{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:06:01Z","timestamp":1725905161466},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319633084"},{"type":"electronic","value":"9783319633091"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63309-1_41","type":"book-chapter","created":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T10:09:09Z","timestamp":1500458949000},"page":"445-455","source":"Crossref","is-referenced-by-count":3,"title":["Image Encryption Algorithms Based on Non-uniform Second-Order Reversible Cellular Automata with Balanced Rules"],"prefix":"10.1007","author":[{"given":"Kai","family":"Li","sequence":"first","affiliation":[]},{"given":"Mingyu","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Lvzhou","family":"Li","sequence":"additional","affiliation":[]},{"given":"Juhua","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,20]]},"reference":[{"key":"41_CR1","volume-title":"Applied Cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. Wiley, New York (1996)"},{"key":"41_CR2","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s10440-006-9041-6","volume":"93","author":"A Fuster-Sabater","year":"2006","unstructured":"Fuster-Sabater, A., Caballero-Gil, P.: On the use of cellular automata in symmetric cryptography. Acta. Appl. Math. 93, 215\u2013236 (2006)","journal-title":"Acta. Appl. Math."},{"key":"41_CR3","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/349194.349202","volume":"32","author":"P Sarkar","year":"2000","unstructured":"Sarkar, P.: A brief history of cellular automata. ACM Comput. Surv. 32, 80\u2013107 (2000)","journal-title":"ACM Comput. Surv."},{"key":"41_CR4","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.tcs.2004.11.021","volume":"334","author":"J Kari","year":"2005","unstructured":"Kari, J.: Theory of cellular automata: a survey. Theor. Comput. Sci. 334, 3\u201333 (2005)","journal-title":"Theor. Comput. Sci."},{"key":"41_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/3-540-39799-X_32","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings","author":"S Wolfram","year":"1986","unstructured":"Wolfram, S.: Cryptography with cellular automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429\u2013432. Springer, Heidelberg (1986). doi: 10.1007\/3-540-39799-X_32"},{"key":"41_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/3-540-46416-6_11","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201991","author":"T Habutsu","year":"1991","unstructured":"Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, Donald W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127\u2013140. Springer, Heidelberg (1991). doi: 10.1007\/3-540-46416-6_11"},{"key":"41_CR7","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/12.338094","volume":"43","author":"S Nandi","year":"1994","unstructured":"Nandi, S., Kar, B.K., Chaudhuri, P.P.: Theory and applications of cellular automata in cryptography. IEEE Trans. Comput. 43, 1346\u20131357 (1994)","journal-title":"IEEE Trans. Comput."},{"key":"41_CR8","volume-title":"Cellular Automata and Cooperative Phenomena","author":"H Gutowitz","year":"1993","unstructured":"Gutowitz, H.: Cryptography with dynamical systems. In: Goles, E., Boccara, N. (eds.) Cellular Automata and Cooperative Phenomena. Kluwer, Dordrecht (1993)"},{"key":"41_CR9","first-page":"51","volume":"1","author":"P Guan","year":"1987","unstructured":"Guan, P.: Cellular automaton public-key cryptosystem. Complex Syst. 1, 51\u201356 (1987)","journal-title":"Complex Syst."},{"key":"41_CR10","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.cnsns.2012.05.023","volume":"18","author":"AA Abdo","year":"2013","unstructured":"Abdo, A.A., Lian, S.G., Ismail, I.A., Amin, M., Diab, H.: A cryptosystem based on elementary cellular automata. Commun. Nonlinear Sci. Numer. Simul. 18, 136\u2013147 (2013)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"41_CR11","doi-asserted-by":"crossref","unstructured":"Anghelescu, P.: Encryption algorithm using programmable cellular automata. In: World Congress on Internet Security, pp. 233\u2013239 (2011)","DOI":"10.1109\/NABIC.2010.5716270"},{"key":"41_CR12","doi-asserted-by":"crossref","first-page":"3136","DOI":"10.1016\/j.cnsns.2014.02.005","volume":"19","author":"KM Faraoun","year":"2014","unstructured":"Faraoun, K.M.: Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata. Commun. Nonlinear Sci. Number Simul. 19, 3136\u20133148 (2014)","journal-title":"Commun. Nonlinear Sci. Number Simul."},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"Torres-Huitzil, C.: Hardware realization of a lightweight 2D cellular automata-based cipher for image encryption. In: IEEE Fourth Latin American Symposium on Circuits and Systems, pp. 1\u20134 (2013)","DOI":"10.1109\/LASCAS.2013.6519023"},{"key":"41_CR14","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1016\/j.optcom.2011.10.010","volume":"285","author":"X Wang","year":"2012","unstructured":"Wang, X., Jin, C.: Image encryption using game of life permutation and PWLCM chaotic system. Opt. Commun. 285, 412\u2013417 (2012)","journal-title":"Opt. Commun."},{"key":"41_CR15","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1016\/j.patcog.2006.11.011","volume":"40","author":"RJ Chen","year":"2007","unstructured":"Chen, R.J., Lai, J.L.: Image security system using recursive cellular automata substitution. Pattern Recogn. 40, 1621\u20131631 (2007)","journal-title":"Pattern Recogn."},{"key":"41_CR16","unstructured":"Wolfram, S.: Theory and applications of cellular automata. In: Advanced Series on Comples Systems, vol. 1, pp. 232\u2013246 (1986)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63309-1_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T22:47:53Z","timestamp":1569883673000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63309-1_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319633084","9783319633091"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63309-1_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}