{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:13:33Z","timestamp":1775243613131,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811328282","type":"print"},{"value":"9789811328299","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-2829-9_21","type":"book-chapter","created":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T21:25:14Z","timestamp":1538774714000},"page":"226-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Image Encryption Algorithm Based on Dynamic DNA Coding and Hyper-chaotic Lorenz System"],"prefix":"10.1007","author":[{"given":"Guangzhao","family":"Cui","sequence":"first","affiliation":[]},{"given":"Lingfei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xuncai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,6]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Saini, N., Pandey, N., Singh, A.P.: Implementation of security model in cognitive networks. In: International Conference on Communication and Signal Processing, pp. 2055\u20132058. IEEE (2016)","DOI":"10.1109\/ICCSP.2016.7754538"},{"issue":"11","key":"21_CR2","doi-asserted-by":"publisher","first-page":"1850171","DOI":"10.1142\/S0218126618501712","volume":"27","author":"Y Ye","year":"2018","unstructured":"Ye, Y., Wu, N., Zhang, X., Dong, L., Zhou, F.: An optimized design for compact masked AES S-Box based on composite field and common subexpression elimination algorithm. J. Circuits Syst. Comput. 27(11), 1850171 (2018)","journal-title":"J. Circuits Syst. Comput."},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Seripeariu, L., Frunza, M.D.: A new image encryption algorithm based on inversable functions defined on Galois fields. In: International Symposium on Signals, Circuits and Systems, pp. 243\u2013246. IEEE (2005)","DOI":"10.1109\/ISSCS.2005.1509899"},{"key":"21_CR4","unstructured":"Chen, R.J., Lai, Y.T., Lai, J.L.: Architecture design of the re-configurable 2-D von Neumann cellular automata for image encryption application. In: IEEE International Symposium on Circuits and Systems, pp. 3059\u20133062. IEEE (2005)"},{"issue":"6","key":"21_CR5","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/0031-3203(92)90074-S","volume":"25","author":"N Bourbakis","year":"1992","unstructured":"Bourbakis, N., Alexopoulos, C.: Picture data encryption using scan patterns. Pattern Recognit. 25(6), 567\u2013581 (1992)","journal-title":"Pattern Recognit."},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Kang, B.S., Zhang, X.F.: An image encryption algorithm based on chaotic sequences. In: 16th International Conference on Artificial Reality and Telexistence, pp. 221\u2013223. IEEE (2000)","DOI":"10.1109\/ICAT.2006.71"},{"issue":"1","key":"21_CR7","first-page":"14","volume":"1","author":"B Acharya","year":"2007","unstructured":"Acharya, B., Rath, G.S., Patra, S.K., Panigrahp, S.K.: Novel methods of generating self-invertible matrix for hill cipher algorithm. Int. J. Secur. 1(1), 14\u201321 (2007)","journal-title":"Int. J. Secur."},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-24635-0_12","volume-title":"Aspects of Molecular Computing","author":"A Gehani","year":"2003","unstructured":"Gehani, A., LaBean, T., Reif, J.: DNA-based cryptography. In: Jonoska, N., P\u0103un, G., Rozenberg, G. (eds.) Aspects of Molecular Computing. LNCS, vol. 2950, pp. 167\u2013188. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-24635-0_12"},{"issue":"38","key":"21_CR9","doi-asserted-by":"publisher","first-page":"5973","DOI":"10.1016\/j.physleta.2008.07.057","volume":"372","author":"R Rhouma","year":"2008","unstructured":"Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973\u20135978 (2008)","journal-title":"Phys. Lett. A"},{"issue":"5187","key":"21_CR10","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1126\/science.7973651","volume":"266","author":"LM Adleman","year":"1994","unstructured":"Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Science 266(5187), 1020\u20131024 (1994)","journal-title":"Science"},{"issue":"4","key":"21_CR11","first-page":"3901014","volume":"10","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Zhou, Z., Niu, Y.: An image encryption method based on the feistel network and dynamic DNA encoding. IEEE Photonics J. 10(4), 3901014 (2018)","journal-title":"IEEE Photonics J."},{"issue":"2","key":"21_CR12","first-page":"334","volume":"14","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Zhou, Z., Jiao, Y., Niu, Y., Wang, Y.: A visual cryptography scheme-based DNA microarrays. Int. J. Perform. Eng. 14(2), 334\u2013340 (2018)","journal-title":"Int. J. Perform. Eng."},{"key":"21_CR13","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-981-10-7179-9_22","volume-title":"Bio-inspired Computing: Theories and Applications","author":"G Cui","year":"2017","unstructured":"Cui, G., Liu, Y., Zhang, X., Zhou, Z.: A new image encryption algorithm based on DNA dynamic encoding and hyper-chaotic system. In: He, C., Mo, H., Pan, L., Zhao, Y. (eds.) BIC-TA 2017. CCIS, vol. 791, pp. 286\u2013303. Springer, Singapore (2017). https:\/\/doi.org\/10.1007\/978-981-10-7179-9_22"},{"key":"21_CR14","first-page":"17","volume":"3621","author":"X Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. Crypto 3621, 17\u201336 (2005)","journal-title":"Crypto"},{"issue":"11\u201312","key":"21_CR15","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1016\/j.camwa.2008.10.038","volume":"57","author":"X Zhang","year":"2009","unstructured":"Zhang, X., Wang, Y., Cui, G., Niu, Y., Xu, J.: Application of a novel IWO to the design of encoding sequences for DNA computing. Comput. Math Appl. 57(11\u201312), 2001\u20132008 (2009)","journal-title":"Comput. Math Appl."},{"issue":"2","key":"21_CR16","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1007\/s11071-014-1517-8","volume":"78","author":"F \u00d6zkaynak","year":"2014","unstructured":"\u00d6zkaynak, F., Yavuz, S.: Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn. 78(2), 1311\u20131320 (2014)","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"21_CR17","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.physleta.2006.09.042","volume":"361","author":"T Gao","year":"2007","unstructured":"Gao, T., Chen, G., Chen, Z., Cang, S.: The generation and circuit implementation of a new hyper-chaos based upon Lorenz system. Phys. Lett. A 361(1), 78\u201386 (2007)","journal-title":"Phys. Lett. A"},{"key":"21_CR18","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.amc.2018.03.019","volume":"332","author":"VM Silva-Garc\u00eda","year":"2018","unstructured":"Silva-Garc\u00eda, V.M., Flores-Carapia, R., Renter\u00eda-M\u00e1rquez, C., Luna-Benoso, B., Aldape-P\u00e9rez, M.: Substitution box generation using Chaos: an image encryption application. Appl. Math. Comput. 332, 123\u2013135 (2018)","journal-title":"Appl. Math. Comput."},{"key":"21_CR19","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.optlastec.2017.04.022","volume":"95","author":"A Akhavan","year":"2017","unstructured":"Akhavan, A., Samsudin, A., Akhshani, A.: Cryptanalysis of an image encryption algorithm based on DNA encoding. Opt. Laser Technol. 95, 94\u201399 (2017)","journal-title":"Opt. Laser Technol."}],"container-title":["Communications in Computer and Information Science","Bio-inspired Computing: Theories and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-2829-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T18:41:10Z","timestamp":1775241670000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-2829-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811328282","9789811328299"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-2829-9_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"BIC-TA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Bio-Inspired Computing: Theories and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bicta2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.bicta.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}