{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:01:34Z","timestamp":1773406894425,"version":"3.50.1"},"reference-count":30,"publisher":"SPIE-Intl Soc Optical Eng","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Electron. Imaging"],"published-print":{"date-parts":[[2009,7,1]]},"DOI":"10.1117\/1.3167847","type":"journal-article","created":{"date-parts":[[2009,7,14]],"date-time":"2009-07-14T22:05:12Z","timestamp":1247609112000},"page":"033002","source":"Crossref","is-referenced-by-count":37,"title":["Homomorphic image encryption"],"prefix":"10.1117","volume":"18","author":[{"given":"Osama S.","family":"Farag Allah","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"189","reference":[{"key":"10.1117\/1.3167847_r1","unstructured":"National Bureau of Standards , Data Encryption Standard, Federal Information Processing Standards Publication No. 46, U.S. Government Printing Office, Washington, DC (1977)."},{"key":"10.1117\/1.3167847_r2","unstructured":"National Bureau of Standards , Data Encryption Standard Modes of Operation, Federal Information Processing Standards Publication No. 81, U.S. Government Printing Office, Washington, DC (1980)."},{"key":"10.1117\/1.3167847_r3","first-page":"146","volume":"226","author":"Rivest","year":"1995","journal-title":"Dr. Dobb's J.","ISSN":"https:\/\/id.crossref.org\/issn\/1044-789X","issn-type":"print"},{"key":"10.1117\/1.3167847_r4","first-page":"137","volume":"26","author":"Daemen","year":"2001","journal-title":"Dr. Dobb's J.","ISSN":"https:\/\/id.crossref.org\/issn\/1044-789X","issn-type":"print"},{"key":"10.1117\/1.3167847_r5","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2007.09.001"},{"key":"10.1117\/1.3167847_r6","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"10.1117\/1.3167847_r7","doi-asserted-by":"crossref","unstructured":"S. C. Koduru, and V. Chandrasekaran , \u201cIntegrated confusion-diffusion mechanisms for chaos based image encryption\u201d inIEEE 8th Int. Conf. Computer and Information Technology Workshops, pp. 260\u2013263 (2008).","DOI":"10.1109\/CIT.2008.Workshops.33"},{"key":"10.1117\/1.3167847_r8","doi-asserted-by":"publisher","DOI":"10.1142\/S021812740401151X"},{"key":"10.1117\/1.3167847_r9","first-page":"499","volume":"26","author":"Bradley","year":"1995","journal-title":"IEEE Trans. Syst. Man Cybern.","ISSN":"https:\/\/id.crossref.org\/issn\/0018-9472","issn-type":"print"},{"key":"10.1117\/1.3167847_r10","unstructured":"J. Fridrich , \u201cSecure image ciphering based on chaos,\u201d Final report (April, 1997)."},{"key":"10.1117\/1.3167847_r11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"10.1117\/1.3167847_r12","unstructured":"J. S. Lim ,Two-Dimensional Signal and Image Processing, Prentice Hall, Englewood Cliffs, NJ (1990)."},{"key":"10.1117\/1.3167847_r13","doi-asserted-by":"publisher","DOI":"10.1117\/12.458527"},{"key":"10.1117\/1.3167847_r14","unstructured":"S. Lee, J. Wook Han, and D. Seo , \u201cOptical encryption and decryption using personal fingerprint image,\u201d presented at the 6th Int. at Conf. on Advanced Communi. Technol., Vol. 1, pp. 413\u2013415 (2004)."},{"key":"10.1117\/1.3167847_r15","unstructured":"B. Schneier ,Applied Cryptography\u2014Protocols, algorithms, and source code in C, 2nd ed., Wiley, Hoboken, NJ (1996)."},{"key":"10.1117\/1.3167847_r16","first-page":"33","volume":"1","author":"Ahmed","year":"2007","journal-title":"Int. J. Comput. Inf. Sys. Sci. Eng."},{"key":"10.1117\/1.3167847_r17","unstructured":"R. L. Fivest, M. J. B. Robshad, R. Sidney, and Y. L. Yin , \u201cThe RC6 block cipher,\u201d MIT Laboratory for Computer Science, Cambridge, MA, and RSA Laboratories, San Mateo, CA (1998)."},{"key":"10.1117\/1.3167847_r18","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"10.1117\/1.3167847_r19","unstructured":"J. Peng, S. Jin, G. Chen, Z. Yang, and X. Liao , \u201cAn image encryption scheme based on chaotic map,\u201d presented at the 4th Int. Conf. on Natural Computation, Vol. 4, pp. 595\u2013599 (2008)."},{"key":"10.1117\/1.3167847_r20","doi-asserted-by":"crossref","unstructured":"S. Li, G. Chen, and X. Zheng , \u201cChaos-based encryption for digital images and videos,\u201d inMultimedia Security Handbook, Chap. 4, CRC Press, Boca Raton, FL (2004).","DOI":"10.1201\/9781420038262.ch4"},{"key":"10.1117\/1.3167847_r21","first-page":"241","volume":"5","author":"El-Fishawy","year":"2007","journal-title":"Int. J. Network Security"},{"key":"10.1117\/1.3167847_r22","doi-asserted-by":"crossref","unstructured":"Y. Zhai, S. Lin, and Q. Zhang , \u201cImproving image encryption using multi-chaotic map,\u201d presented atWorkshop on Power Electronics and Intelligent Transportation System, pp. 143\u2013148 (2008).","DOI":"10.1109\/PEITS.2008.10"},{"key":"10.1117\/1.3167847_r23","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst. Tech. J.","ISSN":"https:\/\/id.crossref.org\/issn\/0005-8580","issn-type":"print"},{"key":"10.1117\/1.3167847_r24","doi-asserted-by":"crossref","unstructured":"Y. B. Mao and G. Chen , \u201cChaos-based image encryption,\u201d inHandbook of Computational Geometry for Pattern Recognition, Computer Vision, Neuralcomputing and Robotics, E. Bayro , Ed., pp. 231\u2013265 Springer-Verlag, Berlin (2005).","DOI":"10.1007\/3-540-28247-5_8"},{"key":"10.1117\/1.3167847_r25","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00029-2"},{"key":"10.1117\/1.3167847_r26","doi-asserted-by":"publisher","DOI":"10.1117\/12.208654"},{"key":"10.1117\/1.3167847_r27","doi-asserted-by":"publisher","DOI":"10.1117\/12.148572"},{"key":"10.1117\/1.3167847_r28","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(96)00025-2"},{"key":"10.1117\/1.3167847_r29","doi-asserted-by":"publisher","DOI":"10.1016\/S0030-4018(03)01261-6"},{"key":"10.1117\/1.3167847_r30","first-page":"121","volume":"31","author":"El-din","year":"2007","journal-title":"Informatica","ISSN":"https:\/\/id.crossref.org\/issn\/0350-5596","issn-type":"print"}],"container-title":["Journal of Electronic Imaging"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/electronicimaging.spiedigitallibrary.org\/article.aspx?articleid=1100243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T13:10:02Z","timestamp":1558444202000},"score":1,"resource":{"primary":{"URL":"http:\/\/electronicimaging.spiedigitallibrary.org\/article.aspx?doi=10.1117\/1.3167847"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,1]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,7,1]]}},"URL":"https:\/\/doi.org\/10.1117\/1.3167847","relation":{},"ISSN":["1017-9909"],"issn-type":[{"value":"1017-9909","type":"print"}],"subject":[],"published":{"date-parts":[[2009,7,1]]}}}