An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map
This paper proposes a new chaotic image encryption scheme, which employs Josephus traversing and mixed chaotic map. The scheme consists of three processes: key stream generation process; three-round scrambling process; and one-round diffusion process. The proposed mathematical model is applied for t...
Saved in:
Published in | IEEE access Vol. 6; pp. 23733 - 23746 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.01.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper proposes a new chaotic image encryption scheme, which employs Josephus traversing and mixed chaotic map. The scheme consists of three processes: key stream generation process; three-round scrambling process; and one-round diffusion process. The proposed mathematical model is applied for the key stream generator in the first process. The initial values and parameters are sensitive to both the secret keys in the new scheme and plain images. The second process employs the Josephus traversing in scrambling; then the rows and columns of pixels are exchanged. The third process can modify the pixel gray-level values and crack the strong correlations between adjacent pixels simultaneously. The initial conditions for chaotic systems are derived using external secret keys by applying some algebraic transformations to the key. Security analysis indicates that the new scheme is effective, which can resist common attacks. |
---|---|
AbstractList | This paper proposes a new chaotic image encryption scheme, which employs Josephus traversing and mixed chaotic map. The scheme consists of three processes: key stream generation process; three-round scrambling process; and one-round diffusion process. The proposed mathematical model is applied for the key stream generator in the first process. The initial values and parameters are sensitive to both the secret keys in the new scheme and plain images. The second process employs the Josephus traversing in scrambling; then the rows and columns of pixels are exchanged. The third process can modify the pixel gray-level values and crack the strong correlations between adjacent pixels simultaneously. The initial conditions for chaotic systems are derived using external secret keys by applying some algebraic transformations to the key. Security analysis indicates that the new scheme is effective, which can resist common attacks. |
Author | Wang, Xingyuan Zhu, Xiaoqiang Zhang, Yingqian |
Author_xml | – sequence: 1 givenname: Xingyuan orcidid: 0000-0002-9724-0152 surname: Wang fullname: Wang, Xingyuan email: wangxy@dlut.edu.cn organization: School of Information Science and Technology, Dalian Maritime University, Dalian, China – sequence: 2 givenname: Xiaoqiang surname: Zhu fullname: Zhu, Xiaoqiang organization: School of Electronic and Information Engineering, Dalian University of Technology, Dalian, China – sequence: 3 givenname: Yingqian surname: Zhang fullname: Zhang, Yingqian organization: School of Information Science and Technology, Xiamen University Tan Kah Kee College, Zhangzhou, China |
BookMark | eNp9kUtLAzEAhIMo-PwFXgKeW_PcTY51qVpRFNRzyCbZNqXdrMlW9N-buiriwVwShvmGIXMIdtvQOgBOMRpjjOT5pKqmj49jgrAYE4G4YOUOOCC4kCPKabH7670PTlJaonxElnh5AB4mLZyt9dzBaWvie9f70MLJah6i7xdreKGTszBLNyG5brFJ8CnqVxeTb-dQtxbe-bdsqBY69N7AO90dg71Gr5I7-bqPwPPl9Km6Ht3eX82qye3IMCT6kUa5AKkJqbkrGmF4SayRVJS4FJZZg3DDhKmNYQwhKnlNeYGwdboorWOopkdgNuTaoJeqi36t47sK2qtPIcS50jF3WjllTWGYa3BjCGKsNJJJyi1rZMG4IdjmrLMhq4vhZeNSr5ZhE9tcXxHGuSREYJJdcnCZGFKKrlHG93r7YX3UfqUwUts91LCH2u6hvvbILP3Dfjf-nzodKO-c-yEERTi76AfIa5bE |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_3390_app14167119 crossref_primary_10_1016_j_chaos_2020_110582 crossref_primary_10_15446_dyna_v87n213_81859 crossref_primary_10_1007_s11042_023_14794_3 crossref_primary_10_1016_j_jksuci_2023_101790 crossref_primary_10_1016_j_jisa_2019_102412 crossref_primary_10_1007_s11276_022_03162_y crossref_primary_10_3390_e21070656 crossref_primary_10_1007_s11042_019_7235_y crossref_primary_10_1109_ACCESS_2019_2959137 crossref_primary_10_1016_j_optlaseng_2021_106782 crossref_primary_10_1049_iet_ipr_2019_0991 crossref_primary_10_1109_ACCESS_2019_2925081 crossref_primary_10_1109_ACCESS_2020_2982827 crossref_primary_10_1007_s11042_023_17940_z crossref_primary_10_1088_1402_4896_ad1020 crossref_primary_10_1109_ACCESS_2020_2972296 crossref_primary_10_3390_molecules23081878 crossref_primary_10_3390_math11224613 crossref_primary_10_17780_ksujes_1208570 crossref_primary_10_1088_1674_1056_28_4_040504 crossref_primary_10_1109_ACCESS_2018_2871102 crossref_primary_10_1109_ACCESS_2019_2893176 crossref_primary_10_1109_COMST_2020_3014304 crossref_primary_10_3390_s21010282 crossref_primary_10_56714_bjrs_48_2_8 crossref_primary_10_1007_s11042_021_10631_7 crossref_primary_10_1016_j_jisa_2019_102390 crossref_primary_10_1051_bioconf_20249700020 crossref_primary_10_3390_app13127113 crossref_primary_10_1007_s12652_021_03659_y crossref_primary_10_3390_sym12030355 crossref_primary_10_1007_s11042_021_10979_w crossref_primary_10_32604_cmc_2022_028765 crossref_primary_10_1007_s11042_022_12069_x crossref_primary_10_1016_j_ins_2019_10_028 crossref_primary_10_3390_fractalfract7030221 crossref_primary_10_1109_ACCESS_2021_3054380 crossref_primary_10_1109_ACCESS_2022_3218886 crossref_primary_10_1007_s11042_023_14947_4 crossref_primary_10_3390_e22020158 crossref_primary_10_1016_j_asoc_2020_106162 crossref_primary_10_1142_S0218127420500601 crossref_primary_10_3390_asi5030057 crossref_primary_10_1080_09500340_2022_2138593 crossref_primary_10_1109_ACCESS_2022_3144681 crossref_primary_10_1109_TMM_2019_2923111 crossref_primary_10_1109_ACCESS_2018_2863021 crossref_primary_10_1109_ACCESS_2019_2930606 crossref_primary_10_1002_cpe_7115 crossref_primary_10_1016_j_chaos_2021_110970 crossref_primary_10_1109_ACCESS_2020_3005087 crossref_primary_10_1007_s11276_019_02203_3 crossref_primary_10_1007_s11042_022_13941_6 crossref_primary_10_1117_1_JEI_31_6_063061 crossref_primary_10_1109_ACCESS_2018_2890116 crossref_primary_10_32604_cmc_2023_040629 crossref_primary_10_1016_j_optlastec_2019_105854 crossref_primary_10_1109_ACCESS_2024_3351693 crossref_primary_10_1088_1402_4896_ad9869 crossref_primary_10_1109_ACCESS_2019_2893760 crossref_primary_10_1016_j_jksuci_2022_04_002 crossref_primary_10_3233_JIFS_179568 crossref_primary_10_1016_j_jisa_2020_102626 crossref_primary_10_1109_ACCESS_2019_2963329 crossref_primary_10_1007_s11042_023_16648_4 crossref_primary_10_1016_j_chaos_2020_110028 crossref_primary_10_1007_s11042_019_08337_y crossref_primary_10_1007_s12539_023_00565_z crossref_primary_10_3390_e22020175 crossref_primary_10_1186_s13638_018_1167_5 crossref_primary_10_1016_j_ijin_2022_08_002 crossref_primary_10_1049_ipr2_12263 crossref_primary_10_1007_s11071_024_09306_3 crossref_primary_10_1007_s11042_020_10209_9 crossref_primary_10_3390_info15030172 crossref_primary_10_1016_j_chaos_2023_113383 crossref_primary_10_1142_S0217984924504360 crossref_primary_10_32604_cmc_2022_022224 crossref_primary_10_1007_s11042_019_07852_2 crossref_primary_10_1016_j_ijleo_2023_170517 crossref_primary_10_2139_ssrn_5117611 crossref_primary_10_1016_j_chaos_2021_111693 crossref_primary_10_1016_j_ins_2019_02_049 crossref_primary_10_1007_s10470_025_02309_z crossref_primary_10_1016_j_chaos_2021_111334 crossref_primary_10_1109_TCSVT_2020_2990952 crossref_primary_10_1016_j_dsp_2023_104228 crossref_primary_10_1007_s11042_020_09237_2 crossref_primary_10_1109_ACCESS_2019_2921708 crossref_primary_10_1007_s11042_022_12844_w crossref_primary_10_1049_iet_ipr_2019_0527 crossref_primary_10_1016_j_dsp_2022_103818 crossref_primary_10_1109_ACCESS_2022_3182329 crossref_primary_10_1007_s11071_021_06941_y crossref_primary_10_1109_ACCESS_2019_2921309 crossref_primary_10_3390_e24101344 crossref_primary_10_1016_j_chaos_2021_111217 crossref_primary_10_1109_ACCESS_2019_2959031 crossref_primary_10_1109_ACCESS_2024_3353294 crossref_primary_10_1142_S0218127420501734 crossref_primary_10_1109_ACCESS_2021_3128177 crossref_primary_10_1016_j_jisa_2025_104004 crossref_primary_10_1007_s00371_023_02812_2 crossref_primary_10_1007_s11042_023_16775_y crossref_primary_10_1016_j_optlastec_2020_106355 crossref_primary_10_3390_e26100885 crossref_primary_10_1109_ACCESS_2019_2931732 crossref_primary_10_1109_ACCESS_2019_2935017 crossref_primary_10_1109_ACCESS_2021_3096995 crossref_primary_10_1016_j_jisa_2020_102699 crossref_primary_10_1016_j_ijleo_2020_165492 crossref_primary_10_1109_ACCESS_2019_2931052 crossref_primary_10_1007_s40747_023_01187_0 crossref_primary_10_1007_s00521_024_10388_8 crossref_primary_10_1109_ACCESS_2020_2970103 crossref_primary_10_1109_ACCESS_2020_3032403 |
Cites_doi | 10.1016/j.ins.2010.11.009 10.1080/03772063.2015.1081414 10.1016/j.engappai.2016.01.034 10.1016/j.sigpro.2011.11.004 10.1117/1.482647 10.1155/2014/632060 10.4103/0377-2063.110633 10.1007/s11042-017-4811-x 10.1007/s11071-015-2579-y 10.1007/s11071-010-9749-8 10.1007/s11071-014-1331-3 10.1016/j.asoc.2014.09.039 10.1147/rd.383.0243 10.1007/s11071-015-2330-8 10.1007/s11071-011-0006-6 10.1016/j.sigpro.2013.10.034 10.1109/TIT.1980.1056264 10.1016/j.optlaseng.2013.01.001 10.1016/j.asoc.2015.09.055 10.1016/j.image.2013.09.009 10.1016/j.optcom.2011.07.070 10.1007/s11042-017-4577-1 10.1117/1.JEI.26.1.013021 10.1007/s11071-014-1492-0 10.1016/j.asoc.2009.12.011 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2018.2805847 |
DatabaseName | IEEE Xplore (IEEE) IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 23746 |
ExternalDocumentID | oai_doaj_org_article_dc6c4ef1fc20447c94935d4f9645c21d 10_1109_ACCESS_2018_2805847 8301018 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61672124; 61370145; 61173183 funderid: 10.13039/501100001809 – fundername: Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund grantid: MMJJ20170203 – fundername: Program for New Century Excellent Talents in Fujian Province University |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-a01692b22b5e6f8c572dc9387178d4dc01f48cbcc4400395b35601dea67de40b3 |
IEDL.DBID | DOA |
ISSN | 2169-3536 |
IngestDate | Wed Aug 27 01:09:05 EDT 2025 Mon Jun 30 06:55:37 EDT 2025 Tue Jul 01 02:17:29 EDT 2025 Thu Apr 24 22:51:55 EDT 2025 Wed Aug 27 02:50:26 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/OAPA.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-a01692b22b5e6f8c572dc9387178d4dc01f48cbcc4400395b35601dea67de40b3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-9724-0152 |
OpenAccessLink | https://doaj.org/article/dc6c4ef1fc20447c94935d4f9645c21d |
PQID | 2455922812 |
PQPubID | 4845423 |
PageCount | 14 |
ParticipantIDs | proquest_journals_2455922812 crossref_citationtrail_10_1109_ACCESS_2018_2805847 doaj_primary_oai_doaj_org_article_dc6c4ef1fc20447c94935d4f9645c21d crossref_primary_10_1109_ACCESS_2018_2805847 ieee_primary_8301018 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2018-01-01 |
PublicationDateYYYYMMDD | 2018-01-01 |
PublicationDate_xml | – month: 01 year: 2018 text: 2018-01-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2018 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref15 ref14 ref2 ref1 ref17 ref16 ref19 ref18 wang (ref10) 2014; 77 guo (ref20) 2015; 32 ochs (ref24) 2014; 28 ref23 ref26 ref25 ref22 ref21 ref28 ref27 wang (ref4) 2015; 26 ref29 ref8 ref7 wu (ref12) 2013; 163 ref9 ref3 ref6 guo (ref11) 2005; 26 ref5 |
References_xml | – ident: ref21 doi: 10.1016/j.ins.2010.11.009 – ident: ref6 doi: 10.1080/03772063.2015.1081414 – ident: ref14 doi: 10.1016/j.engappai.2016.01.034 – ident: ref16 doi: 10.1016/j.sigpro.2011.11.004 – ident: ref15 doi: 10.1117/1.482647 – ident: ref13 doi: 10.1155/2014/632060 – ident: ref7 doi: 10.4103/0377-2063.110633 – ident: ref28 doi: 10.1007/s11042-017-4811-x – ident: ref5 doi: 10.1007/s11071-015-2579-y – volume: 32 start-page: 1131 year: 2015 ident: ref20 article-title: Bit-level image encryption algorithm based on Josephus and Henon chaotic map publication-title: Appl Res Comput – ident: ref1 doi: 10.1007/s11071-010-9749-8 – volume: 77 start-page: 687 year: 2014 ident: ref10 article-title: Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation publication-title: Nonlinear Dyn doi: 10.1007/s11071-014-1331-3 – volume: 26 start-page: 10 year: 2015 ident: ref4 article-title: A new image encryption algorithm based on non-adjacent coupled map lattices publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2014.09.039 – ident: ref8 doi: 10.1147/rd.383.0243 – ident: ref3 doi: 10.1007/s11071-015-2330-8 – ident: ref29 doi: 10.1007/s11071-011-0006-6 – volume: 26 start-page: 131 year: 2005 ident: ref11 article-title: An attack with known image to an image cryptosystem based on general cat map publication-title: J China Inst Commun – ident: ref2 doi: 10.1016/j.sigpro.2013.10.034 – ident: ref9 doi: 10.1109/TIT.1980.1056264 – ident: ref22 doi: 10.1016/j.optlaseng.2013.01.001 – ident: ref18 doi: 10.1016/j.asoc.2015.09.055 – ident: ref19 doi: 10.1016/j.image.2013.09.009 – volume: 28 start-page: 693 year: 2014 ident: ref24 article-title: Quantum States with Maximum Information Entropy. I publication-title: Zeitschrift fur Naturforschung A – ident: ref23 doi: 10.1016/j.optcom.2011.07.070 – volume: 163 start-page: 1941 year: 2013 ident: ref12 article-title: An image encryption algorithm based on Josephus traversing and position disordering publication-title: Proc Int Conf Cybern Inform – ident: ref26 doi: 10.1007/s11042-017-4577-1 – ident: ref27 doi: 10.1117/1.JEI.26.1.013021 – ident: ref17 doi: 10.1007/s11071-014-1492-0 – ident: ref25 doi: 10.1016/j.asoc.2009.12.011 |
SSID | ssj0000816957 |
Score | 2.4800313 |
Snippet | This paper proposes a new chaotic image encryption scheme, which employs Josephus traversing and mixed chaotic map. The scheme consists of three processes: key... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 23733 |
SubjectTerms | Algorithms Chaos Chaos theory cryptography Diffusion processes Encryption Gray-scale image analysis Initial conditions Logistics Mathematical model Parameter sensitivity Pixels |
SummonAdditionalLinks | – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB21PcGBr4JYKMgHjs3W69iJc9yuWhWkRRxaqTfLHk9oRZuttlkJ-PXYjjfiS4hbZNnJJM-x543tNwDvSFKpHNYFkahiCjNROC11oVApj6REk7IoLD9WZxfyw6W63IHD8SwMEaXNZzSNl2kt369wE0NlR7qMimh6F3YDcRvOao3xlJhAolF1Fhaa8eZovliEd4i7t_RUaB7XA3-ZfJJGf06q8sdInKaX08ew3Bo27Cr5Mt30borff9Ns_F_Ln8Cj7Gey-dAxnsIOdc_g4U_qg_vwad6x97dhPGEnHa6_pbGDzW8-r9bX_dUtOw7zm2ehaFgk2Nyz85iqKAUXmO08W15_DRUWV3YVnsGW9u45XJyenC_OipxgoUDJdV_YKMUinBBOUdVqVLXw2JSBQ9XaS4981kqNDlHKeIZXuTLyN0-2qj1J7soXsNetOnoJzFvbYiOJrA4cKJDG4Be2nGxJreS2lBMQ2y9vMKuPxyQYNyaxEN6YAS4T4TIZrgkcjo3uBvGNf1c_jpCOVaNydioIUJj8IxqPFUpqZy0KLmUdbG5K5WXbVFKhmPkJ7Ef4xptk5CZwsO0gJv_l90bIwMeECD7Sq7-3eg0PooFDyOYA9vr1ht4EJ6Z3b1Pv_QHWrey_ priority: 102 providerName: IEEE |
Title | An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map |
URI | https://ieeexplore.ieee.org/document/8301018 https://www.proquest.com/docview/2455922812 https://doaj.org/article/dc6c4ef1fc20447c94935d4f9645c21d |
Volume | 6 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA7iSQ_iE9cXOXi0mqaTNj3uLooKKx4UvIV0kqqgXdEV9N87SbvLiqAXryFtmslkZr5p8g1jhx58piosEu9lHkqYyaTSoBOFSjn0SpaxisLoKj-_hcs7dTdX6iucCWvpgVvBnTjMEXyd1igFQIEllJlyUJc5KJSpC9aXfN4cmIo2WKd5qYqOZigV5Ul_OKQZhbNc-lhqEf4OfnNFkbG_K7Hywy5HZ3O2yla6KJH3269bYwu-WWfLc9yBG-y63_CLZ7IG_LTB18-483n_6X5MaP_hmQ_IOzlOTW2K__2N34RCQzE1wG3j-OjxgzoMH-yYxuAj-7LJbs9Ob4bnSVceIUEQepLYQKQiKykr5fNaoyqkwzIjBFRoBw5FWoPGChEg3MBVVRbQl_M2L5wHUWVbbLEZN36bcWdtTZL13mpCMAT5KKqrhbeZr0HYDHpMTiVlsOMODyUsnkzEEKI0rXhNEK_pxNtjR7OHXlrqjN-7D8ISzLoG3uvYQNpgOm0wf2lDj22EBZy9RGeBQ0_32N50QU23R9-MBEJTUlKEs_MfQ--ypTCdNj2zxxYnr-9-nwKWSXUQdfMg3i38AkzV5Iw |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV3NTtwwEB5Remg59I8itqWtD-2tWbKOnTgHDssWtFtY1MMicXMde1JQIYt2s2rps_AqvBu24436p96Qeoss23HsL-OZ8fgbgLfIMOGFziJEmroUZjQqBBMR15wbjZzmPovC-CgdHrOPJ_xkBa7buzCI6IPPsOse_Vm-meqFc5Vti8QxookQQnmAV9-sgTbfGX2wq_mO0v29yWAYhRwCkWaxqCPl2EZoQWnBMS2F5hk1Ok-smZAJw4yOeyUTutCaMXdNlReJM1EMqjQzyOIisf3eg_tWz-C0uR3WenBcyoqcZ4HKqBfn2_3BwM6aixcTXSpidwL5y3bnswKENC5_yH6_oe0_hpvlVDRxLF-7i7ro6h-_sUT-r3P1BB4FTZr0G-g_hRWsnsHaT_yK6_CpX5HRhZWYZK_SsysvHUn__Mt0dlafXpBdu4MbYouaY5DFnExcMibvPiGqMmR89t1WGJyqqX0HGavL53B8J5-0AavVtMJNIEapUucMUQlr5Vmz2Gq-ZYwqwZLFKmEdoMuVljrwq7s0H-fS21lxLht4SAcPGeDRgfdto8uGXuTf1XcdhNqqjhvcF9ill0HUSKNTzbDslZrGjGV2zHnCDSvzlHFNe6YD6w4ubScBKR3YWgJSBjk2l9TiPqfUaoEv_t7qDTwYTsaH8nB0dPASHrrBNg6qLVitZwt8ZVW2unjt_xwCn-8afrfOtklF |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Image+Encryption+Algorithm+Based+on+Josephus+Traversing+and+Mixed+Chaotic+Map&rft.jtitle=IEEE+access&rft.au=Wang%2C+Xingyuan&rft.au=Zhu%2C+Xiaoqiang&rft.au=Zhang%2C+Yingqian&rft.date=2018-01-01&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=6&rft.spage=23733&rft.epage=23746&rft_id=info:doi/10.1109%2FACCESS.2018.2805847&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2018_2805847 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |