{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:17:17Z","timestamp":1746159437140,"version":"3.40.4"},"publisher-location":"New Delhi","reference-count":18,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132217701"},{"type":"electronic","value":"9788132217718"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-81-322-1771-8_32","type":"book-chapter","created":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T23:19:35Z","timestamp":1393888775000},"page":"365-377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["New Lightweight Conditional Encryption Schemes for Multimedia"],"prefix":"10.1007","author":[{"given":"Sakshi","family":"Dhall","sequence":"first","affiliation":[]},{"given":"Saibal K.","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Kapil","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,4]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. Chapman & Hall, Boca Raton (2005)","DOI":"10.1201\/9781420057133"},{"key":"32_CR2","unstructured":"Menezes, A. (ed.): Handbook of Applied Cryptography. CRC-Press, Boca Raton (1996)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Furht, B. (ed.): Encyclopedia of Multimedia. Springer, New York (2005)","DOI":"10.1007\/0-387-30038-4"},{"key":"32_CR4","unstructured":"Gonzalez, R.C., Woods R.E.: Digital Image Processing, 3rd edn. Prentice Hall, Upper Saddle River (2007)"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Leitold, H., Markatos, E.: Communication & multimedia security: In: Proceedings of the 10th IFIP International Conference, LNCS, Springer (2006)","DOI":"10.1007\/11909033"},{"key":"32_CR6","unstructured":"Stallings, W.: Cryptography & Network Security Principles and Practices, 3rd edn. Pearson Education (2004)"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Lian, S., Zhang, Y.: Handbook of research on secure multimedia distribution, Information Science Reference, IGI Global (2009)","DOI":"10.4018\/978-1-60566-262-6"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Lian, S.: Multimedia Content Encryption\u2014Techniques and Applications, pp. 21\u201342. CRC Press, Taylor & Francis Group, New York (2009)","DOI":"10.1201\/9781420065282"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Kang, X., Peng, A., Xu, X., Cao, X.: Performing scalable lossy compression on pixel encrypted images. EURASIP J. Image Video Process. 2013, 32. http:\/\/jivp.eurasipjournals.com\/content\/2013\/1\/32","DOI":"10.1186\/1687-5281-2013-32"},{"issue":"1","key":"32_CR10","first-page":"467","volume":"3","author":"P Agrawal","year":"2012","unstructured":"Agrawal, P., Rajpoot, M.: Partial encryption algorithm for secure transmission of multimedia messages. Int. J. Comp. Sci. 3(1), 467\u2013470 (2012)","journal-title":"Int. J. Comp. Sci."},{"issue":"4","key":"32_CR11","first-page":"2277","volume":"2","author":"A. Lini","year":"2013","unstructured":"Lini, A., Neenu, D.: Secure image encryption algorithms: a review. Int. J.Sci. Technol. Res. 2(4) (2013) ISSN 2277-8616","journal-title":"Int. J.Sci. Technol. Res."},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Ahmed, F., Resch, C.L.: Characterizing cryptographic primitives for lightweight digital image encryption. In: Proceeding of Mobile Multimedia\/Image Processing, Security, and Applications. SPIE 7351, 73510G, pp. 10G 1\u201311, (2009)","DOI":"10.1117\/12.817907"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Dhall, S., Pal S.K.: Design of a new block cipher based on conditional encryption, ITNG 2010. IEEE Computer Society\/CPS, IEEE Conference Publishing Services, Las Vegas, pp. 714\u2013718 (2010)","DOI":"10.1109\/ITNG.2010.90"},{"issue":"9","key":"32_CR14","first-page":"388","volume":"8","author":"G.N. Krishnamurthy","year":"2009","unstructured":"Krishnamurthy, G.N., Ramaswamy, V.: Making AES stronger: AES with key dependent S-box. Int. J. Comput. Sci. Netw. Secur. 8(9), 388\u2013398 (2009)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Abd-ElGhafar, I., Rohiem, A., Diaa, A., Mohammed, F.: Generation of AES key dependent S-boxes using RC4 algorithm. In: 13th International Conference on Aerospace Sciences & Aviation Technology (ASAT\u201313), 26\u201328 May 2009","DOI":"10.21608\/asat.2009.23497"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Jing, F., Fei, H.: FAN transform in image scrambling encryption application. (2009) doi:978-1-4244-5668-0\/09","DOI":"10.1109\/WCSP.2009.5371644"},{"issue":"1","key":"32_CR17","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/s11771-005-0414-1","volume":"12","author":"B Li","year":"2005","unstructured":"Li, B., Xu, J.: Period of Arnold transformation & its application in image scrambling. J. Central South Univ. Technol. 12(1), 278\u2013282 (2005)","journal-title":"J. Central South Univ. Technol."},{"key":"32_CR18","unstructured":"Wu, Y., Noonan, JP., Agaian, S.: NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology. J. Sel. Areas Telecommun. (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Third International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1771-8_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T23:51:27Z","timestamp":1746143487000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1771-8_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9788132217701","9788132217718"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1771-8_32","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"4 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}