{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:12Z","timestamp":1725808392948},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_9","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"75-83","source":"Crossref","is-referenced-by-count":1,"title":["A Chaotic Substitution Based Image Encryption Using APA-transformation"],"prefix":"10.1007","author":[{"given":"Musheer","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Akshay","family":"Chopra","sequence":"additional","affiliation":[]},{"given":"Prakhar","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Shahzad","family":"Alam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"9_CR1","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s00521-012-0914-5","volume":"23","author":"I. Hussain","year":"2012","unstructured":"Hussain, I., Shah, T., Gondal, M.A., Khan, W.A., Mahmood, H.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Computing and Applications\u00a023(1), 97\u2013104 (2012)","journal-title":"Neural Computing and Applications"},{"key":"9_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of RIJNDAEL: AES\u2014The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of RIJNDAEL: AES\u2014The Advanced Encryption Standard. Springer, Berlin (2002)"},{"key":"9_CR3","first-page":"751","volume":"3","author":"L. Cui","year":"2007","unstructured":"Cui, L., Cao, Y.: A new S-box structure named Affine-Power-Affine. International Journal of Innovative Computing, Information and Control\u00a03, 751\u2013759 (2007)","journal-title":"International Journal of Innovative Computing, Information and Control"},{"issue":"9","key":"9_CR4","doi-asserted-by":"publisher","first-page":"3106","DOI":"10.1016\/j.cnsns.2014.02.011","volume":"19","author":"A. Anees","year":"2014","unstructured":"Anees, A., Siddiqui, A.M., Ahmed, F.: Chaotic substitution for highly auto-correlated data in encryption algorithm. Communication in Nonlinear Science and Numerical Simulation\u00a019(9), 3106\u20133118 (2014)","journal-title":"Communication in Nonlinear Science and Numerical Simulation"},{"issue":"5","key":"9_CR5","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1166\/asl.2013.4494","volume":"19","author":"C. Huang","year":"2013","unstructured":"Huang, C., Nien, H., Chiang, T., Shu, Y., Changchien, S., Teng, C.: Chaotic S-Box based pixel substituting for image encryption. Advanced Science Letters\u00a019(5), 1525\u20131529 (2013)","journal-title":"Advanced Science Letters"},{"issue":"14","key":"9_CR6","doi-asserted-by":"publisher","first-page":"4887","DOI":"10.1016\/j.optcom.2012.06.011","volume":"285","author":"I. Hussain","year":"2012","unstructured":"Hussain, I., Shah, T., Gondal, M.A.: An efficient image encryption algorithm based on S8 S-box transformation and NCA map. Optics Communications\u00a0285(14), 4887\u20134890 (2012)","journal-title":"Optics Communications"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Hussain, I., Shah, T., Gondal, M.A.: Image encryption algorithm based on total shuffling scheme and chaotic S-box transformation. Journal of Vibration and Control (2013), doi:10.1177\/1077546313482960","DOI":"10.1177\/1077546313482960"},{"issue":"3","key":"9_CR8","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/s11071-013-1086-2","volume":"75","author":"X. Wang","year":"2014","unstructured":"Wang, X., Wang, Q.: A novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlinear Dynamics\u00a075(3), 567\u2013576 (2014)","journal-title":"Nonlinear Dynamics"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"R.M. May","year":"1967","unstructured":"May, R.M.: Simple mathematical model with very complicated dynamics. Nature\u00a0261, 459\u2013467 (1967)","journal-title":"Nature"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45708-9_1","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"S. Murphy","year":"2002","unstructured":"Murphy, S., Robshaw, M.J.B.: Essential algebraic structure within the AES. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 1\u201316. Springer, Heidelberg (2002)"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y. Wu","year":"2014","unstructured":"Wu, Y., Zhou, Y., Noonan, J.P., Agaian, S.: Design of image cipher using latin squares. Information Sciences\u00a0264, 317\u2013339 (2014)","journal-title":"Information Sciences"},{"key":"9_CR12","unstructured":"Latin Square, \n http:\/\/en.wikipedia.org\/wiki\/Latin_square\n (last access on June 12, 2014)"},{"key":"9_CR13","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1007\/978-3-642-54525-2_48","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"M. Ahmad","year":"2014","unstructured":"Ahmad, M., Khan, P.M., Ansari, M.Z.: A simple and efficient key-dependent S-box design using fisher-yates shuffle technique. In: Mart\u00ednez P\u00e9rez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol.\u00a0420, pp. 540\u2013550. Springer, Heidelberg (2014)"},{"key":"9_CR14","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-14834-7_17","volume-title":"Contemporary Computing","author":"M. Ahmad","year":"2010","unstructured":"Ahmad, M., Farooq, O.: A Multi-Level Blocks Scrambling Based Chaotic Image Cipher. In: Ranka, S., Banerjee, A., Biswas, K.K., Dua, S., Mishra, P., Moona, R., Poon, S.-H., Wang, C.-L. (eds.) IC3 2010. CCIS, vol.\u00a094, pp. 171\u2013182. Springer, Heidelberg (2010)"},{"key":"9_CR15","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-642-22577-2_35","volume-title":"High Performance Architecture and Grid Computing","author":"M. Ahmad","year":"2011","unstructured":"Ahmad, M., Farooq, O.: Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds.) HPAGC 2011. CCIS, vol.\u00a0169, pp. 257\u2013264. Springer, Heidelberg (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T14:49:20Z","timestamp":1676904560000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}