{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:09:15Z","timestamp":1725538155419},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642318368"},{"type":"electronic","value":"9783642318375"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31837-5_58","type":"book-chapter","created":{"date-parts":[[2012,7,5]],"date-time":"2012-07-05T02:48:56Z","timestamp":1341456536000},"page":"400-407","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Image Database Encryption Algorithm"],"prefix":"10.1007","author":[{"given":"Kamlesh","family":"Tiwari","sequence":"first","affiliation":[]},{"given":"Ehtesham Akhtar","family":"Siddiqui","sequence":"additional","affiliation":[]},{"given":"Phalguni","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"58_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/978-3-642-10366-7_34","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"K. Aoki","year":"2009","unstructured":"Aoki, K., Guo, J., Matusiewicz, K., Sasaki, Y., Wang, L.: Preimages for Step-Reduced SHA-2. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 578\u2013597. Springer, Heidelberg (2009)"},{"issue":"2","key":"58_CR2","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/S0164-1212(01)00029-2","volume":"58","author":"C. Chang","year":"2001","unstructured":"Chang, C., Hwang, M., Chen, T.: A New Encryption Algorithm for Image Cryptosystems. Journal of Systems and Software\u00a058(2), 83\u201391 (2001)","journal-title":"Journal of Systems and Software"},{"issue":"7","key":"58_CR3","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y. Hou","year":"2003","unstructured":"Hou, Y.: Visual Cryptography for Color Images. Pattern Recognition\u00a036(7), 1619\u20131629 (2003)","journal-title":"Pattern Recognition"},{"key":"58_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-03317-9_9","volume-title":"Fast Software Encryption","author":"T. Isobe","year":"2009","unstructured":"Isobe, T., Shibutani, K.: Preimage Attacks on Reduced Tiger and SHA-2. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 139\u2013155. Springer, Heidelberg (2009)"},{"issue":"3","key":"58_CR5","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.patcog.2003.08.010","volume":"37","author":"S. Maniccam","year":"2004","unstructured":"Maniccam, S., Bourbakis, N.: Lossless Compression and Information Hiding in Images. Pattern Recognition\u00a037(3), 475\u2013486 (2004)","journal-title":"Pattern Recognition"},{"key":"58_CR6","doi-asserted-by":"crossref","unstructured":"Paterson, M., Dancik, V.: Longest Common Subsequences. In: Mathematical Foundations of Computer Science, pp. 127\u2013142 (1994)","DOI":"10.1007\/3-540-58338-6_63"},{"issue":"4-6","key":"58_CR7","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0030-4018(03)01261-6","volume":"218","author":"A. Sinha","year":"2003","unstructured":"Sinha, A., Singh, K.: A Technique for Image Encryption using Digital Signature. Optics Communications\u00a0218(4-6), 229\u2013234 (2003)","journal-title":"Optics Communications"},{"key":"58_CR8","unstructured":"Yen, J., Guo, J.: A New Chaotic Mirror-like Image Encryption Algorithm and its Vlsi Architecture. In: Pattern Recognition and Image Analysis, vol.\u00a010(2), pp. 236\u2013247 (2000)"},{"issue":"5","key":"58_CR9","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1002\/(SICI)1098-2760(19990605)21:5<318::AID-MOP4>3.0.CO;2-A","volume":"21","author":"S. Zhang","year":"1999","unstructured":"Zhang, S., Karim, M.: Color Image Encryption using Double Random Phase Encoding. Microwave and Optical Technology Letters\u00a021(5), 318\u2013323 (1999)","journal-title":"Microwave and Optical Technology Letters"}],"container-title":["Communications in Computer and Information Science","Emerging Intelligent Computing Technology and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31837-5_58.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:49:17Z","timestamp":1620128957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31837-5_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642318368","9783642318375"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31837-5_58","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}