{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T12:31:09Z","timestamp":1725971469882},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319763477"},{"type":"electronic","value":"9783319763484"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76348-4_20","type":"book-chapter","created":{"date-parts":[[2018,3,21]],"date-time":"2018-03-21T15:10:42Z","timestamp":1521645042000},"page":"201-208","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dual Image Encryption Technique: Using Logistic Map and Noise"],"prefix":"10.1007","author":[{"given":"Muskaan","family":"Kalra","sequence":"first","affiliation":[]},{"given":"Hemant Kumar","family":"Dua","sequence":"additional","affiliation":[]},{"given":"Reena","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,22]]},"reference":[{"key":"20_CR1","unstructured":"Count on - Transposition Ciphers, counton.org (2006). http:\/\/www.counton.org\/explorer\/codebreaking\/transposition-ciphers.php . Accessed 13 Oct 17"},{"issue":"6","key":"20_CR2","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/0031-3203(92)90074-S","volume":"25","author":"N Bourbakis","year":"1992","unstructured":"Bourbakis, N., Alexopoulos, C.: Picture data encryption using scan patterns. Pattern Recogn. 25(6), 567\u2013581 (1992). https:\/\/doi.org\/10.1016\/0031-3203(92)90074-S . ISSN 0031-3203","journal-title":"Pattern Recogn."},{"issue":"6","key":"20_CR3","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(6), 1259\u20131284 (1998)","journal-title":"Int. J. Bifurc. Chaos"},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"Z-H Guan","year":"2005","unstructured":"Guan, Z.-H., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Phys. Lett. A 346, 153\u2013157 (2005). https:\/\/doi.org\/10.1016\/j.physleta.2005.08.006","journal-title":"Phys. Lett. A"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"N Pareek","year":"2006","unstructured":"Pareek, N., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24, 926\u2013934 (2006). https:\/\/doi.org\/10.1016\/j.imavis.2006.02.021","journal-title":"Image Vis. Comput."},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Zhu, A., Li, L.: Improving for chaotic image encryption algorithm based on logistic map. In: 2010 the 2nd Conference on Environmental Science and Information Application Technology, Wuhan, pp. 211\u2013214 (2010). https:\/\/doi.org\/10.1109\/esiat.2010.5568374","DOI":"10.1109\/esiat.2010.5568374"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"452","DOI":"10.4236\/ijcns.2011.47054","volume":"4","author":"M Mishra","year":"2011","unstructured":"Mishra, M., Mankar, V.H.: Chaotic encryption scheme using 1-D chaotic map. Int. J. Commun. Netw. Syst. Sci. 4, 452\u2013455 (2011). https:\/\/doi.org\/10.4236\/ijcns.2011.47054","journal-title":"Int. J. Commun. Netw. Syst. Sci."},{"key":"20_CR8","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1186\/s40064-016-1959-1","volume":"5","author":"L Liu","year":"2016","unstructured":"Liu, L., Miao, S.: A new image encryption algorithm based on logistic chaotic map with varying parameter. SpringerPlus 5, 289 (2016). PMC. Web, 14 Nov 2017","journal-title":"SpringerPlus"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Saraereh, O.A., Aisafasfeh, Q., Arfoa, A.: Improving a new logistic map as a new chaotic algorithm for image encryption. Mod. Appl. Sci. 7(12) (2013)","DOI":"10.5539\/mas.v7n12p24"},{"key":"20_CR10","doi-asserted-by":"crossref","first-page":"773","DOI":"10.4236\/am.2015.65073","volume":"6","author":"SE Borujeni","year":"2015","unstructured":"Borujeni, S.E., Ehsani, M.S.: Modified logistic maps for cryptographic application. Appl. Math. 6, 773\u2013782 (2015)","journal-title":"Appl. Math."},{"key":"20_CR11","unstructured":"Borwein, J.J., Rose, M.: 19 November 2012. https:\/\/theconversation.com\/explainer-what-is-chaos-theory-10620"},{"key":"20_CR12","unstructured":"Shodhganga: a reservoir of Indian theses. http:\/\/hdl.handle.net\/10603\/25696"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76348-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T06:45:59Z","timestamp":1570949159000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76348-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763477","9783319763484"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76348-4_20","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}