{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:27Z","timestamp":1725550887398},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_7","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T15:11:44Z","timestamp":1270048304000},"page":"34-38","source":"Crossref","is-referenced-by-count":3,"title":["Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat Map"],"prefix":"10.1007","author":[{"given":"Anil","family":"Kumar","sequence":"first","affiliation":[]},{"given":"M. K.","family":"Ghose","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1016\/j.cnsns.2008.11.005","volume":"14","author":"V. Patidar","year":"2009","unstructured":"Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer Simulat.\u00a014, 3056\u20133075 (2009)","journal-title":"Commun. Nonlinear Sci. Numer Simulat."},{"key":"7_CR2","volume-title":"Applied cryptography: protocols algorithms and source code in C","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied cryptography: protocols algorithms and source code in C. Wiley, New York (1996)"},{"key":"7_CR3","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1016\/j.imavis.2007.09.005","volume":"26","author":"X. Tong","year":"2008","unstructured":"Tong, X., Cui, M.: Image encryption with compound chaotic sequence cipher shifting dynamically. Image and Vision Computing\u00a026, 843\u2013850 (2008)","journal-title":"Image and Vision Computing"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","volume":"41","author":"Y. Wang","year":"2009","unstructured":"Wang, Y., Wong, K.-W., Liao, X., Xiang, T., Chen, G.: A chaos based image encryption algorithm with variable control parameters. Chaos, Solitons and Fractals\u00a041, 1773\u20131783 (2009)","journal-title":"Chaos, Solitons and Fractals"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1016\/j.imavis.2008.09.004","volume":"27","author":"C. Li","year":"2009","unstructured":"Li, C., Li, S., Chen, G., Halang, W.A.: Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image and Vision Computing\u00a027, 1035\u20131039 (2009)","journal-title":"Image and Vision Computing"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simulat. (2009) (in press) doi:10.1016\/j.cnsns.2009.07.007","DOI":"10.1016\/j.cnsns.2009.07.007"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals, 741\u2013749 (2004)","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"7_CR8","first-page":"131","volume":"282","author":"X. Zhong","year":"2007","unstructured":"Zhong, X., Liu, J., Huang, X.: An Image Encryption Algorithm Based on chaotic Cat Map. Chinese Microelectronics and Computer\u00a0282, 131\u2013134 (2007)","journal-title":"Chinese Microelectronics and Computer"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Liu, H., Zhu, Z., Jiang, H.: A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map. In: 9th International Conference for Young Computer Scientists, pp. 3016\u20133021 (2009)","DOI":"10.1109\/ICYCS.2008.449"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:51:49Z","timestamp":1606168309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}