Breaking an image encryption scheme based on a spatiotemporal chaotic system. Bechikh, R., Hermassi, H., El-Latif, A. A. A., Rhouma, R., & Belghith, S. Sig. Proc.: Image Comm., 39:151-158, 2015. Link Paper bibtex @article{journals/spic/BechikhHERB15,
added-at = {2015-12-01T00:00:00.000+0100},
author = {Bechikh, Rabei and Hermassi, Houcemeddine and El-Latif, Ahmed A. Abd and Rhouma, Rhouma and Belghith, Safya},
biburl = {http://www.bibsonomy.org/bibtex/2bc31c42e56ab509fcdff204571feb8bd/dblp},
ee = {http://dx.doi.org/10.1016/j.image.2015.09.006},
interhash = {2acf48a93a6cad9a343bee36e166f907},
intrahash = {bc31c42e56ab509fcdff204571feb8bd},
journal = {Sig. Proc.: Image Comm.},
keywords = {dblp},
pages = {151-158},
timestamp = {2015-12-02T11:36:14.000+0100},
title = {Breaking an image encryption scheme based on a spatiotemporal chaotic system.},
url = {http://dblp.uni-trier.de/db/journals/spic/spic39.html#BechikhHERB15},
volume = 39,
year = 2015
}
Downloads: 0
{"_id":"GMEYXJn4b5BHgyMMA","bibbaseid":"bechikh-hermassi-ellatif-rhouma-belghith-breakinganimageencryptionschemebasedonaspatiotemporalchaoticsystem-2015","downloads":0,"creationDate":"2016-02-17T10:30:08.373Z","title":"Breaking an image encryption scheme based on a spatiotemporal chaotic system.","author_short":["Bechikh, R.","Hermassi, H.","El-Latif, A. A. A.","Rhouma, R.","Belghith, S."],"year":2015,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/\"ahmed shamsul arefin\"?items=1000","bibdata":{"bibtype":"article","type":"article","added-at":"2015-12-01T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Bechikh"],"firstnames":["Rabei"],"suffixes":[]},{"propositions":[],"lastnames":["Hermassi"],"firstnames":["Houcemeddine"],"suffixes":[]},{"propositions":[],"lastnames":["El-Latif"],"firstnames":["Ahmed","A.","Abd"],"suffixes":[]},{"propositions":[],"lastnames":["Rhouma"],"firstnames":["Rhouma"],"suffixes":[]},{"propositions":[],"lastnames":["Belghith"],"firstnames":["Safya"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/2bc31c42e56ab509fcdff204571feb8bd/dblp","ee":"http://dx.doi.org/10.1016/j.image.2015.09.006","interhash":"2acf48a93a6cad9a343bee36e166f907","intrahash":"bc31c42e56ab509fcdff204571feb8bd","journal":"Sig. Proc.: Image Comm.","keywords":"dblp","pages":"151-158","timestamp":"2015-12-02T11:36:14.000+0100","title":"Breaking an image encryption scheme based on a spatiotemporal chaotic system.","url":"http://dblp.uni-trier.de/db/journals/spic/spic39.html#BechikhHERB15","volume":"39","year":"2015","bibtex":"@article{journals/spic/BechikhHERB15,\n added-at = {2015-12-01T00:00:00.000+0100},\n author = {Bechikh, Rabei and Hermassi, Houcemeddine and El-Latif, Ahmed A. Abd and Rhouma, Rhouma and Belghith, Safya},\n biburl = {http://www.bibsonomy.org/bibtex/2bc31c42e56ab509fcdff204571feb8bd/dblp},\n ee = {http://dx.doi.org/10.1016/j.image.2015.09.006},\n interhash = {2acf48a93a6cad9a343bee36e166f907},\n intrahash = {bc31c42e56ab509fcdff204571feb8bd},\n journal = {Sig. Proc.: Image Comm.},\n keywords = {dblp},\n pages = {151-158},\n timestamp = {2015-12-02T11:36:14.000+0100},\n title = {Breaking an image encryption scheme based on a spatiotemporal chaotic system.},\n url = {http://dblp.uni-trier.de/db/journals/spic/spic39.html#BechikhHERB15},\n volume = 39,\n year = 2015\n}\n\n","author_short":["Bechikh, R.","Hermassi, H.","El-Latif, A. A. A.","Rhouma, R.","Belghith, S."],"key":"journals/spic/BechikhHERB15","id":"journals/spic/BechikhHERB15","bibbaseid":"bechikh-hermassi-ellatif-rhouma-belghith-breakinganimageencryptionschemebasedonaspatiotemporalchaoticsystem-2015","role":"author","urls":{"Link":"http://dx.doi.org/10.1016/j.image.2015.09.006","Paper":"http://dblp.uni-trier.de/db/journals/spic/spic39.html#BechikhHERB15"},"keyword":["dblp"],"downloads":0},"search_terms":["breaking","image","encryption","scheme","based","spatiotemporal","chaotic","system","bechikh","hermassi","el-latif","rhouma","belghith"],"keywords":["dblp"],"authorIDs":[],"dataSources":["XA98H7MrAfSrDfP6g"]}