{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:59:49Z","timestamp":1772906389031,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62362040"],"award-info":[{"award-number":["62362040"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3462547","type":"journal-article","created":{"date-parts":[[2024,9,17]],"date-time":"2024-09-17T18:53:12Z","timestamp":1726599192000},"page":"135779-135798","source":"Crossref","is-referenced-by-count":11,"title":["An Image Double Encryption Based on Improved GAN and Hyper Chaotic System"],"prefix":"10.1109","volume":"12","author":[{"given":"Longxuan","family":"Dai","sequence":"first","affiliation":[{"name":"School of Computer Information Engineering, Jiangxi Normal University, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9481-4176","authenticated-orcid":false,"given":"Lei","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Information Engineering, Jiangxi Normal University, Nanchang, China"}]},{"given":"Liangbing","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Information Engineering, Jiangxi Normal University, Nanchang, China"}]},{"given":"Chenxi","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Information Engineering, Jiangxi Normal University, Nanchang, China"}]},{"given":"Feng","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computer Information Engineering, Jiangxi Normal University, Nanchang, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHCI51889.2020.00034"},{"issue":"6","key":"ref2","first-page":"75","article-title":"A systematic literature review on security challenges in image encryption algorithms for medical images","volume":"22","author":"Almalki","year":"2022","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09790-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-023-08516-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122052"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10172116"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2022.12.025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.113841"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2022.109033"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101980"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117709"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2024.04.012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2023.109107"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3315658"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.08.007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3217482"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2024.1230294"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09597-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.02.014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-023-08866-0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-023-08726-x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.024"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s12539-023-00565-z"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11082-022-03668-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09547-2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.06.032"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2023.130097"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-023-08666-6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-57756-x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3371888"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2022.3163685"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103680"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2022.107415"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3185206"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3012452"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-023-03140-1"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15818-8"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2007.07.036"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.na.2006.12.028"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad3245"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.46604\/ijeti.2022.9601"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/fractalfract8020075"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2023.101612"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-023-02158-y"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/systems11010036"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/acdc62"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-10013-2"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-019-05413-8"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10681422.pdf?arnumber=10681422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T05:36:58Z","timestamp":1727933818000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10681422\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3462547","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}