{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:16:17Z","timestamp":1756167377850,"version":"3.44.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tencon.2018.8650305","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T17:10:38Z","timestamp":1552929038000},"page":"0172-0175","source":"Crossref","is-referenced-by-count":0,"title":["Investigation of coupled map lattice as a diffusion model for enhanced image security"],"prefix":"10.1109","author":[{"given":"Sunil","family":"Kumar","sequence":"first","affiliation":[{"name":"Institute of Informatics and Communication, University of Delhi South Campus, New Delhi, India"}]},{"given":"Manish","family":"Kumar","sequence":"additional","affiliation":[{"name":"Institute of Informatics and Communication, University of Delhi South Campus, New Delhi, India"}]},{"given":"Rajat","family":"Budhiraja","sequence":"additional","affiliation":[{"name":"Institute of Informatics and Communication, University of Delhi South Campus, New Delhi, India"}]},{"given":"M.K.","family":"Das","sequence":"additional","affiliation":[{"name":"Institute of Informatics and Communication, University of Delhi South Campus, New Delhi, India"}]},{"given":"Sanjeev","family":"Singh","sequence":"additional","affiliation":[{"name":"Institute of Informatics and Communication, University of Delhi South Campus, New Delhi, India"}]}],"member":"263","reference":[{"key":"ref10","first-page":"2214","article-title":"A cryptographic model based on logistic map and a 3-D matrix","author":"kumar","year":"2016","journal-title":"Journal of Information Security and Applications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.03.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.04.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.07.049"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.07.004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.028"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"164550","DOI":"10.1007\/s11071-014-1235-2","article-title":"Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process","volume":"76","author":"zhang","year":"2014","journal-title":"Nonlinear Dyn"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127417501553"},{"key":"ref8","first-page":"113","article-title":"On the security of a class of diffusion mechanisms for image encryption","author":"zhang","year":"2017","journal-title":"IEEE Trans Cybern"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2010.09.014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2018.05.009"},{"key":"ref1","first-page":"19","article-title":"Brief review on application of nonlinear dynamics in image encryption","author":"\u00f6zkaynak","year":"2018","journal-title":"Nonlinear Dyn"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0119660"}],"event":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","start":{"date-parts":[[2018,10,28]]},"location":"Jeju, Korea (South)","end":{"date-parts":[[2018,10,31]]}},"container-title":["TENCON 2018 - 2018 IEEE Region 10 Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8643125\/8650051\/08650305.pdf?arnumber=8650305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:28:43Z","timestamp":1756153723000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8650305\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/tencon.2018.8650305","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}