{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:33:16Z","timestamp":1740547996271,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642159091"},{"type":"electronic","value":"9783642159107"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15910-7_40","type":"book-chapter","created":{"date-parts":[[2010,9,14]],"date-time":"2010-09-14T13:24:55Z","timestamp":1284470695000},"page":"352-359","source":"Crossref","is-referenced-by-count":2,"title":["Image Encryption through Using Chaotic Function and Graph"],"prefix":"10.1007","author":[{"given":"Sa\u2019ed","family":"Faridnia","sequence":"first","affiliation":[]},{"given":"Karim","family":"Fae\u2019z","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Faridnia, S., enayatifar, R., sadeqi, H.: using chaotic function in image steganography. In: IEEE ICIME 2009, pp. 754\u2013757 (2009)","DOI":"10.1109\/ICSPS.2009.171"},{"key":"40_CR2","unstructured":"Mitra, A., Subba Rao, Y.V., Prasanna, S.R.M.: A New Image Encryption Approach using Combinational Permutation Techniques. International Journal of Computer Science, pp: 1306\u20134428 (2006)"},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Chang, C.-C., Yu, T.-X.: Cryptanalysis of an encryption scheme for binary images. Pattern Recognition Letters, 1847\u20131852 (2002)","DOI":"10.1016\/S0167-8655(02)00157-5"},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Joshi, M., Chandrashaker, K.S.: Color image encryption and decryption using fractional Fourier transform. Optics Communications, 811\u2013819 (2007)","DOI":"10.1016\/j.optcom.2007.07.012"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Roterman, Y., Porat, M.: Color image coding using regional correlation of primary colors. Image and Vision Computing, 637\u2013651 (2007)","DOI":"10.1016\/j.imavis.2006.05.007"},{"key":"40_CR6","unstructured":"Alsultanny, Y.A.: Zandom-bit sequence generation from image data. Image and Vision Computing, 1178\u20131189 (2007)"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Yen, J.-C., Guo, J.-I.: A New Chaotic Key-Based Design for Image Encryption and Decryption. In: Proceedings IEEE International Conference on Circuits and Systems, vol.\u00a04, pp. 49\u201352 (2000)","DOI":"10.1109\/ISCAS.2000.858685"},{"key":"40_CR8","unstructured":"Li, S., Zheng, X.: Cryptanalysis of a Chaotic Image Encryption Method. In: Proceedings IEEE International Symposium on Circuits and Systems, Scottsdale, AZ, USA, vol. 2, pp. 708\u2013711 (2002)"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Kwok, H.S., Tang, W.K.S.: A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons and Fractals, 1518\u20131529 (2007)","DOI":"10.1016\/j.chaos.2005.11.090"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavan, A.: A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Physics Letters A, 391\u2013396 (2007)","DOI":"10.1016\/j.physleta.2007.01.081"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Chen, G., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 74\u201382 (2004)","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Mao, Y.B., Chen, G., Lian, S.G.: A novel fast image encryption scheme based on the 3D chaotic baker map. Int. Bifurcat Chaos, 544\u2013560 (2004)","DOI":"10.1142\/S021812740401151X"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image and Vision Computing, 926\u2013934 (2006)","DOI":"10.1016\/j.imavis.2006.02.021"},{"key":"40_CR14","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Bell Syst. Tech. J.\u00a028, 656 (1949)","journal-title":"Bell Syst. Tech. J."}],"container-title":["Lecture Notes in Computer Science","Computer Vision and Graphics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15910-7_40.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T20:33:00Z","timestamp":1740515580000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15910-7_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642159091","9783642159107"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15910-7_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}