{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T18:52:32Z","timestamp":1724352752317},"reference-count":13,"publisher":"Korea Multimedia Society - English Version Journal","issue":"2","license":[{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["www.jmis.org"],"crossmark-restriction":true},"short-container-title":["J Multimed Inf Syst"],"DOI":"10.33851\/jmis.2021.8.2.131","type":"journal-article","created":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T08:58:31Z","timestamp":1625561911000},"page":"131-142","update-policy":"http:\/\/dx.doi.org\/10.33851\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["New chaotic map development and its application in encrypted color\n image"],"prefix":"10.33851","volume":"8","author":[{"given":"Abdellatif","family":"JarJar","sequence":"first","affiliation":[]}],"member":"19702","published-online":{"date-parts":[[2021,6,30]]},"reference":[{"key":"key2.0210706112342e+13_B1","doi-asserted-by":"crossref","unstructured":"G\u00fcnyaz Ablay, \u201cChaotic Map Construction from Common\n Nonlinearities and Microcontroller Implementations,\u201d\n International Journal of Bifurcation and Chaos, vol. 26,\n no. 7. 2016. 10.1142\/S0218127416501212","DOI":"10.1142\/S0218127416501212"},{"key":"key2.0210706112342e+13_B2","doi-asserted-by":"crossref","unstructured":"Kwok-Wo Wong, Xiao feng Liao, Yong Wang, Degang Yang,\n \u201cOne-way hash function construction based on chaotic map network,\u201d\n Chaos, Solitons & Fractals, vol. 41, no. 5, pp.\n 2566-2574, 2009. 10.1016\/j.chaos.2008.09.056","DOI":"10.1016\/j.chaos.2008.09.056"},{"key":"key2.0210706112342e+13_B3","doi-asserted-by":"crossref","unstructured":"Yantao Li, Shao jiang Deng, and Di Xiao \u201cA novel Hash\n algorithm construction based on chaotic neural network,\u201d Neural\n Computing and Applications, vol. 20, pp. 133-141, 2011. 10.1007\/s00521-010-0432-2","DOI":"10.1007\/s00521-010-0432-2"},{"key":"key2.0210706112342e+13_B4","doi-asserted-by":"crossref","unstructured":"Nicolas Bierne, John, Welch , Etienne Loire , Fran\u00e7ois\n Bonhomme, and Patrice david, \u201cThe coupling hypothesis: why genome scans\n may fail to map local adaptation genes,\u201d Molecular\n Ecology, vol. 20, no. 11, pp. 2044\u20132072, 2011. 10.1111\/j.1365-294X.2011.05080.x\n 21476991","DOI":"10.1111\/j.1365-294X.2011.05080.x"},{"key":"key2.0210706112342e+13_B5","doi-asserted-by":"crossref","unstructured":"Jacques Patarin, \u201cSecurity of Random Feistel Schemes with 5\n or More Rounds,\u201d in Proceeding of Annual International Cryptology\n Conference, pp 106-122, 2004. 10.1007\/978-3-540-28628-8_7","DOI":"10.1007\/978-3-540-28628-8_7"},{"key":"key2.0210706112342e+13_B6","doi-asserted-by":"crossref","unstructured":"Sahar Mazloom, Amir Masud, and Eftekhari-Moghadam, \u201cColor\n image encryption based on Coupled Nonlinear Chaotic Map,\u201d Chaos,\n Solitons & Fractals, vol. 42, no. 3, pp. 1745-1754. 2009.\n 10.1016\/j.chaos.2009.03.084","DOI":"10.1016\/j.chaos.2009.03.084"},{"key":"key2.0210706112342e+13_B7","doi-asserted-by":"crossref","unstructured":"Xiao Feng, Xiaolin Tian, and Shaowe iXia, \u201cAn Improved Image\n Scrambling Algorithm Based On Magic Cube Rotation and Chaotic Sequences,\u201d\n in Proceeding of IEEE the 4-th International Congress on Image and\n Signal Processing, pp.1021-1024, 2011 10.1109\/CISP.2011.6100274","DOI":"10.1109\/CISP.2011.6100274"},{"key":"key2.0210706112342e+13_B8","doi-asserted-by":"crossref","unstructured":"Hraoui S., Gmira F., Jarar A. O., Satori. K., Saaidi A.,\n \u201cBenchmarking AES and chaos based logistic map for image\n encryption,\u201d in Proceeding of International Conference on\n Computer Systems and Applications (AICCSA), pp. 1-4, 2013. 10.1109\/AICCSA.2013.6616441","DOI":"10.1109\/AICCSA.2013.6616441"},{"key":"key2.0210706112342e+13_B9","unstructured":"A. Jarjar, \u201cImprovement of hill\u2019s classical method in\n image cryptography,\u201d International Journal of Statistics and\n Applied Mathematics, vol. 2, no. 3, Part A, 2017."},{"key":"key2.0210706112342e+13_B10","doi-asserted-by":"crossref","unstructured":"A. N. Pisarchik, N. J. Flores-Carmona, and M. Carpio-Valadez,\n \u201cEncryption and decryption of images with chaotic map lattices,\u201d\n AIP Chaos, vol. 16, 033118 (2006) 10.1063\/1.2242052\n 17014223","DOI":"10.1063\/1.2242052"},{"key":"key2.0210706112342e+13_B11","doi-asserted-by":"crossref","unstructured":"Noshadian S., Ebrahimzade A., and Kazemitabar S. J.,\n \u201cBreaking a chaotic image encryption algorithm,\u201d\n Multimedia Tools and Applications, vol. 79, no. 35, pp.\n 25635-25655, 2020. 10.1007\/s11042-020-09233-6","DOI":"10.1007\/s11042-020-09233-6"},{"key":"key2.0210706112342e+13_B12","doi-asserted-by":"crossref","unstructured":"Niu Y., Zhou Z., and Zhang X., \u201cAn image encryption approach\n based on chaotic maps and genetic operations,\u201d Multimedia Tools\n and Applications, vol. 79, no. 35, pp. 25613-25633, 2020. 10.1007\/s11042-020-09237-2","DOI":"10.1007\/s11042-020-09237-2"},{"key":"key2.0210706112342e+13_B13","doi-asserted-by":"crossref","unstructured":"Ghazvini M., Mirzadi M., and Parvar N., \u201cA modified method\n for image encryption based on chaotic map and genetic algorithm,\u201d\n Multimedia Tools and Applications, vol. 79, no. 37, pp.\n 26927-26950, 2020. 10.1007\/s11042-020-09058-3","DOI":"10.1007\/s11042-020-09058-3"}],"container-title":["Journal of Multimedia Information System"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jmis.org\/download\/download_pdf?doi=10.33851\/JMIS.2021.8.2.131","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.jmis.org\/download\/download_pdf?doi=10.33851\/JMIS.2021.8.2.131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T09:30:21Z","timestamp":1625563821000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jmis.org\/archive\/view_article?doi=10.33851\/JMIS.2021.8.2.131"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,30]]},"references-count":13,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2021,6,30]]}},"alternative-id":["10.33851\/JMIS.2021.8.2.131"],"URL":"https:\/\/doi.org\/10.33851\/jmis.2021.8.2.131","relation":{},"ISSN":["2383-7632"],"issn-type":[{"value":"2383-7632","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,30]]},"assertion":[{"value":"2021-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-15","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}}]}}