An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations
The problem of unauthorized access to various content is an important task for the present. It becomes even more acute when using the existing toolkit for the processing and transmission of encrypted images with the fluctuation intensity function. The authors developed a modification of the RSA algo...
Saved in:
| Published in | Procedia computer science Vol. 160; pp. 491 - 496 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier B.V
2019
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1877-0509 1877-0509 |
| DOI | 10.1016/j.procs.2019.11.059 |
Cover
| Abstract | The problem of unauthorized access to various content is an important task for the present. It becomes even more acute when using the existing toolkit for the processing and transmission of encrypted images with the fluctuation intensity function. The authors developed a modification of the RSA algorithm to use it in relation to the above-mentioned images. It is proposed a conceptual view for the joint use of quaternary fractional-linear transformations with elements of the basic RSA algorithm. The application of this mathematical apparatus in the basic RSA algorithm avoids contours of image objects in an encrypted sample. In addition, this combination provides additional stability to the basic RSA algorithm for unauthorized decryption. The simulation of the method was carried out in two described by the authors algorithms: using one line and four lines of the image matrix, for grayscale and color images. The high efficiency of the developed method for avoiding contours of objects on encrypted images has been confirmed. In both cases, contours after applying encryption procedures do not appear. The reverse procedure allows to get an image without visible distortion. |
|---|---|
| AbstractList | The problem of unauthorized access to various content is an important task for the present. It becomes even more acute when using the existing toolkit for the processing and transmission of encrypted images with the fluctuation intensity function. The authors developed a modification of the RSA algorithm to use it in relation to the above-mentioned images. It is proposed a conceptual view for the joint use of quaternary fractional-linear transformations with elements of the basic RSA algorithm. The application of this mathematical apparatus in the basic RSA algorithm avoids contours of image objects in an encrypted sample. In addition, this combination provides additional stability to the basic RSA algorithm for unauthorized decryption. The simulation of the method was carried out in two described by the authors algorithms: using one line and four lines of the image matrix, for grayscale and color images. The high efficiency of the developed method for avoiding contours of objects on encrypted images has been confirmed. In both cases, contours after applying encryption procedures do not appear. The reverse procedure allows to get an image without visible distortion. |
| Author | Kovalchuk, Anatoliy Izonin, Ivan Lotoshynska, Natalia Gregush ml, Mihal |
| Author_xml | – sequence: 1 givenname: Anatoliy surname: Kovalchuk fullname: Kovalchuk, Anatoliy organization: Department of Publishing Information Technologies, Lviv Polytechnic National University, S. Bandera, 12, Lviv, 79013, Ukraine – sequence: 2 givenname: Ivan surname: Izonin fullname: Izonin, Ivan email: ivanizonin@gmail.com organization: Department of Publishing Information Technologies, Lviv Polytechnic National University, S. Bandera, 12, Lviv, 79013, Ukraine – sequence: 3 givenname: Mihal surname: Gregush ml fullname: Gregush ml, Mihal organization: Faculty of management, Comenius University in Bratislava, Odbojárov 10, Bratislava, Slovak Republic – sequence: 4 givenname: Natalia surname: Lotoshynska fullname: Lotoshynska, Natalia organization: Department of Publishing Information Technologies, Lviv Polytechnic National University, S. Bandera, 12, Lviv, 79013, Ukraine |
| BookMark | eNqNkMFKAzEQhoMoqLVP4CUvsGtms91uDh6KVi0URKjnME2mNWWbXZKtpW_vthURD-pcMkn4_hm-S3bqa0-MXYNIQUBxs0qbUJuYZgJUCpCKgTphF1AOh4kYCHX6rT9n_RhXoitZlgqGFwxHno-aLgDNG5_VWww28skal8TH3oRd07rac_SW39PXdROdX_KXDbYUPIYdfwho9j9YJVPnCQN_bijg_ilesbMFVpH6n2ePvT6MZ3dPyfT5cXI3miZG5mWbABV5TiAKlWcoTWYVZcoSzKUgyLGcg8iKrABjRQlSWiWMXJTDYmAEZcKC7LH8mLvxDe62WFW6CW7dradB6L0pvdIHU3pvSgPozlSHqSNmQh1joIU2rj1s3gZ01R-s_MH-b-LtkaLOxrujoKNx5A1ZF8i02tbuV_4DkmaZ2w |
| CitedBy_id | crossref_primary_10_1007_s11042_022_13798_9 crossref_primary_10_1007_s11042_021_10970_5 crossref_primary_10_1007_s11042_021_11122_5 crossref_primary_10_23939_istcmtm2022_03_005 crossref_primary_10_23939_istcmtm2020_04_025 crossref_primary_10_23939_istcmtm2022_03_011 crossref_primary_10_3390_e23030341 crossref_primary_10_1007_s11042_022_13280_6 crossref_primary_10_3390_e23030291 |
| Cites_doi | 10.1109/STC-CSIT.2018.8526607 10.1007/s12927-014-0006-4 10.1007/978-3-319-48923-0_14 10.1007/s12927-013-0004-y 10.1016/j.cnsns.2014.12.005 10.1007/978-3-319-54042-9_13 10.1016/j.procs.2018.10.150 10.1109/MEMSTECH.2016.7507533 |
| ContentType | Journal Article |
| Copyright | 2019 |
| Copyright_xml | – notice: 2019 |
| DBID | 6I. AAFTH AAYXX CITATION ADTOC UNPAY |
| DOI | 10.1016/j.procs.2019.11.059 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1877-0509 |
| EndPage | 496 |
| ExternalDocumentID | 10.1016/j.procs.2019.11.059 10_1016_j_procs_2019_11_059 S1877050919317594 |
| GroupedDBID | --K 0R~ 0SF 1B1 457 5VS 6I. 71M AACTN AAEDT AAEDW AAFTH AAIKJ AALRI AAQFI AAXUO ABMAC ACGFS ADBBV ADEZE AEXQZ AFTJW AGHFR AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ E3Z EBS EJD EP3 FDB FNPLU HZ~ IXB KQ8 M41 M~E NCXOZ O-L O9- OK1 P2P RIG ROL SES SSZ AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO ADVLN AEUPX AFPUW AIGII AKBMS AKRWK AKYEP CITATION ~HD ADTOC UNPAY |
| ID | FETCH-LOGICAL-c348t-1e644e106942a3c2d9e29de1b30e14a8b1026261cd08133d90c3f8765c0e20d13 |
| IEDL.DBID | UNPAY |
| ISSN | 1877-0509 |
| IngestDate | Tue Aug 19 20:45:30 EDT 2025 Thu Apr 24 23:09:05 EDT 2025 Wed Oct 01 03:32:27 EDT 2025 Wed May 17 00:11:47 EDT 2023 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | RSA image encryption quaternary fractional-linear form modiffication contour decryption stability |
| Language | English |
| License | This is an open access article under the CC BY-NC-ND license. cc-by-nc-nd |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c348t-1e644e106942a3c2d9e29de1b30e14a8b1026261cd08133d90c3f8765c0e20d13 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://doi.org/10.1016/j.procs.2019.11.059 |
| PageCount | 6 |
| ParticipantIDs | unpaywall_primary_10_1016_j_procs_2019_11_059 crossref_citationtrail_10_1016_j_procs_2019_11_059 crossref_primary_10_1016_j_procs_2019_11_059 elsevier_sciencedirect_doi_10_1016_j_procs_2019_11_059 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2019 2019-00-00 |
| PublicationDateYYYYMMDD | 2019-01-01 |
| PublicationDate_xml | – year: 2019 text: 2019 |
| PublicationDecade | 2010 |
| PublicationTitle | Procedia computer science |
| PublicationYear | 2019 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Riznyk, O., Kynash, Y., Povshuk, O., Noga, Y. (2018) "The Method of Encoding Information in the Images Using Numerical Line Bundles," IEEE 13th Intern. Scien. and Technical Conference on Computer Sciences and Information Technologies, Lviv.: 80-83. Kryvinska, Poniszewska-Maranda, Gregus (bib0009) 2018; 141 Digital Image Processing Lviv, pp. 310-313. Kosar, Shakhovska (bib00019) 2019 Poniszewska-Maranda, Matusiak, Kryvinska (bib0008) 2019 Korzh, Peleshchyshyn, Fedushko, Syerov (bib00017) 2017; 543 Rashkevych, Y. Y., Kovalchuk, A. M., Peleshko, D. D. (2011) "Images protection by using projective and binary affine transformations with elements of RSA algorithm," Lviv.: 542-544. "Features of the auto-associative neurolike structures of the geometrical transformation machine (GTM)" Boreiko O., Teslyuk V. (2016) “Structural Model of Passenger Counting and Public Transport Tracking System Of Smart City.” Perspective Technologies and Methods in MEMS Design, MEMSTECH 2016 – Proceedings of 12th International Conference.: 124–126. Demydov, Dronyuk, Fedevych, Romanchuk (bib00011) 2019 Tsmots, Teslyuk, Teslyuk, Ihnatyev (bib00010) 2018 Polishchuk, U., et al. Rashkevych, Y., Peleshko, D, Kupchak, M. (2009) "Mathematical model of presenting an image and set of images," Kaczor, Kryvinska (bib00023) 2013; 5 Poniszewska-Maranda, A., Kaczmarek, D., Kryvinska, N. et al. (2018) "Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system", Computing.: 1-25. Zakarpattya.: 98-100 2 Dronyuk, Nazarkevych, Poplavska (bib00012) 2018 66-67. 321-321. Korobiichuk, Fedushko, Juś, Syerov (bib00022) 2017; 550 Artem, Holoshchuk (bib0003) 2019 Nazarkevych, M., Buriachok, V., Lotoshynska, N., Dmytryk, S. (2018) "Research of Ateb-Gabor Filter in Biometric Protection Systems," Boyko, N., Bronetskyi, A., Shakhovska, N. (2019) "Application of artificial intelligence algorithms for image processing", Proceedings of the 8th International Conference on Mathematics. Information Technologies. Education, MoMLeT&DS-2019, Lviv.: 212-221 Kovalchuk, A., Lotoshynska, N., (2018) "Elements of RSA Algorithm and Extra Noising in a Binary Linear-Quadratic Transformations During Encryption and Decryption of Images," Molnár, Molnár, Kryvinska, Greguš (bib0007) 2014; 6 Tsymbal, Y., Tkachenko, R. (2016) "A digital watermarking scheme based on autoassociative neural networks of the geometric transformations model," Lviv.: 231-234. Kanso, Ghebleh (bib0001) 2015; 24 Molnár (10.1016/j.procs.2019.11.059_bib0007) 2014; 6 Demydov (10.1016/j.procs.2019.11.059_bib00011) 2019 Korobiichuk (10.1016/j.procs.2019.11.059_bib00022) 2017; 550 Kanso (10.1016/j.procs.2019.11.059_bib0001) 2015; 24 10.1016/j.procs.2019.11.059_bib00016 Poniszewska-Maranda (10.1016/j.procs.2019.11.059_bib0008) 2019 Artem (10.1016/j.procs.2019.11.059_bib0003) 2019 10.1016/j.procs.2019.11.059_bib00018 Kryvinska (10.1016/j.procs.2019.11.059_bib0009) 2018; 141 10.1016/j.procs.2019.11.059_bib00013 Kosar (10.1016/j.procs.2019.11.059_bib00019) 2019 10.1016/j.procs.2019.11.059_bib00015 10.1016/j.procs.2019.11.059_bib00014 10.1016/j.procs.2019.11.059_bib00020 10.1016/j.procs.2019.11.059_bib0002 10.1016/j.procs.2019.11.059_bib00021 Dronyuk (10.1016/j.procs.2019.11.059_bib00012) 2018 10.1016/j.procs.2019.11.059_bib0004 Korzh (10.1016/j.procs.2019.11.059_bib00017) 2017; 543 10.1016/j.procs.2019.11.059_bib0005 10.1016/j.procs.2019.11.059_bib0006 Tsmots (10.1016/j.procs.2019.11.059_bib00010) 2018 Kaczor (10.1016/j.procs.2019.11.059_bib00023) 2013; 5 |
| References_xml | – reference: Digital Image Processing: – volume: 141 start-page: 64 year: 2018 end-page: 71 ident: bib0009 article-title: "An Approach towards Service System Building for Road Traffic Signs Detection and Recognition" publication-title: Procedia Computer Science – start-page: 558 year: 2018 end-page: 576 ident: bib00010 publication-title: “Basic Components of Neuronetworks with Parallel Vertical Group Data Real-Time Processing.” Advances in Intelligent Systems and Computing 689 – reference: Poniszewska-Maranda, A., Kaczmarek, D., Kryvinska, N. et al. (2018) "Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system", Computing.: 1-25. – reference: Polishchuk, U., et al. ( – reference: , Zakarpattya.: 98-100 – reference: .: 66-67. – start-page: 1 year: 2019 end-page: 17 ident: bib0008 article-title: "A real-time service system in the cloud" J publication-title: Ambient. Intell. Human. Comput. – volume: 5 start-page: 125 year: 2013 end-page: 154 ident: bib00023 article-title: “It is all about Services - Fundamentals, Drivers, and Business Models”, The Society of Service Science.” publication-title: Journal of Service Science Research, Springer – reference: ) "Features of the auto-associative neurolike structures of the geometrical transformation machine (GTM)", – volume: 24 start-page: 98 year: 2015 end-page: 116 ident: bib0001 article-title: "An efficient and robust image encryption scheme for medical applications" publication-title: Communications in Nonlinear Science and Numerical Simulation – reference: Riznyk, O., Kynash, Y., Povshuk, O., Noga, Y. (2018) "The Method of Encoding Information in the Images Using Numerical Line Bundles," IEEE 13th Intern. Scien. and Technical Conference on Computer Sciences and Information Technologies, Lviv.: 80-83. – volume: 6 start-page: 149 year: 2014 end-page: 172 ident: bib0007 article-title: “Web Intelligence in practice” publication-title: The Society of Service Science, Journal of Service Science Research, Springer – reference: Tsymbal, Y., Tkachenko, R. (2016) "A digital watermarking scheme based on autoassociative neural networks of the geometric transformations model," – start-page: 71 year: 2019 end-page: 88 ident: bib00011 publication-title: Traffic Fluctuations Optimization for Telecommunication SDP Segment Based on Forecasting Using Ateb-Functions. In: Kryvinska N., Greguš M. (eds) Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, 20 – reference: Rashkevych, Y. Y., Kovalchuk, A. M., Peleshko, D. D. (2011) "Images protection by using projective and binary affine transformations with elements of RSA algorithm," – start-page: 195 year: 2018 end-page: 206 ident: bib00012 publication-title: Gabor Filters Generalization Based on Ateb-Functions for Information Security. Advances in Intelligent Systems and Computing, 659 – reference: , Lviv, pp. 310-313. – reference: Kovalchuk, A., Lotoshynska, N., (2018) "Elements of RSA Algorithm and Extra Noising in a Binary Linear-Quadratic Transformations During Encryption and Decryption of Images," – reference: Boreiko O., Teslyuk V. (2016) “Structural Model of Passenger Counting and Public Transport Tracking System Of Smart City.” Perspective Technologies and Methods in MEMS Design, MEMSTECH 2016 – Proceedings of 12th International Conference.: 124–126. – reference: Boyko, N., Bronetskyi, A., Shakhovska, N. (2019) "Application of artificial intelligence algorithms for image processing", Proceedings of the 8th International Conference on Mathematics. Information Technologies. Education, MoMLeT&DS-2019, Lviv.: 212-221 – volume: 550 start-page: 144 year: 2017 end-page: 150 ident: bib00022 article-title: Methods of determining information support of web community user personal data verification system publication-title: Advances in Intelligent Systems and Computing – volume: 543 start-page: 104 year: 2017 end-page: 110 ident: bib00017 article-title: Protection of university information image from focused aggressive actions publication-title: Advances in Intelligent Systems and Computing – reference: Nazarkevych, M., Buriachok, V., Lotoshynska, N., Dmytryk, S. (2018) "Research of Ateb-Gabor Filter in Biometric Protection Systems," – reference: , Lviv.: 542-544. – start-page: 301 year: 2019 end-page: 314 ident: bib0003 publication-title: Information Support of Scientific Researches of Virtual Communities on the Platform of Cloud Services. In: Shakhovska N., Medykovskyy M. (eds) Advances in Intelligent Systems and Computing III. CSIT 2018. Advances in Intelligent Systems and Computing, 871 – reference: Rashkevych, Y., Peleshko, D, Kupchak, M. (2009) "Mathematical model of presenting an image and set of images," – reference: .: 321-321. – reference: 2 – start-page: 38 year: 2019 end-page: 47 ident: bib00019 publication-title: An Overview of Denoising Methods for Different Types of Noises Present on Graphic Images. Advances in Intelligent Systems and Computing, 871 – reference: , Lviv.: 231-234. – ident: 10.1016/j.procs.2019.11.059_bib0002 doi: 10.1109/STC-CSIT.2018.8526607 – volume: 6 start-page: 149 issue: 1 year: 2014 ident: 10.1016/j.procs.2019.11.059_bib0007 article-title: “Web Intelligence in practice” publication-title: The Society of Service Science, Journal of Service Science Research, Springer doi: 10.1007/s12927-014-0006-4 – start-page: 195 year: 2018 ident: 10.1016/j.procs.2019.11.059_bib00012 – volume: 543 start-page: 104 year: 2017 ident: 10.1016/j.procs.2019.11.059_bib00017 article-title: Protection of university information image from focused aggressive actions publication-title: Advances in Intelligent Systems and Computing doi: 10.1007/978-3-319-48923-0_14 – volume: 5 start-page: 125 issue: 2 year: 2013 ident: 10.1016/j.procs.2019.11.059_bib00023 article-title: “It is all about Services - Fundamentals, Drivers, and Business Models”, The Society of Service Science.” publication-title: Journal of Service Science Research, Springer doi: 10.1007/s12927-013-0004-y – volume: 24 start-page: 98 issue: 1–3 year: 2015 ident: 10.1016/j.procs.2019.11.059_bib0001 article-title: "An efficient and robust image encryption scheme for medical applications" publication-title: Communications in Nonlinear Science and Numerical Simulation doi: 10.1016/j.cnsns.2014.12.005 – ident: 10.1016/j.procs.2019.11.059_bib00013 – start-page: 558 year: 2018 ident: 10.1016/j.procs.2019.11.059_bib00010 – ident: 10.1016/j.procs.2019.11.059_bib0005 – ident: 10.1016/j.procs.2019.11.059_bib0006 – start-page: 71 year: 2019 ident: 10.1016/j.procs.2019.11.059_bib00011 – volume: 550 start-page: 144 year: 2017 ident: 10.1016/j.procs.2019.11.059_bib00022 article-title: Methods of determining information support of web community user personal data verification system publication-title: Advances in Intelligent Systems and Computing doi: 10.1007/978-3-319-54042-9_13 – start-page: 301 year: 2019 ident: 10.1016/j.procs.2019.11.059_bib0003 – ident: 10.1016/j.procs.2019.11.059_bib00014 – ident: 10.1016/j.procs.2019.11.059_bib00015 – ident: 10.1016/j.procs.2019.11.059_bib00016 – ident: 10.1016/j.procs.2019.11.059_bib00018 – ident: 10.1016/j.procs.2019.11.059_bib00020 – volume: 141 start-page: 64 year: 2018 ident: 10.1016/j.procs.2019.11.059_bib0009 article-title: "An Approach towards Service System Building for Road Traffic Signs Detection and Recognition" publication-title: Procedia Computer Science doi: 10.1016/j.procs.2018.10.150 – start-page: 38 year: 2019 ident: 10.1016/j.procs.2019.11.059_bib00019 – ident: 10.1016/j.procs.2019.11.059_bib0004 doi: 10.1109/MEMSTECH.2016.7507533 – start-page: 1 year: 2019 ident: 10.1016/j.procs.2019.11.059_bib0008 article-title: "A real-time service system in the cloud" J publication-title: Ambient. Intell. Human. Comput. – ident: 10.1016/j.procs.2019.11.059_bib00021 |
| SSID | ssj0000388917 |
| Score | 2.1766148 |
| Snippet | The problem of unauthorized access to various content is an important task for the present. It becomes even more acute when using the existing toolkit for the... |
| SourceID | unpaywall crossref elsevier |
| SourceType | Open Access Repository Enrichment Source Index Database Publisher |
| StartPage | 491 |
| SubjectTerms | contour decryption encryption modiffication quaternary fractional-linear form RSA stability |
| SummonAdditionalLinks | – databaseName: ScienceDirect dbid: IXB link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA6lF734FuuLHDwau9nsK8daW1pBRWyhtyVNZqVS19IH0n9vZl8oSBGPWTJkmUzmxcw3hFx5nqODyEuYlRhgHijFIjfxWSiC0DggfK0wNfDwGPSG3v3IH9VIu-yFwbLKQvfnOj3T1sWXZsHN5mwyab7wKAwRvcS6INYGSsQEFV6E4xv6o9sqz4JoJzIbvIv7GRKU4ENZmRfaCYTt5vIG0TwRs_R3A7W1Smdq_amm028GqLtHdgrPkbbyn9snNUgPyG45lYEWj_SQqFZKWwVSOB1kVbEL2n-3eoN2Uj1fZzqCqtTQO6iWWP7-Sp9XKssPzte0O887HtSU2XDVPgf6NINcWhZHZNjtDNo9VgxSYNpyZMk4WK8HOPa4ukpo10hwpQE-Fg5wT0Vj62XYwIZrYx0EIYx0tEismvS1A65juDgm9fQjhRNCeaLGIaLoCRw4D1waT-jElyaSvoEEGsQtuRfrAmUch11M47Kc7C3OWB4jy238EVuWN8h1RTTLQTY2bw_Ka4l_yEpszcBmQlZd4l8OOv3vQWdkG1d5quac1JfzFVxY52U5vsyk8wvwDuzy priority: 102 providerName: Elsevier |
| Title | An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations |
| URI | https://dx.doi.org/10.1016/j.procs.2019.11.059 https://doi.org/10.1016/j.procs.2019.11.059 |
| UnpaywallVersion | publishedVersion |
| Volume | 160 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1877-0509 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000388917 issn: 1877-0509 databaseCode: KQ8 dateStart: 20100501 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVESC databaseName: ScienceDirect customDbUrl: eissn: 1877-0509 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000388917 issn: 1877-0509 databaseCode: IXB dateStart: 20100501 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1877-0509 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000388917 issn: 1877-0509 databaseCode: M~E dateStart: 20100101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1877-0509 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000388917 issn: 1877-0509 databaseCode: AKRWK dateStart: 20100501 isFulltext: true providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDI7YduDEeIohmHLgSKam6fNYYNPGxHhoE-NUpYmLBKNMewiNX0_SxwQIpnGsFKuV7TifU_szQqeWZQjHs2KiPAaIBZwTz4xt4jLHlQYwW3B9NXDdc9oD62poD3Oebd0L8-3_fVqHpQO55tWmfkPTbdp-CVUcWwHvMqoMerfBo06pPNclmsmk4BX6XfKvs2dznoz54p2PRl_OllY1a9qeppSEuqTkpTGfRQ3x8YOwcc3P3kZbOcbEQeYUO2gDkl1ULeY34Hw77yEeJDjIOcVxP62fneLOq4owuJmIySKNJpgnEl_C8lEXyj_huzlPbxInC9yaZL0RfERUYqs2Dr4ZQ-ZX0300aDX7F22Sj1wgglnejFBQ-Aio7oY1OROm9MH0JdCIGUAt7kUKj6gUiAqpoARj0jcEi1VAtYUBpiEpO0Dl5C2BQ4RpzCNX8-0xPZoeqC8tJmLbl55vS4ihhszCGKHI-cj1WIxRWBSePYepEkOtRJWphEqJNXS2FBpndByrlzuFlcMcUWRIIVQGWy1Ilj6xzouO_rn-GJVnkzmcKEAzi-qoEnTvH7p1VOoMz-u5W38CONz22w |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1ZT8MwDI44HuCFGzHOPPBIWNOka_M4jmnABkIMaW9VlrhoaJRph9D-PXGPCSSEEI89rFaOY3-x7M-EnErpmVokE-YsBpgErVnkJwELRS20HojAaEwNtO9rzWd52w26C-Sy7IXBssrC9-c-PfPWxZ1qoc3qsN-vPvEoDJG9xEEQFwOVXCTLMnDoBLv4uhfzRAvSnahs8i4KMJQo2YeyOi8MFMjbzdU50nkiaenPEWplmg717EMPBl8iUGODrBXQkdbzv9skC5BukfVyLAMtduk20fWU1guqcNrJymLH9ObNOQ56nZrRLHMSVKeWXsH8EuvfX-jjVGcJwtGMNkZ5y4MeMHdedfuBPgwhN5fxDnluXHcum6yYpMCMkNGEcXCwBzg2ufpaGN8q8JUF3hMecKmjnoMZ7mTDjXUIQQirPCMS5ycD44HvWS52yVL6nsIeoTzRvRBp9AROnAeurBQmCZSNVGAhgQrxS-3FpqAZx2kXg7isJ3uNM5XHqHJ3AImdyivkbC40zFk2fn-9Vi5L_M1YYhcHfhdk80X8y4f2__uhE7LS7LRbcevm_u6ArOKTPG9zSJYmoykcOSQz6R1nlvoJ8g3wGA |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwEA-6Pfjk_MSJSh58NKNp-vlYdGMKToUN5lNJk6ugtY6uReZfb9KPoaJjPhZytNxdLr9L736H0LllGcLxrJgojwFiAefEM2ObuMxxpQHMFlxfDdyOnOHEupna05pnW_fCfPt_X9Zh6UCuebWp39N0m7a_idqOrYB3C7Uno_vgUadUnusSzWTS8Ar9LvnX2bNVpDO-eOdJ8uVsGXSqpu15SUmoS0peekUe9cTHD8LGNT97B23XGBMHlVPsog1I91Cnmd-A6-28j3iQ4qDmFMfjsn52jq9fVYTB_VRkizKaYJ5KfAXLR10o_4QfCl7eJGYLPMiq3gieEJXYqo2D72ZQ-dX8AE0G_fHlkNQjF4hglpcTCgofAdXdsCZnwpQ-mL4EGjEDqMW9SOERlQJRIRWUYEz6hmCxCqi2MMA0JGWHqJW-pXCEMI155Gq-PaZH0wP1pcVEbPvS820JMXSR2RgjFDUfuR6LkYRN4dlzWCox1EpUmUqolNhFF0uhWUXHsXq501g5rBFFhRRCZbDVgmTpE-u86Pif609QK88KOFWAJo_Oakf-BM3N9DQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Approach+Towards+Image+Encryption+and+Decryption+using+Quaternary+Fractional-Linear+Operations&rft.jtitle=Procedia+computer+science&rft.au=Kovalchuk%2C+Anatoliy&rft.au=Izonin%2C+Ivan&rft.au=Gregush+ml%2C+Mihal&rft.au=Lotoshynska%2C+Natalia&rft.date=2019&rft.issn=1877-0509&rft.eissn=1877-0509&rft.volume=160&rft.spage=491&rft.epage=496&rft_id=info:doi/10.1016%2Fj.procs.2019.11.059&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_procs_2019_11_059 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1877-0509&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1877-0509&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1877-0509&client=summon |