{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T06:51:39Z","timestamp":1759042299248},"reference-count":38,"publisher":"Elsevier BV","issue":"1-3","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61173178","61302161","61472464","61462032"],"award-info":[{"award-number":["61173178","61302161","61472464","61462032"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chongqing Key Laboratory of Emergency Communications","award":["CQKLEC, 20140504"],"award-info":[{"award-number":["CQKLEC, 20140504"]}]},{"name":"Fundamental Research Funds","award":["106112013CDJZR180005","106112014CDJZR185501"],"award-info":[{"award-number":["106112013CDJZR180005","106112014CDJZR185501"]}]},{"DOI":"10.13039\/501100012459","name":"Chongqing Graduate Student Research Innovation Project","doi-asserted-by":"crossref","award":["CYB14002"],"award-info":[{"award-number":["CYB14002"]}],"id":[{"id":"10.13039\/501100012459","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Communications in Nonlinear Science and Numerical Simulation"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1016\/j.cnsns.2015.02.025","type":"journal-article","created":{"date-parts":[[2015,3,6]],"date-time":"2015-03-06T16:32:58Z","timestamp":1425659578000},"page":"22-29","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":14,"title":["Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register"],"prefix":"10.1016","volume":"27","author":[{"given":"Yushu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Di","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Wenying","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Nan","sequence":"additional","affiliation":[]},{"given":"Moting","family":"Su","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.cnsns.2015.02.025_b0005","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1109\/TCOM.1981.1095052","article-title":"Compression of black\u2013white images with arithmetic coding","volume":"29","author":"Langdon","year":"1981","journal-title":"IEEE Trans Commun"},{"issue":"6","key":"10.1016\/j.cnsns.2015.02.025_b0010","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1145\/214762.214771","article-title":"Arithmetic coding for data compression","volume":"30","author":"Witten","year":"1987","journal-title":"Commun ACM"},{"issue":"5","key":"10.1016\/j.cnsns.2015.02.025_b0015","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/79.952804","article-title":"The jpeg 2000 still image compression standard","volume":"18","author":"Skodras","year":"2001","journal-title":"IEEE Signal Processing Mag"},{"issue":"7","key":"10.1016\/j.cnsns.2015.02.025_b0020","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","article-title":"Overview of the H.264\/AVC video coding standard","volume":"13","author":"Wiegand","year":"2003","journal-title":"IEEE Trans Circuits Syst Video Tech"},{"issue":"4","key":"10.1016\/j.cnsns.2015.02.025_b0025","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/0167-4048(88)90580-9","article-title":"On the privacy afforded by adaptive text compression","volume":"7","author":"Witten","year":"1988","journal-title":"Comput Secur"},{"issue":"2","key":"10.1016\/j.cnsns.2015.02.025_b0030","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/0167-4048(95)97050-K","article-title":"On the insecurity of arithmetic coding","volume":"14","author":"Cleary","year":"1995","journal-title":"Comput Secur"},{"issue":"5","key":"10.1016\/j.cnsns.2015.02.025_b0035","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/0167-4048(92)90011-F","article-title":"Data security in a fixed-model arithmetic coding compression algorithm","volume":"11","author":"Bergen","year":"1992","journal-title":"Comput Secur"},{"issue":"2","key":"10.1016\/j.cnsns.2015.02.025_b0040","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/0167-4048(93)90099-Q","article-title":"A chosen plaintext attack on an adaptive arithmetic coding compression algorithm","volume":"12","author":"Bergen","year":"1993","journal-title":"Comput Secur"},{"key":"10.1016\/j.cnsns.2015.02.025_b0045","series-title":"Proceedings of the twenty-ninth southeastern symposium on system theory","first-page":"266","article-title":"A methodology for performing secure data compression","author":"Barbir","year":"1997"},{"key":"10.1016\/j.cnsns.2015.02.025_b0050","first-page":"545","article-title":"Resynchronization properties of arithmetic coding","volume":"vol. 2","author":"Moo","year":"1999"},{"key":"10.1016\/j.cnsns.2015.02.025_b0055","first-page":"908","article-title":"Joint image\/video compression and encryption via high-order conditional entropy coding of wavelet coefficients","volume":"vol. 2","author":"Wu","year":"1999"},{"key":"10.1016\/j.cnsns.2015.02.025_b0060","series-title":"Cryptography and coding","first-page":"84","article-title":"A unified code","author":"Liu","year":"1999"},{"issue":"5","key":"10.1016\/j.cnsns.2015.02.025_b0065","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TMM.2006.879919","article-title":"Multimedia selective encryption by means of randomized arithmetic coding","volume":"8","author":"Grangetto","year":"2006","journal-title":"IEEE Trans Multimedia"},{"issue":"2","key":"10.1016\/j.cnsns.2015.02.025_b0070","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/LSP.2005.861589","article-title":"Binary arithmetic coding with key-based interval splitting","volume":"13","author":"Wen","year":"2006","journal-title":"IEEE Signal Processing Lett"},{"issue":"5","key":"10.1016\/j.cnsns.2015.02.025_b0075","doi-asserted-by":"crossref","first-page":"2263","DOI":"10.1109\/TSP.2007.892710","article-title":"Secure arithmetic coding","volume":"55","author":"Kim","year":"2007","journal-title":"IEEE Trans Signal Processing"},{"issue":"3","key":"10.1016\/j.cnsns.2015.02.025_b0080","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1109\/TMM.2008.917355","article-title":"Cryptanalysis of some multimedia encryption schemes","volume":"10","author":"Jakimoski","year":"2008","journal-title":"IEEE Trans Multimedia"},{"issue":"1","key":"10.1016\/j.cnsns.2015.02.025_b0085","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/TIFS.2010.2096809","article-title":"On the security of randomized arithmetic codes against ciphertext-only attacks","volume":"6","author":"Katti","year":"2011","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"10.1016\/j.cnsns.2015.02.025_b0090","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.1109\/TSP.2009.2013901","article-title":"Adaptive chosen-ciphertext attack on secure arithmetic coding","volume":"57","author":"Zhou","year":"2009","journal-title":"IEEE Trans Signal Processing"},{"issue":"4","key":"10.1016\/j.cnsns.2015.02.025_b0095","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/TIFS.2009.2031944","article-title":"On the security of the secure arithmetic code","volume":"4","author":"Sun","year":"2009","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"10.1016\/j.cnsns.2015.02.025_b0100","doi-asserted-by":"crossref","first-page":"895","DOI":"10.1109\/TIFS.2012.2187514","article-title":"On the security of key-based interval splitting arithmetic coding with respect to message indistinguishability","volume":"7","author":"Katti","year":"2012","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"10.1016\/j.cnsns.2015.02.025_b0105","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","article-title":"An image encryption scheme based on rotation matrix bit-level permutation and block diffusion","volume":"19","author":"Zhang","year":"2014","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"3","key":"10.1016\/j.cnsns.2015.02.025_b0110","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.cnsns.2012.08.010","article-title":"A symmetric color image encryption algorithm using the intrinsic features of bit distributions","volume":"18","author":"Zhang","year":"2013","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"6","key":"10.1016\/j.cnsns.2015.02.025_b0115","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1016\/j.physleta.2005.09.060","article-title":"A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map","volume":"349","author":"Li","year":"2006","journal-title":"Phys Lett A"},{"issue":"8","key":"10.1016\/j.cnsns.2015.02.025_b0120","doi-asserted-by":"crossref","first-page":"5092","DOI":"10.1016\/j.asoc.2011.05.050","article-title":"A chaos-based joint image compression and encryption scheme using DCT and SHA-1","volume":"11","author":"Yuen","year":"2011","journal-title":"Appl Soft Comput"},{"issue":"1","key":"10.1016\/j.cnsns.2015.02.025_b0125","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.asoc.2011.09.003","article-title":"Chaos-based joint compression and encryption algorithm for generating variable length ciphertext","volume":"12","author":"Lui","year":"2012","journal-title":"Appl Soft Comput"},{"issue":"9","key":"10.1016\/j.cnsns.2015.02.025_b0130","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","article-title":"A novel image encryption algorithm based on self-adaptive wave transmission","volume":"90","author":"Liao","year":"2010","journal-title":"Signal Processing"},{"issue":"15","key":"10.1016\/j.cnsns.2015.02.025_b0135","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","article-title":"A fast image encryption scheme based on chaotic standard map","volume":"372","author":"Wong","year":"2008","journal-title":"Phys Lett A"},{"issue":"1","key":"10.1016\/j.cnsns.2015.02.025_b0140","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","article-title":"A new chaos-based fast image encryption algorithm","volume":"11","author":"Wang","year":"2011","journal-title":"Appl Soft Comput"},{"issue":"2","key":"10.1016\/j.cnsns.2015.02.025_b0145","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/TCSII.2010.2040315","article-title":"Simultaneous arithmetic coding and encryption using chaotic maps","volume":"57","author":"Wong","year":"2010","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"10","key":"10.1016\/j.cnsns.2015.02.025_b0150","doi-asserted-by":"crossref","first-page":"1250256","DOI":"10.1142\/S0218127412502562","article-title":"Generalized arithmetic coding using discrete chaotic maps","volume":"22","author":"Lin","year":"2012","journal-title":"Int J Bifur Chaos"},{"issue":"4","key":"10.1016\/j.cnsns.2015.02.025_b0155","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1109\/TCSI.2005.859617","article-title":"A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system","volume":"53","author":"Bose","year":"2006","journal-title":"IEEE Trans Circuits Syst I Regular Pap"},{"issue":"5","key":"10.1016\/j.cnsns.2015.02.025_b0160","doi-asserted-by":"crossref","first-page":"1523","DOI":"10.1016\/j.chaos.2007.01.133","article-title":"A novel chaotic encryption scheme based on arithmetic coding","volume":"38","author":"Mi","year":"2008","journal-title":"Chaos Solitons Fractals"},{"issue":"12","key":"10.1016\/j.cnsns.2015.02.025_b0165","doi-asserted-by":"crossref","first-page":"4304","DOI":"10.1016\/j.cnsns.2009.03.003","article-title":"A secure and efficient entropy coding based on arithmetic coding","volume":"14","author":"Li","year":"2009","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"10.1016\/j.cnsns.2015.02.025_b0170","first-page":"170","article-title":"A new joint lossless compression and encryption scheme combining a binary arithmetic coding with a pseudo random bit generator","volume":"8","author":"Masmoudi","year":"2010","journal-title":"Int J Comput Sci Inf Secur"},{"issue":"55","key":"10.1016\/j.cnsns.2015.02.025_b0175","doi-asserted-by":"crossref","first-page":"3368","DOI":"10.1109\/TCSI.2008.924117","article-title":"Comments on a novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system","volume":"10","author":"Zhou","year":"2008","journal-title":"IEEE Trans. on Circuits Syst"},{"issue":"12","key":"10.1016\/j.cnsns.2015.02.025_b0180","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1109\/TCSII.2010.2083170","article-title":"Randomness enhancement using digitalized modified logistic map","volume":"57","author":"Chen","year":"2010","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"9","key":"10.1016\/j.cnsns.2015.02.025_b0185","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1049\/el:19980680","article-title":"Perturbance-based algorithm to expand cycle length of chaotic key stream","volume":"34","author":"Sang","year":"1998","journal-title":"Electron Lett"},{"issue":"2","key":"10.1016\/j.cnsns.2015.02.025_b0190","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1016\/j.jss.2011.08.032","article-title":"Collision-based flexible image encryption algorithm","volume":"85","author":"Zhou","year":"2012","journal-title":"J Syst Softw"}],"container-title":["Communications in Nonlinear Science and Numerical Simulation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1007570415000726?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1007570415000726?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T00:52:20Z","timestamp":1589503940000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1007570415000726"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":38,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["S1007570415000726"],"URL":"https:\/\/doi.org\/10.1016\/j.cnsns.2015.02.025","relation":{},"ISSN":["1007-5704"],"issn-type":[{"value":"1007-5704","type":"print"}],"subject":[],"published":{"date-parts":[[2015,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register","name":"articletitle","label":"Article Title"},{"value":"Communications in Nonlinear Science and Numerical Simulation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cnsns.2015.02.025","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}