{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:43:34Z","timestamp":1740120214193,"version":"3.37.3"},"reference-count":21,"publisher":"World Scientific Pub Co Pte Ltd","issue":"06","funder":[{"DOI":"10.13039\/501100001809","name":"The National Natural Science Fund China","doi-asserted-by":"crossref","award":["No.11461063","No.14BTJ021","Project No.13YJAZH040","grant number: 050315B03"],"award-info":[{"award-number":["No.11461063","No.14BTJ021","Project No.13YJAZH040","grant number: 050315B03"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2017,6]]},"abstract":"<jats:p> The problem of the secure transmission of digital image has paid more and more attention to the network and this paper designs a special image encryption scheme. Image encryption scheme is designed based on the hyper chaos of generalized five-order Henon mapping and five-order cellular neural network (CNN) system. Firstly, the chaotic sequence [Formula: see text], which is regarded as the initial conditions of CNN system, is generated by the five-order generalized Henon mapping. Then another chaotic sequence [Formula: see text] is produced by the CNN system. At last, the cipher image is generated by the transformation of random sequence [Formula: see text] and the original image. Toward the end, the paper makes the simulation experiment and draws a conclusion that the algorithm of image encryption has strong attack resistance, good safety, and suitable to spread in the network through analyzing the statistical characteristics of the image information entropy, correlation and histogram as well as the key space and the sensitivity. <\/jats:p>","DOI":"10.1142\/s021800141754009x","type":"journal-article","created":{"date-parts":[[2016,12,5]],"date-time":"2016-12-05T04:54:18Z","timestamp":1480913658000},"page":"1754009","source":"Crossref","is-referenced-by-count":4,"title":["Synchronization of Generalized Using to Image Encryption"],"prefix":"10.1142","volume":"31","author":[{"given":"Guodong","family":"Li","sequence":"first","affiliation":[{"name":"School of Application Mathematic, Xinjiang University of Finance &amp; Economics, Urumqi 830012, P. R. China"},{"name":"Research Center of Xinjiang Social and Economic Statistics of Xinjiang, University of Finance and Economics, Xinjiang Urumqi 830012, P. R. China"}]},{"given":"Bing","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Application Mathematic, Xinjiang University of Finance &amp; Economics, Urumqi 830012, P. R. China"}]},{"given":"Yue","family":"Pu","sequence":"additional","affiliation":[{"name":"School of Application Mathematic, Xinjiang University of Finance &amp; Economics, Urumqi 830012, P. R. China"}]},{"given":"Wenxia","family":"Xu","sequence":"additional","affiliation":[{"name":"Xinjiang Weather Modification Office, Urumqi 830002, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2017,3,30]]},"reference":[{"key":"S021800141754009XBIB001","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2015.03.079"},{"key":"S021800141754009XBIB002","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.54"},{"issue":"2","key":"S021800141754009XBIB004","first-page":"158","volume":"31","author":"Chen Z.-P.","year":"2013","journal-title":"J. Jilin Univ. (Inform. Sci. Ed.)"},{"key":"S021800141754009XBIB005","doi-asserted-by":"publisher","DOI":"10.1109\/31.7600"},{"issue":"1","key":"S021800141754009XBIB006","first-page":"1105","volume":"2","author":"Fridrich J.","year":"1997","journal-title":"Syst. Man Cybern. Computat. Cybern. Simul."},{"key":"S021800141754009XBIB007","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"S021800141754009XBIB008","doi-asserted-by":"publisher","DOI":"10.1007\/BF01608556"},{"issue":"06","key":"S021800141754009XBIB009","first-page":"99","volume":"29","author":"Huang C.-H.","year":"2012","journal-title":"J. Guizhou University (Nat. Sci.)"},{"key":"S021800141754009XBIB010","first-page":"499","volume":"133","author":"Xiaolin L.","year":"2014","journal-title":"Neurocomputing"},{"key":"S021800141754009XBIB011","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2016.02.074"},{"issue":"12","key":"S021800141754009XBIB012","first-page":"19","volume":"26","author":"Liu C.","year":"2010","journal-title":"J. Guizhou Normal Coll."},{"issue":"4","key":"S021800141754009XBIB013","first-page":"1099","volume":"33","author":"Liu L.","year":"2013","journal-title":"J. Comput. Appl."},{"issue":"4","key":"S021800141754009XBIB014","first-page":"355","volume":"29","author":"Liu Y.-M.","year":"2007","journal-title":"J. Yunnan Univ."},{"issue":"6","key":"S021800141754009XBIB015","first-page":"654","volume":"33","author":"Peng S.","year":"2015","journal-title":"J. Appl. Sci.-Electron. Inform. Eng."},{"key":"S021800141754009XBIB016","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127402005121"},{"key":"S021800141754009XBIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.03.022"},{"key":"S021800141754009XBIB018","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0626-0"},{"issue":"1","key":"S021800141754009XBIB019","first-page":"96","volume":"29","author":"Zang H.","year":"2007","journal-title":"J. Univ. Sci. Technol. Beijing"},{"volume-title":"The Model of Cellular Neural Networks and its Applications","year":"1993","author":"Zhang L.-M.","key":"S021800141754009XBIB020"},{"issue":"1","key":"S021800141754009XBIB021","first-page":"150","volume":"37","author":"Zhang S.","year":"2015","journal-title":"J. Electron. Inform. Technol."},{"issue":"1","key":"S021800141754009XBIB022","first-page":"27","volume":"29","author":"Zhu Y.-P.","year":"2008","journal-title":"J. Jiangxi Univ. Sci. Technol."}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S021800141754009X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T01:09:33Z","timestamp":1565140173000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S021800141754009X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,30]]},"references-count":21,"journal-issue":{"issue":"06","published-online":{"date-parts":[[2017,3,30]]},"published-print":{"date-parts":[[2017,6]]}},"alternative-id":["10.1142\/S021800141754009X"],"URL":"https:\/\/doi.org\/10.1142\/s021800141754009x","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"type":"print","value":"0218-0014"},{"type":"electronic","value":"1793-6381"}],"subject":[],"published":{"date-parts":[[2017,3,30]]}}}