An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function

A Unique chaotic image encryption on the basis of Enhanced Thorp shuffle and Zig-zag Scan based Convolution (ETS-ZSC) is proposed in this paper. A one-dimensional chaotic map is utilized for both shuffling the plain image and producing the critical grid for the convolution activity. The substitution...

Full description

Saved in:
Bibliographic Details
Published inApplied intelligence (Dordrecht, Netherlands) Vol. 52; no. 3; pp. 2556 - 2585
Main Authors Kumar, C. Madan, Vidhya, R., Brindha, M.
Format Journal Article
LanguageEnglish
Published New York Springer US 01.02.2022
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0924-669X
1573-7497
DOI10.1007/s10489-021-02508-x

Cover

Abstract A Unique chaotic image encryption on the basis of Enhanced Thorp shuffle and Zig-zag Scan based Convolution (ETS-ZSC) is proposed in this paper. A one-dimensional chaotic map is utilized for both shuffling the plain image and producing the critical grid for the convolution activity. The substitution operation is performed in two ways: forward substitution and reverse substitution with zigzag scan. The original seed of the logistic map is created from the hyper chaotic system by matching with the plain image to overcome the differential attacks. The security analyzes are held for the proposed method to prove safe against the chosen plain text/known plain text attack. From the simulations results, it is observed that the proposed methodology is having enough high key sensitivity, key space, good randomness, and equal sharing of pixels in cipher image.
AbstractList A Unique chaotic image encryption on the basis of Enhanced Thorp shuffle and Zig-zag Scan based Convolution (ETS-ZSC) is proposed in this paper. A one-dimensional chaotic map is utilized for both shuffling the plain image and producing the critical grid for the convolution activity. The substitution operation is performed in two ways: forward substitution and reverse substitution with zigzag scan. The original seed of the logistic map is created from the hyper chaotic system by matching with the plain image to overcome the differential attacks. The security analyzes are held for the proposed method to prove safe against the chosen plain text/known plain text attack. From the simulations results, it is observed that the proposed methodology is having enough high key sensitivity, key space, good randomness, and equal sharing of pixels in cipher image.
Author Brindha, M.
Kumar, C. Madan
Vidhya, R.
Author_xml – sequence: 1
  givenname: C. Madan
  surname: Kumar
  fullname: Kumar, C. Madan
  organization: Department of Computer Science and Engineering, National Institute of Technology
– sequence: 2
  givenname: R.
  surname: Vidhya
  fullname: Vidhya, R.
  organization: Department of Computer Science and Engineering, National Institute of Technology
– sequence: 3
  givenname: M.
  surname: Brindha
  fullname: Brindha, M.
  email: brindham@nitt.edu
  organization: Department of Computer Science and Engineering, National Institute of Technology
BookMark eNp9kE1rGzEQhkVIIM7HH8hJkPM2o4_Vao_GtE3A0EsLvQmtLHkVNpIjaUvy7yvbgUAOPgiJ0fvMDM8VOg8xWITuCHwjAN1DJsBl3wAl9bQgm7cztCBtx5qO9905WkBPeSNE__cSXeX8DACMAVmg12XA1jlvvA0Fm1HHjAed7Qb7F7212AaT3nfFx4D1tI3Jl_EFz9mHbf0adTA1WcaYdjiPs3OTxTpsDn2KN9jE8C9O8wF3czD7xw26cHrK9vbjvkZ_fnz_vXps1r9-Pq2W68Yw0peGCSG05Mwx2bebdpCMbKSkGkRvmXRMd1QbSgdBhlpoe0doJ2zLhRg4BcrZNbo_9t2l-DrbXNRznFOoIxUVtAPgHGhNyWPKpJhzsk4ZX_R-z5K0nxQBtResjoJVFawOgtVbRekXdJeqtPR-GmJHKNdw2Nr0udUJ6j-vnZGL
CitedBy_id crossref_primary_10_1016_j_prime_2024_100642
crossref_primary_10_1007_s10489_021_03063_1
crossref_primary_10_1088_1402_4896_ad8d47
crossref_primary_10_1007_s11227_025_06943_2
crossref_primary_10_3233_IDT_230547
crossref_primary_10_1007_s12530_022_09482_w
crossref_primary_10_1155_2022_4960465
crossref_primary_10_3390_app13127168
crossref_primary_10_1007_s11042_024_18245_5
crossref_primary_10_1007_s11042_024_18959_6
crossref_primary_10_1007_s00521_023_08643_5
crossref_primary_10_1117_1_JEI_34_2_023017
crossref_primary_10_1007_s11042_022_12765_8
crossref_primary_10_32604_cmc_2023_032236
crossref_primary_10_1007_s11071_022_07958_7
crossref_primary_10_1016_j_optlastec_2023_109345
crossref_primary_10_1038_s41598_024_84186_6
crossref_primary_10_1088_1402_4896_ad1fc3
crossref_primary_10_1007_s11517_023_02925_9
crossref_primary_10_1016_j_chaos_2024_115020
crossref_primary_10_3390_s23031415
crossref_primary_10_1016_j_ijleo_2022_169357
crossref_primary_10_1007_s10489_023_04996_5
crossref_primary_10_1088_1402_4896_ad14d1
crossref_primary_10_1007_s10489_021_03071_1
crossref_primary_10_1007_s00340_023_08029_4
crossref_primary_10_1007_s11042_023_17438_8
crossref_primary_10_1186_s44147_024_00376_z
crossref_primary_10_1080_13682199_2023_2187513
crossref_primary_10_1109_ACCESS_2024_3377665
crossref_primary_10_1007_s11071_024_09696_4
crossref_primary_10_1007_s11042_023_15240_0
crossref_primary_10_3390_e27030299
crossref_primary_10_3390_math10224374
crossref_primary_10_1007_s00500_023_08170_4
crossref_primary_10_3390_e25081178
crossref_primary_10_1007_s10489_023_04759_2
crossref_primary_10_1007_s00371_023_02876_0
crossref_primary_10_1080_13682199_2022_2156669
crossref_primary_10_1088_1402_4896_ac6d85
crossref_primary_10_1007_s11042_023_17236_2
crossref_primary_10_3390_math10122034
crossref_primary_10_1007_s11042_023_15593_6
crossref_primary_10_1007_s12596_024_02405_9
crossref_primary_10_1007_s10489_022_03174_3
crossref_primary_10_1016_j_jisa_2023_103592
crossref_primary_10_1007_s10489_024_05447_5
crossref_primary_10_1088_1402_4896_ad76e5
crossref_primary_10_1007_s11042_023_16025_1
crossref_primary_10_1016_j_jisa_2023_103677
crossref_primary_10_1088_1674_1056_ada7db
crossref_primary_10_1007_s11071_023_08545_0
crossref_primary_10_1109_ACCESS_2022_3230096
crossref_primary_10_1007_s10462_022_10295_1
crossref_primary_10_1007_s10489_023_04727_w
Cites_doi 10.1016/j.ins.2019.08.041
10.1016/j.ins.2020.12.002
10.1016/j.optlaseng.2016.10.006
10.1007/s11071-016-3153-y
10.1016/j.sigpro.2020.107790
10.1016/j.image.2016.12.007
10.1155/2019/8694678
10.1016/j.sigpro.2017.03.011
10.1016/j.optlaseng.2015.09.007
10.1016/j.sigpro.2016.10.002
10.1007/s11071-015-2579-y
10.1142/S021812749800098X
10.1016/j.asoc.2012.01.016
10.1016/j.ins.2020.09.055
10.1007/s11071-010-9749-8
10.1016/j.chaos.2004.11.096
10.1109/MMUL.2011.54
10.1016/j.asoc.2015.09.055
10.1016/j.optlaseng.2014.08.005
10.1007/s11042-018-6996-z
10.1109/TSP.2020.2979596
10.6028/NIST.SP.800-22
10.1016/j.optlastec.2017.10.024
10.1016/j.compeleceng.2015.11.008
10.1016/j.optcom.2011.04.001
10.1016/j.compbiomed.2015.07.024
10.1016/j.optlaseng.2017.04.009
10.1016/j.optlaseng.2019.105836
10.1109/ACCESS.2020.2970806
10.1016/j.camwa.2010.03.017
10.1109/TIFS.2015.2489178
10.1007/s11042-017-4772-0
10.1007/978-3-642-03356-8_17
10.1002/j.1538-7305.1949.tb00928.x
10.1016/j.ins.2018.12.048
10.1080/13682199.2020.1732116
10.1016/j.ins.2014.02.156
10.1016/j.sigpro.2018.11.010
10.1016/j.optlastec.2019.01.043
10.1201/9781420013450-4
10.1109/MMUL.2015.72
10.1016/j.asoc.2014.09.039
10.1016/j.optlaseng.2016.10.020
10.1016/j.sigpro.2015.06.008
10.1016/S0375-9601(98)00086-3
10.1155/2014/427349
10.1016/j.optlaseng.2015.03.022
10.1016/j.image.2015.10.004
10.1016/j.ins.2020.09.032
10.1016/j.sigpro.2011.10.023
10.1155/2020/7913061
10.1007/s11554-020-00948-1
10.1080/0161-118991863745
10.1016/j.ins.2019.02.049
10.1109/TIFS.2018.2812080
10.1109/81.904880
10.1016/j.ins.2020.06.030
10.1007/s11042-016-3585-x
10.1007/s11042-012-1292-9
10.1049/iet-cvi.2015.0344
10.1007/s11042-018-6534-z
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8FD
8FE
8FG
8FK
8FL
ABJCF
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
K7-
L.-
L6V
L7M
L~C
L~D
M0C
M0N
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PSYQQ
PTHSS
Q9U
DOI 10.1007/s10489-021-02508-x
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni)
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials - QC
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One
ProQuest Central
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
ProQuest Engineering Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Engineering Database
ProQuest advanced technologies & aerospace journals
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest One Psychology
Engineering Collection
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
ProQuest One Psychology
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Engineering Collection
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
Engineering Database
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
Business Premium Collection (Alumni)
DatabaseTitleList ABI/INFORM Global (Corporate)

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-7497
EndPage 2585
ExternalDocumentID 10_1007_s10489_021_02508_x
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
-~X
.86
.DC
.VR
06D
0R~
0VY
1N0
1SB
2.D
203
23M
28-
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
77K
7WY
8FE
8FG
8FL
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABIVO
ABJCF
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTAH
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
L6V
LAK
LLZTM
M0C
M0N
M4Y
M7S
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PSYQQ
PT4
PT5
PTHSS
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7X
Z7Z
Z81
Z83
Z88
Z8M
Z8N
Z8R
Z8T
Z8U
Z8W
Z92
ZMTXR
ZY4
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
7SC
7XB
8AL
8FD
8FK
ABRTQ
JQ2
L.-
L7M
L~C
L~D
PKEHL
PQEST
PQGLB
PQUKI
Q9U
ID FETCH-LOGICAL-c319t-3666a843f3895d5b831d882a069e38f3a72ac22b61b9e359f1276e5466b420243
IEDL.DBID U2A
ISSN 0924-669X
IngestDate Fri Jul 25 12:19:17 EDT 2025
Tue Jul 01 03:31:45 EDT 2025
Thu Apr 24 23:10:48 EDT 2025
Fri Feb 21 02:47:41 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Chaos
Enhanced Thorp shuffle
Image encryption
Convolution
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-3666a843f3895d5b831d882a069e38f3a72ac22b61b9e359f1276e5466b420243
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2627004402
PQPubID 326365
PageCount 30
ParticipantIDs proquest_journals_2627004402
crossref_citationtrail_10_1007_s10489_021_02508_x
crossref_primary_10_1007_s10489_021_02508_x
springer_journals_10_1007_s10489_021_02508_x
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20220200
2022-02-00
20220201
PublicationDateYYYYMMDD 2022-02-01
PublicationDate_xml – month: 2
  year: 2022
  text: 20220200
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Boston
PublicationSubtitle The International Journal of Research on Intelligent Systems for Real Life Complex Problems
PublicationTitle Applied intelligence (Dordrecht, Netherlands)
PublicationTitleAbbrev Appl Intell
PublicationYear 2022
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References ShannonCECommunication theory of secrecy systemsBell Syst Tech J1949284656715321331200.94005
XianYWangXFractal sorting matrix and its application on chaotic image encryptionInf Sci202054711541169416304707437618
Morris B, Rogaway P, Stegers T (2009) How to encipher messages on a small domain. In: Advances in Cryptology-CRYPTO 2009. Springer, pp 286–302
LiYWangCChenHA hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutationOpt Lasers Eng201790238246
Asgari-ChenaghluMBalafarM-AFeizi-DerakhshiM-RA novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generationSignal Process2019157113
MatthewsROn the derivation of a “chaotic” encryption algorithmCryptologia19891312942975822
LiuHWenFKadirAConstruction of a new 2d chebyshev-sine map and its application to color image encryptionMultimed Tools Appl201978121599716010
Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) Image encryption with double spiral scans and chaotic maps. Secur Commun Netw 2019
HuaZZhangYZhouYTwo-dimensional modular chaotification system for improving chaos complexityIEEE Trans Signal Process202068193719494114667
ZhangWYuHZhaoY-IZhuZ-IImage encryption based on three-dimensional bit matrix permutationSignal Process20161183650
YavuzEYazıcıRKasapbaşıMCYamaçEA chaos-based image encryption algorithm with simple logical functionsComput Electr Eng201654471483
LuQZhuCDengXAn efficient image encryption scheme based on the lss chaotic map and single s-boxIEEE Access202082566425678
MuruganBGounderAGNImage encryption scheme based on block-based confusion and multiple levels of diffusionIET Comput Vis2016106593602
WangX-YYangLLiuRKadirAA chaotic image encryption algorithm based on perceptron modelNonlinear Dyn201062361562129433691209.94015
XuLLiZLiJHuaWA novel bit-level image encryption algorithm based on chaotic mapsOpt Lasers Eng2016781725
ZahmoulREjbaliRZaiedMImage encryption based on new beta chaotic mapsOpt Lasers Eng2017963949
KandarSChaudhuriDBhattacharjeeADharaBCImage encryption using sequence generated by cyclic groupJ Inf Secur Appl201944117129
LiQWangXWangXMaBWangCShiYAn encrypted coverless information hiding method based on generative modelsInf Sci202155319304193051
ChenLMaBZhaoXWangSDifferential cryptanalysis of a novel image encryption algorithm based on chaos and line mapNonlinear Dyn2017873179718071384.94043
NorouziBMirzakuchakiSSeyedzadehSMMosaviMRA simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion processMultimed Tools Appl201471314691497
WangXFengLZhaoHFast image encryption algorithm based on parallel computing systemInf Sci20194863403581451.68308
YavuzEA novel chaotic image encryption algorithm based on content-sensitive dynamic function switching schemeOpt Laser Technol2019114224239
BrindhaMGoundenNAA chaos based image encryption and lossless compression algorithm using hash table and chinese remainder theoremAppl Soft Comput201640379390
ZhangY-QWangX-YA symmetric image encryption algorithm based on mixed linear–nonlinear coupled map latticeInf Sci2014273329351
EnayatifarRAbdullahAHIsninIFAltameemALeeMImage encryption using a synchronous permutation-diffusion techniqueOpt Lasers Eng201790146154
WuYNoonanJPAgaianSNpcr and uaci randomness tests for image encryptionCyber J Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT)2011123138
Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications, Technical Report. Booz-Allen and Hamilton Inc Mclean Va
ChenLWangSDifferential cryptanalysis of a medical image cryptosystem with multiple roundsComput Biol Med2015656975
HuaZZhouYHuangHCosine-transform-based chaotic system for image encryptionInf Sci2019480403419
ZhangY-QWangX-YA new image encryption algorithm based on non-adjacent coupled map latticesAppl Soft Comput2015261020
ChaiXYangKGanZA new chaos-based image encryption algorithm with dynamic key selection mechanismsMultimed Tools Appl201776799079927
Guo J-I, et al. (2000) A new chaotic key-based design for image encryption and decryption. In: 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on Circuits and Systems, vol 4. IEEE, pp 49–52
LuoYTangSLiuJCaoLQiuSImage encryption scheme by combining the hyper-chaotic system with quantum codingOpt Lasers Eng2020124105836
WangXTengLQinXA novel colour image encryption algorithm based on chaosSignal Process2012924110111082998170
MusannaFDangwalDKumarSMalikVA chaos-based image encryption algorithm based on multiresolution singular value decomposition and a symmetric attractorImaging Sci J20206812440
YeGHuangXAn image encryption algorithm based on autoblocking and electrocardiographyIEEE MultiMedia20162326471
WangXLiuCXuDLiuCImage encryption scheme using chaos and simulated annealing algorithmNonlinear Dyn2016843141714293486578
ChaiXGanZYangKChenYLiuXAn image encryption algorithm based on the memristive hyperchaotic system, cellular automata and dna sequence operationsSignal Process Image Commun201752619
XieEYLiCYuSLüJOn the cryptanalysis of fridrich’s chaotic image encryption schemeSignal Processxs2017132150154
FridrichJSymmetric ciphers based on two-dimensional chaotic mapsInt J Bifurcation Chaos19988061259128416637820935.94019
BaptistaMSCryptography with chaosPhys Lett A19982401-2505416196210936.94013
El AssadSFarajallahMA new chaos-based image encryption systemSignal Process Image Commun201641144157
Katz J, Menezes A J, Van Oorschot P C, Vanstone S A (1996) Handbook of applied cryptography. CRC press
WangX-YZhangY-QBaoX-MA novel chaotic image encryption scheme using dna sequence operationsOpt Lasers Eng2015735361
Li S, Chen G, Zheng X (2006) Chaos-based encryption for digital image and video. Multimed Encrypt Authen Tech Appl 129
Talhaoui M Z, Wang X, Midoun M A (2020) Fast image encryption algorithm with high security level using the bülban chaotic map. J Real-Time Image Proc:1–14
PakCHuangLA new color image encryption using combination of the 1d chaotic mapSignal Process2017138129137
JolfaeiAWuX-WMuthukkumarasamyVOn the security of permutation-only image encryption schemesIEEE Trans Inf Forensic Secur2016112235246
WangXLintao LiuYZA novel chaotic block image encryption algorithm based on dynamic random growth techniqueOpt Lasers Eng2015661018
WangXGaoSImage encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean networkInf Sci202053919521441173981474.68443
Dalhoum A, Latif A, Mahafzah B A, Awwad A A, Aldhamari I, Ortega A, Alfonseca M (2012) Digital image scrambling using 2d cellular automata. IEEE Multimedia
Chen J-X, Zhu Z-I, Zhang L-B, Fu C, Yu H (2014) An efficient diffusion scheme for chaos-based digital image encryption. Math Probl Eng 2014
LianSSunJWangZA block cipher based on a suitable use of the chaotic standard mapChaos Solitons Fractals20052611171291093.37504
JakimoskiGKocarevLChaos and cryptography: block encryption ciphers based on chaotic mapsIEEE Trans Circ Syst I: Fund Theory Appl200148216316918205410998.94016
Premkumar R, Anand S (2018) Secured and compound 3-d chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl:1–17
LiuHWangXColor image encryption using spatial bit-level permutation and high-dimension chaotic systemOpt Commun201128416-1738953903
PreishuberMHütterTKatzenbeisserSUhlADepreciating motivation and empirical security analysis of chaos-based image and video encryptionIEEE Trans Inf Forensic Secur201813921372150
ParvazRZarebniaMA combination chaotic system and application in color image encryptionOpt Laser Technol20181013041
LiuHWangXImage encryption using dna complementary rule and chaotic mapsAppl Soft Comput201212514571466
HuaZZhuZYiSZhangZHuangHCross-plane colour image encryption using a two-dimensional logistic tent modular mapInf Sci2021546106310834162364
LiuHWangXColor image encryption based on one-time keys and robust chaotic mapsComput Math Appl201059103320332726518711198.94109
KahanWIeee standard 754 for binary floating-point arithmeticLect Notes Status IEEE199675494720-177611
WangXGaoSImage encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theoryInf Sci2020507163639944631456.68034
HuGLiBCoupling chaotic system based on unit transform and its applications in image encryptionSignal Process2021178107790
Xiao S, Yu Z, Deng Y (2020) Design and analysis of a novel chaos-based image encryption algorithm via switch control mechanism. Security and Communication Networks 2020
GanZChaiXYuanKLuYA novel image encryption algorithm based on lft based s-boxes and chaosMultimed Tools Appl201877787598783
R Matthews (2508_CR3) 1989; 13
Y-Q Zhang (2508_CR58) 2014; 273
S El Assad (2508_CR21) 2016; 41
G Jakimoski (2508_CR2) 2001; 48
J Fridrich (2508_CR4) 1998; 8
H Liu (2508_CR48) 2010; 59
X-Y Wang (2508_CR51) 2010; 62
2508_CR60
2508_CR61
M Preishuber (2508_CR65) 2018; 13
2508_CR52
2508_CR53
Z Gan (2508_CR57) 2018; 77
L Xu (2508_CR12) 2016; 78
2508_CR19
X Wang (2508_CR42) 2019; 486
Y Wu (2508_CR54) 2011; 1
2508_CR1
X Wang (2508_CR43) 2020; 539
W Zhang (2508_CR13) 2016; 118
S Lian (2508_CR6) 2005; 26
E Yavuz (2508_CR10) 2019; 114
X Chai (2508_CR23) 2017; 52
C Pak (2508_CR7) 2017; 138
X Wang (2508_CR62) 2012; 92
CE Shannon (2508_CR5) 1949; 28
L Chen (2508_CR64) 2015; 65
R Parvaz (2508_CR8) 2018; 101
2508_CR22
Z Hua (2508_CR46) 2021; 546
H Liu (2508_CR50) 2012; 12
2508_CR27
H Liu (2508_CR30) 2019; 78
X Wang (2508_CR41) 2015; 66
2508_CR28
G Ye (2508_CR38) 2016; 23
B Murugan (2508_CR17) 2016; 10
Y Luo (2508_CR18) 2020; 124
F Musanna (2508_CR33) 2020; 68
R Zahmoul (2508_CR11) 2017; 96
S Kandar (2508_CR14) 2019; 44
A Jolfaei (2508_CR35) 2016; 11
Q Lu (2508_CR31) 2020; 8
B Norouzi (2508_CR24) 2014; 71
L Chen (2508_CR63) 2017; 87
2508_CR32
2508_CR37
X Wang (2508_CR66) 2016; 84
Z Hua (2508_CR15) 2019; 480
E Yavuz (2508_CR20) 2016; 54
Y-Q Zhang (2508_CR56) 2015; 26
Z Hua (2508_CR47) 2020; 68
X-Y Wang (2508_CR40) 2015; 73
M Asgari-Chenaghlu (2508_CR25) 2019; 157
G Hu (2508_CR29) 2021; 178
Q Li (2508_CR45) 2021; 553
MS Baptista (2508_CR36) 1998; 240
M Brindha (2508_CR16) 2016; 40
H Liu (2508_CR49) 2011; 284
Y Li (2508_CR9) 2017; 90
X Wang (2508_CR44) 2020; 507
EY Xie (2508_CR34) 2017; 132
X Chai (2508_CR59) 2017; 76
W Kahan (2508_CR55) 1996; 754
Y Xian (2508_CR26) 2020; 547
R Enayatifar (2508_CR39) 2017; 90
References_xml – reference: Morris B, Rogaway P, Stegers T (2009) How to encipher messages on a small domain. In: Advances in Cryptology-CRYPTO 2009. Springer, pp 286–302
– reference: Guo J-I, et al. (2000) A new chaotic key-based design for image encryption and decryption. In: 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on Circuits and Systems, vol 4. IEEE, pp 49–52
– reference: WangXLintao LiuYZA novel chaotic block image encryption algorithm based on dynamic random growth techniqueOpt Lasers Eng2015661018
– reference: NorouziBMirzakuchakiSSeyedzadehSMMosaviMRA simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion processMultimed Tools Appl201471314691497
– reference: Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications, Technical Report. Booz-Allen and Hamilton Inc Mclean Va
– reference: LiuHWangXColor image encryption using spatial bit-level permutation and high-dimension chaotic systemOpt Commun201128416-1738953903
– reference: Katz J, Menezes A J, Van Oorschot P C, Vanstone S A (1996) Handbook of applied cryptography. CRC press
– reference: XianYWangXFractal sorting matrix and its application on chaotic image encryptionInf Sci202054711541169416304707437618
– reference: LuoYTangSLiuJCaoLQiuSImage encryption scheme by combining the hyper-chaotic system with quantum codingOpt Lasers Eng2020124105836
– reference: YavuzEA novel chaotic image encryption algorithm based on content-sensitive dynamic function switching schemeOpt Laser Technol2019114224239
– reference: MuruganBGounderAGNImage encryption scheme based on block-based confusion and multiple levels of diffusionIET Comput Vis2016106593602
– reference: WangXFengLZhaoHFast image encryption algorithm based on parallel computing systemInf Sci20194863403581451.68308
– reference: ChenLMaBZhaoXWangSDifferential cryptanalysis of a novel image encryption algorithm based on chaos and line mapNonlinear Dyn2017873179718071384.94043
– reference: Premkumar R, Anand S (2018) Secured and compound 3-d chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl:1–17
– reference: WuYNoonanJPAgaianSNpcr and uaci randomness tests for image encryptionCyber J Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT)2011123138
– reference: HuaZZhangYZhouYTwo-dimensional modular chaotification system for improving chaos complexityIEEE Trans Signal Process202068193719494114667
– reference: HuaZZhouYHuangHCosine-transform-based chaotic system for image encryptionInf Sci2019480403419
– reference: ShannonCECommunication theory of secrecy systemsBell Syst Tech J1949284656715321331200.94005
– reference: XieEYLiCYuSLüJOn the cryptanalysis of fridrich’s chaotic image encryption schemeSignal Processxs2017132150154
– reference: YeGHuangXAn image encryption algorithm based on autoblocking and electrocardiographyIEEE MultiMedia20162326471
– reference: Dalhoum A, Latif A, Mahafzah B A, Awwad A A, Aldhamari I, Ortega A, Alfonseca M (2012) Digital image scrambling using 2d cellular automata. IEEE Multimedia
– reference: MusannaFDangwalDKumarSMalikVA chaos-based image encryption algorithm based on multiresolution singular value decomposition and a symmetric attractorImaging Sci J20206812440
– reference: Talhaoui M Z, Wang X, Midoun M A (2020) Fast image encryption algorithm with high security level using the bülban chaotic map. J Real-Time Image Proc:1–14
– reference: ZhangY-QWangX-YA symmetric image encryption algorithm based on mixed linear–nonlinear coupled map latticeInf Sci2014273329351
– reference: PakCHuangLA new color image encryption using combination of the 1d chaotic mapSignal Process2017138129137
– reference: KahanWIeee standard 754 for binary floating-point arithmeticLect Notes Status IEEE199675494720-177611
– reference: XuLLiZLiJHuaWA novel bit-level image encryption algorithm based on chaotic mapsOpt Lasers Eng2016781725
– reference: PreishuberMHütterTKatzenbeisserSUhlADepreciating motivation and empirical security analysis of chaos-based image and video encryptionIEEE Trans Inf Forensic Secur201813921372150
– reference: Xiao S, Yu Z, Deng Y (2020) Design and analysis of a novel chaos-based image encryption algorithm via switch control mechanism. Security and Communication Networks 2020
– reference: ZhangY-QWangX-YA new image encryption algorithm based on non-adjacent coupled map latticesAppl Soft Comput2015261020
– reference: WangXGaoSImage encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theoryInf Sci2020507163639944631456.68034
– reference: ParvazRZarebniaMA combination chaotic system and application in color image encryptionOpt Laser Technol20181013041
– reference: ChaiXGanZYangKChenYLiuXAn image encryption algorithm based on the memristive hyperchaotic system, cellular automata and dna sequence operationsSignal Process Image Commun201752619
– reference: HuaZZhuZYiSZhangZHuangHCross-plane colour image encryption using a two-dimensional logistic tent modular mapInf Sci2021546106310834162364
– reference: El AssadSFarajallahMA new chaos-based image encryption systemSignal Process Image Commun201641144157
– reference: Li S, Chen G, Zheng X (2006) Chaos-based encryption for digital image and video. Multimed Encrypt Authen Tech Appl 129
– reference: WangX-YZhangY-QBaoX-MA novel chaotic image encryption scheme using dna sequence operationsOpt Lasers Eng2015735361
– reference: WangX-YYangLLiuRKadirAA chaotic image encryption algorithm based on perceptron modelNonlinear Dyn201062361562129433691209.94015
– reference: WangXTengLQinXA novel colour image encryption algorithm based on chaosSignal Process2012924110111082998170
– reference: LiuHWangXImage encryption using dna complementary rule and chaotic mapsAppl Soft Comput201212514571466
– reference: LiuHWenFKadirAConstruction of a new 2d chebyshev-sine map and its application to color image encryptionMultimed Tools Appl201978121599716010
– reference: LiQWangXWangXMaBWangCShiYAn encrypted coverless information hiding method based on generative modelsInf Sci202155319304193051
– reference: MatthewsROn the derivation of a “chaotic” encryption algorithmCryptologia19891312942975822
– reference: HuGLiBCoupling chaotic system based on unit transform and its applications in image encryptionSignal Process2021178107790
– reference: GanZChaiXYuanKLuYA novel image encryption algorithm based on lft based s-boxes and chaosMultimed Tools Appl201877787598783
– reference: LianSSunJWangZA block cipher based on a suitable use of the chaotic standard mapChaos Solitons Fractals20052611171291093.37504
– reference: ZahmoulREjbaliRZaiedMImage encryption based on new beta chaotic mapsOpt Lasers Eng2017963949
– reference: FridrichJSymmetric ciphers based on two-dimensional chaotic mapsInt J Bifurcation Chaos19988061259128416637820935.94019
– reference: ChaiXYangKGanZA new chaos-based image encryption algorithm with dynamic key selection mechanismsMultimed Tools Appl201776799079927
– reference: WangXLiuCXuDLiuCImage encryption scheme using chaos and simulated annealing algorithmNonlinear Dyn2016843141714293486578
– reference: BrindhaMGoundenNAA chaos based image encryption and lossless compression algorithm using hash table and chinese remainder theoremAppl Soft Comput201640379390
– reference: WangXGaoSImage encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean networkInf Sci202053919521441173981474.68443
– reference: Chen J-X, Zhu Z-I, Zhang L-B, Fu C, Yu H (2014) An efficient diffusion scheme for chaos-based digital image encryption. Math Probl Eng 2014
– reference: YavuzEYazıcıRKasapbaşıMCYamaçEA chaos-based image encryption algorithm with simple logical functionsComput Electr Eng201654471483
– reference: LiuHWangXColor image encryption based on one-time keys and robust chaotic mapsComput Math Appl201059103320332726518711198.94109
– reference: LuQZhuCDengXAn efficient image encryption scheme based on the lss chaotic map and single s-boxIEEE Access202082566425678
– reference: JolfaeiAWuX-WMuthukkumarasamyVOn the security of permutation-only image encryption schemesIEEE Trans Inf Forensic Secur2016112235246
– reference: LiYWangCChenHA hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutationOpt Lasers Eng201790238246
– reference: KandarSChaudhuriDBhattacharjeeADharaBCImage encryption using sequence generated by cyclic groupJ Inf Secur Appl201944117129
– reference: Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) Image encryption with double spiral scans and chaotic maps. Secur Commun Netw 2019
– reference: BaptistaMSCryptography with chaosPhys Lett A19982401-2505416196210936.94013
– reference: ZhangWYuHZhaoY-IZhuZ-IImage encryption based on three-dimensional bit matrix permutationSignal Process20161183650
– reference: EnayatifarRAbdullahAHIsninIFAltameemALeeMImage encryption using a synchronous permutation-diffusion techniqueOpt Lasers Eng201790146154
– reference: JakimoskiGKocarevLChaos and cryptography: block encryption ciphers based on chaotic mapsIEEE Trans Circ Syst I: Fund Theory Appl200148216316918205410998.94016
– reference: Asgari-ChenaghluMBalafarM-AFeizi-DerakhshiM-RA novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generationSignal Process2019157113
– reference: ChenLWangSDifferential cryptanalysis of a medical image cryptosystem with multiple roundsComput Biol Med2015656975
– volume: 507
  start-page: 16
  year: 2020
  ident: 2508_CR44
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2019.08.041
– volume: 1
  start-page: 31
  issue: 2
  year: 2011
  ident: 2508_CR54
  publication-title: Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT)
– volume: 553
  start-page: 19
  year: 2021
  ident: 2508_CR45
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2020.12.002
– volume: 90
  start-page: 146
  year: 2017
  ident: 2508_CR39
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.10.006
– ident: 2508_CR61
– volume: 87
  start-page: 1797
  issue: 3
  year: 2017
  ident: 2508_CR63
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-016-3153-y
– volume: 44
  start-page: 117
  year: 2019
  ident: 2508_CR14
  publication-title: J Inf Secur Appl
– volume: 178
  start-page: 107790
  year: 2021
  ident: 2508_CR29
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2020.107790
– volume: 52
  start-page: 6
  year: 2017
  ident: 2508_CR23
  publication-title: Signal Process Image Commun
  doi: 10.1016/j.image.2016.12.007
– ident: 2508_CR32
  doi: 10.1155/2019/8694678
– volume: 138
  start-page: 129
  year: 2017
  ident: 2508_CR7
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2017.03.011
– volume: 78
  start-page: 17
  year: 2016
  ident: 2508_CR12
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2015.09.007
– volume: 132
  start-page: 150
  year: 2017
  ident: 2508_CR34
  publication-title: Signal Processxs
  doi: 10.1016/j.sigpro.2016.10.002
– volume: 84
  start-page: 1417
  issue: 3
  year: 2016
  ident: 2508_CR66
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-015-2579-y
– volume: 8
  start-page: 1259
  issue: 06
  year: 1998
  ident: 2508_CR4
  publication-title: Int J Bifurcation Chaos
  doi: 10.1142/S021812749800098X
– volume: 12
  start-page: 1457
  issue: 5
  year: 2012
  ident: 2508_CR50
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2012.01.016
– volume: 547
  start-page: 1154
  year: 2020
  ident: 2508_CR26
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2020.09.055
– volume: 62
  start-page: 615
  issue: 3
  year: 2010
  ident: 2508_CR51
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-010-9749-8
– volume: 26
  start-page: 117
  issue: 1
  year: 2005
  ident: 2508_CR6
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2004.11.096
– ident: 2508_CR53
  doi: 10.1109/MMUL.2011.54
– volume: 40
  start-page: 379
  year: 2016
  ident: 2508_CR16
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2015.09.055
– volume: 66
  start-page: 10
  year: 2015
  ident: 2508_CR41
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2014.08.005
– volume: 78
  start-page: 15997
  issue: 12
  year: 2019
  ident: 2508_CR30
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-018-6996-z
– volume: 68
  start-page: 1937
  year: 2020
  ident: 2508_CR47
  publication-title: IEEE Trans Signal Process
  doi: 10.1109/TSP.2020.2979596
– ident: 2508_CR60
  doi: 10.6028/NIST.SP.800-22
– volume: 101
  start-page: 30
  year: 2018
  ident: 2508_CR8
  publication-title: Opt Laser Technol
  doi: 10.1016/j.optlastec.2017.10.024
– volume: 54
  start-page: 471
  year: 2016
  ident: 2508_CR20
  publication-title: Comput Electr Eng
  doi: 10.1016/j.compeleceng.2015.11.008
– volume: 284
  start-page: 3895
  issue: 16-17
  year: 2011
  ident: 2508_CR49
  publication-title: Opt Commun
  doi: 10.1016/j.optcom.2011.04.001
– volume: 65
  start-page: 69
  year: 2015
  ident: 2508_CR64
  publication-title: Comput Biol Med
  doi: 10.1016/j.compbiomed.2015.07.024
– volume: 96
  start-page: 39
  year: 2017
  ident: 2508_CR11
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2017.04.009
– volume: 124
  start-page: 105836
  year: 2020
  ident: 2508_CR18
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2019.105836
– volume: 8
  start-page: 25664
  year: 2020
  ident: 2508_CR31
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2970806
– volume: 59
  start-page: 3320
  issue: 10
  year: 2010
  ident: 2508_CR48
  publication-title: Comput Math Appl
  doi: 10.1016/j.camwa.2010.03.017
– volume: 11
  start-page: 235
  issue: 2
  year: 2016
  ident: 2508_CR35
  publication-title: IEEE Trans Inf Forensic Secur
  doi: 10.1109/TIFS.2015.2489178
– volume: 77
  start-page: 8759
  issue: 7
  year: 2018
  ident: 2508_CR57
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-017-4772-0
– ident: 2508_CR52
  doi: 10.1007/978-3-642-03356-8_17
– volume: 28
  start-page: 656
  issue: 4
  year: 1949
  ident: 2508_CR5
  publication-title: Bell Syst Tech J
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– volume: 480
  start-page: 403
  year: 2019
  ident: 2508_CR15
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2018.12.048
– volume: 68
  start-page: 24
  issue: 1
  year: 2020
  ident: 2508_CR33
  publication-title: Imaging Sci J
  doi: 10.1080/13682199.2020.1732116
– volume: 273
  start-page: 329
  year: 2014
  ident: 2508_CR58
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2014.02.156
– volume: 157
  start-page: 1
  year: 2019
  ident: 2508_CR25
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2018.11.010
– volume: 114
  start-page: 224
  year: 2019
  ident: 2508_CR10
  publication-title: Opt Laser Technol
  doi: 10.1016/j.optlastec.2019.01.043
– ident: 2508_CR1
  doi: 10.1201/9781420013450-4
– volume: 23
  start-page: 64
  issue: 2
  year: 2016
  ident: 2508_CR38
  publication-title: IEEE MultiMedia
  doi: 10.1109/MMUL.2015.72
– volume: 26
  start-page: 10
  year: 2015
  ident: 2508_CR56
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2014.09.039
– volume: 90
  start-page: 238
  year: 2017
  ident: 2508_CR9
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.10.020
– volume: 118
  start-page: 36
  year: 2016
  ident: 2508_CR13
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2015.06.008
– volume: 240
  start-page: 50
  issue: 1-2
  year: 1998
  ident: 2508_CR36
  publication-title: Phys Lett A
  doi: 10.1016/S0375-9601(98)00086-3
– ident: 2508_CR37
  doi: 10.1155/2014/427349
– ident: 2508_CR19
– volume: 73
  start-page: 53
  year: 2015
  ident: 2508_CR40
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2015.03.022
– volume: 41
  start-page: 144
  year: 2016
  ident: 2508_CR21
  publication-title: Signal Process Image Commun
  doi: 10.1016/j.image.2015.10.004
– volume: 546
  start-page: 1063
  year: 2021
  ident: 2508_CR46
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2020.09.032
– volume: 92
  start-page: 1101
  issue: 4
  year: 2012
  ident: 2508_CR62
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2011.10.023
– ident: 2508_CR28
  doi: 10.1155/2020/7913061
– ident: 2508_CR27
  doi: 10.1007/s11554-020-00948-1
– volume: 754
  start-page: 11
  issue: 94720-1776
  year: 1996
  ident: 2508_CR55
  publication-title: Lect Notes Status IEEE
– volume: 13
  start-page: 29
  issue: 1
  year: 1989
  ident: 2508_CR3
  publication-title: Cryptologia
  doi: 10.1080/0161-118991863745
– volume: 486
  start-page: 340
  year: 2019
  ident: 2508_CR42
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2019.02.049
– volume: 13
  start-page: 2137
  issue: 9
  year: 2018
  ident: 2508_CR65
  publication-title: IEEE Trans Inf Forensic Secur
  doi: 10.1109/TIFS.2018.2812080
– volume: 48
  start-page: 163
  issue: 2
  year: 2001
  ident: 2508_CR2
  publication-title: IEEE Trans Circ Syst I: Fund Theory Appl
  doi: 10.1109/81.904880
– volume: 539
  start-page: 195
  year: 2020
  ident: 2508_CR43
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2020.06.030
– volume: 76
  start-page: 9907
  issue: 7
  year: 2017
  ident: 2508_CR59
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-016-3585-x
– volume: 71
  start-page: 1469
  issue: 3
  year: 2014
  ident: 2508_CR24
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-012-1292-9
– volume: 10
  start-page: 593
  issue: 6
  year: 2016
  ident: 2508_CR17
  publication-title: IET Comput Vis
  doi: 10.1049/iet-cvi.2015.0344
– ident: 2508_CR22
  doi: 10.1007/s11042-018-6534-z
SSID ssj0003301
Score 2.5088484
Snippet A Unique chaotic image encryption on the basis of Enhanced Thorp shuffle and Zig-zag Scan based Convolution (ETS-ZSC) is proposed in this paper. A...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2556
SubjectTerms Algorithms
Artificial Intelligence
Chaos theory
Computer Science
Convolution
Data encryption
Decomposition
Encryption
Image enhancement
Machines
Manufacturing
Mechanical Engineering
Processes
Substitutes
SummonAdditionalLinks – databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8MwDI5gXLjwRgwGyoEbRKxpm6UnNCHGhAQnJu1WJW26Im3do500_j12lm4CCW5Vk6ZqP8f-nDg2IbdoBBXILdNKGRYoHrKorVKmO0FmpImkskmS3t5FfxC8DsOhW3ArXVhlrROtok6nCa6RP3CBW6QBuDuPsznDqlG4u-pKaOySPQ8sDcq57L1sNDH46rZiHvgYTIho6A7NuKNzAQYLcXCmgQVItvppmLZs89cGqbU7vSNy4Agj7a4RPiY7pjghh3UxBurm5imZdwtqbD4IMCM0ydW0pGiiUvo5AZ1Bodfiy-oHqsYj-LIqn1CMeh9BU27jAGiVTxczWubLLBsbqorUjgMvphic7oSUoinEizMy6D1_PPWZq6fAEphoFfPBVVEy8DPAJ0xDLX0vBYKt2iIyvsx81eEq4VwLT8ONMMo83hEmDITQAcfMheekUUwLc0EosC6Rct8kQodIAWTmSa115unQettN4tU_M05csnGseTGOt2mSEYAYAIgtAPGqSe42z8zWqTb-7d2qMYrdtCvjrZA0yX2N27b579Eu_x_tiuxzPPZgo7VbpFEtluYayEilb6zEfQN8ztqf
  priority: 102
  providerName: ProQuest
Title An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function
URI https://link.springer.com/article/10.1007/s10489-021-02508-x
https://www.proquest.com/docview/2627004402
Volume 52
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA-6Xbz4LU7nyMGbBta0ydLjJvtAcYg4mKeStOkqbN3cOtD_3pes3VRU8JTSpAn05b3fe7wvhC4NCEq4t0RJqYknKSN-XUZENbxYC-0LaYsk3fd5b-DdDtkwTwpbFNHuhUvSSupPyW6eCe-hYP4CbgsCmmOZge1u2HFAm2v5Cxa67ZMHlgXh3B_mqTI_7_EVjjY65je3qEWbzj7azdVE3FzR9QBt6fQQ7RUtGHDOkUfotZlibatAAHjgMJHTBTbAFOGXCUgKDKvm71YqYDkeTecvWTLBJtZ9BFOJ9f7jLJnOZ3iRLON4rLFMI7sPHIxNSHp-NbEBQPNwjAad9tNNj-RdFEgI7JURFwwUKTw3BqqwiCnhOhGo1bLOfe2K2JUNKkNKFXcUvGB-7NAG18zjXHnU1Cs8QaV0mupThEHX4hF1dcgVM8AvYkcopWJHMWtjV5BT_MwgzEuMm04X42BTHNkQIAACBJYAwVsFXa2_ma0KbPy5ulrQKMiZbRFQbrznHljCFXRd0G0z_ftuZ_9bfo52qEl-sDHbVVTK5kt9ASpJpmpoW3S6NVRudlqtvhm7z3dtGFvt_sNjzd7PD81S3bw
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3dT9swED9BeRgvwL608jU_bE-btcZx3OQBTcBAZUA1TSD1LbMTp5lU0tIGAf_U_kbuXIdqk8Ybb1HsXCLf-e538X0AfCAjqFFuudHacqlFxJOOzrnpysLGNom1K5J03le9S_l9EA2W4E-TC0NhlY1OdIo6H2f0j_yLUHREKtHd-Tq55tQ1ik5XmxYac7E4tfe36LLN9k6-IX8_CnF8dHHY476rAM9Q3GoeImDXsQwL_Mooj0wcBjnCTN1RiQ3jItRdoTMhjAoM3oiSIhBdZSOplJGC6vch3WVYkZTR2oKVg6P-j5-Puj8MXcPlDno1XKlk4NN0fLKepPAkge474o6Y3_1tChf49p8jWWfpjjdgzUNUtj-XqZewZKtXsN60f2BeG7yG6_2KWVeBAg0Xy0o9njEyijn7fYVaiuGs6b3TSEyPhriWdXnFKM5-iEOlizxgdTmeTtisvCmKkWW6yh0dfDGjcHi_LRgZX7p4A5fPstZvoVWNK_sOGOI8lYvQZspEBDriIoiNMUVgIufftyFoFjPNfHlz6rIxSheFmYkBKTIgdQxI79rw6fGZyby4x5OztxsepX6jz9KFWLbhc8O3xfD_qW0-Te09vOhdnJ-lZyf90y1YFZR04WLFt6FVT2_sDkKh2ux6-WPw67lF_gEY8xZH
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VIiEuUF5ioQUf4ARWN3biOAdUVS1LS6HiQKW9BTuxG6Rtdrubivav8euY8TpdgURvvUWxM4k8n-cRzwPgDSlBg7jl1hjHUyMyXgxNzW2eeqddoU0okvT1WB2cpJ_H2XgNfve5MBRW2cvEIKjraUX_yLeFoiPSFN2dbR_DIr7tj3Zm55w6SNFJa99OYwmRI3f1C923xYfDfeT1WyFGH7_vHfDYYYBXCL2OSzTejU6lxy_O6sxqmdRocpqhKpzUXppcmEoIqxKLN7LCJyJXLkuVsqmgWn5I9w7czWVekOOnR5-utYCUofXyEP0brlQxjgk7MW0vpUAlgY48WiCaX_6tFFeW7j-Hs0HnjTbgQTRW2e4SXY9gzbWP4WHfCIJFufAEzndb5kItClRhrGrMdMFIPdbs5xnKK4az5ldBNjEzOcWV7JozRhH3pzjUhBgE1jXT-YwtmgvvJ46Ztg508MWMAuPjBmGkhuniKZzcyko_g_V22rrnwNDiU7WQrlI2I_ND-0Rba31is-DpDyDpF7OsYqFz6rcxKVclmokBJTKgDAwoLwfw7vqZ2bLMx42zN3selXHLL8oVQAfwvufbavj_1F7cTO013EOgl18Oj49ewn1B2RchaHwT1rv5hdtCm6izrwL4GPy4bbT_AVKWGRc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+efficient+chaos+based+image+encryption+algorithm+using+enhanced+thorp+shuffle+and+chaotic+convolution+function&rft.jtitle=Applied+intelligence+%28Dordrecht%2C+Netherlands%29&rft.au=Kumar%2C+C.+Madan&rft.au=Vidhya%2C+R.&rft.au=Brindha%2C+M.&rft.date=2022-02-01&rft.issn=0924-669X&rft.eissn=1573-7497&rft.volume=52&rft.issue=3&rft.spage=2556&rft.epage=2585&rft_id=info:doi/10.1007%2Fs10489-021-02508-x&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10489_021_02508_x
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0924-669X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0924-669X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0924-669X&client=summon