{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:13:28Z","timestamp":1775243608598,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811328282","type":"print"},{"value":"9789811328299","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-2829-9_20","type":"book-chapter","created":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T21:25:14Z","timestamp":1538774714000},"page":"213-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Image Encryption Algorithm Based on Chaotic System Using DNA Sequence Operations"],"prefix":"10.1007","author":[{"given":"Xuncai","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Yanfeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lingfei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,6]]},"reference":[{"issue":"1","key":"20_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-014-9187-8","volume":"29","author":"M Baldi","year":"2016","unstructured":"Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., Schipani, D.: Enhanced public key security for the McEliece cryptosystem. J. Cryptol. 29(1), 1\u201327 (2016)","journal-title":"J. Cryptol."},{"issue":"15","key":"20_CR2","first-page":"15","volume":"13","author":"P Mahajan","year":"2013","unstructured":"Mahajan, P., Sachdeva, A.: A study of encryption algorithms AES, DES and RSA for security. Glob. J. Comput. Sci. Technol. 13(15), 15\u201322 (2013)","journal-title":"Glob. J. Comput. Sci. Technol."},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Zaki, A.K., Indiramma, M.: A novel redis security extension for NoSQL database using authentication and encryption. In: IEEE International Conference on Electrical, Computer and Communication Technologies, pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/ICECCT.2015.7226101"},{"issue":"3","key":"20_CR4","doi-asserted-by":"publisher","first-page":"675","DOI":"10.12928\/telkomnika.v12i3.106","volume":"12","author":"MT Suryadi","year":"2014","unstructured":"Suryadi, M.T., Nurpeti, E., Widya, D.: Performance of chaos-based encryption algorithm for digital image. Telkomnika 12(3), 675\u2013682 (2014)","journal-title":"Telkomnika"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Niu, Y., Zhang, X., Han, F.: Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Comput. Intell. Neurosci. (2017). Article ID 4079793","DOI":"10.1155\/2017\/4079793"},{"key":"20_CR6","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-981-10-7179-9_22","volume-title":"Bio-inspired Computing: Theories and Applications","author":"G Cui","year":"2017","unstructured":"Cui, G., Liu, Y., Zhang, X., Zhou, Z.: A new image encryption algorithm based on DNA dynamic encoding and hyper-chaotic system. In: He, C., Mo, H., Pan, L., Zhao, Y. (eds.) BIC-TA 2017. CCIS, vol. 791, pp. 286\u2013303. Springer, Singapore (2017). https:\/\/doi.org\/10.1007\/978-981-10-7179-9_22"},{"issue":"16","key":"20_CR7","doi-asserted-by":"publisher","first-page":"21589","DOI":"10.1007\/s11042-017-5585-x","volume":"77","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y.: The image encryption algorithm based on chaos and DNA computing. Multimed. Tools Appl. 77(16), 21589\u201321615 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"456","key":"20_CR8","first-page":"233","volume":"54","author":"A Gehani","year":"2004","unstructured":"Gehani, A., Labean, T., Reif, J.: DNA-based cryptography. Asp. Mol. Comput. 54(456), 233\u2013249 (2004)","journal-title":"Asp. Mol. Comput."},{"key":"20_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2018.2859257","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Zhou, Z., Niu, Y.: An image encryption method based on the feistel network and dynamic DNA encoding. IEEE Photonics J. (2018). https:\/\/doi.org\/10.1109\/JPHOT.2018.2859257","journal-title":"IEEE Photonics J."},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, X., Han, F., Niu, Y.: Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Comput. Intell. Neurosci. (2017). Article ID 6919675","DOI":"10.1155\/2017\/6919675"},{"issue":"2","key":"20_CR11","first-page":"334","volume":"14","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Zhou, Z., Jiao, Y., Niu, Y., Wang, Y.: A visual cryptography scheme-based DNA microarrays. Int. J. Perform. Eng. 14(2), 334\u2013340 (2018)","journal-title":"Int. J. Perform. Eng."},{"issue":"1","key":"20_CR12","doi-asserted-by":"publisher","first-page":"1110","DOI":"10.2174\/1874444301406011110","volume":"6","author":"Y Guo","year":"2014","unstructured":"Guo, Y.: A summary of image encryption algorithm based on chaotic sequence. Open Autom. Control Syst. J. 6(1), 1110\u20131114 (2014)","journal-title":"Open Autom. Control Syst. J."},{"issue":"4","key":"20_CR13","first-page":"206","volume":"7","author":"C Yang","year":"2015","unstructured":"Yang, C., Hua, M., Jia, S.: Image encryption algorithm based on chaotic mapping and Chinese remainder theorem. Metall. & Min. Ind. 7(4), 206\u2013212 (2015)","journal-title":"Metall. & Min. Ind."},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua, Z., Jin, F., Xu, B., Huang, H.: 2D Logistic-Sine-Coupling map for image encryption. Signal Process. 149, 148\u2013161 (2018)","journal-title":"Signal Process."},{"issue":"6","key":"20_CR15","first-page":"24","volume":"37","author":"V Kumar","year":"2013","unstructured":"Kumar, V., Raheja, E.G., Sareen, M.S.: New field of cryptography: DNA cryptography. Int. J. Comput. Technol. 37(6), 24\u201327 (2013)","journal-title":"Int. J. Comput. Technol."},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/3-540-39200-9_19","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"Y Dodis","year":"2003","unstructured":"Dodis, Y., An, J.H.: Concealment and its applications to authenticated encryption. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 312\u2013329. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_19"},{"key":"20_CR17","unstructured":"Dan, B., Dunworth, C., Lipton, R.J.: Breaking DES using a molecular computer. In: Proceedings of a DIMACS Workshop, 4 April 1995, Princeton University, vol. 27 (1995)"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-24635-0_12","volume-title":"Aspects of Molecular Computing","author":"A Gehani","year":"2003","unstructured":"Gehani, A., LaBean, T., Reif, J.: DNA-based cryptography. In: Jonoska, N., P\u0103un, G., Rozenberg, G. (eds.) Aspects of Molecular Computing. LNCS, vol. 2950, pp. 167\u2013188. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-24635-0_12"},{"issue":"11","key":"20_CR19","first-page":"3053","volume":"31","author":"HY Zheng","year":"2011","unstructured":"Zheng, H.Y., Wen-Jie, L.I., Xiao, D.: Novel image blocking encryption algorithm based on spatiotemporal chaos system. J. Comput. Appl. 31(11), 3053\u20133055 (2011)","journal-title":"J. Comput. Appl."},{"issue":"3","key":"20_CR20","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.aeue.2013.08.007","volume":"68","author":"Q Zhang","year":"2014","unstructured":"Zhang, Q., Liu, L., Wei, X.: Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEUE-Int. J. Electron. Commun. 68(3), 186\u2013192 (2014)","journal-title":"AEUE-Int. J. Electron. Commun."},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zhao, G., Wei, G., Zhang, J.: An improved DNA coding image encryption algorithm Combining entropy and chaos. In: International Symposium on Computers and Informatics, pp. 880\u2013887. Atlantis Press (2015)","DOI":"10.2991\/isci-15.2015.117"},{"issue":"5","key":"20_CR22","first-page":"91","volume":"54","author":"F Shi","year":"2018","unstructured":"Shi, F., Zhang, H., Zhang, X.: Image encryption algorithm based on chaotic map and DNA coding. Comput. Eng. Appl. 54(5), 91\u201395 (2018)","journal-title":"Comput. Eng. Appl."},{"key":"20_CR23","first-page":"80","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua, Z., Zhou, Y., Pun, C.M., Chen, C.L.P.: 2D sine logistic modulation map for image encryption. Inf. Sci. Int. J. 297, 80\u201394 (2015)","journal-title":"Inf. Sci. Int. J."},{"issue":"10","key":"20_CR24","doi-asserted-by":"publisher","first-page":"3346","DOI":"10.1021\/jacs.5b10502","volume":"138","author":"J Zenk","year":"2016","unstructured":"Zenk, J., Tuntivate, C., Schulman, R.: Kinetics and thermodynamics of Watson-Crick base pairing driven DNA Origami dimerization. J. Am. Chem. Soc. 138(10), 3346\u20133354 (2016)","journal-title":"J. Am. Chem. Soc."},{"issue":"2","key":"20_CR25","first-page":"1","volume":"2","author":"I Al Shaikhli","year":"2014","unstructured":"Al Shaikhli, I., Alahmad, M., Munthir, K.: Hash function of finalist SHA-3: analysis study. Int. J. Adv. Comput. Sci. Inf. Technol. 2(2), 1\u201312 (2014)","journal-title":"Int. J. Adv. Comput. Sci. Inf. Technol."}],"container-title":["Communications in Computer and Information Science","Bio-inspired Computing: Theories and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-2829-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T18:41:07Z","timestamp":1775241667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-2829-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811328282","9789811328299"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-2829-9_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"BIC-TA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Bio-Inspired Computing: Theories and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bicta2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.bicta.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}