{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T22:01:32Z","timestamp":1746136892790,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/icsmc.2010.5642260","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T16:35:53Z","timestamp":1291134953000},"page":"1953-1957","source":"Crossref","is-referenced-by-count":4,"title":["Logical Transform based encryption for multimedia systems"],"prefix":"10.1109","author":[{"given":"Sos.S.","family":"Agaian","sequence":"first","affiliation":[]},{"given":"Raja.G.R.","family":"Rudraraju","sequence":"additional","affiliation":[]},{"given":"Ravindranath.C.","family":"Cherukuri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Principle and Network Security Technology [M]","year":"2003","author":"feng","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/30.883383"},{"year":"0","key":"ref10"},{"key":"ref6","first-page":"5","article-title":"Based on the chaotic image encryption technology research [D]","author":"zhong","year":"0"},{"year":"0","key":"ref11"},{"journal-title":"Digital Image Encryption Algorithm Based on Chaos and Improved DES","year":"0","author":"yun-peng","key":"ref5"},{"key":"ref8","first-page":"12","author":"agaian","year":"1995","journal-title":"Binary Polynomial Transforms and Nonlinear Digital Filters"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2008.2003475"},{"article-title":"Fast Encryption For Multimedia","year":"0","author":"yi","key":"ref2"},{"key":"ref9","article-title":"Classification and Properties of Fast Linearly Independent Logic Transforms","volume":"44","author":"falkowski","year":"1997","journal-title":"IEEE Transactions on Circuits and Systems - II Analog and Digital Signal Processing"},{"article-title":"A new Image Encryption Approach sing Combinational Permutations Techniques","year":"0","author":"mitra","key":"ref1"}],"event":{"name":"2010 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2010,10,10]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2010,10,13]]}},"container-title":["2010 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5629466\/5641665\/05642260.pdf?arnumber=5642260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T01:05:11Z","timestamp":1490058311000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5642260\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2010.5642260","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}