{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:09Z","timestamp":1750220289636,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2015JM6263"],"award-info":[{"award-number":["2015JM6263"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,24]]},"DOI":"10.1145\/3488933.3488966","type":"proceedings-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T11:36:59Z","timestamp":1645789019000},"page":"386-392","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Chaotic Block Color Image Encryption Algorithm Using Cellular Automata and DNA Sequence"],"prefix":"10.1145","author":[{"given":"Jing","family":"Chong","sequence":"first","affiliation":[{"name":"Xi'an University of Posts and Telecommunications, China"}]},{"given":"Shucui","family":"Xie","sequence":"additional","affiliation":[{"name":"Xi'an University of Posts and Telecommunications, China"}]},{"given":"Dingqin","family":"Liu","sequence":"additional","affiliation":[{"name":"Xi'an University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2022,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2914722"},{"key":"e_1_3_2_1_2_1","volume-title":"Zhihua Gan and Xianxing Liu","author":"Chai Xiuli","year":"2020","unstructured":"Xiuli Chai . Jianqiang Bi . Zhihua Gan and Xianxing Liu . 2020 . Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Processing . Vol. 176 . 107684. https:\/\/doi.org\/10.1016\/j.sigpro.2020.107684 Xiuli Chai. Jianqiang Bi. Zhihua Gan and Xianxing Liu. 2020. Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Processing. Vol. 176. 107684. https:\/\/doi.org\/10.1016\/j.sigpro.2020.107684"},{"key":"e_1_3_2_1_3_1","volume-title":"Xingyuan Wang and Juan Meng","author":"Lin Teng Kaiyun Ma.","year":"2021","unstructured":"Kaiyun Ma. Lin Teng . Xingyuan Wang and Juan Meng . 2021 . Color image encryption scheme based on the combination of the fisher-yates scrambling algorithm and chaos theory. Multimed Tools Appl . Vol. 80 . 24737\u201324757. https:\/\/doi.org\/10.1007\/s11042-021-10847-7 Kaiyun Ma. Lin Teng. Xingyuan Wang and Juan Meng. 2021. Color image encryption scheme based on the combination of the fisher-yates scrambling algorithm and chaos theory. Multimed Tools Appl. Vol. 80. 24737\u201324757. https:\/\/doi.org\/10.1007\/s11042-021-10847-7"},{"key":"e_1_3_2_1_4_1","volume-title":"Jianzhong Zhang and Tong Wu","author":"Zhao Hongxiang","year":"2020","unstructured":"Hongxiang Zhao . Shucui Xie . Jianzhong Zhang and Tong Wu . 2020 . Efficient image encryption using two-dimensional enhanced hyperchaotic Henon map. Journal of Electronic Imaging . Vol. 29 . 023007. https:\/\/doi.org\/10.1117\/1.JEI.29.2.023007 Hongxiang Zhao. Shucui Xie. Jianzhong Zhang and Tong Wu. 2020. Efficient image encryption using two-dimensional enhanced hyperchaotic Henon map. Journal of Electronic Imaging. Vol. 29. 023007. https:\/\/doi.org\/10.1117\/1.JEI.29.2.023007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.07.051"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3238-7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/e22030310"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1038\/311419a0"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.10.019"},{"key":"e_1_3_2_1_10_1","volume-title":"Chaotic image encryption algorithm based on block theory and reversible mixed cellular automata. Optics and Laser Technology","author":"Wang Xingyuan","year":"2020","unstructured":"Xingyuan Wang and Nana Guan . 2020. Chaotic image encryption algorithm based on block theory and reversible mixed cellular automata. Optics and Laser Technology . Vol. 132 . 106501. https:\/\/doi.org\/10.1016\/j.optlastec. 2020 .106501 Xingyuan Wang and Nana Guan. 2020. Chaotic image encryption algorithm based on block theory and reversible mixed cellular automata. Optics and Laser Technology. Vol. 132. 106501. https:\/\/doi.org\/10.1016\/j.optlastec.2020.106501"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.007"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10750-1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.028"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115670"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2392-7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.09.029"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Sakshi Patel. Sakshi Patel. Danilo Pelusi. B. Nagaraj. R. Arunkumar and R. Amirtharajan. 2021. Colour image encryption based on customized neural network and DNA encoding. Neural Comput and Applic. https:\/\/doi.org\/10.1007\/s00521-021-06096-2  Sakshi Patel. Sakshi Patel. Danilo Pelusi. B. Nagaraj. R. Arunkumar and R. Amirtharajan. 2021. Colour image encryption based on customized neural network and DNA encoding. Neural Comput and Applic. https:\/\/doi.org\/10.1007\/s00521-021-06096-2","DOI":"10.1007\/s00521-021-06096-2"},{"key":"e_1_3_2_1_18_1","first-page":"737","article-title":"Molecular Structure of Nucleic Acids","volume":"171","author":"WATSON","year":"1953","unstructured":"WATSON J. and CRICK F. 1953 . Molecular Structure of Nucleic Acids : A Structure for Deoxyribose Nucleic Acid. Nature. Vol. 171 , 737 \u2013 738 . https:\/\/doi.org\/10.1038\/171737a0 WATSON J. and CRICK F. 1953. Molecular Structure of Nucleic Acids: A Structure for Deoxyribose Nucleic Acid. Nature. Vol. 171, 737\u2013738. https:\/\/doi.org\/10.1038\/171737a0","journal-title":"A Structure for Deoxyribose Nucleic Acid. Nature."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"}],"event":{"name":"AIPR 2021: 2021 4th International Conference on Artificial Intelligence and Pattern Recognition","acronym":"AIPR 2021","location":"Xiamen China"},"container-title":["2021 4th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488933.3488966","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488933.3488966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:28Z","timestamp":1750188688000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488933.3488966"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"references-count":19,"alternative-id":["10.1145\/3488933.3488966","10.1145\/3488933"],"URL":"https:\/\/doi.org\/10.1145\/3488933.3488966","relation":{},"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"2022-02-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}