{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T17:44:07Z","timestamp":1648835047849},"reference-count":10,"publisher":"International Academy Publishing (IAP)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.9.2.458-465","type":"journal-article","created":{"date-parts":[[2014,2,24]],"date-time":"2014-02-24T17:53:43Z","timestamp":1393264423000},"source":"Crossref","is-referenced-by-count":1,"title":["Image Encryption Algorithm Based on Wavelet Transforms and Dual Chaotic Maps"],"prefix":"10.17706","volume":"9","author":[{"given":"Shucong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yanxing","family":"Song","sequence":"additional","affiliation":[]},{"given":"Jingsong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2014,2,1]]},"reference":[{"issue":"No.10","key":"ref1","first-page":"1953","article-title":"Design of Image Encryption Algorithm Based on Compound Two-dimensional Maps.","volume":"6","author":"Huang","year":"2011","unstructured":"[1] Feng Huang, Xilong Qu. Design of Image Encryption Algorithm Based on Compound Two-dimensional Maps. Journal of Software, Vol.6, No.10 (2011), pp.1953-1960","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"issue":"No. 25","key":"ref2","first-page":"518","article-title":"New image encryption scheme based on OCML and TD-ERCS map","volume":"2","author":"Kehui","year":"2008","unstructured":"[4]Sun Kehui, Shang Fang,Zhong Ke. New image encryption scheme based on OCML and TD-ERCS map [J]. Computer Applications Studies, Vol. 2, No. 25, 2008, pp.518-520.","journal-title":"Computer Applications Studies"},{"issue":"No. 25","key":"ref3","first-page":"227","article-title":"An Image Encryption Approach Based on a Two-dimensional Reversible Map","volume":"2","author":"Mingwei","year":"2008","unstructured":"[5] Li Mingwei, Feng Yong, Li Linjing. An Image Encryption Approach Based on a Two-dimensional Reversible Map[J]. Computer Simulation, Vol. 2, No. 25, 2008, pp. 227-331.","journal-title":"Computer Simulation"},{"issue":"2","key":"ref4","first-page":"379","article-title":"A Study on the Improvement of Wavelet Packet Algorithm for Image Compression[ J] . IEEE Audio Engineering, Electronics","volume":"4","author":"Suk","year":"2002","unstructured":"[6] Hyung Suk, Chong Koo An. A Study on the Improvement of Wavelet Packet Algorithm for Image Compression[ J] . IEEE Audio Engineering, Electronics, Communication, 2002, 4(2): 379-382.","journal-title":"Communication"},{"issue":"No. 39","key":"ref5","first-page":"98","article-title":"Design of 4-phase Chaotic Map of Oversampled and its Applications in Spreading Spectrum Communication","volume":"11","author":"Wei","year":"2009","unstructured":"[9] Liu Wei. Design of 4-phase Chaotic Map of Oversampled and its Applications in Spreading Spectrum Communication[J] Mathematics in Practice and Theory, Vol. 11, No. 39, 2009, pp.98-103.","journal-title":"Mathematics in Practice and Theory"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118991863745"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"issue":"No. 25","key":"ref8","first-page":"447","article-title":"Bit Image Encryption Research Based on Chaotic Sequence","volume":"5","author":"Fei","year":"2005","unstructured":"[12] Gao Fei, Li Xinghua. Bit Image Encryption Research Based on Chaotic Sequence [J]. Journal of Beijing Institute of Technology, Vol. 5, No. 25, 2005, pp. 447-450.","journal-title":"Journal of Beijing Institute of Technology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2005.08.006"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.02.021"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T11:26:43Z","timestamp":1442316403000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/10406"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,1]]},"references-count":10,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2014,2,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.9.2.458-465","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2014,2,1]]}}}