author":"V Beletskyy","year":"2004","unstructured":"Beletskyy, V., Burak, D.: Parallelization of the IDEA algorithm. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 635\u2013638. Springer, Heidelberg (2004)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1007\/978-3-642-55195-6_34","volume-title":"Parallel Processing and Applied Mathematics","author":"D Burak","year":"2014","unstructured":"Burak, D.: Parallelization of encryption algorithm based on chaos system and neural networks. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wa\u015bniewski, J. (eds.) PPAM 2013, Part II. LNCS, vol. 8385, pp. 364\u2013373. Springer, Heidelberg (2014)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-319-19369-4_18","volume-title":"Artificial Intelligence and Soft Computing","author":"D Burak","year":"2015","unstructured":"Burak, D.: Parallelization of a block cipher based on chaotic neural networks. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) Artificial Intelligence and Soft Computing. LNCS, vol. 9120, pp. 191\u2013201. Springer, Heidelberg (2015)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Burak, D.: Parallelization of an encryption algorithm based on a spatiotemporal chaotic system and a chaotic neural network. In: International Conference On Computational Science, ICCS 2015, Procedia Computer Science, vol. 51, pp. 2888\u20132892 (2015)","DOI":"10.1016\/j.procs.2015.05.453"},{"key":"7_CR16","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1016\/j.engappai.2012.01.007","volume":"25","author":"N Bigdeli","year":"2012","unstructured":"Bigdeli, N., Farid, Y., Afshar, K.: A novel image Encryption\/Decryption scheme based on chaotic neural networks. Eng. Appl. Artif. Intell. 25, 753\u2013765 (2012)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"1\u20132","key":"7_CR17","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.matcom.2006.08.008","volume":"75","author":"T Botmart","year":"2007","unstructured":"Botmart, T., Niamsup, P.: Adaptive control and synchronization of the perturbed Chua\u2019s system. Math. Comput. Simul. 75(1\u20132), 37\u201355 (2007)","journal-title":"Math. Comput. Simul."},{"key":"7_CR18","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/S0960-0779(02)00007-3","volume":"14","author":"J Lu","year":"2002","unstructured":"Lu, J., Chen, G., Zhang, S.: The compound structure of a new chaotic attractor. Chaos, Solitons Fractals 14, 669\u2013672 (2002)","journal-title":"Chaos, Solitons Fractals"},{"issue":"3","key":"7_CR19","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1016\/j.cnsns.2007.11.012","volume":"14","author":"D Li","year":"2009","unstructured":"Li, D., Yin, Z.: Connecting the Lorenz and Chen systems via nonlinear control. Commun. Nonlinear Sci. Numer. Simul. 14(3), 655\u2013667 (2009)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"1","key":"7_CR20","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/81.974872","volume":"49","author":"N Masuda","year":"2002","unstructured":"Masuda, N., Aihara, K.: Cryptosystems with discretized chaotic maps. IEEE Trans. Circuits Syst. I: Fundam. Theory Appl. 49(1), 28\u201340 (2002)","journal-title":"IEEE Trans. Circuits Syst. I: Fundam. Theory Appl."},{"issue":"5","key":"7_CR21","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1016\/j.chaos.2007.10.009","volume":"40","author":"D Xiao","year":"2009","unstructured":"Xiao, D., Liao, X., Wei, P.: Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons Fractals 40(5), 2191\u20132199 (2009)","journal-title":"Chaos, Solitons Fractals"},{"issue":"4","key":"7_CR22","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","volume":"41","author":"Y Wang","year":"2009","unstructured":"Wang, Y., Wong, K., Liao, X., Xiang, T., Chen, G.: A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41(4), 1773\u20131783 (2009)","journal-title":"Chaos, Solitons Fractals"},{"key":"7_CR23","unstructured":"Kelly, W., Maslov, V., Pugh, W., Rosser, E., Shpeisman, T., Wonnacott, D.: New User Interface for Petit and Other Extensions. User Guide (1996)"},{"key":"7_CR24","volume-title":"Using OpenMP - Portable Shared Memory Parallel Programming","author":"B Chapman","year":"2007","unstructured":"Chapman, B., Jost, G., van der Pas, R.: Using OpenMP - Portable Shared Memory Parallel Programming. The MIT Press, Cambridge (2007)"},{"key":"7_CR25","unstructured":"OpenMP Application Program Interface. Version 4.0 (2013)"},{"key":"7_CR26","volume-title":"Optimizing Compilers for Modern Architectures: A Dependencebased Approach","author":"R Allen","year":"2001","unstructured":"Allen, R., Kennedy, K.: Optimizing Compilers for Modern Architectures: A Dependencebased Approach. Morgan Kaufmann Publishers Inc, San Francisco (2001)"},{"key":"7_CR27","volume-title":"Compilers: Principles, Techniques, and Tools","author":"A Aho","year":"2006","unstructured":"Aho, A., Lam, M., Sethi, R., Ullman, J.: Compilers: Principles, Techniques, and Tools, 2nd edn. Prentice Hall, Upper Saddle River (2006)","edition":"2"},{"key":"7_CR28","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, vol. 2. John Wiley & Sons, New York (1995)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39378-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T15:16:52Z","timestamp":1498317412000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39378-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319393773","9783319393780"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39378-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}