{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:32:25Z","timestamp":1744173145919,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333491"},{"type":"electronic","value":"9783642333507"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33350-7_35","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T08:36:18Z","timestamp":1348130178000},"page":"340-350","source":"Crossref","is-referenced-by-count":0,"title":["Image Encryption Using the Recursive Attributes of the eXclusive-OR Filter on Cellular Automata"],"prefix":"10.1007","author":[{"given":"Savvas A.","family":"Chatzichristofis","sequence":"first","affiliation":[]},{"given":"Oge","family":"Marques","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Lux","sequence":"additional","affiliation":[]},{"given":"Yiannis","family":"Boutalis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"35_CR1","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/0031-3203(92)90074-S","volume":"25","author":"N.G. Bourbakis","year":"1992","unstructured":"Bourbakis, N.G., Alexopoulos, C.: Picture data encryption using scan patterns. Pattern Recognition\u00a025(6), 567\u2013581 (1992)","journal-title":"Pattern Recognition"},{"issue":"21","key":"35_CR2","doi-asserted-by":"publisher","first-page":"4250","DOI":"10.1016\/j.optcom.2010.06.043","volume":"283","author":"S.A. Chatzichristofis","year":"2010","unstructured":"Chatzichristofis, S.A., Mitzias, D.A., Sirakoulis, G.C., Boutalis, Y.S.: A novel cellular automata based technique for visual multimedia content encryption. Optics Communications\u00a0283(21), 4250\u20134260 (2010)","journal-title":"Optics Communications"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Chen, R.J., Lu, W.K., Lai, J.L.: Image encryption using progressive cellular automata substitution and scan. In: IEEE International Symposium on Circuits and Systems, ISCAS 2005, pp. 1690\u20131693 (2005)","DOI":"10.1109\/ISCAS.2005.1464931"},{"issue":"5","key":"35_CR4","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1016\/j.patcog.2006.11.011","volume":"40","author":"R. Chen","year":"2007","unstructured":"Chen, R., Lai, J.: Image security system using recursive cellular automata substitution. Pattern Recognition\u00a040(5), 1621\u20131631 (2007)","journal-title":"Pattern Recognition"},{"issue":"5-6","key":"35_CR5","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/S0167-8655(98)00017-8","volume":"19","author":"K. Chung","year":"1998","unstructured":"Chung, K., Chang, L.: Large encrypting binary images with higher security. Pattern Recognition Letters\u00a019(5-6), 461\u2013468 (1998)","journal-title":"Pattern Recognition Letters"},{"issue":"2","key":"35_CR6","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/12.908993","volume":"50","author":"P. Dasgupta","year":"2001","unstructured":"Dasgupta, P., Chattopadhyay, S., Chaudhuri, P., Sengupta, I.: Cellular automata-based recursive pseudoexhaustive test pattern generator. IEEE Transactions on Computers\u00a050(2), 177\u2013185 (2001)","journal-title":"IEEE Transactions on Computers"},{"issue":"4","key":"35_CR7","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"T. Gaoand","year":"2008","unstructured":"Gaoand, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Physics Letters A\u00a0372(4) 21, 394\u2013400 (2008)","journal-title":"Physics Letters A"},{"key":"35_CR8","first-page":"51","volume":"1","author":"P. Guan","year":"1987","unstructured":"Guan, P.: Cellular automaton public-key cryptosystem. Complex Systems\u00a01, 51\u201356 (1987)","journal-title":"Complex Systems"},{"issue":"3","key":"35_CR9","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1016\/j.optlastec.2011.08.023","volume":"44","author":"J. Jin","year":"2012","unstructured":"Jin, J., hong Wu, Z.: A secret image sharing based on neighborhood configurations of 2-d cellular automata. Optics &amp; Laser Technology\u00a044(3), 538\u2013548 (2012)","journal-title":"Optics &amp; Laser Technology"},{"key":"35_CR10","unstructured":"Kari, J.: Cryptosystems based on reversible cellular automata. Personal communication (1992)"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Koduru, S., Chandrasekaran, V.: Integrated confusion-diffusion mechanisms for chaos based image encryption, pp. 260\u2013263 (2008)","DOI":"10.1109\/CIT.2008.Workshops.33"},{"issue":"5","key":"35_CR12","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1109\/TSMCC.2009.2020511","volume":"39","author":"K. Konstantinidis","year":"2009","unstructured":"Konstantinidis, K., Sirakoulis, G.C., Andreadis, I.: Design and implementation of a fuzzy-modified ant colony hardware structure for image retrieval. IEEE Transactions on Systems, Man, and Cybernetics, Part C\u00a039(5), 520\u2013533 (2009)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Kotoulas, L., Tsarouchis, D., Sirakoulis, G., Andreadis, I.: 1-d cellular automaton for pseudorandom number generation and its reconfigurable hardware implementation, p. 4 (2006)","DOI":"10.1109\/ISCAS.2006.1693661"},{"issue":"6","key":"35_CR14","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/S0952-1976(97)00040-7","volume":"10","author":"O. Lafe","year":"1997","unstructured":"Lafe, O.: Data compression and encryption using cellular automata transforms. Engineering Applications of Artificial Intelligence\u00a010(6), 581\u2013592 (1997)","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"4","key":"35_CR15","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1016\/j.patcog.2003.08.011","volume":"37","author":"S.S. Maniccam","year":"2004","unstructured":"Maniccam, S.S., Bourbakis, N.G.: Image and video encryption using scan patterns. Pattern Recognition\u00a037(4), 725\u2013737 (2004)","journal-title":"Pattern Recognition"},{"key":"35_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-3-540-87881-0_34","volume-title":"Artificial Intelligence: Theories, Models and Applications","author":"L. Nalpantidis","year":"2008","unstructured":"Nalpantidis, L., Sirakoulis, G.C., Gasteratos, A.: A Dense Stereo Correspondence Algorithm for Hardware Implementation with Enhanced Disparity Selection. In: Darzentas, J., Vouros, G.A., Vosinakis, S., Arnellos, A. (eds.) SETN 2008. LNCS (LNAI), vol.\u00a05138, pp. 365\u2013370. Springer, Heidelberg (2008)"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Poullot, S., Buisson, O., Crucianu, M.: Z-grid-based probabilistic retrieval for scaling up content-based copy detection. In: CIVR, pp. 348\u2013355 (2007)","DOI":"10.1145\/1282280.1282334"},{"key":"35_CR18","unstructured":"Samet, H.: Foundations of Multidimensional and Metric Data Structur. Diane D. Cerra (2006)"},{"issue":"2","key":"35_CR19","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1117\/1.482647","volume":"17","author":"J. Scharinger","year":"1998","unstructured":"Scharinger, J.: Fast encryption of image data using chaotic kolmogorov flows. Electronic Imaging\u00a017(2), 318\u2013325 (1998)","journal-title":"Electronic Imaging"},{"issue":"5-6","key":"35_CR20","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.parco.2003.12.014","volume":"30","author":"F. Seredynski","year":"2004","unstructured":"Seredynski, F., Bouvry, P., Zomaya, A.: Cellular automata computations and secret key cryptography. Parallel Computing\u00a030(5-6), 753\u2013766 (2004)","journal-title":"Parallel Computing"}],"container-title":["Lecture Notes in Computer Science","Cellular Automata"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33350-7_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:23:02Z","timestamp":1744165382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33350-7_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333491","9783642333507"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33350-7_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}