{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:11:35Z","timestamp":1743131495791,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_12","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T07:34:29Z","timestamp":1479886469000},"page":"225-240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Performance Evaluation of Modified Henon Map in Image Encryption"],"prefix":"10.1007","author":[{"given":"S. J.","family":"Sheela","sequence":"first","affiliation":[]},{"given":"K. V.","family":"Suresh","sequence":"additional","affiliation":[]},{"given":"Deepaknath","family":"Tandur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"issue":"2","key":"12_CR1","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s11042-010-0652-6","volume":"56","author":"IS Sam","year":"2012","unstructured":"Sam, I.S., Devaraj, P., Bhuvaneswaran, R.S.: A novel image cipher based on mixed transformed logistic maps. Multimedia Tools Appl. 56(2), 315\u2013330 (2012). doi:\n                      10.1007\/s11042-010-0652-6","journal-title":"Multimedia Tools Appl."},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Optics Lasers Eng. 78, 17\u201325 (2016). doi:\n                      10.1016\/j.optlaseng.2015.09.007","journal-title":"Optics Lasers Eng."},{"key":"12_CR3","doi-asserted-by":"publisher","unstructured":"Yaghoobi, M.: A new approach for image encryption using chaotic logistic map. In: IEEE International Conference on Advanced Computer Theory and Engineering, pp. 585\u2013590 (2008). doi:\n                      10.1109\/ICACTE.2008.177","DOI":"10.1109\/ICACTE.2008.177"},{"issue":"2","key":"12_CR4","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s11220-012-0071-z","volume":"13","author":"AAA El-Latif","year":"2012","unstructured":"El-Latif, A.A.A., Li, L., Zhang, T., Wang, N., Song, X., Niu, X.: Digital image encryption scheme based on multiple chaotic systems. Int. J. Sens. Imaging 13(2), 67\u201388 (2012). doi:\n                      10.1007\/s11220-012-0071-z","journal-title":"Int. J. Sens. Imaging"},{"issue":"3","key":"12_CR5","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag. 1(3), 6\u201321 (2001). doi:\n                      10.1109\/7384.963463","journal-title":"IEEE Circuits Syst. Mag."},{"issue":"9","key":"12_CR6","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926\u2013934 (2006). doi:\n                      10.1016\/j.imavis.2006.02.021","journal-title":"Image Vis. Comput."},{"issue":"3","key":"12_CR7","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1016\/j.chaos.2008.01.028","volume":"38","author":"F Sun","year":"2008","unstructured":"Sun, F., Liu, S., Li, Z., Lu, Z.: A novel image encryption scheme based on spatial chaos map. Chaos, Solitons Fractals 38(3), 631\u2013640 (2008). doi:\n                      10.1016\/j.chaos.2008.01.028","journal-title":"Chaos, Solitons Fractals"},{"issue":"1","key":"12_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/BF01608556","volume":"50","author":"M Henon","year":"1976","unstructured":"Henon, M.: A two-dimensional mapping with a strange attractor. Commun. Math. Phys. 50(1), 69\u201377 (1976). doi:\n                      10.1007\/BF01608556","journal-title":"Commun. Math. Phys."},{"key":"12_CR9","doi-asserted-by":"publisher","unstructured":"Soleymani, A., Nordin, M.J., Sundararajan, E.: A chaotic cryptosystem for images based on Henon and Arnold cat map. Sci. World J. (2014). doi:\n                      10.1155\/2014\/536930","DOI":"10.1155\/2014\/536930"},{"issue":"4","key":"12_CR10","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1109\/JSYST.2013.2246011","volume":"8","author":"B Bakhache","year":"2014","unstructured":"Bakhache, B., Ghazal, J.M., El Assad, S.: Improvement of the security of zigbee by a new chaotic algorithm. IEEE Syst. J. 8(4), 1024\u20131033 (2014). doi:\n                      10.1109\/JSYST.2013.2246011","journal-title":"IEEE Syst. J."},{"issue":"5","key":"12_CR11","doi-asserted-by":"publisher","first-page":"395","DOI":"10.4103\/0256-4602.103173","volume":"29","author":"MK Mandal","year":"2012","unstructured":"Mandal, M.K., Banik, G.D., Chattopadhyay, D., Nandi, D.: An image encryption process based on chaotic logistic map. IETE Tech. Rev. 29(5), 395\u2013404 (2012). doi:\n                      10.4103\/0256-4602.103173","journal-title":"IETE Tech. Rev."},{"issue":"2","key":"12_CR12","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/s11235-011-9461-0","volume":"52","author":"CK Huang","year":"2013","unstructured":"Huang, C.K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun. Syst. 52(2), 563\u2013571 (2013). doi:\n                      10.1007\/s11235-011-9461-0","journal-title":"Telecommun. Syst."},{"issue":"4","key":"12_CR13","doi-asserted-by":"publisher","first-page":"2411","DOI":"10.1007\/s11071-011-0155-7","volume":"67","author":"X Huang","year":"2012","unstructured":"Huang, X.: Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 67(4), 2411\u20132417 (2012). doi:\n                      10.1007\/s11071-011-0155-7","journal-title":"Nonlinear Dyn."},{"issue":"4","key":"12_CR14","doi-asserted-by":"publisher","first-page":"2079","DOI":"10.1007\/s11071-012-0409-z","volume":"69","author":"G Ye","year":"2012","unstructured":"Ye, G., Wong, K.W.: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69(4), 2079\u20132087 (2012). doi:\n                      10.1007\/s11071-012-0409-z","journal-title":"Nonlinear Dyn."},{"key":"12_CR15","series-title":"Textbooks in Mathematical Sciences","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59281-2","volume-title":"Chaos: An Introduction to Dynamic systems","author":"KT Alligood","year":"1997","unstructured":"Alligood, K.T., Sauer, T.D., Yorke, J.A.: Chaos: An Introduction to Dynamic systems. Textbooks in Mathematical Sciences. Springer, NewYork (1997)"},{"issue":"1","key":"12_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Optics Commun. 285(1), 29\u201337 (2012). doi:\n                      10.1016\/j.optcom.2011.08.079","journal-title":"Optics Commun."},{"issue":"3","key":"12_CR17","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/97.995823","volume":"9","author":"Z Wang","year":"2002","unstructured":"Wang, Z., Bovik, A.C.: A universal image quality index. IEEE Sign. Proces. Lett. 9(3), 81\u201384 (2002). doi:\n                      10.1109\/97.995823","journal-title":"IEEE Sign. Proces. Lett."},{"issue":"4","key":"12_CR18","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Proces. 13(4), 600\u2013612 (2004). doi:\n                      10.1109\/TIP.2003.819861","journal-title":"IEEE Trans. Image Proces."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:39:02Z","timestamp":1558316342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"24 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iciss16.mnit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}