{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T11:55:04Z","timestamp":1742644504685,"version":"3.37.3"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T00:00:00Z","timestamp":1655337600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T00:00:00Z","timestamp":1655337600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,16]]},"DOI":"10.1109\/comm54429.2022.9817317","type":"proceedings-article","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T19:41:28Z","timestamp":1657741288000},"page":"1-4","source":"Crossref","is-referenced-by-count":4,"title":["Fast Image Encryption Algorithm Based on Multiple Chaotic Maps"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9396-7899","authenticated-orcid":false,"given":"Dominic-Gabriel","family":"Cheroiu","sequence":"first","affiliation":[{"name":"University POLITEHNICA of Bucharest,Faculty of Electronics, Telecommunications and Information Technology,Telecommunications Dept.,Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1059-2121","authenticated-orcid":false,"given":"Mircea","family":"Raducanu","sequence":"additional","affiliation":[{"name":"University POLITEHNICA of Bucharest,Faculty of Electronics, Telecommunications and Information Technology,Telecommunications Dept.,Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4738-1528","authenticated-orcid":false,"given":"Corina Macovei","family":"Nitu","sequence":"additional","affiliation":[{"name":"University POLITEHNICA of Bucharest,Faculty of Electronics, Telecommunications and Information Technology,Applied Electronics Dept.,Romania"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCS.2009.5206145"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02457-3_59"},{"key":"ref12","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","volume":"1","author":"wu","year":"2011","journal-title":"Cyber Journals Multidisciplinary Journals in Science and Technology Journal of Selected Areas in Telecommunications (JSAT)"},{"key":"ref13","first-page":"360","article-title":"An image encryption technique based on chaotic S-box and Arnold transformapplications","volume":"8","author":"farwa","year":"2017","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref14","first-page":"53","article-title":"A novel image encryption scheme based on Clif- ford attractor and noisy logistic map for secure transferring images in navy","volume":"6","author":"kanaf","year":"2017","journal-title":"Int J E-Navig Marit Econ"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.11.018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805847"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"6937","DOI":"10.1109\/ACCESS.2018.2889896","article-title":"Quantum image encryption using intra and inter bit permutation based on logistic map","volume":"7","author":"liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1220","DOI":"10.21917\/ijivp.2016.0177","article-title":"Image encryption in block -wisewith multiple chaotic maps for permutation and diffusion","volume":"6","author":"gopalakrishnan","year":"2016","journal-title":"ICTACT J ImageVideo Process"},{"key":"ref19","article-title":"A novel color image encryption schemeusing rectangular transform-enhanced chaotic tent maps","volume":"5","author":"wu","year":"2017","journal-title":"IEEE Access"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3030-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1117\/12.2572089"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.04.016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817600"},{"key":"ref8","article-title":"Chaos-based image encoding using elementary cellular automata","author":"dina","year":"2017","journal-title":"2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT) NTICT"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7453-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISETC50328.2020.9301088"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP52935.2021.9522647"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1590\/0001-3765202020181207"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817600"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1063\/5.0009225"}],"event":{"name":"2022 14th International Conference on Communications (COMM)","start":{"date-parts":[[2022,6,16]]},"location":"Bucharest, Romania","end":{"date-parts":[[2022,6,18]]}},"container-title":["2022 14th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9817096\/9817149\/09817317.pdf?arnumber=9817317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:42:24Z","timestamp":1659660144000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9817317\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,16]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/comm54429.2022.9817317","relation":{},"subject":[],"published":{"date-parts":[[2022,6,16]]}}}