{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T10:26:22Z","timestamp":1749810382414,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642225765"},{"type":"electronic","value":"9783642225772"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22577-2_35","type":"book-chapter","created":{"date-parts":[[2011,7,6]],"date-time":"2011-07-06T08:41:43Z","timestamp":1309941703000},"page":"257-264","source":"Crossref","is-referenced-by-count":15,"title":["Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform"],"prefix":"10.1007","author":[{"given":"Musheer","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Omar","family":"Farooq","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"35_CR1","first-page":"3","volume":"25","author":"G.M. Nair","year":"2008","unstructured":"Nair, G.M.: Role of Communications Satellites in National Development. IETE Technical Review\u00a025(1), 3\u20138 (2008)","journal-title":"IETE Technical Review"},{"key":"35_CR2","unstructured":"Haller, L. L., Sakazaki, M. S.: Commercial Space and United States National Security, \n                    \n                      http:\/\/www.fas.org\/spp\/eprint\/article06.html\n                    \n                    \n                   (accessed on December 4, 2010)"},{"issue":"6","key":"35_CR3","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/0031-3203(92)90074-S","volume":"25","author":"N. Bourbakis","year":"1992","unstructured":"Bourbakis, N., Alexopoulos, C.: Picture data encryption using SCAN patterns. Pattern Recognition\u00a025(6), 567\u2013581 (1992)","journal-title":"Pattern Recognition"},{"key":"35_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/S0164-1212(01)00029-2","volume":"58","author":"C.C. Chang","year":"2001","unstructured":"Chang, C.C., Hwang, M.S., Chen, T.S.: A new encryption algorithm for image cryptosystems. Journal of Systems Software\u00a058, 83\u201391 (2001)","journal-title":"Journal of Systems Software"},{"issue":"6","key":"35_CR5","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J. Fridrich","year":"1998","unstructured":"Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos\u00a08(6), 1259\u20131284 (1998)","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"8","key":"35_CR6","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1109\/78.852023","volume":"48","author":"H. Cheng","year":"2000","unstructured":"Cheng, H., Li, X.B.: Partial encryption of compressed images and videos. IEEE Transaction on Signal Processing\u00a048(8), 2439\u20132451 (2000)","journal-title":"IEEE Transaction on Signal Processing"},{"issue":"3","key":"35_CR7","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G.Y. Chen","year":"2004","unstructured":"Chen, G.Y., Mao, Y.B., Chui, C.K.: A Symmetric Image Encryption Scheme based on 3D Chaotic Cat maps. Chaos Solitons and Fractals\u00a021(3), 749\u2013761 (2004)","journal-title":"Chaos Solitons and Fractals"},{"issue":"1-3","key":"35_CR8","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"Z.. Guan","year":"2005","unstructured":"Guan, Z., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Physics Letters A\u00a0346(1-3), 153\u2013157 (2005)","journal-title":"Physics Letters A"},{"issue":"10","key":"35_CR9","doi-asserted-by":"publisher","first-page":"3616","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y. Mao","year":"2004","unstructured":"Mao, Y., Lian, S., Chen, G.: A Novel Fast Image Encryption Scheme based on 3D Chaotic Baker maps. International Journal of Bifurcation and Chaos\u00a014(10), 3616\u20133624 (2004)","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"1","key":"35_CR10","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S. Lian","year":"2005","unstructured":"Lian, S., Sun, J., Wang, Z.: A Block Cipher based on a Suitable use of Chaotic Standard map. Chaos, Solitons and Fractals\u00a026(1), 117\u2013129 (2005)","journal-title":"Chaos, Solitons and Fractals"},{"issue":"3","key":"35_CR11","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1016\/j.chaos.2004.09.035","volume":"24","author":"L. Zhang","year":"2005","unstructured":"Zhang, L., Liao, X., Wang, X.: An Image Encryption Approach based on Chaotic maps. Chaos, Solitons and Fractals\u00a024(3), 759\u2013765 (2005)","journal-title":"Chaos, Solitons and Fractals"},{"issue":"9","key":"35_CR12","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"N.K. Pareek","year":"2006","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Image Encryption using Chaotic Logistic map. Image and Vision Computing\u00a024(9), 926\u2013934 (2006)","journal-title":"Image and Vision Computing"},{"issue":"4","key":"35_CR13","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1016\/j.sigpro.2008.09.011","volume":"89","author":"X. Tong","year":"2008","unstructured":"Tong, X., Cui, M.: Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator. Signal Processing\u00a089(4), 480\u2013491 (2008)","journal-title":"Signal Processing"},{"issue":"9","key":"35_CR14","doi-asserted-by":"publisher","first-page":"2456","DOI":"10.1016\/j.cnsns.2009.09.023","volume":"15","author":"Y. Tang","year":"2009","unstructured":"Tang, Y., Wang, Z., Fang, J.: Image encryption using chaotic coupled map lattices with time varying delays. Communication in Nonlinear Science and Numerical Simulation\u00a015(9), 2456\u20132468 (2009)","journal-title":"Communication in Nonlinear Science and Numerical Simulation"}],"container-title":["Communications in Computer and Information Science","High Performance Architecture and Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22577-2_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T22:05:30Z","timestamp":1558389930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22577-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642225765","9783642225772"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22577-2_35","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}