Fast image encryption algorithm based on (n, m, k)-PCMLCA

Cellular Automata (CA) can be implemented by hardware and processed in parallel unlike the conventional algorithm based on chaotic function. In this paper, we propose a fast encryption algorithm for color image using ( n ,  m ,  k )-programmable complemented maximum length CA(( n ,  m ,  k )-PCMLCA)...

Full description

Saved in:
Bibliographic Details
Published inMultimedia tools and applications Vol. 81; no. 1; pp. 1209 - 1235
Main Authors Kang, Sung Won, Choi, Un Sook, Cho, Sung Jin
Format Journal Article
LanguageEnglish
Published New York Springer US 01.01.2022
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1380-7501
1573-7721
DOI10.1007/s11042-021-11424-8

Cover

Abstract Cellular Automata (CA) can be implemented by hardware and processed in parallel unlike the conventional algorithm based on chaotic function. In this paper, we propose a fast encryption algorithm for color image using ( n ,  m ,  k )-programmable complemented maximum length CA(( n ,  m ,  k )-PCMLCA). This algorithm improves the speed of shuffling pixel positions in the color image encryption system. The encryption process of the proposed image encryption system consists of a substitution step and a shuffling step. In the substitution step, we design the ( n ,  m ,  k )-PCMLCA which can generate nonlinear sequences whose lengths are longer than the lengths of sequences generated by complemented maximum length CA (C-MLCA), and use it as the key sequence generator. In the shuffling step, we improve the encryption/decryption speed by raising the domain processing the image to the row/column level rather than the pixel unit and processing the block unit using 1-D MLCA. With the advantage of these CA, we can improve the speed of encryption/decryption.
AbstractList Cellular Automata (CA) can be implemented by hardware and processed in parallel unlike the conventional algorithm based on chaotic function. In this paper, we propose a fast encryption algorithm for color image using (n, m, k)-programmable complemented maximum length CA((n, m, k)-PCMLCA). This algorithm improves the speed of shuffling pixel positions in the color image encryption system. The encryption process of the proposed image encryption system consists of a substitution step and a shuffling step. In the substitution step, we design the (n, m, k)-PCMLCA which can generate nonlinear sequences whose lengths are longer than the lengths of sequences generated by complemented maximum length CA (C-MLCA), and use it as the key sequence generator. In the shuffling step, we improve the encryption/decryption speed by raising the domain processing the image to the row/column level rather than the pixel unit and processing the block unit using 1-D MLCA. With the advantage of these CA, we can improve the speed of encryption/decryption.
Cellular Automata (CA) can be implemented by hardware and processed in parallel unlike the conventional algorithm based on chaotic function. In this paper, we propose a fast encryption algorithm for color image using ( n ,  m ,  k )-programmable complemented maximum length CA(( n ,  m ,  k )-PCMLCA). This algorithm improves the speed of shuffling pixel positions in the color image encryption system. The encryption process of the proposed image encryption system consists of a substitution step and a shuffling step. In the substitution step, we design the ( n ,  m ,  k )-PCMLCA which can generate nonlinear sequences whose lengths are longer than the lengths of sequences generated by complemented maximum length CA (C-MLCA), and use it as the key sequence generator. In the shuffling step, we improve the encryption/decryption speed by raising the domain processing the image to the row/column level rather than the pixel unit and processing the block unit using 1-D MLCA. With the advantage of these CA, we can improve the speed of encryption/decryption.
Author Kang, Sung Won
Choi, Un Sook
Cho, Sung Jin
Author_xml – sequence: 1
  givenname: Sung Won
  surname: Kang
  fullname: Kang, Sung Won
  organization: Department of Information Security, Pukyong National University
– sequence: 2
  givenname: Un Sook
  orcidid: 0000-0002-5727-7903
  surname: Choi
  fullname: Choi, Un Sook
  email: choies@tu.ac.kr
  organization: Department of Information and Communications and Software Engineering, Tongmyong University
– sequence: 3
  givenname: Sung Jin
  surname: Cho
  fullname: Cho, Sung Jin
  organization: Department of Applied Mathematics, Pukyong National University
BookMark eNp9kMFKAzEQhoNUsK2-gKcFLwpGM0k2yeKpLFaFih56D9ndbN3aZmuyPfRtfBafzNQVBA89hAnh_2Yy3wgNXOssQudAboAQeRsACKeYUMAAnHKsjtAQUsmwlBQG8c4UwTIlcIJGISwJAZFSPkR3UxO6pFmbhU2sK_1u0zWtS8xq0fqme1snhQm2SuLTpbv--lzH836FX_PnWT45Rce1WQV79lvHaD69n-ePePby8JRPZrhkkHU4lZJYUfKCUVuwulS0oiYTBbOFUkxUQgCHusqq0giisoJxKgswQBSrs5SyMbro2258-7G1odPLdutdnKipoHHbNCU8plSfKn0bgre1LpvO7JfpvGlWGojem9K9KR1N6R9TWkWU_kM3Phrxu8MQ66EQw25h_d-vDlDfksl7eQ
CitedBy_id crossref_primary_10_1007_s11042_023_15458_y
crossref_primary_10_1142_S021812742350061X
crossref_primary_10_1007_s11042_022_14093_3
crossref_primary_10_4108_eetiot_v9i2_2193
crossref_primary_10_1007_s11554_023_01289_5
crossref_primary_10_1007_s12204_023_2676_x
crossref_primary_10_1007_s12596_023_01104_1
crossref_primary_10_1007_s11071_024_09870_8
crossref_primary_10_1145_3614433
crossref_primary_10_1080_03772063_2023_2284956
crossref_primary_10_1007_s11071_025_10884_z
crossref_primary_10_1007_s00371_023_02876_0
crossref_primary_10_3390_math11102396
crossref_primary_10_1371_journal_pone_0310279
Cites_doi 10.1109/43.489103
10.1016/j.sigpro.2016.03.021
10.1155/2017/7470204
10.4018/978-1-5225-2773-2
10.1109/TCAD.2007.895784
10.1016/j.sigpro.2018.03.010
10.1109/20CCOMS.2019.8821691
10.1016/j.ijleo.2019.03.065
10.1016/j.sigpro.2018.01.026
10.1109/JSTSP.2020.3002391
10.1016/j.optlaseng.2018.11.015
10.1016/j.optlaseng.2015.03.007
10.1007/s11042-020-09033-y
10.1016/j.jss.2012.07.020
10.1007/s11071-013-1068-4
10.1109/12.2101767
10.1007/s11042-014-1861-1
10.1080/03772063.2017.1400406
10.1109/TCAD.2004.829808
10.4304/jmm.7.1.66-73
10.1007/s11554-019-00860-3
10.1016/j.sigpro.2017.10.004
10.1007/978-3-662-04722-4
10.1109/ACCESS.2018.2817600
10.1016/j.chaos.2003.12.022
10.1142/S021812749800098X
10.1016/j.sigpro.2019.02.016
10.1109/ICCICCT.2014.6993017
10.1016/j.optcom.2014.10.044
10.1109/ICUFN.2018.8437025
10.1016/j.jisa.2018.03.006
10.1016/j.neucom.2017.09.068
10.1016/j.procs.2018.01.153
10.1016/j.sigpro.2018.09.029
10.1016/j.sigpro.2019.06.010
10.1109/ICICCS.2016.7542316
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M2O
MBDVC
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
Q9U
DOI 10.1007/s11042-021-11424-8
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
Research Library
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Central
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
ProQuest Research library
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList ABI/INFORM Global (Corporate)

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1573-7721
EndPage 1235
ExternalDocumentID 10_1007_s11042_021_11424_8
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3EH
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
8AO
8FE
8FG
8FL
8G5
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GUQSH
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M2O
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TH9
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PUEGO
7SC
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
MBDVC
PKEHL
PQEST
PQUKI
Q9U
ID FETCH-LOGICAL-c319t-5770e6c4b32eb3fc82d2a96b3eb8836d66141fd9dca6089b3427b1a1083f9523
IEDL.DBID BENPR
ISSN 1380-7501
IngestDate Sat Jul 26 00:10:44 EDT 2025
Thu Apr 24 23:06:39 EDT 2025
Wed Oct 01 04:51:16 EDT 2025
Fri Feb 21 02:46:24 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Cellular automata
Programmable complemented MLCA
Fast image encryption
Image shuffling
PRNG
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-5770e6c4b32eb3fc82d2a96b3eb8836d66141fd9dca6089b3427b1a1083f9523
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-5727-7903
PQID 2621425504
PQPubID 54626
PageCount 27
ParticipantIDs proquest_journals_2621425504
crossref_citationtrail_10_1007_s11042_021_11424_8
crossref_primary_10_1007_s11042_021_11424_8
springer_journals_10_1007_s11042_021_11424_8
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20220100
2022-01-00
20220101
PublicationDateYYYYMMDD 2022-01-01
PublicationDate_xml – month: 1
  year: 2022
  text: 20220100
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Multimedia tools and applications
PublicationTitleAbbrev Multimed Tools Appl
PublicationYear 2022
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133–145. https://doi.org/10.1016/j.sigpro.2018.01.026
Somaraj S, Ali Hussain M (2014) Securing Medical Images by Image Encryption using Key Image. Intern J Comp App 104(3):30–34. https://doi.org/10.1016/j.jss.2012.07.020
Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62. https://doi.org/10.1016/j.sigpro.2018.09.029
Chen G, Mao YM, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. IEEE Trans Comput-Aided Design Integr Circuits Syst 21(2):749–761. https://doi.org/10.1016/j.chaos.2003.12.022
Koppu S, Viswanatham VM (2017) A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform Modelling and Simulation in Engineering. Model Simulation Eng 1–12. https://doi.org/10.1155/2017/7470204
Jha DP, Kohli R, Gupta A (2016) Proposed encryption algorithm for data security using matrix properties. 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Greater Noida India. https://doi.org/10.1109/ICICCS.2016.7542316
Cho SJ, Choi US, Kim HD, Hwang YH, Kim JG, Heo SH (2007) New synthesis of one-dimensional 90/150 linear hybrid group cellular automata. IEEE Trans Comput-Aided Design Integr Circuits Syst 26(9):1720–1724. https://doi.org/10.1109/TCAD.2007.895784
Das AK, Chaudhuri PP (1993) Vector Space Theoretic Analysis of Additive Cellular Automata and Its Application for Pseudoexhaustive Test Pattern Generation. IEEE Trans Comput 42:340–352. https://doi.org/10.1109/12.2101767
Essaid M, Akharraz I, Saaidi A, Mouhib A (2018) A New Image Encryption Scheme Based on Confusion-Diffusion Using an Enhanced Skew Tent Map. Procedia Comp Sci 127:539–548. https://doi.org/10.1016/j.procs.2018.01.153
Huang L, Cai S, Xiong X, Xiao M (2019) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt Laser Eng 115:7–20. https://doi.org/10.1016/j.optlaseng.2018.11.015
Jeong HS, Park KC, Cho SJ, Kim ST (2018) Color medical image encryption using two-dimensional chaotic map and C-MLCA. in:Proceedings of the 10th International Conference on Ubiquitous and Future Networks (ICUFN), Prague Czech Republic. https://doi.org/10.1109/ICUFN.2018.8437025
BelaziAAbd El-LatifAABelghithSA novel image encryption scheme based on substitution-permutation network and chaosSignal Process201612815517010.1016/j.sigpro.2016.03.021
Hua Z, Jin F, Xu B, Huang H (2018a) 2D Logistic-Sine-coupling map for image encryption. Signal Process 149:148–161. https://doi.org/10.1016/j.sigpro.2018.03.010
TangZZhangXLanWEfficient image encryption with block shuffling and chaotic mapMultimedia Tools and Applications2015745429544810.1007/s11042-014-1861-1
Nandi S, Chakraborty S, Roy S, Karaa WBA, Nath S, Dey N (2014) 1-D Group Cellular Automata Based Image Encryption Technique. in: Proceedings of the 2014 IEEE Intern Conf Control, Instrument, Commun, Computation Technol (ICCICCT). Kanyakumari India. https://doi.org/10.1109/ICCICCT.2014.6993017
Zhang Y (2019) A Fast Image Encryption Algorithm Based on Convolution Operation. IETE J Res 65(1):4–18. https://doi.org/10.1080/03772063.2017.1400406
Kohli R, Kumar M (2013) FPGA implementation of cryptographic algorithms using multi-encryption technique. Int J Adv Res Comput Sci Softw Eng 3(5)
Zhang S, Luo H (2012) The Research of Image Encryption Algorithm Based on Chaos Cellular Automata. J Multimedia 7(1):66–73. https://doi.org/10.4304/jmm.7.1.66-73
Gao S, Liao X, Liu X (2019) Real-time detecting one specific tampering operation in multiple operator chains. J Real-Time Image Process 16:741–750. https://doi.org/10.1007/s11554-019-00860-3
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology. J Select Areas Telecom (JSAT) 31–38
BilanSFormation Methods, Models, and Hardware Implementation of Pseudorandom Number Generaters2018Hershey PA, USAIGI Global10.4018/978-1-5225-2773-2
Choi US, Cho SJ, Kim JG, Kang SW, Kim HD, Kim ST (2019) Color Image Encryption Based on PC-MLCA and 3-D Chaotic Cat Map. in:Proceedings of the 4th IEEE Intern Conf Comp Commun Syst(ICCCS), Singapore Singapore. https://doi.org/10.1109/20CCOMS.2019.8821691
Patro KAK, Acharya B (2018) Secure multi-level permutation operation based multiple colour image encryption. J Inform Sec App 40:111-133. https://doi.org/10.1016/j.jisa.2018.03.006
Zhang Z, Zhao Z (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn 75:319–330. https://doi.org/10.1007/s11071-013-1068-4
WangYZhaoYZhouQLinZImage encryption using partitioned cellular automataNeurocomputing201827511318133210.1016/j.neucom.2017.09.068
ZhangWYuHZhuZColor image encryption based on paired interpermuting planesOPT COMMU201533819920810.1016/j.optcom.2014.10.044
GuanSTanSKPseudorandom Number Generation With Self-Programmable Cellular AutomataIEEE Trans Comput-Aided Design Integr Circuits Syst20042371095110110.1109/TCAD.2004.829808
Hasheminejad A, Rostami MJ (2019) A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Optik 184:205–213. https://doi.org/10.1016/j.ijleo.2019.03.065
Chen CS, Wang T, Kou YZ (2013) Improvement of trace-driven I-Cache timing attack on the RSA algorithm. J Syst Software 86(1):100–107. https://doi.org/10.1016/j.jss.2012.07.020
FridrichJSymmetric ciphers based on two-dimensional chaotic mapsInt J Bifurcation and Chaos1998812591284166378210.1142/S021812749800098X
DaemenJRijmenVThe design of rijndael: AES - The advanced encryption standard2002Berlin, GermanySpringer Science & Business Media10.1007/978-3-662-04722-4
Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58. https://doi.org/10.1016/j.sigpro.2019.02.016
Choi US, Cho SJ, Kim JG, Kang SW, Kim HD (2020) Color image encryption based on programmable complemented maximum length cellular automata and generalized 3-D chaotic cat map. Multimedia Tools App. https://doi.org/10.1007/s11042-020-09033-y
GhadirlHMNodehiAEnayatifarRAn overview of encryption algorithms in color imagesSignal Process201916416318510.1016/j.sigpro.2019.06.010
Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Laser Eng 71(8):33–41. https://doi.org/10.1016/j.optlaseng.2015.03.007
Aboughalia RA, Alkishriwo OAS (2018) Color Image Encryption Based on Chaotic Block Permutation and XOR Operation. in:Libyan Intern Conf Electric Eng Technol (LICEET2018) Tripoli - Libya.
Liao X, Li K, Zhu X, Liu KJR (2020) Robust Detection of Image Operator Chain with Two-stream Convolutional Neural Network. IEEE J Select Topics Signal Process 14(5):955–968. https://doi.org/10.1109/JSTSP.2020.3002391
Hua Z, Yi S, Zhou Y (2018b) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144
Cattell K, Muzio J (1996) Synthesis of one-dimensional linear hybrid cellular automata. IEEE Trans Comput-Aided Design Integr Circuits Syst 15(3):325–335. https://doi.org/10.1109/43.489103
Zhu C, Sun K (2018) Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps. IEEE Access 6:18759 – 18770. https://doi.org/10.1109/ACCESS.2018.2817600
J Daemen (11424_CR13) 2002
11424_CR20
11424_CR21
11424_CR40
S Bilan (11424_CR4) 2018
11424_CR24
11424_CR25
11424_CR22
11424_CR23
11424_CR28
11424_CR29
11424_CR26
11424_CR27
11424_CR8
W Zhang (11424_CR36) 2015; 338
11424_CR9
HM Ghadirl (11424_CR18) 2019; 164
J Fridrich (11424_CR16) 1998; 8
Y Wang (11424_CR34) 2018; 275
A Belazi (11424_CR3) 2016; 128
11424_CR31
11424_CR10
11424_CR32
11424_CR30
11424_CR2
11424_CR35
11424_CR14
11424_CR11
11424_CR1
11424_CR12
11424_CR6
11424_CR17
11424_CR39
11424_CR7
11424_CR15
11424_CR37
11424_CR5
S Guan (11424_CR19) 2004; 23
11424_CR38
Z Tang (11424_CR33) 2015; 74
References_xml – reference: FridrichJSymmetric ciphers based on two-dimensional chaotic mapsInt J Bifurcation and Chaos1998812591284166378210.1142/S021812749800098X
– reference: Hua Z, Jin F, Xu B, Huang H (2018a) 2D Logistic-Sine-coupling map for image encryption. Signal Process 149:148–161. https://doi.org/10.1016/j.sigpro.2018.03.010
– reference: Kohli R, Kumar M (2013) FPGA implementation of cryptographic algorithms using multi-encryption technique. Int J Adv Res Comput Sci Softw Eng 3(5)
– reference: DaemenJRijmenVThe design of rijndael: AES - The advanced encryption standard2002Berlin, GermanySpringer Science & Business Media10.1007/978-3-662-04722-4
– reference: Jha DP, Kohli R, Gupta A (2016) Proposed encryption algorithm for data security using matrix properties. 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Greater Noida India. https://doi.org/10.1109/ICICCS.2016.7542316
– reference: Somaraj S, Ali Hussain M (2014) Securing Medical Images by Image Encryption using Key Image. Intern J Comp App 104(3):30–34. https://doi.org/10.1016/j.jss.2012.07.020
– reference: Koppu S, Viswanatham VM (2017) A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform Modelling and Simulation in Engineering. Model Simulation Eng 1–12. https://doi.org/10.1155/2017/7470204
– reference: Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58. https://doi.org/10.1016/j.sigpro.2019.02.016
– reference: Huang L, Cai S, Xiong X, Xiao M (2019) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt Laser Eng 115:7–20. https://doi.org/10.1016/j.optlaseng.2018.11.015
– reference: TangZZhangXLanWEfficient image encryption with block shuffling and chaotic mapMultimedia Tools and Applications2015745429544810.1007/s11042-014-1861-1
– reference: ZhangWYuHZhuZColor image encryption based on paired interpermuting planesOPT COMMU201533819920810.1016/j.optcom.2014.10.044
– reference: Hua Z, Yi S, Zhou Y (2018b) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144
– reference: Essaid M, Akharraz I, Saaidi A, Mouhib A (2018) A New Image Encryption Scheme Based on Confusion-Diffusion Using an Enhanced Skew Tent Map. Procedia Comp Sci 127:539–548. https://doi.org/10.1016/j.procs.2018.01.153
– reference: Zhang Z, Zhao Z (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn 75:319–330. https://doi.org/10.1007/s11071-013-1068-4
– reference: GhadirlHMNodehiAEnayatifarRAn overview of encryption algorithms in color imagesSignal Process201916416318510.1016/j.sigpro.2019.06.010
– reference: Chen CS, Wang T, Kou YZ (2013) Improvement of trace-driven I-Cache timing attack on the RSA algorithm. J Syst Software 86(1):100–107. https://doi.org/10.1016/j.jss.2012.07.020
– reference: BelaziAAbd El-LatifAABelghithSA novel image encryption scheme based on substitution-permutation network and chaosSignal Process201612815517010.1016/j.sigpro.2016.03.021
– reference: Cho SJ, Choi US, Kim HD, Hwang YH, Kim JG, Heo SH (2007) New synthesis of one-dimensional 90/150 linear hybrid group cellular automata. IEEE Trans Comput-Aided Design Integr Circuits Syst 26(9):1720–1724. https://doi.org/10.1109/TCAD.2007.895784
– reference: Gao S, Liao X, Liu X (2019) Real-time detecting one specific tampering operation in multiple operator chains. J Real-Time Image Process 16:741–750. https://doi.org/10.1007/s11554-019-00860-3
– reference: Aboughalia RA, Alkishriwo OAS (2018) Color Image Encryption Based on Chaotic Block Permutation and XOR Operation. in:Libyan Intern Conf Electric Eng Technol (LICEET2018) Tripoli - Libya.
– reference: Zhang Y (2019) A Fast Image Encryption Algorithm Based on Convolution Operation. IETE J Res 65(1):4–18. https://doi.org/10.1080/03772063.2017.1400406
– reference: Das AK, Chaudhuri PP (1993) Vector Space Theoretic Analysis of Additive Cellular Automata and Its Application for Pseudoexhaustive Test Pattern Generation. IEEE Trans Comput 42:340–352. https://doi.org/10.1109/12.2101767
– reference: BilanSFormation Methods, Models, and Hardware Implementation of Pseudorandom Number Generaters2018Hershey PA, USAIGI Global10.4018/978-1-5225-2773-2
– reference: Choi US, Cho SJ, Kim JG, Kang SW, Kim HD, Kim ST (2019) Color Image Encryption Based on PC-MLCA and 3-D Chaotic Cat Map. in:Proceedings of the 4th IEEE Intern Conf Comp Commun Syst(ICCCS), Singapore Singapore. https://doi.org/10.1109/20CCOMS.2019.8821691
– reference: Nandi S, Chakraborty S, Roy S, Karaa WBA, Nath S, Dey N (2014) 1-D Group Cellular Automata Based Image Encryption Technique. in: Proceedings of the 2014 IEEE Intern Conf Control, Instrument, Commun, Computation Technol (ICCICCT). Kanyakumari India. https://doi.org/10.1109/ICCICCT.2014.6993017
– reference: Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62. https://doi.org/10.1016/j.sigpro.2018.09.029
– reference: GuanSTanSKPseudorandom Number Generation With Self-Programmable Cellular AutomataIEEE Trans Comput-Aided Design Integr Circuits Syst20042371095110110.1109/TCAD.2004.829808
– reference: Zhu C, Sun K (2018) Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps. IEEE Access 6:18759 – 18770. https://doi.org/10.1109/ACCESS.2018.2817600
– reference: Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Laser Eng 71(8):33–41. https://doi.org/10.1016/j.optlaseng.2015.03.007
– reference: Patro KAK, Acharya B (2018) Secure multi-level permutation operation based multiple colour image encryption. J Inform Sec App 40:111-133. https://doi.org/10.1016/j.jisa.2018.03.006
– reference: Choi US, Cho SJ, Kim JG, Kang SW, Kim HD (2020) Color image encryption based on programmable complemented maximum length cellular automata and generalized 3-D chaotic cat map. Multimedia Tools App. https://doi.org/10.1007/s11042-020-09033-y
– reference: Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133–145. https://doi.org/10.1016/j.sigpro.2018.01.026
– reference: Chen G, Mao YM, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. IEEE Trans Comput-Aided Design Integr Circuits Syst 21(2):749–761. https://doi.org/10.1016/j.chaos.2003.12.022
– reference: WangYZhaoYZhouQLinZImage encryption using partitioned cellular automataNeurocomputing201827511318133210.1016/j.neucom.2017.09.068
– reference: Hasheminejad A, Rostami MJ (2019) A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Optik 184:205–213. https://doi.org/10.1016/j.ijleo.2019.03.065
– reference: Zhang S, Luo H (2012) The Research of Image Encryption Algorithm Based on Chaos Cellular Automata. J Multimedia 7(1):66–73. https://doi.org/10.4304/jmm.7.1.66-73
– reference: Cattell K, Muzio J (1996) Synthesis of one-dimensional linear hybrid cellular automata. IEEE Trans Comput-Aided Design Integr Circuits Syst 15(3):325–335. https://doi.org/10.1109/43.489103
– reference: Liao X, Li K, Zhu X, Liu KJR (2020) Robust Detection of Image Operator Chain with Two-stream Convolutional Neural Network. IEEE J Select Topics Signal Process 14(5):955–968. https://doi.org/10.1109/JSTSP.2020.3002391
– reference: Jeong HS, Park KC, Cho SJ, Kim ST (2018) Color medical image encryption using two-dimensional chaotic map and C-MLCA. in:Proceedings of the 10th International Conference on Ubiquitous and Future Networks (ICUFN), Prague Czech Republic. https://doi.org/10.1109/ICUFN.2018.8437025
– reference: Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology. J Select Areas Telecom (JSAT) 31–38
– ident: 11424_CR6
  doi: 10.1109/43.489103
– volume: 128
  start-page: 155
  year: 2016
  ident: 11424_CR3
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2016.03.021
– ident: 11424_CR27
  doi: 10.1155/2017/7470204
– volume-title: Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generaters
  year: 2018
  ident: 11424_CR4
  doi: 10.4018/978-1-5225-2773-2
– ident: 11424_CR9
  doi: 10.1109/TCAD.2007.895784
– ident: 11424_CR22
  doi: 10.1016/j.sigpro.2018.03.010
– ident: 11424_CR10
  doi: 10.1109/20CCOMS.2019.8821691
– ident: 11424_CR20
  doi: 10.1016/j.ijleo.2019.03.065
– ident: 11424_CR28
  doi: 10.1016/j.sigpro.2018.01.026
– ident: 11424_CR29
  doi: 10.1109/JSTSP.2020.3002391
– ident: 11424_CR26
– ident: 11424_CR21
  doi: 10.1016/j.optlaseng.2018.11.015
– ident: 11424_CR14
  doi: 10.1016/j.optlaseng.2015.03.007
– ident: 11424_CR11
  doi: 10.1007/s11042-020-09033-y
– ident: 11424_CR32
  doi: 10.1016/j.jss.2012.07.020
– ident: 11424_CR39
  doi: 10.1007/s11071-013-1068-4
– ident: 11424_CR12
  doi: 10.1109/12.2101767
– volume: 74
  start-page: 5429
  year: 2015
  ident: 11424_CR33
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-014-1861-1
– ident: 11424_CR35
– ident: 11424_CR37
  doi: 10.1080/03772063.2017.1400406
– volume: 23
  start-page: 1095
  issue: 7
  year: 2004
  ident: 11424_CR19
  publication-title: IEEE Trans Comput-Aided Design Integr Circuits Syst
  doi: 10.1109/TCAD.2004.829808
– ident: 11424_CR38
  doi: 10.4304/jmm.7.1.66-73
– ident: 11424_CR17
  doi: 10.1007/s11554-019-00860-3
– ident: 11424_CR23
  doi: 10.1016/j.sigpro.2017.10.004
– volume-title: The design of rijndael: AES - The advanced encryption standard
  year: 2002
  ident: 11424_CR13
  doi: 10.1007/978-3-662-04722-4
– ident: 11424_CR40
  doi: 10.1109/ACCESS.2018.2817600
– ident: 11424_CR7
  doi: 10.1016/j.chaos.2003.12.022
– volume: 8
  start-page: 1259
  year: 1998
  ident: 11424_CR16
  publication-title: Int J Bifurcation and Chaos
  doi: 10.1142/S021812749800098X
– ident: 11424_CR2
  doi: 10.1016/j.sigpro.2019.02.016
– ident: 11424_CR30
  doi: 10.1109/ICCICCT.2014.6993017
– ident: 11424_CR1
– volume: 338
  start-page: 199
  year: 2015
  ident: 11424_CR36
  publication-title: OPT COMMU
  doi: 10.1016/j.optcom.2014.10.044
– ident: 11424_CR24
  doi: 10.1109/ICUFN.2018.8437025
– ident: 11424_CR31
  doi: 10.1016/j.jisa.2018.03.006
– volume: 275
  start-page: 1318
  issue: 1
  year: 2018
  ident: 11424_CR34
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2017.09.068
– ident: 11424_CR15
  doi: 10.1016/j.procs.2018.01.153
– ident: 11424_CR5
  doi: 10.1016/j.sigpro.2018.09.029
– ident: 11424_CR8
  doi: 10.1016/j.jss.2012.07.020
– volume: 164
  start-page: 163
  year: 2019
  ident: 11424_CR18
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2019.06.010
– ident: 11424_CR25
  doi: 10.1109/ICICCS.2016.7542316
SSID ssj0016524
Score 2.3650775
Snippet Cellular Automata (CA) can be implemented by hardware and processed in parallel unlike the conventional algorithm based on chaotic function. In this paper, we...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1209
SubjectTerms Algorithms
Cellular automata
Color imagery
Computer Communication Networks
Computer Science
Data Structures and Information Theory
Encryption
Multimedia Information Systems
Pixels
Special Purpose and Application-Based Systems
Substitutes
SummonAdditionalLinks – databaseName: SpringerLINK - Czech Republic Consortium
  dbid: AGYKE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8JAEJ4oXPQgihpRND140MgSts9tPBECEhXjARI8NbvtVglQDJSD_hp_i7_M3bKlStSEQy_dR9rZx8zszvcNwDkRg-oEgYu40FUSkuMiEjKCQir9i8A1GJV4586D3e6Zt32rr0BhszTaPb2STHbqDOyGJZREhhRI_KeJyCbkE76tHOTrN093zeXtgW2pZLakhoRGxAos83svPxVSZmWuXIwm-qZVgF76pYswk2F1HrOq_75C4rjur-zCjjJAtfpixuzBBo-KUEiTO2hqrRdh-xtT4T5ct-gs1gZjsftoonz6luw0Gh09T6aD-GWsSW0YaOLVRVT5_BiLZ3iJHhud-0b9ALqtZrfRRirvAvLFgoyR5Tg1bvsmM3Thaoc-0QOdujYzOCPEsAOp0nEYuIFP7RpxmWHqDsMUC2sudIVjewi5aBLxI9CYxUOH0xpmBhNNhHPHiMMMTHWDU8z0EuBU9p6vOMllaoyRl7EpS1F5QlReIiqPlOBq2eZ1wcjxb-1yOqSeWp0zT7cl0ZzwzcwSVNIRyor_7u14veonsKVLtERyYlOGXDyd81Nhw8TsTE3ZL4_s41Y
  priority: 102
  providerName: Springer Nature
Title Fast image encryption algorithm based on (n, m, k)-PCMLCA
URI https://link.springer.com/article/10.1007/s11042-021-11424-8
https://www.proquest.com/docview/2621425504
Volume 81
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 20241105
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: ADMLS
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: AFBBN
  dateStart: 19970101
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1573-7721
  dateEnd: 20221231
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: BENPR
  dateStart: 20220101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 20241105
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: 8FG
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NT9swFH-C9sIOjAHTukHlww4galE7aeIcJlSqtoiPqkJFglNkx842QQuD7LD_fu-lTgtIcLVjS3m234eff78H8F3hosbWJtyhrSJITsJVbhTPNcUXNgmMJrzzxSg6uQpPrzvXKzCqsDD0rLLSiaWitvcZ3ZEfyojIwdCfDo8e_nCqGkXZ1aqEhvalFeyPkmJsFeqSmLFqUD_uj8aXi7xC1PFlblWbo60UHkYzB9MJgqrQkwXCl4ZcvTRVS__zVcq0tESDDVj3LiTrztf8E6y42SZ8rMozMH9aN-HDM67BLUgG-qlgv6eoPxj2P_4rdQXTdz_xL4tfU0b2zDJs2pu12LTFbvf5uHdx3utuw2TQn_ROuK-bwDM8UAXvxHHbRVloAomhcp4paaVOIhM4o1QQWTLJIreJzXTUVokJQhkboQV6Y3mCgelnqM3uZ-4LMNNxeex0W5jA4BAMzoyKTSC0DJwWRjZAVBJKM88pTqUt7tIlGzJJNUWppqVUU9WAg8WYhzmjxrtf71SCT_3pekqXe6EBrWoxlt1vz_b1_dm-wZokdEN5w7IDteLxr9tFn6MwTVhVg2ET6t3hzVm_6bcVtl7J7n-WRtDh
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NbxMxEB1V7QE4FCigphTwASQQsRrb-2EfKlTSRilNogoFqTfLXnvbqk36kUWoP47_xnjjbaASvfW6XvvwPDtvZu03A_Be4qbmzinqkauCJEdRWVpJSxPyC6eENUHvPBxl_R_Jt6P0aAl-N1qYcK2y8Ym1o3YXRfhHvsWzUBwM4-nky-UVDV2jwulq00LDxNYKbrsuMRaFHQf-5hemcLPt_V3c7w-c9_bG3T6NXQZogeZX0TTPOz4rEis4JpZlIbnjRmVWeCulyFwgMFY65QqTdaSyIuG5ZYZh7FKqNNQ9QAZYSUSiMPdb-bo3Ovx-e4yRpbGrruxQpGYWVTtz7R4LyphwQyLIWRMq_2XGRbh754S2Jr7eM1iNESvZmZvYc1jy0zV42nSDINE5rMGTv0obvgDVM7OKnE7QXREcv76pXRMx58cIanUyIYE-HcFHH6dtMmmTs0_0sDscdHdewvghAHwFy9OLqV8HYlNf5t50mBUWp2AuaGVuBTNceMMsbwFrENJFLGEeOmmc60Xx5YCqRlR1jaqWLfh8O-dyXsDj3rc3G-B1_JhnemF6LWg3m7EY_v9qG_ev9g4e9cfDgR7sjw5ew2MehBX1z51NWK6uf_o3GO5U9m00KgL6gc34DwV8CSk
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1JT9wwFH5CVELtgbK0Ylh9KBKIsRg7m3NACA2kUBZxoBI3y44dQDDDMqkqfhr_jvcyCQOVyo1rHPvw_OUtsb_vAfxQuKmJcyn3GKuIkpNyVVjFC0P1hUsDa4jvfHwS7_8Of51H52Pw1HBh6Fpl4xMrR-1uc_pHviljEgfDfDrcLOprEae72fbdPacOUnTS2rTTGELk0D_-xfJtsHWwi3u9KmW2d9bd53WHAZ4j9EoeJUnHx3loA4lFZZEr6aRJYxt4q1QQOwpeonCpy03cUakNQplYYQTmLUUakeYBev9PCYm4E0k9-_lygBFHdT9d1eEYlEXN1xmy9gRxYuhuBBFZQ67exsRRovvP2WwV8rIpmKxzVbYzBNc0jPn-DHxt-kCw2i3MwJdXooazkGZmULKrHjoqhuMPj5VTYubmAk1YXvYYBU7H8NFav816bXa9zk-7x0fdnW9w9hHm-w7j_du-nwNmI18k3nSEDSxOwSrQqsQGwsjAG2FlC0RjIZ3X4uXUQ-NGj2SXyaoaraorq2rVgo2XOXdD6Y53315sDK_rz3igR6BrQbvZjNHw_1ebf3-1FZhA8Oqjg5PDBfgsiVFR_dVZhPHy4Y9fwjyntMsVohjoD0bwM6NOBsM
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fast+image+encryption+algorithm+based+on+%28n%2C+m%2C+k%29-PCMLCA&rft.jtitle=Multimedia+tools+and+applications&rft.au=Kang%2C+Sung+Won&rft.au=Choi%2C+Un+Sook&rft.au=Cho%2C+Sung+Jin&rft.date=2022-01-01&rft.pub=Springer+Nature+B.V&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=81&rft.issue=1&rft.spage=1209&rft.epage=1235&rft_id=info:doi/10.1007%2Fs11042-021-11424-8&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon