{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:33:42Z","timestamp":1730205222954,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/ceec.2017.8101591","type":"proceedings-article","created":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T21:49:27Z","timestamp":1510264167000},"page":"7-12","source":"Crossref","is-referenced-by-count":10,"title":["A new technique for designing 8 \u00d7 8 substitution box for image encryption applications"],"prefix":"10.1109","author":[{"given":"Fadia Ali","family":"Khan","sequence":"first","affiliation":[]},{"given":"Jameel","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Jan Sher","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Muazzam A.","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Seong Oun","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0621-x"},{"journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard","year":"2002","author":"daemen","key":"ref38"},{"key":"ref33","first-page":"1","article-title":"A secure image encryption scheme based on chaotic maps and affine transformation","author":"ahmad","year":"2015","journal-title":"Multimedia Tools and Applications"},{"key":"ref32","first-page":"18","article-title":"Efficiency analysis and security evaluation of image encryption schemes","volume":"12","author":"ahmad","year":"2012","journal-title":"International Journal of Video & Image Processing and Network Security"},{"key":"ref31","first-page":"1","author":"ahmad","year":"2015","journal-title":"An experimental comparison of chaotic and non-chaotic image encryption schemes &#x201D; Wireless Personal Communications"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0675-9"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-013-0217-4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1861-1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/81.633874"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CIACS.2015.7395561"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.205"},{"key":"ref11","first-page":"1","article-title":"Td-ercs map-based confusion and diffusion of autocorrelated data","author":"khan","year":"2016","journal-title":"Nonlinear Dynamics"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSAO.2015.7152261"},{"key":"ref13","first-page":"81","article-title":"Comparative analysis of chaotic and non-chaotic image encryption schemes","author":"bin younas","year":"0","journal-title":"2014 International Conference on Emerging Technologies (ICET) ICET"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2405-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-2970-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2281-0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2004.04.018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.10.022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-0870-0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2008.12.005"},{"key":"ref4","first-page":"149","article-title":"Algebraic expression for aes s-box and invs-box","volume":"32","author":"ma","year":"2006","journal-title":"Jisuanji Gongcheng\/ Computer Engineering"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2010.07.019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1142\/S0219498803000532"},{"key":"ref6","first-page":"751","article-title":"A new s-box structure named affine-power-affine","volume":"3","author":"cui","year":"2007","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2012.01.009"},{"key":"ref5","first-page":"724","article-title":"An aes s-box to increase complexity and cryptographic analysis","volume":"1","author":"liu","year":"0","journal-title":"Advanced Information Networking and Applications 2005 AINA 2005 19th International Conference on"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-016-0084-9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEE2.2017.7935827"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/09500340.2016.1246680"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45537-X_8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSAO.2015.7152261"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2014.06.012"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-013-0577-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2014.12.025"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2014.10.021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.08.0207.0188"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-0779(04)00454-0"}],"event":{"name":"2017 9th Computer Science and Electronic Engineering (CEEC)","start":{"date-parts":[[2017,9,27]]},"location":"Colchester","end":{"date-parts":[[2017,9,29]]}},"container-title":["2017 9th Computer Science and Electronic Engineering (CEEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8093670\/8101585\/08101591.pdf?arnumber=8101591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,15]],"date-time":"2017-12-15T20:28:23Z","timestamp":1513369703000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8101591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/ceec.2017.8101591","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}