{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T01:24:30Z","timestamp":1744161870499,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811328282"},{"type":"electronic","value":"9789811328299"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-2829-9_43","type":"book-chapter","created":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T21:25:14Z","timestamp":1538774714000},"page":"466-476","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Image Encryption Algorithm Based on Hyper-chaotic System and Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"Xuncai","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hangyu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Lingfei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,6]]},"reference":[{"key":"43_CR1","volume-title":"Multimedia Security Handbook","author":"S Li","year":"2004","unstructured":"Li, S., Chen, G., Zheng, X.: Chaos-based encryption for digital images and videos. In: Furht, B., Kirovski, D. (eds.) Multimedia Security Handbook. CRC Press, Boca Raton (2004)"},{"issue":"3","key":"43_CR2","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1007\/s11071-015-2057-6","volume":"81","author":"J Chen","year":"2015","unstructured":"Chen, J., Zhu, Z., Fu, C., Zhang, L., Zhang, Y.: An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn. 81(3), 1151\u20131166 (2015)","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"43_CR3","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.cnsns.2014.06.032","volume":"20","author":"J Chen","year":"2015","unstructured":"Chen, J., Zhu, Z., Fu, C., Yu, H., Zhang, L.: A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun. Nonlinear Sci. Numer. Simul. 20(3), 846\u2013860 (2015)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"4","key":"43_CR4","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"43_CR5","volume-title":"Applied Cryptography: Protocols, Algorithms and Source Code in C","author":"B Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edn. Wiley, Hoboken (1996)","edition":"2"},{"issue":"10","key":"43_CR6","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1109\/TCSVT.2006.882380","volume":"16","author":"CC Chang","year":"2006","unstructured":"Chang, C.C., Tai, W.L., Lin, C.C.: A reversible data hiding scheme based on side match vector quantization. IEEE Trans. Circ. Syst. Video Technol. 16(10), 1301\u20131308 (2006)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"10","key":"43_CR7","doi-asserted-by":"publisher","first-page":"3936","DOI":"10.1109\/TSP.2005.855078","volume":"53","author":"S Dumitrescu","year":"2005","unstructured":"Dumitrescu, S., Wu, X.: A new framework of lsb steganalysis of digital media. IEEE Trans. Sig. Process. 53(10), 3936\u20133947 (2005)","journal-title":"IEEE Trans. Sig. Process."},{"issue":"1\u20132","key":"43_CR8","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s11071-015-2008-2","volume":"81","author":"S Seyedzadeh","year":"2015","unstructured":"Seyedzadeh, S., Norouzi, B., Mosavi, M., Mirzakuchaki, S.: A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn. 81(1\u20132), 511\u2013529 (2015)","journal-title":"Nonlinear Dyn."},{"key":"43_CR9","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11071-015-1893-8","volume":"80","author":"S Som","year":"2015","unstructured":"Som, S., Dutta, S., Singha, R., Kotal, A., Palit, S.: Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary. Nonlinear Dy. 80, 615\u2013627 (2015)","journal-title":"Nonlinear Dy."},{"key":"43_CR10","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Wang, X.: A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf. Sci. 273, 329\u2013351 (2014)","journal-title":"Inf. Sci."},{"issue":"3","key":"43_CR11","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1016\/j.cnsns.2013.07.016","volume":"19","author":"JAE Fouda","year":"2014","unstructured":"Fouda, J.A.E., Effa, J.Y., Sabat, S., Maaruf, A.: A fast chaotic block cipher for image encryption. Commun. Nonlinear Sci. Numer. Simul. 19(3), 578\u2013588 (2014)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"43_CR12","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1007\/s11071-015-1943-2","volume":"80","author":"M Aziz","year":"2015","unstructured":"Aziz, M., Tayarani-N, M., Afsar, M.: A cycling chaos-based cryptic-free algorithm for image steganography. Nonlinear Dyn. 80, 1271\u20131290 (2015)","journal-title":"Nonlinear Dyn."},{"key":"43_CR13","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","volume":"342","author":"X Wang","year":"2015","unstructured":"Wang, X., Zhang, H.: A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt. Commun. 342, 51\u201360 (2015)","journal-title":"Opt. Commun."},{"key":"43_CR14","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Lasers Eng. 66, 10\u201318 (2015)","journal-title":"Opt. Lasers Eng."},{"issue":"18","key":"43_CR15","doi-asserted-by":"publisher","first-page":"5075","DOI":"10.1016\/j.ijleo.2014.06.054","volume":"125","author":"N Zhou","year":"2014","unstructured":"Zhou, N., Zhang, A., Wu, J., Pei, D., Yang, Y.: Novel hybrid image compression\u2013encryption algorithm based on compressive sensing. Optik-Int. J. Light Electron Opt. 125(18), 5075\u20135080 (2014)","journal-title":"Optik-Int. J. Light Electron Opt."},{"issue":"6","key":"43_CR16","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.image.2013.02.004","volume":"28","author":"H Zhu","year":"2013","unstructured":"Zhu, H., Zhao, C., Zhang, X.: A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Sig. Process. Image Commun. 28(6), 670\u2013680 (2013)","journal-title":"Sig. Process. Image Commun."},{"issue":"5","key":"43_CR17","first-page":"618","volume":"29","author":"M Ghebleh","year":"2014","unstructured":"Ghebleh, M., Kanso, A., Noura, H.: An image encryption scheme based on irregularly decimated chaotic maps. Sig. Process: Image Commun. 29(5), 618\u2013627 (2014)","journal-title":"Sig. Process: Image Commun."},{"issue":"2","key":"43_CR18","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.cnsns.2014.05.022","volume":"20","author":"Y Luo","year":"2015","unstructured":"Luo, Y., Du, M., Liu, J.: A symmetrical image encryption scheme in wavelet and time domain. Commun. Nonlinear Sci. Numer. Simul. 20(2), 447\u2013460 (2015)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"43_CR19","doi-asserted-by":"publisher","first-page":"1721","DOI":"10.1007\/s11071-015-1911-x","volume":"80","author":"J Zhao","year":"2015","unstructured":"Zhao, J., Wang, S., Chang, Y., Li, X.: A novel image encryption scheme based on an improper fractional-order chaotic system. Nonlinear Dyn. 80, 1721\u20131729 (2015)","journal-title":"Nonlinear Dyn."},{"key":"43_CR20","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1007\/s11071-015-1957-9","volume":"80","author":"X Tong","year":"2015","unstructured":"Tong, X., Wang, Z., Zhang, M., Liu, Y., Xu, H., Ma, J.: An image encryption algorithm based on the perturbed highdimensional chaotic map. Nonlinear Dyn. 80, 1493\u20131508 (2015)","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"43_CR21","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0303-2647(00)00083-6","volume":"57","author":"A Leier","year":"2000","unstructured":"Leier, A., Richter, C., Banzhaf, W.: Cryptography with DNA binary strands. Biosystems 57(1), 13\u201322 (2000)","journal-title":"Biosystems"},{"key":"43_CR22","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.optlastec.2017.04.022","volume":"95","author":"A Akhavan","year":"2017","unstructured":"Akhavan, A., Samsudin, A., Akhshani, A.: Cryptanalysis of an image encryption algorithm based on DNA encoding. Opt. Laser Technol. 95, 94\u201399 (2017)","journal-title":"Opt. Laser Technol."}],"container-title":["Communications in Computer and Information Science","Bio-inspired Computing: Theories and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-2829-9_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T21:47:49Z","timestamp":1538776069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-2829-9_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811328282","9789811328299"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-2829-9_43","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"BIC-TA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Bio-Inspired Computing: Theories and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bicta2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.bicta.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}