{"id":"https://openalex.org/W1485205250","doi":"https://doi.org/10.1007/978-3-642-10707-8_9","title":"Cryptography Based on Spatiotemporal Chaotic Systems","display_name":"Cryptography Based on Spatiotemporal Chaotic Systems","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1485205250","doi":"https://doi.org/10.1007/978-3-642-10707-8_9","mag":"1485205250"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-10707-8_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-10707-8_9","pdf_url":null,"source":{"id":"https://openalex.org/S2764461748","display_name":"Studies in computational intelligence","issn_l":"1860-949X","issn":["1860-949X","1860-9503"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Studies in Computational Intelligence","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100741315","display_name":"Ping Li","orcid":"https://orcid.org/0000-0002-8515-7773"},"institutions":[{"id":"https://openalex.org/I4210120302","display_name":"Shunde Polytechnic","ror":"https://ror.org/01w9d4603","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210120302"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ping Li","raw_affiliation_strings":["Department of Electronic Engineering, Shunde Polytechnic, Kanton, P.R. China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, Shunde Polytechnic, Kanton, P.R. China","institution_ids":["https://openalex.org/I4210120302"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100428644","display_name":"Zhong Li","orcid":"https://orcid.org/0000-0002-3443-0557"},"institutions":[{"id":"https://openalex.org/I120691247","display_name":"University of Hagen","ror":"https://ror.org/04tkkr536","country_code":"DE","type":"education","lineage":["https://openalex.org/I120691247"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Zhong Li","raw_affiliation_strings":["Faculty of Electrical and Computer Engineering, FernUniversit\u00e4t in Hagen, 58084, Hagen, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical and Computer Engineering, FernUniversit\u00e4t in Hagen, 58084, Hagen, Germany","institution_ids":["https://openalex.org/I120691247"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111904225","display_name":"Wolfgang A. Halang","orcid":null},"institutions":[{"id":"https://openalex.org/I120691247","display_name":"University of Hagen","ror":"https://ror.org/04tkkr536","country_code":"DE","type":"education","lineage":["https://openalex.org/I120691247"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Wolfgang A. Halang","raw_affiliation_strings":["Faculty of Electrical and Computer Engineering, FernUniversit\u00e4t in Hagen, 58084, Hagen, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical and Computer Engineering, FernUniversit\u00e4t in Hagen, 58084, Hagen, Germany","institution_ids":["https://openalex.org/I120691247"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024633466","display_name":"Guanrong Chen","orcid":"https://orcid.org/0000-0003-1381-7418"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Guanrong Chen","raw_affiliation_strings":["Department of Electronic Engineering, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon, Hong Kong SAR P. R. China","Department of Electronic Engineering, City University of Hong Kong, Kowloon, Hong Kong SAR, P.R. China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon, Hong Kong SAR P. R. China","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Electronic Engineering, City University of Hong Kong, Kowloon, Hong Kong SAR, P.R. China","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100741315"],"corresponding_institution_ids":["https://openalex.org/I4210120302"],"apc_list":null,"apc_paid":null,"fwci":0.2578,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.48826861,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"293","last_page":"328"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10588","display_name":"Mathematical Dynamics and Fractals","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.8499917984008789},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7722421288490295},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.6623395085334778},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6318272352218628},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.6208249926567078},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5708636045455933},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5092827081680298},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4810912311077118},{"id":"https://openalex.org/keywords/chaos","display_name":"CHAOS (operating system)","score":0.4468369483947754},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4233569800853729},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.4178262948989868},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3878802955150604},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3139963150024414},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.20158934593200684},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18814954161643982},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12087705731391907}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.8499917984008789},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7722421288490295},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.6623395085334778},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6318272352218628},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.6208249926567078},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5708636045455933},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5092827081680298},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4810912311077118},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.4468369483947754},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4233569800853729},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.4178262948989868},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3878802955150604},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3139963150024414},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.20158934593200684},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18814954161643982},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12087705731391907}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-10707-8_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-10707-8_9","pdf_url":null,"source":{"id":"https://openalex.org/S2764461748","display_name":"Studies in computational intelligence","issn_l":"1860-949X","issn":["1860-949X","1860-9503"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Studies in Computational Intelligence","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5799999833106995,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W25360022","https://openalex.org/W234899517","https://openalex.org/W1493193822","https://openalex.org/W1585665690","https://openalex.org/W1591497913","https://openalex.org/W1660562555","https://openalex.org/W1761845828","https://openalex.org/W1954024722","https://openalex.org/W1966708715","https://openalex.org/W1973990085","https://openalex.org/W1976787861","https://openalex.org/W1993075183","https://openalex.org/W1993919709","https://openalex.org/W2015304581","https://openalex.org/W2020039621","https://openalex.org/W2047172112","https://openalex.org/W2053111047","https://openalex.org/W2054870387","https://openalex.org/W2065249519","https://openalex.org/W2072019349","https://openalex.org/W2076301778","https://openalex.org/W2081024858","https://openalex.org/W2088531271","https://openalex.org/W2089338971","https://openalex.org/W2125556710","https://openalex.org/W2166934960","https://openalex.org/W2171803333","https://openalex.org/W2285911715","https://openalex.org/W2491924997","https://openalex.org/W2953085256","https://openalex.org/W2970323723","https://openalex.org/W2998836978","https://openalex.org/W3098349634","https://openalex.org/W4234332205","https://openalex.org/W4285719527","https://openalex.org/W4289126832"],"related_works":["https://openalex.org/W2027144135","https://openalex.org/W2239154762","https://openalex.org/W2184889926","https://openalex.org/W2950447949","https://openalex.org/W1784733384","https://openalex.org/W2615464719","https://openalex.org/W2157451614","https://openalex.org/W2483202600","https://openalex.org/W2391794278","https://openalex.org/W571790067"],"abstract_inverted_index":null,"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
