{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:58:25Z","timestamp":1761663505884,"version":"3.37.3"},"reference-count":26,"publisher":"Wiley","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61471075","61301124","CSTC2013jcsf10029","cstc2013kjrcqnrc10001"],"award-info":[{"award-number":["61471075","61301124","CSTC2013jcsf10029","cstc2013kjrcqnrc10001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61471075","61301124","CSTC2013jcsf10029","cstc2013kjrcqnrc10001"],"award-info":[{"award-number":["61471075","61301124","CSTC2013jcsf10029","cstc2013kjrcqnrc10001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chongqing Integrated Demonstration Project","award":["61471075","61301124","CSTC2013jcsf10029","cstc2013kjrcqnrc10001"],"award-info":[{"award-number":["61471075","61301124","CSTC2013jcsf10029","cstc2013kjrcqnrc10001"]}]},{"name":"Chongqing Talented Youth Development Plan","award":["61471075","61301124","CSTC2013jcsf10029","cstc2013kjrcqnrc10001"],"award-info":[{"award-number":["61471075","61301124","CSTC2013jcsf10029","cstc2013kjrcqnrc10001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Sensors"],"published-print":{"date-parts":[[2016]]},"abstract":"<jats:p>Encryption of a digital image is very important especially in applications of body area networks (BANs) since the image may include a number of privacy. Past encryption methods have disadvantages of the small key space and low ability of resistance to attack. In this paper, we propose a new encryption algorithm based on discrete wavelet transform (DWT) and multichaos which has characteristics of the deterministic, pseudorandomness, and sensitivity of initial values. The image is first decomposed and spatial reconstructed by two-dimensional DWT and then is performed by multichaos matrices for space encryption. The experimental results indicate that the proposed algorithm has a large key space, high key sensitivity, and excellent ability of resistance to attack.<\/jats:p>","DOI":"10.1155\/2016\/2646205","type":"journal-article","created":{"date-parts":[[2016,5,9]],"date-time":"2016-05-09T17:02:54Z","timestamp":1462813374000},"page":"1-7","source":"Crossref","is-referenced-by-count":19,"title":["A Novel Encryption Algorithm Based on DWT and Multichaos Mapping"],"prefix":"10.1155","volume":"2016","author":[{"given":"Wei","family":"Wang","sequence":"first","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"given":"Haiyan","family":"Tan","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"given":"Yu","family":"Pang","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"given":"Zhangyong","family":"Li","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"given":"Peng","family":"Ran","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"given":"Jun","family":"Wu","sequence":"additional","affiliation":[{"name":"Chongqing Kaize Technology Co. Ltd., Chongqing 400042, China"}]}],"member":"311","reference":[{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/MWC.2010.5416354"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1364\/ao.45.003289"},{"issue":"5","key":"3","first-page":"796","volume":"2","year":"2011","journal-title":"International Journal of Advanced Networking and Applications"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1016\/j.image.2010.03.002"},{"issue":"1","key":"6","first-page":"38","volume":"3","year":"2013","journal-title":"MIT International Journal of Computer Science & Information Technology"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/j.mcm.2010.06.005"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1016\/j.asoc.2012.01.016"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1016\/j.cnsns.2013.07.016"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1142\/s0218127410026563"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1016\/S0167-8655(02)00157-5"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1016\/j.imavis.2007.09.005"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1016\/j.imavis.2008.12.008"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1016\/j.imavis.2006.02.021"},{"issue":"3","key":"16","doi-asserted-by":"crossref","first-page":"131","DOI":"10.5121\/ijcis.2012.2312","volume":"2","year":"2012","journal-title":"International Journal on Cryptography and Information Security"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1016\/j.optcom.2012.06.041"},{"issue":"4","key":"18","first-page":"322","volume":"1","year":"2011","journal-title":"International Journal of Advances in Engineering & Technology"},{"issue":"5","key":"19","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/TIP.2003.810586","volume":"12","year":"2003","journal-title":"IEEE Transactions on Image Processing"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1080\/09500340.2014.964342"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1007\/s11071-013-1074-6"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1016\/j.asoc.2012.01.016"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1016\/j.cnsns.2013.07.016"},{"issue":"2","key":"26","first-page":"117","volume":"19","year":"2010","journal-title":"Journal of Theoretical and Applied Information Technology"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1016\/j.aeue.2012.01.015"},{"issue":"4","key":"24","first-page":"18","volume":"12","year":"2012","journal-title":"International Journal of Video & Image Processing and Network Security"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1007\/s11071-014-1287-3"},{"issue":"1","key":"30","volume":"7","year":"2015","journal-title":"Digital Image Processing"}],"container-title":["Journal of Sensors"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2016\/2646205.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2016\/2646205.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2016\/2646205.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T09:14:28Z","timestamp":1498295668000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/js\/2016\/2646205\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":26,"alternative-id":["2646205","2646205"],"URL":"https:\/\/doi.org\/10.1155\/2016\/2646205","relation":{},"ISSN":["1687-725X","1687-7268"],"issn-type":[{"type":"print","value":"1687-725X"},{"type":"electronic","value":"1687-7268"}],"subject":[],"published":{"date-parts":[[2016]]}}}