{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:46:15Z","timestamp":1750308375052,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,10]],"date-time":"2004-10-10T00:00:00Z","timestamp":1097366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,10]]},"DOI":"10.1145\/1027527.1027609","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"352-355","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Security of human video objects by incorporating a chaos-based feedback cryptographic scheme"],"prefix":"10.1145","author":[{"given":"Tzouveli","family":"Paraskevi","sequence":"first","affiliation":[{"name":"National Technical University of Athens, Athens, Greece"}]},{"given":"Ntalianis","family":"Klimis","sequence":"additional","affiliation":[{"name":"National Technical University of Athens, Athens, Greece"}]},{"given":"Kollias","family":"Stefanos","sequence":"additional","affiliation":[{"name":"National Technical University of Athens, Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2004,10,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"49","volume-title":"Proc. IEEE Int. Conf. Circuits and Systems","volume":"4","author":"Yen Jui-Cheng","year":"2000","unstructured":"Jui-Cheng Yen and Jiun-In Guo , \"A new chaotic key-based design for image encryption and decryption \", in Proc. IEEE Int. Conf. Circuits and Systems , 2000 , vol. 4 , pp. 49 -- 52 . Jui-Cheng Yen and Jiun-In Guo, \"A new chaotic key-based design for image encryption and decryption\", in Proc. IEEE Int. Conf. Circuits and Systems, 2000, vol. 4, pp. 49--52."},{"key":"e_1_3_2_1_2_1","first-page":"127","volume-title":"Proc. Advances in Cryptology","author":"Habutsu T.","year":"1991","unstructured":"T. Habutsu , Y. Nishio , I. Sasase , and S. Mori , \" A secret key cryptosystem by iterating a chaotic map \", in Proc. Advances in Cryptology , Berlin, Germany : Springer-Verlag , 1991 , pp. 127 -- 140 . T. Habutsu, Y. Nishio, I. Sasase, and S. Mori, \"A secret key cryptosystem by iterating a chaotic map\", in Proc. Advances in Cryptology, Berlin, Germany: Springer-Verlag, 1991, pp. 127--140."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(98)00086-3"},{"volume-title":"Bruce Schneier, \"Applied Cryptography\"","key":"e_1_3_2_1_4_1","unstructured":"Bruce Schneier, \"Applied Cryptography\" , Second Edition Bruce Schneier, \"Applied Cryptography\", Second Edition"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/81.904880"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_49"},{"key":"e_1_3_2_1_7_1","first-page":"708","volume-title":"Proceedings of 2002 IEEE International Symposium on Circuits and Systems","volume":"2","author":"Li Shujun","year":"2002","unstructured":"Shujun Li , Xuan Zheng , \" Cryptanalysis of a Chaotic Image Encryption Method\" , in Proceedings of 2002 IEEE International Symposium on Circuits and Systems , vol. 2 , pp 708 -- 711 , 2002 . Shujun Li, Xuan Zheng, \"Cryptanalysis of a Chaotic Image Encryption Method\", in Proceedings of 2002 IEEE International Symposium on Circuits and Systems, vol. 2, pp 708--711, 2002."},{"key":"e_1_3_2_1_8_1","volume-title":"Redwood City, CA","author":"Devaney R.","year":"1989","unstructured":"R. Devaney , \" An Introduction to Chaotic Dynamical Systems\" , 2 nd ed. Redwood City, CA : Addison-Wesley , 1989 . R. Devaney, \"An Introduction to Chaotic Dynamical Systems\", 2nd ed. Redwood City, CA: Addison-Wesley, 1989.","edition":"2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.611173"},{"key":"e_1_3_2_1_10_1","volume-title":"Random Variables, and Stochastic Processes","author":"Papoulis","year":"1984","unstructured":"Papoulis A., \"Probability , Random Variables, and Stochastic Processes \", McGraw Hill , New York ( 1984 ) Papoulis A., \"Probability, Random Variables, and Stochastic Processes\", McGraw Hill, New York (1984)"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of International Workshop VLBV","author":"Tzouveli P.","year":"2003","unstructured":"P. Tzouveli , K. Ntalianis and S. Kollias \" Automatic Videoconference Objects Watermarking Using Object Adapted Qualified Significant Wavelet Trees,\" in Proc. of International Workshop VLBV , Madrid, Spain , September 2003 . P. Tzouveli, K. Ntalianis and S. Kollias \"Automatic Videoconference Objects Watermarking Using Object Adapted Qualified Significant Wavelet Trees,\" in Proc. of International Workshop VLBV, Madrid, Spain, September 2003."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.611173"}],"event":{"name":"MM04: 2004 12th Annual ACM International Conference on Multimedia","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGMM ACM Special Interest Group on Multimedia"],"location":"New York NY USA","acronym":"MM04"},"container-title":["Proceedings of the 12th annual ACM international conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1027527.1027609","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1027527.1027609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:44:09Z","timestamp":1750268649000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1027527.1027609"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,10]]},"references-count":12,"alternative-id":["10.1145\/1027527.1027609","10.1145\/1027527"],"URL":"https:\/\/doi.org\/10.1145\/1027527.1027609","relation":{},"subject":[],"published":{"date-parts":[[2004,10,10]]},"assertion":[{"value":"2004-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}