{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:45:32Z","timestamp":1743111932726,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811613531"},{"type":"electronic","value":"9789811613548"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-1354-8_9","type":"book-chapter","created":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T08:02:49Z","timestamp":1617177769000},"page":"90-105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hyperchaotic Encryption Algorithm Based on Joseph Traversal and Bit Plane Reconstruction"],"prefix":"10.1007","author":[{"given":"Tao","family":"Wu","sequence":"first","affiliation":[]},{"given":"Shida","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xuncai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Heng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yanfeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,1]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Process. 143, 122\u2013133 (2018)","journal-title":"Signal Process."},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai, X., Chen, Y., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197\u2013213 (2017)","journal-title":"Opt. Lasers Eng."},{"issue":"31","key":"9_CR3","doi-asserted-by":"publisher","first-page":"3185","DOI":"10.1016\/j.physleta.2010.05.056","volume":"374","author":"Y Chen","year":"2010","unstructured":"Chen, Y.: Optimal windows of rewiring period in randomly coupled chaotic maps. Phys. Lett. A 374(31), 3185\u20133189 (2010)","journal-title":"Phys. Lett. A"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","volume":"115","author":"L Gong","year":"2019","unstructured":"Gong, L., Qiu, K., Deng, C.: An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt. Laser Technol. 115, 257\u2013267 (2019)","journal-title":"Opt. Laser Technol."},{"key":"9_CR5","first-page":"102361","volume":"48","author":"C Li","year":"2019","unstructured":"Li, C., Zhang, Y.: When an attacker meets a cipher-image in 2018: a year in review. J. Inf. Secur. Appl. 48, 102361 (2019)","journal-title":"J. Inf. Secur. Appl."},{"key":"9_CR6","first-page":"124048","volume":"369","author":"H Lin","year":"2020","unstructured":"Lin, H.: Influences of electromagnetic radiation distribution on chaotic dynamics of a neural network. Appl. Math. Comput. 369, 124048 (2020)","journal-title":"Appl. Math. Comput."},{"issue":"2","key":"9_CR7","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1016\/j.cnsns.2014.06.005","volume":"20","author":"Q Liu","year":"2015","unstructured":"Liu, Q., Li, P., Zhang, M., Sui, Y.: A novel image encryption algorithm based on chaos maps with Markov properties. Commun. Nonlinear Sci. Numer. Simul. 20(2), 506\u2013515 (2015)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak, C., Huang, L.: A new color image encryption using combination of the 1d chaotic map. Signal Process. 138, 129\u2013137 (2017)","journal-title":"Signal Process."},{"issue":"2","key":"9_CR9","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.jare.2015.07.002","volume":"7","author":"AG Radwan","year":"2016","unstructured":"Radwan, A.G., AbdElHaleem, S.H.: Symmetric encryption algorithms using chaotic and non-chaotic generators: a review. J. Adv. Res. 7(2), 193\u2013208 (2016)","journal-title":"J. Adv. Res."},{"issue":"1","key":"9_CR10","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/s11071-011-9984-7","volume":"67","author":"X Wang","year":"2012","unstructured":"Wang, X., Teng, L.: An image blocks encryption algorithm based on spatiotemporal chaos. Nonlinear Dyn. 67(1), 365\u2013371 (2012)","journal-title":"Nonlinear Dyn."},{"issue":"4","key":"9_CR11","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","volume":"41","author":"Y Wang","year":"2009","unstructured":"Wang, Y., Wong, K.W., Liao, X., Xiang, T.: A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41(4), 1773\u20131783 (2009)","journal-title":"Chaos, Solitons Fractals"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","volume":"142","author":"J Wu","year":"2018","unstructured":"Wu, J., Liao, X., Yang, B.: Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process. 142, 292\u2013300 (2018)","journal-title":"Signal Process."},{"key":"9_CR13","first-page":"31","volume":"2","author":"Y Wu","year":"2011","unstructured":"Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscipl. J. Sci. Technol. J. Sel. Areas in Telecommunications 2, 31\u201338 (2011)","journal-title":"Cyber J. Multidiscipl. J. Sci. Technol. J. Sel. Areas in Telecommunications"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu, Y., Zhou, Y., Noonan, J.P., Agaian, S.: Design of image cipher using Latin squares. Inf. Sci. 264, 317\u2013339 (2014)","journal-title":"Inf. Sci."},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323\u2013342 (2013)","journal-title":"Inf. Sci."},{"issue":"10","key":"9_CR16","first-page":"44","volume":"41","author":"D Xiang","year":"2005","unstructured":"Xiang, D., Xiong, Y.: Digital image scrambling based on Josephus traversing. Comput. Eng. Appl. 41(10), 44\u201346 (2005)","journal-title":"Comput. Eng. Appl."},{"issue":"5","key":"9_CR17","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.physleta.2005.10.033","volume":"350","author":"H Zhang","year":"2006","unstructured":"Zhang, H., Huang, W., Wang, Z., Chai, T.: Adaptive synchronization between two different chaotic systems with unknown parameters. Phys. Lett. A 350(5), 363\u2013366 (2006)","journal-title":"Phys. Lett. A"},{"issue":"4","key":"9_CR18","doi-asserted-by":"publisher","first-page":"2159","DOI":"10.1007\/s11071-019-05113-3","volume":"97","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Wang, C., Yao, W., Lin, H.: Chaotic system with Bondorbital attractors. Nonlinear Dyn. 97(4), 2159\u20132174 (2019). https:\/\/doi.org\/10.1007\/s11071-019-05113-3","journal-title":"Nonlinear Dyn."},{"issue":"52","key":"9_CR19","first-page":"52","volume":"52","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y.: Spatiotemporal chaos of fractional order logistic equation in nonlinear coupled lattices. Commun. Nonlinear Sci. Numer. Simul. 52(52), 52\u201361 (2017)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.asoc.2014.09.039","volume":"26","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Wang, X.: A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput. 26, 10\u201320 (2015)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"9_CR21","doi-asserted-by":"publisher","first-page":"13141","DOI":"10.1063\/1.5081076","volume":"29","author":"Q Zhao","year":"2019","unstructured":"Zhao, Q., Wang, C., Zhang, X.: A universal emulator for memristor, memcapacitor, and meminductor and its chaotic circuit. Chaos 29(1), 13141 (2019)","journal-title":"Chaos"},{"issue":"11","key":"9_CR22","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"Z Gan","year":"2018","unstructured":"Gan, Z., Chai, X., Han, D., Chen, Y.: A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput. Appl. 31(11), 7111\u20137130 (2018). https:\/\/doi.org\/10.1007\/s00521-018-3541-y","journal-title":"Neural Comput. Appl."},{"key":"9_CR23","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou, Y., Bao, L.: A new 1d chaotic system for image encryption. Signal Process. 97, 172\u2013182 (2014)","journal-title":"Signal Process."}],"container-title":["Communications in Computer and Information Science","Bio-Inspired Computing: Theories and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-1354-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T08:08:06Z","timestamp":1617178086000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-16-1354-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811613531","9789811613548"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-1354-8_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIC-TA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Bio-Inspired Computing: Theories and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bicta2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.bicta.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"109","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}