{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:44:41Z","timestamp":1730227481251,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1109\/icaci.2017.7974496","type":"proceedings-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T16:49:07Z","timestamp":1499964547000},"page":"121-128","source":"Crossref","is-referenced-by-count":1,"title":["A self-adaptive scheme for double color-image encryption"],"prefix":"10.1109","author":[{"given":"Fang","family":"Han","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Huiwei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"778","article-title":"A new image encryption algorithm based on chaos system","author":"han","year":"2003","journal-title":"IEEE International Conference on Robotics Intelligent Systems and Signal Processing"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1364\/OE.14.008552"},{"key":"ref11","first-page":"1","article-title":"Color image encryption combining a reality-preserving fractional DCT with chaotic mapping in HSI space","author":"liang","year":"2015","journal-title":"Multimed Tools Appl"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2004.02.052"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2007.03.039"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2012.08.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1364\/OL.33.000581"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2011.03.017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2012.11.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2013.12.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.10.034"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2481006"},{"key":"ref4","first-page":"1","article-title":"An image encryption scheme based on DNA coding and permutation of hyper-image","volume":"2015","author":"zhang","year":"2015","journal-title":"Multimed Tools Appl"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/cpa.20124"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.09.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2007.07.012"},{"key":"ref29","first-page":"427","article-title":"18th European Signal Processing Conference On optimization of the measurement matrix for compressive sensing","author":"abolghasemi","year":"2010","journal-title":"18th European Signal Processing Conference 2010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/el.2015.0927"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1699-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2009.06.014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.10.023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.09.035"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1331-6"},{"key":"ref20","first-page":"1","article-title":"Encryption domain content-based image retrieval and convolution through a block-based transformation algorithm","author":"chou","year":"2007","journal-title":"Multimed Tools Appl"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.914731"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.4286571"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.06.079"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2170977"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2012.08.017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/09500340.2014.946565"}],"event":{"name":"2017 Ninth International Conference on Advanced Computational Intelligence (ICACI)","start":{"date-parts":[[2017,2,4]]},"location":"Doha, Qatar","end":{"date-parts":[[2017,2,6]]}},"container-title":["2017 Ninth International Conference on Advanced Computational Intelligence (ICACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7965812\/7974472\/07974496.pdf?arnumber=7974496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T11:51:26Z","timestamp":1502884286000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7974496\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icaci.2017.7974496","relation":{},"subject":[],"published":{"date-parts":[[2017,2]]}}}