{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:49:05Z","timestamp":1742935745333,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811668890"},{"type":"electronic","value":"9789811668906"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6890-6_6","type":"book-chapter","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:28Z","timestamp":1646488948000},"page":"63-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Image Encryption with Parallel Evolution of 2-D Cellular Automata"],"prefix":"10.1007","author":[{"given":"Shramona","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Soma","family":"Kundu","sequence":"additional","affiliation":[]},{"given":"Dipanwita Roy","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,6]]},"reference":[{"issue":"3","key":"6_CR1","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons, Fractals 21(3):749\u2013761","journal-title":"Chaos, Solitons, Fractals"},{"unstructured":"Maniccam SS, Bourbakis NG (1999) Scan based lossless image compression and encryption. In: Proceedings 1999 international conference on information intelligence and systems (Cat. No.PR00446), pp 490\u2013499","key":"6_CR2"},{"doi-asserted-by":"crossref","unstructured":"Li X, Knipe J, Cheng H (1997) Image compression and encryption using tree structures1this research is supported in part by motorola wireless data group and the canadian natural sciences and engineering research council under grant ogp9198.1. Pattern Recogn Lett 18(11):1253\u20131259","key":"6_CR3","DOI":"10.1016\/S0167-8655(97)00099-8"},{"key":"6_CR4","first-page":"345","volume":"2009","author":"J Jin","year":"2009","unstructured":"Jin J (2009) Image encryption method based on elementary cellular automata. IEEE southeastcon 2009:345\u2013349","journal-title":"IEEE southeastcon"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/3-540-39799-X_32","volume-title":"Advances in cryptology \u2013 CRYPTO \u201985 proceedings","author":"S Wolfram","year":"1986","unstructured":"Wolfram S (1986) Cryptography with cellular automata. In: Williams HC (ed) Advances in cryptology \u2013 CRYPTO \u201985 proceedings. Springer, Berlin, pp 429\u2013432"},{"doi-asserted-by":"crossref","unstructured":"Xuelong Z, Qianmu L, Manwu X, Fengyu L (2005) A symmetric cryptography based on extended cellular automata. In: 2005 IEEE international conference on systems, man and cybernetics, vol 1, pp 499\u2013503","key":"6_CR6","DOI":"10.1109\/ICSMC.2005.1571195"},{"issue":"5","key":"6_CR7","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1016\/j.patcog.2006.11.011","volume":"40","author":"R-J Chen","year":"2007","unstructured":"Chen R-J, Lai J-L (2007) Image security system using recursive cellular automata substitution. Pattern Recogn 40(5):1621\u20131631","journal-title":"Pattern Recogn"},{"doi-asserted-by":"crossref","unstructured":"Perales JCM, de\u00a0C\u00f3mputo ES (2015) Color image encryption by cellular automata","key":"6_CR8","DOI":"10.12988\/ces.2015.510285"},{"doi-asserted-by":"crossref","unstructured":"Alvarez G, Hernandez A, Hernandez L, Martin A, Rodriguez G (2005) A new graphic cryptosystem based on one-dimensional memory cellular automata. In: Proceedings 39th annual 2005 international carnahan conference on security technology, pp 200\u2013203","key":"6_CR9","DOI":"10.1109\/CCST.2005.1594842"},{"doi-asserted-by":"crossref","unstructured":"Maleki F, Mohades A, Hashemi SM, Shiri ME (2008) An image encryption system by cellular automata with memory. In: 2008 third international conference on availability, reliability and security, pp 1266\u20131271","key":"6_CR10","DOI":"10.1109\/ARES.2008.121"},{"doi-asserted-by":"crossref","unstructured":"Yu L, Li Y, Xia X (2008) Image encryption algorithm based on self-adaptive symmetrical-coupled toggle cellular automata. In: 2008 Congress on image and signal processing, vol 3, pp 32\u201336","key":"6_CR11","DOI":"10.1109\/CISP.2008.48"},{"key":"6_CR12","volume-title":"Additive cellular automata: theory and applications","author":"PP Chaudhuri","year":"1997","unstructured":"Chaudhuri PP, Chowdhury DR, Nandi S, Chattopadhyay S (1997) Additive cellular automata: theory and applications, vol 43. Wiley, New York"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1016\/j.neucom.2017.09.068","volume":"275","author":"Y Wang","year":"2018","unstructured":"Wang Y, Zhao Y, Zhou Q, Lin Z (2018) Image encryption using partitioned cellular automata. Neurocomputing 275:1318\u20131332","journal-title":"Neurocomputing"},{"unstructured":"Chen R-J, Chen Y-H, Chen C-S, Lai J-L (2006) Image encryption\/decryption system using 2-d cellular automata. In: 2006 IEEE international symposium on consumer electronics, pp 1\u20136","key":"6_CR14"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"22825","DOI":"10.1007\/s11042-020-09033-y","volume":"79","author":"US Choi","year":"2020","unstructured":"Choi US, Cho SJ, Kim JG, Kang SW, Kim HD (2020) Color image encryption based on programmable complemented maximum length cellular automata and generalized 3-d chaotic cat map. Multimedia Tools Appl 79:22825\u201322842","journal-title":"Multimedia Tools Appl"},{"doi-asserted-by":"crossref","unstructured":"Roy S, Shrivastava M, Pandey CV, Nayak SK, Rawat U (2020) Ievca: an efficient image encryption technique for iot applications using 2-d von-neumann cellular automata. Multimedia Tools Appl 1\u201339","key":"6_CR16","DOI":"10.1007\/s11042-020-09880-9"},{"key":"6_CR17","volume-title":"Modern cryptology: a tutorial","author":"G Brassard","year":"1988","unstructured":"Brassard G et al (1988) Modern cryptology: a tutorial, vol 325. Springer, Berlin"},{"doi-asserted-by":"crossref","unstructured":"Xiao S, Yu ZJ, Deng YS (2020) Design and analysis of a novel chaos-based image encryption algorithm via switch control mechanism. Security and communication networks 2020","key":"6_CR18","DOI":"10.1155\/2020\/7913061"},{"issue":"1","key":"6_CR19","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"X Chai","year":"2019","unstructured":"Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on dna sequence operations and chaotic systems. Neural Comput Appl 31(1):219\u2013237","journal-title":"Neural Comput Appl"},{"issue":"1","key":"6_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-014-2221-x","volume":"75","author":"A Kulsoom","year":"2016","unstructured":"Kulsoom A, Xiao D, Abbas SA et al (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and dna complementary rules. Multimedia Tools Appl 75(1):1\u201323","journal-title":"Multimedia Tools Appl"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1d chaotic map. Signal Proc 138:129\u2013137","journal-title":"Signal Proc"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.ins.2020.03.054","volume":"526","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Chen A, Tang Y, Dang J, Wang G (2020) Plaintext-related image encryption algorithm based on perceptron-like network. Inf Sci 526:180\u2013202","journal-title":"Inf Sci"},{"issue":"01","key":"6_CR23","doi-asserted-by":"publisher","first-page":"1954002","DOI":"10.1142\/S0218001419540028","volume":"33","author":"K Zhu","year":"2019","unstructured":"Zhu K, Lin Z, Ding Y (2019) A new RSA image encryption algorithm based on singular value decomposition. Int J Pattern Recogn Artif Intell 33(01):1954002","journal-title":"Int J Pattern Recogn Artif Intell"},{"issue":"4","key":"6_CR24","doi-asserted-by":"publisher","first-page":"2293","DOI":"10.1007\/s11071-015-2481-7","volume":"83","author":"Y Luo","year":"2016","unstructured":"Luo Y, Cao L, Qiu S, Lin H, Harkin J, Liu J (2016) A chaotic map-control-based and the plain image-related cryptosystem. Nonlinear Dyn 83(4):2293\u20132310","journal-title":"Nonlinear Dyn"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Seventh International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6890-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:03:41Z","timestamp":1646489021000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6890-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811668890","9789811668906"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6890-6_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}