An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map

This paper proposes a new chaotic image encryption scheme, which employs Josephus traversing and mixed chaotic map. The scheme consists of three processes: key stream generation process; three-round scrambling process; and one-round diffusion process. The proposed mathematical model is applied for t...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 6; pp. 23733 - 23746
Main Authors Wang, Xingyuan, Zhu, Xiaoqiang, Zhang, Yingqian
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.01.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper proposes a new chaotic image encryption scheme, which employs Josephus traversing and mixed chaotic map. The scheme consists of three processes: key stream generation process; three-round scrambling process; and one-round diffusion process. The proposed mathematical model is applied for the key stream generator in the first process. The initial values and parameters are sensitive to both the secret keys in the new scheme and plain images. The second process employs the Josephus traversing in scrambling; then the rows and columns of pixels are exchanged. The third process can modify the pixel gray-level values and crack the strong correlations between adjacent pixels simultaneously. The initial conditions for chaotic systems are derived using external secret keys by applying some algebraic transformations to the key. Security analysis indicates that the new scheme is effective, which can resist common attacks.
AbstractList This paper proposes a new chaotic image encryption scheme, which employs Josephus traversing and mixed chaotic map. The scheme consists of three processes: key stream generation process; three-round scrambling process; and one-round diffusion process. The proposed mathematical model is applied for the key stream generator in the first process. The initial values and parameters are sensitive to both the secret keys in the new scheme and plain images. The second process employs the Josephus traversing in scrambling; then the rows and columns of pixels are exchanged. The third process can modify the pixel gray-level values and crack the strong correlations between adjacent pixels simultaneously. The initial conditions for chaotic systems are derived using external secret keys by applying some algebraic transformations to the key. Security analysis indicates that the new scheme is effective, which can resist common attacks.
Author Wang, Xingyuan
Zhu, Xiaoqiang
Zhang, Yingqian
Author_xml – sequence: 1
  givenname: Xingyuan
  orcidid: 0000-0002-9724-0152
  surname: Wang
  fullname: Wang, Xingyuan
  email: wangxy@dlut.edu.cn
  organization: School of Information Science and Technology, Dalian Maritime University, Dalian, China
– sequence: 2
  givenname: Xiaoqiang
  surname: Zhu
  fullname: Zhu, Xiaoqiang
  organization: School of Electronic and Information Engineering, Dalian University of Technology, Dalian, China
– sequence: 3
  givenname: Yingqian
  surname: Zhang
  fullname: Zhang, Yingqian
  organization: School of Information Science and Technology, Xiamen University Tan Kah Kee College, Zhangzhou, China
BookMark eNp9kUtLAzEAhIMo-PwFXgKeW_PcTY51qVpRFNRzyCbZNqXdrMlW9N-buiriwVwShvmGIXMIdtvQOgBOMRpjjOT5pKqmj49jgrAYE4G4YOUOOCC4kCPKabH7670PTlJaonxElnh5AB4mLZyt9dzBaWvie9f70MLJah6i7xdreKGTszBLNyG5brFJ8CnqVxeTb-dQtxbe-bdsqBY69N7AO90dg71Gr5I7-bqPwPPl9Km6Ht3eX82qye3IMCT6kUa5AKkJqbkrGmF4SayRVJS4FJZZg3DDhKmNYQwhKnlNeYGwdboorWOopkdgNuTaoJeqi36t47sK2qtPIcS50jF3WjllTWGYa3BjCGKsNJJJyi1rZMG4IdjmrLMhq4vhZeNSr5ZhE9tcXxHGuSREYJJdcnCZGFKKrlHG93r7YX3UfqUwUts91LCH2u6hvvbILP3Dfjf-nzodKO-c-yEERTi76AfIa5bE
CODEN IAECCG
CitedBy_id crossref_primary_10_3390_app14167119
crossref_primary_10_1016_j_chaos_2020_110582
crossref_primary_10_15446_dyna_v87n213_81859
crossref_primary_10_1007_s11042_023_14794_3
crossref_primary_10_1016_j_jksuci_2023_101790
crossref_primary_10_1016_j_jisa_2019_102412
crossref_primary_10_1007_s11276_022_03162_y
crossref_primary_10_3390_e21070656
crossref_primary_10_1007_s11042_019_7235_y
crossref_primary_10_1109_ACCESS_2019_2959137
crossref_primary_10_1016_j_optlaseng_2021_106782
crossref_primary_10_1049_iet_ipr_2019_0991
crossref_primary_10_1109_ACCESS_2019_2925081
crossref_primary_10_1109_ACCESS_2020_2982827
crossref_primary_10_1007_s11042_023_17940_z
crossref_primary_10_1088_1402_4896_ad1020
crossref_primary_10_1109_ACCESS_2020_2972296
crossref_primary_10_3390_molecules23081878
crossref_primary_10_3390_math11224613
crossref_primary_10_17780_ksujes_1208570
crossref_primary_10_1088_1674_1056_28_4_040504
crossref_primary_10_1109_ACCESS_2018_2871102
crossref_primary_10_1109_ACCESS_2019_2893176
crossref_primary_10_1109_COMST_2020_3014304
crossref_primary_10_3390_s21010282
crossref_primary_10_56714_bjrs_48_2_8
crossref_primary_10_1007_s11042_021_10631_7
crossref_primary_10_1016_j_jisa_2019_102390
crossref_primary_10_1051_bioconf_20249700020
crossref_primary_10_3390_app13127113
crossref_primary_10_1007_s12652_021_03659_y
crossref_primary_10_3390_sym12030355
crossref_primary_10_1007_s11042_021_10979_w
crossref_primary_10_32604_cmc_2022_028765
crossref_primary_10_1007_s11042_022_12069_x
crossref_primary_10_1016_j_ins_2019_10_028
crossref_primary_10_3390_fractalfract7030221
crossref_primary_10_1109_ACCESS_2021_3054380
crossref_primary_10_1109_ACCESS_2022_3218886
crossref_primary_10_1007_s11042_023_14947_4
crossref_primary_10_3390_e22020158
crossref_primary_10_1016_j_asoc_2020_106162
crossref_primary_10_1142_S0218127420500601
crossref_primary_10_3390_asi5030057
crossref_primary_10_1080_09500340_2022_2138593
crossref_primary_10_1109_ACCESS_2022_3144681
crossref_primary_10_1109_TMM_2019_2923111
crossref_primary_10_1109_ACCESS_2018_2863021
crossref_primary_10_1109_ACCESS_2019_2930606
crossref_primary_10_1002_cpe_7115
crossref_primary_10_1016_j_chaos_2021_110970
crossref_primary_10_1109_ACCESS_2020_3005087
crossref_primary_10_1007_s11276_019_02203_3
crossref_primary_10_1007_s11042_022_13941_6
crossref_primary_10_1117_1_JEI_31_6_063061
crossref_primary_10_1109_ACCESS_2018_2890116
crossref_primary_10_32604_cmc_2023_040629
crossref_primary_10_1016_j_optlastec_2019_105854
crossref_primary_10_1109_ACCESS_2024_3351693
crossref_primary_10_1088_1402_4896_ad9869
crossref_primary_10_1109_ACCESS_2019_2893760
crossref_primary_10_1016_j_jksuci_2022_04_002
crossref_primary_10_3233_JIFS_179568
crossref_primary_10_1016_j_jisa_2020_102626
crossref_primary_10_1109_ACCESS_2019_2963329
crossref_primary_10_1007_s11042_023_16648_4
crossref_primary_10_1016_j_chaos_2020_110028
crossref_primary_10_1007_s11042_019_08337_y
crossref_primary_10_1007_s12539_023_00565_z
crossref_primary_10_3390_e22020175
crossref_primary_10_1186_s13638_018_1167_5
crossref_primary_10_1016_j_ijin_2022_08_002
crossref_primary_10_1049_ipr2_12263
crossref_primary_10_1007_s11071_024_09306_3
crossref_primary_10_1007_s11042_020_10209_9
crossref_primary_10_3390_info15030172
crossref_primary_10_1016_j_chaos_2023_113383
crossref_primary_10_1142_S0217984924504360
crossref_primary_10_32604_cmc_2022_022224
crossref_primary_10_1007_s11042_019_07852_2
crossref_primary_10_1016_j_ijleo_2023_170517
crossref_primary_10_2139_ssrn_5117611
crossref_primary_10_1016_j_chaos_2021_111693
crossref_primary_10_1016_j_ins_2019_02_049
crossref_primary_10_1007_s10470_025_02309_z
crossref_primary_10_1016_j_chaos_2021_111334
crossref_primary_10_1109_TCSVT_2020_2990952
crossref_primary_10_1016_j_dsp_2023_104228
crossref_primary_10_1007_s11042_020_09237_2
crossref_primary_10_1109_ACCESS_2019_2921708
crossref_primary_10_1007_s11042_022_12844_w
crossref_primary_10_1049_iet_ipr_2019_0527
crossref_primary_10_1016_j_dsp_2022_103818
crossref_primary_10_1109_ACCESS_2022_3182329
crossref_primary_10_1007_s11071_021_06941_y
crossref_primary_10_1109_ACCESS_2019_2921309
crossref_primary_10_3390_e24101344
crossref_primary_10_1016_j_chaos_2021_111217
crossref_primary_10_1109_ACCESS_2019_2959031
crossref_primary_10_1109_ACCESS_2024_3353294
crossref_primary_10_1142_S0218127420501734
crossref_primary_10_1109_ACCESS_2021_3128177
crossref_primary_10_1016_j_jisa_2025_104004
crossref_primary_10_1007_s00371_023_02812_2
crossref_primary_10_1007_s11042_023_16775_y
crossref_primary_10_1016_j_optlastec_2020_106355
crossref_primary_10_3390_e26100885
crossref_primary_10_1109_ACCESS_2019_2931732
crossref_primary_10_1109_ACCESS_2019_2935017
crossref_primary_10_1109_ACCESS_2021_3096995
crossref_primary_10_1016_j_jisa_2020_102699
crossref_primary_10_1016_j_ijleo_2020_165492
crossref_primary_10_1109_ACCESS_2019_2931052
crossref_primary_10_1007_s40747_023_01187_0
crossref_primary_10_1007_s00521_024_10388_8
crossref_primary_10_1109_ACCESS_2020_2970103
crossref_primary_10_1109_ACCESS_2020_3032403
Cites_doi 10.1016/j.ins.2010.11.009
10.1080/03772063.2015.1081414
10.1016/j.engappai.2016.01.034
10.1016/j.sigpro.2011.11.004
10.1117/1.482647
10.1155/2014/632060
10.4103/0377-2063.110633
10.1007/s11042-017-4811-x
10.1007/s11071-015-2579-y
10.1007/s11071-010-9749-8
10.1007/s11071-014-1331-3
10.1016/j.asoc.2014.09.039
10.1147/rd.383.0243
10.1007/s11071-015-2330-8
10.1007/s11071-011-0006-6
10.1016/j.sigpro.2013.10.034
10.1109/TIT.1980.1056264
10.1016/j.optlaseng.2013.01.001
10.1016/j.asoc.2015.09.055
10.1016/j.image.2013.09.009
10.1016/j.optcom.2011.07.070
10.1007/s11042-017-4577-1
10.1117/1.JEI.26.1.013021
10.1007/s11071-014-1492-0
10.1016/j.asoc.2009.12.011
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2018.2805847
DatabaseName IEEE Xplore (IEEE)
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList Materials Research Database


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 23746
ExternalDocumentID oai_doaj_org_article_dc6c4ef1fc20447c94935d4f9645c21d
10_1109_ACCESS_2018_2805847
8301018
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61672124; 61370145; 61173183
  funderid: 10.13039/501100001809
– fundername: Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund
  grantid: MMJJ20170203
– fundername: Program for New Century Excellent Talents in Fujian Province University
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-a01692b22b5e6f8c572dc9387178d4dc01f48cbcc4400395b35601dea67de40b3
IEDL.DBID DOA
ISSN 2169-3536
IngestDate Wed Aug 27 01:09:05 EDT 2025
Mon Jun 30 06:55:37 EDT 2025
Tue Jul 01 02:17:29 EDT 2025
Thu Apr 24 22:51:55 EDT 2025
Wed Aug 27 02:50:26 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/OAPA.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-a01692b22b5e6f8c572dc9387178d4dc01f48cbcc4400395b35601dea67de40b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-9724-0152
OpenAccessLink https://doaj.org/article/dc6c4ef1fc20447c94935d4f9645c21d
PQID 2455922812
PQPubID 4845423
PageCount 14
ParticipantIDs proquest_journals_2455922812
crossref_citationtrail_10_1109_ACCESS_2018_2805847
doaj_primary_oai_doaj_org_article_dc6c4ef1fc20447c94935d4f9645c21d
crossref_primary_10_1109_ACCESS_2018_2805847
ieee_primary_8301018
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-01-01
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – month: 01
  year: 2018
  text: 2018-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2018
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref15
ref14
ref2
ref1
ref17
ref16
ref19
ref18
wang (ref10) 2014; 77
guo (ref20) 2015; 32
ochs (ref24) 2014; 28
ref23
ref26
ref25
ref22
ref21
ref28
ref27
wang (ref4) 2015; 26
ref29
ref8
ref7
wu (ref12) 2013; 163
ref9
ref3
ref6
guo (ref11) 2005; 26
ref5
References_xml – ident: ref21
  doi: 10.1016/j.ins.2010.11.009
– ident: ref6
  doi: 10.1080/03772063.2015.1081414
– ident: ref14
  doi: 10.1016/j.engappai.2016.01.034
– ident: ref16
  doi: 10.1016/j.sigpro.2011.11.004
– ident: ref15
  doi: 10.1117/1.482647
– ident: ref13
  doi: 10.1155/2014/632060
– ident: ref7
  doi: 10.4103/0377-2063.110633
– ident: ref28
  doi: 10.1007/s11042-017-4811-x
– ident: ref5
  doi: 10.1007/s11071-015-2579-y
– volume: 32
  start-page: 1131
  year: 2015
  ident: ref20
  article-title: Bit-level image encryption algorithm based on Josephus and Henon chaotic map
  publication-title: Appl Res Comput
– ident: ref1
  doi: 10.1007/s11071-010-9749-8
– volume: 77
  start-page: 687
  year: 2014
  ident: ref10
  article-title: Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-014-1331-3
– volume: 26
  start-page: 10
  year: 2015
  ident: ref4
  article-title: A new image encryption algorithm based on non-adjacent coupled map lattices
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2014.09.039
– ident: ref8
  doi: 10.1147/rd.383.0243
– ident: ref3
  doi: 10.1007/s11071-015-2330-8
– ident: ref29
  doi: 10.1007/s11071-011-0006-6
– volume: 26
  start-page: 131
  year: 2005
  ident: ref11
  article-title: An attack with known image to an image cryptosystem based on general cat map
  publication-title: J China Inst Commun
– ident: ref2
  doi: 10.1016/j.sigpro.2013.10.034
– ident: ref9
  doi: 10.1109/TIT.1980.1056264
– ident: ref22
  doi: 10.1016/j.optlaseng.2013.01.001
– ident: ref18
  doi: 10.1016/j.asoc.2015.09.055
– ident: ref19
  doi: 10.1016/j.image.2013.09.009
– volume: 28
  start-page: 693
  year: 2014
  ident: ref24
  article-title: Quantum States with Maximum Information Entropy. I
  publication-title: Zeitschrift fur Naturforschung A
– ident: ref23
  doi: 10.1016/j.optcom.2011.07.070
– volume: 163
  start-page: 1941
  year: 2013
  ident: ref12
  article-title: An image encryption algorithm based on Josephus traversing and position disordering
  publication-title: Proc Int Conf Cybern Inform
– ident: ref26
  doi: 10.1007/s11042-017-4577-1
– ident: ref27
  doi: 10.1117/1.JEI.26.1.013021
– ident: ref17
  doi: 10.1007/s11071-014-1492-0
– ident: ref25
  doi: 10.1016/j.asoc.2009.12.011
SSID ssj0000816957
Score 2.4800313
Snippet This paper proposes a new chaotic image encryption scheme, which employs Josephus traversing and mixed chaotic map. The scheme consists of three processes: key...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 23733
SubjectTerms Algorithms
Chaos
Chaos theory
cryptography
Diffusion processes
Encryption
Gray-scale
image analysis
Initial conditions
Logistics
Mathematical model
Parameter sensitivity
Pixels
SummonAdditionalLinks – databaseName: IEEE Electronic Library (IEL)
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB21PcGBr4JYKMgHjs3W69iJc9yuWhWkRRxaqTfLHk9oRZuttlkJ-PXYjjfiS4hbZNnJJM-x543tNwDvSFKpHNYFkahiCjNROC11oVApj6REk7IoLD9WZxfyw6W63IHD8SwMEaXNZzSNl2kt369wE0NlR7qMimh6F3YDcRvOao3xlJhAolF1Fhaa8eZovliEd4i7t_RUaB7XA3-ZfJJGf06q8sdInKaX08ew3Bo27Cr5Mt30borff9Ns_F_Ln8Cj7Gey-dAxnsIOdc_g4U_qg_vwad6x97dhPGEnHa6_pbGDzW8-r9bX_dUtOw7zm2ehaFgk2Nyz85iqKAUXmO08W15_DRUWV3YVnsGW9u45XJyenC_OipxgoUDJdV_YKMUinBBOUdVqVLXw2JSBQ9XaS4981kqNDlHKeIZXuTLyN0-2qj1J7soXsNetOnoJzFvbYiOJrA4cKJDG4Be2nGxJreS2lBMQ2y9vMKuPxyQYNyaxEN6YAS4T4TIZrgkcjo3uBvGNf1c_jpCOVaNydioIUJj8IxqPFUpqZy0KLmUdbG5K5WXbVFKhmPkJ7Ef4xptk5CZwsO0gJv_l90bIwMeECD7Sq7-3eg0PooFDyOYA9vr1ht4EJ6Z3b1Pv_QHWrey_
  priority: 102
  providerName: IEEE
Title An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map
URI https://ieeexplore.ieee.org/document/8301018
https://www.proquest.com/docview/2455922812
https://doaj.org/article/dc6c4ef1fc20447c94935d4f9645c21d
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA7iSQ_iE9cXOXi0mqaTNj3uLooKKx4UvIV0kqqgXdEV9N87SbvLiqAXryFtmslkZr5p8g1jhx58piosEu9lHkqYyaTSoBOFSjn0SpaxisLoKj-_hcs7dTdX6iucCWvpgVvBnTjMEXyd1igFQIEllJlyUJc5KJSpC9aXfN4cmIo2WKd5qYqOZigV5Ul_OKQZhbNc-lhqEf4OfnNFkbG_K7Hywy5HZ3O2yla6KJH3269bYwu-WWfLc9yBG-y63_CLZ7IG_LTB18-483n_6X5MaP_hmQ_IOzlOTW2K__2N34RCQzE1wG3j-OjxgzoMH-yYxuAj-7LJbs9Ob4bnSVceIUEQepLYQKQiKykr5fNaoyqkwzIjBFRoBw5FWoPGChEg3MBVVRbQl_M2L5wHUWVbbLEZN36bcWdtTZL13mpCMAT5KKqrhbeZr0HYDHpMTiVlsOMODyUsnkzEEKI0rXhNEK_pxNtjR7OHXlrqjN-7D8ISzLoG3uvYQNpgOm0wf2lDj22EBZy9RGeBQ0_32N50QU23R9-MBEJTUlKEs_MfQ--ypTCdNj2zxxYnr-9-nwKWSXUQdfMg3i38AkzV5Iw
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV3NTtwwEB5Remg59I8itqWtD-2tWbKOnTgHDssWtFtY1MMicXMde1JQIYt2s2rps_AqvBu24436p96Qeoss23HsL-OZ8fgbgLfIMOGFziJEmroUZjQqBBMR15wbjZzmPovC-CgdHrOPJ_xkBa7buzCI6IPPsOse_Vm-meqFc5Vti8QxookQQnmAV9-sgTbfGX2wq_mO0v29yWAYhRwCkWaxqCPl2EZoQWnBMS2F5hk1Ok-smZAJw4yOeyUTutCaMXdNlReJM1EMqjQzyOIisf3eg_tWz-C0uR3WenBcyoqcZ4HKqBfn2_3BwM6aixcTXSpidwL5y3bnswKENC5_yH6_oe0_hpvlVDRxLF-7i7ro6h-_sUT-r3P1BB4FTZr0G-g_hRWsnsHaT_yK6_CpX5HRhZWYZK_SsysvHUn__Mt0dlafXpBdu4MbYouaY5DFnExcMibvPiGqMmR89t1WGJyqqX0HGavL53B8J5-0AavVtMJNIEapUucMUQlr5Vmz2Gq-ZYwqwZLFKmEdoMuVljrwq7s0H-fS21lxLht4SAcPGeDRgfdto8uGXuTf1XcdhNqqjhvcF9ill0HUSKNTzbDslZrGjGV2zHnCDSvzlHFNe6YD6w4ubScBKR3YWgJSBjk2l9TiPqfUaoEv_t7qDTwYTsaH8nB0dPASHrrBNg6qLVitZwt8ZVW2unjt_xwCn-8afrfOtklF
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Image+Encryption+Algorithm+Based+on+Josephus+Traversing+and+Mixed+Chaotic+Map&rft.jtitle=IEEE+access&rft.au=Wang%2C+Xingyuan&rft.au=Zhu%2C+Xiaoqiang&rft.au=Zhang%2C+Yingqian&rft.date=2018-01-01&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=6&rft.spage=23733&rft.epage=23746&rft_id=info:doi/10.1109%2FACCESS.2018.2805847&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2018_2805847
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon