{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:02Z","timestamp":1750220822289,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T00:00:00Z","timestamp":1547856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,19]]},"DOI":"10.1145\/3309074.3309107","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T13:29:18Z","timestamp":1555075758000},"page":"60-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Controlled partial image encryption based on LSIC and chaotic map"],"prefix":"10.1145","author":[{"given":"Parameshachari B","family":"D","sequence":"first","affiliation":[{"name":"GSSSIETW Mysuru, India and Affiliated to VTU Belagavi"}]},{"family":"Kiran","sequence":"additional","affiliation":[{"name":"VTU, Belagavi and G Madegowda Institute of Technology (GMIT), Mandya, Karnataka, India"}]},{"given":"Rashmi","family":"P","sequence":"additional","affiliation":[{"name":"Sri Siddhartha Academy of Higher Education, Tumakuru, India"}]},{"given":"Supriya M","family":"C","sequence":"additional","affiliation":[{"name":"SSIT, Tumakuru, India and Affiliated to SAHE, Tumakuru"}]},{"family":"Rajashekarappa","sequence":"additional","affiliation":[{"name":"SDMCET, Dharwad, India and Affiliated to VTU Belagavi"}]},{"given":"Panduranga H","family":"T","sequence":"additional","affiliation":[{"name":"Govt. Poly-technic, Tumkur-Karantaka"}]}],"member":"320","published-online":{"date-parts":[[2019,1,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2013.6844192"},{"key":"e_1_3_2_1_2_1","volume-title":"PP.663--671","author":"Som Sukalyan","year":"2013","unstructured":"Sukalyan Som and Sayani Sen . A non-adaptive partial encryption of grayscale images based on chaos. Procedia Technology , PP.663--671 , 2013 . Sukalyan Som and Sayani Sen. A non-adaptive partial encryption of grayscale images based on chaos. Procedia Technology, PP.663--671, 2013."},{"key":"e_1_3_2_1_3_1","first-page":"2007","article-title":"An intertwining chaotic maps based image encryption scheme, Nonlinear Dyn;69","author":"Sam IS","year":"1995","unstructured":"Sam IS , Devaraj P, Bhuvaneswaran RS . An intertwining chaotic maps based image encryption scheme, Nonlinear Dyn;69 : PP 1995 -- 2007 , 2012. Sam IS, Devaraj P, Bhuvaneswaran RS. An intertwining chaotic maps based image encryption scheme, Nonlinear Dyn;69: PP 1995--2007, 2012.","journal-title":"PP"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN.2014.6776953"},{"key":"e_1_3_2_1_5_1","volume-title":"A novel latin square image cipher. arXiv preprint arXiv:1204.2310","author":"Wu Yue","year":"2012","unstructured":"Yue Wu , Yicong Zhou , Joseph P Noonan , Sos Agaian , and CL Chen . A novel latin square image cipher. arXiv preprint arXiv:1204.2310 , 2012 . Yue Wu, Yicong Zhou, Joseph P Noonan, Sos Agaian, and CL Chen. A novel latin square image cipher. arXiv preprint arXiv:1204.2310, 2012."},{"volume-title":"Mobile Multimedia\/Image Processing, Security, and Applications","year":"2010","key":"e_1_3_2_1_6_1","unstructured":"Wu, Yue, Image encryption using the Sudoku matrix , Mobile Multimedia\/Image Processing, Security, and Applications 2010 . Vol. 7708 . International Society for Optics and Photonics , 2010. Wu, Yue, et al. Image encryption using the Sudoku matrix, Mobile Multimedia\/Image Processing, Security, and Applications 2010. Vol. 7708. International Society for Optics and Photonics, 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2010.01.004"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.02.039"},{"key":"e_1_3_2_1_9_1","volume-title":"Springer","author":"Parameshachari B D","year":"2012","unstructured":"B D Parameshachari and KMS Soyjaudah , \"A new approach to partial image encryption\" In Proceedings of International Conference on Advances in Computing, PP 1005--1010 . Springer , 2012 . B D Parameshachari and KMS Soyjaudah, \"A new approach to partial image encryption\" In Proceedings of International Conference on Advances in Computing, PP 1005--1010. Springer, 2012."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIET.2014.37"},{"issue":"1","key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Security of Dissimilar Partial Encryption Methods","volume":"2","author":"Soyjaudah Parameshachari B D, Dr. K M S","year":"2017","unstructured":"Parameshachari B D, Dr. K M S Soyjaudah and Dr. Sumithra Devi K A \" Security of Dissimilar Partial Encryption Methods \", Journal of Computer Programming and Multimedia Volume 2 Issue 1 , pp 1 -- 19 . April 2017 . Parameshachari B D, Dr. K M S Soyjaudah and Dr. Sumithra Devi K A \"Security of Dissimilar Partial Encryption Methods\", Journal of Computer Programming and Multimedia Volume 2 Issue 1, pp1--19. April 2017.","journal-title":"Journal of Computer Programming and Multimedia"},{"key":"e_1_3_2_1_12_1","first-page":"310","volume-title":"Proceeding International conference on Recent Innovations is Signal Processing and Embedded Systems (RISE-2017)","author":"Dr Parameshachari B D","year":"2017","unstructured":"Kiran, Dr. Parameshachari B D , Dr . Panduranga H T and Dr . Naveenkumar S K , \" Partial Encryption of Medical Images by Dual DNA Addition using DNA Encoding\" , Proceeding International conference on Recent Innovations is Signal Processing and Embedded Systems (RISE-2017) ISBN 978-1-5090-4760-4\/17\/$31.00\u00a9 2017 IEEE, pp 310 -- 314 ,2017. Kiran, Dr.Parameshachari B D, Dr.Panduranga H T and Dr. Naveenkumar S K, \"Partial Encryption of Medical Images by Dual DNA Addition using DNA Encoding\", Proceeding International conference on Recent Innovations is Signal Processing and Embedded Systems (RISE-2017) ISBN 978-1-5090-4760-4\/17\/$31.00\u00a92017 IEEE, pp 310--314,2017."},{"key":"e_1_3_2_1_13_1","volume-title":"Efficiency analysis and security evaluation of image encryption schemes. computing, 23:25","author":"Ahmad Jawad","year":"2012","unstructured":"Jawad Ahmad and Fawad Ahmed . Efficiency analysis and security evaluation of image encryption schemes. computing, 23:25 , 2012 . Jawad Ahmad and Fawad Ahmed. Efficiency analysis and security evaluation of image encryption schemes. computing, 23:25, 2012."},{"key":"e_1_3_2_1_14_1","first-page":"31","volume-title":"Journal of Selected Areas in Telecommunications (JSAT)","author":"Wu Yue","year":"2011","unstructured":"Yue Wu , Joseph P Noonan , and Sos Agaian . Npcr and uaci randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology , Journal of Selected Areas in Telecommunications (JSAT) , pp 31 -- 38 , 2011 . Yue Wu, Joseph P Noonan, and Sos Agaian. Npcr and uaci randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), pp 31--38, 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/97.995823"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"}],"event":{"name":"ICCSP 2019: 2019 the 3rd International Conference on Cryptography, Security and Privacy","acronym":"ICCSP 2019","location":"Kuala Lumpur Malaysia"},"container-title":["Proceedings of the 3rd International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309074.3309107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3309074.3309107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:15Z","timestamp":1750201995000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309074.3309107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,19]]},"references-count":16,"alternative-id":["10.1145\/3309074.3309107","10.1145\/3309074"],"URL":"https:\/\/doi.org\/10.1145\/3309074.3309107","relation":{},"subject":[],"published":{"date-parts":[[2019,1,19]]},"assertion":[{"value":"2019-01-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}