An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations

The problem of unauthorized access to various content is an important task for the present. It becomes even more acute when using the existing toolkit for the processing and transmission of encrypted images with the fluctuation intensity function. The authors developed a modification of the RSA algo...

Full description

Saved in:
Bibliographic Details
Published inProcedia computer science Vol. 160; pp. 491 - 496
Main Authors Kovalchuk, Anatoliy, Izonin, Ivan, Gregush ml, Mihal, Lotoshynska, Natalia
Format Journal Article
LanguageEnglish
Published Elsevier B.V 2019
Subjects
Online AccessGet full text
ISSN1877-0509
1877-0509
DOI10.1016/j.procs.2019.11.059

Cover

Abstract The problem of unauthorized access to various content is an important task for the present. It becomes even more acute when using the existing toolkit for the processing and transmission of encrypted images with the fluctuation intensity function. The authors developed a modification of the RSA algorithm to use it in relation to the above-mentioned images. It is proposed a conceptual view for the joint use of quaternary fractional-linear transformations with elements of the basic RSA algorithm. The application of this mathematical apparatus in the basic RSA algorithm avoids contours of image objects in an encrypted sample. In addition, this combination provides additional stability to the basic RSA algorithm for unauthorized decryption. The simulation of the method was carried out in two described by the authors algorithms: using one line and four lines of the image matrix, for grayscale and color images. The high efficiency of the developed method for avoiding contours of objects on encrypted images has been confirmed. In both cases, contours after applying encryption procedures do not appear. The reverse procedure allows to get an image without visible distortion.
AbstractList The problem of unauthorized access to various content is an important task for the present. It becomes even more acute when using the existing toolkit for the processing and transmission of encrypted images with the fluctuation intensity function. The authors developed a modification of the RSA algorithm to use it in relation to the above-mentioned images. It is proposed a conceptual view for the joint use of quaternary fractional-linear transformations with elements of the basic RSA algorithm. The application of this mathematical apparatus in the basic RSA algorithm avoids contours of image objects in an encrypted sample. In addition, this combination provides additional stability to the basic RSA algorithm for unauthorized decryption. The simulation of the method was carried out in two described by the authors algorithms: using one line and four lines of the image matrix, for grayscale and color images. The high efficiency of the developed method for avoiding contours of objects on encrypted images has been confirmed. In both cases, contours after applying encryption procedures do not appear. The reverse procedure allows to get an image without visible distortion.
Author Kovalchuk, Anatoliy
Izonin, Ivan
Lotoshynska, Natalia
Gregush ml, Mihal
Author_xml – sequence: 1
  givenname: Anatoliy
  surname: Kovalchuk
  fullname: Kovalchuk, Anatoliy
  organization: Department of Publishing Information Technologies, Lviv Polytechnic National University, S. Bandera, 12, Lviv, 79013, Ukraine
– sequence: 2
  givenname: Ivan
  surname: Izonin
  fullname: Izonin, Ivan
  email: ivanizonin@gmail.com
  organization: Department of Publishing Information Technologies, Lviv Polytechnic National University, S. Bandera, 12, Lviv, 79013, Ukraine
– sequence: 3
  givenname: Mihal
  surname: Gregush ml
  fullname: Gregush ml, Mihal
  organization: Faculty of management, Comenius University in Bratislava, Odbojárov 10, Bratislava, Slovak Republic
– sequence: 4
  givenname: Natalia
  surname: Lotoshynska
  fullname: Lotoshynska, Natalia
  organization: Department of Publishing Information Technologies, Lviv Polytechnic National University, S. Bandera, 12, Lviv, 79013, Ukraine
BookMark eNqNkMFKAzEQhoMoqLVP4CUvsGtms91uDh6KVi0URKjnME2mNWWbXZKtpW_vthURD-pcMkn4_hm-S3bqa0-MXYNIQUBxs0qbUJuYZgJUCpCKgTphF1AOh4kYCHX6rT9n_RhXoitZlgqGFwxHno-aLgDNG5_VWww28skal8TH3oRd07rac_SW39PXdROdX_KXDbYUPIYdfwho9j9YJVPnCQN_bijg_ilesbMFVpH6n2ePvT6MZ3dPyfT5cXI3miZG5mWbABV5TiAKlWcoTWYVZcoSzKUgyLGcg8iKrABjRQlSWiWMXJTDYmAEZcKC7LH8mLvxDe62WFW6CW7dradB6L0pvdIHU3pvSgPozlSHqSNmQh1joIU2rj1s3gZ01R-s_MH-b-LtkaLOxrujoKNx5A1ZF8i02tbuV_4DkmaZ2w
CitedBy_id crossref_primary_10_1007_s11042_022_13798_9
crossref_primary_10_1007_s11042_021_10970_5
crossref_primary_10_1007_s11042_021_11122_5
crossref_primary_10_23939_istcmtm2022_03_005
crossref_primary_10_23939_istcmtm2020_04_025
crossref_primary_10_23939_istcmtm2022_03_011
crossref_primary_10_3390_e23030341
crossref_primary_10_1007_s11042_022_13280_6
crossref_primary_10_3390_e23030291
Cites_doi 10.1109/STC-CSIT.2018.8526607
10.1007/s12927-014-0006-4
10.1007/978-3-319-48923-0_14
10.1007/s12927-013-0004-y
10.1016/j.cnsns.2014.12.005
10.1007/978-3-319-54042-9_13
10.1016/j.procs.2018.10.150
10.1109/MEMSTECH.2016.7507533
ContentType Journal Article
Copyright 2019
Copyright_xml – notice: 2019
DBID 6I.
AAFTH
AAYXX
CITATION
ADTOC
UNPAY
DOI 10.1016/j.procs.2019.11.059
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1877-0509
EndPage 496
ExternalDocumentID 10.1016/j.procs.2019.11.059
10_1016_j_procs_2019_11_059
S1877050919317594
GroupedDBID --K
0R~
0SF
1B1
457
5VS
6I.
71M
AACTN
AAEDT
AAEDW
AAFTH
AAIKJ
AALRI
AAQFI
AAXUO
ABMAC
ACGFS
ADBBV
ADEZE
AEXQZ
AFTJW
AGHFR
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
E3Z
EBS
EJD
EP3
FDB
FNPLU
HZ~
IXB
KQ8
M41
M~E
NCXOZ
O-L
O9-
OK1
P2P
RIG
ROL
SES
SSZ
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
ADVLN
AEUPX
AFPUW
AIGII
AKBMS
AKRWK
AKYEP
CITATION
~HD
ADTOC
UNPAY
ID FETCH-LOGICAL-c348t-1e644e106942a3c2d9e29de1b30e14a8b1026261cd08133d90c3f8765c0e20d13
IEDL.DBID UNPAY
ISSN 1877-0509
IngestDate Tue Aug 19 20:45:30 EDT 2025
Thu Apr 24 23:09:05 EDT 2025
Wed Oct 01 03:32:27 EDT 2025
Wed May 17 00:11:47 EDT 2023
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords RSA
image
encryption
quaternary fractional-linear form
modiffication
contour
decryption
stability
Language English
License This is an open access article under the CC BY-NC-ND license.
cc-by-nc-nd
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c348t-1e644e106942a3c2d9e29de1b30e14a8b1026261cd08133d90c3f8765c0e20d13
OpenAccessLink https://proxy.k.utb.cz/login?url=https://doi.org/10.1016/j.procs.2019.11.059
PageCount 6
ParticipantIDs unpaywall_primary_10_1016_j_procs_2019_11_059
crossref_citationtrail_10_1016_j_procs_2019_11_059
crossref_primary_10_1016_j_procs_2019_11_059
elsevier_sciencedirect_doi_10_1016_j_procs_2019_11_059
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2019
2019-00-00
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – year: 2019
  text: 2019
PublicationDecade 2010
PublicationTitle Procedia computer science
PublicationYear 2019
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Riznyk, O., Kynash, Y., Povshuk, O., Noga, Y. (2018) "The Method of Encoding Information in the Images Using Numerical Line Bundles," IEEE 13th Intern. Scien. and Technical Conference on Computer Sciences and Information Technologies, Lviv.: 80-83.
Kryvinska, Poniszewska-Maranda, Gregus (bib0009) 2018; 141
Digital Image Processing
Lviv, pp. 310-313.
Kosar, Shakhovska (bib00019) 2019
Poniszewska-Maranda, Matusiak, Kryvinska (bib0008) 2019
Korzh, Peleshchyshyn, Fedushko, Syerov (bib00017) 2017; 543
Rashkevych, Y. Y., Kovalchuk, A. M., Peleshko, D. D. (2011) "Images protection by using projective and binary affine transformations with elements of RSA algorithm,"
Lviv.: 542-544.
"Features of the auto-associative neurolike structures of the geometrical transformation machine (GTM)"
Boreiko O., Teslyuk V. (2016) “Structural Model of Passenger Counting and Public Transport Tracking System Of Smart City.” Perspective Technologies and Methods in MEMS Design, MEMSTECH 2016 – Proceedings of 12th International Conference.: 124–126.
Demydov, Dronyuk, Fedevych, Romanchuk (bib00011) 2019
Tsmots, Teslyuk, Teslyuk, Ihnatyev (bib00010) 2018
Polishchuk, U., et al.
Rashkevych, Y., Peleshko, D, Kupchak, M. (2009) "Mathematical model of presenting an image and set of images,"
Kaczor, Kryvinska (bib00023) 2013; 5
Poniszewska-Maranda, A., Kaczmarek, D., Kryvinska, N. et al. (2018) "Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system", Computing.: 1-25.
Zakarpattya.: 98-100
2
Dronyuk, Nazarkevych, Poplavska (bib00012) 2018
66-67.
321-321.
Korobiichuk, Fedushko, Juś, Syerov (bib00022) 2017; 550
Artem, Holoshchuk (bib0003) 2019
Nazarkevych, M., Buriachok, V., Lotoshynska, N., Dmytryk, S. (2018) "Research of Ateb-Gabor Filter in Biometric Protection Systems,"
Boyko, N., Bronetskyi, A., Shakhovska, N. (2019) "Application of artificial intelligence algorithms for image processing", Proceedings of the 8th International Conference on Mathematics. Information Technologies. Education, MoMLeT&DS-2019, Lviv.: 212-221
Kovalchuk, A., Lotoshynska, N., (2018) "Elements of RSA Algorithm and Extra Noising in a Binary Linear-Quadratic Transformations During Encryption and Decryption of Images,"
Molnár, Molnár, Kryvinska, Greguš (bib0007) 2014; 6
Tsymbal, Y., Tkachenko, R. (2016) "A digital watermarking scheme based on autoassociative neural networks of the geometric transformations model,"
Lviv.: 231-234.
Kanso, Ghebleh (bib0001) 2015; 24
Molnár (10.1016/j.procs.2019.11.059_bib0007) 2014; 6
Demydov (10.1016/j.procs.2019.11.059_bib00011) 2019
Korobiichuk (10.1016/j.procs.2019.11.059_bib00022) 2017; 550
Kanso (10.1016/j.procs.2019.11.059_bib0001) 2015; 24
10.1016/j.procs.2019.11.059_bib00016
Poniszewska-Maranda (10.1016/j.procs.2019.11.059_bib0008) 2019
Artem (10.1016/j.procs.2019.11.059_bib0003) 2019
10.1016/j.procs.2019.11.059_bib00018
Kryvinska (10.1016/j.procs.2019.11.059_bib0009) 2018; 141
10.1016/j.procs.2019.11.059_bib00013
Kosar (10.1016/j.procs.2019.11.059_bib00019) 2019
10.1016/j.procs.2019.11.059_bib00015
10.1016/j.procs.2019.11.059_bib00014
10.1016/j.procs.2019.11.059_bib00020
10.1016/j.procs.2019.11.059_bib0002
10.1016/j.procs.2019.11.059_bib00021
Dronyuk (10.1016/j.procs.2019.11.059_bib00012) 2018
10.1016/j.procs.2019.11.059_bib0004
Korzh (10.1016/j.procs.2019.11.059_bib00017) 2017; 543
10.1016/j.procs.2019.11.059_bib0005
10.1016/j.procs.2019.11.059_bib0006
Tsmots (10.1016/j.procs.2019.11.059_bib00010) 2018
Kaczor (10.1016/j.procs.2019.11.059_bib00023) 2013; 5
References_xml – reference: Digital Image Processing:
– volume: 141
  start-page: 64
  year: 2018
  end-page: 71
  ident: bib0009
  article-title: "An Approach towards Service System Building for Road Traffic Signs Detection and Recognition"
  publication-title: Procedia Computer Science
– start-page: 558
  year: 2018
  end-page: 576
  ident: bib00010
  publication-title: “Basic Components of Neuronetworks with Parallel Vertical Group Data Real-Time Processing.” Advances in Intelligent Systems and Computing 689
– reference: Poniszewska-Maranda, A., Kaczmarek, D., Kryvinska, N. et al. (2018) "Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system", Computing.: 1-25.
– reference: Polishchuk, U., et al. (
– reference: , Zakarpattya.: 98-100
– reference: .: 66-67.
– start-page: 1
  year: 2019
  end-page: 17
  ident: bib0008
  article-title: "A real-time service system in the cloud" J
  publication-title: Ambient. Intell. Human. Comput.
– volume: 5
  start-page: 125
  year: 2013
  end-page: 154
  ident: bib00023
  article-title: “It is all about Services - Fundamentals, Drivers, and Business Models”, The Society of Service Science.”
  publication-title: Journal of Service Science Research, Springer
– reference: ) "Features of the auto-associative neurolike structures of the geometrical transformation machine (GTM)",
– volume: 24
  start-page: 98
  year: 2015
  end-page: 116
  ident: bib0001
  article-title: "An efficient and robust image encryption scheme for medical applications"
  publication-title: Communications in Nonlinear Science and Numerical Simulation
– reference: Riznyk, O., Kynash, Y., Povshuk, O., Noga, Y. (2018) "The Method of Encoding Information in the Images Using Numerical Line Bundles," IEEE 13th Intern. Scien. and Technical Conference on Computer Sciences and Information Technologies, Lviv.: 80-83.
– volume: 6
  start-page: 149
  year: 2014
  end-page: 172
  ident: bib0007
  article-title: “Web Intelligence in practice”
  publication-title: The Society of Service Science, Journal of Service Science Research, Springer
– reference: Tsymbal, Y., Tkachenko, R. (2016) "A digital watermarking scheme based on autoassociative neural networks of the geometric transformations model,"
– start-page: 71
  year: 2019
  end-page: 88
  ident: bib00011
  publication-title: Traffic Fluctuations Optimization for Telecommunication SDP Segment Based on Forecasting Using Ateb-Functions. In: Kryvinska N., Greguš M. (eds) Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, 20
– reference: Rashkevych, Y. Y., Kovalchuk, A. M., Peleshko, D. D. (2011) "Images protection by using projective and binary affine transformations with elements of RSA algorithm,"
– start-page: 195
  year: 2018
  end-page: 206
  ident: bib00012
  publication-title: Gabor Filters Generalization Based on Ateb-Functions for Information Security. Advances in Intelligent Systems and Computing, 659
– reference: , Lviv, pp. 310-313.
– reference: Kovalchuk, A., Lotoshynska, N., (2018) "Elements of RSA Algorithm and Extra Noising in a Binary Linear-Quadratic Transformations During Encryption and Decryption of Images,"
– reference: Boreiko O., Teslyuk V. (2016) “Structural Model of Passenger Counting and Public Transport Tracking System Of Smart City.” Perspective Technologies and Methods in MEMS Design, MEMSTECH 2016 – Proceedings of 12th International Conference.: 124–126.
– reference: Boyko, N., Bronetskyi, A., Shakhovska, N. (2019) "Application of artificial intelligence algorithms for image processing", Proceedings of the 8th International Conference on Mathematics. Information Technologies. Education, MoMLeT&DS-2019, Lviv.: 212-221
– volume: 550
  start-page: 144
  year: 2017
  end-page: 150
  ident: bib00022
  article-title: Methods of determining information support of web community user personal data verification system
  publication-title: Advances in Intelligent Systems and Computing
– volume: 543
  start-page: 104
  year: 2017
  end-page: 110
  ident: bib00017
  article-title: Protection of university information image from focused aggressive actions
  publication-title: Advances in Intelligent Systems and Computing
– reference: Nazarkevych, M., Buriachok, V., Lotoshynska, N., Dmytryk, S. (2018) "Research of Ateb-Gabor Filter in Biometric Protection Systems,"
– reference: , Lviv.: 542-544.
– start-page: 301
  year: 2019
  end-page: 314
  ident: bib0003
  publication-title: Information Support of Scientific Researches of Virtual Communities on the Platform of Cloud Services. In: Shakhovska N., Medykovskyy M. (eds) Advances in Intelligent Systems and Computing III. CSIT 2018. Advances in Intelligent Systems and Computing, 871
– reference: Rashkevych, Y., Peleshko, D, Kupchak, M. (2009) "Mathematical model of presenting an image and set of images,"
– reference: .: 321-321.
– reference: 2
– start-page: 38
  year: 2019
  end-page: 47
  ident: bib00019
  publication-title: An Overview of Denoising Methods for Different Types of Noises Present on Graphic Images. Advances in Intelligent Systems and Computing, 871
– reference: , Lviv.: 231-234.
– ident: 10.1016/j.procs.2019.11.059_bib0002
  doi: 10.1109/STC-CSIT.2018.8526607
– volume: 6
  start-page: 149
  issue: 1
  year: 2014
  ident: 10.1016/j.procs.2019.11.059_bib0007
  article-title: “Web Intelligence in practice”
  publication-title: The Society of Service Science, Journal of Service Science Research, Springer
  doi: 10.1007/s12927-014-0006-4
– start-page: 195
  year: 2018
  ident: 10.1016/j.procs.2019.11.059_bib00012
– volume: 543
  start-page: 104
  year: 2017
  ident: 10.1016/j.procs.2019.11.059_bib00017
  article-title: Protection of university information image from focused aggressive actions
  publication-title: Advances in Intelligent Systems and Computing
  doi: 10.1007/978-3-319-48923-0_14
– volume: 5
  start-page: 125
  issue: 2
  year: 2013
  ident: 10.1016/j.procs.2019.11.059_bib00023
  article-title: “It is all about Services - Fundamentals, Drivers, and Business Models”, The Society of Service Science.”
  publication-title: Journal of Service Science Research, Springer
  doi: 10.1007/s12927-013-0004-y
– volume: 24
  start-page: 98
  issue: 1–3
  year: 2015
  ident: 10.1016/j.procs.2019.11.059_bib0001
  article-title: "An efficient and robust image encryption scheme for medical applications"
  publication-title: Communications in Nonlinear Science and Numerical Simulation
  doi: 10.1016/j.cnsns.2014.12.005
– ident: 10.1016/j.procs.2019.11.059_bib00013
– start-page: 558
  year: 2018
  ident: 10.1016/j.procs.2019.11.059_bib00010
– ident: 10.1016/j.procs.2019.11.059_bib0005
– ident: 10.1016/j.procs.2019.11.059_bib0006
– start-page: 71
  year: 2019
  ident: 10.1016/j.procs.2019.11.059_bib00011
– volume: 550
  start-page: 144
  year: 2017
  ident: 10.1016/j.procs.2019.11.059_bib00022
  article-title: Methods of determining information support of web community user personal data verification system
  publication-title: Advances in Intelligent Systems and Computing
  doi: 10.1007/978-3-319-54042-9_13
– start-page: 301
  year: 2019
  ident: 10.1016/j.procs.2019.11.059_bib0003
– ident: 10.1016/j.procs.2019.11.059_bib00014
– ident: 10.1016/j.procs.2019.11.059_bib00015
– ident: 10.1016/j.procs.2019.11.059_bib00016
– ident: 10.1016/j.procs.2019.11.059_bib00018
– ident: 10.1016/j.procs.2019.11.059_bib00020
– volume: 141
  start-page: 64
  year: 2018
  ident: 10.1016/j.procs.2019.11.059_bib0009
  article-title: "An Approach towards Service System Building for Road Traffic Signs Detection and Recognition"
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2018.10.150
– start-page: 38
  year: 2019
  ident: 10.1016/j.procs.2019.11.059_bib00019
– ident: 10.1016/j.procs.2019.11.059_bib0004
  doi: 10.1109/MEMSTECH.2016.7507533
– start-page: 1
  year: 2019
  ident: 10.1016/j.procs.2019.11.059_bib0008
  article-title: "A real-time service system in the cloud" J
  publication-title: Ambient. Intell. Human. Comput.
– ident: 10.1016/j.procs.2019.11.059_bib00021
SSID ssj0000388917
Score 2.1766148
Snippet The problem of unauthorized access to various content is an important task for the present. It becomes even more acute when using the existing toolkit for the...
SourceID unpaywall
crossref
elsevier
SourceType Open Access Repository
Enrichment Source
Index Database
Publisher
StartPage 491
SubjectTerms contour
decryption
encryption
modiffication
quaternary fractional-linear form
RSA
stability
SummonAdditionalLinks – databaseName: ScienceDirect
  dbid: IXB
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA6lF734FuuLHDwau9nsK8daW1pBRWyhtyVNZqVS19IH0n9vZl8oSBGPWTJkmUzmxcw3hFx5nqODyEuYlRhgHijFIjfxWSiC0DggfK0wNfDwGPSG3v3IH9VIu-yFwbLKQvfnOj3T1sWXZsHN5mwyab7wKAwRvcS6INYGSsQEFV6E4xv6o9sqz4JoJzIbvIv7GRKU4ENZmRfaCYTt5vIG0TwRs_R3A7W1Smdq_amm028GqLtHdgrPkbbyn9snNUgPyG45lYEWj_SQqFZKWwVSOB1kVbEL2n-3eoN2Uj1fZzqCqtTQO6iWWP7-Sp9XKssPzte0O887HtSU2XDVPgf6NINcWhZHZNjtDNo9VgxSYNpyZMk4WK8HOPa4ukpo10hwpQE-Fg5wT0Vj62XYwIZrYx0EIYx0tEismvS1A65juDgm9fQjhRNCeaLGIaLoCRw4D1waT-jElyaSvoEEGsQtuRfrAmUch11M47Kc7C3OWB4jy238EVuWN8h1RTTLQTY2bw_Ka4l_yEpszcBmQlZd4l8OOv3vQWdkG1d5quac1JfzFVxY52U5vsyk8wvwDuzy
  priority: 102
  providerName: Elsevier
Title An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations
URI https://dx.doi.org/10.1016/j.procs.2019.11.059
https://doi.org/10.1016/j.procs.2019.11.059
UnpaywallVersion publishedVersion
Volume 160
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1877-0509
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000388917
  issn: 1877-0509
  databaseCode: KQ8
  dateStart: 20100501
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVESC
  databaseName: ScienceDirect
  customDbUrl:
  eissn: 1877-0509
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000388917
  issn: 1877-0509
  databaseCode: IXB
  dateStart: 20100501
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1877-0509
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000388917
  issn: 1877-0509
  databaseCode: M~E
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1877-0509
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000388917
  issn: 1877-0509
  databaseCode: AKRWK
  dateStart: 20100501
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDI7YduDEeIohmHLgSKam6fNYYNPGxHhoE-NUpYmLBKNMewiNX0_SxwQIpnGsFKuV7TifU_szQqeWZQjHs2KiPAaIBZwTz4xt4jLHlQYwW3B9NXDdc9oD62poD3Oebd0L8-3_fVqHpQO55tWmfkPTbdp-CVUcWwHvMqoMerfBo06pPNclmsmk4BX6XfKvs2dznoz54p2PRl_OllY1a9qeppSEuqTkpTGfRQ3x8YOwcc3P3kZbOcbEQeYUO2gDkl1ULeY34Hw77yEeJDjIOcVxP62fneLOq4owuJmIySKNJpgnEl_C8lEXyj_huzlPbxInC9yaZL0RfERUYqs2Dr4ZQ-ZX0300aDX7F22Sj1wgglnejFBQ-Aio7oY1OROm9MH0JdCIGUAt7kUKj6gUiAqpoARj0jcEi1VAtYUBpiEpO0Dl5C2BQ4RpzCNX8-0xPZoeqC8tJmLbl55vS4ihhszCGKHI-cj1WIxRWBSePYepEkOtRJWphEqJNXS2FBpndByrlzuFlcMcUWRIIVQGWy1Ilj6xzouO_rn-GJVnkzmcKEAzi-qoEnTvH7p1VOoMz-u5W38CONz22w
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1ZT8MwDI44HuCFGzHOPPBIWNOka_M4jmnABkIMaW9VlrhoaJRph9D-PXGPCSSEEI89rFaOY3-x7M-EnErpmVokE-YsBpgErVnkJwELRS20HojAaEwNtO9rzWd52w26C-Sy7IXBssrC9-c-PfPWxZ1qoc3qsN-vPvEoDJG9xEEQFwOVXCTLMnDoBLv4uhfzRAvSnahs8i4KMJQo2YeyOi8MFMjbzdU50nkiaenPEWplmg717EMPBl8iUGODrBXQkdbzv9skC5BukfVyLAMtduk20fWU1guqcNrJymLH9ObNOQ56nZrRLHMSVKeWXsH8EuvfX-jjVGcJwtGMNkZ5y4MeMHdedfuBPgwhN5fxDnluXHcum6yYpMCMkNGEcXCwBzg2ufpaGN8q8JUF3hMecKmjnoMZ7mTDjXUIQQirPCMS5ycD44HvWS52yVL6nsIeoTzRvRBp9AROnAeurBQmCZSNVGAhgQrxS-3FpqAZx2kXg7isJ3uNM5XHqHJ3AImdyivkbC40zFk2fn-9Vi5L_M1YYhcHfhdk80X8y4f2__uhE7LS7LRbcevm_u6ArOKTPG9zSJYmoykcOSQz6R1nlvoJ8g3wGA
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwEA-6Pfjk_MSJSh58NKNp-vlYdGMKToUN5lNJk6ugtY6uReZfb9KPoaJjPhZytNxdLr9L736H0LllGcLxrJgojwFiAefEM2ObuMxxpQHMFlxfDdyOnOHEupna05pnW_fCfPt_X9Zh6UCuebWp39N0m7a_idqOrYB3C7Uno_vgUadUnusSzWTS8Ar9LvnX2bNVpDO-eOdJ8uVsGXSqpu15SUmoS0peekUe9cTHD8LGNT97B23XGBMHlVPsog1I91Cnmd-A6-28j3iQ4qDmFMfjsn52jq9fVYTB_VRkizKaYJ5KfAXLR10o_4QfCl7eJGYLPMiq3gieEJXYqo2D72ZQ-dX8AE0G_fHlkNQjF4hglpcTCgofAdXdsCZnwpQ-mL4EGjEDqMW9SOERlQJRIRWUYEz6hmCxCqi2MMA0JGWHqJW-pXCEMI155Gq-PaZH0wP1pcVEbPvS820JMXSR2RgjFDUfuR6LkYRN4dlzWCox1EpUmUqolNhFF0uhWUXHsXq501g5rBFFhRRCZbDVgmTpE-u86Pif609QK88KOFWAJo_Oakf-BM3N9DQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Approach+Towards+Image+Encryption+and+Decryption+using+Quaternary+Fractional-Linear+Operations&rft.jtitle=Procedia+computer+science&rft.au=Kovalchuk%2C+Anatoliy&rft.au=Izonin%2C+Ivan&rft.au=Gregush+ml%2C+Mihal&rft.au=Lotoshynska%2C+Natalia&rft.date=2019&rft.issn=1877-0509&rft.eissn=1877-0509&rft.volume=160&rft.spage=491&rft.epage=496&rft_id=info:doi/10.1016%2Fj.procs.2019.11.059&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_procs_2019_11_059
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1877-0509&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1877-0509&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1877-0509&client=summon