{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:15:49Z","timestamp":1725491749718},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748267"},{"type":"electronic","value":"9783540748274"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74827-4_27","type":"book-chapter","created":{"date-parts":[[2007,9,11]],"date-time":"2007-09-11T19:35:16Z","timestamp":1189539316000},"page":"209-216","source":"Crossref","is-referenced-by-count":0,"title":["Improvement of an Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems"],"prefix":"10.1007","author":[{"given":"Chen","family":"Dong","sequence":"first","affiliation":[]},{"given":"Jifang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lifeng","family":"Xi","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Ran","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"27_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"27_CR2","first-page":"1105","volume-title":"Proc. IEEE Conf. on Systems. Man and Cybernetics","author":"J. Fridrich","year":"1997","unstructured":"Fridrich, J.: Image Encryption Based on Chaotic Maps. In: Proc. IEEE Conf. on Systems. Man and Cybernetics, Orlando, Florida, pp. 1105\u20131110. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"27_CR3","first-page":"28","volume-title":"IEEE International Symposium on Circuits and Systems","author":"V. Milanovic","year":"1996","unstructured":"Milanovic, V., Mona, E Z: Synchronization of Chaotic Neural Networks for Secure Communications. In: IEEE International Symposium on Circuits and Systems, pp. 28\u201331. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Alattar, A.M, Ghassan, I.A.: Improved Selective Encryption Techniques for Secure Transmission of MPEG Video Bit-streams. In: Proc. IEEE ICIP\u201999, Kobe Japan, vol.\u00a04, pp. 256\u2013260 (1999)","DOI":"10.1109\/ICIP.1999.819590"},{"key":"27_CR5","unstructured":"Guo, D., Cheng, L.: A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks. Applied Intelligence, 71\u201384 (1999)"},{"issue":"3","key":"27_CR6","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/30.883383","volume":"46","author":"P. Dang","year":"2000","unstructured":"Dang, P., Chen, M.: Image Encryption for Secure Internet Multimedia Application. IEEE Trans Consumer Electronics\u00a046(3), 395\u2013403 (2000)","journal-title":"IEEE Trans Consumer Electronics"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1007\/3-540-45036-X_68","volume-title":"Web Communication Technologies and Internet-Related Social Issues - HSI 2003","author":"J. Lee","year":"2003","unstructured":"Lee, J., Jae-cheol, R.: Strong User an Authentication in IEEE 802.11 Wireless LAN[C]. In: Chung, C.-W., Kim, C.-k., Kim, W., Ling, T.-W., Song, K.-H. (eds.) HSI 2003. LNCS, vol.\u00a02713, pp. 638\u2013643. Springer, Heidelberg (2003)"},{"key":"27_CR8","first-page":"39","volume-title":"Proc. Of IEEE Annual Technical Conference","author":"F. Beldhouche","year":"2003","unstructured":"Beldhouche, F., Qidwai, U.: Binary Image Encoding Using ID Chaotic Maps[C]. In: Proc. Of IEEE Annual Technical Conference, pp. 39\u201343. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"27_CR9","volume-title":"Chaos-based Image Encryption, Handbook of Computational Geometry for Pattern Recognition [M]","author":"G. Chen","year":"2003","unstructured":"Chen, G., Mao, Y: Chaos-based Image Encryption, Handbook of Computational Geometry for Pattern Recognition [M]. Springer, Berlin (2003)"},{"key":"27_CR10","unstructured":"Katygiannis, T., Owens, L.: Draft Wireless Network Security[R].National Institute of Standards and Technology, Special Publication 800-48, US Department of Commerce (2002)"},{"key":"27_CR11","unstructured":"IEEE. Standards for Local and Metropolitan Area Networks: Standard for Port-based Network Access Control[S] IEEE Draft P802.1X\/D11 (2001)"},{"issue":"5","key":"27_CR12","first-page":"440","volume":"30","author":"D. Yi","year":"2000","unstructured":"Yi, D., Zhou, J., Han, X.L.: A Kind New Sets Transforms Randomly and in Pictorial Information Hiding Application [J]. Chinese Science\u00a030(5), 440\u2013447 (2000)","journal-title":"Chinese Science"},{"issue":"8","key":"27_CR13","first-page":"644","volume":"5","author":"W. Ying","year":"2000","unstructured":"Ying, W., Yan, W., Qing, D.: Based on Sets Randomly and Applies with the Fusion Digital Image Hideaway Technology[J]. Chinese image graph journal (A)\u00a05(8), 644\u2013649 (2000)","journal-title":"Chinese image graph journal (A)"},{"issue":"10","key":"27_CR14","first-page":"130","volume":"31","author":"Z. Wen","year":"2005","unstructured":"Wen, Z., Li, T., Zhang, Z.: An Image Encryption Technology Based on Chaotic Sequences [J]. Computer Project\u00a031(10), 130\u2013132 (2005)","journal-title":"Computer Project"},{"issue":"5","key":"27_CR15","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1016\/j.chaos.2004.02.060","volume":"22","author":"C. Liu","year":"2004","unstructured":"Liu, C., Liu, T., Liu, L.: A New Chaotic Attractor [J]. Solitons and Fractals\u00a022(5), 1031\u20131038 (2004)","journal-title":"Solitons and Fractals"},{"issue":"2","key":"27_CR16","first-page":"142","volume":"33","author":"C. Zhu","year":"2007","unstructured":"Zhu, C., Li, L., Chen, Z.: New Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems [J]. Computer Project\u00a033(2), 142\u2013144 (2007)","journal-title":"Computer Project"},{"issue":"21","key":"27_CR17","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"3","author":"G. Chen","year":"2004","unstructured":"Chen, G., Mao, Y., Charles, K.: A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps [J]. Chaos, Solitons and Fractals\u00a03(21), 749\u2013761 (2004)","journal-title":"Chaos, Solitons and Fractals"},{"issue":"1-3","key":"27_CR18","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"Z. Guan","year":"2005","unstructured":"Guan, Z., Huang, F., Guan, W.: Chaos-based Image Encryption Algorithm[J]. Physics Letters A\u00a0346(1-3), 153\u2013157 (2005)","journal-title":"Physics Letters A"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based Intelligent Information and Engineering Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74827-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T12:50:05Z","timestamp":1550926205000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74827-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748267","9783540748274"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74827-4_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}