{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:40Z","timestamp":1771700200260,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/tip.2018.2868388","type":"journal-article","created":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T22:43:56Z","timestamp":1536014636000},"page":"371-380","source":"Crossref","is-referenced-by-count":23,"title":["Secure Quaternion Feistel Cipher for DICOM Images"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3580-7448","authenticated-orcid":false,"given":"Mariusz","family":"Dzwonkowski","sequence":"first","affiliation":[]},{"given":"Roman","family":"Rykaczewski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","author":"gantmacher","year":"1959","journal-title":"Theory of Matrices"},{"key":"ref31","first-page":"3016","article-title":"A novel image encryption algorithm based on improved 3D chaotic cat map","author":"liu","year":"2008","journal-title":"Proc Young Comput Sci (ICYCS)"},{"key":"ref30","author":"armitage","year":"2008","journal-title":"Statistical Methods in Medical Research"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1201\/9781439803356"},{"key":"ref11","first-page":"21","article-title":"A new quaternion encryption scheme for image transmission","author":"dzwonkowski","year":"2012","journal-title":"Proc ICT Young Conf"},{"key":"ref12","first-page":"1216","article-title":"Quaternion encryption method for image and video transmission","volume":"8","author":"dzwonkowski","year":"2013","journal-title":"Telecom Review and Telecom News"},{"key":"ref13","first-page":"1177","article-title":"A quaternion-based modified feistel cipher for multimedia transmission","volume":"8","author":"dzwonkowski","year":"2014","journal-title":"Telecom Review and Telecom News"},{"key":"ref14","first-page":"668","article-title":"Quaternion encryption methods for multimedia transmission, a survey of existing approaches","volume":"7","author":"dzwonkowski","year":"2016","journal-title":"Telecom Review and Telecom News"},{"key":"ref15","first-page":"792","article-title":"Digital fingerprinting based on quaternion encryption for image transmission","volume":"8","author":"czaplewski","year":"2013","journal-title":"Telecom Review and Telecom News"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.05.001"},{"key":"ref17","first-page":"3","article-title":"Digital fingerprinting based on quaternion encryption scheme for gray-tone images","volume":"2","author":"czaplewski","year":"2014","journal-title":"J Telecommun Inf Technol"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.06.006"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/0024-3795(95)00543-9","article-title":"Quaternions and matrices of quaternions","author":"zhang","year":"1997","journal-title":"Linear Algebra and its Applications"},{"key":"ref28","year":"2017","journal-title":"An Open-Source Windows Program for Cryptography and Cryptanalysis"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.10.003"},{"key":"ref27","author":"marsaglia","year":"1995","journal-title":"Diehard battery of tests of randomness"},{"key":"ref3","first-page":"15","article-title":"Quaternion feistel cipher with an infinite key space based on quaternion Julia sets","volume":"4","author":"dzwonkowski","year":"2015","journal-title":"J Telecommun Inf Technol"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"830","DOI":"10.1049\/iet-ipr.2015.0868","article-title":"Cryptography of medical images based on a combination between chaotic and neural network","volume":"10","author":"dridi","year":"2016","journal-title":"IET Image Process"},{"key":"ref29","author":"buchholz","year":"2001","journal-title":"Matlab Implementation of the Advanced Encryption Standard"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6729896"},{"key":"ref8","first-page":"74","article-title":"A new quadripartite public-key cryptosystem","author":"nagase","year":"2004","journal-title":"Proc Int Symp Commun Inf Technol (ISCIT)"},{"key":"ref7","first-page":"35","article-title":"Secure signals transmission based on quaternion encryption scheme","volume":"2","author":"nagase","year":"2004","journal-title":"Proc IEEE Adv Inf Netw Appl (AINA)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2467317"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.gmod.2010.10.004"},{"key":"ref1","year":"2008"},{"key":"ref20","author":"eberly","year":"2010","journal-title":"Geometric Tools"},{"key":"ref22","first-page":"161","article-title":"Julia sets and the mandelbrot set","author":"douady","year":"1986","journal-title":"The Beauty of Fractals Images of Complex Dynamical Systems"},{"key":"ref21","first-page":"1","article-title":"Memoir on iterations of rational functions","volume":"83","author":"julia","year":"1918","journal-title":"C Pure Applied Math"},{"key":"ref24","author":"meyer","year":"2018","journal-title":"Quat 1 20&#x2014;A 3D Fractal Generator"},{"key":"ref23","first-page":"20","article-title":"Real-time symmetric cryptography using quaternion julia set","volume":"9","author":"anand","year":"2009","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref26","author":"christensen","year":"2005","journal-title":"Finding multiplicative inverses modulo n"},{"key":"ref25","first-page":"40","article-title":"A modified feistel cipher involving modular arithmetic addition and modular arithmetic inverse of a key matrix","volume":"3","author":"sastry","year":"2012","journal-title":"Int J Adv Comput Sci Appl"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/83\/8468142\/08453888.pdf?arnumber=8453888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:08:02Z","timestamp":1657746482000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8453888\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":32,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tip.2018.2868388","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"value":"1057-7149","type":"print"},{"value":"1941-0042","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}