{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T20:40:10Z","timestamp":1756240810799,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T00:00:00Z","timestamp":1706227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Nos. 62272079, 61972266"],"award-info":[{"award-number":["Nos. 62272079, 61972266"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"111 Project","award":["No. D23006"],"award-info":[{"award-number":["No. D23006"]}]},{"DOI":"10.13039\/501100006374","name":"Natural Science Foundation of Liaoning Province","doi-asserted-by":"publisher","award":["Nos.2021-MS-344, 2021-KF-11-03, 2022-KF-12-14"],"award-info":[{"award-number":["Nos.2021-MS-344, 2021-KF-11-03, 2022-KF-12-14"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postgraduate Education Reform Project of Liaoning Province","award":["No. LNYJG20224"],"award-info":[{"award-number":["No. LNYJG20224"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,1,26]]},"DOI":"10.1145\/3647750.3647779","type":"proceedings-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T18:05:22Z","timestamp":1712945122000},"page":"186-196","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Color Image Encryption Algorithm Based on Complementary Map and Iterative Convolutional Code"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7284-703X","authenticated-orcid":false,"given":"Yanlu","family":"Xie","sequence":"first","affiliation":[{"name":"Key laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian, Liaoning, China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6246-5116","authenticated-orcid":false,"given":"Shihua","family":"Zhou","sequence":"additional","affiliation":[{"name":"Key laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian, Liaoning, China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2751-4293","authenticated-orcid":false,"given":"Hui","family":"Lv","sequence":"additional","affiliation":[{"name":"Key laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian, Liaoning, China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8800-000X","authenticated-orcid":false,"given":"Bin","family":"Wang","sequence":"additional","affiliation":[{"name":"Key laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian, Liaoning, China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2978-5430","authenticated-orcid":false,"given":"Chao","family":"Che","sequence":"additional","affiliation":[{"name":"Key laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian, Liaoning, China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3776-9799","authenticated-orcid":false,"given":"Qiang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian, Liaoning, China, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-023-08397-8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108745"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12269-5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169133"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107326"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-021-06663-1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1971.1090700"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.111851"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2009.12.025"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12210-w"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107359"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Yang Zhou Chunlai Li Wen Li Hongmin Li Wei Feng and Kun Qian. 2021. Image encryption algorithm with circle index table scrambling and partition diffusion. Nonlinear dynamics 103:2043\u20132061. https:\/\/doi.org\/10.1007\/s11071-021-06206-8.","DOI":"10.1007\/s11071-021-06206-8"},{"issue":"2","key":"e_1_3_2_1_13_1","first-page":"31","article-title":"Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology","volume":"1","author":"Wu Yue","year":"2011","unstructured":"Yue Wu, Joseph P Noonan, Sos Agaian, 2011. Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), 1(2):31\u201338.","journal-title":"Journal of Selected Areas in Telecommunications (JSAT)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12472-4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-021-06472-6"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2020.106837"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2021.116418"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107484"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107316"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"Kandala Sree Rama Murthy and V. M. Manikandan. 2022. A Reversible Data Hiding through Encryption Scheme for Medical Image Transmission Using AES Encryption with Key Scrambling Journal of Advances in Information Technology 13(5):433-440. https:\/\/doi.org\/10.12720\/jait.13.5.433-440.","DOI":"10.12720\/jait.13.5.433-440"}],"event":{"name":"ICMLSC 2024: 2024 The 8th International Conference on Machine Learning and Soft Computing","acronym":"ICMLSC 2024","location":"Singapore Singapore"},"container-title":["2024 The 8th International Conference on Machine Learning and Soft Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647750.3647779","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647750.3647779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T20:10:32Z","timestamp":1756239032000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647750.3647779"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,26]]},"references-count":20,"alternative-id":["10.1145\/3647750.3647779","10.1145\/3647750"],"URL":"https:\/\/doi.org\/10.1145\/3647750.3647779","relation":{},"subject":[],"published":{"date-parts":[[2024,1,26]]},"assertion":[{"value":"2024-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}