{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:45:14Z","timestamp":1742957114925,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_38","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"495-503","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel Shuffling"],"prefix":"10.1007","author":[{"given":"Aniq Ur","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Mayukh","family":"Bhattacharyya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"issue":"3","key":"38_CR1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1111\/j.1740-9713.2018.01139.x","volume":"15","author":"B Tarran","year":"2018","unstructured":"Tarran, B.: What can we learn from the Facebook Cambridge analytica scandal? Significance 15(3), 4\u20135 (2018)","journal-title":"Significance"},{"doi-asserted-by":"crossref","unstructured":"Marwick, A.E.: Scandal or sex crime? Ethical implications of the celebrity nude photo leaks. AoIR Selected Papers of Internet Research 6 (2017)","key":"38_CR2","DOI":"10.1007\/s10676-017-9431-7"},{"key":"38_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-24654-1_13","volume-title":"Selected Areas in Cryptography","author":"H Gilbert","year":"2004","unstructured":"Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 175\u2013193. Springer, Heidelberg (2004). \n                  https:\/\/doi.org\/10.1007\/978-3-540-24654-1_13"},{"issue":"4","key":"38_CR4","first-page":"338","volume":"13","author":"W Ding","year":"2001","unstructured":"Ding, W.: Digital image scrambling technology based on Arnold transformation. J. Comput. Aided Des. Comput. Graph. 13(4), 338\u2013341 (2001)","journal-title":"J. Comput. Aided Des. Comput. Graph."},{"doi-asserted-by":"crossref","unstructured":"Ravankar, A.A., Sedukhin, S.G.: Image scrambling based on a new linear transform. In: International Conference on Multimedia Technology (ICMT), 26 July 2011, pp. 3105\u20133108. IEEE (2011)","key":"38_CR5","DOI":"10.1109\/ICMT.2011.6002034"},{"doi-asserted-by":"crossref","unstructured":"Sarma, K.S., Lavanya, B.: Digital image scrambling based on sequence generation. In: International Conference on Circuit, Power and Computing Technologies (ICCPCT), 20 April 2017, pp. 1\u20135. IEEE (2017)","key":"38_CR6","DOI":"10.1109\/ICCPCT.2017.8074317"},{"doi-asserted-by":"crossref","unstructured":"Saraswathi, P.V., Venkatesulu, M.: A novel stream cipher using pesudo random binary sequence generator for medical image encryption. In: International Conference on Trends in Electronics and Informatics (ICEI), 11 May 2017, pp. 425\u2013429. IEEE (2017)","key":"38_CR7","DOI":"10.1109\/ICOEI.2017.8300961"},{"doi-asserted-by":"crossref","unstructured":"Wu, W.C., Yang, S.C.: Enhancing image security and privacy in cloud system using steganography. In: IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 12 June 2017, pp. 321\u2013322. IEEE (2017)","key":"38_CR8","DOI":"10.1109\/ICCE-China.2017.7991125"},{"doi-asserted-by":"crossref","unstructured":"Preishuber, M., Htter, T., Katzenbeisser, S., Uhl, A.: Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forensics Secur. (2018)","key":"38_CR9","DOI":"10.1109\/TIFS.2018.2812080"},{"doi-asserted-by":"crossref","unstructured":"Xing, Y., Li, M., Wang, L.: Chaotic-map image encryption scheme based on AES key producing schedule. In: IEEE Third International Conference on Data Science in Cyberspace (DSC), 18 June 2018. IEEE (2018)","key":"38_CR10","DOI":"10.1109\/DSC.2018.00095"},{"issue":"1","key":"38_CR11","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MSP.2008.930649","volume":"26","author":"Z Wang","year":"2009","unstructured":"Wang, Z., Bovik, A.C.: Mean squared error: love it or leave it? A new look at signal fidelity measures. Signal Process. Mag. IEEE 26(1), 98\u2013117 (2009)","journal-title":"Signal Process. Mag. IEEE"},{"issue":"4","key":"38_CR12","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"W Zhou","year":"2004","unstructured":"Zhou, W., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image qualifty assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Li, X.: A fast image encryption scheme based on integer wavelet and hyper-chaotic system. In: International Conference on Artificial Intelligence and Big Data (ICAIBD), 26 May 2018. IEEE (2018)","key":"38_CR13","DOI":"10.1109\/ICAIBD.2018.8396182"},{"issue":"338","key":"38_CR14","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.optcom.2014.10.049","volume":"1","author":"J Lang","year":"2015","unstructured":"Lang, J.: Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Opt. Commun. 1(338), 181\u2013192 (2015)","journal-title":"Opt. Commun.."},{"doi-asserted-by":"crossref","unstructured":"Kang, X., Han, Z., Yu, A., Duan, P.: Double random scrambling encoding in the RPMPFrHT domain. In: IEEE International Conference on Image Processing (ICIP), 17 September 2017, pp. 4362\u20134366. IEEE (2017)","key":"38_CR15","DOI":"10.1109\/ICIP.2017.8297106"},{"doi-asserted-by":"crossref","unstructured":"Kang, X., Ming, A., Tao, R.: Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans. Circuits Syst. Video Technol. (2018)","key":"38_CR16","DOI":"10.1109\/TCSVT.2018.2851983"},{"issue":"4\u20135","key":"38_CR17","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.physleta.2007.01.081","volume":"366","author":"S Behnia","year":"2007","unstructured":"Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavan, A.: A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys. Lett. A 366(4\u20135), 391\u2013396 (2007)","journal-title":"Phys. Lett. A"},{"key":"38_CR18","volume-title":"Elementary Statistics","author":"AG Bluman","year":"2013","unstructured":"Bluman, A.G.: Elementary Statistics. McGraw Hill, Chennai (2013)"},{"issue":"2","key":"38_CR19","first-page":"563","volume":"52","author":"CK Huang","year":"2013","unstructured":"Huang, C.K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun. Syst. 52(2), 563\u2013571 (2013)","journal-title":"Telecommun. Syst."},{"issue":"3","key":"38_CR20","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749\u2013761 (2004)","journal-title":"Chaos Solitons Fractals"},{"unstructured":"Rahman, A.U.: Pyxel, Github (2018). \n                  https:\/\/github.com\/Aniq55\/pyxel","key":"38_CR21"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:51:43Z","timestamp":1558396303000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_38","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}