{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:14:44Z","timestamp":1765232084545},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,6,2]],"date-time":"2013-06-02T00:00:00Z","timestamp":1370131200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s11760-013-0490-x","type":"journal-article","created":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T07:04:56Z","timestamp":1370070296000},"page":"611-622","source":"Crossref","is-referenced-by-count":17,"title":["Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation"],"prefix":"10.1007","volume":"9","author":[{"given":"Heba M.","family":"Elhoseny","sequence":"first","affiliation":[]},{"given":"Hossam E. H.","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Alaa M.","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Hassan B.","family":"Kazemian","sequence":"additional","affiliation":[]},{"given":"Osama S.","family":"Faragallah","sequence":"additional","affiliation":[]},{"given":"Sayed M.","family":"El-Rabaie","sequence":"additional","affiliation":[]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,2]]},"reference":[{"key":"490_CR1","doi-asserted-by":"crossref","unstructured":"Furht, B., Socek, D.: A Survey of Multimedia Security, Technical Report August 21 2003","DOI":"10.1201\/9781420038262"},{"key":"490_CR2","volume-title":"Applied Cryptography-Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography-Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)","edition":"2"},{"key":"490_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES\u2014The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Sand, B., Rijmen, V.: The Design of Rijndael: AES\u2014The Advanced Encryption Standard. Springer, Berlin (2002)"},{"key":"490_CR4","first-page":"205","volume":"2260","author":"S Li","year":"2001","unstructured":"Li, S., Li, Q., Li, W., Mou, X., Cai, Y.: Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding. IMA Int. Conf. Crypt. Coding 2260, 205\u2013221 (2001)","journal-title":"IMA Int. Conf. Crypt. Coding"},{"key":"490_CR5","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1109\/81.633885","volume":"44","author":"M Gotz","year":"1997","unstructured":"Gotz, M., Kelber, K., Schwarz, W.: Discrete-time chaotic cryptosystems-part I: statistical design approach. IEEE Trans. Circuits Syst.-1: Fundam. Theory Appl. 44, 963\u2013970 (1997)","journal-title":"IEEE Trans. Circuits Syst.-1: Fundam. Theory Appl."},{"key":"490_CR6","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.physleta.2006.05.038","volume":"360","author":"K Wang","year":"2006","unstructured":"Wang, K., Pei, W., Zou etl, L.: Security of public key encryption technique based on multiple chaotic system. Phys. Lett. A 360, 259\u2013262 (2006)","journal-title":"Phys. Lett. A"},{"key":"490_CR7","unstructured":"Huang, F., Feng, Y.: Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm. Front Electr. Electron. Eng. China 4(1), 5\u20139 (2009)"},{"key":"490_CR8","doi-asserted-by":"crossref","unstructured":"Peng, J., Jin, S., Chen, G., Yang, Z., Liao, X.: An image encryption scheme based on chaotic map. Presented at the 4th International Conference on Natural Computation, vol. 4, pp. 595\u2013599 (2008)","DOI":"10.1109\/ICNC.2008.227"},{"key":"490_CR9","doi-asserted-by":"crossref","unstructured":"Zhai, Y., Lin, S., Zhang, Q.: Improving image encryption using multi-chaotic map. Presented at Workshop on Power Electronics and Intelligent Transportation System, pp. 143\u2013148 (2008)","DOI":"10.1109\/PEITS.2008.10"},{"issue":"1","key":"490_CR10","first-page":"121","volume":"31","author":"H El-din","year":"2007","unstructured":"El-din, H., Ahmed, H., Kalash, H.M., Farag Allah, O.S.: An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption. Informatica 31(1), 121\u2013129 (2007)","journal-title":"Informatica"},{"key":"490_CR11","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1093\/imamat\/39.2.159","volume":"39","author":"AC McBride","year":"1987","unstructured":"McBride, A.C., Kerr, F.H.: On Namias\u2019 fractional Fourier transforms. IMA J. Appl. Math. 39, 159\u2013175 (1987)","journal-title":"IMA J. Appl. Math."},{"key":"490_CR12","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/0165-1684(95)00076-P","volume":"46","author":"HM Ozaktas","year":"1995","unstructured":"Ozaktas, H.M.: Fractional Fourier domains. Signal Process. 46, 119\u2013124 (1995)","journal-title":"Signal Process."},{"key":"490_CR13","volume-title":"The Fractional Fourier Transform","author":"HM Ozaktas","year":"2001","unstructured":"Ozaktas, H.M., Zalevsky, Z., Kutay, M.A.: The Fractional Fourier Transform. Wiley, Chichester (2001)"},{"key":"490_CR14","doi-asserted-by":"crossref","unstructured":"Elashry, I.F., Farag Allah, O.S., Abbas, A.M., El-Rabaie, S., Abd El-Samie, F.E.: Homomorphic image encryption. J. Electro. Imaging 18(3), 033002-1\u2013033002-14 (2009)","DOI":"10.1117\/1.3167847"},{"key":"490_CR15","unstructured":"El-Fishawy, N., Abu Zaid, O.M.: Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. Int. J. Netw. Secur. 5(3), 241\u2013251 (2007)"},{"issue":"4","key":"490_CR16","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1117\/12.148572","volume":"2","author":"CJ Kuo","year":"1993","unstructured":"Kuo, C.J.: Novel image encryption technique and its application in progressive transmission. J. Electron. Imaging 2(4), 345\u2013351 (1993)","journal-title":"J. Electron. Imaging"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-013-0490-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11760-013-0490-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-013-0490-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,14]],"date-time":"2019-07-14T09:57:21Z","timestamp":1563098241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11760-013-0490-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,2]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["490"],"URL":"https:\/\/doi.org\/10.1007\/s11760-013-0490-x","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,2]]}}}