{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:12:22Z","timestamp":1729660342961,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/icics.2011.6174298","type":"proceedings-article","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T13:57:10Z","timestamp":1333634230000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Finite field DWT and MCKBA for image encryption and its VLSI realization"],"prefix":"10.1109","author":[{"given":"K. D.","family":"Rao","sequence":"first","affiliation":[]},{"given":"C.","family":"Gangadhar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"335","article-title":"Multimedia security: Encryptiontechniques","volume":"349","author":"furht","year":"2004","journal-title":"IEC Comprehensive Report on InformationSecurity International Engineering Consortium"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/81.974872"},{"key":"10","article-title":"Discrete wavelet transform and modified chaotic key-based algorithm for image encryption and its VLSI realization","author":"deergha rao","year":"2012","journal-title":"IETE Journal of Research"},{"key":"1","first-page":"49","article-title":"A new chaotic key-based design for image encryption and decryption","volume":"4","author":"yen","year":"2000","journal-title":"Proc IEEE International Symposium on Circuits and Systems"},{"key":"7","first-page":"439","article-title":"Modified chaotic key-based algorithm for image encryption and its VLSI realization","author":"deergha rao","year":"2007","journal-title":"IEEE International Conference on Digital Signal Processing (DSP-2007"},{"key":"6","first-page":"708","article-title":"Cryptanalysis of a Chaotic Image Encryption Method","volume":"2","author":"li","year":"2002","journal-title":"ISCAS"},{"key":"5","article-title":"Enhanced 1-D chaotic key-based algorithm for image encryption","author":"socek","year":"2005","journal-title":"Proc IEEE First International Conference on Security and Privacy for Emerging Areas in Communications Networks"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1201\/9781420038262.ch4","article-title":"Chaos-based encryptionfor digital images and videos","volume":"4","author":"li","year":"2004","journal-title":"Multimedia Security Handbook"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1999.756196"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2011.5739382"}],"event":{"name":"2011 8th International Conference on Information, Communications & Signal Processing (ICICS 2011)","start":{"date-parts":[[2011,12,13]]},"location":"Singapore","end":{"date-parts":[[2011,12,16]]}},"container-title":["2011 8th International Conference on Information, Communications &amp; Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6165552\/6173124\/06174298.pdf?arnumber=6174298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T12:57:16Z","timestamp":1497963436000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6174298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icics.2011.6174298","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}