{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:58:30Z","timestamp":1773615510358,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"5","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.3103\/s0146411621050072","type":"journal-article","created":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T12:54:58Z","timestamp":1635857698000},"page":"490-499","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Digital Image Encryption Test System Based on FPGA and Nios II Soft Core"],"prefix":"10.3103","volume":"55","author":[{"family":"Zhong-xun Wang","sequence":"first","affiliation":[]},{"given":"Kai-yue","family":"Sha","sequence":"additional","affiliation":[]},{"given":"Xing-long","family":"Gao","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"key":"7370_CR1","doi-asserted-by":"publisher","first-page":"163843","DOI":"10.1016\/j.ijleo.2019.163843","volume":"207","author":"J.S. Muthu","year":"2019","unstructured":"Muthu, J.S. and Murali, P., Comment on \u201cAn image encryption algorithm based on modified logistic chaotic map,\u201d Optik, 2019, vol. 207, p. 163843. \u00a0https:\/\/doi.org\/10.1016\/j.ijleo.2019.163843","journal-title":"Optik"},{"key":"7370_CR2","first-page":"64","volume":"43","author":"K. Sha","year":"2019","unstructured":"Sha, K. and Wang, Z., Research on image encryption algorithm based on chaos, Electroacoustic Technol., 2019, vol. 43, no. 1, pp. 64\u201367.","journal-title":"Electroacoustic Technol."},{"key":"7370_CR3","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ins.2016.02.039","volume":"357","author":"C. Marrocco","year":"2016","unstructured":"Marrocco, C. and Tortorella, F., Exploiting coding theory for classification: An LDPC-based strategy for multiclass-to-binary decomposition, Inf. Sci.,2016, vol. 357, pp. 88\u2013107. \u00a0https:\/\/doi.org\/10.1016\/j.ins.2016.02.039","journal-title":"Inf. Sci."},{"key":"7370_CR4","first-page":"178","volume":"28","author":"H. Sha","year":"2020","unstructured":"Sha, H., Wang, Z., Wei, L., Zhankai, B., and Fei, X., Image encryption based on LDPC code and chaos, Electron. Des. Eng., 2020, vol. 28, no. 3, pp. 178\u2013182.","journal-title":"Electron. Des. Eng."},{"key":"7370_CR5","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1080\/24725854.2018.1550692","volume":"51","author":"B. Kabakulak","year":"2019","unstructured":"Kabakulak, B., Caner Ta\u015fk\u0131n, Z., and Pusane, A.E., Optimization-based decoding algorithms for LDPC convolutional codes in communication systems, IISE Trans., 2019, vol. 51, no. 10, pp. 1061\u20131074. \u00a0https:\/\/doi.org\/10.1080\/24725854.2018.1550692","journal-title":"IISE Trans."},{"key":"7370_CR6","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.1109\/26.795809","volume":"47","author":"D.J.C. Mackay","year":"1999","unstructured":"Mackay, D.J.C., Wilson, S.T., and Davey, M.C., Comparison of constructions of irregular Gallager codes, IEEE Trans. Commun., 1999, vol. 47, no. 10, pp. 1449\u20131454. \u00a0https:\/\/doi.org\/10.1109\/26.795809","journal-title":"IEEE Trans. Commun."},{"key":"7370_CR7","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/4347.001.0001","volume-title":"Low-Density Parity Check Codes","author":"R. G. Gallager","year":"1963","unstructured":"Gallager R. G., Low-Density Parity Check Codes, Cambridge, Mass.: MIT Press, 1963."},{"key":"7370_CR8","doi-asserted-by":"publisher","first-page":"11529","DOI":"10.1007\/s11042-015-2883-z","volume":"75","author":"F. Elgendy","year":"2016","unstructured":"Elgendy, F., Sarhan, A.M., Eltobely, T.E., El-Zoghdy, S.F., El-Sayed, H.S., and Faragallah, O.S., Chaos-based model for encryption and decryption of digital images, Multimedia Tools Appl., 2016, vol. 75, no. 18, pp.\u00a011529\u201311553. \u00a0https:\/\/doi.org\/10.1007\/s11042-015-2883-z","journal-title":"Multimedia Tools Appl."},{"key":"7370_CR9","unstructured":"Chen, S. and Tang, Y., RGB color image three reset chaos algorithm based on chaos system, J. Chongqing Univ. Posts Telecommun. (Nat. Sci. Ed.), 2018, vol. 30, no. 6, pp. 812\u2013818."},{"key":"7370_CR10","doi-asserted-by":"publisher","first-page":"4060","DOI":"10.1007\/s00034-015-0235-x","volume":"35","author":"W. Su\u0142ek","year":"2016","unstructured":"Su\u0142ek, W., Non-binary LDPC decoders design for maximizing throughput of an FPGA implementation, Circuits, Syst., Signal Process., 2016, vol. 35, no. 11, pp. 4060\u20134080. \u00a0https:\/\/doi.org\/10.1007\/s00034-015-0235-x","journal-title":"Circuits, Syst., Signal Process."},{"key":"7370_CR11","first-page":"38","volume":"10","author":"L. Gao","year":"2011","unstructured":"Gao, L. and Cheng, L., Research on integrated circuit design specialty and curriculum based on FPGA, J.\u00a0Shenzhen Polytech., 2011, vol. 10, no. 5, pp. 38\u201340.","journal-title":"J.\u00a0Shenzhen Polytech."},{"key":"7370_CR12","doi-asserted-by":"publisher","first-page":"642","DOI":"10.21629\/JSEE.2019.04.02","volume":"30","author":"K. Cheng","year":"2019","unstructured":"Cheng, K., Shen, Q., Liao, S., and Peng, C., Implementation of encoder and decoder for LDPC codes based on FPGA, J. Syst. Eng. Electron., 2019, vol. 30, no. 4, pp. 642\u2013650. \u00a0https:\/\/doi.org\/10.21629\/JSEE.2019.04.02","journal-title":"J. Syst. Eng. Electron."},{"key":"7370_CR13","doi-asserted-by":"publisher","unstructured":"Straus, P. and Kolka, Z., Simulation and implementation of LDPC code in FPGA, in 23rd Int. Conf. Radioelektronika (RADIOELEKTRONIKA), Pardubice, Czech Republic, \n               2013, IEEE, 2013, pp. 346\u2013349. \u00a0https:\/\/doi.org\/10.1109\/RadioElek.2013.6530944","DOI":"10.1109\/RadioElek.2013.6530944"},{"key":"7370_CR14","unstructured":"Shen, Q., Technical research on NIOS-II soft core embedded in FPGA, PhD Thesis, Nanchang, Jiangxi: East China Univ. of Technology, 2015."},{"key":"7370_CR15","unstructured":"Ma, Y., Research on SOPC image processing system architecture based on Nios II and hardware accelerated core, PhD Thesis, Shanghai: Shanghai Ocean Univ., 2018."},{"key":"7370_CR16","unstructured":"Geng, J., Design and implementation of image encryption system based on FPGA, PhD Thesis, Nanchang, Jiangxi:\u00a0Nanchang Univ., 2014."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621050072.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621050072","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621050072.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:55Z","timestamp":1773612055000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621050072"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":16,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["7370"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621050072","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9]]},"assertion":[{"value":"14 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTERESTS"}}]}}