{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:15:46Z","timestamp":1730229346210,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/icapr.2017.8592943","type":"proceedings-article","created":{"date-parts":[[2018,12,31]],"date-time":"2018-12-31T18:19:30Z","timestamp":1546280370000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["An Image Encryption Technique using Sine Curve"],"prefix":"10.1109","author":[{"given":"Sujit Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Bibhas Chandra","family":"Dhara","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.04.001"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.11.009"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3585-x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.10.004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1063\/1.2728112"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.027"},{"key":"ref37","article-title":"A novel encryption method for image security","volume":"6","author":"al-husainy","year":"2012","journal-title":"International Journal of Security and its Applications"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.01.003"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.02.005"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.124"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.11.096"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2013.06.031"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1370-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1364\/OE.20.002363"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-2934-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3056662.3056685"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.011"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"275","DOI":"10.14257\/ijsip.2013.6.5.25","article-title":"A new fast and simple image encryption algorithm using scan patterns and xor","volume":"6","author":"rad","year":"2013","journal-title":"International Journal of Signal Processing Image Processing and Pattern Recognition"},{"key":"ref17","first-page":"91","article-title":"A novel approach for image encryption using dynamic scan pattern","volume":"41","author":"sivakumar","year":"2014","journal-title":"IAENG International Journal of Computer Science"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2017.8203912"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.01.017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1074-6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2013.08.013"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.09.008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2014.05.022"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","article-title":"A new 1d chaotic system for image encryption","volume":"97","author":"zhou","year":"2014","journal-title":"Signal Processing"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2010.03.022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.07.010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.09.039"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2014.08.005"},{"key":"ref2","article-title":"46&#x2013;3","volume":"25","author":"fips","year":"1999","journal-title":"Data Encryption Standard (DES)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"ref1","article-title":"197","author":"nist","year":"2001","journal-title":"Advanced Encryption Standard (AES)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2392-7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.06.020"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.08.009"},{"key":"ref42","first-page":"31","article-title":"Npcr and uaci randomness tests for image encryption","author":"wu","year":"2011","journal-title":"Cyber Journals Multidisciplinary Journals in Science and Technology Journal of Selected Areas in Telecommunications (JSAT)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2521-3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.08.013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.03.007"},{"key":"ref26","first-page":"1","article-title":"Single-shot imaging without reference wave using binary intensity pattern for optically-secured-based correlation","volume":"8","year":"2016","journal-title":"IEEE Photonics Journal"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2016.2550322"}],"event":{"name":"2017 Ninth International Conference on Advances in Pattern Recognition (ICAPR)","start":{"date-parts":[[2017,12,27]]},"location":"Bangalore","end":{"date-parts":[[2017,12,30]]}},"container-title":["2017 Ninth International Conference on Advances in Pattern Recognition (ICAPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8577948\/8592935\/08592943.pdf?arnumber=8592943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T09:02:50Z","timestamp":1643274170000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8592943\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/icapr.2017.8592943","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}