{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:03:30Z","timestamp":1729616610698,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750156","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"26-30","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight chaos-based cryptosystem for secure images"],"prefix":"10.1109","author":[{"given":"Z.","family":"Fawaz","sequence":"first","affiliation":[]},{"given":"S.","family":"El Assad","sequence":"additional","affiliation":[]},{"given":"M.","family":"Frajallah","sequence":"additional","affiliation":[]},{"given":"A.","family":"Khalil","sequence":"additional","affiliation":[]},{"given":"R.","family":"Lozi","sequence":"additional","affiliation":[]},{"given":"O.","family":"Deforges","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"Efficient image encryption and authentication scheme based on chaotic sequences","author":"farajallah","year":"2013","journal-title":"SECURWARE'2013"},{"year":"2011","author":"taralova","journal-title":"Dynamical and Statistical Analysis of A New Lozi Function for Random Numbers Generation","key":"14"},{"year":"2011","author":"el assad","journal-title":"Generator of Chaotic Sequences and Corresponding Generating System","key":"11"},{"key":"12","first-page":"226","article-title":"An efficient modified advanced encryption standard (maes) adapted for image cryptosystems","volume":"10","author":"shtewi","year":"2010","journal-title":"Int J Comput Sci and Netw Secur"},{"key":"3","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1109\/ICSMC.1997.638097","article-title":"Image encryption based on chaotic maps","volume":"2","author":"fridrich","year":"1997","journal-title":"Systems Man and Cybernetics 1997 Computational Cybernetics and Simulation 1997 IEEE International Conference on"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1080\/0161-118991863745"},{"key":"1","article-title":"Network coding theory and reality","author":"saxena","year":"2008","journal-title":"Department of Computer Science"},{"key":"10","first-page":"67","article-title":"Chaos based information hiding and security","author":"el assad","year":"2012","journal-title":"Internet Technology and Secured Transactions 2012 International Conferece For IEEE"},{"key":"7","article-title":"An image encryption scheme based on new spatiotemporal chaos","author":"song","year":"2012","journal-title":"Optik-International Journal for Light and Electron Optics"},{"key":"6","first-page":"91","article-title":"Noise-resisting ciphering based on a chaotic multi-stream pseudo-random number generator","author":"ren\ufffd lozi","year":"2011","journal-title":"2011 International Conference for Internet Technology and Secured Transactions ICITST"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1016\/j.cnsns.2010.01.004"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1016\/j.image.2011.11.003"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1016\/j.physleta.2007.01.081"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/TCSI.2006.874182"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750156.pdf?arnumber=6750156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T06:27:39Z","timestamp":1498112859000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750156","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}