{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:00:01Z","timestamp":1769731201080,"version":"3.49.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icsmc.2009.5346839","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T19:44:31Z","timestamp":1260474271000},"page":"474-479","source":"Crossref","is-referenced-by-count":65,"title":["Digital image encryption algorithm based on chaos and improved DES"],"prefix":"10.1109","author":[{"given":"Zhang","family":"Yun-peng","sequence":"first","affiliation":[]},{"given":"Liu","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Cao","family":"Shui-ping","sequence":"additional","affiliation":[]},{"given":"Zhai","family":"Zheng-jun","sequence":"additional","affiliation":[]},{"given":"Nie","family":"Xuan","sequence":"additional","affiliation":[]},{"given":"Dai","family":"Wei-di","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"54","author":"dengguo feng","year":"2000","journal-title":"Analysis of password [M]"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"14","year":"0"},{"key":"11","year":"0"},{"key":"12","first-page":"1","article-title":"Visual cryptography","volume":"94","author":"naor","year":"1994","journal-title":"In Proc of Europcrypt"},{"key":"3","first-page":"5","author":"zhong","year":"0","journal-title":"Based on the chaotic image encryption technology research [D]"},{"key":"2","year":"0"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/30.883383"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"7","year":"0"},{"key":"6","first-page":"351","article-title":"A Chaotic Sequence Encryption Method","volume":"25","author":"xiangsheng-wang","year":"2002","journal-title":"Chinese Journal of Computers"},{"key":"5","year":"0"},{"key":"4","year":"0"},{"key":"9","first-page":"28","article-title":"Analysis and Research of DES Encryption Algorithm[J]","volume":"12","author":"lv","year":"2006","journal-title":"Journal of Nanchang Institute of Technology"},{"key":"8","first-page":"27","article-title":"Multimedia network information security technology[M]","author":"wang","year":"2003","journal-title":"Wuhan Hubei"}],"event":{"name":"2009 IEEE International Conference on Systems, Man and Cybernetics - SMC","location":"San Antonio, TX, USA","start":{"date-parts":[[2009,10,11]]},"end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340904\/5345886\/05346839.pdf?arnumber=5346839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T02:39:17Z","timestamp":1489891157000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5346839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2009.5346839","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}