{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:03:31Z","timestamp":1725977011718},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811078972"},{"type":"electronic","value":"9789811078989"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7898-9_13","type":"book-chapter","created":{"date-parts":[[2018,5,4]],"date-time":"2018-05-04T15:27:47Z","timestamp":1525447667000},"page":"157-168","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust Image Sharing Scheme Using One Dimensional Chaotic Logistic Map"],"prefix":"10.1007","author":[{"given":"Vikrant Kumar","family":"Saini","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amitesh Singh","family":"Rajput","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Balasubramanian","family":"Raman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,5,5]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Shamir, Adi.: How to share a secret. Communications of the ACM 22(11), pp. 612\u2013613 (1979).","DOI":"10.1145\/359168.359176"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Thein, C.C., Lin, J.C.: Secret image sharing. Computer & Graphics 26(5), pp.765\u2013770 (2002).","DOI":"10.1016\/S0097-8493(02)00131-0"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Su, Q., Chen, B.: A novel blind color image watermarking using upper Hessenberg matrix. AEU-International Journal of Electronics and Communications (2017).","DOI":"10.1016\/j.aeue.2017.05.025"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Xie J., Yang C., Xie Q., Tian L.: An encryption algorithm based on transformed logistic map. Networks Security, Wireless Communications and Trusted Computing, NSWCTC\u201909, International Conference Vol. 2, pp. 111\u2013114 (2009).","DOI":"10.1109\/NSWCTC.2009.201"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Alharthi, S.S., Atrey, P.K.: Further improvements on secret image sharing scheme. In Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, pp. 53\u201358 (2010).","DOI":"10.1145\/1877972.1877989"},{"key":"13_CR6","unstructured":"Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Optics and Lasers in Engineering, 66, pp.10\u201318 (2015)."},{"key":"13_CR7","unstructured":"Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Optics and Lasers in Engineering, 78, pp.17\u201325 (2015)."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Alharthi, S., Atrey, P.K.: An improved scheme for secret image sharing. Multimedia and Expo (ICME) IEEE International Conference pp. 1661\u20131666 (2010).","DOI":"10.1109\/ICME.2010.5583180"},{"key":"13_CR9","unstructured":"Murillo-Escobar, M.A., Cruz-Hern\u00e1ndez, C., Abundiz-P\u00e9rez, F., L\u00f3pez-Guti\u00e9rrez, R.M., Del Campo, O.A.: A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Processing, 109, pp.119\u2013131(2015)."},{"key":"13_CR10","unstructured":"Al-Najjar, H., Alharthi, S., Atrey, P.K.: Secure image sharing method over unsecured channels. Multimedia Tools and Applications, 75(4), pp.2249\u20132274(2014)."},{"key":"13_CR11","unstructured":"Chai, X., Chen, Y. and Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in Engineering, 88, pp.197\u2013213 (2016)."},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Lathey, A., Atrey, P.K.: Image enhancement in encrypted domain over cloud. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 11(3), p.38 (2015).","DOI":"10.1145\/2656205"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of 2nd International Conference on Computer Vision &amp; Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7898-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T14:12:31Z","timestamp":1571321551000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7898-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811078972","9789811078989"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7898-9_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}