{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:25:46Z","timestamp":1725978346769},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319911915"},{"type":"electronic","value":"9783319911922"}],"license":[{"start":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T00:00:00Z","timestamp":1526515200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91192-2_7","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T13:45:41Z","timestamp":1526478341000},"page":"63-73","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Robust and Lightweight Image Encryption Approach Using Public Key Cryptosystem"],"prefix":"10.1007","author":[{"given":"Shima Ramesh","family":"Maniyath","sequence":"first","affiliation":[]},{"given":"V.","family":"Thanikaiselvan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"key":"7_CR1","volume-title":"Serious Cryptography: A Practical Introduction to Modern Encryption","author":"J-P Aumasson","year":"2017","unstructured":"Aumasson, J.-P.: Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, San Francisco (2017)"},{"key":"7_CR2","doi-asserted-by":"publisher","DOI":"10.1201\/b16309","volume-title":"Image Encryption: A Communication Perspective","author":"FE Abd El-Samie","year":"2013","unstructured":"Abd El-Samie, F.E., Ahmed, H.E.H., Elashry, I.F., Shahieen, M.H.: Image Encryption: A Communication Perspective. CRC Press, Boca Raton (2013)"},{"doi-asserted-by":"crossref","unstructured":"Mancy, L., Vigila S, M.C.: A survey on protection of medical images. In: 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, pp. 503\u2013506 (2015)","key":"7_CR3","DOI":"10.1109\/ICCICCT.2015.7475331"},{"doi-asserted-by":"crossref","unstructured":"Shunmugan, S., Rani, P.A.J.: Encryption-then-compression techniques: a survey. In: 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, pp. 675\u2013679 (2016)","key":"7_CR4","DOI":"10.1109\/ICCICCT.2016.7988037"},{"doi-asserted-by":"crossref","unstructured":"Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps: a survey. In: 2014 Fifth International Conference on Signal and Image Processing, Jeju Island, pp. 102\u2013107 (2014)","key":"7_CR5","DOI":"10.1109\/ICSIP.2014.80"},{"key":"7_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50796-5","volume-title":"Data Protection and Privacy: (In)visibilities and Infrastructures","author":"R Leenes","year":"2017","unstructured":"Leenes, R., van Brakel, R., Gutwirth, S., De Hert, P.: Data Protection and Privacy: (In)visibilities and Infrastructures. Springer, New York (2017)"},{"doi-asserted-by":"crossref","unstructured":"Li, W.: Correlation based cryptanalysis on a chaotic encryption of JPEG image. In: 2014 7th International Congress on Image and Signal Processing, Dalian, pp. 628\u2013632 (2014)","key":"7_CR7","DOI":"10.1109\/CISP.2014.7003855"},{"issue":"5","key":"7_CR8","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1016\/j.ipm.2009.07.001","volume":"46","author":"S-C Shie","year":"2010","unstructured":"Shie, S.-C., Lin, S.D., Jiang, J.-H.: Visually imperceptible image hiding scheme based on vector quantization. Elsevier-Inf. Process. Manag. 46(5), 495\u2013501 (2010)","journal-title":"Elsevier-Inf. Process. Manag."},{"key":"7_CR9","volume-title":"Information Hiding Text in Image: Encryption","author":"H Hasan","year":"2012","unstructured":"Hasan, H., Kareem, S.A., Jaleel, J.: Information Hiding Text in Image: Encryption. Lap Lambert Academic Publishing GmbH KG, Saarbr\u00fccken (2012)"},{"key":"7_CR10","volume-title":"Improving Information Security Practices through Computational Intelligence","author":"WS Awad","year":"2015","unstructured":"Awad, W.S.: Improving Information Security Practices through Computational Intelligence. IGI Global, Hershey (2015)"},{"unstructured":"A-Rammahi, A.: Encryption image using small order linear systems and repeated modular numbers. In: Proceedings of the World Congress on Engineering, vol. II (2014)","key":"7_CR11"},{"key":"7_CR12","first-page":"13","volume":"2012","author":"K Loukhaoukha","year":"2012","unstructured":"Loukhaoukha, K., Chouinard, J.-Y., Berdai, A.: Research article a secure image encryption algorithm based on Rubik\u2019s cube principle. Hindawi Publ. Corp. J. Electr. Comput. Eng. 2012, 13 (2012)","journal-title":"Hindawi Publ. Corp. J. Electr. Comput. Eng."},{"key":"7_CR13","first-page":"11","volume":"2012","author":"S Al-Maadeed","year":"2012","unstructured":"Al-Maadeed, S., Al-Ali, A., Abdalla, T.: Research article a new chaos-based image-encryption and compression algorithm. Hindawi Publ. Corp. J. Electr. Comput. Eng. 2012, 11 (2012)","journal-title":"Hindawi Publ. Corp. J. Electr. Comput. Eng."},{"key":"7_CR14","first-page":"7","volume":"2014","author":"J Zhang","year":"2014","unstructured":"Zhang, J., Zhang, Y.: Research article an image encryption algorithm based on balanced pixel and chaotic map. Hindawi Publ. Corp. Math. Prob. Eng. 2014, 7 (2014)","journal-title":"Hindawi Publ. Corp. Math. Prob. Eng."},{"key":"7_CR15","first-page":"10","volume":"2015","author":"SS Askar","year":"2015","unstructured":"Askar, S.S., Karawia, A.A., Alshamrani, A.: Research article image encryption algorithm based on chaotic economic model. Hindawi Publ. Corp. Math. Probl. Eng. 2015, 10 (2015)","journal-title":"Hindawi Publ. Corp. Math. Probl. Eng."},{"key":"7_CR16","first-page":"13","volume":"2014","author":"G Yang","year":"2014","unstructured":"Yang, G., Jin, H., Bai, N.: Research article image encryption using the chaotic josephus matrix. Hindawi Publ. Corp. Math. Probl. Eng. 2014, 13 (2014)","journal-title":"Hindawi Publ. Corp. Math. Probl. Eng."},{"key":"7_CR17","first-page":"15","volume":"2016","author":"F A-Perez","year":"2016","unstructured":"A-Perez, F., C-Hern\u00e1ndez, C., M-Escobar, M.A., L-Guti\u00e9rrez, R.M., A-Delgado, A.: Research article A fingerprint image encryption scheme based on hyperchaotic R\u00f6ssler Map. Hindawi Publ. Corp. Math. Probl. Eng. 2016, 15 (2016)","journal-title":"Hindawi Publ. Corp. Math. Probl. Eng."},{"key":"7_CR18","first-page":"9","volume":"2017","author":"Y Niu","year":"2017","unstructured":"Niu, Y., Zhang, X., Han, F.: Research article image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Hindawi Comput. Intell. Neurosci. 2017, 9 (2017)","journal-title":"Hindawi Comput. Intell. Neurosci."},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/ACCESS.2014.2371994","volume":"2","author":"W Lu","year":"2014","unstructured":"Lu, W., Varna, A.L., Wu, M.: Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2, 125\u2013141 (2014)","journal-title":"IEEE Access"},{"key":"7_CR20","first-page":"11","volume":"2017","author":"X Zhang","year":"2017","unstructured":"Zhang, X., Han, F., Niu, Y.: Research article chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Hindawi Comput. Intell. Neurosci. 2017, 11 (2017)","journal-title":"Hindawi Comput. Intell. Neurosci."},{"key":"7_CR21","first-page":"13","volume":"2017","author":"M Mikhail","year":"2017","unstructured":"Mikhail, M., Abouelseoud, Y., ElKobrosy, G.: Research article two-phase image encryption scheme based on FFCT and fractals. Hindawi Secur. Commun. Netw. 2017, 13 (2017)","journal-title":"Hindawi Secur. Commun. Netw."},{"issue":"2","key":"7_CR22","first-page":"1","volume":"8","author":"W Chen","year":"2016","unstructured":"Chen, W.: Optical multiple-image encryption using three-dimensional space. IEEE Photonics J. 8(2), 1\u20138 (2016)","journal-title":"IEEE Photonics J."},{"issue":"4","key":"7_CR23","first-page":"1","volume":"8","author":"X Li","year":"2016","unstructured":"Li, X., et al.: Multiple-image encryption based on compressive ghost imaging and coordinate sampling. IEEE Photonics J. 8(4), 1\u201311 (2016)","journal-title":"IEEE Photonics J."},{"issue":"2","key":"7_CR24","first-page":"1","volume":"9","author":"X Wang","year":"2017","unstructured":"Wang, X., Zhou, G., Dai, C., Chen, J.: Optical image encryption with divergent illumination and asymmetric keys. IEEE Photonics J. 9(2), 1\u20138 (2017)","journal-title":"IEEE Photonics J."},{"key":"7_CR25","first-page":"6429","volume":"5","author":"X Wu","year":"2017","unstructured":"Wu, X., Zhu, B., Hu, Y., Ran, Y.: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5, 6429\u20136436 (2017)","journal-title":"IEEE Access"},{"unstructured":"El-Latif, A.A.A., Abd-El-Atty, B., Talha, M.: Robust encryption of quantum medical images. IEEE Access, PP(99), 1","key":"7_CR26"},{"unstructured":"Hamza, R., Muhammad, K., Nachiappan, A., Gonz\u00e1lez, G.R.: Hash based encryption for keyframes of diagnostic hysteroscopy. IEEE Access, PP(99), 1","key":"7_CR27"},{"key":"7_CR28","first-page":"11","volume":"2017","author":"H Fan","year":"2017","unstructured":"Fan, H., Li, M.: Research article cryptanalysis and improvement of chaos-based image encryption scheme with circular inter-intra-pixels bit-level permutation. Hindawi Math. Probl. Eng. 2017, 11 (2017)","journal-title":"Hindawi Math. Probl. Eng."},{"key":"7_CR29","first-page":"10","volume":"2017","author":"J-F Zhao","year":"2017","unstructured":"Zhao, J.-F., Wang, S.-Y., Zhang, L.-T., Wang, X.-Y.: Research article image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map. Hindawi J. Electr. Comput. Eng. 2017, 10 (2017)","journal-title":"Hindawi J. Electr. Comput. Eng."},{"key":"7_CR30","first-page":"13","volume":"2017","author":"T Li","year":"2017","unstructured":"Li, T., Yang, M., Wu, J., Jing, X.: Research article A novel image encryption algorithm based on a fractional-order hyperchaotic system and DNA computing. Hindawi Complex. 2017, 13 (2017)","journal-title":"Hindawi Complex."},{"key":"7_CR31","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.procs.2015.06.054","volume":"54","author":"Laiphrakpam Dolendro Singh","year":"2015","unstructured":"Singh, L.D., Singh, K.M.: Image encryption using elliptic curve cryptography. In: Elsevier-Eleventh International Multi-Conference on Information Processing, vol. 54, pp. 472\u2013481 (2015)","journal-title":"Procedia Computer Science"}],"container-title":["Advances in Intelligent Systems and Computing","Cybernetics and Algorithms in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91192-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T23:51:50Z","timestamp":1571356310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91192-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,17]]},"ISBN":["9783319911915","9783319911922"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91192-2_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,5,17]]}}}