A Novel Image Encryption Scheme Using Chaotic Maps and Fuzzy Numbers for Secure Transmission of Information
The complexity of chaotic systems, if used in information encryption, can determine the status of security. The paper proposes a novel image encryption scheme that uses chaotic maps and fuzzy numbers for the secure transmission of information. The encryption method combines logistic and sine maps to...
Saved in:
Published in | Applied sciences Vol. 13; no. 12; p. 7113 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
01.06.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The complexity of chaotic systems, if used in information encryption, can determine the status of security. The paper proposes a novel image encryption scheme that uses chaotic maps and fuzzy numbers for the secure transmission of information. The encryption method combines logistic and sine maps to form the logistic sine map, as well as the fuzzy concept and the Hénon map to form the fuzzy Hénon map, in which these maps are used to generate secure secret keys, respectively. Additionally, a fuzzy triangular membership function is used to modify the initial conditions of the maps during the diffusion process. The encryption process involves scrambling the image pixels, summing adjacent row values, and XORing the result with randomly generated numbers from the chaotic maps. The proposed method is tested against various attacks, including statistical attack analysis, local entropy analysis, differential attack analysis, signal-to-noise ratio, signal-to-noise distortion ratio, mean error square, brute force attack analysis, and information entropy analysis, while the randomness number has been evaluated using the NIST test. This scheme also has a high key sensitivity, which means that a small change in the secret keys can result in a significant change in the encrypted image The results demonstrate the effectiveness of the proposed scheme in ensuring the secure transmission of information. |
---|---|
AbstractList | The complexity of chaotic systems, if used in information encryption, can determine the status of security. The paper proposes a novel image encryption scheme that uses chaotic maps and fuzzy numbers for the secure transmission of information. The encryption method combines logistic and sine maps to form the logistic sine map, as well as the fuzzy concept and the Hénon map to form the fuzzy Hénon map, in which these maps are used to generate secure secret keys, respectively. Additionally, a fuzzy triangular membership function is used to modify the initial conditions of the maps during the diffusion process. The encryption process involves scrambling the image pixels, summing adjacent row values, and XORing the result with randomly generated numbers from the chaotic maps. The proposed method is tested against various attacks, including statistical attack analysis, local entropy analysis, differential attack analysis, signal-to-noise ratio, signal-to-noise distortion ratio, mean error square, brute force attack analysis, and information entropy analysis, while the randomness number has been evaluated using the NIST test. This scheme also has a high key sensitivity, which means that a small change in the secret keys can result in a significant change in the encrypted image The results demonstrate the effectiveness of the proposed scheme in ensuring the secure transmission of information. |
Audience | Academic |
Author | Wang, Xingyuan Mfungo, Dani Elias Fu, Xianping Xian, Yongjin |
Author_xml | – sequence: 1 givenname: Dani Elias orcidid: 0000-0001-7727-2272 surname: Mfungo fullname: Mfungo, Dani Elias – sequence: 2 givenname: Xianping surname: Fu fullname: Fu, Xianping – sequence: 3 givenname: Yongjin surname: Xian fullname: Xian, Yongjin – sequence: 4 givenname: Xingyuan surname: Wang fullname: Wang, Xingyuan |
BookMark | eNptkc1uGyEUhVGVSk3TrPoCSF1WTvkdhqVlJa2lJF0kWaM7wDi4HpjCTCTn6YvjVoqiwgJ0uefTPZyP6CSm6BH6TMkF55p8g3GknDJFKX-HThlRzYILqk5e3T-g81K2pC5NeUvJKfq1xLfpye_weoCNx5fR5v04hRTxnX30g8cPJcQNXj1CmoLFNzAWDNHhq_n5eY9v56HzueA-ZXzn7Zw9vs8QyxBKOTBSj9exPg5wQH5C73vYFX_-9zxDD1eX96sfi-uf39er5fXCCsKnRcdlq3sCbSetZLZTneMWGkVtq61sGRDGOTQNE6CFcJJ74Rwo5hRVRCrBz9D6yHUJtmbMYYC8NwmCeSmkvDGQq5udN1Z4ZzviuZJeUNK0jlrdSE2annFQbWV9ObLGnH7Pvkxmm-Yc6_iGtUyrOgvVtevi2LWBCg3V8pTB1u38EGyNqQ-1vlRSaMUVPWDpUWBzKiX73tgwvXxSFYadocQcMjWvMq2ar280_6z9r_sPaMaijA |
CitedBy_id | crossref_primary_10_1088_1402_4896_ad996a crossref_primary_10_1016_j_prime_2024_100642 crossref_primary_10_3390_su15139927 crossref_primary_10_1007_s00500_024_09912_8 crossref_primary_10_1016_j_procs_2025_01_033 crossref_primary_10_1049_tje2_70038 crossref_primary_10_1016_j_eij_2024_100480 crossref_primary_10_1007_s11071_024_10677_w crossref_primary_10_3390_computation11090178 crossref_primary_10_1088_1402_4896_ad1ae1 crossref_primary_10_3390_e25111478 crossref_primary_10_3390_fractalfract7100734 crossref_primary_10_1007_s11042_023_17438_8 crossref_primary_10_38124_ijisrt_IJISRT24JUL1510 |
Cites_doi | 10.1016/j.chaos.2019.03.026 10.1016/j.compeleceng.2015.11.008 10.1109/ACCESS.2018.2805847 10.3390/e21080815 10.1142/S0218127421500218 10.1002/9781119994374 10.6028/NIST.FIPS.197-upd1 10.1007/978-3-030-37051-0 10.1016/j.optlaseng.2014.08.005 10.1016/j.imavis.2004.06.013 10.1016/j.optlaseng.2020.106040 10.1016/j.ins.2012.07.049 10.1016/0375-9601(76)90101-8 10.3390/e22040474 10.3390/e21070656 10.1016/j.ins.2022.05.032 10.1016/j.sigpro.2014.10.033 10.6028/NIST.SP.800-67r2 10.17487/rfc1321 10.3390/app13064034 10.1016/j.ijleo.2014.06.149 10.1016/j.sigpro.2018.03.010 10.1016/j.sigpro.2018.06.008 10.1016/j.optlastec.2019.105698 10.1016/j.ins.2021.12.126 10.1016/j.imavis.2006.02.021 10.1016/j.optlaseng.2016.10.006 10.2307/2944326 10.1103/PhysRevE.51.3670 10.1007/BF01608556 10.1109/UEMCON53757.2021.9666530 10.1016/j.ins.2021.04.013 10.1016/j.optcom.2011.08.013 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION ABUWG AFKRA AZQEC BENPR CCPQU DWQXO PHGZM PHGZT PIMPY PKEHL PQEST PQQKQ PQUKI PRINS DOA |
DOI | 10.3390/app13127113 |
DatabaseName | CrossRef ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | CrossRef Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Sciences (General) |
EISSN | 2076-3417 |
ExternalDocumentID | oai_doaj_org_article_c4edcb0e375e41068d1c965906f23a78 A754973718 10_3390_app13127113 |
GroupedDBID | .4S 2XV 5VS 7XC 8CJ 8FE 8FG 8FH AADQD AAFWJ AAYXX ADBBV ADMLS AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS APEBS ARCSS BCNDV BENPR CCPQU CITATION CZ9 D1I D1J D1K GROUPED_DOAJ IAO IGS ITC K6- K6V KC. KQ8 L6V LK5 LK8 M7R MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PROAC TUS PMFND ABUWG AZQEC DWQXO PKEHL PQEST PQQKQ PQUKI PRINS PUEGO |
ID | FETCH-LOGICAL-c403t-b3589f0a8b5c52cb7bd3ca671c89c582a0233a6624a944d53e4dda72d71705743 |
IEDL.DBID | BENPR |
ISSN | 2076-3417 |
IngestDate | Wed Aug 27 01:32:06 EDT 2025 Mon Jun 30 11:40:42 EDT 2025 Tue Jun 10 20:27:54 EDT 2025 Tue Jul 01 04:33:21 EDT 2025 Thu Apr 24 22:59:24 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 12 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c403t-b3589f0a8b5c52cb7bd3ca671c89c582a0233a6624a944d53e4dda72d71705743 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-7727-2272 |
OpenAccessLink | https://www.proquest.com/docview/2829702319?pq-origsite=%requestingapplication% |
PQID | 2829702319 |
PQPubID | 2032433 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_c4edcb0e375e41068d1c965906f23a78 proquest_journals_2829702319 gale_infotracacademiconefile_A754973718 crossref_citationtrail_10_3390_app13127113 crossref_primary_10_3390_app13127113 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-06-01 |
PublicationDateYYYYMMDD | 2023-06-01 |
PublicationDate_xml | – month: 06 year: 2023 text: 2023-06-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Applied sciences |
PublicationYear | 2023 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | Pareek (ref_10) 2006; 24 Wu (ref_35) 2013; 222 (ref_41) 2015; 109 Wu (ref_30) 2011; 1 ref_34 Wang (ref_37) 2021; 569 Wang (ref_9) 2018; 6 (ref_13) 1976; 50 Teng (ref_8) 2022; 605 Phatak (ref_12) 1995; 51 ref_18 ref_39 ref_16 (ref_19) 1976; 57 Zaman (ref_24) 2012; 1 Fu (ref_2) 2011; 284 Zhang (ref_15) 2020; 128 Yavuz (ref_33) 2016; 54 Bloch (ref_22) 2005; 23 Wang (ref_27) 2015; 66 Wang (ref_14) 2021; 31 Erkan (ref_3) 2022; 589 Nardo (ref_25) 2019; 123 ref_23 Zhu (ref_26) 2014; 125 Valandar (ref_17) 2017; 34 ref_21 Hua (ref_11) 2018; 149 ref_1 Gao (ref_38) 2022; 34 ref_28 Benedicks (ref_20) 1991; 133 Yavuz (ref_36) 2021; 63 Hosseinzadeh (ref_40) 2019; 120 Enayatifar (ref_31) 2017; 90 Wu (ref_29) 2018; 153 ref_5 Srivastava (ref_32) 2015; 4 ref_4 ref_7 ref_6 |
References_xml | – volume: 123 start-page: 69 year: 2019 ident: ref_25 article-title: Image encryption using finite-precision error publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2019.03.026 – volume: 54 start-page: 471 year: 2016 ident: ref_33 article-title: A chaos-based image encryption algorithm with simple logical functions publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2015.11.008 – volume: 6 start-page: 23733 year: 2018 ident: ref_9 article-title: An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2805847 – volume: 34 start-page: 142 year: 2017 ident: ref_17 article-title: A new transform domain steganography based on modified logistic chaotic map for color images publication-title: J. Inf. Secur. Appl. – ident: ref_39 doi: 10.3390/e21080815 – volume: 31 start-page: 2150021 year: 2021 ident: ref_14 article-title: A Plaintext-Related Image Encryption Algorithm Based on Compressive Sensing and a Novel Hyperchaotic System publication-title: Int. J. Bifurc. Chaos doi: 10.1142/S0218127421500218 – ident: ref_23 doi: 10.1002/9781119994374 – ident: ref_5 doi: 10.6028/NIST.FIPS.197-upd1 – ident: ref_7 doi: 10.1007/978-3-030-37051-0 – volume: 66 start-page: 10 year: 2015 ident: ref_27 article-title: A novel chaotic block image encryption algorithm based on dynamic random growth technique publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2014.08.005 – volume: 23 start-page: 89 year: 2005 ident: ref_22 article-title: Fuzzy spatial relationships for image processing and interpretation: A review publication-title: Image Vis. Comput. doi: 10.1016/j.imavis.2004.06.013 – volume: 128 start-page: 106040 year: 2020 ident: ref_15 article-title: A new color image encryption scheme based on 2DNLCML system and genetic operations publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2020.106040 – volume: 222 start-page: 323 year: 2013 ident: ref_35 article-title: Local Shannon entropy measure with statistical tests for image randomness publication-title: Inf. Sci. doi: 10.1016/j.ins.2012.07.049 – volume: 57 start-page: 397 year: 1976 ident: ref_19 article-title: An equation for continuous chaos publication-title: Phys. Lett. A doi: 10.1016/0375-9601(76)90101-8 – ident: ref_18 doi: 10.3390/e22040474 – ident: ref_28 doi: 10.3390/e21070656 – ident: ref_1 – volume: 34 start-page: 1535 year: 2022 ident: ref_38 article-title: An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map publication-title: J. King Saud Univ. Comput. Inf. Sci. – volume: 605 start-page: 71 year: 2022 ident: ref_8 article-title: Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.05.032 – ident: ref_21 – volume: 109 start-page: 119 year: 2015 ident: ref_41 article-title: A RGB image encryption algorithm based on total plain image characteristics and chaos publication-title: Signal Process. doi: 10.1016/j.sigpro.2014.10.033 – ident: ref_4 doi: 10.6028/NIST.SP.800-67r2 – ident: ref_6 doi: 10.17487/rfc1321 – ident: ref_16 doi: 10.3390/app13064034 – volume: 125 start-page: 6672 year: 2014 ident: ref_26 article-title: An image encryption scheme using generalized Arnold map and affine cipher publication-title: Optik doi: 10.1016/j.ijleo.2014.06.149 – volume: 149 start-page: 148 year: 2018 ident: ref_11 article-title: 2D Logistic-Sine-coupling map for image encryption publication-title: Signal Process. doi: 10.1016/j.sigpro.2018.03.010 – volume: 1 start-page: 18 year: 2012 ident: ref_24 article-title: Review on fifteen Statistical Tests proposed by NIST publication-title: J. Theor. Phys. Cryptogr. – volume: 4 start-page: 4266 year: 2015 ident: ref_32 article-title: Performance Analysis of Image Encryption Using Block Based Technique publication-title: Int. J. Adv. Res. Electr. Electron. Instrum. Eng. – volume: 153 start-page: 11 year: 2018 ident: ref_29 article-title: Image encryption using 2D Hénon-Sine map and DNA approach publication-title: Signal Process. doi: 10.1016/j.sigpro.2018.06.008 – volume: 1 start-page: 31 year: 2011 ident: ref_30 article-title: NPCR and UACI Randomness Tests for Image Encryption publication-title: Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) – volume: 120 start-page: 105698 year: 2019 ident: ref_40 article-title: Hybrid image encryption algorithm based on 3D chaotic system and choquet fuzzy integral publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2019.105698 – volume: 589 start-page: 770 year: 2022 ident: ref_3 article-title: 2D eπ-map for image encryption publication-title: Inf. Sci. doi: 10.1016/j.ins.2021.12.126 – volume: 24 start-page: 926 year: 2006 ident: ref_10 article-title: Image encryption using chaotic logistic map publication-title: Image Vis. Comput. doi: 10.1016/j.imavis.2006.02.021 – volume: 90 start-page: 146 year: 2017 ident: ref_31 article-title: Image encryption using a synchronous permutation-diffusion technique publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2016.10.006 – volume: 133 start-page: 73 year: 1991 ident: ref_20 article-title: The Dynamics of the Henon Map publication-title: Ann. Math. doi: 10.2307/2944326 – volume: 51 start-page: 3670 year: 1995 ident: ref_12 article-title: Logistic map: A possible random-number generator publication-title: Phys. Rev. E doi: 10.1103/PhysRevE.51.3670 – volume: 50 start-page: 69 year: 1976 ident: ref_13 article-title: A two-dimensional mapping with a strange attractor publication-title: Commun. Math. Phys. doi: 10.1007/BF01608556 – ident: ref_34 doi: 10.1109/UEMCON53757.2021.9666530 – volume: 569 start-page: 217 year: 2021 ident: ref_37 article-title: A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient publication-title: Inf. Sci. doi: 10.1016/j.ins.2021.04.013 – volume: 284 start-page: 5415 year: 2011 ident: ref_2 article-title: A novel chaos-based bit-level permutation scheme for digital image encryption publication-title: Opt. Commun. doi: 10.1016/j.optcom.2011.08.013 – volume: 63 start-page: 103056 year: 2021 ident: ref_36 article-title: A new parallel processing architecture for accelerating image encryption based on chaos publication-title: J. Inf. Secur. Appl. |
SSID | ssj0000913810 |
Score | 2.335371 |
Snippet | The complexity of chaotic systems, if used in information encryption, can determine the status of security. The paper proposes a novel image encryption scheme... |
SourceID | doaj proquest gale crossref |
SourceType | Open Website Aggregation Database Enrichment Source Index Database |
StartPage | 7113 |
SubjectTerms | Analysis chaotic system Cryptography Dynamical systems fuzzy logic Fuzzy sets Hénon map image encryption Information management logistic map Logistics Mathematical functions Methods Numbers Safety and security measures sine map |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NSx0xEA_iSQ9Sv_C1VuYgtBUWN5tssnt8ig9b8F2s4C3kaylU94nvWdC_vjPZKE-o9OJ1GUI2M5mvzPyGsUNZNjqozhUhoAqUyqEeVGVb-C5oSvMH3VFq4GKqzq_kj-v6emnUF9WEDfDAw8EdexmDd2UUuo4S45cmcE8geKXqKmF1avNFm7cUTCUd3HKCrhoa8gTG9fQezAWvNOfilQlKSP1v6eNkZCYf2Eb2DmE87GqTrcR-i60vYQZusc18G-fwNUNGf9tmv8cwnf2JN_D9FvUDnPX-_jHpArhEptxGSJUBcPrLznBluLB3c7B9gMnD09MjTNNUkDmg_wop_x4hmTAUAcqlwayD3LVES-6wq8nZz9PzIo9RKLwsxaJwom7arrSNq31deaddEN4qzX3T-rqpLJptYZWqpG2lDLWIMgSrq6AJagc9jF222s_6uMdAlRGpfNd6z2XsuNMx-URCBnSLVD1iR88na3zGGKdRFzcGYw1ig1liw4gdvhDfDdAa_yY7IRa9kBAedvqAUmKylJj_ScmIfSEGG7q1uCFvc_MB_hbhX5mxxjhZCzTUI7b_LAMmX-e5oedmTUh57cf32M0ntkZT64eKs322urh_iJ_Rt1m4gyTGfwFagPTj priority: 102 providerName: Directory of Open Access Journals |
Title | A Novel Image Encryption Scheme Using Chaotic Maps and Fuzzy Numbers for Secure Transmission of Information |
URI | https://www.proquest.com/docview/2829702319 https://doaj.org/article/c4edcb0e375e41068d1c965906f23a78 |
Volume | 13 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwELZoe4EDaguILWXlQyUeUkQSO7ZzQttql4LUFQIq9Wb5FZDaJstmi9T--s54vdtWAq6JZSWemW8etr8h5IDnSnrR2Mx7gEAuLOCgyOvMNV5imd_LBksDJ1NxfMq_nFVnqeDWp2OVK0yMQO07hzXyD7jjJ5GsrP44-51h1yjcXU0tNDbIFkCwguRr63A8_fptXWVB1ktV5MuLeQzye9wXLlhRyqJgD1xRZOz_Fy5HZzPZJk9TlEhHS7HukEeh3SVP7nEH7pKdZJU9fZuoo989I-cjOu3-hAv6-RJwgo5bN7-OmEC_g3AuA40nBOjRL9PBzPTEzHpqWk8nVzc313Qau4P0FOJYGuvwgUZXBqqANTXaNTTdXsIpn5PTyfjH0XGW2ilkjudskVlWqbrJjbKVq0pnpfXMGSELp2pXqdLA6jIjRMlNzbmvWODeG1l6iZQ7EGm8IJtt14aXhIo8wCjX1M4VPDSFlSHGRox7CI9ENSDvVyurXeIax5YXFxpyDhSDvieGATlYD54tKTb-PuwQRbQegrzY8UE3_6mTmWnHg3c2D0xWgUO2q3zhkDIxF03JjFQD8gYFrNF64YOcSZcQ4LeQB0uPJOTLkoHDHpD9lQ7oZNa9vlPCvf-_fkUeY1_65ZmyfbK5mF-F1xC9LOyQbKjJp2FS1GGsAdwCrIfv4w |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9QwEB2VcgAOiBYQCwV8KOJDikhiJ04OCC2lyy7t7oVW6s11bIdKbZNldwva_ih-IzNOshQJuPUaW07iGb8Zjz1vALZFmEmblkVgLUKgSAvEwTTMA1NaSWF-K0sKDYwn6fBQfD5KjtbgZ5cLQ9cqO0z0QG1rQzHyt3TiJ4msLH8__RZQ1Sg6Xe1KaDRqseeWP3DLNn83-ojyfRHHg92DnWHQVhUIjAj5Iih4kuVlqLMiMUlsCllYbnQqI5PlJslijS_hOk1joXMhbMKdsFbL2EpinkGDi-PegJuC85xWVDb4tIrpEMdmFoVNGiC2h3QKHfEollHE_zB8vj7Av6yAN22De3C39UlZv1GiDVhz1SbcucJUuAkbLQbM2auWqPr1fTjts0n93Z2x0TmiEtutzGzpEYh9QVU4d8zfR2A7J7rGkdlYT-dMV5YNLi4vl2zia5HMGXrNzEf9HfOGExWPInisLlmbK0VDPoDDa5nmh7Be1ZV7BCwNHfYyZW5MJFwZFdJ5T4wLi85YmvTgTTezyrTM5lRg40zhDofEoK6IoQfbq87ThtDj790-kIhWXYiF2z-oZ19Vu6iVEc6aInRcJk7g3jqzkSGCxjAtY65l1oOXJGBFWIEfZHSb8oC_Raxbqi9xdy45ugc92Op0QLUgMle_Vf7x_5ufw63hwXhf7Y8me0_gdowPm9tsW7C-mF24p-g3LYpnXlkZHF_36vgFgKkoiQ |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VrYTggGgBsaWAD0U8pKhJ7MTJAaFtu6supVEFVOotdWwHpLbJsrsFbX8av46ZxFmKBNx6dSwn8Yy_edj-BmBL-Ik0cVl4xiAEirhAHIz91NOlkZTmN7Kk1MBhFu8fi_cn0ckK_OzuwtCxyg4TG6A2taYc-Tbt-EkiK0u3S3cs4mhv9G7yzaMKUrTT2pXTaFXkwC5-YPg2ezveQ1m_CMPR8PPuvucqDHha-HzuFTxK0tJXSRHpKNSFLAzXKpaBTlIdJaHCF3IVx6FQqRAm4lYYo2RoJLHQoPHFcW_BqsSoyO_B6s4wO_q4zPAQ42YS-O2lQM5Tn_akAx6EMgj4H2awqRbwL5vQGLrRfbjnPFQ2aFVqDVZstQ53r_EWrsOaQ4QZe-Voq18_gLMBy-rv9pyNLxCj2LDS00WDR-wTKsaFZc3pBLb7VdU4MjtUkxlTlWGjy6urBcuayiQzhj40a_YALGvMKKoh5fNYXTJ3c4qGfAjHNzLRj6BX1ZV9DCz2LfbSZap1IGwZFNI2fhkXBl2zOOrDm25mc-14zqncxnmO8Q6JIb8mhj5sLTtPWnqPv3fbIREtuxAnd9NQT7_kbonnWlijC99yGVmBkXZiAk10jX5chlzJpA8vScA5IQd-kFbuAgT-FnFw5QOJsbrk6Cz0YbPTgdxByiz_vQA2_v_4OdzGlZF_GGcHT-BOiG3t0bZN6M2nl_YpOlHz4pnTVganN71AfgFIOy4b |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Image+Encryption+Scheme+Using+Chaotic+Maps+and+Fuzzy+Numbers+for+Secure+Transmission+of+Information&rft.jtitle=Applied+sciences&rft.au=Dani+Elias+Mfungo&rft.au=Fu%2C+Xianping&rft.au=Xian%2C+Yongjin&rft.au=Wang%2C+Xingyuan&rft.date=2023-06-01&rft.pub=MDPI+AG&rft.eissn=2076-3417&rft.volume=13&rft.issue=12&rft.spage=7113&rft_id=info:doi/10.3390%2Fapp13127113&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon |