{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:41:55Z","timestamp":1742935315849,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":15,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132218555"},{"type":"electronic","value":"9788132218562"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-81-322-1856-2_8","type":"book-chapter","created":{"date-parts":[[2014,3,11]],"date-time":"2014-03-11T10:15:09Z","timestamp":1394532909000},"page":"65-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Partial Image Cryptosystem Based on Discrete Cosine Transform and Arnold Transform"],"prefix":"10.1007","author":[{"given":"Kshiramani","family":"Naik","sequence":"first","affiliation":[]},{"given":"Arup Kumar","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,12]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Lian, S.: Multimedia Content Encryption: Techniques and Applications, Taylor and Francis Group, LLC, Boca Raton (2009)","DOI":"10.1201\/9781420065282"},{"key":"8_CR2","unstructured":"Schneier, B.: Cryptography: Theory and Practice, CRC Press, Boca Raton (1995)"},{"key":"8_CR3","unstructured":"Uhl, A., Pommer, A.: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication, Springer, Ney York (2004)"},{"key":"8_CR4","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/j.aeue.2010.04.011","volume":"65","author":"N. Tanejaa","year":"2011","unstructured":"Tanejaa, N., Ramanb, B., Guptaa I.: Selective image encryption in fractional wavelet domain, Int. J. Electron. Commun. (AE\u00dc) 65, 338\u2013344 (2011)","journal-title":"Int. J. Electron. Commun. (AE\u00dc)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Lin, K.T.: Hybrid encoding method by assembling the magic-matrix scrambling method and the binary encoding method in image hiding, Optics Commun. 284, 1778\u20131784","DOI":"10.1016\/j.optcom.2010.12.010"},{"key":"8_CR6","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.cnsns.2010.04.010","volume":"16","author":"A. Kumar","year":"2011","unstructured":"Kumar, A., Ghose, M.K.: Extended substitution\u2013diffusion based image cipher using chaotic standard map, Commun. Nonlinear Sci. Numer. Simulat. 16, 372\u2013382 (2011)","journal-title":"Commun. Nonlinear Sci. Numer. Simulat."},{"key":"8_CR7","unstructured":"Panduranga, H.T., Naveen Kumar, S.K.: A first approach on an RGB image encryption, Intern. J. Comput. Sci. Eng. 02, 297\u2013300 (2010)"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang, X., Teng, Lin, Qin, Xue: A novel colour image encryption algorithm based on chaos. Sig. Process. 92, 1101\u20131108 (2012)","journal-title":"Sig. Process."},{"key":"8_CR9","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1016\/S0167-8655(97)00099-8","volume":"18","author":"X. Li","year":"1997","unstructured":"Li, X., Knipe, J., Cheng, H.: A image compression and encryption using tree structures, Pattern Recognit. Lett. 18, 1253\u20131259 (1997)","journal-title":"Pattern Recognit. Lett."},{"volume-title":"Multimedia Encryption and Authentication Techniques and Applications","year":"2006","key":"8_CR10","unstructured":"Furht, B., Kirovski, D. (eds.): Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publications, Boca Raton (2006)"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"2613","DOI":"10.1016\/j.mcm.2011.06.007","volume":"57","author":"S Lian","year":"2013","unstructured":"Lian, S., Chen, X.: On the design of partial encryption scheme for multimedia content. Math. Comput. Modell. 57, 2613\u20132624 (2013)","journal-title":"Math. Comput. Modell."},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"CC Chang","year":"2007","unstructured":"Chang, C.C., Lin, C.C., Tseng, C.S., Tai, W.L.: Reversible hiding in DCT-based compressed images. Inf. Sci. 177, 2768\u20132786 (2007)","journal-title":"Inf. Sci."},{"key":"8_CR13","unstructured":"Smith, L.: Atutorial on principal components analysis"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1016\/j.dsp.2012.02.005","volume":"22","author":"G Bhatnagar","year":"2012","unstructured":"Bhatnagar, G., Jonathan Wu, Q.M.: Selective image encryption based on pixels of interest and singular value decomposition. Digit. Signal Proc. 22, 648\u2013663 (2012)","journal-title":"Digit. Signal Proc."},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"3693","DOI":"10.1016\/j.ijleo.2012.11.028","volume":"124","author":"S Bahrami","year":"2013","unstructured":"Bahrami, S., Naderi, M.: Encryption of multimedia content in partial encryption scheme of DCT transform coefficients using a lightweight stream algorithm. Optik 124, 3693\u20133700 (2013)","journal-title":"Optik"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances in Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1856-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T12:48:56Z","timestamp":1676378936000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1856-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9788132218555","9788132218562"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1856-2_8","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"12 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}