{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T03:14:10Z","timestamp":1762917250746,"version":"3.37.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.1007\/s11432-010-0010-3","type":"journal-article","created":{"date-parts":[[2010,2,3]],"date-time":"2010-02-03T08:13:02Z","timestamp":1265184782000},"page":"191-202","source":"Crossref","is-referenced-by-count":26,"title":["Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation"],"prefix":"10.1007","volume":"53","author":[{"given":"XiaoJun","family":"Tong","sequence":"first","affiliation":[]},{"given":"MingGen","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,4]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1142\/5711","volume-title":"Handbook of Computational Geometry for Pattern Recognition","author":"G. R. Chen","year":"2005","unstructured":"Chen G R, Mao Y. Chaos-based Image Encryption. Handbook of Computational Geometry for Pattern Recognition. Berlin: Springer-Verlag, 2005. 231\u2013265"},{"key":"10_CR2","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y. B. Mao","year":"2004","unstructured":"Mao Y B, Chen G, Lian S G. A novel fast image encryption scheme based on the 3D chaotic baker map. Int J Bifurcat Chaos, 2004, 14: 3613\u20133624","journal-title":"Int J Bifurcat Chaos"},{"key":"10_CR3","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1007\/s11432-007-0026-5","volume":"50","author":"Y. W. Zhang","year":"2007","unstructured":"Zhang Y W, Wang Y M, Shen X B. Chaos-based image encryption algorithm using alternate structure. Sci China Ser F-Inf Sci, 2007, 50: 334\u2013341","journal-title":"Sci China Ser F-Inf Sci"},{"key":"10_CR4","first-page":"460","volume":"26","author":"H. D. Li","year":"2003","unstructured":"Li H D, Feng D G. Composite nonlinare discrete chaotic dynamical systems and keyed hash functions. Chin J Comput, 2003, 26: 460\u2013464","journal-title":"Chin J Comput"},{"key":"10_CR5","first-page":"109","volume":"34","author":"X. Tao","year":"2006","unstructured":"Tao X, Liao X F, Tang G P. A novel block cryptosystem based on iterating a chaotic map. Phys Lett A, 2006, 34: 109\u2013115","journal-title":"Phys Lett A"},{"key":"10_CR6","first-page":"512","volume":"14","author":"W. T. Zhang","year":"2003","unstructured":"Zhang W T, Qing S H, Wu W L. Security evaluation for a class of block ciphers based on chaotic maps (in Chinese). J Softw, 2003, 14: 512\u2013517","journal-title":"J Softw"},{"key":"10_CR7","doi-asserted-by":"crossref","first-page":"2949","DOI":"10.1142\/S0218127406016574","volume":"16","author":"P. Li","year":"2006","unstructured":"Li P, Li Z, Wolf G A, et al. Analysis of a multiple-output, pseudo-random bit generator based on a spatiotemporal chaotic system. Int J Bifurcat Chaos, 2006, 16: 2949\u20132963","journal-title":"Int J Bifurcat Chaos"},{"key":"10_CR8","first-page":"1","volume-title":"Information security research based on discrete chaotic theory (in Chinese)","author":"F. J. Huang","year":"2005","unstructured":"Huang F J. Information security research based on discrete chaotic theory (in Chinese). Dissertation for the Doctoral Degree. Wuhan: Huazhong Science and Technology University, 2005. 1\u201310"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Li S J, Zheng X. On the security of an image encryption method. Proc 2002 Int Conf Image Process, 2002, (2): 925\u2013928","DOI":"10.1109\/ICIP.2002.1040103"},{"key":"10_CR10","first-page":"431","volume":"9","author":"T. J. Chuang","year":"1999","unstructured":"Chuang T J, Lin J C. A new multi-resolution approach to still image encryption. Patt Recognit, 1999, 9: 431\u2013436","journal-title":"Patt Recognit"},{"key":"10_CR11","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G. R. Chen","year":"2004","unstructured":"Chen G R, Mao Y B, Charles K C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solit Fractal, 2004, 21: 749\u2013761","journal-title":"Chaos Solit Fractal"},{"key":"10_CR12","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.physleta.2005.02.083","volume":"349","author":"T. Xiang","year":"2006","unstructured":"Xiang T, Liao X F, Tang G P, et al. A novel block cryptosystem based on iterating a chaotic map. Phys Lett A, 2006, 349: 109\u2013115","journal-title":"Phys Lett A"},{"key":"10_CR13","first-page":"714","volume":"19","author":"S. G. Lian","year":"2004","unstructured":"Lian S G, Mao Y B, Wang Z Q. 3D extension of Baker map and its application to multimedia information encryption (in Chinese). Control Decision, 2004, 19: 714\u2013717","journal-title":"Control Decision"},{"key":"10_CR14","first-page":"133","volume-title":"Multimedia Encryption Handbook","author":"S. J. Li","year":"2005","unstructured":"Li S J. Chaos-based Image and Video Encryption. Chapter 4. Multimedia Encryption Handbook. Furht B, Kirovski D, eds., New York: CRC Press, 2005. 133\u2013168"},{"key":"10_CR15","unstructured":"Zhao G, Fang J Q, Yan H, et al. Design of changeable P-box and two modules structure block cryptosystem based on chaos. In: Proceedings of APWCCS, 2007. 174\u2013183"},{"key":"10_CR16","first-page":"17","volume-title":"Chaotic Dynamics (in Chinese)","author":"K. Lu","year":"1990","unstructured":"Lu K, Sun J H, Ouyang R B, et al. Chaotic Dynamics (in Chinese). Shanghai: Shanghai Translation Press, 1990. 17\u201351"},{"key":"10_CR17","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1016\/j.imavis.2007.09.005","volume":"26","author":"X. J. Tong","year":"2008","unstructured":"Tong X J, Cui M. Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vision Comput, 2008, 26: 843\u2013850","journal-title":"Image Vision Comput"},{"key":"10_CR18","first-page":"122","volume-title":"Staring from Parabola-Chaotic Dynamics Introduction (in Chinese)","author":"B. L. Hao","year":"1993","unstructured":"Hao B L. Staring from Parabola-Chaotic Dynamics Introduction (in Chinese). Shanghai: Shanghai Education Press, 1993. 122\u2013123"},{"key":"10_CR19","first-page":"100","volume":"15","author":"B. Hone","year":"1999","unstructured":"Hone B, Tang Q Y, Yang F S, et al. ApEn and cross-ApEn: property, fast algorithm and preliminary application to the study of EEG and cognition (in Chinese). Signal Process, 1999, 15: 100\u2013108","journal-title":"Signal Process"},{"key":"10_CR20","first-page":"95","volume":"25","author":"H. Zhou","year":"1997","unstructured":"Zhou H, Ling X T. Realizing finite precision chaotic systems via perturbation of m sequences (in Chinese). Acta Electron Sin, 1997, 25: 95\u201397","journal-title":"Acta Electron Sin"},{"key":"10_CR21","unstructured":"Rukhin A, Soto J. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22, May. 2001. 1\u2013115"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-0010-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-010-0010-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-0010-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T08:29:43Z","timestamp":1739780983000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-010-0010-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,1]]}},"alternative-id":["10"],"URL":"https:\/\/doi.org\/10.1007\/s11432-010-0010-3","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"type":"print","value":"1674-733X"},{"type":"electronic","value":"1869-1919"}],"subject":[],"published":{"date-parts":[[2010,1]]}}}