{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:43:12Z","timestamp":1743018192034,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":16,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132222194"},{"type":"electronic","value":"9788132222200"}],"license":[{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-81-322-2220-0_6","type":"book-chapter","created":{"date-parts":[[2014,12,23]],"date-time":"2014-12-23T08:00:18Z","timestamp":1419321618000},"page":"67-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Image Encryption and Steganography Using Chaotic Maps with a Double Key Protection"],"prefix":"10.1007","author":[{"given":"Sanjukta","family":"Krishnagopal","sequence":"first","affiliation":[]},{"given":"Sakshi","family":"Pratap","sequence":"additional","affiliation":[]},{"given":"Bijil","family":"Prakash","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,24]]},"reference":[{"issue":"7","key":"6_CR1","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/j.cnsns.2004.03.006","volume":"10","author":"NK Pareek","year":"2005","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 10(7), 715\u2013723 (2005)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"Suppl 1","key":"6_CR2","first-page":"1","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X., Fan, J., Li, C.: New image evaluation method and its application. J. China Univer. Posts Telecommun. 18(Suppl 1), 1\u20135 (2011)","journal-title":"J. China Univer. Posts Telecommun."},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption based on 3D chaotic maps. Chaos, Solitons Fractals 21, 749\u2013761 (2004)","journal-title":"Chaos, Solitons Fractals"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/S0375-9601(03)00122-1","volume":"309","author":"NK Pareek","year":"2003","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Discrete chaotic cryptography using external key. Phys. Lett. A 309, 75\u201382 (2003)","journal-title":"Phys. Lett. A"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","volume":"29","author":"H Gao","year":"2006","unstructured":"Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos, Solitons Fractals 29, 393\u2013399 (2006)","journal-title":"Chaos, Solitons Fractals"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Koochaksaraei, R.H., Aghazarian, V., Haroonabadi, A., Hedayati, A.: A novel data hiding method by using chaotic map and histogram. Int. J. Innov. Manage. Technol. 3(5) (2012)","DOI":"10.7763\/IJIMT.2012.V3.312"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24, 926\u2013934 (2006)","journal-title":"Image Vis. Comput."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Tataru, R.L., Battikh, D., El Assad, S., Noura, H., Deforges, O.: Enhanced adaptive data hiding in spatial LSB domain by using chaotic sequences. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2012)","DOI":"10.1109\/IIH-MSP.2012.26"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Ahadpour, S.: A chaos-based image encryption scheme using chaotic coupled map lattices. Int. J. Comput. Appl. 49(2) (2012)","DOI":"10.5120\/7599-0311"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Sankaran, K.S., Krishna, B.V.S.: A new chaotic algorithm for image encryption and decryption of digital color images. Int. J. Inf. Educ. Technol. 1(2) (2011)","DOI":"10.7763\/IJIET.2011.V1.23"},{"issue":"4","key":"6_CR11","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Sig. Process. 92(4), 1101\u20131108 (2012)","journal-title":"Sig. Process."},{"issue":"5","key":"6_CR12","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1016\/j.image.2013.09.006","volume":"29","author":"C Dong","year":"2014","unstructured":"Dong, C.: Color image encryption using one-time keys and coupled chaotic systems. Sig. Process. Image Commun. 29(5), 628\u2013640 (2014)","journal-title":"Sig. Process. Image Commun."},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error measurement to structural similarity. IEEE Trans. Image Process. 13, 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"El-Emam, N.N., Al-Zubidy, R.A.S.: New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J. Syst. Softw. 86(6), 1465\u20131481 (2013)","DOI":"10.1016\/j.jss.2012.12.006"},{"issue":"13","key":"6_CR15","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.1016\/j.patrec.2010.01.019","volume":"31","author":"P-Y Lin","year":"2010","unstructured":"Lin, P.-Y., Chan, C.-S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31(13), 1887\u20131893 (2010)","journal-title":"Pattern Recogn. Lett."},{"issue":"14","key":"6_CR16","doi-asserted-by":"publisher","first-page":"11517","DOI":"10.1016\/j.eswa.2012.02.106","volume":"39","author":"A Ioannidou","year":"2012","unstructured":"Ioannidou, A., Halkidis, S.T., Stephanides, G.: A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Appl. 39(14), 11517\u201311524 (2012)","journal-title":"Expert Syst. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fourth International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2220-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T19:35:43Z","timestamp":1676921743000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-2220-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,24]]},"ISBN":["9788132222194","9788132222200"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2220-0_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014,12,24]]},"assertion":[{"value":"24 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}