{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T16:48:08Z","timestamp":1769014088243,"version":"3.49.0"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472131"],"award-info":[{"award-number":["61472131"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772191"],"award-info":[{"award-number":["61772191"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872130"],"award-info":[{"award-number":["61872130"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Key Projects of Hunan Province","award":["2015TP1004"],"award-info":[{"award-number":["2015TP1004"]}]},{"name":"Science and Technology Key Projects of Hunan Province","award":["2016JC2012"],"award-info":[{"award-number":["2016JC2012"]}]},{"name":"Science and Technology Key Projects of Changsha","award":["kq1801008"],"award-info":[{"award-number":["kq1801008"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2916600","type":"journal-article","created":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T15:53:12Z","timestamp":1557849192000},"page":"74070-74080","source":"Crossref","is-referenced-by-count":23,"title":["Cryptanalysis and Enhancement of an Image Encryption Scheme Based on Bit-Plane Extraction and Multiple Chaotic Maps"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4538-8462","authenticated-orcid":false,"given":"Yu","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-3887","authenticated-orcid":false,"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Jiahui","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","volume":"1","author":"wu","year":"2011","journal-title":"Cyber J Multidisciplinary J Sci Technol J Sel Areas Telecommun"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.06.008"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.09.029"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.06.014"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1140\/epjp\/i2018-12138-3"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1259-7"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.007"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3030-8"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.10.006"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.10.004"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.03.011"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418500475"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.09.035"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.10.004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883690"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-2993-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.03.010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.04.002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2018.2873472"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2018.2877859"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.11.010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.12.003"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.10.020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.08.020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4056-x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2017.3051512"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127405014052"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2014.06.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.10.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2018.09.015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.06.008"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2709318"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2018.2888688"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2259819"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5782-2"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3311-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.11.010"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.07.049"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.10.046"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","article-title":"A novel bit-level image encryption algorithm based on chaotic maps","volume":"78","author":"xu","year":"2012","journal-title":"Opt Lasers Eng"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.12.004"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08713974.pdf?arnumber=8713974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:54:14Z","timestamp":1641988454000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8713974\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2916600","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}