{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:38:32Z","timestamp":1742978312452,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319473635"},{"type":"electronic","value":"9783319473642"}],"license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-47364-2_58","type":"book-chapter","created":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T12:41:56Z","timestamp":1475239316000},"page":"595-606","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Analysis of a New Bit-Level Permutation Image Encryption Algorithm"],"prefix":"10.1007","author":[{"given":"Adrian-Viorel","family":"Diaconu","sequence":"first","affiliation":[]},{"given":"Valeriu","family":"Ionescu","sequence":"additional","affiliation":[]},{"given":"Jose Manuel","family":"Lopez-Guede","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,1]]},"reference":[{"key":"58_CR1","doi-asserted-by":"crossref","unstructured":"Diaconu, A.V., Ionescu, V.M., Iana, G., Lope-Guede, J.M.: A new bit-level permutation image encryption algorithm. In: International Conference on Communications, COMM 2016, Bucharest, Romania, 9\u201311 June 2016","DOI":"10.1109\/ICComm.2016.7528310"},{"issue":"8","key":"58_CR2","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1016\/j.image.2014.04.001","volume":"29","author":"R Boriga","year":"2014","unstructured":"Boriga, R., D\u0103sc\u0103lescu, A.C., Priescu, I.: A new hyperchaotic map and its application in an image encryption scheme. Signal Process. Image 29(8), 887\u2013901 (2014)","journal-title":"Signal Process. Image"},{"key":"58_CR3","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu, Y., Zhou, Y., Noonan, J.P., Agaian, S.: Design of image cipher using Latin squares. Inf. Sci. 264, 317\u2013339 (2014)","journal-title":"Inf. Sci."},{"key":"58_CR4","doi-asserted-by":"crossref","unstructured":"Wu, Y., Zhou, Y., Noonan, J.P., Panetta, K., Agaian, S.: Image encryption using the Sudoku matrix. In: Proceedings of SPIE 7708, pp. 77080P-1\u201377080P-12 (2010)","DOI":"10.1117\/12.853197"},{"key":"58_CR5","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/848392","author":"A-V Diaconu","year":"2013","unstructured":"Diaconu, A.-V., Loukhaoukha, K.: An improved secure image encryption algorithm based on Rubik\u2019s cube principle and digital chaotic map. Math. Prob. Eng. (2013). doi:10.1155\/2013\/848392","journal-title":"Math. Prob. Eng."},{"issue":"6","key":"58_CR6","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"Z-L Zhu","year":"2011","unstructured":"Zhu, Z.-L., Zhang, W., Wong, K.-W., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6), 1171\u20131186 (2011)","journal-title":"Inf. Sci."},{"key":"58_CR7","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou, Y., Bao, L., Chen, C.L.P.: A new 1D chaotic system for image encryption. Signal Process. 97, 172\u2013182 (2014)","journal-title":"Signal Process."},{"key":"58_CR8","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar, R., Abdullah, A.H., Isnin, I.F.: Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng. 56, 83\u201393 (2014)","journal-title":"Opt. Lasers Eng."},{"key":"58_CR9","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.optlaseng.2014.06.003","volume":"62","author":"L Sui","year":"2014","unstructured":"Sui, L., Duan, K., Liang, J., Zhang, Z., Meng, H.: Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain. Opt. Lasers Eng. 62, 139\u2013152 (2014)","journal-title":"Opt. Lasers Eng."},{"key":"58_CR10","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1016\/j.optlaseng.2013.05.011","volume":"51","author":"H Li","year":"2013","unstructured":"Li, H., Wang, Y., Yan, H., Li, L., Li, Q., Zhao, X.: Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform. Opt. Lasers Eng. 51, 1327\u20131331 (2013)","journal-title":"Opt. Lasers Eng."},{"key":"58_CR11","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Lasers Eng. 66, 10\u201318 (2015)","journal-title":"Opt. Lasers Eng."},{"key":"58_CR12","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s11071-012-0747-x","volume":"72","author":"XY Wang","year":"2013","unstructured":"Wang, X.Y., Wang, X.M.: A novel block cryptosystem based on the coupled chaotic map lattice. Nonlinear Dyn. 72, 707\u2013715 (2013)","journal-title":"Nonlinear Dyn."},{"key":"58_CR13","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.asoc.2014.09.039","volume":"26","author":"Y-Q Zhan","year":"2015","unstructured":"Zhan, Y.-Q., Wang, X.-Y.: A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput. 26, 10\u201320 (2015)","journal-title":"Appl. Soft Comput."},{"key":"58_CR14","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"Y-Q Zhan","year":"2014","unstructured":"Zhan, Y.-Q., Wang, X.-Y.: A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf. Sci. 273, 329\u2013351 (2014)","journal-title":"Inf. Sci."},{"key":"58_CR15","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s11071-013-0969-6","volume":"73","author":"AC D\u0103sc\u0103lescu","year":"2013","unstructured":"D\u0103sc\u0103lescu, A.C., Boriga, R.: A novel fast chaos-based algorithm for generating random permutations with high shift factor suitable for image scrambling. Nonlinear Dyn. 73, 307\u2013318 (2013)","journal-title":"Nonlinear Dyn."},{"key":"58_CR16","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1016\/j.cnsns.2010.05.008","volume":"16","author":"C Li","year":"2011","unstructured":"Li, C., Li, S., Lo, K.-T.: Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 16, 837\u2013843 (2011)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"58_CR17","first-page":"313","volume":"16","author":"A-V Diaconu","year":"2015","unstructured":"Diaconu, A.-V.: KenKen puzzle-based image encryption algorithm. Proc. Rom. Acad., Ser. A 16, 313\u2013320 (2015)","journal-title":"Proc. Rom. Acad., Ser. A"},{"key":"58_CR18","doi-asserted-by":"publisher","unstructured":"Diaconu A.-V.: Circular inter-intra pixels bit-level permutation and chaos based image encryption. Inf. Sci. (in press). doi:10.1016\/j.ins.2015.10.027","DOI":"10.1016\/j.ins.2015.10.027"},{"key":"58_CR19","doi-asserted-by":"crossref","unstructured":"Boriga, R., Dascalescu, A.-C., Diaconu A.-V.: Study of a new chaotic dynamical system and its usage in a novel pseudorandom bit generator, Math. Prob. Eng. 2015, Article. ID 769108 (2013)","DOI":"10.1155\/2013\/769108"},{"key":"58_CR20","doi-asserted-by":"publisher","first-page":"3075","DOI":"10.1016\/j.cnsns.2013.04.008","volume":"18","author":"X Wang","year":"2013","unstructured":"Wang, X., Luan, D.: A novel image encryption algorithm using a chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simulat. 18, 3075\u20133085 (2013)","journal-title":"Commun. Nonlinear Sci. Numer. Simulat."},{"key":"58_CR21","doi-asserted-by":"publisher","first-page":"3329","DOI":"10.1016\/j.ijleo.2012.11.002","volume":"124","author":"C-Y Song","year":"2013","unstructured":"Song, C.-Y., Qiao, Y.-L., Zhang, X.-Z.: An image encryption scheme based on new spatiotemporal chaos. Optik 124, 3329\u20133334 (2013)","journal-title":"Optik"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201916-CISIS\u201916-ICEUTE\u201916"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47364-2_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T02:11:53Z","timestamp":1699841513000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-47364-2_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,1]]},"ISBN":["9783319473635","9783319473642"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47364-2_58","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016,10,1]]},"assertion":[{"value":"1 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEUTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on EUropean Transnational Education","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Sebasti\u00e1n","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceute2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}