{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:56:32Z","timestamp":1740117392197,"version":"3.37.3"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100003593","name":"CNPq","doi-asserted-by":"publisher","award":["142428\/2015-9","309598\/2017-6","409543\/2018-7"],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"CAPES, Brazil","doi-asserted-by":"publisher","award":["88881.131572\/2016-01"],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing: Image Communication"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1016\/j.image.2019.01.008","type":"journal-article","created":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T12:57:04Z","timestamp":1549285024000},"page":"89-95","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Steerable Fourier number transform with application to image encryption"],"prefix":"10.1016","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1623-7040","authenticated-orcid":false,"given":"Marcos A.A.","family":"Gondim","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 R.","family":"de Oliveira Neto","sequence":"additional","affiliation":[]},{"given":"Juliano B.","family":"Lima","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"114","key":"10.1016\/j.image.2019.01.008_b1","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1090\/S0025-5718-1971-0301966-0","article-title":"The fast Fourier transform in a finite field","volume":"25","author":"Pollard","year":"1971","journal-title":"Math. Comp."},{"issue":"2","key":"10.1016\/j.image.2019.01.008_b2","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TIT.1975.1055352","article-title":"The use of finite fields to compute convolutions","volume":"21","author":"Reed","year":"1975","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"5","key":"10.1016\/j.image.2019.01.008_b3","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1049\/el:19880167","article-title":"Algorithm for linear convolution using number theoretic transforms","volume":"24","author":"Shu","year":"1988","journal-title":"Electron. Lett."},{"issue":"1","key":"10.1016\/j.image.2019.01.008_b4","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TCSVT.2005.858612","article-title":"Video filtering with Fermat number theoretic transforms using residue number system","volume":"16","author":"Toivonen","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Tech."},{"issue":"7","key":"10.1016\/j.image.2019.01.008_b5","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/j.image.2009.04.003","article-title":"Fragile watermarking using finite field trigonometrical transforms","volume":"24","author":"Cintra","year":"2009","journal-title":"Signal Process., Image Commun."},{"key":"10.1016\/j.image.2019.01.008_b6","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/j.sigpro.2013.07.020","article-title":"Image encryption based on the fractional Fourier transform over finite fields","volume":"94","author":"Lima","year":"2014","journal-title":"Signal Process."},{"key":"10.1016\/j.image.2019.01.008_b7","series-title":"Wireless Communications, Signal Processing and Networking (WiSPNET), International Conference on","first-page":"172","article-title":"Cosine number transform based hybrid image compression-encryption","author":"Ponuma","year":"2016"},{"key":"10.1016\/j.image.2019.01.008_b8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2017\/7367518","article-title":"Two-phase image encryption scheme based on FFCT and fractals","author":"Mikhail","year":"2017","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"10.1016\/j.image.2019.01.008_b9","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1109\/TIFS.2016.2647223","article-title":"Number theoretic transforms for secure signal processing","volume":"12","author":"Pedrouzo-Ulloa","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"year":"2010","series-title":"Fast Algorithms for Signal Processing","author":"Blahut","key":"10.1016\/j.image.2019.01.008_b10"},{"issue":"5\u20136","key":"10.1016\/j.image.2019.01.008_b11","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s00200-011-0158-0","article-title":"Finite field trigonometric transforms","volume":"22","author":"Lima","year":"2011","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"issue":"20","key":"10.1016\/j.image.2019.01.008_b12","doi-asserted-by":"crossref","first-page":"1570","DOI":"10.1049\/el.2015.0905","article-title":"Fast algorithm for computing cosine number transform","volume":"51","author":"Lima","year":"2015","journal-title":"Electron. Lett."},{"issue":"7","key":"10.1016\/j.image.2019.01.008_b13","doi-asserted-by":"crossref","first-page":"2893","DOI":"10.1007\/s00034-016-0447-8","article-title":"Fractional Fourier, Hartley, cosine and sine number-theoretic transforms based on matrix functions","volume":"36","author":"Lima","year":"2016","journal-title":"Circuits Systems Signal Process."},{"issue":"5","key":"10.1016\/j.image.2019.01.008_b14","doi-asserted-by":"crossref","first-page":"808","DOI":"10.1109\/JPROC.2018.2820126","article-title":"Graph signal processing: overview, challenges, and applications","volume":"106","author":"Ortega","year":"2018","journal-title":"Proc. IEEE"},{"issue":"3","key":"10.1016\/j.image.2019.01.008_b15","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/LSP.2017.2657889","article-title":"Steerable discrete Fourier transform","volume":"24","author":"Fracastoro","year":"2017","journal-title":"IEEE Signal Process. Lett."},{"issue":"8","key":"10.1016\/j.image.2019.01.008_b16","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.ins.2017.02.036","article-title":"Design of image cipher using block-based scrambling and image filtering","volume":"396","author":"Hua","year":"2017","journal-title":"Inform. Sci."},{"issue":"3","key":"10.1016\/j.image.2019.01.008_b17","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","article-title":"Medical image encryption using high-speed scrambling and pixel adaptive diffusion","volume":"144","author":"Hua","year":"2018","journal-title":"Signal Process."},{"issue":"8","key":"10.1016\/j.image.2019.01.008_b18","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","article-title":"2D logistic-sine-coupling map for image encryption","volume":"149","author":"Hua","year":"2018","journal-title":"Signal Process."},{"key":"10.1016\/j.image.2019.01.008_b19","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.image.2016.09.006","article-title":"Image encryption via discrete fractional Fourier-type transforms generated by random matrices","volume":"49","author":"Annaby","year":"2016","journal-title":"Signal Process., Image Commun."},{"key":"10.1016\/j.image.2019.01.008_b20","doi-asserted-by":"crossref","DOI":"10.1109\/TCSVT.2018.2859253","article-title":"Color image encryption using pixel scrambling operator and reality-preserving MPFRHT","author":"Kang","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.image.2019.01.008_b21","doi-asserted-by":"crossref","DOI":"10.1109\/TCSVT.2018.2851983","article-title":"Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption","author":"Kang","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"9","key":"10.1016\/j.image.2019.01.008_b22","doi-asserted-by":"crossref","first-page":"1340","DOI":"10.1109\/LSP.2015.2402395","article-title":"Multichannel random discrete fractional Fourier transform","volume":"22","author":"Kang","year":"2015","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"10.1016\/j.image.2019.01.008_b23","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1049\/iet-ipr.2017.0383","article-title":"Colour image encryption algorithm using one-time key and FrFT","volume":"12","author":"Gao","year":"2018","journal-title":"IET Image Process."},{"key":"10.1016\/j.image.2019.01.008_b24","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.optcom.2016.05.016","article-title":"Security of image encryption scheme based on multi-parameter fractional Fourier transform","volume":"376","author":"Zhao","year":"2016","journal-title":"Opt. Commun."},{"key":"10.1016\/j.image.2019.01.008_b25","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/LSP.2007.910299","article-title":"On the security of a cryptosystem based on multiple-parameters discrete fractional Fourier transform","volume":"15","author":"Youssef","year":"2008","journal-title":"IEEE Signal Process. Lett."},{"year":"2010","series-title":"Elementary Number Theory","author":"Burton","key":"10.1016\/j.image.2019.01.008_b26"},{"issue":"5","key":"10.1016\/j.image.2019.01.008_b27","doi-asserted-by":"crossref","first-page":"3249","DOI":"10.1109\/TIT.2012.2235907","article-title":"Period distribution of the generalized discrete Arnold cat map for N=2e","volume":"59","author":"Chen","year":"2013","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/j.image.2019.01.008_b28","series-title":"Tech. rep.","article-title":"ECRYPT II Yearly report on algorithms and keysizes (2011-2012)","author":"Smart","year":"2012"},{"issue":"3","key":"10.1016\/j.image.2019.01.008_b29","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1109\/81.915385","article-title":"Chaos-based random number generators \u2013 part I: analysis","volume":"48","author":"Stojanovski","year":"2001","journal-title":"IEEE Trans. Circuits Syst. I"},{"issue":"3","key":"10.1016\/j.image.2019.01.008_b30","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1109\/81.915396","article-title":"Chaos-based random number generators \u2013 part II: practical realization","volume":"48","author":"Stojanovski","year":"2001","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"10.1016\/j.image.2019.01.008_b31","series-title":"Proceedings of the 52nd Annual Allerton Conference on Communication, Control, and Computing","first-page":"1126","article-title":"Fundamental performance limits of chaotic-map random number generators","author":"Beirami","year":"2014"},{"issue":"6","key":"10.1016\/j.image.2019.01.008_b32","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1049\/iet-ifs.2015.0024","article-title":"Hyperchaotic system-based pseudorandom number generator","volume":"10","author":"Liu","year":"2016","journal-title":"IET Inf. Secur."},{"key":"10.1016\/j.image.2019.01.008_b33","unstructured":"The USC-SIPI Image Database, http:\/\/sipi.usc.edu\/database\/."},{"key":"10.1016\/j.image.2019.01.008_b34","first-page":"1","article-title":"Novel image encryption based on quantum walks","volume":"5","author":"Yang","year":"2015","journal-title":"Sci. Rep."},{"key":"10.1016\/j.image.2019.01.008_b35","first-page":"31","article-title":"NPCR And UACI randomness tests for image encryption","author":"Wu","year":"2011","journal-title":"Cyber J.: J. Sci. Technol. J. Sel. Areas Telecommun."},{"issue":"7","key":"10.1016\/j.image.2019.01.008_b36","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1049\/iet-ipr.2017.1016","article-title":"Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain","volume":"12","author":"Kaur","year":"2018","journal-title":"IET Image Process."},{"key":"10.1016\/j.image.2019.01.008_b37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.image.2015.03.005","article-title":"Encryption of medical images based on the cosine number transform","volume":"35","author":"Lima","year":"2015","journal-title":"Signal Process., Image Commun."},{"issue":"10","key":"10.1016\/j.image.2019.01.008_b38","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/TCSI.2015.2468996","article-title":"Real discrete fractional Fourier, Hartley, generalized Fourier and generalized Hartley transforms with many parameters","volume":"62","author":"Hsue","year":"2015","journal-title":"IEEE Trans. Circuits Syst. I. Regul. Pap."},{"issue":"1","key":"10.1016\/j.image.2019.01.008_b39","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1109\/TIP.2016.2623489","article-title":"Steerable discrete cosine transform","volume":"26","author":"Fracastoro","year":"2017","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.image.2019.01.008_b40","series-title":"Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"205","article-title":"Reality preserving fractional transforms","author":"Venturini","year":"2004"}],"container-title":["Signal Processing: Image Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596518308889?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596518308889?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T16:52:49Z","timestamp":1565196769000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0923596518308889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":40,"alternative-id":["S0923596518308889"],"URL":"https:\/\/doi.org\/10.1016\/j.image.2019.01.008","relation":{},"ISSN":["0923-5965"],"issn-type":[{"type":"print","value":"0923-5965"}],"subject":[],"published":{"date-parts":[[2019,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Steerable Fourier number transform with application to image encryption","name":"articletitle","label":"Article Title"},{"value":"Signal Processing: Image Communication","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.image.2019.01.008","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}