{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:32Z","timestamp":1750220192434,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3573942.3574060","type":"proceedings-article","created":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T23:45:42Z","timestamp":1684280742000},"page":"537-546","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Image Encryption Algorithm Based on Compound Chaotic System and DNA Coding"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8651-8975","authenticated-orcid":false,"given":"Si-Peng","family":"Cheng","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Xi'an University of Posts &amp; Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6056-667X","authenticated-orcid":false,"given":"Xue-Feng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Xi'an University of Posts &amp; Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8651-8975","authenticated-orcid":false,"given":"Wen","family":"Jiang","sequence":"additional","affiliation":[{"name":"National Internet Emergency Center, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2773","article-title":"Image encryption algorithm based on double scrambling and C-R chaotic system[J]","volume":"2019","unstructured":"MA C,WANG A Y,LI G D. Image encryption algorithm based on double scrambling and C-R chaotic system[J]. Computer Engineering and Design,2019,40(10):2773-2777,2784.","journal-title":"Computer Engineering and Design"},{"key":"e_1_3_2_1_2_1","first-page":"173","article-title":"Research on image recognition of grid transmission line inspection based on mobile edge computing[J]","volume":"2020","author":"Qiangan Meng","unstructured":"Qiangan Meng, Lu Zeng. Research on image recognition of grid transmission line inspection based on mobile edge computing[J]. Environmental Technology,2020,38(04):173-177.","journal-title":"Environmental Technology"},{"key":"e_1_3_2_1_3_1","volume-title":"A secure image retrieval scheme based on secret sharing in cloud environment[J]","author":"Yanyan Xu","year":"2021","unstructured":"Yanyan Xu, Yiran Zhang, Yuejing Yan, Zhiheng Wang. A secure image retrieval scheme based on secret sharing in cloud environment[J]. Journal of Huazhong University of Science and Technology (Natural Science Edition),2021,49(06):31-36."},{"key":"e_1_3_2_1_4_1","first-page":"54","article-title":"Research on secure transmission model of medical image data based on Internet of Things technology[J]","volume":"2021","author":"Lian Yang","unstructured":"Lian Yang, Lei Ma, Yongchun Cui, Bingli Zuo. Research on secure transmission model of medical image data based on Internet of Things technology[J]. China Medical Equipment,2021,36(02):54-57.","journal-title":"China Medical Equipment"},{"key":"e_1_3_2_1_5_1","first-page":"1","article-title":"A\u00a0Novel\u00a0Reversible\u00a0Data\u00a0Hiding\u00a0Scheme\u00a0that\u00a0Provides\u00a0Image\u00a0Encryption","volume":"6","author":"Manikandan\u00a0and\u00a0 V.","year":"2018","unstructured":"V.\u00a0M.\u00a0Manikandan\u00a0and\u00a0V.\u00a0Masilamani,\u00a0\"A\u00a0Novel\u00a0Reversible\u00a0Data\u00a0Hiding\u00a0Scheme\u00a0that\u00a0Provides\u00a0Image\u00a0Encryption,\"\u00a0Journal\u00a0of\u00a0Image\u00a0and\u00a0Graphics,\u00a0Vol.\u00a06,\u00a0No.\u00a01,\u00a0pp.\u00a064-68,\u00a0June\u00a02018.\u00a0doi:\u00a010.18178\/joig.6.1.64-68","journal-title":"\u00a0Journal\u00a0of\u00a0Image\u00a0and\u00a0Graphics,\u00a0"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.03.006"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4159-4"},{"key":"e_1_3_2_1_8_1","first-page":"118","article-title":"Realization and application of hardware for algorithm of SM4 in wireless communication [J]","volume":"2016","author":"Liu J","unstructured":"Liu J, Shi J, Zang D, Realization and application of hardware for algorithm of SM4 in wireless communication [J]. Computer Engineering and Applications,2016,52(17):118-122.","journal-title":"Computer Engineering and Applications"},{"key":"e_1_3_2_1_9_1","volume-title":"Image encryption using chaotic logistic map[J]. Image and vision computing","author":"Pareek N K","year":"2006","unstructured":"Pareek N K, Patidar V, Sud K K. Image encryption using chaotic logistic map[J]. Image and vision computing, 2006, 24(9): 926-934."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.08.028"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2012.05.033"},{"key":"e_1_3_2_1_13_1","volume-title":"Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory[J]. Information sciences","author":"Wang X","year":"2020","unstructured":"Wang X, Gao S. Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory[J]. Information sciences, 2020, 507: 16-36."},{"key":"e_1_3_2_1_14_1","volume-title":"A color image encryption algorithm based on magic cube transformation and modular arithmetic operation[C]\/\/Pacific-Rim conference on multimedia","author":"Shen J","year":"2005","unstructured":"Shen J, Jin X, Zhou C. A color image encryption algorithm based on magic cube transformation and modular arithmetic operation[C]\/\/Pacific-Rim conference on multimedia. Springer, Berlin, Heidelberg, 2005: 270-280."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2014.11.017"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"A\u00a0Novel\u00a0Public\u00a0Key\u00a0Image\u00a0Encryption\u00a0Based\u00a0on\u00a0Elliptic\u00a0Curves\u00a0over\u00a0Prime\u00a0Group\u00a0Field","volume":"1","author":"Ali\u00a0Soleymani","year":"2013","unstructured":"Ali\u00a0Soleymani,\u00a0Md\u00a0Jan\u00a0Nordin,\u00a0and\u00a0Zulkarnain\u00a0Md\u00a0Ali,\u00a0\"A\u00a0Novel\u00a0Public\u00a0Key\u00a0Image\u00a0Encryption\u00a0Based\u00a0on\u00a0Elliptic\u00a0Curves\u00a0over\u00a0Prime\u00a0Group\u00a0Field,\"\u00a0Journal\u00a0of\u00a0Image\u00a0and\u00a0Graphics,\u00a0Vol.\u00a01,\u00a0No.\u00a01,\u00a0pp.\u00a043-49,\u00a0March\u00a02013.\u00a0doi:\u00a010.12720\/joig.1.1.43-49","journal-title":"\u00a0Journal\u00a0of\u00a0Image\u00a0and\u00a0Graphics,\u00a0"},{"issue":"1","key":"e_1_3_2_1_17_1","first-page":"110","article-title":"A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos[J]","volume":"20","author":"Li X","year":"2018","unstructured":"Li X, Zhou C, Xu N. A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos[J]. International Journal of Network Security , 2018, 20(1): 110-120.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5669-2"},{"issue":"163505","key":"e_1_3_2_1_19_1","first-page":"1","article-title":"Binary search tree image encryption with DNA[J]","volume":"202","author":"Nematzadeh H","year":"2020","unstructured":"Nematzadeh H, Enayatifar R, Yadollahi M, Binary search tree image encryption with DNA[J]. Optik, 2020, 202(163505):1-10.","journal-title":"Optik"},{"issue":"115670","key":"e_1_3_2_1_20_1","first-page":"1","article-title":"A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system[J]","volume":"80","author":"Xuejing K","year":"2020","unstructured":"Xuejing K, Zihui G. A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system[J]. Signal Processing: Image Communication, 2020, 80(115670)1-11.","journal-title":"Signal Processing: Image Communication"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2010.1558"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.7973651"},{"key":"e_1_3_2_1_23_1","first-page":"260","article-title":"A novel image encryption algorithm based on chaotic system[J]","volume":"2017","author":"Hongda Wang","unstructured":"Hongda Wang. A novel image encryption algorithm based on chaotic system[J]. Optical Technology,2017,43(3):260-266.","journal-title":"Optical Technology"},{"key":"e_1_3_2_1_24_1","first-page":"2020","article-title":"Image encryption algorithm incorporating multi-chaotic map and DNA coding[J]","volume":"2018","author":"Ran W","unstructured":"Ran W, Wei PC, Duan A. Image encryption algorithm incorporating multi-chaotic map and DNA coding[J]. Computer Engineering and Design,2018,39(7) : 2020-2026.","journal-title":"Computer Engineering and Design"},{"key":"e_1_3_2_1_25_1","volume-title":"A novel image encryption algorithm based on chaos and DNA coding[J]","author":"Huan Lan Ye.","year":"2019","unstructured":"Huan Lan, Ruisong Ye. A novel image encryption algorithm based on chaos and DNA coding[J]. Journal of Shantou University (Natural Science Edition) ,2019,34(4) : 13-35."},{"issue":"106366","key":"e_1_3_2_1_26_1","first-page":"1","article-title":"A novel chaotic image encryption algorithm based on extended Zigzag confusion and RNA operation[J]","volume":"131","author":"Wang X","year":"2020","unstructured":"Wang X, Guan N. A novel chaotic image encryption algorithm based on extended Zigzag confusion and RNA operation[J]. Optics & Laser Technology, 2020, 131(106366):1-17.","journal-title":"Optics & Laser Technology"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015687"},{"issue":"162921","key":"e_1_3_2_1_28_1","first-page":"1","article-title":"A fast color image encryption technique based on three dimensional chaotic map[J]","volume":"193","author":"Valandar M Y","year":"2019","unstructured":"Valandar M Y, Barani M J, Ayubi P. A fast color image encryption technique based on three dimensional chaotic map[J]. Optik, 2019, 193(162921) :1-17.","journal-title":"Optik"},{"issue":"106202","key":"e_1_3_2_1_29_1","first-page":"1","article-title":"Image encryption based on chaotic sub-block scrambling and chaotic digit selection diffusion[J]","volume":"134","author":"Xian Y","year":"2020","unstructured":"Xian Y, Wang X, Yan X, Image encryption based on chaotic sub-block scrambling and chaotic digit selection diffusion[J]. Optics and Lasers in Engineering, 2020, 134(106202):1-13.","journal-title":"Optics and Lasers in Engineering"},{"key":"e_1_3_2_1_30_1","volume-title":"A secret key cryptosystem by iterating a chaotic map[C]\/\/Workshop on the Theory and Application of of Cryptographic Techniques","author":"Habutsu T","year":"1991","unstructured":"Habutsu T, Nishio Y, Sasase I, A secret key cryptosystem by iterating a chaotic map[C]\/\/Workshop on the Theory and Application of of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1991: 127-140."},{"key":"e_1_3_2_1_31_1","first-page":"913","article-title":"A comparative study on the optimization performance of different one-dimensional chaotic maps[J]","volume":"2012","author":"Zhao X","unstructured":"Zhao X. A comparative study on the optimization performance of different one-dimensional chaotic maps[J]. Computer Application Research,2012,29(03):913-915.","journal-title":"Computer Application Research"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.10.004"},{"key":"e_1_3_2_1_33_1","first-page":"139","article-title":"New chaotic signal based on deep learning and its application in image encryption[J]","volume":"2021","author":"Zhao ZP","unstructured":"Zhao ZP, Zhou S, Wang XY. New chaotic signal based on deep learning and its application in image encryption[J]. Journal of Physics,2021,70(23):139-153.","journal-title":"Journal of Physics"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2021.06.012"}],"event":{"name":"AIPR 2022: 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","acronym":"AIPR 2022","location":"Xiamen China"},"container-title":["Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3574060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573942.3574060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:32Z","timestamp":1750186952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3574060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":34,"alternative-id":["10.1145\/3573942.3574060","10.1145\/3573942"],"URL":"https:\/\/doi.org\/10.1145\/3573942.3574060","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2023-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}