{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:49:34Z","timestamp":1725857374078},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319410081"},{"type":"electronic","value":"9783319410098"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41009-8_28","type":"book-chapter","created":{"date-parts":[[2016,6,14]],"date-time":"2016-06-14T04:49:28Z","timestamp":1465879768000},"page":"263-270","source":"Crossref","is-referenced-by-count":0,"title":["Image Encryption Technology Based on Chaotic Hash Function and DNA Splicing Model"],"prefix":"10.1007","author":[{"given":"Guoyu","family":"Lv","sequence":"first","affiliation":[]},{"given":"Changjun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Hongye","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,15]]},"reference":[{"key":"28_CR1","first-page":"6","volume":"39","author":"CC Wen","year":"2012","unstructured":"Wen, C.C., Wang, Q., Miao, X.N., Liu, X.H., Peng, Y.X.: Digital image encryption: a survey. J. Comput. Sci. 39, 6\u20139 (2012)","journal-title":"J. Comput. Sci."},{"issue":"6","key":"28_CR2","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1016\/j.optcom.2009.10.106","volume":"283","author":"A Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., Mckevitt, P.: A hash-based image encryption algorithm. J. Opt. Commun. 283(6), 879\u2013893 (2010)","journal-title":"J. Opt. Commun."},{"issue":"18","key":"28_CR3","doi-asserted-by":"crossref","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang, Q., Guo, L., Wei, X.P.: A novel image fusion encryption algorithm based on dna sequence operation and hyper-chaotic system. J. Light Electron Opt. 124(18), 3596\u20133600 (2013)","journal-title":"J. Light Electron Opt."},{"key":"28_CR4","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1007\/s11071-010-9821-4","volume":"63","author":"XY Wang","year":"2011","unstructured":"Wang, X.Y., Wang, X.J., Zhao, J.F., Zhang, Z.F.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. J. Nonlinear Dyn. 63, 587\u2013597 (2011)","journal-title":"J. Nonlinear Dyn."},{"issue":"9","key":"28_CR5","first-page":"863","volume":"49","author":"J Xu","year":"2004","unstructured":"Xu, J., Li, S.P., Dong, Y.F., Wei, X.P.: Sticker DNA computer model \u2013 PartII: application. J. Chin. Sci. Bull. 49(9), 863\u2013871 (2004)","journal-title":"J. Chin. Sci. Bull."},{"issue":"3","key":"28_CR6","doi-asserted-by":"crossref","first-page":"2363","DOI":"10.1364\/OE.20.002363","volume":"20","author":"C Fu","year":"2012","unstructured":"Fu, C., et al.: A chaos-based digital image encryption scheme with an improved diffusion strategy. J. Opt. Express 20(3), 2363\u20132378 (2012)","journal-title":"J. Opt. Express"},{"issue":"3","key":"28_CR7","first-page":"13","volume":"80","author":"S Elnashaie","year":"2011","unstructured":"Elnashaie, S., Abashar, M.E.: On the chaotic behaviour of forced fluidized bed catalytic reactors. J. Chaos Solitons Fractals 80(3), 13\u201317 (2011)","journal-title":"J. Chaos Solitons Fractals"},{"issue":"8","key":"28_CR8","first-page":"772","volume":"49","author":"J Xu","year":"2004","unstructured":"Xu, J., Dong, Y.F., Wei, X.P.: Sticker DNA computer model \u2013 Part I: theory. J. Chin. Sci. Bull. 49(8), 772\u2013780 (2004)","journal-title":"J. Chin. Sci. Bull."},{"key":"28_CR9","unstructured":"Zhou, K., Wei, C.J., Cheng, Z., Huang, Y.F.: Study of DNA computing model. J. Comput. Eng. Appl. (2009)"},{"issue":"2","key":"28_CR10","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/S0303-2647(00)00091-5","volume":"57","author":"T Head","year":"2000","unstructured":"Head, T., Rozenberg, G., Bladergroen, R.S., Breek, C.K., Lommerse, P.H., Spaink, H.P.: Computing with DNA by operating on plasmids. J. BioSyst. 57(2), 87\u201393 (2000)","journal-title":"J. BioSyst."},{"issue":"10","key":"28_CR11","doi-asserted-by":"crossref","first-page":"1904","DOI":"10.1166\/jctn.2010.1558","volume":"7","author":"CJ Zhou","year":"2010","unstructured":"Zhou, C.J., Wei, X.P., Zhang, Q., Liu, R.: DNA sequence splicing with chaotic maps for image encryption. J. Comput. Theoret. Nanosci. 7(10), 1904\u20131910 (2010)","journal-title":"J. Comput. Theoret. Nanosci."}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41009-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T16:19:25Z","timestamp":1498321165000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41009-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319410081","9783319410098"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41009-8_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}