{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T05:57:16Z","timestamp":1715925436582},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T00:00:00Z","timestamp":1594857600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T00:00:00Z","timestamp":1594857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11432-018-9572-x","type":"journal-article","created":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T08:03:21Z","timestamp":1595059401000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure fusion of encrypted remote sensing images based on Brovey"],"prefix":"10.1007","volume":"64","author":[{"given":"Junzhi","family":"Yang","sequence":"first","affiliation":[]},{"given":"Guohua","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,16]]},"reference":[{"key":"9572_CR1","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1109\/TGRS.2005.846874","volume":"43","author":"Z J Wang","year":"2005","unstructured":"Wang Z J, Ziou D, Armenakis C, et al. A comparative analysis of image fusion methods. IEEE Trans Geosci Remote Sens, 2005, 43: 1391\u20131402","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"9572_CR2","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1109\/TIFS.2017.2774451","volume":"13","author":"M Shen","year":"2018","unstructured":"Shen M, Ma B L, Zhu L H, et al. Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection. IEEE Trans Inf Forensic Secur, 2018, 13: 940\u2013953","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"9572_CR3","doi-asserted-by":"crossref","unstructured":"Ahmad N. Cloud computing: technology, security issues and solutions. In: Proceedings of the 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, 2017. 30\u201335","DOI":"10.1109\/Anti-Cybercrime.2017.7905258"},{"key":"9572_CR4","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/JSAC.2018.2815442","volume":"36","author":"L H Zhu","year":"2018","unstructured":"Zhu L H, Tang X Y, Shen M, et al. Privacy-preserving DDoS attack detection using cross-domain traffic in software defined networks. IEEE J Sel Areas Commun, 2018, 36: 628\u2013643","journal-title":"IEEE J Sel Areas Commun"},{"key":"9572_CR5","doi-asserted-by":"crossref","unstructured":"Manikandan V M, Masilamani V. An efficient visually meaningful image encryption using Arnold transform. In: Proceedings of IEEE Students\u2019 Technology Symposium (TechSym), Kharagpur, 2016. 266\u2013271","DOI":"10.1109\/TechSym.2016.7872694"},{"key":"9572_CR6","doi-asserted-by":"crossref","unstructured":"Zhao J L, Huang L S, Yang H, et al. Fusion and assessment of high-resolution WorldView-3 satellite imagery using NNDiffuse and Brovey algotirhms. In: Proceedings of IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Beijing, 2016. 2606\u20132609","DOI":"10.1109\/IGARSS.2016.7729673"},{"key":"9572_CR7","first-page":"49","volume":"11","author":"Q Xia","year":"2013","unstructured":"Xia Q, Hu Z Q, Li J H, et al. Quality evaluation of different remote sensing image fusion methods (in Chinese). Geospatial Inf, 2013, 11: 49\u201351","journal-title":"Geospatial Inf"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9572-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-018-9572-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9572-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T21:25:29Z","timestamp":1647984329000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-018-9572-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,16]]},"references-count":7,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9572"],"URL":"https:\/\/doi.org\/10.1007\/s11432-018-9572-x","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,16]]},"assertion":[{"value":"14 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"129102"}}