{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T20:58:43Z","timestamp":1761253123730},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319488899"},{"type":"electronic","value":"9783319488905"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48890-5_12","type":"book-chapter","created":{"date-parts":[[2016,11,26]],"date-time":"2016-11-26T09:18:11Z","timestamp":1480151891000},"page":"119-129","source":"Crossref","is-referenced-by-count":15,"title":["3D Point Cloud Encryption Through Chaotic Mapping"],"prefix":"10.1007","author":[{"given":"Xin","family":"Jin","sequence":"first","affiliation":[]},{"given":"Zhaoxing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chenggen","family":"Song","sequence":"additional","affiliation":[]},{"given":"Chunwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,27]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","first-page":"2123","DOI":"10.1016\/j.optcom.2009.02.044","volume":"282","author":"C Huang","year":"2009","unstructured":"Huang, C., Nien, H.: Multi chaotic systems based pixel shuffle for image encryption. Opt. Commun. 282, 2123\u20132127 (2009)","journal-title":"Opt. Commun."},{"issue":"1","key":"12_CR2","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S Lian","year":"2005","unstructured":"Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos Soliton. Fract. 26(1), 117\u2013129 (2005)","journal-title":"Chaos Soliton. Fract."},{"key":"12_CR3","doi-asserted-by":"crossref","first-page":"6303","DOI":"10.1007\/s11042-015-2573-x","volume":"75","author":"P Zhen","year":"2015","unstructured":"Zhen, P., Zhao, G., Min, L.Q., Jin, X.: Chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tools Appl. (MTA) 75, 6303\u20136319 (2015)","journal-title":"Multimedia Tools Appl. (MTA)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Wang YZ., Ren GY., Jiang JL., Zhang J., Sun L.J.: Image encryption method based on chaotic map. In: 2nd IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 2558\u20132560 (2007)","DOI":"10.1109\/ICIEA.2007.4318874"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1007\/978-3-319-27671-7_47","volume-title":"MultiMedia Modeling","author":"X Jin","year":"2016","unstructured":"Jin, X., et al.: Private video foreground extraction through chaotic mapping based encryption in the cloud. In: Tian, Q., Sebe, N., Qi, G.-J., Huet, B., Hong, R., Liu, X. (eds.) MMM 2016. LNCS, vol. 9516, pp. 562\u2013573. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-27671-7_47"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Jin, X., Tian, Y., Song, C., Wei, G., Li, X., Zhao, G., Wang, H.: An invertible and anti-chosen plaintext attack image encryption method based on DNA encoding and chaotic mapping. In: Chinese Automation Congress (CAC), Wuhan, China, 2015, pp. 11.27\u2013 11.29 (2015)","DOI":"10.1109\/CAC.2015.7382673"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-319-25417-3_20","volume-title":"Biometric Recognition","author":"X Jin","year":"2015","unstructured":"Jin, X., Liu, Y., Li, X., Zhao, G., Chen, Y., Guo, K.: Privacy preserving face identification in the cloud through sparse representation. In: Yang, J., Yang, J., Sun, Z., Shan, S., Zheng, W., Feng, J. (eds.) Biometric Recognition. LNCS, vol. 9428, pp. 160\u2013167. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-25417-3_20"},{"key":"12_CR8","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-662-48683-2_8","volume-title":"Applications and Techniques in Information Security","author":"X Jin","year":"2015","unstructured":"Jin, X., Chen, Y., Ge, S., Zhang, K., Li, X., Li, Y., Liu, Y., Guo, K., Tian, Y., Zhao, G., Zhang, X., Wang, Z.: Color image encryption in CIE L*a*b* space. In: Niu, W., Li, G., Liu, J., Tan, J., Guo, L., Han, Z., Batten, L. (eds.) ATIS 2015. CCIS, vol. 557, pp. 74\u201385. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-48683-2_8"},{"key":"12_CR9","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-48683-2_1","volume-title":"Applications and Techniques in Information Security","author":"Y Li","year":"2015","unstructured":"Li, Y., et al.: An image encryption algorithm based on Zigzag transformation and 3-Dimension chaotic Logistic map. In: Niu, W., Li, G., Liu, J., Tan, J., Guo, L., Han, Z., Batten, L. (eds.) ATIS 2015. CCIS, vol. 557, pp. 3\u201313. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-48683-2_1"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-319-19644-2_36","volume-title":"Hybrid Artificial Intelligent Systems","author":"AM Rey del","year":"2015","unstructured":"del Rey, A.M.: A method to encrypt 3D solid objects based on three-dimensional cellular automata. In: Onieva, E., Santos, I., Osaba, E., Quinti\u00e1n, H., Corchado, E. (eds.) HAIS 2015. LNCS (LNAI), vol. 9121, pp. 427\u2013438. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-19644-2_36"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Rusu, R.B., Blodow, N., Beetz, M.: Fast point feature histograms (FPFH) for 3D registration. In: IEEE International Conference on Robotics and Automation (2009)","DOI":"10.1109\/ROBOT.2009.5152473"},{"key":"12_CR12","unstructured":"\u00c9luard M., Maetz Y., Do\u00ebrr G.: Geometry-preserving encryption for 3D meshes. In: Compression Et Repr\u00e9sentation Des Signaux Audiovisuels (2013)"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing - PCM 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48890-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:33:47Z","timestamp":1498350827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48890-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319488899","9783319488905"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48890-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}