{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:01:29Z","timestamp":1761663689272,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/icton.2017.8025092","type":"proceedings-article","created":{"date-parts":[[2017,9,6]],"date-time":"2017-09-06T23:15:26Z","timestamp":1504739726000},"page":"1-4","source":"Crossref","is-referenced-by-count":6,"title":["A double-domain image encryption using hyper chaos"],"prefix":"10.1109","author":[{"family":"Wenting Yuan","sequence":"first","affiliation":[]},{"family":"Xuelin Yang","sequence":"additional","affiliation":[]},{"family":"Wei Guo","sequence":"additional","affiliation":[]},{"family":"Weisheng Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICONSIP.2016.7857449"},{"key":"ref3","first-page":"1","author":"solev","year":"2011","journal-title":"Chapter-1 Introduction to Chaos Chaos Based Cryptography Theory Algorithms and Applications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.and.EUC.2013.25"},{"key":"ref5","first-page":"713","article-title":"New image encryption algorithm based on logistic map and hyperchaos","author":"lei","year":"2013","journal-title":"Proc International Conference on Computer & Information Science"},{"key":"ref8","first-page":"73","article-title":"Synchronization scheme using four-dimensional chaotic system for OFDM","volume":"31","author":"tang","year":"2010","journal-title":"Journal on Communications"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA.2014.7065906"},{"key":"ref2","first-page":"1105","article-title":"Image Encryption Based on Chaotic Maps, Systems, Man and Cybernetics","volume":"2","author":"fridrich","year":"1997","journal-title":"Proc IEEE Int Conf on Computational Cybernetics and Simulation"},{"key":"ref9","first-page":"357","article-title":"Information Theory, Entropy, and Relative Entropy","volume":"1","author":"baldi","year":"2001","journal-title":"Bioinformatics the Machine Learning Approach"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28247-5_8"}],"event":{"name":"2017 19th International Conference on Transparent Optical Networks (ICTON)","start":{"date-parts":[[2017,7,2]]},"location":"Girona, Spain","end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 19th International Conference on Transparent Optical Networks (ICTON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8016447\/8024717\/08025092.pdf?arnumber=8025092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,19]],"date-time":"2017-09-19T13:06:06Z","timestamp":1505826366000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8025092\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icton.2017.8025092","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}