{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:14:05Z","timestamp":1742948045892,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":43,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811680588"},{"type":"electronic","value":"9789811680595"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_7","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"95-113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7747-1738","authenticated-orcid":false,"given":"Haidar Raad","family":"Shakir","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9672-4537","authenticated-orcid":false,"given":"Suhad Abbas","family":"Yassir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1007\/s12652-019-01385-0","volume":"11","author":"PS Sneha","year":"2019","unstructured":"Sneha, P.S., Sankar, S., Kumar, A.S.: A chaotic colour image encryption scheme combining Walsh\u2013Hadamard transform and Arnold\u2013Tent maps. J. Ambient Intell. Human. Comput. 11(3), 1289\u20131308 (2019). https:\/\/doi.org\/10.1007\/s12652-019-01385-0","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e22111253","volume":"22","author":"I Yasser","year":"2020","unstructured":"Yasser, I., Mohamed, M.A., Samra, A.S., Khalifa, F.: A chaotic-based encryption\/decryption framework for secure multimedia communications. Entropy 22, 1\u201323 (2020). https:\/\/doi.org\/10.3390\/e22111253","journal-title":"Entropy"},{"key":"7_CR3","first-page":"3186","volume":"4","author":"AS Dongare","year":"2017","unstructured":"Dongare, A.S., Alvi, A.S., Tarbani, P.N.M.: An efficient technique for image encryption and decryption for secured multimedia application. Int. Res. J. Eng. Technol. 4, 3186\u20133190 (2017)","journal-title":"Int. Res. J. Eng. Technol."},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11071-017-3874-6","volume":"91","author":"A Ullah","year":"2017","unstructured":"Ullah, A., Jamal, S.S., Shah, T.: A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn. 91(1), 359\u2013370 (2017). https:\/\/doi.org\/10.1007\/s11071-017-3874-6","journal-title":"Nonlinear Dyn."},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"22703","DOI":"10.1007\/s11042-016-4333-y","volume":"76","author":"S Aljawarneh","year":"2017","unstructured":"Aljawarneh, S., Yassein, M.B., Talafha, W.A.: A resource-efficient encryption algorithm for multimedia big data. Multimedia Tools Appl. 76, 22703\u201322724 (2017). https:\/\/doi.org\/10.1007\/s11042-016-4333-y","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"4693","DOI":"10.1007\/s11042-020-09892-5","volume":"80","author":"MI Haider","year":"2020","unstructured":"Haider, M.I., Ali, A., Shah, D., Shah, T.: Block cipher\u2019s nonlinear component design by elliptic curves: an image encryption application. Multimedia Tools Appl. 80(3), 4693\u20134718 (2020). https:\/\/doi.org\/10.1007\/s11042-020-09892-5","journal-title":"Multimedia Tools Appl."},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"01","DOI":"10.9790\/9622-0707030105","volume":"7","author":"SF Sultana","year":"2017","unstructured":"Sultana, S.F., Shubhangi, D.C.: Video encryption algorithm and key management using perfect shuffle. Int. J. Eng. Res. Appl. 7, 01\u201305 (2017). https:\/\/doi.org\/10.9790\/9622-0707030105","journal-title":"Int. J. Eng. Res. Appl."},{"issue":"27-28","key":"7_CR8","doi-asserted-by":"publisher","first-page":"19717","DOI":"10.1007\/s11042-020-08788-8","volume":"79","author":"RI Abdelfatah","year":"2020","unstructured":"Abdelfatah, R.I., Nasr, M.E., Alsharqawy, M.A.: Encryption for multimedia based on chaotic map: several scenarios. Multimedia Tools Appl. 79(27\u201328), 19717\u201319738 (2020). https:\/\/doi.org\/10.1007\/s11042-020-08788-8","journal-title":"Multimedia Tools Appl."},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Belazi, A., Abd El-Latif, A.A., Rhouma, R., Belghith, S.: Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. In: IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference, pp. 606\u2013610 (2015). https:\/\/doi.org\/10.1109\/IWCMC.2015.7289152","DOI":"10.1109\/IWCMC.2015.7289152"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Chakravarthy, S., Venkatesan, S.P., Anand, J.M., Ranjani, J.J.: Enhanced playfair cipher for image encryption using integer wavelet transform. Indian J. Sci. Technol. 9 (2016). https:\/\/doi.org\/10.17485\/ijst\/2016\/v9i39\/86519","DOI":"10.17485\/ijst\/2016\/v9i39\/86519"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.ijleo.2017.07.041","volume":"145","author":"A Vaish","year":"2017","unstructured":"Vaish, A., Kumar, M.: Color image encryption using MSVD, DWT and Arnold transform in fractional Fourier domain. Optik (Stuttg) 145, 273\u2013283 (2017). https:\/\/doi.org\/10.1016\/j.ijleo.2017.07.041","journal-title":"Optik (Stuttg)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Sangavi, V., Thangavel, P.: An image encryption algorithm based on fractal geometry. In: Procedia Computer Science, pp. 462\u2013469 (2019)","DOI":"10.1016\/j.procs.2020.01.007"},{"issue":"22","key":"7_CR13","doi-asserted-by":"publisher","first-page":"24251","DOI":"10.1007\/s11042-016-4102-y","volume":"76","author":"C Wang","year":"2016","unstructured":"Wang, C., Zhang, X., Zheng, Z.: An efficient image encryption algorithm based on a novel chaotic map. Multimedia Tools Appl. 76(22), 24251\u201324280 (2016). https:\/\/doi.org\/10.1007\/s11042-016-4102-y","journal-title":"Multimedia Tools Appl."},{"issue":"7","key":"7_CR14","doi-asserted-by":"publisher","first-page":"9907","DOI":"10.1007\/s11042-016-3585-x","volume":"76","author":"X Chai","year":"2016","unstructured":"Chai, X., Yang, K., Gan, Z.: A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimedia Tools Appl. 76(7), 9907\u20139927 (2016). https:\/\/doi.org\/10.1007\/s11042-016-3585-x","journal-title":"Multimedia Tools Appl."},{"issue":"2","key":"7_CR15","doi-asserted-by":"publisher","first-page":"2611","DOI":"10.1007\/s11042-017-4455-x","volume":"77","author":"X Huang","year":"2017","unstructured":"Huang, X., Ye, G.: An image encryption algorithm based on irregular wave representation. Multimedia Tools Appl. 77(2), 2611\u20132628 (2017). https:\/\/doi.org\/10.1007\/s11042-017-4455-x","journal-title":"Multimedia Tools Appl."},{"issue":"19","key":"7_CR16","doi-asserted-by":"publisher","first-page":"25223","DOI":"10.1007\/s11042-018-5782-2","volume":"77","author":"SJ Sheela","year":"2018","unstructured":"Sheela, S.J., Suresh, K.V., Tandur, D.: Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimedia Tools Appl. 77(19), 25223\u201325251 (2018). https:\/\/doi.org\/10.1007\/s11042-018-5782-2","journal-title":"Multimedia Tools Appl."},{"issue":"12","key":"7_CR17","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1007\/s00542-019-04395-2","volume":"25","author":"KAK Patro","year":"2019","unstructured":"Patro, K.A.K., Acharya, B., Nath, V.: Secure multilevel permutation-diffusion based image encryption using chaotic and hyper-chaotic maps. Microsyst. Technol. 25(12), 4593\u20134607 (2019). https:\/\/doi.org\/10.1007\/s00542-019-04395-2","journal-title":"Microsyst. Technol."},{"key":"7_CR18","first-page":"18","volume":"7","author":"S Sindhu","year":"2017","unstructured":"Sindhu, S.: Cryptographic algorithms\u202f: applications in network security. Int. J. New Innov. Eng. Technol. 7, 18\u201328 (2017)","journal-title":"Int. J. New Innov. Eng. Technol."},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Fadhel Hamood, S., Mohd Rahim, M.S., Farook Mohammado, O.: Chaos image encryption methods: a survey study. Bull. Electr. Eng. Inform. 6, 99\u2013104 (2017). https:\/\/doi.org\/10.11591\/eei.v6i1.599","DOI":"10.11591\/eei.v6i1.599"},{"key":"7_CR20","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-38700-6_1","volume-title":"Multimedia Security Using Chaotic Maps: Principles and Methodologies","author":"M Kumar","year":"2020","unstructured":"Kumar, M., Saxena, A., Vuppala, S.S.: A survey on chaos based image encryption techniques. In: Hosny, K.M. (ed.) Multimedia Security Using Chaotic Maps: Principles and Methodologies. SCI, vol. 884, pp. 1\u201326. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-38700-6_1"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Roy, M., Mali, K., Chatterjee, S., Chakraborty, S., Debnath, R., Sen, S.: A study on the applications of the biomedical image encryption methods for secured computer aided diagnostics. In: Proceedings - 2019 Amity International Conference on Artificial Intelligence, AICAI 2019, pp. 881\u2013886. Institute of Electrical and Electronics Engineers Inc. (2019)","DOI":"10.1109\/AICAI.2019.8701382"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"88093","DOI":"10.1109\/ACCESS.2020.2990170","volume":"8","author":"MGA Malik","year":"2020","unstructured":"Malik, M.G.A., Bashir, Z., Iqbal, N., Imtiaz, M.A.: Color image encryption algorithm based on hyper-chaos and DNA computing. IEEE Access 8, 88093\u201388107 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2990170","journal-title":"IEEE Access"},{"key":"7_CR23","first-page":"1511","volume":"4","author":"A Bagul","year":"2017","unstructured":"Bagul, A., Sonawane, P., Sawant, L., Doshi, R.: Advance security in cloud computing for military weapons. Int. Res. J. Eng. Technol. 4, 1511\u20131513 (2017)","journal-title":"Int. Res. J. Eng. Technol."},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1080\/15551020902995363","volume":"4","author":"PB Fuqua","year":"2009","unstructured":"Fuqua, P.B.: Dear Author. Int. J. Psychoanal. Self Psychol. 4, 398\u2013400 (2009). https:\/\/doi.org\/10.1080\/15551020902995363","journal-title":"Int. J. Psychoanal. Self Psychol."},{"key":"7_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-75562-z","volume":"10","author":"X Wang","year":"2020","unstructured":"Wang, X., Su, Y.: Color image encryption based on chaotic compressed sensing and two-dimensional fractional Fourier transform. Sci. Rep. 10, 1\u201319 (2020). https:\/\/doi.org\/10.1038\/s41598-020-75562-z","journal-title":"Sci. Rep."},{"key":"7_CR26","first-page":"75","volume":"5","author":"SK Mathur","year":"2017","unstructured":"Mathur, S.K., Srivastava, S.: Extended 16x16 playfair cipher algorithm for secure key exchange using RSA algorithm. Int. J. Sci. Innov. Res. 5, 75\u201381 (2017)","journal-title":"Int. J. Sci. Innov. Res."},{"key":"7_CR27","doi-asserted-by":"publisher","first-page":"106178","DOI":"10.1016\/j.optlaseng.2020.106178","volume":"134","author":"Q Xu","year":"2020","unstructured":"Xu, Q., Sun, K., He, S., Zhu, C.: An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Opt. Lasers Eng. 134, 106178 (2020). https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106178","journal-title":"Opt. Lasers Eng."},{"key":"7_CR28","doi-asserted-by":"publisher","first-page":"105703","DOI":"10.1016\/j.optlastec.2019.105703","volume":"120","author":"S Yao","year":"2019","unstructured":"Yao, S., Chen, L., Zhong, Y.: An encryption system for color image based on compressive sensing. Opt. Laser Technol. 120, 105703 (2019). https:\/\/doi.org\/10.1016\/j.optlastec.2019.105703","journal-title":"Opt. Laser Technol."},{"key":"7_CR29","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","volume":"160","author":"M Alawida","year":"2019","unstructured":"Alawida, M., Samsudin, A., Teh, J.S., Alkhawaldeh, R.S.: A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160, 45\u201358 (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2019.02.016","journal-title":"Signal Process."},{"key":"7_CR30","doi-asserted-by":"publisher","first-page":"43391","DOI":"10.1109\/ACCESS.2020.2978186","volume":"8","author":"WH Alshoura","year":"2020","unstructured":"Alshoura, W.H., Zainol, Z., Teh, J.S., Alawida, M.: A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 8, 43391\u201343406 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2978186","journal-title":"IEEE Access"},{"key":"7_CR31","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.sigpro.2019.06.013","volume":"164","author":"M Alawida","year":"2019","unstructured":"Alawida, M., Teh, J.S., Samsudin, A., Alshoura, W.H.: An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process. 164, 249\u2013266 (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2019.06.013","journal-title":"Signal Process."},{"issue":"2","key":"7_CR32","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1007\/s11042-017-4370-1","volume":"77","author":"D Zhang","year":"2017","unstructured":"Zhang, D., Liao, X., Yang, B., Zhang, Y.: A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform. Multimedia Tools Appl. 77(2), 2191\u20132208 (2017). https:\/\/doi.org\/10.1007\/s11042-017-4370-1","journal-title":"Multimedia Tools Appl."},{"key":"7_CR33","doi-asserted-by":"publisher","unstructured":"Albahrani, E.A., Maryoosh, A.A., Lafta, S.H.: Block image encryption based on modified playfair and chaotic system. J. Inf. Secur. Appl. 51 (2020). https:\/\/doi.org\/10.1016\/j.jisa.2019.102445","DOI":"10.1016\/j.jisa.2019.102445"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Ghrare, S.E., Ali, M.A.M., Ismail, M., Jumari, K.: Diagnostic quality of compressed medical images: objective and subjective evaluation. In: 2008 Second Asia International Conference on Modelling & Simulation (AMS), pp. 923\u2013927. IEEE (2008)","DOI":"10.1109\/AMS.2008.10"},{"key":"7_CR35","doi-asserted-by":"publisher","unstructured":"Elahi, S., kaleem, M., Omer, H.: Compressively sampled MR image reconstruction using generalized thresholding iterative algorithm. J. Magn. Reson. 286, 91\u201398 (2018). https:\/\/doi.org\/10.1016\/j.jmr.2017.11.008","DOI":"10.1016\/j.jmr.2017.11.008"},{"key":"7_CR36","doi-asserted-by":"publisher","first-page":"83554","DOI":"10.1371\/journal.pone.0083554","volume":"8","author":"L Nanni","year":"2013","unstructured":"Nanni, L., Brahnam, S., Ghidoni, S., Menegatti, E., Barrier, T.: Different approaches for extracting information from the co-occurrence matrix. PLoS One 8, 83554 (2013). https:\/\/doi.org\/10.1371\/journal.pone.0083554","journal-title":"PLoS One"},{"key":"7_CR37","first-page":"7","volume":"10","author":"HY Chai","year":"2011","unstructured":"Chai, H.Y., Wee, L.K., Swee, T.T., Hussain, S.: Gray-level co-occurrence matrix bone fracture detection. WSEAS Trans. Syst. 10, 7\u201316 (2011)","journal-title":"WSEAS Trans. Syst."},{"key":"7_CR38","unstructured":"Samhita, P., Prasad, P., Abhimanyu Kumar Patro, K., Acharya, B.: A secure chaos-based image encryption and decryption using crossover and mutation operator. Int. J. Control Theory Appl. 9, 17\u201328 (2016)"},{"key":"7_CR39","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/s11235-011-9461-0","volume":"52","author":"CK Huang","year":"2013","unstructured":"Huang, C.K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun. Syst. 52, 563\u2013571 (2013). https:\/\/doi.org\/10.1007\/s11235-011-9461-0","journal-title":"Telecommun. Syst."},{"issue":"5","key":"7_CR40","doi-asserted-by":"publisher","first-page":"3829","DOI":"10.1007\/s00500-019-04151-8","volume":"24","author":"M Es-Sabry","year":"2019","unstructured":"Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft Comput. 24(5), 3829\u20133848 (2019). https:\/\/doi.org\/10.1007\/s00500-019-04151-8","journal-title":"Soft Comput."},{"key":"7_CR41","doi-asserted-by":"publisher","unstructured":"Zhang, X., Wang, L., Cui, G., Niu, Y.: Entropy-based block scrambling image encryption using DES structure and chaotic systems. Int. J. Opt. 2019 (2019). https:\/\/doi.org\/10.1155\/2019\/3594534","DOI":"10.1155\/2019\/3594534"},{"key":"7_CR42","doi-asserted-by":"publisher","first-page":"271","DOI":"10.3745\/JIPS.2013.9.2.271","volume":"9","author":"OP Verma","year":"2013","unstructured":"Verma, O.P., Nizam, M., Ahmad, M.: Modified multi-chaotic systems that are based on pixel shuffle for image encryption. J. Inf. Process. Syst. 9, 271\u2013286 (2013). https:\/\/doi.org\/10.3745\/JIPS.2013.9.2.271","journal-title":"J. Inf. Process. Syst."},{"issue":"23","key":"7_CR43","doi-asserted-by":"publisher","first-page":"31177","DOI":"10.1007\/s11042-018-6214-z","volume":"77","author":"B Mondal","year":"2018","unstructured":"Mondal, B., Kumar, P., Singh, S.: A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimedia Tools Appl. 77(23), 31177\u201331198 (2018). https:\/\/doi.org\/10.1007\/s11042-018-6214-z","journal-title":"Multimedia Tools Appl."}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:13:42Z","timestamp":1638450822000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}