{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T17:10:17Z","timestamp":1725297017513},"reference-count":53,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T00:00:00Z","timestamp":1514505600000},"content-version":"am","delay-in-days":303,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41571417","61305042"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation of the United States","doi-asserted-by":"publisher","award":["CNS-1253424","ECCS-1202225"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Foundation of Henan Province of China","award":["152102210048"]},{"name":"Foundation and Frontier Project of Henan Province of China","award":["142300410126","162300410196"]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2016M602235"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Henan Postdoctoral Scientific Program","award":["2013029"]},{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Educational Committee of Henan Province of China","doi-asserted-by":"publisher","award":["14A413015"],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004773","name":"Research Foundation of Henan University","doi-asserted-by":"publisher","award":["xxjc20140006"],"id":[{"id":"10.13039\/501100004773","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing: Image Communication"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1016\/j.image.2016.12.007","type":"journal-article","created":{"date-parts":[[2016,12,23]],"date-time":"2016-12-23T14:16:59Z","timestamp":1482502619000},"page":"6-19","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":179,"special_numbering":"C","title":["An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations"],"prefix":"10.1016","volume":"52","author":[{"given":"Xiuli","family":"Chai","sequence":"first","affiliation":[]},{"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Kang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yiran","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xianxing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.image.2016.12.007_bib1","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.optcom.2015.05.011","article-title":"Joint transform correlator optical encryption system: Extensions of the recorded encrypted signal and its inverse fourier transform","volume":"353","author":"Gustavo","year":"2015","journal-title":"Opt. Commun."},{"key":"10.1016\/j.image.2016.12.007_bib2","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.optlastec.2014.01.015","article-title":"Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map","volume":"60","author":"Liu","year":"2014","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.image.2016.12.007_bib3","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11071-013-1074-6","article-title":"A block image encryption algorithm based on wave transmission and chaotic systems","volume":"75","author":"Ye","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.image.2016.12.007_bib4","article-title":"An image encryption algorithm based on bit level Brownian motion and new chaotic systems","author":"Chai","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.image.2016.12.007_bib5","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1007\/s11071-015-2521-3","article-title":"Fast and efficient randomized encryption scheme for digital images based on Quadtree decomposition and reversible memory cellular automata","volume":"84","author":"Souyah","year":"2016","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.image.2016.12.007_bib6","first-page":"41","article-title":"Robust and hierarchical watermarking of encrypted images based on compressive sensing","volume":"45","author":"Liu","year":"2016","journal-title":"Signal Process.: Image"},{"key":"10.1016\/j.image.2016.12.007_bib7","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","article-title":"Image encryption using 2D logistic-adjusted-sine map","volume":"339","author":"Hua","year":"2016","journal-title":"Inf. Sci."},{"key":"10.1016\/j.image.2016.12.007_bib8","first-page":"144","article-title":"A new chaos-based image encryption system","volume":"41","author":"Assad","year":"2016","journal-title":"Signal Process.: Image"},{"key":"10.1016\/j.image.2016.12.007_bib9","first-page":"1","article-title":"Circular inter-intra pixels bit-level permutation and chaos-based image encryption","volume":"3","author":"Diaconu","year":"2015","journal-title":"Inf. Sci."},{"key":"10.1016\/j.image.2016.12.007_bib10","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","article-title":"Image encryption based on three-dimensional bit matrix permutation","volume":"118","author":"Zhang","year":"2016","journal-title":"Signal Process."},{"key":"10.1016\/j.image.2016.12.007_bib11","first-page":"121","article-title":"Image compression-encryption based on hyper-chaotic system and 2D compressive sensing","volume":"82","author":"Zhou","year":"2016","journal-title":"Opt.\u00a0Laser\u00a0Technol."},{"key":"10.1016\/j.image.2016.12.007_bib12","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1002\/sec.1458","article-title":"A secure image encryption algorithm based on chaotic maps and SHA-3","volume":"9","author":"Ye","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.image.2016.12.007_bib13","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","article-title":"Symmetric ciphers based on two-dimensional chaotic maps","volume":"8","author":"Fridrich","year":"1998","journal-title":"Int. J. Bifurcat. Chaos"},{"key":"10.1016\/j.image.2016.12.007_bib14","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1049\/ip-vis:20000208","article-title":"Efficient hierarchical chaotic image encryption algorithm and its VLSI realization","volume":"147","author":"Yen","year":"2000","journal-title":"IEEE Proc. Vis. Image Signal Process."},{"key":"10.1016\/j.image.2016.12.007_bib15","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.sigpro.2015.07.008","article-title":"Cracking a hierarchical chaotic image encryption algorithm based on permutation","volume":"118","author":"Li","year":"2016","journal-title":"Signal Process."},{"key":"10.1016\/j.image.2016.12.007_bib16","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","article-title":"On the cryptanalysis of Fridrich's chaotic image encryption scheme","volume":"132","author":"Xie","year":"2017","journal-title":"Signal Process."},{"key":"10.1016\/j.image.2016.12.007_bib17","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","article-title":"A fast color image encryption algorithm based on hyper-chaotic systems","volume":"78","author":"Norouzi","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.image.2016.12.007_bib18","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s00530-013-0314-4","article-title":"A novel image encryption based on hash function with only two-round diffusion process","volume":"20","author":"Norouzi","year":"2014","journal-title":"Multimed. Syst."},{"key":"10.1016\/j.image.2016.12.007_bib19","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.ins.2014.08.005","article-title":"On the security of symmetric ciphers based on DNA coding","volume":"28","author":"Zhang","year":"2014","journal-title":"Inf. Sci."},{"key":"10.1016\/j.image.2016.12.007_bib20","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","article-title":"Image encryption using DNA addition combining with chaotic maps","volume":"52","author":"Zhang","year":"2010","journal-title":"Math. Comput. Model."},{"key":"10.1016\/j.image.2016.12.007_bib21","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","article-title":"A novel chaotic image encryption scheme using DNA sequence operations","volume":"73","author":"Wang","year":"2015","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.image.2016.12.007_bib22","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.optlaseng.2016.02.002","article-title":"An image encryption scheme based on the MLNCML system using DNA sequences","volume":"82","author":"Zhang","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.image.2016.12.007_bib23","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","article-title":"A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2","volume":"83","author":"Guesmi","year":"2016","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.image.2016.12.007_bib24","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s11047-012-9334-9","article-title":"A novel text and image encryption method based on chaos theory and DNA computing","volume":"12","author":"Babaei","year":"2013","journal-title":"Nat. Comput."},{"key":"10.1016\/j.image.2016.12.007_bib25","doi-asserted-by":"crossref","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","article-title":"A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system","volume":"124","author":"Zhang","year":"2013","journal-title":"Optik"},{"key":"10.1016\/j.image.2016.12.007_bib26","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","article-title":"An image encryption algorithm based on hyper-chaos and DNA sequence","volume":"72","author":"Huang","year":"2014","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.image.2016.12.007_bib27","first-page":"186","article-title":"Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps, AEU-Int","volume":"68","author":"Zhang","year":"2014","journal-title":"J. Electron. C"},{"key":"10.1016\/j.image.2016.12.007_bib28","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","article-title":"A RGB image encryption algorithm based on DNA encoding and chaos map","volume":"38","author":"Liu","year":"2012","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.image.2016.12.007_bib29","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","article-title":"Image encryption using DNA complementary rule and chaotic maps","volume":"12","author":"Liu","year":"2012","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.image.2016.12.007_bib30","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/0196-8858(86)90028-X","article-title":"Random sequence generation by cellular automata","volume":"7","author":"Wolfram","year":"1986","journal-title":"Adv. Appl. Math."},{"key":"10.1016\/j.image.2016.12.007_bib31","first-page":"413","article-title":"Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata","volume":"25","author":"Chen","year":"2010","journal-title":"Signal Process.: Image"},{"key":"10.1016\/j.image.2016.12.007_bib32","doi-asserted-by":"crossref","first-page":"1350071","DOI":"10.1142\/S012918311350071X","article-title":"Color image encryption based on two-dimensional cellular automata","volume":"24","author":"Ping","year":"2013","journal-title":"Int. J. Mod. Phys. C."},{"key":"10.1016\/j.image.2016.12.007_bib33","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/j.sigpro.2014.06.020","article-title":"Image encryption based on non-affine and balanced cellular automata","volume":"105","author":"Ping","year":"2014","journal-title":"Signal Process."},{"key":"10.1016\/j.image.2016.12.007_bib34","doi-asserted-by":"crossref","first-page":"2449","DOI":"10.1007\/s11071-014-1824-0","article-title":"A novel image encryption scheme using chaos and Langton's ant cellular automaton","volume":"79","author":"Wang","year":"2015","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.image.2016.12.007_bib35","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.optlaseng.2015.03.007","article-title":"A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata","volume":"71","author":"Enayatifar","year":"2015","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.image.2016.12.007_bib36","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TCT.1971.1083337","article-title":"Memristors-the missing circuit element","volume":"18","author":"Chua","year":"1971","journal-title":"IEEE Trans. Circuit Theory"},{"key":"10.1016\/j.image.2016.12.007_bib37","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1038\/453042a","article-title":"Electronics: the fourth element","volume":"453","author":"Tour","year":"2008","journal-title":"Nature"},{"key":"10.1016\/j.image.2016.12.007_bib38","doi-asserted-by":"crossref","first-page":"1426","DOI":"10.1109\/TNNLS.2012.2204770","article-title":"Memristor bridge synapse-based neural network and its learning","volume":"23","author":"Adhikari","year":"2012","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.image.2016.12.007_bib39","doi-asserted-by":"crossref","first-page":"1250205","DOI":"10.1142\/S0218127412502057","article-title":"Memristor model and its application for chaos generation","volume":"22","author":"Wang","year":"2012","journal-title":"Int. J. Bifurc. Chaos"},{"key":"10.1016\/j.image.2016.12.007_bib40","doi-asserted-by":"crossref","first-page":"080502","DOI":"10.7498\/aps.63.080502","article-title":"The 4-dimensional hyperchaotic memristive circuit based on Chua's circuit","volume":"63","author":"Yang","year":"2014","journal-title":"Acta Phys. Sin."},{"key":"10.1016\/j.image.2016.12.007_bib41","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1038\/nsmb.2294","article-title":"A rule of seven in Watson-Crick base-pairing of mismatched sequences","volume":"19","author":"Cisse","year":"2012","journal-title":"Nat. Struct. Mol. Biol."},{"key":"10.1016\/j.image.2016.12.007_bib42","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"\u00c0lvarez","year":"2006","journal-title":"Int. J. Bifur. Chaos"},{"key":"10.1016\/j.image.2016.12.007_bib43","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","article-title":"A symmetric image encryption algorithm based on mixed linear- nonlinear coupled map lattice","volume":"273","author":"Zhang","year":"2014","journal-title":"Inf. Sci."},{"key":"10.1016\/j.image.2016.12.007_bib44","article-title":"A new chaos-based image encryption algorithm with dynamic key selection mechanisms","author":"Chai","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.image.2016.12.007_bib45","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s11071-013-1070-x","article-title":"A novel image encryption scheme based on Brownian motion and PWLCM chaotic system","volume":"75","author":"Wang","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.image.2016.12.007_bib46","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","article-title":"A new image encryption method: parallel sub-image encryption with hyper chaos","volume":"67","author":"Mirzaei","year":"2012","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.image.2016.12.007_bib47","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","article-title":"Local Shannon entropy measure with statistical tests for image randomness","volume":"222","author":"Wu","year":"2013","journal-title":"Inf. Sci."},{"key":"10.1016\/j.image.2016.12.007_bib48","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.sigpro.2015.06.007","article-title":"Color image encryption using chaotic nonlinear adaptive filter","volume":"117","author":"Hsiao","year":"2015","journal-title":"Signal Process."},{"key":"10.1016\/j.image.2016.12.007_bib49","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","article-title":"A new chaos-based fast image encryption algorithm","volume":"11","author":"Wang","year":"2011","journal-title":"J. Appl. Soft Comput."},{"key":"10.1016\/j.image.2016.12.007_bib50","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","article-title":"A fast image encryption scheme based on chaotic standard map","volume":"372","author":"Wong","year":"2008","journal-title":"Phys. Lett. A"},{"key":"10.1016\/j.image.2016.12.007_bib51","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1016\/j.chaos.2007.10.009","article-title":"Analysis and improvement of a chaos-based image encryption algorithm","volume":"40","author":"Xiao","year":"2009","journal-title":"Chaos Solitons Fract."},{"key":"10.1016\/j.image.2016.12.007_bib52","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","article-title":"An image encryption scheme based on rotation matrix bit-level permutation and block diffusion","volume":"19","author":"Zhang","year":"2014","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"10.1016\/j.image.2016.12.007_bib53","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","article-title":"Image encryption using binary bitplane","volume":"100","author":"Zhou","year":"2014","journal-title":"Signal Process."}],"container-title":["Signal Processing: Image Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596516301904?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596516301904?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,7]],"date-time":"2024-04-07T04:45:53Z","timestamp":1712465153000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0923596516301904"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":53,"alternative-id":["S0923596516301904"],"URL":"https:\/\/doi.org\/10.1016\/j.image.2016.12.007","relation":{},"ISSN":["0923-5965"],"issn-type":[{"value":"0923-5965","type":"print"}],"subject":[],"published":{"date-parts":[[2017,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations","name":"articletitle","label":"Article Title"},{"value":"Signal Processing: Image Communication","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.image.2016.12.007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}