{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:39:50Z","timestamp":1730227190577,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icacci.2016.7732117","type":"proceedings-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T15:57:45Z","timestamp":1478620665000},"page":"633-637","source":"Crossref","is-referenced-by-count":7,"title":["Chaotic hash function based plain-image dependent block ciphering technique"],"prefix":"10.1109","author":[{"given":"Sahil","family":"Wadhwa","sequence":"first","affiliation":[]},{"given":"Musheer","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Harsh","family":"Vijay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-1817-3_16"},{"key":"ref11","article-title":"Research concerning the theory of nonlinear resonance and stochasticity","author":"chirikov","year":"1969","journal-title":"Preprint N 267 Institute of Nuclear Physics Novosibirsk"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2008.11.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2009.03.153"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1142\/S021812740401151X"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.07.083"},{"key":"ref17","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","author":"wu","year":"2011","journal-title":"IEEE Journal of Selected Areas in Telecommunications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2005.08.006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.04.003"},{"key":"ref5","first-page":"23","article-title":"Improving Chaos Image Encryption Speed","volume":"2","author":"giesl","year":"2009","journal-title":"International Journal of Future Communication and Networking"},{"volume":"180","journal-title":"Secure Hash Standard","year":"2002","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(02)01770-X"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2008.09.056"},{"journal-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2008.12.031"}],"event":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2016,9,21]]},"location":"Jaipur, India","end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592392\/7732013\/07732117.pdf?arnumber=7732117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T07:08:52Z","timestamp":1480489732000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7732117\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icacci.2016.7732117","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}