Fast image encryption algorithm based on (n, m, k)-PCMLCA
Cellular Automata (CA) can be implemented by hardware and processed in parallel unlike the conventional algorithm based on chaotic function. In this paper, we propose a fast encryption algorithm for color image using ( n , m , k )-programmable complemented maximum length CA(( n , m , k )-PCMLCA)...
Saved in:
| Published in | Multimedia tools and applications Vol. 81; no. 1; pp. 1209 - 1235 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Springer US
01.01.2022
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1380-7501 1573-7721 |
| DOI | 10.1007/s11042-021-11424-8 |
Cover
| Abstract | Cellular Automata (CA) can be implemented by hardware and processed in parallel unlike the conventional algorithm based on chaotic function. In this paper, we propose a fast encryption algorithm for color image using (
n
,
m
,
k
)-programmable complemented maximum length CA((
n
,
m
,
k
)-PCMLCA). This algorithm improves the speed of shuffling pixel positions in the color image encryption system. The encryption process of the proposed image encryption system consists of a substitution step and a shuffling step. In the substitution step, we design the (
n
,
m
,
k
)-PCMLCA which can generate nonlinear sequences whose lengths are longer than the lengths of sequences generated by complemented maximum length CA (C-MLCA), and use it as the key sequence generator. In the shuffling step, we improve the encryption/decryption speed by raising the domain processing the image to the row/column level rather than the pixel unit and processing the block unit using 1-D MLCA. With the advantage of these CA, we can improve the speed of encryption/decryption. |
|---|---|
| AbstractList | Cellular Automata (CA) can be implemented by hardware and processed in parallel unlike the conventional algorithm based on chaotic function. In this paper, we propose a fast encryption algorithm for color image using (n, m, k)-programmable complemented maximum length CA((n, m, k)-PCMLCA). This algorithm improves the speed of shuffling pixel positions in the color image encryption system. The encryption process of the proposed image encryption system consists of a substitution step and a shuffling step. In the substitution step, we design the (n, m, k)-PCMLCA which can generate nonlinear sequences whose lengths are longer than the lengths of sequences generated by complemented maximum length CA (C-MLCA), and use it as the key sequence generator. In the shuffling step, we improve the encryption/decryption speed by raising the domain processing the image to the row/column level rather than the pixel unit and processing the block unit using 1-D MLCA. With the advantage of these CA, we can improve the speed of encryption/decryption. Cellular Automata (CA) can be implemented by hardware and processed in parallel unlike the conventional algorithm based on chaotic function. In this paper, we propose a fast encryption algorithm for color image using ( n , m , k )-programmable complemented maximum length CA(( n , m , k )-PCMLCA). This algorithm improves the speed of shuffling pixel positions in the color image encryption system. The encryption process of the proposed image encryption system consists of a substitution step and a shuffling step. In the substitution step, we design the ( n , m , k )-PCMLCA which can generate nonlinear sequences whose lengths are longer than the lengths of sequences generated by complemented maximum length CA (C-MLCA), and use it as the key sequence generator. In the shuffling step, we improve the encryption/decryption speed by raising the domain processing the image to the row/column level rather than the pixel unit and processing the block unit using 1-D MLCA. With the advantage of these CA, we can improve the speed of encryption/decryption. |
| Author | Kang, Sung Won Choi, Un Sook Cho, Sung Jin |
| Author_xml | – sequence: 1 givenname: Sung Won surname: Kang fullname: Kang, Sung Won organization: Department of Information Security, Pukyong National University – sequence: 2 givenname: Un Sook orcidid: 0000-0002-5727-7903 surname: Choi fullname: Choi, Un Sook email: choies@tu.ac.kr organization: Department of Information and Communications and Software Engineering, Tongmyong University – sequence: 3 givenname: Sung Jin surname: Cho fullname: Cho, Sung Jin organization: Department of Applied Mathematics, Pukyong National University |
| BookMark | eNp9kMFKAzEQhoNUsK2-gKcFLwpGM0k2yeKpLFaFih56D9ndbN3aZmuyPfRtfBafzNQVBA89hAnh_2Yy3wgNXOssQudAboAQeRsACKeYUMAAnHKsjtAQUsmwlBQG8c4UwTIlcIJGISwJAZFSPkR3UxO6pFmbhU2sK_1u0zWtS8xq0fqme1snhQm2SuLTpbv--lzH836FX_PnWT45Rce1WQV79lvHaD69n-ePePby8JRPZrhkkHU4lZJYUfKCUVuwulS0oiYTBbOFUkxUQgCHusqq0giisoJxKgswQBSrs5SyMbro2258-7G1odPLdutdnKipoHHbNCU8plSfKn0bgre1LpvO7JfpvGlWGojem9K9KR1N6R9TWkWU_kM3Phrxu8MQ66EQw25h_d-vDlDfksl7eQ |
| CitedBy_id | crossref_primary_10_1007_s11042_023_15458_y crossref_primary_10_1142_S021812742350061X crossref_primary_10_1007_s11042_022_14093_3 crossref_primary_10_4108_eetiot_v9i2_2193 crossref_primary_10_1007_s11554_023_01289_5 crossref_primary_10_1007_s12204_023_2676_x crossref_primary_10_1007_s12596_023_01104_1 crossref_primary_10_1007_s11071_024_09870_8 crossref_primary_10_1145_3614433 crossref_primary_10_1080_03772063_2023_2284956 crossref_primary_10_1007_s11071_025_10884_z crossref_primary_10_1007_s00371_023_02876_0 crossref_primary_10_3390_math11102396 crossref_primary_10_1371_journal_pone_0310279 |
| Cites_doi | 10.1109/43.489103 10.1016/j.sigpro.2016.03.021 10.1155/2017/7470204 10.4018/978-1-5225-2773-2 10.1109/TCAD.2007.895784 10.1016/j.sigpro.2018.03.010 10.1109/20CCOMS.2019.8821691 10.1016/j.ijleo.2019.03.065 10.1016/j.sigpro.2018.01.026 10.1109/JSTSP.2020.3002391 10.1016/j.optlaseng.2018.11.015 10.1016/j.optlaseng.2015.03.007 10.1007/s11042-020-09033-y 10.1016/j.jss.2012.07.020 10.1007/s11071-013-1068-4 10.1109/12.2101767 10.1007/s11042-014-1861-1 10.1080/03772063.2017.1400406 10.1109/TCAD.2004.829808 10.4304/jmm.7.1.66-73 10.1007/s11554-019-00860-3 10.1016/j.sigpro.2017.10.004 10.1007/978-3-662-04722-4 10.1109/ACCESS.2018.2817600 10.1016/j.chaos.2003.12.022 10.1142/S021812749800098X 10.1016/j.sigpro.2019.02.016 10.1109/ICCICCT.2014.6993017 10.1016/j.optcom.2014.10.044 10.1109/ICUFN.2018.8437025 10.1016/j.jisa.2018.03.006 10.1016/j.neucom.2017.09.068 10.1016/j.procs.2018.01.153 10.1016/j.sigpro.2018.09.029 10.1016/j.sigpro.2019.06.010 10.1109/ICICCS.2016.7542316 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
| DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI Q9U |
| DOI | 10.1007/s11042-021-11424-8 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) Research Library ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database ProQuest Research library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central Basic |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
| DatabaseTitleList | ABI/INFORM Global (Corporate) |
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1573-7721 |
| EndPage | 1235 |
| ExternalDocumentID | 10_1007_s11042_021_11424_8 |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3EH 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 8AO 8FE 8FG 8FL 8G5 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TH9 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PUEGO 7SC 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D MBDVC PKEHL PQEST PQUKI Q9U |
| ID | FETCH-LOGICAL-c319t-5770e6c4b32eb3fc82d2a96b3eb8836d66141fd9dca6089b3427b1a1083f9523 |
| IEDL.DBID | BENPR |
| ISSN | 1380-7501 |
| IngestDate | Sat Jul 26 00:10:44 EDT 2025 Thu Apr 24 23:06:39 EDT 2025 Wed Oct 01 04:51:16 EDT 2025 Fri Feb 21 02:46:24 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Cellular automata Programmable complemented MLCA Fast image encryption Image shuffling PRNG |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-5770e6c4b32eb3fc82d2a96b3eb8836d66141fd9dca6089b3427b1a1083f9523 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-5727-7903 |
| PQID | 2621425504 |
| PQPubID | 54626 |
| PageCount | 27 |
| ParticipantIDs | proquest_journals_2621425504 crossref_citationtrail_10_1007_s11042_021_11424_8 crossref_primary_10_1007_s11042_021_11424_8 springer_journals_10_1007_s11042_021_11424_8 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20220100 2022-01-00 20220101 |
| PublicationDateYYYYMMDD | 2022-01-01 |
| PublicationDate_xml | – month: 1 year: 2022 text: 20220100 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Dordrecht |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Multimedia tools and applications |
| PublicationTitleAbbrev | Multimed Tools Appl |
| PublicationYear | 2022 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133–145. https://doi.org/10.1016/j.sigpro.2018.01.026 Somaraj S, Ali Hussain M (2014) Securing Medical Images by Image Encryption using Key Image. Intern J Comp App 104(3):30–34. https://doi.org/10.1016/j.jss.2012.07.020 Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62. https://doi.org/10.1016/j.sigpro.2018.09.029 Chen G, Mao YM, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. IEEE Trans Comput-Aided Design Integr Circuits Syst 21(2):749–761. https://doi.org/10.1016/j.chaos.2003.12.022 Koppu S, Viswanatham VM (2017) A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform Modelling and Simulation in Engineering. Model Simulation Eng 1–12. https://doi.org/10.1155/2017/7470204 Jha DP, Kohli R, Gupta A (2016) Proposed encryption algorithm for data security using matrix properties. 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Greater Noida India. https://doi.org/10.1109/ICICCS.2016.7542316 Cho SJ, Choi US, Kim HD, Hwang YH, Kim JG, Heo SH (2007) New synthesis of one-dimensional 90/150 linear hybrid group cellular automata. IEEE Trans Comput-Aided Design Integr Circuits Syst 26(9):1720–1724. https://doi.org/10.1109/TCAD.2007.895784 Das AK, Chaudhuri PP (1993) Vector Space Theoretic Analysis of Additive Cellular Automata and Its Application for Pseudoexhaustive Test Pattern Generation. IEEE Trans Comput 42:340–352. https://doi.org/10.1109/12.2101767 Essaid M, Akharraz I, Saaidi A, Mouhib A (2018) A New Image Encryption Scheme Based on Confusion-Diffusion Using an Enhanced Skew Tent Map. Procedia Comp Sci 127:539–548. https://doi.org/10.1016/j.procs.2018.01.153 Huang L, Cai S, Xiong X, Xiao M (2019) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt Laser Eng 115:7–20. https://doi.org/10.1016/j.optlaseng.2018.11.015 Jeong HS, Park KC, Cho SJ, Kim ST (2018) Color medical image encryption using two-dimensional chaotic map and C-MLCA. in:Proceedings of the 10th International Conference on Ubiquitous and Future Networks (ICUFN), Prague Czech Republic. https://doi.org/10.1109/ICUFN.2018.8437025 BelaziAAbd El-LatifAABelghithSA novel image encryption scheme based on substitution-permutation network and chaosSignal Process201612815517010.1016/j.sigpro.2016.03.021 Hua Z, Jin F, Xu B, Huang H (2018a) 2D Logistic-Sine-coupling map for image encryption. Signal Process 149:148–161. https://doi.org/10.1016/j.sigpro.2018.03.010 TangZZhangXLanWEfficient image encryption with block shuffling and chaotic mapMultimedia Tools and Applications2015745429544810.1007/s11042-014-1861-1 Nandi S, Chakraborty S, Roy S, Karaa WBA, Nath S, Dey N (2014) 1-D Group Cellular Automata Based Image Encryption Technique. in: Proceedings of the 2014 IEEE Intern Conf Control, Instrument, Commun, Computation Technol (ICCICCT). Kanyakumari India. https://doi.org/10.1109/ICCICCT.2014.6993017 Zhang Y (2019) A Fast Image Encryption Algorithm Based on Convolution Operation. IETE J Res 65(1):4–18. https://doi.org/10.1080/03772063.2017.1400406 Kohli R, Kumar M (2013) FPGA implementation of cryptographic algorithms using multi-encryption technique. Int J Adv Res Comput Sci Softw Eng 3(5) Zhang S, Luo H (2012) The Research of Image Encryption Algorithm Based on Chaos Cellular Automata. J Multimedia 7(1):66–73. https://doi.org/10.4304/jmm.7.1.66-73 Gao S, Liao X, Liu X (2019) Real-time detecting one specific tampering operation in multiple operator chains. J Real-Time Image Process 16:741–750. https://doi.org/10.1007/s11554-019-00860-3 Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology. J Select Areas Telecom (JSAT) 31–38 BilanSFormation Methods, Models, and Hardware Implementation of Pseudorandom Number Generaters2018Hershey PA, USAIGI Global10.4018/978-1-5225-2773-2 Choi US, Cho SJ, Kim JG, Kang SW, Kim HD, Kim ST (2019) Color Image Encryption Based on PC-MLCA and 3-D Chaotic Cat Map. in:Proceedings of the 4th IEEE Intern Conf Comp Commun Syst(ICCCS), Singapore Singapore. https://doi.org/10.1109/20CCOMS.2019.8821691 Patro KAK, Acharya B (2018) Secure multi-level permutation operation based multiple colour image encryption. J Inform Sec App 40:111-133. https://doi.org/10.1016/j.jisa.2018.03.006 Zhang Z, Zhao Z (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn 75:319–330. https://doi.org/10.1007/s11071-013-1068-4 WangYZhaoYZhouQLinZImage encryption using partitioned cellular automataNeurocomputing201827511318133210.1016/j.neucom.2017.09.068 ZhangWYuHZhuZColor image encryption based on paired interpermuting planesOPT COMMU201533819920810.1016/j.optcom.2014.10.044 GuanSTanSKPseudorandom Number Generation With Self-Programmable Cellular AutomataIEEE Trans Comput-Aided Design Integr Circuits Syst20042371095110110.1109/TCAD.2004.829808 Hasheminejad A, Rostami MJ (2019) A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Optik 184:205–213. https://doi.org/10.1016/j.ijleo.2019.03.065 Chen CS, Wang T, Kou YZ (2013) Improvement of trace-driven I-Cache timing attack on the RSA algorithm. J Syst Software 86(1):100–107. https://doi.org/10.1016/j.jss.2012.07.020 FridrichJSymmetric ciphers based on two-dimensional chaotic mapsInt J Bifurcation and Chaos1998812591284166378210.1142/S021812749800098X DaemenJRijmenVThe design of rijndael: AES - The advanced encryption standard2002Berlin, GermanySpringer Science & Business Media10.1007/978-3-662-04722-4 Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58. https://doi.org/10.1016/j.sigpro.2019.02.016 Choi US, Cho SJ, Kim JG, Kang SW, Kim HD (2020) Color image encryption based on programmable complemented maximum length cellular automata and generalized 3-D chaotic cat map. Multimedia Tools App. https://doi.org/10.1007/s11042-020-09033-y GhadirlHMNodehiAEnayatifarRAn overview of encryption algorithms in color imagesSignal Process201916416318510.1016/j.sigpro.2019.06.010 Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Laser Eng 71(8):33–41. https://doi.org/10.1016/j.optlaseng.2015.03.007 Aboughalia RA, Alkishriwo OAS (2018) Color Image Encryption Based on Chaotic Block Permutation and XOR Operation. in:Libyan Intern Conf Electric Eng Technol (LICEET2018) Tripoli - Libya. Liao X, Li K, Zhu X, Liu KJR (2020) Robust Detection of Image Operator Chain with Two-stream Convolutional Neural Network. IEEE J Select Topics Signal Process 14(5):955–968. https://doi.org/10.1109/JSTSP.2020.3002391 Hua Z, Yi S, Zhou Y (2018b) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144 Cattell K, Muzio J (1996) Synthesis of one-dimensional linear hybrid cellular automata. IEEE Trans Comput-Aided Design Integr Circuits Syst 15(3):325–335. https://doi.org/10.1109/43.489103 Zhu C, Sun K (2018) Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps. IEEE Access 6:18759 – 18770. https://doi.org/10.1109/ACCESS.2018.2817600 J Daemen (11424_CR13) 2002 11424_CR20 11424_CR21 11424_CR40 S Bilan (11424_CR4) 2018 11424_CR24 11424_CR25 11424_CR22 11424_CR23 11424_CR28 11424_CR29 11424_CR26 11424_CR27 11424_CR8 W Zhang (11424_CR36) 2015; 338 11424_CR9 HM Ghadirl (11424_CR18) 2019; 164 J Fridrich (11424_CR16) 1998; 8 Y Wang (11424_CR34) 2018; 275 A Belazi (11424_CR3) 2016; 128 11424_CR31 11424_CR10 11424_CR32 11424_CR30 11424_CR2 11424_CR35 11424_CR14 11424_CR11 11424_CR1 11424_CR12 11424_CR6 11424_CR17 11424_CR39 11424_CR7 11424_CR15 11424_CR37 11424_CR5 S Guan (11424_CR19) 2004; 23 11424_CR38 Z Tang (11424_CR33) 2015; 74 |
| References_xml | – reference: FridrichJSymmetric ciphers based on two-dimensional chaotic mapsInt J Bifurcation and Chaos1998812591284166378210.1142/S021812749800098X – reference: Hua Z, Jin F, Xu B, Huang H (2018a) 2D Logistic-Sine-coupling map for image encryption. Signal Process 149:148–161. https://doi.org/10.1016/j.sigpro.2018.03.010 – reference: Kohli R, Kumar M (2013) FPGA implementation of cryptographic algorithms using multi-encryption technique. Int J Adv Res Comput Sci Softw Eng 3(5) – reference: DaemenJRijmenVThe design of rijndael: AES - The advanced encryption standard2002Berlin, GermanySpringer Science & Business Media10.1007/978-3-662-04722-4 – reference: Jha DP, Kohli R, Gupta A (2016) Proposed encryption algorithm for data security using matrix properties. 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Greater Noida India. https://doi.org/10.1109/ICICCS.2016.7542316 – reference: Somaraj S, Ali Hussain M (2014) Securing Medical Images by Image Encryption using Key Image. Intern J Comp App 104(3):30–34. https://doi.org/10.1016/j.jss.2012.07.020 – reference: Koppu S, Viswanatham VM (2017) A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform Modelling and Simulation in Engineering. Model Simulation Eng 1–12. https://doi.org/10.1155/2017/7470204 – reference: Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58. https://doi.org/10.1016/j.sigpro.2019.02.016 – reference: Huang L, Cai S, Xiong X, Xiao M (2019) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt Laser Eng 115:7–20. https://doi.org/10.1016/j.optlaseng.2018.11.015 – reference: TangZZhangXLanWEfficient image encryption with block shuffling and chaotic mapMultimedia Tools and Applications2015745429544810.1007/s11042-014-1861-1 – reference: ZhangWYuHZhuZColor image encryption based on paired interpermuting planesOPT COMMU201533819920810.1016/j.optcom.2014.10.044 – reference: Hua Z, Yi S, Zhou Y (2018b) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144 – reference: Essaid M, Akharraz I, Saaidi A, Mouhib A (2018) A New Image Encryption Scheme Based on Confusion-Diffusion Using an Enhanced Skew Tent Map. Procedia Comp Sci 127:539–548. https://doi.org/10.1016/j.procs.2018.01.153 – reference: Zhang Z, Zhao Z (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn 75:319–330. https://doi.org/10.1007/s11071-013-1068-4 – reference: GhadirlHMNodehiAEnayatifarRAn overview of encryption algorithms in color imagesSignal Process201916416318510.1016/j.sigpro.2019.06.010 – reference: Chen CS, Wang T, Kou YZ (2013) Improvement of trace-driven I-Cache timing attack on the RSA algorithm. J Syst Software 86(1):100–107. https://doi.org/10.1016/j.jss.2012.07.020 – reference: BelaziAAbd El-LatifAABelghithSA novel image encryption scheme based on substitution-permutation network and chaosSignal Process201612815517010.1016/j.sigpro.2016.03.021 – reference: Cho SJ, Choi US, Kim HD, Hwang YH, Kim JG, Heo SH (2007) New synthesis of one-dimensional 90/150 linear hybrid group cellular automata. IEEE Trans Comput-Aided Design Integr Circuits Syst 26(9):1720–1724. https://doi.org/10.1109/TCAD.2007.895784 – reference: Gao S, Liao X, Liu X (2019) Real-time detecting one specific tampering operation in multiple operator chains. J Real-Time Image Process 16:741–750. https://doi.org/10.1007/s11554-019-00860-3 – reference: Aboughalia RA, Alkishriwo OAS (2018) Color Image Encryption Based on Chaotic Block Permutation and XOR Operation. in:Libyan Intern Conf Electric Eng Technol (LICEET2018) Tripoli - Libya. – reference: Zhang Y (2019) A Fast Image Encryption Algorithm Based on Convolution Operation. IETE J Res 65(1):4–18. https://doi.org/10.1080/03772063.2017.1400406 – reference: Das AK, Chaudhuri PP (1993) Vector Space Theoretic Analysis of Additive Cellular Automata and Its Application for Pseudoexhaustive Test Pattern Generation. IEEE Trans Comput 42:340–352. https://doi.org/10.1109/12.2101767 – reference: BilanSFormation Methods, Models, and Hardware Implementation of Pseudorandom Number Generaters2018Hershey PA, USAIGI Global10.4018/978-1-5225-2773-2 – reference: Choi US, Cho SJ, Kim JG, Kang SW, Kim HD, Kim ST (2019) Color Image Encryption Based on PC-MLCA and 3-D Chaotic Cat Map. in:Proceedings of the 4th IEEE Intern Conf Comp Commun Syst(ICCCS), Singapore Singapore. https://doi.org/10.1109/20CCOMS.2019.8821691 – reference: Nandi S, Chakraborty S, Roy S, Karaa WBA, Nath S, Dey N (2014) 1-D Group Cellular Automata Based Image Encryption Technique. in: Proceedings of the 2014 IEEE Intern Conf Control, Instrument, Commun, Computation Technol (ICCICCT). Kanyakumari India. https://doi.org/10.1109/ICCICCT.2014.6993017 – reference: Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62. https://doi.org/10.1016/j.sigpro.2018.09.029 – reference: GuanSTanSKPseudorandom Number Generation With Self-Programmable Cellular AutomataIEEE Trans Comput-Aided Design Integr Circuits Syst20042371095110110.1109/TCAD.2004.829808 – reference: Zhu C, Sun K (2018) Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps. IEEE Access 6:18759 – 18770. https://doi.org/10.1109/ACCESS.2018.2817600 – reference: Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Laser Eng 71(8):33–41. https://doi.org/10.1016/j.optlaseng.2015.03.007 – reference: Patro KAK, Acharya B (2018) Secure multi-level permutation operation based multiple colour image encryption. J Inform Sec App 40:111-133. https://doi.org/10.1016/j.jisa.2018.03.006 – reference: Choi US, Cho SJ, Kim JG, Kang SW, Kim HD (2020) Color image encryption based on programmable complemented maximum length cellular automata and generalized 3-D chaotic cat map. Multimedia Tools App. https://doi.org/10.1007/s11042-020-09033-y – reference: Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133–145. https://doi.org/10.1016/j.sigpro.2018.01.026 – reference: Chen G, Mao YM, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. IEEE Trans Comput-Aided Design Integr Circuits Syst 21(2):749–761. https://doi.org/10.1016/j.chaos.2003.12.022 – reference: WangYZhaoYZhouQLinZImage encryption using partitioned cellular automataNeurocomputing201827511318133210.1016/j.neucom.2017.09.068 – reference: Hasheminejad A, Rostami MJ (2019) A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Optik 184:205–213. https://doi.org/10.1016/j.ijleo.2019.03.065 – reference: Zhang S, Luo H (2012) The Research of Image Encryption Algorithm Based on Chaos Cellular Automata. J Multimedia 7(1):66–73. https://doi.org/10.4304/jmm.7.1.66-73 – reference: Cattell K, Muzio J (1996) Synthesis of one-dimensional linear hybrid cellular automata. IEEE Trans Comput-Aided Design Integr Circuits Syst 15(3):325–335. https://doi.org/10.1109/43.489103 – reference: Liao X, Li K, Zhu X, Liu KJR (2020) Robust Detection of Image Operator Chain with Two-stream Convolutional Neural Network. IEEE J Select Topics Signal Process 14(5):955–968. https://doi.org/10.1109/JSTSP.2020.3002391 – reference: Jeong HS, Park KC, Cho SJ, Kim ST (2018) Color medical image encryption using two-dimensional chaotic map and C-MLCA. in:Proceedings of the 10th International Conference on Ubiquitous and Future Networks (ICUFN), Prague Czech Republic. https://doi.org/10.1109/ICUFN.2018.8437025 – reference: Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology. J Select Areas Telecom (JSAT) 31–38 – ident: 11424_CR6 doi: 10.1109/43.489103 – volume: 128 start-page: 155 year: 2016 ident: 11424_CR3 publication-title: Signal Process doi: 10.1016/j.sigpro.2016.03.021 – ident: 11424_CR27 doi: 10.1155/2017/7470204 – volume-title: Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generaters year: 2018 ident: 11424_CR4 doi: 10.4018/978-1-5225-2773-2 – ident: 11424_CR9 doi: 10.1109/TCAD.2007.895784 – ident: 11424_CR22 doi: 10.1016/j.sigpro.2018.03.010 – ident: 11424_CR10 doi: 10.1109/20CCOMS.2019.8821691 – ident: 11424_CR20 doi: 10.1016/j.ijleo.2019.03.065 – ident: 11424_CR28 doi: 10.1016/j.sigpro.2018.01.026 – ident: 11424_CR29 doi: 10.1109/JSTSP.2020.3002391 – ident: 11424_CR26 – ident: 11424_CR21 doi: 10.1016/j.optlaseng.2018.11.015 – ident: 11424_CR14 doi: 10.1016/j.optlaseng.2015.03.007 – ident: 11424_CR11 doi: 10.1007/s11042-020-09033-y – ident: 11424_CR32 doi: 10.1016/j.jss.2012.07.020 – ident: 11424_CR39 doi: 10.1007/s11071-013-1068-4 – ident: 11424_CR12 doi: 10.1109/12.2101767 – volume: 74 start-page: 5429 year: 2015 ident: 11424_CR33 publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-014-1861-1 – ident: 11424_CR35 – ident: 11424_CR37 doi: 10.1080/03772063.2017.1400406 – volume: 23 start-page: 1095 issue: 7 year: 2004 ident: 11424_CR19 publication-title: IEEE Trans Comput-Aided Design Integr Circuits Syst doi: 10.1109/TCAD.2004.829808 – ident: 11424_CR38 doi: 10.4304/jmm.7.1.66-73 – ident: 11424_CR17 doi: 10.1007/s11554-019-00860-3 – ident: 11424_CR23 doi: 10.1016/j.sigpro.2017.10.004 – volume-title: The design of rijndael: AES - The advanced encryption standard year: 2002 ident: 11424_CR13 doi: 10.1007/978-3-662-04722-4 – ident: 11424_CR40 doi: 10.1109/ACCESS.2018.2817600 – ident: 11424_CR7 doi: 10.1016/j.chaos.2003.12.022 – volume: 8 start-page: 1259 year: 1998 ident: 11424_CR16 publication-title: Int J Bifurcation and Chaos doi: 10.1142/S021812749800098X – ident: 11424_CR2 doi: 10.1016/j.sigpro.2019.02.016 – ident: 11424_CR30 doi: 10.1109/ICCICCT.2014.6993017 – ident: 11424_CR1 – volume: 338 start-page: 199 year: 2015 ident: 11424_CR36 publication-title: OPT COMMU doi: 10.1016/j.optcom.2014.10.044 – ident: 11424_CR24 doi: 10.1109/ICUFN.2018.8437025 – ident: 11424_CR31 doi: 10.1016/j.jisa.2018.03.006 – volume: 275 start-page: 1318 issue: 1 year: 2018 ident: 11424_CR34 publication-title: Neurocomputing doi: 10.1016/j.neucom.2017.09.068 – ident: 11424_CR15 doi: 10.1016/j.procs.2018.01.153 – ident: 11424_CR5 doi: 10.1016/j.sigpro.2018.09.029 – ident: 11424_CR8 doi: 10.1016/j.jss.2012.07.020 – volume: 164 start-page: 163 year: 2019 ident: 11424_CR18 publication-title: Signal Process doi: 10.1016/j.sigpro.2019.06.010 – ident: 11424_CR25 doi: 10.1109/ICICCS.2016.7542316 |
| SSID | ssj0016524 |
| Score | 2.3650775 |
| Snippet | Cellular Automata (CA) can be implemented by hardware and processed in parallel unlike the conventional algorithm based on chaotic function. In this paper, we... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1209 |
| SubjectTerms | Algorithms Cellular automata Color imagery Computer Communication Networks Computer Science Data Structures and Information Theory Encryption Multimedia Information Systems Pixels Special Purpose and Application-Based Systems Substitutes |
| SummonAdditionalLinks | – databaseName: SpringerLINK - Czech Republic Consortium dbid: AGYKE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8JAEJ4oXPQgihpRND140MgSts9tPBECEhXjARI8NbvtVglQDJSD_hp_i7_M3bKlStSEQy_dR9rZx8zszvcNwDkRg-oEgYu40FUSkuMiEjKCQir9i8A1GJV4586D3e6Zt32rr0BhszTaPb2STHbqDOyGJZREhhRI_KeJyCbkE76tHOTrN093zeXtgW2pZLakhoRGxAos83svPxVSZmWuXIwm-qZVgF76pYswk2F1HrOq_75C4rjur-zCjjJAtfpixuzBBo-KUEiTO2hqrRdh-xtT4T5ct-gs1gZjsftoonz6luw0Gh09T6aD-GWsSW0YaOLVRVT5_BiLZ3iJHhud-0b9ALqtZrfRRirvAvLFgoyR5Tg1bvsmM3Thaoc-0QOdujYzOCPEsAOp0nEYuIFP7RpxmWHqDsMUC2sudIVjewi5aBLxI9CYxUOH0xpmBhNNhHPHiMMMTHWDU8z0EuBU9p6vOMllaoyRl7EpS1F5QlReIiqPlOBq2eZ1wcjxb-1yOqSeWp0zT7cl0ZzwzcwSVNIRyor_7u14veonsKVLtERyYlOGXDyd81Nhw8TsTE3ZL4_s41Y priority: 102 providerName: Springer Nature |
| Title | Fast image encryption algorithm based on (n, m, k)-PCMLCA |
| URI | https://link.springer.com/article/10.1007/s11042-021-11424-8 https://www.proquest.com/docview/2621425504 |
| Volume | 81 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1573-7721 dateEnd: 20241105 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: ADMLS dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1573-7721 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: AFBBN dateStart: 19970101 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1573-7721 dateEnd: 20221231 omitProxy: true ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: BENPR dateStart: 20220101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1573-7721 dateEnd: 20241105 omitProxy: true ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: 8FG dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1573-7721 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1573-7721 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NT9swFH-C9sIOjAHTukHlww4galE7aeIcJlSqtoiPqkJFglNkx842QQuD7LD_fu-lTgtIcLVjS3m234eff78H8F3hosbWJtyhrSJITsJVbhTPNcUXNgmMJrzzxSg6uQpPrzvXKzCqsDD0rLLSiaWitvcZ3ZEfyojIwdCfDo8e_nCqGkXZ1aqEhvalFeyPkmJsFeqSmLFqUD_uj8aXi7xC1PFlblWbo60UHkYzB9MJgqrQkwXCl4ZcvTRVS__zVcq0tESDDVj3LiTrztf8E6y42SZ8rMozMH9aN-HDM67BLUgG-qlgv6eoPxj2P_4rdQXTdz_xL4tfU0b2zDJs2pu12LTFbvf5uHdx3utuw2TQn_ROuK-bwDM8UAXvxHHbRVloAomhcp4paaVOIhM4o1QQWTLJIreJzXTUVokJQhkboQV6Y3mCgelnqM3uZ-4LMNNxeex0W5jA4BAMzoyKTSC0DJwWRjZAVBJKM88pTqUt7tIlGzJJNUWppqVUU9WAg8WYhzmjxrtf71SCT_3pekqXe6EBrWoxlt1vz_b1_dm-wZokdEN5w7IDteLxr9tFn6MwTVhVg2ET6t3hzVm_6bcVtl7J7n-WRtDh |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NbxMxEB1V7QE4FCigphTwASQQsRrb-2EfKlTSRilNogoFqTfLXnvbqk36kUWoP47_xnjjbaASvfW6XvvwPDtvZu03A_Be4qbmzinqkauCJEdRWVpJSxPyC6eENUHvPBxl_R_Jt6P0aAl-N1qYcK2y8Ym1o3YXRfhHvsWzUBwM4-nky-UVDV2jwulq00LDxNYKbrsuMRaFHQf-5hemcLPt_V3c7w-c9_bG3T6NXQZogeZX0TTPOz4rEis4JpZlIbnjRmVWeCulyFwgMFY65QqTdaSyIuG5ZYZh7FKqNNQ9QAZYSUSiMPdb-bo3Ovx-e4yRpbGrruxQpGYWVTtz7R4LyphwQyLIWRMq_2XGRbh754S2Jr7eM1iNESvZmZvYc1jy0zV42nSDINE5rMGTv0obvgDVM7OKnE7QXREcv76pXRMx58cIanUyIYE-HcFHH6dtMmmTs0_0sDscdHdewvghAHwFy9OLqV8HYlNf5t50mBUWp2AuaGVuBTNceMMsbwFrENJFLGEeOmmc60Xx5YCqRlR1jaqWLfh8O-dyXsDj3rc3G-B1_JhnemF6LWg3m7EY_v9qG_ev9g4e9cfDgR7sjw5ew2MehBX1z51NWK6uf_o3GO5U9m00KgL6gc34DwV8CSk |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1JT9wwFH5CVELtgbK0Ylh9KBKIsRg7m3NACA2kUBZxoBI3y44dQDDDMqkqfhr_jvcyCQOVyo1rHPvw_OUtsb_vAfxQuKmJcyn3GKuIkpNyVVjFC0P1hUsDa4jvfHwS7_8Of51H52Pw1HBh6Fpl4xMrR-1uc_pHviljEgfDfDrcLOprEae72fbdPacOUnTS2rTTGELk0D_-xfJtsHWwi3u9KmW2d9bd53WHAZ4j9EoeJUnHx3loA4lFZZEr6aRJYxt4q1QQOwpeonCpy03cUakNQplYYQTmLUUakeYBev9PCYm4E0k9-_lygBFHdT9d1eEYlEXN1xmy9gRxYuhuBBFZQ67exsRRovvP2WwV8rIpmKxzVbYzBNc0jPn-DHxt-kCw2i3MwJdXooazkGZmULKrHjoqhuMPj5VTYubmAk1YXvYYBU7H8NFav816bXa9zk-7x0fdnW9w9hHm-w7j_du-nwNmI18k3nSEDSxOwSrQqsQGwsjAG2FlC0RjIZ3X4uXUQ-NGj2SXyaoaraorq2rVgo2XOXdD6Y53315sDK_rz3igR6BrQbvZjNHw_1ebf3-1FZhA8Oqjg5PDBfgsiVFR_dVZhPHy4Y9fwjyntMsVohjoD0bwM6NOBsM |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fast+image+encryption+algorithm+based+on+%28n%2C+m%2C+k%29-PCMLCA&rft.jtitle=Multimedia+tools+and+applications&rft.au=Kang%2C+Sung+Won&rft.au=Choi%2C+Un+Sook&rft.au=Cho%2C+Sung+Jin&rft.date=2022-01-01&rft.pub=Springer+Nature+B.V&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=81&rft.issue=1&rft.spage=1209&rft.epage=1235&rft_id=info:doi/10.1007%2Fs11042-021-11424-8&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon |