{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T17:21:52Z","timestamp":1750785712581,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T00:00:00Z","timestamp":1481500800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Scientific and Technological Research Program of Chongqing Municipal Education Commission","award":["KJ1501405","KJ1501409"],"award-info":[{"award-number":["KJ1501405","KJ1501409"]}]},{"name":"Scientific and Technological Research Program of Chongqing University of Education","award":["KY201522B","KY201520B"],"award-info":[{"award-number":["KY201522B","KY201520B"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["XDJK2016E068"],"award-info":[{"award-number":["XDJK2016E068"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61170192"],"award-info":[{"award-number":["61170192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012164","name":"National High-tech Research and Development Program","doi-asserted-by":"crossref","award":["2013AA013801"],"award-info":[{"award-number":["2013AA013801"]}],"id":[{"id":"10.13039\/501100012164","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s00521-016-2753-2","type":"journal-article","created":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T07:15:43Z","timestamp":1481526943000},"page":"1277-1287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A fast pseudo-stochastic sequential cipher generator based on RBMs"],"prefix":"10.1007","volume":"30","author":[{"given":"Fei","family":"Hu","sequence":"first","affiliation":[]},{"given":"Xiaofei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Changjiu","family":"Pu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4818-8770","authenticated-orcid":false,"given":"Li","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,12]]},"reference":[{"issue":"9","key":"2753_CR1","doi-asserted-by":"crossref","first-page":"097005","DOI":"10.1117\/1.3488044","volume":"49","author":"MT Lee","year":"2010","unstructured":"Lee MT, Chang HT (2010) Copyright protection scheme for still images based on an image pinned field. Opt Eng 49(9):097005","journal-title":"Opt Eng"},{"issue":"10","key":"2753_CR2","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/S0141-9331(97)00009-4","volume":"20","author":"I Kokolakis","year":"1997","unstructured":"Kokolakis I, Andreadis I, Tsalides Ph (1997) Comparison between cellular automata and linear feedback shift registers based pseudo-random number generators. Microprocess Microsyst 20(10):643\u2013658","journal-title":"Microprocess Microsyst"},{"key":"2753_CR3","volume-title":"Applied cryptography: protocols, algorithms, and source code in C","author":"B Schneier","year":"2007","unstructured":"Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley, New York"},{"key":"2753_CR4","first-page":"008","volume":"2","author":"Y Luo","year":"1998","unstructured":"Luo Y, Zhang Z (1998) Neural network models for design of block cipher system. J Syst Sci Math Sci (English series) 2:008","journal-title":"J Syst Sci Math Sci (English series)"},{"issue":"4","key":"2753_CR5","first-page":"677","volume":"32","author":"Q Ding","year":"2004","unstructured":"Ding Q, Lu ZM, Sun XJ (2004) The image encryption based on neural network cipher. Acta Electron Sin 32(4):677\u2013679","journal-title":"Acta Electron Sin"},{"issue":"4","key":"2753_CR6","doi-asserted-by":"crossref","first-page":"1296","DOI":"10.1016\/j.neucom.2008.11.005","volume":"72","author":"S Lian","year":"2009","unstructured":"Lian S (2009) A block cipher based on chaotic neural networks. Neurocomputing 72(4):1296\u20131301","journal-title":"Neurocomputing"},{"issue":"2","key":"2753_CR7","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1016\/j.compeleceng.2011.11.019","volume":"38","author":"N Bigdeli","year":"2012","unstructured":"Bigdeli N, Farid Y, Afshar K (2012) A robust hybrid method for image encryption based on hopfield neural network. Comput Electr Eng 38(2):356\u2013369","journal-title":"Comput Electr Eng"},{"issue":"9","key":"2753_CR8","first-page":"1","volume":"4","author":"J Wang","year":"2012","unstructured":"Wang J (2012) The research of neural network mixed with image encryption based on chaotic encryption technology. Adv Inform Sci Servi Sci 4(9):1\u20138","journal-title":"Adv Inform Sci Servi Sci"},{"key":"2753_CR9","doi-asserted-by":"crossref","unstructured":"Fischer A, Igel C (2012) An introduction to restricted boltzmann machines. In: Alvarez L, Mejail M, Gomez L, Jacobo J (eds) Progress in pattern recognition, image analysis, computer vision, and applications. Springer, pp 14\u201336","DOI":"10.1007\/978-3-642-33275-3_2"},{"issue":"5786","key":"2753_CR10","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton GE, Salakhutdinov RR (2006) Reducing the dimensionality of data with neural networks. Science 313(5786):504\u2013507","journal-title":"Science"},{"issue":"8","key":"2753_CR11","doi-asserted-by":"crossref","first-page":"1771","DOI":"10.1162\/089976602760128018","volume":"14","author":"GE Hinton","year":"2002","unstructured":"Hinton GE (2002) Training products of experts by minimizing contrastive divergence. Neural Comput 14(8):1771\u20131800","journal-title":"Neural Comput"},{"key":"2753_CR12","doi-asserted-by":"crossref","unstructured":"Hussain F, Jeong J (2015) Exploiting deep neural networks for digital image compression. In: 2015 2nd world symposium on web applications and networking (WSWAN), pp 1\u20136","DOI":"10.1109\/WSWAN.2015.7210294"},{"key":"2753_CR13","first-page":"1","volume":"2016","author":"F Hussain","year":"2016","unstructured":"Hussain F, Jeong J (2016) Efficient deep neural network for digital image compression employing rectified linear neurons. J Sens 2016:1\u20137","journal-title":"J Sens"},{"key":"2753_CR14","doi-asserted-by":"crossref","unstructured":"Chhotaray A, Biswas S, Chhotaray SK, Rath GS (2016) An image encryption technique using orthonormal matrices and chaotic maps. In: Proceedings of 3rd international conference on advanced computing, networking and informatics, pp 355\u2013362. Springer","DOI":"10.1007\/978-81-322-2529-4_37"},{"issue":"3","key":"2753_CR15","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 21(3):749\u2013761","journal-title":"Chaos Solitons Fractals"},{"issue":"4","key":"2753_CR16","doi-asserted-by":"crossref","first-page":"1518","DOI":"10.1016\/j.chaos.2005.11.090","volume":"32","author":"HS Kwok","year":"2007","unstructured":"Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solitons Fractals 32(4):1518\u20131529","journal-title":"Chaos Solitons Fractals"},{"issue":"3","key":"2753_CR17","doi-asserted-by":"crossref","first-page":"269","DOI":"10.3233\/FI-2009-0018","volume":"90","author":"J Peng","year":"2009","unstructured":"Peng J, Zhang D, Liao X (2009) A digital image encryption algorithm based on hyper-chaotic cellular neural network. Fundam Inform 90(3):269\u2013282","journal-title":"Fundam Inform"},{"issue":"2","key":"2753_CR18","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.cnsns.2014.05.022","volume":"20","author":"Y Luo","year":"2015","unstructured":"Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447\u2013460","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"3","key":"2753_CR19","doi-asserted-by":"crossref","first-page":"2363","DOI":"10.1364\/OE.20.002363","volume":"20","author":"C Fu","year":"2012","unstructured":"Fu C, Chen J, Zou H, Meng W, Zhan Y, Yu Y (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363\u20132378","journal-title":"Opt Express"},{"key":"2753_CR20","doi-asserted-by":"crossref","unstructured":"Kar M, Mandal MK, Nandi D, Kumar A, Banik S (2016) Bit-plane encrypted image cryptosystem using chaotic, quadratic, and cubic maps. In: IETE technical review, pp 1\u201311","DOI":"10.1080\/02564602.2015.1136245"},{"issue":"15","key":"2753_CR21","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","volume":"372","author":"K-W Wong","year":"2008","unstructured":"Wong K-W, Kwok BS-H, Law W-S (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645\u20132652","journal-title":"Phys Lett A"},{"issue":"9","key":"2753_CR22","doi-asserted-by":"crossref","first-page":"2456","DOI":"10.1016\/j.cnsns.2009.09.023","volume":"15","author":"Y Tang","year":"2010","unstructured":"Tang Y, Wang Z, Fang J (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Commun Nonlinear Sci Numer Simul 15(9):2456\u20132468","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"7","key":"2753_CR23","doi-asserted-by":"crossref","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3d chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943\u20132959","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"10","key":"2753_CR24","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320\u20133327","journal-title":"Comput Math Appl"},{"issue":"2","key":"2753_CR25","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on dna sequence operation and hyper-chaotic system. J Syst Softw 85(2):290\u2013299","journal-title":"J Syst Softw"},{"issue":"8","key":"2753_CR26","doi-asserted-by":"crossref","first-page":"4753","DOI":"10.1007\/s11042-015-2501-0","volume":"75","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl 75(8):4753\u20134769","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"2753_CR27","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlinear Dyn 83(3):1123\u20131136","journal-title":"Nonlinear Dyn"},{"issue":"9","key":"2753_CR28","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926\u2013934","journal-title":"Image Vis Comput"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-016-2753-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-016-2753-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-016-2753-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,27]],"date-time":"2020-09-27T22:01:55Z","timestamp":1601244115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-016-2753-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,12]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["2753"],"URL":"https:\/\/doi.org\/10.1007\/s00521-016-2753-2","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2016,12,12]]}}}