{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:31:19Z","timestamp":1773772279157,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,1,21]],"date-time":"2014-01-21T00:00:00Z","timestamp":1390262400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s12652-013-0217-4","type":"journal-article","created":{"date-parts":[[2014,1,20]],"date-time":"2014-01-20T02:22:00Z","timestamp":1390184520000},"page":"563-570","source":"Crossref","is-referenced-by-count":23,"title":["Image encryption algorithm with compound chaotic maps"],"prefix":"10.1007","volume":"6","author":[{"given":"Xuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Guoji","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiayan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,21]]},"reference":[{"issue":"11","key":"217_CR1","doi-asserted-by":"crossref","first-page":"3743","DOI":"10.1016\/j.cnsns.2009.02.033","volume":"14","author":"G Alvarez","year":"2009","unstructured":"Alvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm (nca) for image encryption. Commun Nonlinear Sci Numer Simul 14(11):3743\u20133749","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"11","key":"217_CR2","doi-asserted-by":"crossref","first-page":"3484","DOI":"10.1016\/j.cnsns.2009.12.025","volume":"15","author":"M Amin","year":"2010","unstructured":"Amin M, Faragallah OS, Abd El-Latif AA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Numer Simul 15(11):3484\u20133497","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"217_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12652-011-0051-5","volume":"4","author":"P Barsocchi","year":"2013","unstructured":"Barsocchi P, Chessa S, Martinovic I, Oligeri G (2013) A cyber-physical approach to secret key generation in smart environments. J Ambient Intell Humaniz Comput 4(1):1\u201316","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"6","key":"217_CR4","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1109\/TIFS.2012.2210880","volume":"7","author":"X Chen","year":"2012","unstructured":"Chen X, Li J, Susilo W (2012) Efficient fair conditional payments for outsourcing computations. IEEE Trans Inf Forensics Secur 7(6):1687\u20131694","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"217_CR5","doi-asserted-by":"crossref","first-page":"2123","DOI":"10.1016\/j.optcom.2009.02.044","volume":"282","author":"C Huang","year":"2009","unstructured":"Huang C, Nien H (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123\u20132127","journal-title":"Opt Commun"},{"issue":"1","key":"217_CR6","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/18.567654","volume":"43","author":"T Kohda","year":"1997","unstructured":"Kohda T, Tsuneda A (1997) Statistics of chaotic binary sequences. IEEE Trans Inf Theory 43(1):104\u2013112","journal-title":"IEEE Trans Inf Theory"},{"issue":"4","key":"217_CR7","doi-asserted-by":"crossref","first-page":"1518","DOI":"10.1016\/j.chaos.2005.11.090","volume":"32","author":"H Kwok","year":"2007","unstructured":"Kwok H, Tang WK (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solitons Fractals 32(4):1518\u20131529","journal-title":"Chaos Solitons Fractals"},{"issue":"9","key":"217_CR10","doi-asserted-by":"crossref","first-page":"1681","DOI":"10.1016\/j.ins.2010.01.008","volume":"180","author":"J Li","year":"2010","unstructured":"Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180(9):1681\u20131689","journal-title":"Inf Sci"},{"issue":"4","key":"217_CR8","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1016\/j.sigpro.2010.09.014","volume":"91","author":"C Li","year":"2011","unstructured":"Li C, Lo KT (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 91(4):949\u2013954","journal-title":"Signal Process"},{"issue":"9","key":"217_CR9","doi-asserted-by":"crossref","first-page":"1371","DOI":"10.1016\/j.imavis.2008.12.008","volume":"27","author":"C Li","year":"2009","unstructured":"Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27(9):1371\u20131381","journal-title":"Image Vis Comput"},{"key":"217_CR11","doi-asserted-by":"crossref","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp 1\u20135","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"217_CR12","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.ins.2012.03.006","volume":"201","author":"J Li","year":"2012","unstructured":"Li J, Zhang F, Chen X, Kim K, Wong DS (2012) Generic security-amplifying methods of ordinary digital signatures. Inf Sci 201:128\u2013139","journal-title":"Inf Sci"},{"issue":"9","key":"217_CR13","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926\u2013934","journal-title":"Image Vis Comput"},{"issue":"20","key":"217_CR14","doi-asserted-by":"crossref","first-page":"2638","DOI":"10.1016\/j.physd.2008.03.049","volume":"237","author":"A Pisarchik","year":"2008","unstructured":"Pisarchik A, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Phys D Nonlinear Phenom 237(20):2638\u20132648","journal-title":"Phys D Nonlinear Phenom"},{"issue":"7","key":"217_CR15","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1016\/j.cnsns.2009.07.007","volume":"15","author":"R Rhouma","year":"2010","unstructured":"Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution\u2013diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15(7):1887\u20131892","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"4","key":"217_CR16","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1109\/26.917768","volume":"49","author":"T Sang","year":"2001","unstructured":"Sang T, Wang R, Yan Y (2001) Generating binary bernoulli sequences based on a class of even-symmetric chaotic maps. IEEE Trans Commun 49(4):620\u2013623","journal-title":"IEEE Trans Commun"},{"issue":"2","key":"217_CR17","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.optcom.2009.09.070","volume":"283","author":"E Solak","year":"2010","unstructured":"Solak E, Rhouma R, Belghith S (2010) Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt Commun 283(2):232\u2013236","journal-title":"Opt Commun"},{"issue":"10","key":"217_CR18","doi-asserted-by":"crossref","first-page":"2066","DOI":"10.1016\/j.optcom.2010.01.028","volume":"283","author":"F Sun","year":"2010","unstructured":"Sun F, L\u00fc Z, Liu S (2010) A new cryptosystem based on spatial chaotic system. Opt Commun 283(10):2066\u20132073","journal-title":"Opt Commun"},{"issue":"6","key":"217_CR19","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1016\/j.imavis.2007.09.005","volume":"26","author":"X Tong","year":"2008","unstructured":"Tong X, Cui M (2008) Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis Comput 26(6):843\u2013850","journal-title":"Image Vis Comput"},{"issue":"1","key":"217_CR20","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514\u2013522","journal-title":"Appl Soft Comput"},{"issue":"5","key":"217_CR21","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1016\/j.chaos.2007.10.009","volume":"40","author":"D Xiao","year":"2009","unstructured":"Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos Solitons Fractals 40(5):2191\u20132199","journal-title":"Chaos Solitons Fractals"},{"issue":"12","key":"217_CR22","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775\u20132780","journal-title":"Opt Commun"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-013-0217-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-013-0217-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-013-0217-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T09:39:54Z","timestamp":1559468394000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-013-0217-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,21]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["217"],"URL":"https:\/\/doi.org\/10.1007\/s12652-013-0217-4","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1,21]]}}}