An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function
A Unique chaotic image encryption on the basis of Enhanced Thorp shuffle and Zig-zag Scan based Convolution (ETS-ZSC) is proposed in this paper. A one-dimensional chaotic map is utilized for both shuffling the plain image and producing the critical grid for the convolution activity. The substitution...
Saved in:
Published in | Applied intelligence (Dordrecht, Netherlands) Vol. 52; no. 3; pp. 2556 - 2585 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.02.2022
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
ISSN | 0924-669X 1573-7497 |
DOI | 10.1007/s10489-021-02508-x |
Cover
Abstract | A Unique chaotic image encryption on the basis of Enhanced Thorp shuffle and Zig-zag Scan based Convolution (ETS-ZSC) is proposed in this paper. A one-dimensional chaotic map is utilized for both shuffling the plain image and producing the critical grid for the convolution activity. The substitution operation is performed in two ways: forward substitution and reverse substitution with zigzag scan. The original seed of the logistic map is created from the hyper chaotic system by matching with the plain image to overcome the differential attacks. The security analyzes are held for the proposed method to prove safe against the chosen plain text/known plain text attack. From the simulations results, it is observed that the proposed methodology is having enough high key sensitivity, key space, good randomness, and equal sharing of pixels in cipher image. |
---|---|
AbstractList | A Unique chaotic image encryption on the basis of Enhanced Thorp shuffle and Zig-zag Scan based Convolution (ETS-ZSC) is proposed in this paper. A one-dimensional chaotic map is utilized for both shuffling the plain image and producing the critical grid for the convolution activity. The substitution operation is performed in two ways: forward substitution and reverse substitution with zigzag scan. The original seed of the logistic map is created from the hyper chaotic system by matching with the plain image to overcome the differential attacks. The security analyzes are held for the proposed method to prove safe against the chosen plain text/known plain text attack. From the simulations results, it is observed that the proposed methodology is having enough high key sensitivity, key space, good randomness, and equal sharing of pixels in cipher image. |
Author | Brindha, M. Kumar, C. Madan Vidhya, R. |
Author_xml | – sequence: 1 givenname: C. Madan surname: Kumar fullname: Kumar, C. Madan organization: Department of Computer Science and Engineering, National Institute of Technology – sequence: 2 givenname: R. surname: Vidhya fullname: Vidhya, R. organization: Department of Computer Science and Engineering, National Institute of Technology – sequence: 3 givenname: M. surname: Brindha fullname: Brindha, M. email: brindham@nitt.edu organization: Department of Computer Science and Engineering, National Institute of Technology |
BookMark | eNp9kE1rGzEQhkVIIM7HH8hJkPM2o4_Vao_GtE3A0EsLvQmtLHkVNpIjaUvy7yvbgUAOPgiJ0fvMDM8VOg8xWITuCHwjAN1DJsBl3wAl9bQgm7cztCBtx5qO9905WkBPeSNE__cSXeX8DACMAVmg12XA1jlvvA0Fm1HHjAed7Qb7F7212AaT3nfFx4D1tI3Jl_EFz9mHbf0adTA1WcaYdjiPs3OTxTpsDn2KN9jE8C9O8wF3czD7xw26cHrK9vbjvkZ_fnz_vXps1r9-Pq2W68Yw0peGCSG05Mwx2bebdpCMbKSkGkRvmXRMd1QbSgdBhlpoe0doJ2zLhRg4BcrZNbo_9t2l-DrbXNRznFOoIxUVtAPgHGhNyWPKpJhzsk4ZX_R-z5K0nxQBtResjoJVFawOgtVbRekXdJeqtPR-GmJHKNdw2Nr0udUJ6j-vnZGL |
CitedBy_id | crossref_primary_10_1016_j_prime_2024_100642 crossref_primary_10_1007_s10489_021_03063_1 crossref_primary_10_1088_1402_4896_ad8d47 crossref_primary_10_1007_s11227_025_06943_2 crossref_primary_10_3233_IDT_230547 crossref_primary_10_1007_s12530_022_09482_w crossref_primary_10_1155_2022_4960465 crossref_primary_10_3390_app13127168 crossref_primary_10_1007_s11042_024_18245_5 crossref_primary_10_1007_s11042_024_18959_6 crossref_primary_10_1007_s00521_023_08643_5 crossref_primary_10_1117_1_JEI_34_2_023017 crossref_primary_10_1007_s11042_022_12765_8 crossref_primary_10_32604_cmc_2023_032236 crossref_primary_10_1007_s11071_022_07958_7 crossref_primary_10_1016_j_optlastec_2023_109345 crossref_primary_10_1038_s41598_024_84186_6 crossref_primary_10_1088_1402_4896_ad1fc3 crossref_primary_10_1007_s11517_023_02925_9 crossref_primary_10_1016_j_chaos_2024_115020 crossref_primary_10_3390_s23031415 crossref_primary_10_1016_j_ijleo_2022_169357 crossref_primary_10_1007_s10489_023_04996_5 crossref_primary_10_1088_1402_4896_ad14d1 crossref_primary_10_1007_s10489_021_03071_1 crossref_primary_10_1007_s00340_023_08029_4 crossref_primary_10_1007_s11042_023_17438_8 crossref_primary_10_1186_s44147_024_00376_z crossref_primary_10_1080_13682199_2023_2187513 crossref_primary_10_1109_ACCESS_2024_3377665 crossref_primary_10_1007_s11071_024_09696_4 crossref_primary_10_1007_s11042_023_15240_0 crossref_primary_10_3390_e27030299 crossref_primary_10_3390_math10224374 crossref_primary_10_1007_s00500_023_08170_4 crossref_primary_10_3390_e25081178 crossref_primary_10_1007_s10489_023_04759_2 crossref_primary_10_1007_s00371_023_02876_0 crossref_primary_10_1080_13682199_2022_2156669 crossref_primary_10_1088_1402_4896_ac6d85 crossref_primary_10_1007_s11042_023_17236_2 crossref_primary_10_3390_math10122034 crossref_primary_10_1007_s11042_023_15593_6 crossref_primary_10_1007_s12596_024_02405_9 crossref_primary_10_1007_s10489_022_03174_3 crossref_primary_10_1016_j_jisa_2023_103592 crossref_primary_10_1007_s10489_024_05447_5 crossref_primary_10_1088_1402_4896_ad76e5 crossref_primary_10_1007_s11042_023_16025_1 crossref_primary_10_1016_j_jisa_2023_103677 crossref_primary_10_1088_1674_1056_ada7db crossref_primary_10_1007_s11071_023_08545_0 crossref_primary_10_1109_ACCESS_2022_3230096 crossref_primary_10_1007_s10462_022_10295_1 crossref_primary_10_1007_s10489_023_04727_w |
Cites_doi | 10.1016/j.ins.2019.08.041 10.1016/j.ins.2020.12.002 10.1016/j.optlaseng.2016.10.006 10.1007/s11071-016-3153-y 10.1016/j.sigpro.2020.107790 10.1016/j.image.2016.12.007 10.1155/2019/8694678 10.1016/j.sigpro.2017.03.011 10.1016/j.optlaseng.2015.09.007 10.1016/j.sigpro.2016.10.002 10.1007/s11071-015-2579-y 10.1142/S021812749800098X 10.1016/j.asoc.2012.01.016 10.1016/j.ins.2020.09.055 10.1007/s11071-010-9749-8 10.1016/j.chaos.2004.11.096 10.1109/MMUL.2011.54 10.1016/j.asoc.2015.09.055 10.1016/j.optlaseng.2014.08.005 10.1007/s11042-018-6996-z 10.1109/TSP.2020.2979596 10.6028/NIST.SP.800-22 10.1016/j.optlastec.2017.10.024 10.1016/j.compeleceng.2015.11.008 10.1016/j.optcom.2011.04.001 10.1016/j.compbiomed.2015.07.024 10.1016/j.optlaseng.2017.04.009 10.1016/j.optlaseng.2019.105836 10.1109/ACCESS.2020.2970806 10.1016/j.camwa.2010.03.017 10.1109/TIFS.2015.2489178 10.1007/s11042-017-4772-0 10.1007/978-3-642-03356-8_17 10.1002/j.1538-7305.1949.tb00928.x 10.1016/j.ins.2018.12.048 10.1080/13682199.2020.1732116 10.1016/j.ins.2014.02.156 10.1016/j.sigpro.2018.11.010 10.1016/j.optlastec.2019.01.043 10.1201/9781420013450-4 10.1109/MMUL.2015.72 10.1016/j.asoc.2014.09.039 10.1016/j.optlaseng.2016.10.020 10.1016/j.sigpro.2015.06.008 10.1016/S0375-9601(98)00086-3 10.1155/2014/427349 10.1016/j.optlaseng.2015.03.022 10.1016/j.image.2015.10.004 10.1016/j.ins.2020.09.032 10.1016/j.sigpro.2011.10.023 10.1155/2020/7913061 10.1007/s11554-020-00948-1 10.1080/0161-118991863745 10.1016/j.ins.2019.02.049 10.1109/TIFS.2018.2812080 10.1109/81.904880 10.1016/j.ins.2020.06.030 10.1007/s11042-016-3585-x 10.1007/s11042-012-1292-9 10.1049/iet-cvi.2015.0344 10.1007/s11042-018-6534-z |
ContentType | Journal Article |
Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8FD 8FE 8FG 8FK 8FL ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- L.- L6V L7M L~C L~D M0C M0N M7S P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PSYQQ PTHSS Q9U |
DOI | 10.1007/s10489-021-02508-x |
DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials - QC ProQuest Central Business Premium Collection Technology Collection ProQuest One ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced ProQuest Engineering Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Engineering Database ProQuest advanced technologies & aerospace journals ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest One Psychology Engineering Collection ProQuest Central Basic |
DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business ProQuest One Psychology Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Engineering Collection Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing Engineering Database ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Business (Alumni) ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) Business Premium Collection (Alumni) |
DatabaseTitleList | ABI/INFORM Global (Corporate) |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1573-7497 |
EndPage | 2585 |
ExternalDocumentID | 10_1007_s10489_021_02508_x |
GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C -~X .86 .DC .VR 06D 0R~ 0VY 1N0 1SB 2.D 203 23M 28- 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 77K 7WY 8FE 8FG 8FL 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABIVO ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTAH ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW L6V LAK LLZTM M0C M0N M4Y M7S MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PSYQQ PT4 PT5 PTHSS Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7X Z7Z Z81 Z83 Z88 Z8M Z8N Z8R Z8T Z8U Z8W Z92 ZMTXR ZY4 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ACSTC ADHKG ADKFA AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT 7SC 7XB 8AL 8FD 8FK ABRTQ JQ2 L.- L7M L~C L~D PKEHL PQEST PQGLB PQUKI Q9U |
ID | FETCH-LOGICAL-c319t-3666a843f3895d5b831d882a069e38f3a72ac22b61b9e359f1276e5466b420243 |
IEDL.DBID | U2A |
ISSN | 0924-669X |
IngestDate | Fri Jul 25 12:19:17 EDT 2025 Tue Jul 01 03:31:45 EDT 2025 Thu Apr 24 23:10:48 EDT 2025 Fri Feb 21 02:47:41 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Chaos Enhanced Thorp shuffle Image encryption Convolution |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c319t-3666a843f3895d5b831d882a069e38f3a72ac22b61b9e359f1276e5466b420243 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2627004402 |
PQPubID | 326365 |
PageCount | 30 |
ParticipantIDs | proquest_journals_2627004402 crossref_citationtrail_10_1007_s10489_021_02508_x crossref_primary_10_1007_s10489_021_02508_x springer_journals_10_1007_s10489_021_02508_x |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20220200 2022-02-00 20220201 |
PublicationDateYYYYMMDD | 2022-02-01 |
PublicationDate_xml | – month: 2 year: 2022 text: 20220200 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York – name: Boston |
PublicationSubtitle | The International Journal of Research on Intelligent Systems for Real Life Complex Problems |
PublicationTitle | Applied intelligence (Dordrecht, Netherlands) |
PublicationTitleAbbrev | Appl Intell |
PublicationYear | 2022 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | ShannonCECommunication theory of secrecy systemsBell Syst Tech J1949284656715321331200.94005 XianYWangXFractal sorting matrix and its application on chaotic image encryptionInf Sci202054711541169416304707437618 Morris B, Rogaway P, Stegers T (2009) How to encipher messages on a small domain. In: Advances in Cryptology-CRYPTO 2009. Springer, pp 286–302 LiYWangCChenHA hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutationOpt Lasers Eng201790238246 Asgari-ChenaghluMBalafarM-AFeizi-DerakhshiM-RA novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generationSignal Process2019157113 MatthewsROn the derivation of a “chaotic” encryption algorithmCryptologia19891312942975822 LiuHWenFKadirAConstruction of a new 2d chebyshev-sine map and its application to color image encryptionMultimed Tools Appl201978121599716010 Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) Image encryption with double spiral scans and chaotic maps. Secur Commun Netw 2019 HuaZZhangYZhouYTwo-dimensional modular chaotification system for improving chaos complexityIEEE Trans Signal Process202068193719494114667 ZhangWYuHZhaoY-IZhuZ-IImage encryption based on three-dimensional bit matrix permutationSignal Process20161183650 YavuzEYazıcıRKasapbaşıMCYamaçEA chaos-based image encryption algorithm with simple logical functionsComput Electr Eng201654471483 LuQZhuCDengXAn efficient image encryption scheme based on the lss chaotic map and single s-boxIEEE Access202082566425678 MuruganBGounderAGNImage encryption scheme based on block-based confusion and multiple levels of diffusionIET Comput Vis2016106593602 WangX-YYangLLiuRKadirAA chaotic image encryption algorithm based on perceptron modelNonlinear Dyn201062361562129433691209.94015 XuLLiZLiJHuaWA novel bit-level image encryption algorithm based on chaotic mapsOpt Lasers Eng2016781725 ZahmoulREjbaliRZaiedMImage encryption based on new beta chaotic mapsOpt Lasers Eng2017963949 KandarSChaudhuriDBhattacharjeeADharaBCImage encryption using sequence generated by cyclic groupJ Inf Secur Appl201944117129 LiQWangXWangXMaBWangCShiYAn encrypted coverless information hiding method based on generative modelsInf Sci202155319304193051 ChenLMaBZhaoXWangSDifferential cryptanalysis of a novel image encryption algorithm based on chaos and line mapNonlinear Dyn2017873179718071384.94043 NorouziBMirzakuchakiSSeyedzadehSMMosaviMRA simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion processMultimed Tools Appl201471314691497 WangXFengLZhaoHFast image encryption algorithm based on parallel computing systemInf Sci20194863403581451.68308 YavuzEA novel chaotic image encryption algorithm based on content-sensitive dynamic function switching schemeOpt Laser Technol2019114224239 BrindhaMGoundenNAA chaos based image encryption and lossless compression algorithm using hash table and chinese remainder theoremAppl Soft Comput201640379390 ZhangY-QWangX-YA symmetric image encryption algorithm based on mixed linear–nonlinear coupled map latticeInf Sci2014273329351 EnayatifarRAbdullahAHIsninIFAltameemALeeMImage encryption using a synchronous permutation-diffusion techniqueOpt Lasers Eng201790146154 WuYNoonanJPAgaianSNpcr and uaci randomness tests for image encryptionCyber J Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT)2011123138 Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications, Technical Report. Booz-Allen and Hamilton Inc Mclean Va ChenLWangSDifferential cryptanalysis of a medical image cryptosystem with multiple roundsComput Biol Med2015656975 HuaZZhouYHuangHCosine-transform-based chaotic system for image encryptionInf Sci2019480403419 ZhangY-QWangX-YA new image encryption algorithm based on non-adjacent coupled map latticesAppl Soft Comput2015261020 ChaiXYangKGanZA new chaos-based image encryption algorithm with dynamic key selection mechanismsMultimed Tools Appl201776799079927 Guo J-I, et al. (2000) A new chaotic key-based design for image encryption and decryption. In: 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on Circuits and Systems, vol 4. IEEE, pp 49–52 LuoYTangSLiuJCaoLQiuSImage encryption scheme by combining the hyper-chaotic system with quantum codingOpt Lasers Eng2020124105836 WangXTengLQinXA novel colour image encryption algorithm based on chaosSignal Process2012924110111082998170 MusannaFDangwalDKumarSMalikVA chaos-based image encryption algorithm based on multiresolution singular value decomposition and a symmetric attractorImaging Sci J20206812440 YeGHuangXAn image encryption algorithm based on autoblocking and electrocardiographyIEEE MultiMedia20162326471 WangXLiuCXuDLiuCImage encryption scheme using chaos and simulated annealing algorithmNonlinear Dyn2016843141714293486578 ChaiXGanZYangKChenYLiuXAn image encryption algorithm based on the memristive hyperchaotic system, cellular automata and dna sequence operationsSignal Process Image Commun201752619 XieEYLiCYuSLüJOn the cryptanalysis of fridrich’s chaotic image encryption schemeSignal Processxs2017132150154 FridrichJSymmetric ciphers based on two-dimensional chaotic mapsInt J Bifurcation Chaos19988061259128416637820935.94019 BaptistaMSCryptography with chaosPhys Lett A19982401-2505416196210936.94013 El AssadSFarajallahMA new chaos-based image encryption systemSignal Process Image Commun201641144157 Katz J, Menezes A J, Van Oorschot P C, Vanstone S A (1996) Handbook of applied cryptography. CRC press WangX-YZhangY-QBaoX-MA novel chaotic image encryption scheme using dna sequence operationsOpt Lasers Eng2015735361 Li S, Chen G, Zheng X (2006) Chaos-based encryption for digital image and video. Multimed Encrypt Authen Tech Appl 129 Talhaoui M Z, Wang X, Midoun M A (2020) Fast image encryption algorithm with high security level using the bülban chaotic map. J Real-Time Image Proc:1–14 PakCHuangLA new color image encryption using combination of the 1d chaotic mapSignal Process2017138129137 JolfaeiAWuX-WMuthukkumarasamyVOn the security of permutation-only image encryption schemesIEEE Trans Inf Forensic Secur2016112235246 WangXLintao LiuYZA novel chaotic block image encryption algorithm based on dynamic random growth techniqueOpt Lasers Eng2015661018 WangXGaoSImage encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean networkInf Sci202053919521441173981474.68443 Dalhoum A, Latif A, Mahafzah B A, Awwad A A, Aldhamari I, Ortega A, Alfonseca M (2012) Digital image scrambling using 2d cellular automata. IEEE Multimedia Chen J-X, Zhu Z-I, Zhang L-B, Fu C, Yu H (2014) An efficient diffusion scheme for chaos-based digital image encryption. Math Probl Eng 2014 LianSSunJWangZA block cipher based on a suitable use of the chaotic standard mapChaos Solitons Fractals20052611171291093.37504 JakimoskiGKocarevLChaos and cryptography: block encryption ciphers based on chaotic mapsIEEE Trans Circ Syst I: Fund Theory Appl200148216316918205410998.94016 Premkumar R, Anand S (2018) Secured and compound 3-d chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl:1–17 LiuHWangXColor image encryption using spatial bit-level permutation and high-dimension chaotic systemOpt Commun201128416-1738953903 PreishuberMHütterTKatzenbeisserSUhlADepreciating motivation and empirical security analysis of chaos-based image and video encryptionIEEE Trans Inf Forensic Secur201813921372150 ParvazRZarebniaMA combination chaotic system and application in color image encryptionOpt Laser Technol20181013041 LiuHWangXImage encryption using dna complementary rule and chaotic mapsAppl Soft Comput201212514571466 HuaZZhuZYiSZhangZHuangHCross-plane colour image encryption using a two-dimensional logistic tent modular mapInf Sci2021546106310834162364 LiuHWangXColor image encryption based on one-time keys and robust chaotic mapsComput Math Appl201059103320332726518711198.94109 KahanWIeee standard 754 for binary floating-point arithmeticLect Notes Status IEEE199675494720-177611 WangXGaoSImage encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theoryInf Sci2020507163639944631456.68034 HuGLiBCoupling chaotic system based on unit transform and its applications in image encryptionSignal Process2021178107790 Xiao S, Yu Z, Deng Y (2020) Design and analysis of a novel chaos-based image encryption algorithm via switch control mechanism. Security and Communication Networks 2020 GanZChaiXYuanKLuYA novel image encryption algorithm based on lft based s-boxes and chaosMultimed Tools Appl201877787598783 R Matthews (2508_CR3) 1989; 13 Y-Q Zhang (2508_CR58) 2014; 273 S El Assad (2508_CR21) 2016; 41 G Jakimoski (2508_CR2) 2001; 48 J Fridrich (2508_CR4) 1998; 8 H Liu (2508_CR48) 2010; 59 X-Y Wang (2508_CR51) 2010; 62 2508_CR60 2508_CR61 M Preishuber (2508_CR65) 2018; 13 2508_CR52 2508_CR53 Z Gan (2508_CR57) 2018; 77 L Xu (2508_CR12) 2016; 78 2508_CR19 X Wang (2508_CR42) 2019; 486 Y Wu (2508_CR54) 2011; 1 2508_CR1 X Wang (2508_CR43) 2020; 539 W Zhang (2508_CR13) 2016; 118 S Lian (2508_CR6) 2005; 26 E Yavuz (2508_CR10) 2019; 114 X Chai (2508_CR23) 2017; 52 C Pak (2508_CR7) 2017; 138 X Wang (2508_CR62) 2012; 92 CE Shannon (2508_CR5) 1949; 28 L Chen (2508_CR64) 2015; 65 R Parvaz (2508_CR8) 2018; 101 2508_CR22 Z Hua (2508_CR46) 2021; 546 H Liu (2508_CR50) 2012; 12 2508_CR27 H Liu (2508_CR30) 2019; 78 X Wang (2508_CR41) 2015; 66 2508_CR28 G Ye (2508_CR38) 2016; 23 B Murugan (2508_CR17) 2016; 10 Y Luo (2508_CR18) 2020; 124 F Musanna (2508_CR33) 2020; 68 R Zahmoul (2508_CR11) 2017; 96 S Kandar (2508_CR14) 2019; 44 A Jolfaei (2508_CR35) 2016; 11 Q Lu (2508_CR31) 2020; 8 B Norouzi (2508_CR24) 2014; 71 L Chen (2508_CR63) 2017; 87 2508_CR32 2508_CR37 X Wang (2508_CR66) 2016; 84 Z Hua (2508_CR15) 2019; 480 E Yavuz (2508_CR20) 2016; 54 Y-Q Zhang (2508_CR56) 2015; 26 Z Hua (2508_CR47) 2020; 68 X-Y Wang (2508_CR40) 2015; 73 M Asgari-Chenaghlu (2508_CR25) 2019; 157 G Hu (2508_CR29) 2021; 178 Q Li (2508_CR45) 2021; 553 MS Baptista (2508_CR36) 1998; 240 M Brindha (2508_CR16) 2016; 40 H Liu (2508_CR49) 2011; 284 Y Li (2508_CR9) 2017; 90 X Wang (2508_CR44) 2020; 507 EY Xie (2508_CR34) 2017; 132 X Chai (2508_CR59) 2017; 76 W Kahan (2508_CR55) 1996; 754 Y Xian (2508_CR26) 2020; 547 R Enayatifar (2508_CR39) 2017; 90 |
References_xml | – reference: Morris B, Rogaway P, Stegers T (2009) How to encipher messages on a small domain. In: Advances in Cryptology-CRYPTO 2009. Springer, pp 286–302 – reference: Guo J-I, et al. (2000) A new chaotic key-based design for image encryption and decryption. In: 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on Circuits and Systems, vol 4. IEEE, pp 49–52 – reference: WangXLintao LiuYZA novel chaotic block image encryption algorithm based on dynamic random growth techniqueOpt Lasers Eng2015661018 – reference: NorouziBMirzakuchakiSSeyedzadehSMMosaviMRA simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion processMultimed Tools Appl201471314691497 – reference: Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications, Technical Report. Booz-Allen and Hamilton Inc Mclean Va – reference: LiuHWangXColor image encryption using spatial bit-level permutation and high-dimension chaotic systemOpt Commun201128416-1738953903 – reference: Katz J, Menezes A J, Van Oorschot P C, Vanstone S A (1996) Handbook of applied cryptography. CRC press – reference: XianYWangXFractal sorting matrix and its application on chaotic image encryptionInf Sci202054711541169416304707437618 – reference: LuoYTangSLiuJCaoLQiuSImage encryption scheme by combining the hyper-chaotic system with quantum codingOpt Lasers Eng2020124105836 – reference: YavuzEA novel chaotic image encryption algorithm based on content-sensitive dynamic function switching schemeOpt Laser Technol2019114224239 – reference: MuruganBGounderAGNImage encryption scheme based on block-based confusion and multiple levels of diffusionIET Comput Vis2016106593602 – reference: WangXFengLZhaoHFast image encryption algorithm based on parallel computing systemInf Sci20194863403581451.68308 – reference: ChenLMaBZhaoXWangSDifferential cryptanalysis of a novel image encryption algorithm based on chaos and line mapNonlinear Dyn2017873179718071384.94043 – reference: Premkumar R, Anand S (2018) Secured and compound 3-d chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl:1–17 – reference: WuYNoonanJPAgaianSNpcr and uaci randomness tests for image encryptionCyber J Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT)2011123138 – reference: HuaZZhangYZhouYTwo-dimensional modular chaotification system for improving chaos complexityIEEE Trans Signal Process202068193719494114667 – reference: HuaZZhouYHuangHCosine-transform-based chaotic system for image encryptionInf Sci2019480403419 – reference: ShannonCECommunication theory of secrecy systemsBell Syst Tech J1949284656715321331200.94005 – reference: XieEYLiCYuSLüJOn the cryptanalysis of fridrich’s chaotic image encryption schemeSignal Processxs2017132150154 – reference: YeGHuangXAn image encryption algorithm based on autoblocking and electrocardiographyIEEE MultiMedia20162326471 – reference: Dalhoum A, Latif A, Mahafzah B A, Awwad A A, Aldhamari I, Ortega A, Alfonseca M (2012) Digital image scrambling using 2d cellular automata. IEEE Multimedia – reference: MusannaFDangwalDKumarSMalikVA chaos-based image encryption algorithm based on multiresolution singular value decomposition and a symmetric attractorImaging Sci J20206812440 – reference: Talhaoui M Z, Wang X, Midoun M A (2020) Fast image encryption algorithm with high security level using the bülban chaotic map. J Real-Time Image Proc:1–14 – reference: ZhangY-QWangX-YA symmetric image encryption algorithm based on mixed linear–nonlinear coupled map latticeInf Sci2014273329351 – reference: PakCHuangLA new color image encryption using combination of the 1d chaotic mapSignal Process2017138129137 – reference: KahanWIeee standard 754 for binary floating-point arithmeticLect Notes Status IEEE199675494720-177611 – reference: XuLLiZLiJHuaWA novel bit-level image encryption algorithm based on chaotic mapsOpt Lasers Eng2016781725 – reference: PreishuberMHütterTKatzenbeisserSUhlADepreciating motivation and empirical security analysis of chaos-based image and video encryptionIEEE Trans Inf Forensic Secur201813921372150 – reference: Xiao S, Yu Z, Deng Y (2020) Design and analysis of a novel chaos-based image encryption algorithm via switch control mechanism. Security and Communication Networks 2020 – reference: ZhangY-QWangX-YA new image encryption algorithm based on non-adjacent coupled map latticesAppl Soft Comput2015261020 – reference: WangXGaoSImage encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theoryInf Sci2020507163639944631456.68034 – reference: ParvazRZarebniaMA combination chaotic system and application in color image encryptionOpt Laser Technol20181013041 – reference: ChaiXGanZYangKChenYLiuXAn image encryption algorithm based on the memristive hyperchaotic system, cellular automata and dna sequence operationsSignal Process Image Commun201752619 – reference: HuaZZhuZYiSZhangZHuangHCross-plane colour image encryption using a two-dimensional logistic tent modular mapInf Sci2021546106310834162364 – reference: El AssadSFarajallahMA new chaos-based image encryption systemSignal Process Image Commun201641144157 – reference: Li S, Chen G, Zheng X (2006) Chaos-based encryption for digital image and video. Multimed Encrypt Authen Tech Appl 129 – reference: WangX-YZhangY-QBaoX-MA novel chaotic image encryption scheme using dna sequence operationsOpt Lasers Eng2015735361 – reference: WangX-YYangLLiuRKadirAA chaotic image encryption algorithm based on perceptron modelNonlinear Dyn201062361562129433691209.94015 – reference: WangXTengLQinXA novel colour image encryption algorithm based on chaosSignal Process2012924110111082998170 – reference: LiuHWangXImage encryption using dna complementary rule and chaotic mapsAppl Soft Comput201212514571466 – reference: LiuHWenFKadirAConstruction of a new 2d chebyshev-sine map and its application to color image encryptionMultimed Tools Appl201978121599716010 – reference: LiQWangXWangXMaBWangCShiYAn encrypted coverless information hiding method based on generative modelsInf Sci202155319304193051 – reference: MatthewsROn the derivation of a “chaotic” encryption algorithmCryptologia19891312942975822 – reference: HuGLiBCoupling chaotic system based on unit transform and its applications in image encryptionSignal Process2021178107790 – reference: GanZChaiXYuanKLuYA novel image encryption algorithm based on lft based s-boxes and chaosMultimed Tools Appl201877787598783 – reference: LianSSunJWangZA block cipher based on a suitable use of the chaotic standard mapChaos Solitons Fractals20052611171291093.37504 – reference: ZahmoulREjbaliRZaiedMImage encryption based on new beta chaotic mapsOpt Lasers Eng2017963949 – reference: FridrichJSymmetric ciphers based on two-dimensional chaotic mapsInt J Bifurcation Chaos19988061259128416637820935.94019 – reference: ChaiXYangKGanZA new chaos-based image encryption algorithm with dynamic key selection mechanismsMultimed Tools Appl201776799079927 – reference: WangXLiuCXuDLiuCImage encryption scheme using chaos and simulated annealing algorithmNonlinear Dyn2016843141714293486578 – reference: BrindhaMGoundenNAA chaos based image encryption and lossless compression algorithm using hash table and chinese remainder theoremAppl Soft Comput201640379390 – reference: WangXGaoSImage encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean networkInf Sci202053919521441173981474.68443 – reference: Chen J-X, Zhu Z-I, Zhang L-B, Fu C, Yu H (2014) An efficient diffusion scheme for chaos-based digital image encryption. Math Probl Eng 2014 – reference: YavuzEYazıcıRKasapbaşıMCYamaçEA chaos-based image encryption algorithm with simple logical functionsComput Electr Eng201654471483 – reference: LiuHWangXColor image encryption based on one-time keys and robust chaotic mapsComput Math Appl201059103320332726518711198.94109 – reference: LuQZhuCDengXAn efficient image encryption scheme based on the lss chaotic map and single s-boxIEEE Access202082566425678 – reference: JolfaeiAWuX-WMuthukkumarasamyVOn the security of permutation-only image encryption schemesIEEE Trans Inf Forensic Secur2016112235246 – reference: LiYWangCChenHA hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutationOpt Lasers Eng201790238246 – reference: KandarSChaudhuriDBhattacharjeeADharaBCImage encryption using sequence generated by cyclic groupJ Inf Secur Appl201944117129 – reference: Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) Image encryption with double spiral scans and chaotic maps. Secur Commun Netw 2019 – reference: BaptistaMSCryptography with chaosPhys Lett A19982401-2505416196210936.94013 – reference: ZhangWYuHZhaoY-IZhuZ-IImage encryption based on three-dimensional bit matrix permutationSignal Process20161183650 – reference: EnayatifarRAbdullahAHIsninIFAltameemALeeMImage encryption using a synchronous permutation-diffusion techniqueOpt Lasers Eng201790146154 – reference: JakimoskiGKocarevLChaos and cryptography: block encryption ciphers based on chaotic mapsIEEE Trans Circ Syst I: Fund Theory Appl200148216316918205410998.94016 – reference: Asgari-ChenaghluMBalafarM-AFeizi-DerakhshiM-RA novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generationSignal Process2019157113 – reference: ChenLWangSDifferential cryptanalysis of a medical image cryptosystem with multiple roundsComput Biol Med2015656975 – volume: 507 start-page: 16 year: 2020 ident: 2508_CR44 publication-title: Inf Sci doi: 10.1016/j.ins.2019.08.041 – volume: 1 start-page: 31 issue: 2 year: 2011 ident: 2508_CR54 publication-title: Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT) – volume: 553 start-page: 19 year: 2021 ident: 2508_CR45 publication-title: Inf Sci doi: 10.1016/j.ins.2020.12.002 – volume: 90 start-page: 146 year: 2017 ident: 2508_CR39 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.10.006 – ident: 2508_CR61 – volume: 87 start-page: 1797 issue: 3 year: 2017 ident: 2508_CR63 publication-title: Nonlinear Dyn doi: 10.1007/s11071-016-3153-y – volume: 44 start-page: 117 year: 2019 ident: 2508_CR14 publication-title: J Inf Secur Appl – volume: 178 start-page: 107790 year: 2021 ident: 2508_CR29 publication-title: Signal Process doi: 10.1016/j.sigpro.2020.107790 – volume: 52 start-page: 6 year: 2017 ident: 2508_CR23 publication-title: Signal Process Image Commun doi: 10.1016/j.image.2016.12.007 – ident: 2508_CR32 doi: 10.1155/2019/8694678 – volume: 138 start-page: 129 year: 2017 ident: 2508_CR7 publication-title: Signal Process doi: 10.1016/j.sigpro.2017.03.011 – volume: 78 start-page: 17 year: 2016 ident: 2508_CR12 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2015.09.007 – volume: 132 start-page: 150 year: 2017 ident: 2508_CR34 publication-title: Signal Processxs doi: 10.1016/j.sigpro.2016.10.002 – volume: 84 start-page: 1417 issue: 3 year: 2016 ident: 2508_CR66 publication-title: Nonlinear Dyn doi: 10.1007/s11071-015-2579-y – volume: 8 start-page: 1259 issue: 06 year: 1998 ident: 2508_CR4 publication-title: Int J Bifurcation Chaos doi: 10.1142/S021812749800098X – volume: 12 start-page: 1457 issue: 5 year: 2012 ident: 2508_CR50 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2012.01.016 – volume: 547 start-page: 1154 year: 2020 ident: 2508_CR26 publication-title: Inf Sci doi: 10.1016/j.ins.2020.09.055 – volume: 62 start-page: 615 issue: 3 year: 2010 ident: 2508_CR51 publication-title: Nonlinear Dyn doi: 10.1007/s11071-010-9749-8 – volume: 26 start-page: 117 issue: 1 year: 2005 ident: 2508_CR6 publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2004.11.096 – ident: 2508_CR53 doi: 10.1109/MMUL.2011.54 – volume: 40 start-page: 379 year: 2016 ident: 2508_CR16 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2015.09.055 – volume: 66 start-page: 10 year: 2015 ident: 2508_CR41 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2014.08.005 – volume: 78 start-page: 15997 issue: 12 year: 2019 ident: 2508_CR30 publication-title: Multimed Tools Appl doi: 10.1007/s11042-018-6996-z – volume: 68 start-page: 1937 year: 2020 ident: 2508_CR47 publication-title: IEEE Trans Signal Process doi: 10.1109/TSP.2020.2979596 – ident: 2508_CR60 doi: 10.6028/NIST.SP.800-22 – volume: 101 start-page: 30 year: 2018 ident: 2508_CR8 publication-title: Opt Laser Technol doi: 10.1016/j.optlastec.2017.10.024 – volume: 54 start-page: 471 year: 2016 ident: 2508_CR20 publication-title: Comput Electr Eng doi: 10.1016/j.compeleceng.2015.11.008 – volume: 284 start-page: 3895 issue: 16-17 year: 2011 ident: 2508_CR49 publication-title: Opt Commun doi: 10.1016/j.optcom.2011.04.001 – volume: 65 start-page: 69 year: 2015 ident: 2508_CR64 publication-title: Comput Biol Med doi: 10.1016/j.compbiomed.2015.07.024 – volume: 96 start-page: 39 year: 2017 ident: 2508_CR11 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2017.04.009 – volume: 124 start-page: 105836 year: 2020 ident: 2508_CR18 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2019.105836 – volume: 8 start-page: 25664 year: 2020 ident: 2508_CR31 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2970806 – volume: 59 start-page: 3320 issue: 10 year: 2010 ident: 2508_CR48 publication-title: Comput Math Appl doi: 10.1016/j.camwa.2010.03.017 – volume: 11 start-page: 235 issue: 2 year: 2016 ident: 2508_CR35 publication-title: IEEE Trans Inf Forensic Secur doi: 10.1109/TIFS.2015.2489178 – volume: 77 start-page: 8759 issue: 7 year: 2018 ident: 2508_CR57 publication-title: Multimed Tools Appl doi: 10.1007/s11042-017-4772-0 – ident: 2508_CR52 doi: 10.1007/978-3-642-03356-8_17 – volume: 28 start-page: 656 issue: 4 year: 1949 ident: 2508_CR5 publication-title: Bell Syst Tech J doi: 10.1002/j.1538-7305.1949.tb00928.x – volume: 480 start-page: 403 year: 2019 ident: 2508_CR15 publication-title: Inf Sci doi: 10.1016/j.ins.2018.12.048 – volume: 68 start-page: 24 issue: 1 year: 2020 ident: 2508_CR33 publication-title: Imaging Sci J doi: 10.1080/13682199.2020.1732116 – volume: 273 start-page: 329 year: 2014 ident: 2508_CR58 publication-title: Inf Sci doi: 10.1016/j.ins.2014.02.156 – volume: 157 start-page: 1 year: 2019 ident: 2508_CR25 publication-title: Signal Process doi: 10.1016/j.sigpro.2018.11.010 – volume: 114 start-page: 224 year: 2019 ident: 2508_CR10 publication-title: Opt Laser Technol doi: 10.1016/j.optlastec.2019.01.043 – ident: 2508_CR1 doi: 10.1201/9781420013450-4 – volume: 23 start-page: 64 issue: 2 year: 2016 ident: 2508_CR38 publication-title: IEEE MultiMedia doi: 10.1109/MMUL.2015.72 – volume: 26 start-page: 10 year: 2015 ident: 2508_CR56 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2014.09.039 – volume: 90 start-page: 238 year: 2017 ident: 2508_CR9 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.10.020 – volume: 118 start-page: 36 year: 2016 ident: 2508_CR13 publication-title: Signal Process doi: 10.1016/j.sigpro.2015.06.008 – volume: 240 start-page: 50 issue: 1-2 year: 1998 ident: 2508_CR36 publication-title: Phys Lett A doi: 10.1016/S0375-9601(98)00086-3 – ident: 2508_CR37 doi: 10.1155/2014/427349 – ident: 2508_CR19 – volume: 73 start-page: 53 year: 2015 ident: 2508_CR40 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2015.03.022 – volume: 41 start-page: 144 year: 2016 ident: 2508_CR21 publication-title: Signal Process Image Commun doi: 10.1016/j.image.2015.10.004 – volume: 546 start-page: 1063 year: 2021 ident: 2508_CR46 publication-title: Inf Sci doi: 10.1016/j.ins.2020.09.032 – volume: 92 start-page: 1101 issue: 4 year: 2012 ident: 2508_CR62 publication-title: Signal Process doi: 10.1016/j.sigpro.2011.10.023 – ident: 2508_CR28 doi: 10.1155/2020/7913061 – ident: 2508_CR27 doi: 10.1007/s11554-020-00948-1 – volume: 754 start-page: 11 issue: 94720-1776 year: 1996 ident: 2508_CR55 publication-title: Lect Notes Status IEEE – volume: 13 start-page: 29 issue: 1 year: 1989 ident: 2508_CR3 publication-title: Cryptologia doi: 10.1080/0161-118991863745 – volume: 486 start-page: 340 year: 2019 ident: 2508_CR42 publication-title: Inf Sci doi: 10.1016/j.ins.2019.02.049 – volume: 13 start-page: 2137 issue: 9 year: 2018 ident: 2508_CR65 publication-title: IEEE Trans Inf Forensic Secur doi: 10.1109/TIFS.2018.2812080 – volume: 48 start-page: 163 issue: 2 year: 2001 ident: 2508_CR2 publication-title: IEEE Trans Circ Syst I: Fund Theory Appl doi: 10.1109/81.904880 – volume: 539 start-page: 195 year: 2020 ident: 2508_CR43 publication-title: Inf Sci doi: 10.1016/j.ins.2020.06.030 – volume: 76 start-page: 9907 issue: 7 year: 2017 ident: 2508_CR59 publication-title: Multimed Tools Appl doi: 10.1007/s11042-016-3585-x – volume: 71 start-page: 1469 issue: 3 year: 2014 ident: 2508_CR24 publication-title: Multimed Tools Appl doi: 10.1007/s11042-012-1292-9 – volume: 10 start-page: 593 issue: 6 year: 2016 ident: 2508_CR17 publication-title: IET Comput Vis doi: 10.1049/iet-cvi.2015.0344 – ident: 2508_CR22 doi: 10.1007/s11042-018-6534-z |
SSID | ssj0003301 |
Score | 2.5088484 |
Snippet | A Unique chaotic image encryption on the basis of Enhanced Thorp shuffle and Zig-zag Scan based Convolution (ETS-ZSC) is proposed in this paper. A... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 2556 |
SubjectTerms | Algorithms Artificial Intelligence Chaos theory Computer Science Convolution Data encryption Decomposition Encryption Image enhancement Machines Manufacturing Mechanical Engineering Processes Substitutes |
SummonAdditionalLinks | – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8MwDI5gXLjwRgwGyoEbRKxpm6UnNCHGhAQnJu1WJW26Im3do500_j12lm4CCW5Vk6ZqP8f-nDg2IbdoBBXILdNKGRYoHrKorVKmO0FmpImkskmS3t5FfxC8DsOhW3ArXVhlrROtok6nCa6RP3CBW6QBuDuPsznDqlG4u-pKaOySPQ8sDcq57L1sNDH46rZiHvgYTIho6A7NuKNzAQYLcXCmgQVItvppmLZs89cGqbU7vSNy4Agj7a4RPiY7pjghh3UxBurm5imZdwtqbD4IMCM0ydW0pGiiUvo5AZ1Bodfiy-oHqsYj-LIqn1CMeh9BU27jAGiVTxczWubLLBsbqorUjgMvphic7oSUoinEizMy6D1_PPWZq6fAEphoFfPBVVEy8DPAJ0xDLX0vBYKt2iIyvsx81eEq4VwLT8ONMMo83hEmDITQAcfMheekUUwLc0EosC6Rct8kQodIAWTmSa115unQettN4tU_M05csnGseTGOt2mSEYAYAIgtAPGqSe42z8zWqTb-7d2qMYrdtCvjrZA0yX2N27b579Eu_x_tiuxzPPZgo7VbpFEtluYayEilb6zEfQN8ztqf priority: 102 providerName: ProQuest |
Title | An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function |
URI | https://link.springer.com/article/10.1007/s10489-021-02508-x https://www.proquest.com/docview/2627004402 |
Volume | 52 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA-6Xbz4LU7nyMGbBta0ydLjJvtAcYg4mKeStOkqbN3cOtD_3pes3VRU8JTSpAn05b3fe7wvhC4NCEq4t0RJqYknKSN-XUZENbxYC-0LaYsk3fd5b-DdDtkwTwpbFNHuhUvSSupPyW6eCe-hYP4CbgsCmmOZge1u2HFAm2v5Cxa67ZMHlgXh3B_mqTI_7_EVjjY65je3qEWbzj7azdVE3FzR9QBt6fQQ7RUtGHDOkUfotZlibatAAHjgMJHTBTbAFOGXCUgKDKvm71YqYDkeTecvWTLBJtZ9BFOJ9f7jLJnOZ3iRLON4rLFMI7sPHIxNSHp-NbEBQPNwjAad9tNNj-RdFEgI7JURFwwUKTw3BqqwiCnhOhGo1bLOfe2K2JUNKkNKFXcUvGB-7NAG18zjXHnU1Cs8QaV0mupThEHX4hF1dcgVM8AvYkcopWJHMWtjV5BT_MwgzEuMm04X42BTHNkQIAACBJYAwVsFXa2_ma0KbPy5ulrQKMiZbRFQbrznHljCFXRd0G0z_ftuZ_9bfo52qEl-sDHbVVTK5kt9ASpJpmpoW3S6NVRudlqtvhm7z3dtGFvt_sNjzd7PD81S3bw |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3dT9swED9BeRgvwL608jU_bE-btcZx3OQBTcBAZUA1TSD1LbMTp5lU0tIGAf_U_kbuXIdqk8Ybb1HsXCLf-e538X0AfCAjqFFuudHacqlFxJOOzrnpysLGNom1K5J03le9S_l9EA2W4E-TC0NhlY1OdIo6H2f0j_yLUHREKtHd-Tq55tQ1ik5XmxYac7E4tfe36LLN9k6-IX8_CnF8dHHY476rAM9Q3GoeImDXsQwL_Mooj0wcBjnCTN1RiQ3jItRdoTMhjAoM3oiSIhBdZSOplJGC6vch3WVYkZTR2oKVg6P-j5-Puj8MXcPlDno1XKlk4NN0fLKepPAkge474o6Y3_1tChf49p8jWWfpjjdgzUNUtj-XqZewZKtXsN60f2BeG7yG6_2KWVeBAg0Xy0o9njEyijn7fYVaiuGs6b3TSEyPhriWdXnFKM5-iEOlizxgdTmeTtisvCmKkWW6yh0dfDGjcHi_LRgZX7p4A5fPstZvoVWNK_sOGOI8lYvQZspEBDriIoiNMUVgIufftyFoFjPNfHlz6rIxSheFmYkBKTIgdQxI79rw6fGZyby4x5OztxsepX6jz9KFWLbhc8O3xfD_qW0-Te09vOhdnJ-lZyf90y1YFZR04WLFt6FVT2_sDkKh2ux6-WPw67lF_gEY8xZH |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VIiEuUF5ioQUf4ARWN3biOAdUVS1LS6HiQKW9BTuxG6Rtdrubivav8euY8TpdgURvvUWxM4k8n-cRzwPgDSlBg7jl1hjHUyMyXgxNzW2eeqddoU0okvT1WB2cpJ_H2XgNfve5MBRW2cvEIKjraUX_yLeFoiPSFN2dbR_DIr7tj3Zm55w6SNFJa99OYwmRI3f1C923xYfDfeT1WyFGH7_vHfDYYYBXCL2OSzTejU6lxy_O6sxqmdRocpqhKpzUXppcmEoIqxKLN7LCJyJXLkuVsqmgWn5I9w7czWVekOOnR5-utYCUofXyEP0brlQxjgk7MW0vpUAlgY48WiCaX_6tFFeW7j-Hs0HnjTbgQTRW2e4SXY9gzbWP4WHfCIJFufAEzndb5kItClRhrGrMdMFIPdbs5xnKK4az5ldBNjEzOcWV7JozRhH3pzjUhBgE1jXT-YwtmgvvJ46Ztg508MWMAuPjBmGkhuniKZzcyko_g_V22rrnwNDiU7WQrlI2I_ND-0Rba31is-DpDyDpF7OsYqFz6rcxKVclmokBJTKgDAwoLwfw7vqZ2bLMx42zN3selXHLL8oVQAfwvufbavj_1F7cTO013EOgl18Oj49ewn1B2RchaHwT1rv5hdtCm6izrwL4GPy4bbT_AVKWGRc |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+efficient+chaos+based+image+encryption+algorithm+using+enhanced+thorp+shuffle+and+chaotic+convolution+function&rft.jtitle=Applied+intelligence+%28Dordrecht%2C+Netherlands%29&rft.au=Kumar%2C+C.+Madan&rft.au=Vidhya%2C+R.&rft.au=Brindha%2C+M.&rft.date=2022-02-01&rft.issn=0924-669X&rft.eissn=1573-7497&rft.volume=52&rft.issue=3&rft.spage=2556&rft.epage=2585&rft_id=info:doi/10.1007%2Fs10489-021-02508-x&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10489_021_02508_x |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0924-669X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0924-669X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0924-669X&client=summon |