{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:30:27Z","timestamp":1729639827441,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750252","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"503-507","source":"Crossref","is-referenced-by-count":2,"title":["Grayscale image encryption using a hyperchaotic unstable dissipative system"],"prefix":"10.1109","author":[{"given":"L. J.","family":"Ontanon-Garcia","sequence":"first","affiliation":[]},{"given":"M.","family":"Garcia-Martinez","sequence":"additional","affiliation":[]},{"given":"E.","family":"Campos-Canton","sequence":"additional","affiliation":[]},{"given":"Sergej","family":"Celikovsky","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"A statistical test suite for random and pseudo random number generators for cryptographic applications","author":"rukhin","year":"2010","journal-title":"NIST Special Publication 800-22"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(94)90051-5"},{"journal-title":"DIEHARD Statistical Tests","year":"1995","author":"marsaglia","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1063\/1.4742338"},{"journal-title":"Cipher Systems The Protection of Communications","year":"1982","author":"beker","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0329-y"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1063\/1.3314278"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/63030.63036"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(92)90074-S"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/78.852023"},{"key":"10","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","article-title":"A chaotic image encryption algorithm based on perceptron model","volume":"62","author":"yang","year":"2010","journal-title":"Nonlinear Dyn"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"6","article-title":"Discrete-Time chaotic encryption systemsPart p statistical design approach","volume":"44","author":"gotz","year":"1997","journal-title":"IEEE Trans Circuits and SystemsI Fundamental Theory and Applications"},{"key":"5","first-page":"332","article-title":"Securing wavelet compres-sion with random permutations","author":"uehara","year":"2000","journal-title":"The First IEEE Pacific-Rim Conference on Multimedia"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.11.090"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-011-0006-6"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(01)00609-0"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750252.pdf?arnumber=6750252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T06:27:39Z","timestamp":1498112859000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750252\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750252","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}