{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T22:20:12Z","timestamp":1730240412606,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,1]]},"DOI":"10.1109\/icecocs55148.2022.9982938","type":"proceedings-article","created":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T18:57:33Z","timestamp":1671649053000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Two Enhanced Feistel Steps for Medical Image Encryption"],"prefix":"10.1109","author":[{"given":"Abdellah","family":"Abid","sequence":"first","affiliation":[{"name":"Mohamed first University,MATSI Laboratory,Oujda,Morocco"}]},{"given":"Younes","family":"Qobbi","sequence":"additional","affiliation":[{"name":"Mohamed first University,MATSI Laboratory,Oujda,Morocco"}]},{"given":"Abdellhamid","family":"Benazzi","sequence":"additional","affiliation":[{"name":"Mohamed first University,MATSI Laboratory,Oujda,Morocco"}]},{"given":"Mariem","family":"Jarjar","sequence":"additional","affiliation":[{"name":"Mohamed first University,MATSI Laboratory,Oujda,Morocco"}]},{"given":"Abdellatif","family":"Jarjar","sequence":"additional","affiliation":[{"name":"Hight School Moulay Rachid,Taza,Morocco"}]}],"member":"263","reference":[{"issue":"3","key":"ref1","article-title":"Improvement of hill sclassical method in image cryptography","volume":"2","author":"Jarjar","year":"2017","journal-title":"International Journal of Statistics and Applied Mathematics"},{"article-title":"cryptanalyse of Hill cipher using genetic algorithm","volume-title":"dalam IEEE hanmument","author":"alkhalid","key":"ref2"},{"issue":"24","key":"ref3","article-title":"ENCRYPT AND DECRYPT IMAGE USING VIGENERE CIPHER","volume":"118","author":"Reddy","year":"2018","journal-title":"International Journal of Pure and Applied Mathematics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-6893-4_72"},{"issue":"80","key":"ref5","first-page":"10","article-title":"Shams Mahmoud Abd Ali \u00bb Novel Encryption Algorithm for Securing Sensitive Information Based on Feistel Cipher\"","volume":"19","year":"2019","journal-title":"Test engeenering managenment"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2018.2859257"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-019-1305-7"},{"issue":"80","key":"ref8","first-page":"10","article-title":"Novel encryption algorithm for securing sensitive information based on feistel cipher","volume":"19","author":"Abd Ali","year":"2019","journal-title":"Test Engeenering Managenment"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927415"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7453-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09533-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2018.2859257"}],"event":{"name":"2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS)","start":{"date-parts":[[2022,12,1]]},"location":"Fez, Morocco","end":{"date-parts":[[2022,12,2]]}},"container-title":["2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9982722\/9982807\/09982938.pdf?arnumber=9982938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T05:43:18Z","timestamp":1706766198000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9982938\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,1]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icecocs55148.2022.9982938","relation":{},"subject":[],"published":{"date-parts":[[2022,12,1]]}}}