{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:58:46Z","timestamp":1723017526618},"reference-count":16,"publisher":"Korea Multimedia Society - English Version Journal","issue":"1","license":[{"start":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T00:00:00Z","timestamp":1617148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["www.jmis.org"],"crossmark-restriction":true},"short-container-title":["J Multimed Inf Syst"],"DOI":"10.33851\/jmis.2021.8.1.45","type":"journal-article","created":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T01:27:11Z","timestamp":1618363631000},"page":"45-56","update-policy":"http:\/\/dx.doi.org\/10.33851\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Development of Standard Hill Technology for Image Encryption over a\n 256-element Body"],"prefix":"10.33851","volume":"8","author":[{"given":"Abdellatif","family":"JarJar","sequence":"first","affiliation":[]}],"member":"19702","published-online":{"date-parts":[[2021,3,31]]},"reference":[{"key":"key2.0210414031753e+13_B1","doi-asserted-by":"crossref","unstructured":"Y. P. K. Nkandeu, A. Tiedeu, and Hill L., \u201cCryptography in an\n algebraic alphabet,\u201d American Mathematical Monthly, vol.\n 1929, no. 36, pp. 306-312, 2019. 10.1080\/00029890.1929.11986963","DOI":"10.1080\/00029890.1929.11986963"},{"key":"key2.0210414031753e+13_B2","doi-asserted-by":"crossref","unstructured":"Y.P.K. Nkandeu and A. Tiedeu, \u201cAn image encryption algorithm\n based on substitution technique and chaos mixing,\u201d Multimedia\n Tools and Applications, vol. 78, no. 8, pp. 10013-10034, 2019.\n 10.1007\/s11042-018-6612-2","DOI":"10.1007\/s11042-018-6612-2"},{"key":"key2.0210414031753e+13_B3","unstructured":"A. Jarjar, \u201cImprovement of hill\u2019s classical method in\n image cryptography,\u201d International Journal of statistics and\n Applied Mathematics, vol. 2, no. 3, Part A, 2017."},{"key":"key2.0210414031753e+13_B4","doi-asserted-by":"crossref","unstructured":"Lin CH, Lee CY, Lee C. Y., \u201cComments on Saeednia\u2019s\n improved scheme for the Hill cipher,\u201d Journal of the Chinese\n Institute of Engineers, vol. 27, no. 5, pp. 743-746, 2004. 10.1080\/02533839.2004.9670922","DOI":"10.1080\/02533839.2004.9670922"},{"key":"key2.0210414031753e+13_B5","unstructured":"Bibhudendra Acharya1, Saroj Kumar Panigrahy, Sarat Kumar Patra, and\n Ganapati Panda, \u201cImage encryption using advanced Hill cipher\n algorithm,\u201d International Journal of Recent Trends in Engineering\n and Technology, vol. 1, no. 1, 2009."},{"key":"key2.0210414031753e+13_B6","doi-asserted-by":"crossref","unstructured":"C. Fu, G. Y. Zhang, M. Zhu, Z. Chen, and W. M. Lei, \u201cA new\n chaos-based color image encryption scheme with an efficient substitution\n keystream generation strategy,\u201d Security and Communication\n Networks, vol. 2018, pp. 1-13, 2018. 10.1155\/2018\/2708532","DOI":"10.1155\/2018\/2708532"},{"key":"key2.0210414031753e+13_B7","doi-asserted-by":"crossref","unstructured":"Chang\u2019e Dong, \u201cColor image encryption using one-time\n keys and couple chaotic systems,\u201d Signal Processing: image\n Communication, vol. 29, no. 5, pp. 628-640, 2014. 10.1016\/j.image.2013.09.006","DOI":"10.1016\/j.image.2013.09.006"},{"key":"key2.0210414031753e+13_B8","doi-asserted-by":"crossref","unstructured":"Xing-Yuan Wang, Sheng-Xian Gu, and Ying-Qian Zhang, \u201cNovel\n image encryption algorithm based on cycle shift and chaotic system,\u201d\n Optics and Lasers in Engineering, vol. 68, pp. 126-134,\n 2015. 10.1016\/j.optlaseng.2014.12.025","DOI":"10.1016\/j.optlaseng.2014.12.025"},{"key":"key2.0210414031753e+13_B9","doi-asserted-by":"crossref","unstructured":"Abdellatif JarJar, \u201cImprovement of Feistel method and the new\n encryption scheme,\u201d Optik, vol. 157, pp. 1319-1324,\n 2018. 10.1016\/j.ijleo.2017.12.065","DOI":"10.1016\/j.ijleo.2017.12.065"},{"key":"key2.0210414031753e+13_B10","doi-asserted-by":"crossref","unstructured":"S. Hraoui, F. Gmira, A. O. Jarar, K. Satori, A. Saaidi,\n \u201cBenchmarking AES and chaos based logistic map for image\n encryption,\u201d in Proceeding of ACS International Conference\n Computer Systems and Applications (AICCSA), 2013. 10.1109\/AICCSA.2013.6616441","DOI":"10.1109\/AICCSA.2013.6616441"},{"key":"key2.0210414031753e+13_B11","doi-asserted-by":"crossref","unstructured":"M. Essaid, I. Akharraz, and A. Saaidi, \u201cImage encryption\n scheme based on a new secure variant of Hill cipher and 1D chaotic maps,\u201d\n Journal of Information Security and Applications, vol. 47,\n pp. 173-187, 2019. 10.1016\/j.jisa.2019.05.006","DOI":"10.1016\/j.jisa.2019.05.006"},{"key":"key2.0210414031753e+13_B12","doi-asserted-by":"crossref","unstructured":"Pand uranga and S. Naveen Kumar, \u201cAdvanced partial image\n encryption using two-stage Hill cipher technique,\u201d International\n Journal of Computer Applications, vol. 60, no.16, pp. 14-19, 2012.\n 10.5120\/9775-4341","DOI":"10.5120\/9775-4341"},{"key":"key2.0210414031753e+13_B13","doi-asserted-by":"crossref","unstructured":"Rifaat Zaidan Khalaf and Alharith Abdulkareem Abdullah,\n \u201cNovel quantum encryption algorithm based on multiqubit quantum shift\n register and Hill cipher,\u201d Advances in High Energy\n Physics, vol. 2014, Article ID 104325, pp. 1-5, 2014. 10.1155\/2014\/104325","DOI":"10.1155\/2014\/104325"},{"key":"key2.0210414031753e+13_B14","doi-asserted-by":"crossref","unstructured":"Rajwant Kaur, S. A. Khan, and Simranjit Kaur, \u201cAn efficient\n image encryption using DNA cryptography and reversible cellular\n automata,\u201d International Journal of Computer\n Applications, vol. 182, no. 24, pp. 32-38, 2018. 10.5120\/ijca2018918018","DOI":"10.5120\/ijca2018918018"},{"key":"key2.0210414031753e+13_B15","doi-asserted-by":"crossref","unstructured":"Yong Wang, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang, and Guanrong\n Chen, \u201cA chaos-based image encryption algorithm with variable control\n parameters,\u201d Chaos, Solitons & Fractals, vol. 41,\n no. 4, pp. 1773-1783, 2009. 10.1016\/j.chaos.2008.07.031","DOI":"10.1016\/j.chaos.2008.07.031"},{"key":"key2.0210414031753e+13_B16","doi-asserted-by":"crossref","unstructured":"Jan Sher Khan and J. Ahmad, \u201cChaos based efficient selective\n image encryption\u201d Multidimensional Systems and Signal\n Processing, vol. 30, pp. 943\u2013961, 2019. 10.1007\/s11045-018-0589-x","DOI":"10.1007\/s11045-018-0589-x"}],"container-title":["Journal of Multimedia Information System"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jmis.org\/download\/download_pdf?doi=10.33851\/JMIS.2021.8.1.45","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.jmis.org\/download\/download_pdf?doi=10.33851\/JMIS.2021.8.1.45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T01:32:10Z","timestamp":1618363930000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jmis.org\/archive\/view_article?doi=10.33851\/JMIS.2021.8.1.45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,31]]},"references-count":16,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,3,31]]}},"alternative-id":["10.33851\/JMIS.2021.8.1.45"],"URL":"https:\/\/doi.org\/10.33851\/jmis.2021.8.1.45","relation":{},"ISSN":["2383-7632"],"issn-type":[{"value":"2383-7632","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,31]]},"assertion":[{"value":"2021-01-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-22","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}}]}}