{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T04:32:06Z","timestamp":1721968326668},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"National Training Program of Innovation and Entrepreneurship for Undergraduates","award":["201810476007"]},{"name":"Key Program of Higher Education Institutions of Henan Province","award":["18A510014"]},{"DOI":"10.13039\/100009555","name":"Henan Normal University","doi-asserted-by":"publisher","award":["5101119170143"],"id":[{"id":"10.13039\/100009555","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602158"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Research Project of Henan Province","award":["182102210374"]},{"name":"Science Foundation for the Excellent Youth Scholars of Henan Normal University","award":["YQ201607"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2916402","type":"journal-article","created":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T14:42:14Z","timestamp":1558708934000},"page":"63336-63345","source":"Crossref","is-referenced-by-count":19,"title":["Cryptanalysis of an Image Encryption Using 2D Henon-Sine Map and DNA Approach"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3385-8364","authenticated-orcid":false,"given":"Ming","family":"Li","sequence":"first","affiliation":[]},{"given":"Minghui","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jidong","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Haiju","family":"Fan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.08.017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.11.090"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.11.017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.03.011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2008.09.047"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-0750-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0652-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127415501886"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2018.112142439"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-019-04771-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418500104"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2573-x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.68"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-2993-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2019.2900201"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848053"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2010.06.005"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1286","DOI":"10.1109\/TC.2006.157","article-title":"Adaptive data fusion for energy efficient routing in wireless sensor networks","volume":"55","author":"luo","year":"2006","journal-title":"IEEE Trans Comput"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.12.026"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5534-8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2792300"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5159-y"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700592"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883690"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.10.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2867111"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2682561"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1533-8"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.09.029"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.06.008"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08713448.pdf?arnumber=8713448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:54:33Z","timestamp":1642006473000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8713448\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2916402","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}