A Novel Image Encryption Scheme Using Chaotic Maps and Fuzzy Numbers for Secure Transmission of Information

The complexity of chaotic systems, if used in information encryption, can determine the status of security. The paper proposes a novel image encryption scheme that uses chaotic maps and fuzzy numbers for the secure transmission of information. The encryption method combines logistic and sine maps to...

Full description

Saved in:
Bibliographic Details
Published inApplied sciences Vol. 13; no. 12; p. 7113
Main Authors Mfungo, Dani Elias, Fu, Xianping, Xian, Yongjin, Wang, Xingyuan
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 01.06.2023
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The complexity of chaotic systems, if used in information encryption, can determine the status of security. The paper proposes a novel image encryption scheme that uses chaotic maps and fuzzy numbers for the secure transmission of information. The encryption method combines logistic and sine maps to form the logistic sine map, as well as the fuzzy concept and the Hénon map to form the fuzzy Hénon map, in which these maps are used to generate secure secret keys, respectively. Additionally, a fuzzy triangular membership function is used to modify the initial conditions of the maps during the diffusion process. The encryption process involves scrambling the image pixels, summing adjacent row values, and XORing the result with randomly generated numbers from the chaotic maps. The proposed method is tested against various attacks, including statistical attack analysis, local entropy analysis, differential attack analysis, signal-to-noise ratio, signal-to-noise distortion ratio, mean error square, brute force attack analysis, and information entropy analysis, while the randomness number has been evaluated using the NIST test. This scheme also has a high key sensitivity, which means that a small change in the secret keys can result in a significant change in the encrypted image The results demonstrate the effectiveness of the proposed scheme in ensuring the secure transmission of information.
AbstractList The complexity of chaotic systems, if used in information encryption, can determine the status of security. The paper proposes a novel image encryption scheme that uses chaotic maps and fuzzy numbers for the secure transmission of information. The encryption method combines logistic and sine maps to form the logistic sine map, as well as the fuzzy concept and the Hénon map to form the fuzzy Hénon map, in which these maps are used to generate secure secret keys, respectively. Additionally, a fuzzy triangular membership function is used to modify the initial conditions of the maps during the diffusion process. The encryption process involves scrambling the image pixels, summing adjacent row values, and XORing the result with randomly generated numbers from the chaotic maps. The proposed method is tested against various attacks, including statistical attack analysis, local entropy analysis, differential attack analysis, signal-to-noise ratio, signal-to-noise distortion ratio, mean error square, brute force attack analysis, and information entropy analysis, while the randomness number has been evaluated using the NIST test. This scheme also has a high key sensitivity, which means that a small change in the secret keys can result in a significant change in the encrypted image The results demonstrate the effectiveness of the proposed scheme in ensuring the secure transmission of information.
Audience Academic
Author Wang, Xingyuan
Mfungo, Dani Elias
Fu, Xianping
Xian, Yongjin
Author_xml – sequence: 1
  givenname: Dani Elias
  orcidid: 0000-0001-7727-2272
  surname: Mfungo
  fullname: Mfungo, Dani Elias
– sequence: 2
  givenname: Xianping
  surname: Fu
  fullname: Fu, Xianping
– sequence: 3
  givenname: Yongjin
  surname: Xian
  fullname: Xian, Yongjin
– sequence: 4
  givenname: Xingyuan
  surname: Wang
  fullname: Wang, Xingyuan
BookMark eNptkc1uGyEUhVGVSk3TrPoCSF1WTvkdhqVlJa2lJF0kWaM7wDi4HpjCTCTn6YvjVoqiwgJ0uefTPZyP6CSm6BH6TMkF55p8g3GknDJFKX-HThlRzYILqk5e3T-g81K2pC5NeUvJKfq1xLfpye_weoCNx5fR5v04hRTxnX30g8cPJcQNXj1CmoLFNzAWDNHhq_n5eY9v56HzueA-ZXzn7Zw9vs8QyxBKOTBSj9exPg5wQH5C73vYFX_-9zxDD1eX96sfi-uf39er5fXCCsKnRcdlq3sCbSetZLZTneMWGkVtq61sGRDGOTQNE6CFcJJ74Rwo5hRVRCrBz9D6yHUJtmbMYYC8NwmCeSmkvDGQq5udN1Z4ZzviuZJeUNK0jlrdSE2annFQbWV9ObLGnH7Pvkxmm-Yc6_iGtUyrOgvVtevi2LWBCg3V8pTB1u38EGyNqQ-1vlRSaMUVPWDpUWBzKiX73tgwvXxSFYadocQcMjWvMq2ar280_6z9r_sPaMaijA
CitedBy_id crossref_primary_10_1088_1402_4896_ad996a
crossref_primary_10_1016_j_prime_2024_100642
crossref_primary_10_3390_su15139927
crossref_primary_10_1007_s00500_024_09912_8
crossref_primary_10_1016_j_procs_2025_01_033
crossref_primary_10_1049_tje2_70038
crossref_primary_10_1016_j_eij_2024_100480
crossref_primary_10_1007_s11071_024_10677_w
crossref_primary_10_3390_computation11090178
crossref_primary_10_1088_1402_4896_ad1ae1
crossref_primary_10_3390_e25111478
crossref_primary_10_3390_fractalfract7100734
crossref_primary_10_1007_s11042_023_17438_8
crossref_primary_10_38124_ijisrt_IJISRT24JUL1510
Cites_doi 10.1016/j.chaos.2019.03.026
10.1016/j.compeleceng.2015.11.008
10.1109/ACCESS.2018.2805847
10.3390/e21080815
10.1142/S0218127421500218
10.1002/9781119994374
10.6028/NIST.FIPS.197-upd1
10.1007/978-3-030-37051-0
10.1016/j.optlaseng.2014.08.005
10.1016/j.imavis.2004.06.013
10.1016/j.optlaseng.2020.106040
10.1016/j.ins.2012.07.049
10.1016/0375-9601(76)90101-8
10.3390/e22040474
10.3390/e21070656
10.1016/j.ins.2022.05.032
10.1016/j.sigpro.2014.10.033
10.6028/NIST.SP.800-67r2
10.17487/rfc1321
10.3390/app13064034
10.1016/j.ijleo.2014.06.149
10.1016/j.sigpro.2018.03.010
10.1016/j.sigpro.2018.06.008
10.1016/j.optlastec.2019.105698
10.1016/j.ins.2021.12.126
10.1016/j.imavis.2006.02.021
10.1016/j.optlaseng.2016.10.006
10.2307/2944326
10.1103/PhysRevE.51.3670
10.1007/BF01608556
10.1109/UEMCON53757.2021.9666530
10.1016/j.ins.2021.04.013
10.1016/j.optcom.2011.08.013
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
DOA
DOI 10.3390/app13127113
DatabaseName CrossRef
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList

CrossRef
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 2076-3417
ExternalDocumentID oai_doaj_org_article_c4edcb0e375e41068d1c965906f23a78
A754973718
10_3390_app13127113
GroupedDBID .4S
2XV
5VS
7XC
8CJ
8FE
8FG
8FH
AADQD
AAFWJ
AAYXX
ADBBV
ADMLS
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
APEBS
ARCSS
BCNDV
BENPR
CCPQU
CITATION
CZ9
D1I
D1J
D1K
GROUPED_DOAJ
IAO
IGS
ITC
K6-
K6V
KC.
KQ8
L6V
LK5
LK8
M7R
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PROAC
TUS
PMFND
ABUWG
AZQEC
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
PUEGO
ID FETCH-LOGICAL-c403t-b3589f0a8b5c52cb7bd3ca671c89c582a0233a6624a944d53e4dda72d71705743
IEDL.DBID BENPR
ISSN 2076-3417
IngestDate Wed Aug 27 01:32:06 EDT 2025
Mon Jun 30 11:40:42 EDT 2025
Tue Jun 10 20:27:54 EDT 2025
Tue Jul 01 04:33:21 EDT 2025
Thu Apr 24 22:59:24 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 12
Language English
License https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c403t-b3589f0a8b5c52cb7bd3ca671c89c582a0233a6624a944d53e4dda72d71705743
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7727-2272
OpenAccessLink https://www.proquest.com/docview/2829702319?pq-origsite=%requestingapplication%
PQID 2829702319
PQPubID 2032433
ParticipantIDs doaj_primary_oai_doaj_org_article_c4edcb0e375e41068d1c965906f23a78
proquest_journals_2829702319
gale_infotracacademiconefile_A754973718
crossref_citationtrail_10_3390_app13127113
crossref_primary_10_3390_app13127113
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2023-06-01
PublicationDateYYYYMMDD 2023-06-01
PublicationDate_xml – month: 06
  year: 2023
  text: 2023-06-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Applied sciences
PublicationYear 2023
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Pareek (ref_10) 2006; 24
Wu (ref_35) 2013; 222
(ref_41) 2015; 109
Wu (ref_30) 2011; 1
ref_34
Wang (ref_37) 2021; 569
Wang (ref_9) 2018; 6
(ref_13) 1976; 50
Teng (ref_8) 2022; 605
Phatak (ref_12) 1995; 51
ref_18
ref_39
ref_16
(ref_19) 1976; 57
Zaman (ref_24) 2012; 1
Fu (ref_2) 2011; 284
Zhang (ref_15) 2020; 128
Yavuz (ref_33) 2016; 54
Bloch (ref_22) 2005; 23
Wang (ref_27) 2015; 66
Wang (ref_14) 2021; 31
Erkan (ref_3) 2022; 589
Nardo (ref_25) 2019; 123
ref_23
Zhu (ref_26) 2014; 125
Valandar (ref_17) 2017; 34
ref_21
Hua (ref_11) 2018; 149
ref_1
Gao (ref_38) 2022; 34
ref_28
Benedicks (ref_20) 1991; 133
Yavuz (ref_36) 2021; 63
Hosseinzadeh (ref_40) 2019; 120
Enayatifar (ref_31) 2017; 90
Wu (ref_29) 2018; 153
ref_5
Srivastava (ref_32) 2015; 4
ref_4
ref_7
ref_6
References_xml – volume: 123
  start-page: 69
  year: 2019
  ident: ref_25
  article-title: Image encryption using finite-precision error
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2019.03.026
– volume: 54
  start-page: 471
  year: 2016
  ident: ref_33
  article-title: A chaos-based image encryption algorithm with simple logical functions
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2015.11.008
– volume: 6
  start-page: 23733
  year: 2018
  ident: ref_9
  article-title: An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2805847
– volume: 34
  start-page: 142
  year: 2017
  ident: ref_17
  article-title: A new transform domain steganography based on modified logistic chaotic map for color images
  publication-title: J. Inf. Secur. Appl.
– ident: ref_39
  doi: 10.3390/e21080815
– volume: 31
  start-page: 2150021
  year: 2021
  ident: ref_14
  article-title: A Plaintext-Related Image Encryption Algorithm Based on Compressive Sensing and a Novel Hyperchaotic System
  publication-title: Int. J. Bifurc. Chaos
  doi: 10.1142/S0218127421500218
– ident: ref_23
  doi: 10.1002/9781119994374
– ident: ref_5
  doi: 10.6028/NIST.FIPS.197-upd1
– ident: ref_7
  doi: 10.1007/978-3-030-37051-0
– volume: 66
  start-page: 10
  year: 2015
  ident: ref_27
  article-title: A novel chaotic block image encryption algorithm based on dynamic random growth technique
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2014.08.005
– volume: 23
  start-page: 89
  year: 2005
  ident: ref_22
  article-title: Fuzzy spatial relationships for image processing and interpretation: A review
  publication-title: Image Vis. Comput.
  doi: 10.1016/j.imavis.2004.06.013
– volume: 128
  start-page: 106040
  year: 2020
  ident: ref_15
  article-title: A new color image encryption scheme based on 2DNLCML system and genetic operations
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2020.106040
– volume: 222
  start-page: 323
  year: 2013
  ident: ref_35
  article-title: Local Shannon entropy measure with statistical tests for image randomness
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2012.07.049
– volume: 57
  start-page: 397
  year: 1976
  ident: ref_19
  article-title: An equation for continuous chaos
  publication-title: Phys. Lett. A
  doi: 10.1016/0375-9601(76)90101-8
– ident: ref_18
  doi: 10.3390/e22040474
– ident: ref_28
  doi: 10.3390/e21070656
– ident: ref_1
– volume: 34
  start-page: 1535
  year: 2022
  ident: ref_38
  article-title: An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map
  publication-title: J. King Saud Univ. Comput. Inf. Sci.
– volume: 605
  start-page: 71
  year: 2022
  ident: ref_8
  article-title: Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.05.032
– ident: ref_21
– volume: 109
  start-page: 119
  year: 2015
  ident: ref_41
  article-title: A RGB image encryption algorithm based on total plain image characteristics and chaos
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2014.10.033
– ident: ref_4
  doi: 10.6028/NIST.SP.800-67r2
– ident: ref_6
  doi: 10.17487/rfc1321
– ident: ref_16
  doi: 10.3390/app13064034
– volume: 125
  start-page: 6672
  year: 2014
  ident: ref_26
  article-title: An image encryption scheme using generalized Arnold map and affine cipher
  publication-title: Optik
  doi: 10.1016/j.ijleo.2014.06.149
– volume: 149
  start-page: 148
  year: 2018
  ident: ref_11
  article-title: 2D Logistic-Sine-coupling map for image encryption
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2018.03.010
– volume: 1
  start-page: 18
  year: 2012
  ident: ref_24
  article-title: Review on fifteen Statistical Tests proposed by NIST
  publication-title: J. Theor. Phys. Cryptogr.
– volume: 4
  start-page: 4266
  year: 2015
  ident: ref_32
  article-title: Performance Analysis of Image Encryption Using Block Based Technique
  publication-title: Int. J. Adv. Res. Electr. Electron. Instrum. Eng.
– volume: 153
  start-page: 11
  year: 2018
  ident: ref_29
  article-title: Image encryption using 2D Hénon-Sine map and DNA approach
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2018.06.008
– volume: 1
  start-page: 31
  year: 2011
  ident: ref_30
  article-title: NPCR and UACI Randomness Tests for Image Encryption
  publication-title: Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT)
– volume: 120
  start-page: 105698
  year: 2019
  ident: ref_40
  article-title: Hybrid image encryption algorithm based on 3D chaotic system and choquet fuzzy integral
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2019.105698
– volume: 589
  start-page: 770
  year: 2022
  ident: ref_3
  article-title: 2D eπ-map for image encryption
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2021.12.126
– volume: 24
  start-page: 926
  year: 2006
  ident: ref_10
  article-title: Image encryption using chaotic logistic map
  publication-title: Image Vis. Comput.
  doi: 10.1016/j.imavis.2006.02.021
– volume: 90
  start-page: 146
  year: 2017
  ident: ref_31
  article-title: Image encryption using a synchronous permutation-diffusion technique
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2016.10.006
– volume: 133
  start-page: 73
  year: 1991
  ident: ref_20
  article-title: The Dynamics of the Henon Map
  publication-title: Ann. Math.
  doi: 10.2307/2944326
– volume: 51
  start-page: 3670
  year: 1995
  ident: ref_12
  article-title: Logistic map: A possible random-number generator
  publication-title: Phys. Rev. E
  doi: 10.1103/PhysRevE.51.3670
– volume: 50
  start-page: 69
  year: 1976
  ident: ref_13
  article-title: A two-dimensional mapping with a strange attractor
  publication-title: Commun. Math. Phys.
  doi: 10.1007/BF01608556
– ident: ref_34
  doi: 10.1109/UEMCON53757.2021.9666530
– volume: 569
  start-page: 217
  year: 2021
  ident: ref_37
  article-title: A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2021.04.013
– volume: 284
  start-page: 5415
  year: 2011
  ident: ref_2
  article-title: A novel chaos-based bit-level permutation scheme for digital image encryption
  publication-title: Opt. Commun.
  doi: 10.1016/j.optcom.2011.08.013
– volume: 63
  start-page: 103056
  year: 2021
  ident: ref_36
  article-title: A new parallel processing architecture for accelerating image encryption based on chaos
  publication-title: J. Inf. Secur. Appl.
SSID ssj0000913810
Score 2.335371
Snippet The complexity of chaotic systems, if used in information encryption, can determine the status of security. The paper proposes a novel image encryption scheme...
SourceID doaj
proquest
gale
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 7113
SubjectTerms Analysis
chaotic system
Cryptography
Dynamical systems
fuzzy logic
Fuzzy sets
Hénon map
image encryption
Information management
logistic map
Logistics
Mathematical functions
Methods
Numbers
Safety and security measures
sine map
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NSx0xEA_iSQ9Sv_C1VuYgtBUWN5tssnt8ig9b8F2s4C3kaylU94nvWdC_vjPZKE-o9OJ1GUI2M5mvzPyGsUNZNjqozhUhoAqUyqEeVGVb-C5oSvMH3VFq4GKqzq_kj-v6emnUF9WEDfDAw8EdexmDd2UUuo4S45cmcE8geKXqKmF1avNFm7cUTCUd3HKCrhoa8gTG9fQezAWvNOfilQlKSP1v6eNkZCYf2Eb2DmE87GqTrcR-i60vYQZusc18G-fwNUNGf9tmv8cwnf2JN_D9FvUDnPX-_jHpArhEptxGSJUBcPrLznBluLB3c7B9gMnD09MjTNNUkDmg_wop_x4hmTAUAcqlwayD3LVES-6wq8nZz9PzIo9RKLwsxaJwom7arrSNq31deaddEN4qzX3T-rqpLJptYZWqpG2lDLWIMgSrq6AJagc9jF222s_6uMdAlRGpfNd6z2XsuNMx-URCBnSLVD1iR88na3zGGKdRFzcGYw1ig1liw4gdvhDfDdAa_yY7IRa9kBAedvqAUmKylJj_ScmIfSEGG7q1uCFvc_MB_hbhX5mxxjhZCzTUI7b_LAMmX-e5oedmTUh57cf32M0ntkZT64eKs322urh_iJ_Rt1m4gyTGfwFagPTj
  priority: 102
  providerName: Directory of Open Access Journals
Title A Novel Image Encryption Scheme Using Chaotic Maps and Fuzzy Numbers for Secure Transmission of Information
URI https://www.proquest.com/docview/2829702319
https://doaj.org/article/c4edcb0e375e41068d1c965906f23a78
Volume 13
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwELZoe4EDaguILWXlQyUeUkQSO7ZzQttql4LUFQIq9Wb5FZDaJstmi9T--s54vdtWAq6JZSWemW8etr8h5IDnSnrR2Mx7gEAuLOCgyOvMNV5imd_LBksDJ1NxfMq_nFVnqeDWp2OVK0yMQO07hzXyD7jjJ5GsrP44-51h1yjcXU0tNDbIFkCwguRr63A8_fptXWVB1ktV5MuLeQzye9wXLlhRyqJgD1xRZOz_Fy5HZzPZJk9TlEhHS7HukEeh3SVP7nEH7pKdZJU9fZuoo989I-cjOu3-hAv6-RJwgo5bN7-OmEC_g3AuA40nBOjRL9PBzPTEzHpqWk8nVzc313Qau4P0FOJYGuvwgUZXBqqANTXaNTTdXsIpn5PTyfjH0XGW2ilkjudskVlWqbrJjbKVq0pnpfXMGSELp2pXqdLA6jIjRMlNzbmvWODeG1l6iZQ7EGm8IJtt14aXhIo8wCjX1M4VPDSFlSHGRox7CI9ENSDvVyurXeIax5YXFxpyDhSDvieGATlYD54tKTb-PuwQRbQegrzY8UE3_6mTmWnHg3c2D0xWgUO2q3zhkDIxF03JjFQD8gYFrNF64YOcSZcQ4LeQB0uPJOTLkoHDHpD9lQ7oZNa9vlPCvf-_fkUeY1_65ZmyfbK5mF-F1xC9LOyQbKjJp2FS1GGsAdwCrIfv4w
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9QwEB2VcgAOiBYQCwV8KOJDikhiJ04OCC2lyy7t7oVW6s11bIdKbZNldwva_ih-IzNOshQJuPUaW07iGb8Zjz1vALZFmEmblkVgLUKgSAvEwTTMA1NaSWF-K0sKDYwn6fBQfD5KjtbgZ5cLQ9cqO0z0QG1rQzHyt3TiJ4msLH8__RZQ1Sg6Xe1KaDRqseeWP3DLNn83-ojyfRHHg92DnWHQVhUIjAj5Iih4kuVlqLMiMUlsCllYbnQqI5PlJslijS_hOk1joXMhbMKdsFbL2EpinkGDi-PegJuC85xWVDb4tIrpEMdmFoVNGiC2h3QKHfEollHE_zB8vj7Av6yAN22De3C39UlZv1GiDVhz1SbcucJUuAkbLQbM2auWqPr1fTjts0n93Z2x0TmiEtutzGzpEYh9QVU4d8zfR2A7J7rGkdlYT-dMV5YNLi4vl2zia5HMGXrNzEf9HfOGExWPInisLlmbK0VDPoDDa5nmh7Be1ZV7BCwNHfYyZW5MJFwZFdJ5T4wLi85YmvTgTTezyrTM5lRg40zhDofEoK6IoQfbq87ThtDj790-kIhWXYiF2z-oZ19Vu6iVEc6aInRcJk7g3jqzkSGCxjAtY65l1oOXJGBFWIEfZHSb8oC_Raxbqi9xdy45ugc92Op0QLUgMle_Vf7x_5ufw63hwXhf7Y8me0_gdowPm9tsW7C-mF24p-g3LYpnXlkZHF_36vgFgKkoiQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VrYTggGgBsaWAD0U8pKhJ7MTJAaFtu6supVEFVOotdWwHpLbJsrsFbX8av46ZxFmKBNx6dSwn8Yy_edj-BmBL-Ik0cVl4xiAEirhAHIz91NOlkZTmN7Kk1MBhFu8fi_cn0ckK_OzuwtCxyg4TG6A2taYc-Tbt-EkiK0u3S3cs4mhv9G7yzaMKUrTT2pXTaFXkwC5-YPg2ezveQ1m_CMPR8PPuvucqDHha-HzuFTxK0tJXSRHpKNSFLAzXKpaBTlIdJaHCF3IVx6FQqRAm4lYYo2RoJLHQoPHFcW_BqsSoyO_B6s4wO_q4zPAQ42YS-O2lQM5Tn_akAx6EMgj4H2awqRbwL5vQGLrRfbjnPFQ2aFVqDVZstQ53r_EWrsOaQ4QZe-Voq18_gLMBy-rv9pyNLxCj2LDS00WDR-wTKsaFZc3pBLb7VdU4MjtUkxlTlWGjy6urBcuayiQzhj40a_YALGvMKKoh5fNYXTJ3c4qGfAjHNzLRj6BX1ZV9DCz2LfbSZap1IGwZFNI2fhkXBl2zOOrDm25mc-14zqncxnmO8Q6JIb8mhj5sLTtPWnqPv3fbIREtuxAnd9NQT7_kbonnWlijC99yGVmBkXZiAk10jX5chlzJpA8vScA5IQd-kFbuAgT-FnFw5QOJsbrk6Cz0YbPTgdxByiz_vQA2_v_4OdzGlZF_GGcHT-BOiG3t0bZN6M2nl_YpOlHz4pnTVganN71AfgFIOy4b
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Image+Encryption+Scheme+Using+Chaotic+Maps+and+Fuzzy+Numbers+for+Secure+Transmission+of+Information&rft.jtitle=Applied+sciences&rft.au=Dani+Elias+Mfungo&rft.au=Fu%2C+Xianping&rft.au=Xian%2C+Yongjin&rft.au=Wang%2C+Xingyuan&rft.date=2023-06-01&rft.pub=MDPI+AG&rft.eissn=2076-3417&rft.volume=13&rft.issue=12&rft.spage=7113&rft_id=info:doi/10.3390%2Fapp13127113&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon