{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:35:39Z","timestamp":1729643739984,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/iccomm.2014.6866666","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T17:12:11Z","timestamp":1406740331000},"page":"1-4","source":"Crossref","is-referenced-by-count":5,"title":["An image encryption algorithm with a chaotic dynamical system based Sudoku Grid"],"prefix":"10.1109","author":[{"given":"Adrian-Viorel","family":"Diaconu","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","volume":"158","author":"furht","year":"2005","journal-title":"Multimedia Security Handbook"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/WoSSPA.2013.6602374"},{"key":"18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ISBAST.2008.4547639","article-title":"An image scrambling encryption using chaoscontrolled Poker shuffle operation","author":"wang","year":"2008","journal-title":"Proc of the IEEE Int Symp on Biometrics and Security Technologies"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1155\/2012\/173931"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1155\/2013\/848392"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/CSSE.2008.1142"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/CMSP.2011.69"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/CISP.2011.6100273"},{"year":"2012","author":"wu","journal-title":"Sudoku Associated Two Dimensional Bijections for Image Scrambling","key":"12"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"22","first-page":"10","article-title":"Study of a new chaotic dynamical system and its usage in a novel pseudorandom bit generator","author":"da?sca?lescu","year":"2013","journal-title":"Mathematical Problems in Engineering"},{"key":"23","first-page":"1","article-title":"Image encryption using the Sudoku matrix","volume":"7708","author":"wu","year":"2010","journal-title":"Proc of SPIE"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1017\/CBO9780511987045"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1016\/j.chaos.2003.12.022"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1016\/j.physd.2008.03.049"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/ISECS.2008.138"},{"key":"2","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1016\/j.patcog.2006.11.011","article-title":"Image security system using recursive cellular automata substitution","volume":"40","author":"chen","year":"2007","journal-title":"Pattern Recognition"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1007\/s11071-013-0969-6"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1016\/S1568-4946(01)00015-1"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/j.patrec.2009.11.008"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1142\/S021812740401151X"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1016\/j.optlaseng.2012.06.002"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/MMUL.2011.54"},{"key":"9","first-page":"555","article-title":"Image scrambling based on chaos theory and Vigene?re cipher","author":"li","year":"2011","journal-title":"Proc of the IEEE 7th Int Conf on Computational Intelligence and Security"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1016\/j.optcom.2011.02.039"}],"event":{"name":"2014 10th International Conference on Communications (COMM)","start":{"date-parts":[[2014,5,29]]},"location":"Bucharest, Romania","end":{"date-parts":[[2014,5,31]]}},"container-title":["2014 10th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6856368\/6866648\/06866666.pdf?arnumber=6866666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:37:05Z","timestamp":1498138625000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2014.6866666","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}