{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:21:01Z","timestamp":1725600061016},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642226021"},{"type":"electronic","value":"9783642226038"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22603-8_3","type":"book-chapter","created":{"date-parts":[[2011,8,9]],"date-time":"2011-08-09T08:35:07Z","timestamp":1312878907000},"page":"30-41","source":"Crossref","is-referenced-by-count":3,"title":["Chaotic Image Encryption Using B\u00e9zier Curve in DCT Domain Scrambling"],"prefix":"10.1007","author":[{"given":"Ahmed A.","family":"Abd El-Latif","sequence":"first","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.patrec.2009.11.008","volume":"31","author":"G. Ye","year":"2010","unstructured":"Ye, G.: Image Scrambling Encryption Algorithm of Pixel Bit Based on Chaos Map. Pattern Recognition\u00a031, 347\u2013354 (2010)","journal-title":"Pattern Recognition"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"3484","DOI":"10.1016\/j.cnsns.2009.12.025","volume":"15","author":"M. Amin","year":"2010","unstructured":"Amin, M., Faragallah, O.S., Abd El-Latif, A.A.: A Chaotic Block Cipher Algorithm for Image Cryptosystems. Commun. Nonlinear Sci. Numer. Simulat.\u00a015, 3484\u20133497 (2010)","journal-title":"Commun. Nonlinear Sci. Numer. Simulat."},{"volume-title":"Intelligent Copmuting Based on Chaos","year":"2009","unstructured":"Kocarev, L., Galias, Z., Lian, S. (eds.): Intelligent Copmuting Based on Chaos. Springer, Heidelberg (2009)","key":"3_CR3"},{"doi-asserted-by":"crossref","unstructured":"Amin, M., Abd El-Latif, A.A.: Efficient Modified RC5 Based on Chaos Adapted to Image Encryption. Journal of Electronic Imaging\u00a019(1) (January 2010)","key":"3_CR4","DOI":"10.1117\/1.3360179"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","volume":"41","author":"Y. Wang","year":"2009","unstructured":"Wang, Y., Wong, K.-W., Liao, X., Xiang, T., Chen, G.: A Chaos-Based Image Encrypttion Algorithm With Variable Control Parameters. Chaos, Solitions and Fractals\u00a041, 1773\u20131783 (2009)","journal-title":"Chaos, Solitions and Fractals"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S. Behnia","year":"2008","unstructured":"Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A.: A Novel Algorithm For Image Encryption Based On Mixture Of Chaotic Maps. Chaos, Solitons & Fractals\u00a035, 408\u2013419 (2008)","journal-title":"Chaos, Solitons & Fractals"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G. Chen","year":"2004","unstructured":"Chen, G., Mao, Y., Chui, C.K.: A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps. Chaos, Solitions and Fractals\u00a021, 749\u2013761 (2004)","journal-title":"Chaos, Solitions and Fractals"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"N.K. Pareek","year":"2006","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Image Encryption Using Chaotic Logistic Map. Image Vision Comput.\u00a024, 926\u2013934 (2006)","journal-title":"Image Vision Comput."},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.chaos.2006.11.009","volume":"38","author":"T. Gao","year":"2008","unstructured":"Gao, T., Chen, Z.: Image Encryption Based on a New Total Shuffling Algorithm. Chaos, Solitions and Fractals\u00a038, 213\u2013220 (2008)","journal-title":"Chaos, Solitions and Fractals"},{"issue":"4","key":"3_CR10","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"374","author":"T. Gao","year":"2008","unstructured":"Gao, T., Gu, Q., Chen, Z.: A New Image Encryption Algorithm Based on Hyper-Chaos. Phys. Lett. A\u00a0374(4), 394\u2013400 (2008)","journal-title":"Phys. Lett. A"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"5973","DOI":"10.1016\/j.physleta.2008.07.057","volume":"372","author":"R. Rhouma","year":"2008","unstructured":"Rhouma, R., Belghith, S.: Cryptanalysis of a New Image Encryption Algorithm Based on Hyper-Chaos. Phys. Lett. A\u00a0372, 5973\u20135978 (2008)","journal-title":"Phys. Lett. A"},{"issue":"6","key":"3_CR12","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.physleta.2005.05.040","volume":"343","author":"K. Wang","year":"2005","unstructured":"Wang, K., Pei, Zou, L., Song, A., He, Z.: On The Security of 3D Cat Map Based Symmetric Image Encryption Scheme. Phys. Lett. A\u00a0343(6), 432\u2013439 (2005)","journal-title":"Phys. Lett. A"},{"unstructured":"Salamon, D.: Curves and Surfaces for Computer Graphics. Springer Science+ Business Media, Inc. (2006)","key":"3_CR13"},{"key":"3_CR14","volume-title":"Multimedia Content Encryption: Techniques and Applications","author":"S. Lian","year":"2009","unstructured":"Lian, S.: Multimedia Content Encryption: Techniques and Applications. Taylor & Francis Group, LLC (2009)"},{"key":"3_CR15","doi-asserted-by":"publisher","DOI":"10.1002\/0471745790","volume-title":"Image processing : Principble and Applications","author":"T. Acharya","year":"2005","unstructured":"Acharya, T., Ray, A.K.: Image processing: Principble and Applications. John Wiley & Sons, Inc., Chichester (2005)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication Theory of Secrecy System. Bell Syst. Tech. J.\u00a028, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."}],"container-title":["Communications in Computer and Information Science","Digital Enterprise and Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22603-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,31]],"date-time":"2019-03-31T03:25:34Z","timestamp":1554002734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22603-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642226021","9783642226038"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22603-8_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}