{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T17:10:02Z","timestamp":1763226602426,"version":"3.37.3"},"reference-count":22,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p> There have been many ways to construct an algorithm to encrypt image. Most often the algorithms are based on DNA sequence or other methods. In this paper, we proposed a new method which is based on singular value decomposition. In this approach, we can encrypt a small portion of the data through RSA encryption algorithm. The strength of the proposed method is insured through various statistical and security analysis. It shows that the algorithm has good encryption effect and higher encryption efficiency, which can be applied to the storage and network transmission of military, medical and other digital images. <\/jats:p>","DOI":"10.1142\/s0218001419540028","type":"journal-article","created":{"date-parts":[[2018,6,21]],"date-time":"2018-06-21T03:47:18Z","timestamp":1529552838000},"page":"1954002","source":"Crossref","is-referenced-by-count":14,"title":["A New RSA Image Encryption Algorithm Based on Singular Value Decomposition"],"prefix":"10.1142","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9083-6722","authenticated-orcid":false,"given":"Kai","family":"Zhu","sequence":"first","affiliation":[{"name":"College of Science and Technology, Jiangxi Normal University, Jiangxi Nanchang 330029, P. R. China"}]},{"given":"Zizhi","family":"Lin","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer Science, Jiangxi Science and Technology Normal University, Jiangxi Nanchang 330013, P. R. China"}]},{"given":"Yun","family":"Ding","sequence":"additional","affiliation":[{"name":"College of Science and Technology, Jiangxi Normal University, Jiangxi Nanchang 330029, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2018,10,11]]},"reference":[{"key":"S0218001419540028BIB001","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2008.07.057"},{"volume-title":"Ergodic Problems in Classical Mechanics","year":"1968","author":"Arnold V. I.","key":"S0218001419540028BIB002"},{"issue":"2","key":"S0218001419540028BIB004","first-page":"203","volume":"46","author":"Boneh D.","year":"1999","journal-title":"Not. AMS"},{"key":"S0218001419540028BIB005","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611971446"},{"key":"S0218001419540028BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_8"},{"key":"S0218001419540028BIB007","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2011.11.003"},{"key":"S0218001419540028BIB008","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2013.09.009"},{"key":"S0218001419540028BIB009","first-page":"43","volume":"251","author":"Ye G.","year":"2017","journal-title":"Neur. Comput"},{"volume-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"Hankerson D.","key":"S0218001419540028BIB010"},{"issue":"2","key":"S0218001419540028BIB012","first-page":"139","volume":"8","author":"Ibrahim M. H.","year":"2009","journal-title":"Int. J. Netw. Secur"},{"key":"S0218001419540028BIB013","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnt.2009.01.006"},{"key":"S0218001419540028BIB014","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2008.01.003"},{"key":"S0218001419540028BIB016","doi-asserted-by":"publisher","DOI":"10.5802\/jtnb.142"},{"key":"S0218001419540028BIB017","doi-asserted-by":"publisher","DOI":"10.1201\/9781420071474"},{"key":"S0218001419540028BIB018","doi-asserted-by":"publisher","DOI":"10.1038\/171737a0"},{"volume-title":"The Algebraic Eigenvalue Problem","year":"1965","author":"Wilkinson J.","key":"S0218001419540028BIB019"},{"key":"S0218001419540028BIB020","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2014.07.111"},{"key":"S0218001419540028BIB021","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2010.1372"},{"key":"S0218001419540028BIB022","first-page":"340","volume":"4671","author":"Yamamoto Y.","year":"2007","journal-title":"Comput. Sci. J"},{"key":"S0218001419540028BIB023","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.02.039"},{"key":"S0218001419540028BIB024","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2012.11.018"},{"key":"S0218001419540028BIB025","first-page":"150","volume":"169","author":"Zhou G. M.","year":"2015","journal-title":"Neur. Comput"}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001419540028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T21:34:05Z","timestamp":1565127245000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218001419540028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,11]]},"references-count":22,"journal-issue":{"issue":"01","published-online":{"date-parts":[[2018,10,11]]},"published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1142\/S0218001419540028"],"URL":"https:\/\/doi.org\/10.1142\/s0218001419540028","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"type":"print","value":"0218-0014"},{"type":"electronic","value":"1793-6381"}],"subject":[],"published":{"date-parts":[[2018,10,11]]}}}