{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T01:06:11Z","timestamp":1778375171323,"version":"3.51.4"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["RSP2023R503"],"award-info":[{"award-number":["RSP2023R503"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3315658","type":"journal-article","created":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T17:57:19Z","timestamp":1694714239000},"page":"100856-100878","source":"Crossref","is-referenced-by-count":33,"title":["Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7807-6855","authenticated-orcid":false,"given":"Mohammed","family":"Es-Sabry","sequence":"first","affiliation":[{"name":"Department of Computer Science, Faculty of Science Dhar El Mahraz, LISAC, Sidi Mohamed Ben Abdellah University, Fez, Morocco"}]},{"given":"Nabil El","family":"Akkad","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Science Dhar El Mahraz, LISAC, Sidi Mohamed Ben Abdellah University, Fez, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-726X","authenticated-orcid":false,"given":"Mostafa","family":"Merras","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Science Dhar El Mahraz, LISAC, Sidi Mohamed Ben Abdellah University, Fez, Morocco"}]},{"given":"Khalid","family":"Satori","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Science Dhar El Mahraz, LISAC, Sidi Mohamed Ben Abdellah University, Fez, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-2120","authenticated-orcid":false,"given":"Walid","family":"El-Shafai","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"}]},{"given":"Torki","family":"Altameem","sequence":"additional","affiliation":[{"name":"Computer Science Department, Community College, King Saud University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1790-8640","authenticated-orcid":false,"given":"Mostafa M.","family":"Fouda","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, College of Science and Engineering, Idaho State University, Pocatello, ID, USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00340-021-07585-x"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"14253","DOI":"10.1038\/s41598-022-18079-x","article-title":"Color image encryption scheme based on alternate quantum walk and controlled Rubik&#x2019;s cube","volume":"12","author":"zhao","year":"2022","journal-title":"Sci Rep"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sciaf.2022.e01217"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/math10071027"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e14072"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/math11010231"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s23063287"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.08.079"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2022.10.002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-24142-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04151-8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s12204-022-2555-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0947-6_55"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-022-07534-z"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3146792"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6989-y"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/math11081769"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3232461"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119923"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4056-x"},{"key":"ref19","first-page":"238","article-title":"An image encryption scheme based on a seven-dimensional hyperchaotic system and Pascal&#x2019;s matrix","volume":"35","author":"neamah","year":"2023","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/app13064034"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCV49265.2020.9204095"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11218-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18280\/ijsse.100609"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.18280\/ijsse.110107"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3128177"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s23010519"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2023.109345"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07969-6_12"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-73882-2_45"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02447-4_25"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96292-4_7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0947-6_56"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISACV.2018.8354028"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.113396"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.170316"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IRASET48871.2020.9092254"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07969-6_9"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10251498.pdf?arnumber=10251498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T19:30:52Z","timestamp":1696879852000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10251498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3315658","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}