Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure
This paper proposes a dynamic RNA-encoded color image encryption scheme based on a chain feedback structure. Firstly, the color pure image is decomposed into red, green, and blue components, and then a chaotic sequence based on plaintext association is introduced to encrypt the red component. Second...
Saved in:
Published in | Mathematics (Basel) Vol. 11; no. 14; p. 3133 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
01.07.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper proposes a dynamic RNA-encoded color image encryption scheme based on a chain feedback structure. Firstly, the color pure image is decomposed into red, green, and blue components, and then a chaotic sequence based on plaintext association is introduced to encrypt the red component. Secondly, the intermediate ciphertext is obtained by diffusion after encryption by bit-level permutation, RNA dynamic encoding, RNA dynamic operation rules, and RNA dynamic decoding. Finally, to enhance the security of the image cryptosystem, the green and blue components of the image are repeatedly encrypted using the chain encryption mechanism associated with the intermediate ciphertext to obtain the color cryptographic image. In this paper, a 2D-SFHM chaotic system is used to provide pseudo-random chaotic sequences, and its initial key is calculated by combining the hash function and external parameters of the image, and the one-time ciphertext encryption strategy causes the proposed encryption to effectively resist cryptographic attacks. Experimental results and security analysis show that our encryption algorithm has excellent encryption effects and security performance against various typical attacks. |
---|---|
AbstractList | This paper proposes a dynamic RNA-encoded color image encryption scheme based on a chain feedback structure. Firstly, the color pure image is decomposed into red, green, and blue components, and then a chaotic sequence based on plaintext association is introduced to encrypt the red component. Secondly, the intermediate ciphertext is obtained by diffusion after encryption by bit-level permutation, RNA dynamic encoding, RNA dynamic operation rules, and RNA dynamic decoding. Finally, to enhance the security of the image cryptosystem, the green and blue components of the image are repeatedly encrypted using the chain encryption mechanism associated with the intermediate ciphertext to obtain the color cryptographic image. In this paper, a 2D-SFHM chaotic system is used to provide pseudo-random chaotic sequences, and its initial key is calculated by combining the hash function and external parameters of the image, and the one-time ciphertext encryption strategy causes the proposed encryption to effectively resist cryptographic attacks. Experimental results and security analysis show that our encryption algorithm has excellent encryption effects and security performance against various typical attacks. |
Audience | Academic |
Author | Huang, Yiming Wu, Zhuxi Wen, Heping Kang, Shenghao Lin, Yiting |
Author_xml | – sequence: 1 givenname: Heping orcidid: 0000-0002-1178-4598 surname: Wen fullname: Wen, Heping – sequence: 2 givenname: Shenghao surname: Kang fullname: Kang, Shenghao – sequence: 3 givenname: Zhuxi surname: Wu fullname: Wu, Zhuxi – sequence: 4 givenname: Yiting orcidid: 0000-0003-4159-3132 surname: Lin fullname: Lin, Yiting – sequence: 5 givenname: Yiming orcidid: 0009-0007-0004-6470 surname: Huang fullname: Huang, Yiming |
BookMark | eNptkUFvVCEUhYmpibV25w8gcetU4PJ4sByftk7SaNLqmtwHvBnGGRh5zKL_XtrRpDHC4t5czncCnNfkLOUUCHnL2RWAYR_2WDeccwkc4AU5F0L0i74dnD3rX5HLed6ytgwHLc05ufn0kHAfHb37uqRD9jGtW9nlQld7XAc6xMMmFPoR5-BpTnTYYEz0OgQ_ovtJ72s5unos4Q15OeFuDpd_6gX5cf35-_BlcfvtZjUsbxdOMlUXDpQPZvJKsGB0EIoxDt50mk0gPUPwEjscJ-WhB8Wl5sKBkxy45-hNgAuyOvn6jFt7KHGP5cFmjPZpkMvaYqnR7YIdVe9G1NJrJyQqjtpDJ3qPQopOhbF5vTt5HUr-dQxztdt8LKld3wotgfUGetlUVyfVGptpTFOuBV3bPrR_axlMsc2XfWd412nVNUCcAFfyPJcwWRcr1phTA-POcmYfA7PPA2vQ-3-gv2_7r_w3zT-V9w |
CitedBy_id | crossref_primary_10_1038_s41598_023_41082_9 crossref_primary_10_1016_j_isci_2023_108610 crossref_primary_10_1080_09500340_2024_2418371 crossref_primary_10_3390_biophysica3030037 crossref_primary_10_1016_j_eswa_2024_123748 crossref_primary_10_1038_s41598_024_59277_z crossref_primary_10_1109_ACCESS_2024_3444732 crossref_primary_10_3390_e25101399 crossref_primary_10_3934_math_2024278 crossref_primary_10_1088_1402_4896_ad30ec crossref_primary_10_3390_s23198090 crossref_primary_10_1016_j_eswa_2023_121514 crossref_primary_10_1038_s41598_024_53325_4 crossref_primary_10_1080_09500340_2024_2395982 crossref_primary_10_1371_journal_pone_0300228 crossref_primary_10_3390_e26020154 crossref_primary_10_1016_j_jksuci_2023_101660 crossref_primary_10_1016_j_jestch_2024_101634 |
Cites_doi | 10.1016/j.ijleo.2022.169042 10.1142/S0218127423500633 10.1109/JAS.2022.105443 10.1016/j.ins.2020.12.037 10.1016/j.optlaseng.2013.06.015 10.1016/j.eswa.2022.119074 10.1016/j.sigpro.2014.10.033 10.1142/S0218127418500475 10.1140/epjp/i2018-12138-3 10.3390/math10152751 10.1109/LSP.2022.3163685 10.1016/j.asoc.2022.109847 10.1016/j.optlaseng.2019.105836 10.1016/j.ins.2020.08.019 10.1016/j.future.2019.07.064 10.1109/TCE.2022.3200488 10.1016/j.sigpro.2013.10.034 10.1109/TC.2021.3051387 10.1109/TMM.2022.3200310 10.1016/j.optlaseng.2015.09.007 10.1016/j.eswa.2023.119923 10.1016/j.chaos.2023.113339 10.1016/j.optlaseng.2022.107443 10.1007/s11277-020-07680-w 10.1007/s11042-023-14921-0 10.1016/j.aej.2023.04.060 10.1007/s11042-021-10757-8 10.3390/electronics10151770 10.1016/j.compeleceng.2012.02.007 10.1016/j.asoc.2023.110236 10.3390/math10173180 10.1007/s11042-022-14255-3 10.3390/e24101332 10.1109/TCSVT.2021.3070348 10.1109/TCSI.2018.2888688 10.1016/j.ins.2014.03.039 10.1016/j.asoc.2020.106162 10.1016/j.ins.2021.06.032 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION 3V. 7SC 7TB 7XB 8AL 8FD 8FE 8FG 8FK ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO FR3 GNUQQ HCIFZ JQ2 K7- KR7 L6V L7M L~C L~D M0N M7S P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS Q9U DOA |
DOI | 10.3390/math11143133 |
DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts Mechanical & Transportation Engineering Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection (via ProQuest SciTech Premium Collection) ProQuest One Community College ProQuest Central Korea Engineering Research Database ProQuest Central Student SciTech Premium Collection (via ProQuest) ProQuest Computer Science Collection Computer Science Database Civil Engineering Abstracts ProQuest Engineering Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Engineering Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection ProQuest Central Basic DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) Mechanical & Transportation Engineering Abstracts ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Engineering Collection Advanced Technologies & Aerospace Collection Civil Engineering Abstracts ProQuest Computing Engineering Database ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional ProQuest One Academic UKI Edition Materials Science & Engineering Collection Engineering Research Database ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
DatabaseTitleList | Publicly Available Content Database CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ (Directory of Open Access Journals) url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Mathematics |
EISSN | 2227-7390 |
ExternalDocumentID | oai_doaj_org_article_b67cba84d8c24a61a8d3527da24256eb A759155865 10_3390_math11143133 |
GroupedDBID | -~X 5VS 85S 8FE 8FG AADQD AAFWJ AAYXX ABDBF ABJCF ABPPZ ABUWG ACIPV ACIWK ADBBV AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS AMVHM ARAPS AZQEC BCNDV BENPR BGLVJ BPHCQ CCPQU CITATION DWQXO GNUQQ GROUPED_DOAJ HCIFZ IAO ITC K6V K7- KQ8 L6V M7S MODMG M~E OK1 PHGZM PHGZT PIMPY PQQKQ PROAC PTHSS RNS PMFND 3V. 7SC 7TB 7XB 8AL 8FD 8FK FR3 JQ2 KR7 L7M L~C L~D M0N P62 PKEHL PQEST PQGLB PQUKI PRINS Q9U PUEGO |
ID | FETCH-LOGICAL-c406t-c36de9fd620e98e260013d9580f34d0a3d4a5abf6d373614812c3c4131d1ad9e3 |
IEDL.DBID | DOA |
ISSN | 2227-7390 |
IngestDate | Wed Aug 27 01:32:33 EDT 2025 Fri Jul 25 10:34:25 EDT 2025 Tue Jun 10 21:34:02 EDT 2025 Thu Apr 24 23:08:46 EDT 2025 Tue Jul 01 01:53:17 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 14 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c406t-c36de9fd620e98e260013d9580f34d0a3d4a5abf6d373614812c3c4131d1ad9e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0009-0007-0004-6470 0000-0003-4159-3132 0000-0002-1178-4598 |
OpenAccessLink | https://doaj.org/article/b67cba84d8c24a61a8d3527da24256eb |
PQID | 2843079374 |
PQPubID | 2032364 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_b67cba84d8c24a61a8d3527da24256eb proquest_journals_2843079374 gale_infotracacademiconefile_A759155865 crossref_citationtrail_10_3390_math11143133 crossref_primary_10_3390_math11143133 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-07-01 |
PublicationDateYYYYMMDD | 2023-07-01 |
PublicationDate_xml | – month: 07 year: 2023 text: 2023-07-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Mathematics (Basel) |
PublicationYear | 2023 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | Wei (ref_17) 2023; 213 Melman (ref_22) 2023; 132 Chen (ref_29) 2022; 68 Yu (ref_31) 2021; 554 Xu (ref_40) 2016; 78 Singh (ref_3) 2021; 33 Shafique (ref_38) 2018; 133 Mehra (ref_35) 2014; 52 ref_11 Wang (ref_14) 2021; 574 Lee (ref_13) 2014; 273 Ariatmanto (ref_15) 2022; 34 Zhang (ref_10) 2022; 82 ref_19 Banerjee (ref_25) 2023; 170 Li (ref_2) 2022; 260 Li (ref_23) 2022; 71 Sisaudia (ref_16) 2022; 69 Shafique (ref_44) 2020; 115 Campo (ref_42) 2015; 109 Xiang (ref_34) 2021; 545 Lu (ref_27) 2023; 33 Li (ref_24) 2019; 66 Araghi (ref_12) 2019; 101 Mansouri (ref_43) 2021; 80 Vikas (ref_33) 2023; 140 Wen (ref_20) 2023; 15 Lai (ref_37) 2023; 223 Shahna (ref_18) 2020; 90 Chen (ref_30) 2022; 9 Wen (ref_28) 2023; 35 Zhou (ref_32) 2014; 97 Chai (ref_4) 2022; 29 Zhang (ref_7) 2022; 32 Xie (ref_21) 2023; 163 ref_26 Liu (ref_41) 2012; 38 ref_9 ref_8 Hu (ref_36) 2023; 73 Luo (ref_1) 2020; 124 ref_5 Yin (ref_39) 2018; 28 ref_6 |
References_xml | – volume: 260 start-page: 169042 year: 2022 ident: ref_2 article-title: An image encryption algorithm based on discrete fractional wavelet transform and quantum chaos publication-title: Optik doi: 10.1016/j.ijleo.2022.169042 – volume: 33 start-page: 2350063 year: 2023 ident: ref_27 article-title: Periodicity Analysis of Logistic Map over Ring Z3n publication-title: Int. J. Bifurc. Chaos doi: 10.1142/S0218127423500633 – volume: 9 start-page: 573 year: 2022 ident: ref_30 article-title: Searching for Best Network Topologies with Optimal Synchronizability: A Brief Review publication-title: IEEE/CAA J. Autom. Sin. doi: 10.1109/JAS.2022.105443 – volume: 554 start-page: 145 year: 2021 ident: ref_31 article-title: Differential cryptanalysis of image cipher using block-based scrambling and image filtering publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.12.037 – volume: 52 start-page: 167 year: 2014 ident: ref_35 article-title: Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude- and phase- truncation approach publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2013.06.015 – volume: 213 start-page: 119074 year: 2023 ident: ref_17 article-title: A secure image encryption algorithm based on hyper-chaotic and bit-level permutation publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.119074 – ident: ref_5 – volume: 109 start-page: 119 year: 2015 ident: ref_42 article-title: A RGB image encryption algorithm based on total plain image characteristics and chaos publication-title: Signal Process. doi: 10.1016/j.sigpro.2014.10.033 – volume: 69 start-page: 103296 year: 2022 ident: ref_16 article-title: A secure gray-scale image watermarking technique in fractional DCT domain using zig-zag scrambling publication-title: J. Inf. Secur. Appl. – volume: 28 start-page: 1850047 year: 2018 ident: ref_39 article-title: A New Chaotic Image Encryption Scheme Using Breadth-First Search and Dynamic Diffusion publication-title: Int. J. Bifurc. Chaos doi: 10.1142/S0218127418500475 – volume: 133 start-page: 331 year: 2018 ident: ref_38 article-title: Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps publication-title: Eur. Phys. J. Plus doi: 10.1140/epjp/i2018-12138-3 – ident: ref_19 doi: 10.3390/math10152751 – volume: 29 start-page: 972 year: 2022 ident: ref_4 article-title: TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2022.3163685 – volume: 132 start-page: 109847 year: 2023 ident: ref_22 article-title: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete Fourier transform domain publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2022.109847 – volume: 124 start-page: 105836 year: 2020 ident: ref_1 article-title: Image encryption scheme by combining the hyper-chaotic system with quantum coding publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.105836 – volume: 545 start-page: 188 year: 2021 ident: ref_34 article-title: Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.08.019 – volume: 101 start-page: 1223 year: 2019 ident: ref_12 article-title: An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.07.064 – volume: 68 start-page: 336 year: 2022 ident: ref_29 article-title: Pinning Control of Complex Dynamical Networks publication-title: IEEE Trans. Consum. Electron. doi: 10.1109/TCE.2022.3200488 – volume: 97 start-page: 172 year: 2014 ident: ref_32 article-title: A new 1D chaotic system for image encryption publication-title: Signal Process. doi: 10.1016/j.sigpro.2013.10.034 – volume: 71 start-page: 364 year: 2022 ident: ref_23 article-title: The Graph Structure of the Generalized Discrete Arnold’s Cat Map publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2021.3051387 – ident: ref_6 doi: 10.1109/TMM.2022.3200310 – volume: 78 start-page: 17 year: 2016 ident: ref_40 article-title: A novel bit-level image encryption algorithm based on chaotic maps publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2015.09.007 – volume: 223 start-page: 119923 year: 2023 ident: ref_37 article-title: A cross-channel color image encryption algorithm using two-dimensional hyperchaotic map publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2023.119923 – volume: 170 start-page: 113339 year: 2023 ident: ref_25 article-title: Spatio-temporal chaos and clustering induced by nonlocal information and vaccine hesitancy in the SIR epidemic model publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2023.113339 – volume: 163 start-page: 107443 year: 2023 ident: ref_21 article-title: Fourier coded aperture transform hyperspectral imaging system publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2022.107443 – volume: 33 start-page: 844 year: 2021 ident: ref_3 article-title: Level by level image compression-encryption algorithm based on quantum chaos map publication-title: J. King Saud Univ.-Comput. Inf. Sci. – volume: 115 start-page: 2243 year: 2020 ident: ref_44 article-title: Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-020-07680-w – volume: 34 start-page: 605 year: 2022 ident: ref_15 article-title: Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking publication-title: J. King Saud Univ.-Comput. Inf. Sci. – ident: ref_26 doi: 10.1007/s11042-023-14921-0 – volume: 35 start-page: 101612 year: 2023 ident: ref_28 article-title: Cryptanalyzing an image cipher using multiple chaos and DNA operations publication-title: J. King Saud Univ.-Comput. Inf. Sci. – volume: 73 start-page: 385 year: 2023 ident: ref_36 article-title: Color image encryption base on a 2D hyperchaotic enhanced Henon map and cross diffusion publication-title: Alex. Eng. J. doi: 10.1016/j.aej.2023.04.060 – volume: 80 start-page: 21955 year: 2021 ident: ref_43 article-title: A novel block-based image encryption scheme using a new Sine powered chaotic map generator publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-021-10757-8 – ident: ref_8 doi: 10.3390/electronics10151770 – volume: 38 start-page: 1240 year: 2012 ident: ref_41 article-title: A RGB image encryption algorithm based on DNA encoding and chaos map publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2012.02.007 – volume: 140 start-page: 110236 year: 2023 ident: ref_33 article-title: Chaos-based optimal path planning of humanoid robot using hybridized regression-gravity search algorithm in static and dynamic terrains publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2023.110236 – ident: ref_9 doi: 10.3390/math10173180 – volume: 82 start-page: 23401 year: 2022 ident: ref_10 article-title: An image encryption algorithm based on joint RNA-level permutation and substitution publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-022-14255-3 – ident: ref_11 doi: 10.3390/e24101332 – volume: 32 start-page: 947 year: 2022 ident: ref_7 article-title: HF-TPE: High-Fidelity Thumbnail- Preserving Encryption publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2021.3070348 – volume: 15 start-page: 1 year: 2023 ident: ref_20 article-title: Secure Optical Image Communication Using Double Random Transformation and Memristive Chaos publication-title: IEEE Photonics J. – volume: 66 start-page: 2322 year: 2019 ident: ref_24 article-title: Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks publication-title: IEEE Trans. Circuits Syst. I Regul. Pap. doi: 10.1109/TCSI.2018.2888688 – volume: 273 start-page: 263 year: 2014 ident: ref_13 article-title: DWT based coding DNA watermarking for DNA copyright protection publication-title: Inf. Sci. doi: 10.1016/j.ins.2014.03.039 – volume: 90 start-page: 106162 year: 2020 ident: ref_18 article-title: A novel image encryption scheme using both pixel level and bit level permutation with chaotic map publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2020.106162 – volume: 574 start-page: 505 year: 2021 ident: ref_14 article-title: A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT publication-title: Inf. Sci. doi: 10.1016/j.ins.2021.06.032 |
SSID | ssj0000913849 |
Score | 2.3412182 |
Snippet | This paper proposes a dynamic RNA-encoded color image encryption scheme based on a chain feedback structure. Firstly, the color pure image is decomposed into... |
SourceID | doaj proquest gale crossref |
SourceType | Open Website Aggregation Database Enrichment Source Index Database |
StartPage | 3133 |
SubjectTerms | Algorithms Analysis chain encryption Chaos theory chaotic encryption Color coding Color imagery Cryptography Data encryption Decoding Deoxyribonucleic acid DNA dynamic RNA encoding Efficiency Encryption Feedback Food science Hash based algorithms Image coding image encryption Image enhancement Investment analysis Permutations Pseudorandom RNA Security Sequences Wavelet transforms |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1NT9wwELXocmkPCGirLl_ygaqHKiIbO45zQrsLC1RiVdEicbMcjw0ISICF_89M4t2WA5wiJT44M555M_b4DWO7ATFNpSCTAHmVyBxUUgpwSaYxB8pCSIOk28inU3V8Ln9d5Bdxw20WyyrnPrF11NA42iPfQzcqWjI3uX__kFDXKDpdjS00PrBldMFa99jy6HD6-2yxy0Ksl1qWXcW7wPx-D-PAK7RvxE0hXmFRS9n_lmNu0WayylZimMiHnV7X2JKv19mn0wXH6uwzOzromsnzs-mQjxvCIHxg-s1P7tBJ8PE1MQbwEcIU8Kbm4yt7XfMJolVl3Q3_0xLHPj_6L-x8cvh3fJzEtgiJQ_R9SpxQ4MsAKkt9qT0xzA8ElLlOg5CQWgHS5rYKCkQhiOdzkDnhEKwGMLBQevGV9eqm9t8YdxBCkSmXeV9J5bVVRMCWWQxCQFlf9dnPuYCMi5zh1Lri1mDuQOI0_4uzz74vRt93XBlvjBuRrBdjiOG6fdE8XppoMKZShauslqBdJnFeVgPGigVYypEUTe0HacqQHeKUnI3XCfDHiNHKDIucqO-1yvtsa65MEw10Zv4tp433P2-yj9RhvqvQ3WI9VI7fxjjkqdqJi-0FHx7b5g priority: 102 providerName: ProQuest |
Title | Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure |
URI | https://www.proquest.com/docview/2843079374 https://doaj.org/article/b67cba84d8c24a61a8d3527da24256eb |
Volume | 11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT9wwEB3xcSmHqqWtuoWufCjqAUUkseM4x92FhSKxQlAkbpbtsQWC7laF_n9mkrDaHhCXniJFPkxmMvPmSeM3AN8SYZrOUWUJK5-pCnXWSAxZaYgDlSnlSfFt5LOZPrlSp9fV9cqqL54J6-SBO8cdeF0H74xCE0rldOEMUs9Qo-NeWUfP1Zcwb4VMtTW4KaRRTTfpLonXH1D_d0N5TXgp5T8Y1Er1v1SQW5SZvoO3fXsoRp1Z72Etzrdh62yprfrwAY4PuyXy4mI2EpMFYw89iHaLH7-oOIjJLSsFiDHBE4rFXExuiPyLKaGUd-FOXLaCsX__xI9wNT36OTnJ-nUIWSDUfcyC1BibhLrMY2MiK8sXEpvK5EkqzJ1E5Srnk0ZZS9b3LMogA4FUgYXDJspPsDFfzONnEAFTqksdyhi90tGQX4mGlI6aD9Qu-gHsPzvIhl4rnFdW3FviDOxOu-rOAewtT__uNDJeODdmXy_PsLJ1-4Libft429fiPYDvHCnL-UcmBddfI6APYyUrO6orlrw3uhrA7nMwbZ-YD5bQWLaagOrL_7BmB97w_vlufncXNiiE8St1KY9-COtmejyEzfHR7Pxi2P6eT-tA5eA |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZKOQAHxFMsFPCBigOKmrUdxzkgtN2y3aXdPUAr9WYcj00r2qR0ixB_it_ITB4LHMqtp0iJFTkz4_lmHM83jL2KiGk6BZVEyMpEZaCTQoJPhMEcSMSYRkXVyPOFnh6qD0fZ0Rr71dfC0LHK3ic2jhpqT3vkW-hGZUPmpt6df0uoaxT9Xe1baLRmsRd-_sCUbfl2toP63RRi8v5gPE26rgKJR_C6TLzUEIoIWqShMIEI2ocSisykUSpInQTlMldGDTKXRJM5FF569PVDGDoogsT33mA3lUQkp8r0ye5qT4c4No0q2vP1-DzdwqjzGL0JorSU_yBf0yDgKhhosG1yj93tglI-aq3oPlsL1QN2Z75idF0-ZLs7bet6_nEx4uOaEA8vmOzz2Rm6JD4-IX4Cvo2gCLyu-PjYnVR8gthYOv-Vf2poar9fhEfs8FrE9ZitV3UVnjDuIcZcaC9CKJUOxmmiexMOQx7QLpQD9qYXkPUdQzk1yji1mKmQOO3f4hywzdXo85aZ44px2yTr1Rji025u1BdfbLc8balzXzqjwHihcF7OAEamOTjKyDRN7TVpytKqxyl51xUv4IcRf5Yd5RkR7RudDdhGr0zbuYOl_WO8T___-CW7NT2Y79v92WLvGbtNve3bs8EbbB0VFZ5jBHRZvmjMjrPP123nvwFbbRa1 |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VrYTggHiKhQI-UHFA0WZtx0kOVbWPLl1KV1WhUm_G8YNWQNJ2i1D_Gr-OmTwWOJRbT5ESK3JmJt83k9jfALwOyGkqdjIKLikimTgV5cLZiGdYA_EQ4iBpN_L-Qu0eyffHyfEa_Or2wtCyyg4Ta6B2laVv5AOEUVGLuclBaJdFHExn22fnEXWQoj-tXTuNJkT2_NVPLN-WW_Mp-nqT89nOp8lu1HYYiCwS2WVkhXI-D07x2OeZJ7H2oXB5ksVBSBcb4aRJTBGUE6kgycwht8Ii7g_d0LjcC7zvLVhPqSrqwfp4Z3FwuPrCQ4qbmcyb1fZC5PEAc9ATxBbkbCH-4cG6XcB1pFAz3ew-3GtTVDZqYuoBrPnyIdzdX-m7Lh_Bu2nTyJ4dLkZsUhH_4QFLfzb_jgDFJqekVsDGSJGOVSWbnJjTks2QKQtjv7KPtWjtjwv_GI5uxGBPoFdWpX8KzLoQUq4s976QymdGkfgbN5gAOWV80Ye3nYG0bfXKqW3GN411C5lT_23OPmyuRp81Oh3XjBuTrVdjSF27PlFdfNHty6oLldrCZNJllkucl8kc5qmpM1SfKZraG_KUJgzAKVnTbmXAByM1LT1KE5Ldz1TSh43OmboFh6X-E8rP_n_5FdzGGNcf5ou953CHGt03C4U3oId-8i8wHbosXrZxx-DzTYf6b_kBHEc |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Dynamic+RNA+Coding+Color+Image+Cipher+Based+on+Chain+Feedback+Structure&rft.jtitle=Mathematics+%28Basel%29&rft.au=Heping+Wen&rft.au=Shenghao+Kang&rft.au=Zhuxi+Wu&rft.au=Yiting+Lin&rft.date=2023-07-01&rft.pub=MDPI+AG&rft.eissn=2227-7390&rft.volume=11&rft.issue=14&rft.spage=3133&rft_id=info:doi/10.3390%2Fmath11143133&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_b67cba84d8c24a61a8d3527da24256eb |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2227-7390&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2227-7390&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2227-7390&client=summon |