A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion
Information security is an important and critical subject of the current digital era. Nowadays, almost all information is digital in nature and security from hackers and eavesdroppers has become vital in civil (big giant corporations) as well as in defense organizations. One type of information in b...
Saved in:
Published in | PloS one Vol. 14; no. 12; p. e0225031 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
United States
Public Library of Science
19.12.2019
Public Library of Science (PLoS) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Information security is an important and critical subject of the current digital era. Nowadays, almost all information is digital in nature and security from hackers and eavesdroppers has become vital in civil (big giant corporations) as well as in defense organizations. One type of information in bit streams is in the form of digital images. In this article, an idea to combine Brownian motion with ternary unique orientation has been implemented which is related to random motion over time and spatial coordinates. Moreover, chaotic dynamical map has been used to add one more security level to the proposed encryption scheme. The proposed scheme is evaluated on different statistical tests and these results are compared with already existing benchmarks. The results show that the proposed algorithm has better security performances as compared to existing image enciphering schemes. |
---|---|
AbstractList | Information security is an important and critical subject of the current digital era. Nowadays, almost all information is digital in nature and security from hackers and eavesdroppers has become vital in civil (big giant corporations) as well as in defense organizations. One type of information in bit streams is in the form of digital images. In this article, an idea to combine Brownian motion with ternary unique orientation has been implemented which is related to random motion over time and spatial coordinates. Moreover, chaotic dynamical map has been used to add one more security level to the proposed encryption scheme. The proposed scheme is evaluated on different statistical tests and these results are compared with already existing benchmarks. The results show that the proposed algorithm has better security performances as compared to existing image enciphering schemes. Information security is an important and critical subject of the current digital era. Nowadays, almost all information is digital in nature and security from hackers and eavesdroppers has become vital in civil (big giant corporations) as well as in defense organizations. One type of information in bit streams is in the form of digital images. In this article, an idea to combine Brownian motion with ternary unique orientation has been implemented which is related to random motion over time and spatial coordinates. Moreover, chaotic dynamical map has been used to add one more security level to the proposed encryption scheme. The proposed scheme is evaluated on different statistical tests and these results are compared with already existing benchmarks. The results show that the proposed algorithm has better security performances as compared to existing image enciphering schemes.Information security is an important and critical subject of the current digital era. Nowadays, almost all information is digital in nature and security from hackers and eavesdroppers has become vital in civil (big giant corporations) as well as in defense organizations. One type of information in bit streams is in the form of digital images. In this article, an idea to combine Brownian motion with ternary unique orientation has been implemented which is related to random motion over time and spatial coordinates. Moreover, chaotic dynamical map has been used to add one more security level to the proposed encryption scheme. The proposed scheme is evaluated on different statistical tests and these results are compared with already existing benchmarks. The results show that the proposed algorithm has better security performances as compared to existing image enciphering schemes. |
Audience | Academic |
Author | Masood, Fawad Alghafis, Abdullah Batool Naqvi, Syeda Iram Khan, Majid Amin, Muhammad |
AuthorAffiliation | 2 Department of Applied Mathematics and Statistics, Institute of Space Technology, Islamabad, Pakistan 4 King Abdulaziz City for Science and Technology Riyadh, Saudi Arabia 5 Department of Avionics, Institute of Space Technology Islamabad, Pakistan 3 Department of Electrical Engineering, Institute of Space Technology, Islamabad,Pakistan Nanjing University of Information Science and Technology, CHINA 1 Cyber and Information Security Lab (CISL), Institute of Space Technology, Islamabad,Pakistan |
AuthorAffiliation_xml | – name: 2 Department of Applied Mathematics and Statistics, Institute of Space Technology, Islamabad, Pakistan – name: 1 Cyber and Information Security Lab (CISL), Institute of Space Technology, Islamabad,Pakistan – name: 5 Department of Avionics, Institute of Space Technology Islamabad, Pakistan – name: Nanjing University of Information Science and Technology, CHINA – name: 4 King Abdulaziz City for Science and Technology Riyadh, Saudi Arabia – name: 3 Department of Electrical Engineering, Institute of Space Technology, Islamabad,Pakistan |
Author_xml | – sequence: 1 givenname: Majid orcidid: 0000-0001-5454-3770 surname: Khan fullname: Khan, Majid – sequence: 2 givenname: Fawad surname: Masood fullname: Masood, Fawad – sequence: 3 givenname: Abdullah surname: Alghafis fullname: Alghafis, Abdullah – sequence: 4 givenname: Muhammad surname: Amin fullname: Amin, Muhammad – sequence: 5 givenname: Syeda Iram surname: Batool Naqvi fullname: Batool Naqvi, Syeda Iram |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/31856231$$D View this record in MEDLINE/PubMed |
BookMark | eNqNk9uO0zAQhiO0iD3AGyCwhITgoiW2UyfhAqmsOFRaaSVOt9bUnjSuErvYyULfHmebona1QiQXicbf_Pb8njlPTqyzmCRPaTqlPKdv1q73FprpJoanKWOzlNMHyRktOZsIlvKTg__T5DyEdZrOeCHEo-SU02ImGKdnSTsn1t1gQ0wLKyRold9uOuMs6VDV1vzskfTB2BWpt0tvNGmxq50mriLaBOWxQ6K3FlqjoCGqBtcZRVrYBAJWk_fe_bIGLGndIPo4eVhBE_DJ-L1Ivn_88O3y8-Tq-tPicn41UaJk3URrLJcqy5cznqcCgIOgrGC0yGmuM8wrLgoOVM8oFiUVlUAoVJUVmOqspLzgF8nzne6mcUGOTgXJOCtyRkvGIrHYEdrBWm58LN9vpQMjbwPOryT4WEqDsgSdMyzzJaoyywGWYlYBQ1VVZVopTKPWu3G3ftmiVmg7D82R6PGKNbVcuRsphpPkWRR4NQp4Fw0PnWyjt9g0YNH1t-cucx4fGtEXd9D7qxupFcQCjK1c3FcNonIu0khk0c9ITe-h4qsxXmdsq8rE-FHC66OEyHT4u1tBH4JcfP3y_-z1j2P25QFbIzRdHVzTDy0TjsFnh07_tXjfzxF4uwOUdyF4rKQyHQw6sTTTSJrKYXj2pslheOQ4PDE5u5O81_9n2h_a-h6_ |
CitedBy_id | crossref_primary_10_1007_s11042_021_11810_2 crossref_primary_10_1007_s11042_024_18405_7 crossref_primary_10_32604_cmc_2022_030267 crossref_primary_10_3390_rs12111893 crossref_primary_10_3390_math11020352 crossref_primary_10_1007_s00340_020_07480_x crossref_primary_10_1109_ACCESS_2023_3320031 crossref_primary_10_3390_e22030274 crossref_primary_10_1109_ACCESS_2021_3065810 crossref_primary_10_1007_s11042_022_13623_3 crossref_primary_10_1016_j_compeleceng_2022_108021 crossref_primary_10_1109_TMM_2023_3276504 crossref_primary_10_1007_s11042_024_20169_z crossref_primary_10_1007_s11042_021_10898_w crossref_primary_10_1016_j_aej_2024_08_115 crossref_primary_10_1016_j_micpro_2020_103181 crossref_primary_10_1109_ACCESS_2022_3144681 crossref_primary_10_1155_2020_8883884 crossref_primary_10_1109_ACCESS_2022_3143096 crossref_primary_10_1049_ipr2_12525 crossref_primary_10_1007_s10773_021_04794_0 crossref_primary_10_1016_j_jksuci_2021_08_026 crossref_primary_10_1088_1402_4896_ad76e5 crossref_primary_10_1371_journal_pone_0241184 crossref_primary_10_1007_s11042_022_11928_x crossref_primary_10_1007_s11277_021_08584_z crossref_primary_10_1007_s11042_022_13612_6 crossref_primary_10_3390_sym12030350 crossref_primary_10_1109_ACCESS_2021_3099004 crossref_primary_10_1007_s11042_024_18909_2 crossref_primary_10_1109_JPHOT_2020_3020307 crossref_primary_10_3390_sym14112372 crossref_primary_10_1007_s11042_022_12069_x crossref_primary_10_1007_s10773_020_04616_9 |
Cites_doi | 10.1109/ISDFS.2018.8355368 10.1016/j.chaos.2007.07.083 10.1117/1.JEI.27.6.063022 10.1080/14786442808674769 10.1016/j.optlaseng.2015.03.022 10.1016/j.ijleo.2013.05.009 10.1007/s10773-018-3872-6 10.1007/s11071-016-3046-0 10.3390/sym10070266 10.1016/j.asoc.2012.01.016 10.1016/j.compeleceng.2012.02.007 10.3390/app8112132 10.1007/978-981-10-5687-1_75 10.1016/j.aeue.2013.08.007 10.1007/s00530-013-0314-4 10.1007/s13319-017-0123-1 10.1002/cae.22038 10.1007/s11277-014-1667-5 10.1007/s11042-015-2973-y 10.1016/j.optlaseng.2013.12.003 10.1016/j.optcom.2005.11.006 10.1007/s41870-018-0099-y 10.1007/s11071-018-4056-x 10.1007/s11071-013-1070-x 10.1016/j.camwa.2010.03.017 10.1007/s11042-012-1292-9 10.1016/j.advengsoft.2012.03.001 10.1016/j.optcom.2009.02.044 10.1007/s11760-016-1007-1 10.1155/2018/9389065 10.1016/j.neucom.2008.11.005 10.1002/j.1538-7305.1948.tb01338.x 10.1016/j.ijleo.2012.10.068 10.1016/j.optcom.2011.02.039 10.1016/j.ijleo.2013.09.040 10.1002/j.1538-7305.1949.tb00928.x 10.1016/j.optlaseng.2016.10.019 10.1140/epjp/i2018-11872-8 10.1007/s11042-015-2573-x 10.1007/s11042-016-4090-y 10.1371/journal.pone.0206460 10.1016/j.optlaseng.2007.09.001 10.1007/s11071-014-1757-7 10.3390/e20070525 10.1016/j.jss.2011.08.017 10.1016/j.ijleo.2012.11.018 10.3390/e20120913 10.1016/j.mcm.2010.06.005 10.1109/ACCESS.2018.2811722 10.1007/s00521-016-2511-5 10.1109/ICAEM.2018.8536308 10.1016/j.optcom.2012.06.039 10.1016/j.ins.2010.11.009 10.1016/j.ins.2013.11.027 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2019 Public Library of Science 2019 Khan et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2019 Khan et al 2019 Khan et al |
Copyright_xml | – notice: COPYRIGHT 2019 Public Library of Science – notice: 2019 Khan et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2019 Khan et al 2019 Khan et al |
DBID | AAYXX CITATION CGR CUY CVF ECM EIF NPM IOV ISR 3V. 7QG 7QL 7QO 7RV 7SN 7SS 7T5 7TG 7TM 7U9 7X2 7X7 7XB 88E 8AO 8C1 8FD 8FE 8FG 8FH 8FI 8FJ 8FK ABJCF ABUWG AEUYN AFKRA ARAPS ATCPS AZQEC BBNVY BENPR BGLVJ BHPHI C1K CCPQU D1I DWQXO FR3 FYUFA GHDGH GNUQQ H94 HCIFZ K9. KB. KB0 KL. L6V LK8 M0K M0S M1P M7N M7P M7S NAPCQ P5Z P62 P64 PATMY PDBOC PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQGLB PQQKQ PQUKI PTHSS PYCSY RC3 7X8 5PM DOA |
DOI | 10.1371/journal.pone.0225031 |
DatabaseName | CrossRef Medline MEDLINE MEDLINE (Ovid) MEDLINE MEDLINE PubMed Gale In Context: Opposing Viewpoints Gale In Context: Science ProQuest Central (Corporate) Animal Behavior Abstracts Bacteriology Abstracts (Microbiology B) Biotechnology Research Abstracts Nursing & Allied Health Database Ecology Abstracts Entomology Abstracts (Full archive) Immunology Abstracts Meteorological & Geoastrophysical Abstracts Nucleic Acids Abstracts Virology and AIDS Abstracts Agricultural Science Collection Health & Medical Collection (ProQuest) ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) ProQuest Pharma Collection Public Health Database (ProQuest) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Natural Science Collection Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest One Sustainability ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection Agricultural & Environmental Science Collection ProQuest Central Essentials Biological Science Collection ProQuest Central Database Suite (ProQuest) Technology Collection Natural Science Collection Environmental Sciences and Pollution Management ProQuest One Community College ProQuest Materials Science Collection ProQuest Central Korea Engineering Research Database Proquest Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Central Student AIDS and Cancer Research Abstracts SciTech Premium Collection ProQuest Health & Medical Complete (Alumni) Materials Science Database Nursing & Allied Health Database (Alumni Edition) Meteorological & Geoastrophysical Abstracts - Academic ProQuest Engineering Collection ProQuest Biological Science Collection Agricultural Science Database ProQuest Health & Medical Collection Medical Database Algology Mycology and Protozoology Abstracts (Microbiology C) Biological Science Database (ProQuest) Engineering Database Nursing & Allied Health Premium ProQuest advanced technologies & aerospace journals ProQuest Advanced Technologies & Aerospace Collection Biotechnology and BioEngineering Abstracts Environmental Science Database Materials Science Collection ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition Engineering collection Environmental Science Collection Genetics Abstracts MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef MEDLINE Medline Complete MEDLINE with Full Text PubMed MEDLINE (Ovid) Agricultural Science Database Publicly Available Content Database ProQuest Central Student ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials Nucleic Acids Abstracts SciTech Premium Collection Environmental Sciences and Pollution Management ProQuest One Applied & Life Sciences ProQuest One Sustainability Health Research Premium Collection Meteorological & Geoastrophysical Abstracts Natural Science Collection Health & Medical Research Collection Biological Science Collection ProQuest Central (New) ProQuest Medical Library (Alumni) Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database Virology and AIDS Abstracts ProQuest Biological Science Collection ProQuest One Academic Eastern Edition Agricultural Science Collection ProQuest Hospital Collection ProQuest Technology Collection Health Research Premium Collection (Alumni) Biological Science Database Ecology Abstracts ProQuest Hospital Collection (Alumni) Biotechnology and BioEngineering Abstracts Environmental Science Collection Entomology Abstracts Nursing & Allied Health Premium ProQuest Health & Medical Complete ProQuest One Academic UKI Edition Environmental Science Database ProQuest Nursing & Allied Health Source (Alumni) Engineering Research Database ProQuest One Academic Meteorological & Geoastrophysical Abstracts - Academic ProQuest One Academic (New) Technology Collection Technology Research Database ProQuest One Academic Middle East (New) Materials Science Collection ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Natural Science Collection ProQuest Pharma Collection ProQuest Central ProQuest Health & Medical Research Collection Genetics Abstracts ProQuest Engineering Collection Biotechnology Research Abstracts Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Bacteriology Abstracts (Microbiology B) Algology Mycology and Protozoology Abstracts (Microbiology C) Agricultural & Environmental Science Collection AIDS and Cancer Research Abstracts Materials Science Database ProQuest Materials Science Collection ProQuest Public Health ProQuest Nursing & Allied Health Source ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest Medical Library Animal Behavior Abstracts Materials Science & Engineering Collection Immunology Abstracts ProQuest Central (Alumni) MEDLINE - Academic |
DatabaseTitleList | MEDLINE MEDLINE - Academic Agricultural Science Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ (Directory of Open Access Journals) url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: EIF name: MEDLINE url: https://proxy.k.utb.cz/login?url=https://www.webofscience.com/wos/medline/basic-search sourceTypes: Index Database – sequence: 4 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Sciences (General) |
DocumentTitleAlternate | A novel image encryption technique using hybrid process of discrete dynamical chaotic maps and Brownian motion |
EISSN | 1932-6203 |
ExternalDocumentID | 2328721922 oai_doaj_org_article_9ad72e97bec947aab65fa2ecff90fce0 PMC6922374 A609224128 31856231 10_1371_journal_pone_0225031 |
Genre | Journal Article |
GeographicLocations | Islamabad Pakistan Pakistan |
GeographicLocations_xml | – name: Islamabad Pakistan – name: Pakistan |
GroupedDBID | --- 123 29O 2WC 53G 5VS 7RV 7X2 7X7 7XC 88E 8AO 8C1 8CJ 8FE 8FG 8FH 8FI 8FJ A8Z AAFWJ AAUCC AAWOE AAYXX ABDBF ABIVO ABJCF ABUWG ACGFO ACIHN ACIWK ACPRK ACUHS ADBBV AEAQA AENEX AEUYN AFKRA AFPKN AFRAH AHMBA ALIPV ALMA_UNASSIGNED_HOLDINGS AOIJS APEBS ARAPS ATCPS BAWUL BBNVY BCNDV BENPR BGLVJ BHPHI BKEYQ BPHCQ BVXVI BWKFM CCPQU CITATION CS3 D1I D1J D1K DIK DU5 E3Z EAP EAS EBD EMOBN ESX EX3 F5P FPL FYUFA GROUPED_DOAJ GX1 HCIFZ HH5 HMCUK HYE IAO IEA IGS IHR IHW INH INR IOV IPY ISE ISR ITC K6- KB. KQ8 L6V LK5 LK8 M0K M1P M48 M7P M7R M7S M~E NAPCQ O5R O5S OK1 OVT P2P P62 PATMY PDBOC PHGZM PHGZT PIMPY PQQKQ PROAC PSQYO PTHSS PV9 PYCSY RNS RPM RZL SV3 TR2 UKHRP WOQ WOW ~02 ~KM 3V. ADRAZ BBORY CGR CUY CVF ECM EIF IPNFZ NPM RIG PMFND 7QG 7QL 7QO 7SN 7SS 7T5 7TG 7TM 7U9 7XB 8FD 8FK AZQEC C1K DWQXO FR3 GNUQQ H94 K9. KL. M7N P64 PJZUB PKEHL PPXIY PQEST PQGLB PQUKI RC3 7X8 5PM PUEGO AAPBV ABPTK |
ID | FETCH-LOGICAL-c692t-dde9bc47b53706aa3a6128218717d4e7f3683a1d51e8916f6ea8cf48e0d491383 |
IEDL.DBID | M48 |
ISSN | 1932-6203 |
IngestDate | Sun Oct 01 00:11:30 EDT 2023 Wed Aug 27 01:29:53 EDT 2025 Thu Aug 21 14:34:51 EDT 2025 Fri Jul 11 11:13:46 EDT 2025 Fri Jul 25 11:21:37 EDT 2025 Tue Jun 17 21:33:03 EDT 2025 Tue Jun 10 20:46:24 EDT 2025 Fri Jun 27 04:41:08 EDT 2025 Fri Jun 27 04:39:31 EDT 2025 Thu May 22 21:13:36 EDT 2025 Wed Feb 19 02:30:55 EST 2025 Thu Apr 24 22:53:20 EDT 2025 Tue Jul 01 00:54:46 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 12 |
Language | English |
License | This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Creative Commons Attribution License |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c692t-dde9bc47b53706aa3a6128218717d4e7f3683a1d51e8916f6ea8cf48e0d491383 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 Competing Interests: The authors have declared that no competing interests exist. |
ORCID | 0000-0001-5454-3770 |
OpenAccessLink | https://doaj.org/article/9ad72e97bec947aab65fa2ecff90fce0 |
PMID | 31856231 |
PQID | 2328721922 |
PQPubID | 1436336 |
PageCount | e0225031 |
ParticipantIDs | plos_journals_2328721922 doaj_primary_oai_doaj_org_article_9ad72e97bec947aab65fa2ecff90fce0 pubmedcentral_primary_oai_pubmedcentral_nih_gov_6922374 proquest_miscellaneous_2329733331 proquest_journals_2328721922 gale_infotracmisc_A609224128 gale_infotracacademiconefile_A609224128 gale_incontextgauss_ISR_A609224128 gale_incontextgauss_IOV_A609224128 gale_healthsolutions_A609224128 pubmed_primary_31856231 crossref_citationtrail_10_1371_journal_pone_0225031 crossref_primary_10_1371_journal_pone_0225031 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2019-12-19 |
PublicationDateYYYYMMDD | 2019-12-19 |
PublicationDate_xml | – month: 12 year: 2019 text: 2019-12-19 day: 19 |
PublicationDecade | 2010 |
PublicationPlace | United States |
PublicationPlace_xml | – name: United States – name: San Francisco – name: San Francisco, CA USA |
PublicationTitle | PloS one |
PublicationTitleAlternate | PLoS One |
PublicationYear | 2019 |
Publisher | Public Library of Science Public Library of Science (PLoS) |
Publisher_xml | – name: Public Library of Science – name: Public Library of Science (PLoS) |
References | A. Kadir (pone.0225031.ref060) 2014; 125 L Hongjun (pone.0225031.ref045) 2010; 59 pone.0225031.ref008 H. Liu (pone.0225031.ref061) 2012; 12 B. Norouzi (pone.0225031.ref066) 2014; 71 X. Wei (pone.0225031.ref038) 2012; 85 M. Khan (pone.0225031.ref067) 2019 H. Liu (pone.0225031.ref035) 2013; 124 G. Zhang (pone.0225031.ref054) 2011; 284 M. Ahmad (pone.0225031.ref020) 2018 P. Zhen (pone.0225031.ref043) 2016; 75 M. Ahmad (pone.0225031.ref023) 2018; 10 A. Rafiq (pone.0225031.ref003) 2018 S. Vaidyanathan (pone.0225031.ref025) 2018; 133 C. Zhu (pone.0225031.ref065) 2015; 79 pone.0225031.ref014 A. Akgul (pone.0225031.ref026) 2018; 26 F. Özkaynak (pone.0225031.ref016) 2018; 92 E. Al Solami (pone.0225031.ref018) 2018; 20 B. Norouzi (pone.0225031.ref036) 2013; 20 K. Gupta (pone.0225031.ref059) 2012; 49 M. Khan (pone.0225031.ref005) 2018; 13 M. Ahmad (pone.0225031.ref017) 2017; 8 A. Belazi (pone.0225031.ref010) 2017; 87 S.E. Borujeni (pone.0225031.ref047) 2013; 52 M. Ahmad (pone.0225031.ref019) 2018; 10 A.Y. Niyat (pone.0225031.ref032) 2017; 90 R. Rhouma (pone.0225031.ref034) 2009; 40 J. Ahmad (pone.0225031.ref068) 2016; 75 Q. Zhang (pone.0225031.ref040) 2013; 124 X. Wang (pone.0225031.ref056) 2015; 73 X. Wang (pone.0225031.ref064) 2014; 75 W. Yue (pone.0225031.ref055) 2014; 264 C.K. Huang (pone.0225031.ref033) 2009; 282 X. Wang (pone.0225031.ref049) 2006; 260 C.E. Shannon (pone.0225031.ref002) 1948; 27 Q. Zhang (pone.0225031.ref037) 2010; 52 I. Younas (pone.0225031.ref004) 2018; 20 F. Özkaynak (pone.0225031.ref013) 2018; 92 Q. Lai (pone.0225031.ref028) 2018 Q. Zhang (pone.0225031.ref041) 2014; 68 R. Brown (pone.0225031.ref030) 1828; 4 Zhili Zhou (pone.0225031.ref070) 2018; 6 F. Ahmed (pone.0225031.ref069) 2014; 77 Majid Khan (pone.0225031.ref051) 2015; 26 N. Singh (pone.0225031.ref048) 2008; 46 R. Enayatifar (pone.0225031.ref042) 2014; 56 X. Wang (pone.0225031.ref053) 2012; 285 A.A. Alzaidi (pone.0225031.ref024) 2018 L. Liu (pone.0225031.ref063) 2012; 38 E. Al Solami (pone.0225031.ref022) 2018; 20 H.A. Ahmed (pone.0225031.ref021) S. Lian (pone.0225031.ref029) 2009; 72 M. Chaudesaigues (pone.0225031.ref031) 1908; 147 Q. Zhang (pone.0225031.ref039) 2013; 124 Z. Zhi-liang (pone.0225031.ref052) 2011; 181 R Rhouma (pone.0225031.ref044) 2009; 40 M. Khan (pone.0225031.ref011) 2017; 76 C.E. Shannon (pone.0225031.ref001) 1949; 28 S.R.M. Prasanna (pone.0225031.ref050) 2006; 1 C.K. Huang (pone.0225031.ref057) 2009; 282 M. Khan (pone.0225031.ref009) 2018; 29 F. Özkaynak (pone.0225031.ref015) 2017 R. Rhouma (pone.0225031.ref058) 2009; 40 C K Huang (pone.0225031.ref046) 2009; 282 H.M. Waseem (pone.0225031.ref006) 2018; 27 X. Wang (pone.0225031.ref027) 2018; 8 H.M. Waseem (pone.0225031.ref007) 2018; 57 X. Wei (pone.0225031.ref062) 2012; 85 F. Özkaynak (pone.0225031.ref012) 2017; 11 |
References_xml | – ident: pone.0225031.ref014 doi: 10.1109/ISDFS.2018.8355368 – volume: 40 start-page: 309 year: 2009 ident: pone.0225031.ref044 article-title: OCML-based color image encryption publication-title: Chaos, Solitons and Fractals doi: 10.1016/j.chaos.2007.07.083 – volume: 27 start-page: 063022 issue: 6 year: 2018 ident: pone.0225031.ref006 article-title: Image privacy scheme using quantum spinning and rotation publication-title: Journal of Electronic Imaging doi: 10.1117/1.JEI.27.6.063022 – volume: 4 start-page: 161 issue: 21 year: 1828 ident: pone.0225031.ref030 article-title: XXVII. A brief account of microscopical observations made in the months of June, July and August 1827, on the particles contained in the pollen of plants; and on the general existence of active molecules in organic and inorganic bodies publication-title: The Philosophical Magazine doi: 10.1080/14786442808674769 – volume: 73 start-page: 53 year: 2015 ident: pone.0225031.ref056 article-title: A novel chaotic image encryption scheme using DNA sequence operations publication-title: Optics and Lasers in Engineering doi: 10.1016/j.optlaseng.2015.03.022 – start-page: 1 ident: pone.0225031.ref021 article-title: A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map publication-title: Neural Computing and Applications – volume: 124 start-page: 6276 year: 2013 ident: pone.0225031.ref040 article-title: A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system publication-title: Optik doi: 10.1016/j.ijleo.2013.05.009 – volume: 57 start-page: 3584 issue: 11 year: 2018 ident: pone.0225031.ref007 article-title: Information Confidentiality Using Quantum Spinning, Rotation and Finite State Machine publication-title: International Journal of Theoretical Physics doi: 10.1007/s10773-018-3872-6 – volume: 87 start-page: 337 issue: 1 year: 2017 ident: pone.0225031.ref010 article-title: Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption publication-title: Nonlinear Dynamics doi: 10.1007/s11071-016-3046-0 – volume: 10 start-page: 266 issue: 7 year: 2018 ident: pone.0225031.ref019 article-title: Cryptanalysis of an image encryption algorithm based on combined chaos for a BAN system, and improved scheme using SHA-512 and hyperchaos publication-title: Symmetry doi: 10.3390/sym10070266 – volume: 40 start-page: 309 issue: 1 year: 2009 ident: pone.0225031.ref034 article-title: OCML-based colour image encryption publication-title: Chaos, Solitons & Fractals doi: 10.1016/j.chaos.2007.07.083 – volume: 12 start-page: 1457 year: 2012 ident: pone.0225031.ref061 article-title: Image encryption using DNA complementary rule and chaotic maps publication-title: Appl. Soft Comput doi: 10.1016/j.asoc.2012.01.016 – volume: 38 start-page: 1240 issue: 5 year: 2012 ident: pone.0225031.ref063 article-title: A RGB image encryption algorithm based on DNA encoding and chaos map publication-title: Computers & Electrical Engineering doi: 10.1016/j.compeleceng.2012.02.007 – volume: 8 start-page: 2132 issue: 11 year: 2018 ident: pone.0225031.ref027 article-title: A Chaotic System with Infinite Equilibria and Its S-Box Constructing Application publication-title: Applied Sciences doi: 10.3390/app8112132 – start-page: 839 volume-title: Soft Computing: Theories and Applications year: 2018 ident: pone.0225031.ref020 doi: 10.1007/978-981-10-5687-1_75 – volume: 68 start-page: 186 year: 2014 ident: pone.0225031.ref041 article-title: Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps publication-title: Int. J. Electron. Commun. (AEÜ) doi: 10.1016/j.aeue.2013.08.007 – volume: 20 start-page: 45 year: 2013 ident: pone.0225031.ref036 article-title: A novel image encryption based on hash function with only two-round diffusion process publication-title: Multimed. Syst doi: 10.1007/s00530-013-0314-4 – volume: 8 start-page: 13 issue: 2 year: 2017 ident: pone.0225031.ref017 article-title: A simple secure hash function scheme using multiple chaotic maps publication-title: 3D Research doi: 10.1007/s13319-017-0123-1 – volume: 26 start-page: 1336 issue: 5 year: 2018 ident: pone.0225031.ref026 article-title: Chaos‐based encryption of multimedia data and design of security analysis interface as an educational tool publication-title: Computer Applications in Engineering Education doi: 10.1002/cae.22038 – volume: 77 start-page: 2771 issue: 4 year: 2014 ident: pone.0225031.ref069 article-title: A noisy channel tolerant image encryption scheme publication-title: Wireless personal communications doi: 10.1007/s11277-014-1667-5 – volume: 75 start-page: 13951 issue: 21 year: 2016 ident: pone.0225031.ref068 article-title: A secure image encryption scheme based on chaotic maps and affine transformation publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-015-2973-y – volume: 56 start-page: 83 year: 2014 ident: pone.0225031.ref042 article-title: Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence publication-title: Opt. Lasers Eng doi: 10.1016/j.optlaseng.2013.12.003 – volume: 260 start-page: 449 issue: 2 year: 2006 ident: pone.0225031.ref049 article-title: Image encryption based on extended fractional Fourier transform and digital holography technique publication-title: Optics Communications doi: 10.1016/j.optcom.2005.11.006 – volume: 10 start-page: 247 issue: 3 year: 2018 ident: pone.0225031.ref023 article-title: An image encryption approach using particle swarm optimization and chaotic map publication-title: International Journal of Information Technology doi: 10.1007/s41870-018-0099-y – volume: 92 start-page: 305 issue: 2 year: 2018 ident: pone.0225031.ref016 article-title: Brief review on application of nonlinear dynamics in image encryption publication-title: Nonlinear Dynamics doi: 10.1007/s11071-018-4056-x – volume: 75 start-page: 345 issue: 1–2 year: 2014 ident: pone.0225031.ref064 article-title: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system publication-title: Nonlinear dynamics doi: 10.1007/s11071-013-1070-x – volume: 59 start-page: 3320 year: 2010 ident: pone.0225031.ref045 article-title: Color image encryption based on one-time keys and robust chaotic maps publication-title: Computer and Mathematics with Applications doi: 10.1016/j.camwa.2010.03.017 – volume: 71 start-page: 1469 issue: 3 year: 2014 ident: pone.0225031.ref066 article-title: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process publication-title: Multimedia tools and applications doi: 10.1007/s11042-012-1292-9 – volume: 49 start-page: 29 year: 2012 ident: pone.0225031.ref059 article-title: Novel approach for fast compressed hybrid color image cryptosystem publication-title: Adv. Eng. Softw doi: 10.1016/j.advengsoft.2012.03.001 – volume: 282 start-page: 2123 issue: 11 year: 2009 ident: pone.0225031.ref033 article-title: Multi chaotic systems based pixel shuffle for image encryption publication-title: Optics Communications doi: 10.1016/j.optcom.2009.02.044 – volume: 11 start-page: 659 issue: 4 year: 2017 ident: pone.0225031.ref012 article-title: A new S-box construction method based on the fractional-order chaotic Chen system publication-title: Signal, Image and Video Processing doi: 10.1007/s11760-016-1007-1 – year: 2018 ident: pone.0225031.ref024 article-title: Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map publication-title: Complexity doi: 10.1155/2018/9389065 – volume: 72 start-page: 1296 year: 2009 ident: pone.0225031.ref029 article-title: A Block Cipher Based on Chaotic Neural Networks publication-title: Neurocomputing doi: 10.1016/j.neucom.2008.11.005 – volume: 27 start-page: 379 issue: 3 year: 1948 ident: pone.0225031.ref002 article-title: A mathematical theory of communication publication-title: Bell system technical journal doi: 10.1002/j.1538-7305.1948.tb01338.x – volume: 124 start-page: 3527 year: 2013 ident: pone.0225031.ref035 article-title: Color image encryption using Choquet fuzzy integral and hyper chaotic system publication-title: Optik doi: 10.1016/j.ijleo.2012.10.068 – volume: 284 start-page: 2775 year: 2011 ident: pone.0225031.ref054 article-title: A novel image encryption method based on total shuffling scheme publication-title: Optics Communications doi: 10.1016/j.optcom.2011.02.039 – volume: 40 start-page: 309 year: 2009 ident: pone.0225031.ref058 article-title: OCML-based colour image encryption publication-title: Chaos Soliton. Fract doi: 10.1016/j.chaos.2007.07.083 – volume: 26 year: 2015 ident: pone.0225031.ref051 article-title: An efficient chaotic image encryption scheme publication-title: Neural Computing and Applications – start-page: 1 year: 2018 ident: pone.0225031.ref003 article-title: Construction of new S-boxes based on triangle groups and its applications in copyright protection publication-title: Multimedia Tools and Applications – volume: 282 start-page: 2123 year: 2009 ident: pone.0225031.ref046 article-title: Multi chaotic systems based pixel shuffle for image encryption publication-title: Optics Communications doi: 10.1016/j.optcom.2009.02.044 – volume: 125 start-page: 1671 year: 2014 ident: pone.0225031.ref060 article-title: Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN publication-title: Optik doi: 10.1016/j.ijleo.2013.09.040 – volume: 28 start-page: 656 issue: 4 year: 1949 ident: pone.0225031.ref001 article-title: Communication theory of secrecy systems publication-title: Bell system technical journal doi: 10.1002/j.1538-7305.1949.tb00928.x – volume: 90 start-page: 225 year: 2017 ident: pone.0225031.ref032 article-title: Color image encryption based on hybrid hyper-chaotic system and cellular automata publication-title: Optics and Lasers in Engineering doi: 10.1016/j.optlaseng.2016.10.019 – volume: 1 start-page: 132 issue: 2 year: 2006 ident: pone.0225031.ref050 article-title: An image encryption method with magnitude and phase manipulation using carrier images publication-title: International Journal of Computer Science – volume: 133 start-page: 46 issue: 2 year: 2018 ident: pone.0225031.ref025 article-title: A new 4-D chaotic hyperjerk system, its synchronization, circuit design and applications in RNG, image encryption and chaos-based steganography publication-title: The European Physical Journal Plus doi: 10.1140/epjp/i2018-11872-8 – volume: 75 start-page: 6303 year: 2016 ident: pone.0225031.ref043 article-title: Chaos-based image encryption scheme combining DNA coding and entropy publication-title: Multimed. Tools Appl doi: 10.1007/s11042-015-2573-x – volume: 76 start-page: 24027 issue: 22 year: 2017 ident: pone.0225031.ref011 article-title: A new approach for image encryption and watermarking based on substitution box over the classes of chain rings publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-016-4090-y – volume: 13 start-page: e0206460 issue: 11 year: 2018 ident: pone.0225031.ref005 article-title: A novel image encryption scheme based on quantum dynamical spinning and rotations publication-title: PloS one doi: 10.1371/journal.pone.0206460 – volume: 46 start-page: 117 issue: 2 year: 2008 ident: pone.0225031.ref048 article-title: Optical image encryption using fractional Fourier transform and chaos publication-title: Optics and Lasers in Engineering doi: 10.1016/j.optlaseng.2007.09.001 – volume: 92 start-page: 305 issue: 2 year: 2018 ident: pone.0225031.ref013 article-title: Brief review on application of nonlinear dynamics in image encryption publication-title: Nonlinear Dynamics doi: 10.1007/s11071-018-4056-x – volume: 79 start-page: 1511 issue: 2 year: 2015 ident: pone.0225031.ref065 article-title: Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system publication-title: Nonlinear Dynamics doi: 10.1007/s11071-014-1757-7 – volume: 20 start-page: 525 issue: 7 year: 2018 ident: pone.0225031.ref018 article-title: A new hyperchaotic system-based design for efficient bijective substitution-boxes publication-title: Entropy doi: 10.3390/e20070525 – volume: 85 start-page: 290 year: 2012 ident: pone.0225031.ref038 article-title: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system publication-title: J. Syst. Softw doi: 10.1016/j.jss.2011.08.017 – volume: 124 start-page: 3596 year: 2013 ident: pone.0225031.ref039 article-title: A novel image fusion encryption algorithm based on DNA sequence operation and hyperchaotic system publication-title: Optik doi: 10.1016/j.ijleo.2012.11.018 – volume: 20 start-page: 913 issue: 12 year: 2018 ident: pone.0225031.ref004 article-title: A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System publication-title: Entropy doi: 10.3390/e20120913 – year: 2018 ident: pone.0225031.ref028 article-title: Dynamic analysis and synchronization control of an unusual chaotic system with exponential term and coexisting attractors publication-title: Chinese Journal of Physics – volume: 52 start-page: 2028 year: 2010 ident: pone.0225031.ref037 article-title: Image encryption using DNA addition combining with chaotic maps publication-title: Math. Comput. Model doi: 10.1016/j.mcm.2010.06.005 – volume: 6 start-page: 15021 year: 2018 ident: pone.0225031.ref070 article-title: Secret Image Sharing based on Encrypted Pixels publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2811722 – volume: 52 start-page: 525 issue: 2 year: 2013 ident: pone.0225031.ref047 article-title: Chaotic image encryption system using phase-magnitude transformation and pixel substitution publication-title: Telecommunication Systems – volume: 29 start-page: 993 issue: 4 year: 2018 ident: pone.0225031.ref009 article-title: A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation publication-title: Neural Computing and Applications doi: 10.1007/s00521-016-2511-5 – volume: 147 start-page: 1044 year: 1908 ident: pone.0225031.ref031 article-title: Le mouvement brownien et la formule d'Einstein publication-title: Comptes Rendus – volume: 20 start-page: 525 issue: 7 year: 2018 ident: pone.0225031.ref022 article-title: A new hyperchaotic system-based design for efficient bijective substitution-boxes publication-title: Entropy doi: 10.3390/e20070525 – start-page: 1 year: 2019 ident: pone.0225031.ref067 article-title: A novel chaotic image encryption technique based on multiple discrete dynamical maps publication-title: Multimedia Tools and Applications – ident: pone.0225031.ref008 doi: 10.1109/ICAEM.2018.8536308 – volume: 85 start-page: 290 issue: 2 year: 2012 ident: pone.0225031.ref062 article-title: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2011.08.017 – volume: 285 start-page: 4033 year: 2012 ident: pone.0225031.ref053 article-title: A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models publication-title: Optics Communications doi: 10.1016/j.optcom.2012.06.039 – volume: 282 start-page: 2123 issue: 11 year: 2009 ident: pone.0225031.ref057 article-title: Multi chaotic systems based pixel shuffle for image encryption publication-title: Optics Communications doi: 10.1016/j.optcom.2009.02.044 – start-page: 1 year: 2017 ident: pone.0225031.ref015 article-title: Construction of robust substitution boxes based on chaotic systems publication-title: Neural Computing and Applications – volume: 181 start-page: 1171 year: 2011 ident: pone.0225031.ref052 article-title: A chaos based symmetric image encryption scheme using a bit-level permutation publication-title: Information Sciences doi: 10.1016/j.ins.2010.11.009 – volume: 264 start-page: 317 year: 2014 ident: pone.0225031.ref055 article-title: Design of image cipher using latin squares publication-title: Information Sciences doi: 10.1016/j.ins.2013.11.027 |
RelatedPersons | Shannon, Claude |
RelatedPersons_xml | – fullname: Shannon, Claude |
SSID | ssj0053866 |
Score | 2.4892104 |
Snippet | Information security is an important and critical subject of the current digital era. Nowadays, almost all information is digital in nature and security from... |
SourceID | plos doaj pubmedcentral proquest gale pubmed crossref |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
StartPage | e0225031 |
SubjectTerms | Algorithms Analysis Benchmarking Benchmarks Brownian motion Chaos theory Communication Computer and Information Sciences Computer hackers Computer Security Confidentiality Cryptography Data encryption Design Digital imaging Digital media Eavesdropping Encryption Engineering and Technology Image Processing, Computer-Assisted - methods Methods Motion Multimedia communications Physical Sciences Research and Analysis Methods Safety and security measures Securities analysis Security Security systems Shannon, Claude Statistical analysis Statistical tests |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3fb9MwELZQn3hBjF8rG2AQEvCQLYkdO34siGkgARIwtLfIcex1UptUTYu0_547240WNGk80MfexU7P5_N3qu87Ql7XzljArTZxItcJr7MsgUOBA5DTFvnqXOqwOPnLV3F6xj-fF-fXWn3hnbBADxwMd6x0I3OrJMyluNS6FoXTuTXOKRjG-mwdzrxdMhViMOxiIWKhHJPZcVyXo1XX2iM4tYqUZaODyPP1D1F5slp0_U2Q8--bk9eOopP75F7EkHQW3n2P3LHtA7IXd2lP30Yq6XcPyXJG2-63XdDLJcQNCvL1lY8RdOBupXjz_YLOr7B0i4aG0rRzFMt114CoaRN61sOEZq47mJIu9aqnum2oz-HBv2joBfSInJ18_PnhNIkNFhIjVL5JILSp2nBZF0ymQmumAe-UcOhDjtdwKx0TJdNZU2S2BBjphNWlcby0acNVBrntYzJpwaT7hKaNy7ngAJe4AxkMywwS9WhXu8I0xZSwnbUrE9nHsQnGovJ_qUnIQoLxKlyjKq7RlCTDU6vAvnGL_ntcyEEXubP9F-BRVfSo6jaPmpIX6AZVKEQdIkA1E6lCwJOXU_LKayB_RosXdC70tu-rT99-_YPSj-8jpTdRyXVgDqNjUQT8JuTlGmkejjQhCpiReB-ddmeVvgKkXEJ2D2J4cufIN4tfDmIcFC_dtbbbeh0lGXzArk-C3w-WxaJ7QM4gkaMdMTL9WNJezj19ObheziR_-j_W6oDcBQTrG3pk6pBMNuutfQYocVM_9wHhD1gAad4 priority: 102 providerName: Directory of Open Access Journals – databaseName: Health & Medical Collection (ProQuest) dbid: 7X7 link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwELegvPCCGF8rDDAICXjIlg_Hjp9QQUwDCZCAob5ZjmO3k9qkNO2k_fe7c9xA0ATkMXdJ2vPd-S65-x0hL0pnLMStNnI81RErkySCTYFBIKct4tW52GFz8qfP_OSUfZzm0_DCrQ1llTuf6B111Rh8R34EO38B2YpM0zernxFOjcKvq2GExnVyA6HLsKRLTPuEC2yZ89Aul4nkKKzO4aqp7SHsXXmcJYPtyKP29755tFo07VWB55_1k79tSMe3ya0QSdJJt_R75Jqt75C9YKstfRUApV_fJcsJrZtzu6BnS_AeFOjrC-8paI_gSrH-fUbnF9jARbux0rRxFJt21xBX06qbXA8PNHPdwCPpUq9aquuK-kwetIx2E4HukdPj99_fnURhzEJkuEw3ETg4WRomyjwTMdc60xD1FLD1Q6ZXMStcxotMJ1We2AKCScetLoxjhY0rJhPIcO-TUQ0i3Sc0rlzKOIOgiTmgwW0zg3A92pUuN1U-JtlO2soEDHIchbFQ_sOagFykE57CNVJhjcYk6q9adRgc_-B_iwvZ8yKCtj_RrGcqGKSSuhKplQJ0WDKhdclzp1NrnJOgnjYek6eoBqprR-39gJrwWGLYkxZj8txzIIpGjWU6M71tW_Xhy4__YPr2dcD0MjC5BsRhdGiNgP-E6FwDzoMBJ_gCMyDvo9LupNKqX1YDV-4U-Wrys56MN8XSu9o2W88jRQYHyPVBp_e9ZLH1HuJnoIiBRQxEP6TUZ3MPYg6ql2aCPfz7z3pEbkKE6gd2JPKAjDbrrX0MUeCmfOJN_RLNq17r priority: 102 providerName: ProQuest |
Title | A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion |
URI | https://www.ncbi.nlm.nih.gov/pubmed/31856231 https://www.proquest.com/docview/2328721922 https://www.proquest.com/docview/2329733331 https://pubmed.ncbi.nlm.nih.gov/PMC6922374 https://doaj.org/article/9ad72e97bec947aab65fa2ecff90fce0 http://dx.doi.org/10.1371/journal.pone.0225031 |
Volume | 14 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwELdG98ILYnytYxSDkICHVPlw4uQBoW5aGUgbaFDUt8hx7HZSm3RNO9H_njvHjQgqGn3IQ-_sqOf7-Ln23RHyJtNSAW5Vjo584bDM8xwICgyAnFBYr067GpOTLy6j8xH7Mg7He2Tbs9UKsNq5tcN-UqPlrP_rZvMRDP6D6drAve2g_qIsVB9iUuhiYvU-xCaOpnrBmnMFsG5zeomoxYl8N7DJdP-apRWsTE3_xnN3FrOy2gVL_75d-Ue4Gj4kDyzOpINaMQ7InioekQNryRV9Z8tNv39M5gNalLdqRq_n4Fso0Jcb40doU9-V4u34CZ1uML2L1k2naakppvQuAXXTvO5rDy-UU1HCK-lcLCoqipyafT7oIK37BT0ho-HZj9NzxzZhcGSU-CsH3F-SScazMOBuJEQgABPFAAxgH5gzxXUQxYHw8tBTMUBNHSkRS81i5eYs8WD_-5R0ChDpIaFurn0WMYBUTAMNpg0kFvMROtOhzMMuCbbSTqWtUI6NMmapOXbjsFOphZfiGqV2jbrEaUYt6godd_Cf4EI2vFhf23xRLiepNdc0ETn3VcJBwxPGhciiUAtfSa0TUF7ldslLVIO0TlZtvEQ6iNwEQZEfd8lrw4E1Ngq8xDMR66pKP3_9-R9M369aTG8tky5BHFLYxAn4TVi7q8V53OIETyFb5ENU2q1UqhTQdMwhZPk-jNwq8m7yq4aMk-LFvEKVa8OT8AA-INdntd43ksXEfEDXQOEti2iJvk0prqemxDmonh9wdnSnmJ-T-wBhTUcPLzkmndVyrV4ATFxlPXKPjzk841MPn8NPPbJ_cnb57apn_njpGc_wG7nvbNA |
linkProvider | Scholars Portal |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEF6VcIALorwaKHRBIODg1o-11z4gFB5VQh9I0Fa5mfV6N6mU2CZOQPlT_EZm1g8wqoBLc8yMN87sPL6xd2YIeZpoqQC3KksHrrBY4jgWBAUGQE4o7FenbY3FyUfHwfCUfRj74w3yo6mFwWOVjU80jjrNJT4j34PIH0K2Ernu6-KrhVOj8O1qM0KjUosDtf4OKVv5avQO9veZ6-6_P3k7tOqpApYMIndpgT1HiWQ88T1uB0J4AoJ8CJEOEpuUKa69IPSEk_qOCgE76UCJUGoWKjtlkQMJHax7hVyFwGujRfFxm-CB7wiCujzP485erQ27RZ6pXYiVvu05nfBnpgS0saBXzPLyIqD753nN3wLg_k1yo0audFCp2ibZUNktsln7hpK-qBtYv7xN5gOa5d_UjJ7PwVtRoC_WxjPRtmMsxfP2EzpdY8EYrcZY01xTLBJeAI6n6ToTppMBlVORw0_SuShKKrKUmicHoNW0mkB0h5xeygbcJb0MRLpFqJ1qlwUMQBrTQINlPYntgYROtC9Tv0-8RtqxrHue4-iNWWxe5HHIfSrhxbhHcb1HfWK1VxVVz49_8L_BjWx5sWO3-SJfTOLaAcSRSLmrIg42EzEuRBL4WrhKah2BOSi7T3ZQDeKq_LX1O_EgsCOEWW7YJ08MB3btyPBY0ESsyjIefTz7D6bPnzpMz2smnYM4pKhLMeA_YTewDud2hxN8j-yQt1BpG6mU8S8rhSsbRb6Y_Lgl46J41C9T-crwRNyDD8j1XqX3rWSx1B_wOlB4xyI6ou9SsvOpaZoOqud6nN3_-23tkGvDk6PD-HB0fPCAXAd0bIaFONE26S0XK_UQEOgyeWTMnpIvl-1nfgJuOpr2 |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwELdGkRAviPG1wmAGgYCHrPlw4uQBocKoVgYDAUN9C45jt5PapDQtqP8afx13jhsImoCX9bF3cdPzffwu8d0R8jDTUgFuVY6OfOGwzPMcCAoMgJxQ2K9OuxqLk98eR4cn7PUoHG2RH5taGDxWufGJxlHnpcRn5D2I_DFkK4nv97Q9FvH-YPB8_tXBCVL4pnUzTqNWkSO1_g7pW_VseAB7_cj3B68-vTx07IQBR0aJv3TAtpNMMp6FAXcjIQIBAT-GqAdJTs4U10EUB8LLQ0_FgKN0pEQsNYuVm7PEg-QO1r1ALvIg9NDG-KhJ9sCPRJEt1Qu417OasT8vC7UPcTN0A68VCs3EgCYudObTsjoL9P55dvO3YDi4Sq5YFEv7tdptky1VXCPb1k9U9IltZv30Opn1aVF-U1N6OgPPRYG-WBsvRZvusRTP3o_pZI3FY7QeaU1LTbFgeAGYnubrQpiuBlRORAk_SWdiXlFR5NQ8RQANp_U0ohvk5Fw24CbpFCDSHULdXPssYgDYmAYaLBtIbBUkdKZDmYddEmyknUrb_xzHcExT81KPQx5UCy_FPUrtHnWJ01w1r_t__IP_BW5kw4vdu80X5WKcWmeQJiLnvko42E_CuBBZFGrhK6l1Aqah3C7ZQzVI61LYxgel_chNEHL5cZc8MBzYwaNAWxiLVVWlw3ef_4Pp44cW02PLpEsQhxS2LAP-E3YGa3HutjjBD8kWeQeVdiOVKv1lsXDlRpHPJt9vyLgoHvsrVLkyPAkP4ANyvVXrfSNZLPsH7A4U3rKIlujblOJ0Yhqog-r5AWe3_35be-QSeJj0zfD46A65DEDZzA3xkl3SWS5W6i6A0WV2z1g9JV_O2838BKftnyw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+image+encryption+technique+using+hybrid+method+of+discrete+dynamical+chaotic+maps+and+Brownian+motion&rft.jtitle=PloS+one&rft.au=Batool+Naqvi%2C+Syeda+Iram&rft.au=Alghafis%2C+Abdullah&rft.au=Masood%2C+Fawad&rft.au=Khan%2C+Majid&rft.date=2019-12-19&rft.pub=Public+Library+of+Science&rft.issn=1932-6203&rft.eissn=1932-6203&rft.volume=14&rft.issue=12&rft.spage=e0225031&rft_id=info:doi/10.1371%2Fjournal.pone.0225031&rft.externalDBID=n%2Fa&rft.externalDocID=A609224128 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-6203&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-6203&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-6203&client=summon |