{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:15:47Z","timestamp":1759335347097,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T00:00:00Z","timestamp":1663718400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T00:00:00Z","timestamp":1663718400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,21]]},"DOI":"10.23919\/spa53010.2022.9927845","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T20:45:08Z","timestamp":1668026708000},"page":"34-39","source":"Crossref","is-referenced-by-count":8,"title":["Image Encryption Through CA, Chaos and Lucas Sequence Based S-Box"],"prefix":"10.23919","author":[{"given":"Mohamed","family":"Gabr","sequence":"first","affiliation":[{"name":"The German University in Cairo,Faculty of MET,Cairo,Egypt"}]},{"given":"Wassim","family":"Alexan","sequence":"additional","affiliation":[{"name":"The German University in Cairo,Faculty of IET,Cairo,Egypt"}]},{"given":"Kareem","family":"Moussa","sequence":"additional","affiliation":[{"name":"The German University in Cairo,Faculty of IET,Cairo,Egypt"}]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.23919\/SPA.2019.8936718"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102944"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/cta.2968"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2984770"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103134"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06096-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-74075-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/e21040343"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3128177"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/e23101312"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3099214"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/261459a0"},{"key":"ref4","first-page":"716","article-title":"Image encryption through r&#x00F6;ssler system, prng s-box and recam&#x00E1;n's sequence","author":"elbeltagy","year":"0","journal-title":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)"},{"key":"ref27","first-page":"103","article-title":"Luc: A new public key system","author":"smith","year":"1993","journal-title":"SEC Citeseer"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/sym14030443"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNISC54316.2021.00044"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073514"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/NICS54270.2021.9701533"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0241184"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVIDL51233.2020.00043"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12595-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICWCSG53609.2021.00032"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"21979","DOI":"10.1007\/s11042-021-10692-8","article-title":"An innovative technique for image encryption using tri-partite graph and chaotic maps","volume":"80","author":"liao","year":"2021","journal-title":"Multimedia Tools and Applications"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6145-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08742-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982567"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/e20120913"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07818-4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/12.888056"},{"key":"ref25","first-page":"429","article-title":"Cryptography with cellular automata","author":"wolfram","year":"1985","journal-title":"Conference on the Theory and Application of Cryptographic Techniques"}],"event":{"name":"2022 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA)","start":{"date-parts":[[2022,9,21]]},"location":"Poznan, Poland","end":{"date-parts":[[2022,9,22]]}},"container-title":["2022 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9927524\/9927746\/09927845.pdf?arnumber=9927845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:59:25Z","timestamp":1670875165000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9927845\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,21]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/spa53010.2022.9927845","relation":{},"subject":[],"published":{"date-parts":[[2022,9,21]]}}}