iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1016/J.INS.2015.06.049
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T05:13:50Z","timestamp":1725340430456},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1016\/j.ins.2015.06.049","type":"journal-article","created":{"date-parts":[[2015,7,5]],"date-time":"2015-07-05T03:19:53Z","timestamp":1436066393000},"page":"197-207","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":189,"special_numbering":"C","title":["Image encryption: Generating visually meaningful encrypted images"],"prefix":"10.1016","volume":"324","author":[{"given":"Long","family":"Bao","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4487-6384","authenticated-orcid":false,"given":"Yicong","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/j.ins.2015.06.049_bib0001","doi-asserted-by":"crossref","first-page":"3598","DOI":"10.1109\/TIP.2012.2191564","article-title":"Robust reversible watermarking via clustering and enhanced pixel-wise masking","volume":"21","author":"An","year":"2012","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"10.1016\/j.ins.2015.06.049_bib0002","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2011.06.012","article-title":"Robust lossless data hiding using clustering and statistical quantity histogram","volume":"77","author":"An","year":"2012","journal-title":"Neurocomputing"},{"issue":"0","key":"10.1016\/j.ins.2015.06.049_bib0003","first-page":"1","article-title":"Content-adaptive reliable robust lossless data embedding","volume":"79","author":"An","year":"2012","journal-title":"Neurocomputing"},{"key":"10.1016\/j.ins.2015.06.049_bib0004","series-title":"Proceedings of the 2012 International Conference on System Science and Engineering (ICSSE)","first-page":"69","article-title":"A new chaotic system for image encryption","author":"Bao","year":"2012"},{"issue":"0","key":"10.1016\/j.ins.2015.06.049_bib0005","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/j.ins.2012.09.053","article-title":"Discrete fractional wavelet transform and its application to multiple encryption","volume":"223","author":"Bhatnagar","year":"2013","journal-title":"Inf. Sci."},{"issue":"11","key":"10.1016\/j.ins.2015.06.049_bib0006","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/LSP.2012.2220354","article-title":"A reciprocal-orthogonal parametric transform and its fast algorithm","volume":"19","author":"Bouguezel","year":"2012","journal-title":"IEEE Signal Process. Lett."},{"issue":"3","key":"10.1016\/j.ins.2015.06.049_bib0007","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1006\/acha.1997.0238","article-title":"Wavelet transforms that map integers to integers","volume":"5","author":"Calderbank","year":"1998","journal-title":"Appl. Comput. Harmonic Anal."},{"issue":"0","key":"10.1016\/j.ins.2015.06.049_bib0008","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.ins.2012.01.016","article-title":"Personalized information encryption using ECG signals with chaotic functions","volume":"193","author":"Chen","year":"2012","journal-title":"Inf. Sci."},{"issue":"3","key":"10.1016\/j.ins.2015.06.049_bib0009","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","article-title":"A symmetric image encryption scheme based on 3D chaotic cat maps","volume":"21","author":"Chen","year":"2004","journal-title":"Chaos, Solitons & Fractals"},{"issue":"0","key":"10.1016\/j.ins.2015.06.049_bib0010","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.ins.2011.11.026","article-title":"Multi-image encryption by circular random grids","volume":"189","author":"Chen","year":"2012","journal-title":"Inf. Sci."},{"issue":"8","key":"10.1016\/j.ins.2015.06.049_bib0011","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1016\/j.sigpro.2009.02.005","article-title":"A local Tchebichef moments-based robust image watermarking","volume":"89","author":"Deng","year":"2009","journal-title":"Signal Process."},{"issue":"4","key":"10.1016\/j.ins.2015.06.049_bib0012","doi-asserted-by":"crossref","first-page":"1244","DOI":"10.1109\/TIP.2015.2395724","article-title":"On local prediction based reversible watermarking","volume":"24","author":"Dragoi","year":"2015","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"10.1016\/j.ins.2015.06.049_bib0013","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/TIFS.2013.2294240","article-title":"Robust lossless watermarking of relational databases based on circular histogram modulation","volume":"9","author":"Franco-Contreras","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"10.1016\/j.ins.2015.06.049_bib0014","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1016\/j.sigpro.2009.04.015","article-title":"Reversibility improved lossless data hiding","volume":"89","author":"Gao","year":"2009","journal-title":"Signal Process."},{"issue":"8","key":"10.1016\/j.ins.2015.06.049_bib0015","doi-asserted-by":"crossref","first-page":"1061","DOI":"10.1109\/TCSVT.2011.2130410","article-title":"Lossless data embedding using generalized statistical quantity histogram","volume":"21","author":"Gao","year":"2011","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"10.1016\/j.ins.2015.06.049_bib0016","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/TSMCC.2009.2037512","article-title":"Geometric distortion insensitive image watermarking in affine covariant regions","volume":"40","author":"Gao","year":"2010","journal-title":"IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev."},{"issue":"5","key":"10.1016\/j.ins.2015.06.049_bib0017","first-page":"618","article-title":"An image encryption scheme based on irregularly decimated chaotic maps","volume":"29","author":"Ghebleh","year":"2014","journal-title":"Signal Process.: Image Commun."},{"issue":"0","key":"10.1016\/j.ins.2015.06.049_bib0018","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.optcom.2014.01.061","article-title":"Optical double image encryption employing a pseudo image technique in the Fourier domain","volume":"321","author":"Guo","year":"2014","journal-title":"Opt. Commun."},{"issue":"0","key":"10.1016\/j.ins.2015.06.049_bib0019","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","article-title":"2d sine logistic modulation map for image encryption","volume":"297","author":"Hua","year":"2015","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2015.06.049_bib0020","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","article-title":"A novel image encryption algorithm based on self-adaptive wave transmission","volume":"90","author":"Liao","year":"2010","journal-title":"Signal Process."},{"issue":"0","key":"10.1016\/j.ins.2015.06.049_bib0021","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/j.sigpro.2013.07.020","article-title":"Image encryption based on the fractional Fourier transform over finite fields","volume":"94","author":"Lima","year":"2014","journal-title":"Signal Process."},{"issue":"3","key":"10.1016\/j.ins.2015.06.049_bib0022","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","article-title":"Reversible data hiding in encrypted images by reserving room before encryption","volume":"8","author":"Ma","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.ins.2015.06.049_bib0023","series-title":"Handbook of Applied Cryptography","author":"Menezes","year":"1997"},{"key":"10.1016\/j.ins.2015.06.049_bib0024","unstructured":"National Institute of Standards and Technology, Advanced encryption standard (AES), 2001."},{"issue":"3","key":"10.1016\/j.ins.2015.06.049_bib0025","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","article-title":"A novel joint data-hiding and compression scheme based on SMVQ and image inpainting","volume":"23","author":"Qin","year":"2014","journal-title":"IEEE Trans. Image Process."},{"issue":"21\u201322","key":"10.1016\/j.ins.2015.06.049_bib0026","doi-asserted-by":"crossref","first-page":"4227","DOI":"10.1016\/j.optcom.2012.06.023","article-title":"Double image encryption based on discrete multiple-parameter fractional Fourier transform and chaotic maps","volume":"285","author":"Shan","year":"2012","journal-title":"Opt. Commun."},{"issue":"0","key":"10.1016\/j.ins.2015.06.049_bib0027","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.ins.2014.02.004","article-title":"Image cryptographic algorithm based on the haar wavelet transform","volume":"269","author":"Tedmori","year":"2014","journal-title":"Information Sciences"},{"issue":"4","key":"10.1016\/j.ins.2015.06.049_bib0028","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1007\/s11071-010-9821-4","article-title":"Chaotic encryption algorithm based on alternant of stream cipher and block cipher","volume":"63","author":"Wang","year":"2011","journal-title":"Nonlinear Dynamics"},{"issue":"1","key":"10.1016\/j.ins.2015.06.049_sbref0028","doi-asserted-by":"crossref","DOI":"10.1117\/1.JEI.21.1.013014","article-title":"Image encryption using the two-dimensional logistic chaotic map","volume":"21","author":"Wu","year":"2012","journal-title":"Journal of Electronic Imaging"},{"issue":"0","key":"10.1016\/j.ins.2015.06.049_sbref0029","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","article-title":"Design of image cipher using latin squares","volume":"264","author":"Wu","year":"2014","journal-title":"Information Sciences"},{"issue":"0","key":"10.1016\/j.ins.2015.06.049_bib0031","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/j.ins.2014.02.124","article-title":"Quantum cryptographic algorithm for color images using quantum Fourier transform and double random-phase encoding","volume":"277","author":"Yang","year":"2014","journal-title":"Information Sciences"},{"issue":"2","key":"10.1016\/j.ins.2015.06.049_bib0032","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1109\/TIP.2012.2221725","article-title":"Objective quality assessment of tone-mapped images","volume":"22","author":"Yeganeh","year":"2013","journal-title":"IEEE Transactions on Image Processing"},{"issue":"0","key":"10.1016\/j.ins.2015.06.049_bib0033","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1016\/j.ins.2014.02.131","article-title":"Gray code permutation algorithm for high-dimensional data encryption","volume":"270","author":"Zanin","year":"2014","journal-title":"Information Sciences"},{"issue":"0","key":"10.1016\/j.ins.2015.06.049_bib0034","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","article-title":"A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice","volume":"273","author":"Zhang","year":"2014","journal-title":"Information Sciences"},{"issue":"1","key":"10.1016\/j.ins.2015.06.049_bib0035","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/TIFS.2013.2291625","article-title":"Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation","volume":"9","author":"Zhou","year":"2014","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"10.1016\/j.ins.2015.06.049_bib0036","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TSMCB.2012.2210706","article-title":"(n, k, p)-gray code for image systems","volume":"43","author":"Zhou","year":"2013","journal-title":"IEEE Transactions on Cybernetics"},{"key":"10.1016\/j.ins.2015.06.049_bib0037","series-title":"2011 IEEE International Conference on System Science and Engineering (ICSSE)","first-page":"699","article-title":"Image encryption using the image steganography concept and PLIP model","author":"Zhou","year":"2011"},{"issue":"11","key":"10.1016\/j.ins.2015.06.049_bib0038","doi-asserted-by":"crossref","first-page":"3039","DOI":"10.1016\/j.sigpro.2013.04.021","article-title":"Image encryption using a new parametric switching chaotic system","volume":"93","author":"Zhou","year":"2013","journal-title":"Signal Processing"},{"key":"10.1016\/j.ins.2015.06.049_bib0039","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","article-title":"A new 1D chaotic system for image encryption","volume":"97","author":"Zhou","year":"2014","journal-title":"Signal Processing"},{"issue":"5","key":"10.1016\/j.ins.2015.06.049_bib0040","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1016\/j.optcom.2011.11.044","article-title":"Image encryption using P-Fibonacci transform and decomposition","volume":"285","author":"Zhou","year":"2012","journal-title":"Optics Communications"},{"issue":"6","key":"10.1016\/j.ins.2015.06.049_bib0041","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","article-title":"A chaos-based symmetric image encryption scheme using a bit-level permutation","volume":"181","author":"Zhu","year":"2011","journal-title":"Information Sciences"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025515004818?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025515004818?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T00:26:26Z","timestamp":1537489586000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025515004818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":41,"alternative-id":["S0020025515004818"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2015.06.049","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2015,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Image encryption: Generating visually meaningful encrypted images","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2015.06.049","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}