{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T11:40:07Z","timestamp":1741347607943,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227257"},{"type":"electronic","value":"9783642227264"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22726-4_54","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:11:49Z","timestamp":1311610309000},"page":"524-533","source":"Crossref","is-referenced-by-count":8,"title":["A Color Image Encryption Technique Based on a Substitution-Permutation Network"],"prefix":"10.1007","author":[{"given":"J. Mohamedmoideen Kader","family":"Mastan","sequence":"first","affiliation":[]},{"given":"G. A.","family":"Sathishkumar","sequence":"additional","affiliation":[]},{"given":"K. Bhoopathy","family":"Bagan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.procs.2010.12.064","volume":"3","author":"G.A. Sathish Kumar","year":"2011","unstructured":"Sathish Kumar, G.A., Bhoopathy Bagan, K., Vivekanand, V.: A novel algorithm for image encryption by integrated pixel scrambling plus diffusion [IISPD] utilizing duo chaos mapping applicability in wireless systems. Procedia Computer Science\u00a03, 378\u2013387 (2011)","journal-title":"Procedia Computer Science"},{"issue":"10","key":"54_CR2","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y. Mao","year":"2004","unstructured":"Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on 3D chaotic Baker Maps. International Journal of Bifurcation and Chaos\u00a014(10), 3613\u20133624 (2004)","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"54_CR3","doi-asserted-by":"crossref","unstructured":"MU, X-C., SONG, E.-N.: A new color Image Encryption Algorithm Based on 3D Lorenz Chaos Sequences. In: First international Conference on Pervasive Computer, Signal Processing and Application, pp. 269\u2013272 (2010)","DOI":"10.1109\/PCSPA.2010.72"},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"Liu, S., Sun, J., Xu, Z.: An improved image encryption algorithm based on chaotic system. Journal of computers\u00a04(11) (2009)","DOI":"10.4304\/jcp.4.11.1091-1100"},{"key":"54_CR5","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J. Fridrich","year":"1997","unstructured":"Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos\u00a08, 1259\u20131284 (1997)","journal-title":"Int. J. Bifurcation and Chaos"},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Socet,D., Magliveras, S.S.,Furht, B.: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 406\u2013407 (2005)","DOI":"10.1109\/SECURECOMM.2005.39"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Usman, K., Juzoji, H., Nakajimal, I., Soegidjoko, Ramdhani, M., Hori, T., Igi, S.: Medical image encryption based on pixel arrangement and random permutation for transmission security. In: 9th International Conference on e-Health Networking, Application and Services, pp. 244\u2013247 (2007)","DOI":"10.1109\/HEALTH.2007.381640"},{"issue":"3","key":"54_CR8","first-page":"212","volume":"23","author":"S. Li","year":"2008","unstructured":"Li, S., Li, C., Chen, G., Bourbakis, N.G., Lo, K.-T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing: Image Communication\u00a023(3), 212\u2013223 (2008)","journal-title":"Signal processing: Image Communication"},{"key":"54_CR9","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy system. Bell Syst. Techn. J.\u00a028, 656\u2013715 (1949)","journal-title":"Bell Syst. Techn. J."},{"key":"54_CR10","unstructured":"http:\/\/www.healthcareitnews.com\/news\/hhs-cracks-down-provider-pay-100000-hipaa-penalties-over-lost-laptops"},{"key":"54_CR11","doi-asserted-by":"crossref","unstructured":"J. Mohamedmoideen Kader Mastan, Sathishkumar, G.A., Bagan, K.B.: Digital Image Security using Matrix and Non-Linear Pixel Transformation. In: International Conference on Computer, Communication, and Electrical Technology, vol.\u00a01 (2011)","DOI":"10.1109\/ICCCET.2011.5762443"},{"issue":"6","key":"54_CR12","doi-asserted-by":"publisher","first-page":"306","DOI":"10.2307\/2298294","volume":"36","author":"L.S. Hill","year":"1929","unstructured":"Hill, L.S.: Cryptography in an Algebraic Alphabet. The American Mathematical Monthly\u00a036(6), 306\u2013312 (1929)","journal-title":"The American Mathematical Monthly"},{"issue":"1","key":"54_CR13","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1080\/0161-110591893771","volume":"29","author":"J. Overbey","year":"2005","unstructured":"Overbey, J., Traves, W., Wojdylo, J.: On the keyspace of the hill cipher. Cryptologia\u00a029(1), 59\u201372 (2005)","journal-title":"Cryptologia"},{"key":"54_CR14","volume-title":"Cryptography & Network Security","author":"B.A. Forouzan","year":"2009","unstructured":"Forouzan, B.A.: Cryptography & Network Security. Tata McGraw-Hill, New York (2009) ISBN-13: 978-0-07-066046-5"},{"key":"54_CR15","volume-title":"Applied Cryptography: Protocols, Algorithms and Source Code in C","author":"B. Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edn. Wiley, NY (1995)","edition":"2"},{"key":"54_CR16","unstructured":"Buchholz, J.J.: Matlab Implementation of the Advanced Encryption Standard (2001), http:\/\/buchholz.hs-bremen.de\/aes\/aes.htm"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22726-4_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T11:01:32Z","timestamp":1741345292000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22726-4_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227257","9783642227264"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22726-4_54","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}