{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T22:05:01Z","timestamp":1755036301207},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275892","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T17:27:30Z","timestamp":1443461250000},"page":"1877-1882","source":"Crossref","is-referenced-by-count":1,"title":["Permutation based image encryption algorithm using block cipher approach"],"prefix":"10.1109","author":[{"given":"Aditya","family":"Rawat","sequence":"first","affiliation":[]},{"given":"Ipshita","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Yash","family":"Goel","sequence":"additional","affiliation":[]},{"given":"Nishith","family":"Sinha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2008.4542071"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2010.2041813"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2009.5118025"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2012.2230593"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514379"},{"key":"ref15","first-page":"1278","article-title":"The application research of hyper chaos encryption in security communications","author":"bingkun","year":"2009","journal-title":"Control and Decision Conference"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EMS.2013.53"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICEESE.2013.6895037"},{"key":"ref18","first-page":"285","article-title":"SDIES: An advanced image encryption standard Application of different cryptographic modules in a new image encryption system","author":"somdip","year":"2013","journal-title":"Intelligent Systems and Control (ISCO)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/iMac4s.2013.6526429"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2013.6724220"},{"key":"ref3","article-title":"Pseudorandom Numbers","author":"stallings","year":"0","journal-title":"Cryptography and network security-principles and practices"},{"key":"ref6","article-title":"Enhanced Block Based color Image Encryption technique with confusion","author":"bangash","year":"0","journal-title":"Multitopic Conference 2008 INMIC 2008 IEEE International"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2004.1328909"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2009.5346839"},{"key":"ref7","article-title":"Image encryption algorithm based son bit-plane scrambling and multiple chaotic systems combination","author":"zhang","year":"2010","journal-title":"International Conference"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1068-4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5120\/17591-8290"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2013.46"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IWCFTA.2012.81"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2015,8,10]]},"location":"Kochi, India","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275892.pdf?arnumber=7275892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T17:41:37Z","timestamp":1490377297000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275892\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275892","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}