{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:18:23Z","timestamp":1772065103363,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642318368","type":"print"},{"value":"9783642318375","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31837-5_38","type":"book-chapter","created":{"date-parts":[[2012,7,5]],"date-time":"2012-07-05T02:48:56Z","timestamp":1341456536000},"page":"259-263","source":"Crossref","is-referenced-by-count":15,"title":["Key-Based Scrambling for Secure Image Communication"],"prefix":"10.1007","author":[{"given":"Prashan","family":"Premaratne","sequence":"first","affiliation":[]},{"given":"Malin","family":"Premaratne","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Renesse, R.L.: Hidden and Scrabbled Images- a Review. In: Conference on Optical Security and Counterfeit Deterence Techniques IV, vol.\u00a04677, pp. 333\u2013348. SPIE (2002)","DOI":"10.1117\/12.462726"},{"key":"38_CR2","unstructured":"Huang, H.: An Image Scrambling Encryption Algorithm Combined Arnold and Chaotic Transform. In: Int. Conf. China Communication, pp. 208\u2013210 (2010)"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Fang, L., YuKai, W.: Restoring of the Watermarking Image in Arnold Scrambling. In: 2nd International Conference on Signal Processing Systems (ICSPS), pp. 771\u2013774 (2010)","DOI":"10.1109\/ICSPS.2010.5555253"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Liu, Z., Chen, H., Liu, T., Li, P., Xu, L., Dai, J., Liu, S.: Image Encryption by Us-ing Gyrator Transform and Arnold Transform. Journal of Electronic Imaging\u00a020(1) (2011)","DOI":"10.1117\/1.3557790"},{"issue":"10","key":"38_CR5","first-page":"1558","volume":"15","author":"T. Kong","year":"2004","unstructured":"Kong, T., Zhang, D.: A New Anti-Arnold Transformation Algorithm. Journal of Software\u00a015(10), 1558\u20131564 (2004)","journal-title":"Journal of Software"},{"key":"38_CR6","first-page":"1","volume":"6812","author":"Y. Zhou","year":"2008","unstructured":"Zhou, Y., Joyner, V.M., Panetta, K.: Two Fibonacci P-code Based Image Scram-bling Algorithms. Image Processing: Algorithms and Systems VI\u00a06812, 681215, 1\u201312 (2008)","journal-title":"Image Processing: Algorithms and Systems VI"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Che, S., Che, Z., Ma, B.: An Improved Image Scrabbling Algorithm. In: Proc. Second Int. Conf. Genetics and Evolutionary Computing, pp. 495\u2013499 (2008)","DOI":"10.1109\/WGEC.2008.7"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Image Encryption Based on Chaotic Maps. In: Proc. IEEE Conf. Systems, Man, and Cybernetics, pp. 1105\u20131110 (1997)","DOI":"10.1109\/ICSMC.1997.638097"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Yeo, J., Guo, C.: Efficient Hierarchical Chaotic Image Encryption Algorithm and Its VLSI Realisation. In: IEE Proceedings Vision, Image and Signal Processing, vol.\u00a0147(2), pp. 167\u2013175 (2000)","DOI":"10.1049\/ip-vis:20000208"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Liping, S., Zheng, Q., Bo, L., Jun, Q., Huan, L.: Image Scrambling Algorithm Based on Random Shuffling Strategy. In: 3rd IEEE Conference on Industrial Electronics and Applications, vol.\u00a04677, pp. 2278\u20132283. SPIE (2008)","DOI":"10.1109\/ICIEA.2008.4582923"},{"issue":"6","key":"38_CR11","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1109\/TCSVT.2004.828325","volume":"14","author":"D. Ville","year":"2004","unstructured":"Ville, D., Philips, W., Walle, R., Lemahieu, I.: Image Scrambling Without Band-width Expansion. IEEE Trans. Circ. Sys. Video Tech.\u00a014(6), 892\u2013897 (2004)","journal-title":"IEEE Trans. Circ. Sys. Video Tech."},{"key":"38_CR12","unstructured":"Liu, S., Sheridan, J.T.: Optical Information Hiding by Combining Image Scrambling Techniques in Fractional Fourier Domains. In: Irish Signal and Systems Conference, pp. 249\u2013254 (2001)"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Panetta, K., Agaian, S.: An Image Scrambling Algorithm Using Parameter Based M-sequence. In: Proc. Seventh Inter. Conf. Mach. Learning and Cybern., pp. 3695\u20133698 (2008)","DOI":"10.1109\/ICMLC.2008.4621047"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"Gu, G., Han, G.: The Application of Chaos and DWT in Image Scrambling. In: Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, pp. 3729\u20133373 (2006)","DOI":"10.1109\/ICMLC.2006.258635"}],"container-title":["Communications in Computer and Information Science","Emerging Intelligent Computing Technology and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31837-5_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T06:12:20Z","timestamp":1743660740000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31837-5_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642318368","9783642318375"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31837-5_38","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}