{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:12:59Z","timestamp":1752984779443,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/africon46755.2019.9133919","type":"proceedings-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T16:40:19Z","timestamp":1594140019000},"page":"1-9","source":"Crossref","is-referenced-by-count":8,"title":["A New Image Encryption and Decryption Technique using Genetic Algorithm and Residual Numbers"],"prefix":"10.1109","author":[{"given":"Peter Awon-Natemi","family":"Agbedemnab","sequence":"first","affiliation":[]},{"given":"Edward Yellakuor","family":"Baagyere","sequence":"additional","affiliation":[]},{"given":"Mohammed Ibrahim","family":"Daabo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"39","article-title":"RNS Overflow Detection Scheme for the Moduli Set {M-1, M}","volume":"4","author":"daabo","year":"2012","journal-title":"Journal of Computing"},{"key":"ref11","article-title":"Sign Detection and Number Comparison on RNS Augumented 3- Moduli Sets {2n-1, 2n+x, 2n+1}","volume":"20","author":"sousa","year":"2014","journal-title":"IEEE Transactions on Very Large Scale Integration Systems JOURNAL OF LATEX CLASS FILES"},{"key":"ref12","article-title":"New Adder-Based RNS-Binary Converters for the {2n+1+1, 2n+1-1, 2n} Moduli Set","author":"gbolagade","year":"0","journal-title":"International Scholarly Research Network"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"516","DOI":"10.3923\/itj.2006.516.519","article-title":"Image Encryption Using Genetic Algorithm","volume":"5","author":"al-husainy","year":"2006","journal-title":"Information Technology Journal"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2012.01.015"},{"journal-title":"A New Approach for Data Encryption","year":"2014","author":"almarimi","key":"ref15"},{"key":"ref16","first-page":"636","article-title":"A Novel Approach Cryptography by using Residue Number System","author":"navin","year":"2012","journal-title":"5th International Conference on Computer Sciences and Convergence Information Technology"},{"key":"ref17","first-page":"2223","volume":"2","author":"alhassan","year":"2013","journal-title":"Enhancement of the Security of a Digital Image using the Moduli Set"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ECS.2014.6892688"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CESYS.2016.7889984"},{"journal-title":"Genetic Algorithm in Search Optimization and Machine Learning","year":"1989","author":"goldberg","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SSST.1995.390542"},{"key":"ref3","first-page":"5521","article-title":"Identity-Based Cryptography and Comparison with traditional Public key Encryption: A Survey","volume":"5","author":"phaneendra","year":"2014","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IranianMVIP.2013.6780026"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/81.246147"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2013.12.003"},{"journal-title":"Modeling GA Performance for Control Parameter Optimization","year":"2000","author":"cicirello","key":"ref7"},{"journal-title":"An Overview of Cryptography","year":"2018","author":"kessler","key":"ref2"},{"key":"ref9","first-page":"30","volume":"110","author":"agbedemnab","year":"2015","journal-title":"A Novel RNS Overflow Detection and Correction Algorithm for the Moduli Set 2n-1 2n 2n+1"},{"journal-title":"Cryptography Theory and Practice","year":"1995","author":"stinson","key":"ref1"},{"key":"ref20","first-page":"350","article-title":"Image security using AES and RNS with reversible watermarking","volume":"4","author":"bhangale","year":"2017","journal-title":"International Journal of Engineering and Innovative Technology"},{"key":"ref22","first-page":"255","author":"lenstra","year":"2001","journal-title":"Selecting Cryptographic Key Sizes"},{"journal-title":"Residue Number System Based Fault Tolerant Scheme for enhancing Rivest Shamir Adleman Encryption Scheme","year":"2017","author":"salifu","key":"ref21"},{"key":"ref24","first-page":"46","article-title":"A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping","volume":"2","author":"musheer","year":"2009","journal-title":"International Journal on Computer Science and Engineering"},{"key":"ref23","article-title":"A Secure Image Encryption Algorithm Based on Rubik's Cube Principle","author":"khalid","year":"2012","journal-title":"Journal of Electrical and Computer Engineering"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.02.039"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.12.011"}],"event":{"name":"2019 IEEE AFRICON","start":{"date-parts":[[2019,9,25]]},"location":"Accra, Ghana","end":{"date-parts":[[2019,9,27]]}},"container-title":["2019 IEEE AFRICON"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9123328\/9133731\/09133919.pdf?arnumber=9133919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T16:17:52Z","timestamp":1658247472000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9133919\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/africon46755.2019.9133919","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}