A new chaos-based image encryption system

During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose a new fast, simple, and robust chaos-based cryptosystem structure and we analyze its performances. The cryptosystem uses a diffusion layer fo...

Full description

Saved in:
Bibliographic Details
Published inSignal processing. Image communication Vol. 41; pp. 144 - 157
Main Authors El Assad, Safwan, Farajallah, Mousa
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.02.2016
Elsevier
Subjects
Online AccessGet full text
ISSN0923-5965
1879-2677
DOI10.1016/j.image.2015.10.004

Cover

Abstract During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose a new fast, simple, and robust chaos-based cryptosystem structure and we analyze its performances. The cryptosystem uses a diffusion layer followed by a bit-permutation layer, instead of byte-permutation, to shuffle the positions of the image pixels. Moreover, the permutation layer is achieved by a new proposed formulation of the 2D cat map that allows an efficient implementation, measured by the time complexity, in terms of arithmetic and logic operations, and also, in terms of clock cycles, of the key-dependent permutation process in comparison with the standard one. Hence, it provides a very fast diffusion process to spread the influence of a single bit over the others. The new cryptosystem includes a robust and uniform chaotic pseudo-random generator (a very simplified version of a generator published in our patent) to change the control parameters in each round of the encryption/decryption processes. The generator is highly nonlinear and produces robust sequences of discrete values having very long orbits. The proposed cryptosystem is defined on finite numbers, and its speed is faster than many chaos-based cryptosystems, while having a very high security level. The security analysis and the obtained simulation results show that the proposed cryptosystem is resistant to various types of attacks and it is efficient for hardware and software implementation. •The proposed chaos-based cryptosystem is a new and efficient structure•It is based on a binary diffusion layer, followed by a bit-permutation layer•The permutation is achieved by an efficient proposed formulation of the 2D cat map.•It has a shorter encryption, while having a very high level of security.•It is adequate for a software and hardware implementations (FPGA card or an ASIC
AbstractList During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose a new fast, simple, and robust chaos-based cryptosystem structure and we analyze its performances. The cryptosystem uses a diffusion layer followed by a bit-permutation layer, instead of byte-permutation, to shuffle the positions of the image pixels. Moreover, the permutation layer is achieved by a new proposed formulation of the 2D cat map that allows an efficient implementation, measured by the time complexity, in terms of arithmetic and logic operations, and also, in terms of clock cycles, of the key-dependent permutation process in comparison with the standard one. Hence, it provides a very fast diffusion process to spread the influence of a single bit over the others. The new cryptosystem includes a robust and uniform chaotic pseudo-random generator (a very simplified version of a generator published in our patent) to change the control parameters in each round of the encryption/decryption processes. The generator is highly nonlinear and produces robust sequences of discrete values having very long orbits. The proposed cryptosystem is defined on finite numbers, and its speed is faster than many chaos-based cryptosystems, while having a very high security level. The security analysis and the obtained simulation results show that the proposed cryptosystem is resistant to various types of attacks and it is efficient for hardware and software implementation.
During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose a new fast, simple, and robust chaos-based cryptosystem structure and we analyze its performances. The cryptosystem uses a diffusion layer followed by a bit-permutation layer, instead of byte-permutation, to shuffle the positions of the image pixels. Moreover, the permutation layer is achieved by a new proposed formulation of the 2D cat map that allows an efficient implementation, measured by the time complexity, in terms of arithmetic and logic operations, and also, in terms of clock cycles, of the key-dependent permutation process in comparison with the standard one. Hence, it provides a very fast diffusion process to spread the influence of a single bit over the others. The new cryptosystem includes a robust and uniform chaotic pseudo-random generator (a very simplified version of a generator published in our patent) to change the control parameters in each round of the encryption/decryption processes. The generator is highly nonlinear and produces robust sequences of discrete values having very long orbits. The proposed cryptosystem is defined on finite numbers, and its speed is faster than many chaos-based cryptosystems, while having a very high security level. The security analysis and the obtained simulation results show that the proposed cryptosystem is resistant to various types of attacks and it is efficient for hardware and software implementation. •The proposed chaos-based cryptosystem is a new and efficient structure•It is based on a binary diffusion layer, followed by a bit-permutation layer•The permutation is achieved by an efficient proposed formulation of the 2D cat map.•It has a shorter encryption, while having a very high level of security.•It is adequate for a software and hardware implementations (FPGA card or an ASIC
During the last decade, a variety of chaos-based cryptosystems has been introduced toprotect the content of the transmitted images. In this paper, we propose a new fast, simple, and robustchaos-based cryptosystem structure and we analyze its performances. The cryptosystem uses adiffusion layer followed by a bit-permutation layer, instead of byte-permutation, to shuffle thepositions of the image pixels. Moreover, the permutation layer is achieved by a new proposedformulation of the 2D cat map that allows an efficient implementation, measured by the timecomplexity, in terms of arithmetic and logic operations, and also, in terms of clock cycles, of the keydependentpermutation process in comparison with the standard one. Hence, it provides a very fastdiffusion process to spread the influence of a single bit over the others. The new cryptosystem includesa robust and uniform chaotic pseudo-random generator (a very simplified version of a generatorpublished in our patent) to change the control parameters in each round of the encryption/decryptionprocesses. The generator is highly nonlinear and produces robust sequences of discrete values havingvery long orbits. The proposed cryptosystem is defined on finite numbers, and its speed is faster thanmany chaos-based cryptosystems, while having a very high security level. The security analysis and theobtained simulation results show that the proposed cryptosystem is resistant to various types ofattacks and it is efficient for hardware and software implementation.
Author Farajallah, Mousa
El Assad, Safwan
Author_xml – sequence: 1
  givenname: Safwan
  surname: El Assad
  fullname: El Assad, Safwan
  organization: Ecole polytech – University of Nantes-Rue Christian Pauc-44306, Nantes cedex 3, France
– sequence: 2
  givenname: Mousa
  surname: Farajallah
  fullname: Farajallah, Mousa
  organization: Ecole polytech – University of Nantes-Rue Christian Pauc-44306, Nantes cedex 3, France
BackLink https://hal.science/hal-01218346$$DView record in HAL
BookMark eNp9kD1PwzAQhi0EEm3hF7BkpEPC2c6XB4aqAopUiQVmy3HO1FWaFDst6r_HaWFh6GTp1fuc754xuWy7Fgm5o5BQoPnDOrEb9YkJA5qFJAFIL8iIloWIWV4Ul2QEgvE4E3l2TcberwGApSBGZDqLWvyO9Ep1Pq6Uxzo6joqw1e6w7W3XRv7ge9zckCujGo-3v--EfDw_vc8X8fLt5XU-W8aaF9DHQpuMpzVluao4QzQlCI1QpLUBk9O0yGteGV3lgqU8zY0pUoCsQpFVWmjG-IRMT3NXqpFbF7ZxB9kpKxezpRwyoIyWAd3T0L0_dbeu-9qh7-XGeo1No1rsdl7SkmXhR2BDVZyq2nXeOzRS214N9_VO2UZSkINKuZbH--WgcgiDysDyf-zfXuepxxOFwdbeopNe26AVa-tQ97Lu7Fn-B9MAjiU
CitedBy_id crossref_primary_10_1007_s10916_017_0809_1
crossref_primary_10_48084_etasr_8557
crossref_primary_10_1155_2020_7913061
crossref_primary_10_1007_s11042_019_07794_9
crossref_primary_10_1007_s11042_024_18803_x
crossref_primary_10_1007_s00371_020_01936_z
crossref_primary_10_1002_cpe_7187
crossref_primary_10_1063_5_0191005
crossref_primary_10_1088_1674_1056_ac5a43
crossref_primary_10_3390_sym11010082
crossref_primary_10_1007_s11042_020_09775_9
crossref_primary_10_1007_s11517_019_02037_3
crossref_primary_10_1142_S0218127422500043
crossref_primary_10_1007_s11042_019_08282_w
crossref_primary_10_1155_2018_8402578
crossref_primary_10_1088_1742_6596_2304_1_012007
crossref_primary_10_1016_j_jksuci_2018_09_015
crossref_primary_10_7498_aps_71_20220466
crossref_primary_10_1007_s11042_018_7000_7
crossref_primary_10_3390_app12199952
crossref_primary_10_1007_s12652_019_01493_x
crossref_primary_10_1007_s11042_020_09497_y
crossref_primary_10_3390_e23091127
crossref_primary_10_1109_ACCESS_2019_2906292
crossref_primary_10_1007_s11071_017_3390_8
crossref_primary_10_3390_e21080748
crossref_primary_10_3390_e22020243
crossref_primary_10_1007_s11042_021_11644_y
crossref_primary_10_1016_j_health_2023_100149
crossref_primary_10_1016_j_ijleo_2020_165838
crossref_primary_10_1007_s00521_020_05447_9
crossref_primary_10_1007_s11042_022_12071_3
crossref_primary_10_1007_s11042_020_09648_1
crossref_primary_10_1016_j_future_2020_02_029
crossref_primary_10_1007_s40998_018_0061_9
crossref_primary_10_1088_1742_6596_1881_4_042010
crossref_primary_10_1109_ACCESS_2024_3432008
crossref_primary_10_3390_sym14020424
crossref_primary_10_1007_s11042_018_6326_5
crossref_primary_10_1007_s13538_023_01268_y
crossref_primary_10_1007_s00500_021_06423_8
crossref_primary_10_1007_s11042_022_12471_5
crossref_primary_10_1088_1361_6501_ac329c
crossref_primary_10_1007_s11042_017_4953_x
crossref_primary_10_1007_s00530_021_00861_y
crossref_primary_10_1007_s11071_016_2912_0
crossref_primary_10_1016_j_ijleo_2022_168880
crossref_primary_10_1007_s11235_024_01251_1
crossref_primary_10_3390_e22060640
crossref_primary_10_3390_e23030341
crossref_primary_10_1016_j_sigpro_2019_03_022
crossref_primary_10_1155_2020_8034196
crossref_primary_10_1007_s11042_023_14863_7
crossref_primary_10_1016_j_optlastec_2018_04_030
crossref_primary_10_1016_j_sigpro_2018_11_010
crossref_primary_10_1016_j_optlaseng_2019_05_008
crossref_primary_10_3390_e21080815
crossref_primary_10_1007_s11042_019_08562_5
crossref_primary_10_1007_s11042_018_6471_x
crossref_primary_10_1088_1674_1056_26_12_120504
crossref_primary_10_1088_1674_1056_26_2_020504
crossref_primary_10_1155_2020_8937676
crossref_primary_10_1007_s11071_018_4208_z
crossref_primary_10_1007_s00500_022_06841_2
crossref_primary_10_1007_s13319_017_0154_7
crossref_primary_10_1109_ACCESS_2019_2916600
crossref_primary_10_1007_s11042_019_08396_1
crossref_primary_10_1155_2020_6665702
crossref_primary_10_1007_s10489_021_02508_x
crossref_primary_10_1080_03772063_2023_2284956
crossref_primary_10_1109_ACCESS_2020_3006513
crossref_primary_10_1007_s11042_018_6145_8
crossref_primary_10_1364_OE_555781
crossref_primary_10_1109_ACCESS_2019_2911559
crossref_primary_10_1109_TNB_2017_2780881
crossref_primary_10_1007_s11042_018_7110_2
crossref_primary_10_3390_e22050548
crossref_primary_10_1016_j_sigpro_2019_107280
crossref_primary_10_1002_cpe_6990
crossref_primary_10_1038_s41598_025_85539_5
crossref_primary_10_3390_s19051228
crossref_primary_10_1007_s42835_020_00393_x
crossref_primary_10_1080_13682199_2018_1505327
crossref_primary_10_1080_19393555_2024_2312975
crossref_primary_10_1007_s00521_019_04637_4
crossref_primary_10_1088_1402_4896_adaa39
crossref_primary_10_3390_math10122034
crossref_primary_10_1007_s11063_020_10412_7
crossref_primary_10_1007_s12596_024_02405_9
crossref_primary_10_1109_JIOT_2024_3391661
crossref_primary_10_1007_s11042_017_4606_0
crossref_primary_10_3390_e26100885
crossref_primary_10_1007_s11042_021_10719_0
crossref_primary_10_30521_jes_1160773
crossref_primary_10_1109_ACCESS_2018_2858839
crossref_primary_10_1007_s11042_020_08826_5
crossref_primary_10_1007_s10916_016_0611_5
crossref_primary_10_1007_s11042_019_07893_7
crossref_primary_10_1140_epjs_s11734_021_00365_w
crossref_primary_10_1007_s11042_022_12791_6
crossref_primary_10_1109_ACCESS_2020_3032403
Cites_doi 10.1016/j.chaos.2006.03.120
10.1016/j.cnsns.2011.12.015
10.1007/BF00630563
10.1109/IIH-MSP.2012.26
10.1049/iet-ifs.2010.0174
10.1109/GreenCom-iThings-CPSCom.2013.65
10.1109/TCSI.2006.874182
10.1016/j.physleta.2007.12.026
10.1109/TIFS.2008.2007244
10.1109/ICASSP.2015.7178273
10.1142/S0218127406015970
10.1109/ARES.2008.121
10.1109/TIT.2011.2171534
10.1016/j.chaos.2006.05.011
10.1016/j.chaos.2003.12.022
10.1016/S0375-9601(98)00086-3
10.1016/j.chaos.2004.11.096
10.1016/j.cnsns.2010.01.004
10.1109/TIFS.2013.2259819
10.1016/j.cnsns.2012.05.033
10.1007/11927587_7
10.1109/MIC.2012.6273464
10.1016/j.ins.2013.11.027
10.1142/S021812749800098X
ContentType Journal Article
Copyright 2017 Elsevier B.V.
Distributed under a Creative Commons Attribution 4.0 International License
Copyright_xml – notice: 2017 Elsevier B.V.
– notice: Distributed under a Creative Commons Attribution 4.0 International License
DBID AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
1XC
DOI 10.1016/j.image.2015.10.004
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Hyper Article en Ligne (HAL)
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database


DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Engineering
Computer Science
EISSN 1879-2677
EndPage 157
ExternalDocumentID oai:HAL:hal-01218346v1
10_1016_j_image_2015_10_004
S0923596515001691
GroupedDBID --K
--M
.DC
.~1
0R~
123
1B1
1~.
1~5
4.4
457
4G.
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LG9
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
WUQ
XPP
ZMT
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACLOT
ACRPL
ADNMO
AEIPS
AFJKZ
AGQPQ
AIIUN
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
1XC
ID FETCH-LOGICAL-c370t-9cf534d126ab32eef809ce074df0f61476d3bfcb6924346ff74005be95bc9c223
IEDL.DBID .~1
ISSN 0923-5965
IngestDate Tue Oct 14 20:13:14 EDT 2025
Sat Sep 27 17:01:58 EDT 2025
Wed Oct 01 03:57:10 EDT 2025
Thu Apr 24 23:08:05 EDT 2025
Fri Feb 23 02:28:18 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Binary diffusion matrix
Chaos-based cryptosystem
New formulation of the 2D-cat map
Security analysis
binary diffusion matrix
security analysis
new formulation of the 2D-cat map
Language English
License Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c370t-9cf534d126ab32eef809ce074df0f61476d3bfcb6924346ff74005be95bc9c223
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PQID 1825476021
PQPubID 23500
PageCount 14
ParticipantIDs hal_primary_oai_HAL_hal_01218346v1
proquest_miscellaneous_1825476021
crossref_citationtrail_10_1016_j_image_2015_10_004
crossref_primary_10_1016_j_image_2015_10_004
elsevier_sciencedirect_doi_10_1016_j_image_2015_10_004
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2016-02-01
PublicationDateYYYYMMDD 2016-02-01
PublicationDate_xml – month: 02
  year: 2016
  text: 2016-02-01
  day: 01
PublicationDecade 2010
PublicationTitle Signal processing. Image communication
PublicationYear 2016
Publisher Elsevier B.V
Elsevier
Publisher_xml – name: Elsevier B.V
– name: Elsevier
References Al-Maadeed, Al-Ali, Abdalla (bib11) 2012; 2012
Stinson (bib33) 2006
D. Socek, S. Li, S.S. Maglivera, B. Furht, Short paper: enhanced 1-d chaotic key based algorithm for image encryption, September, 2005.
C.-Y. Song, Y.-L. Qiao, X.-Z. Zhang, An image encryption scheme based on new spatiotemporal chaos, Opt.—Int. J. Light Electron Opt.
Alvarez, Li (bib34) 2006; 16
A. Rukhin, J. Soto, J. Nechvatal, E. Barker, S. Leigh, M. Levenson, D. Banks, A. Heckert, J. Dray, S. Vo, et al., Statistical test suite for random and pseudorandom number generators for cryptographic applications, nist special publication.
Li, Sun, Li (bib30) 2011; 5
B.W. Koo, H.S. Jang, J.H. Song, On constructing of a 32×32 binary matrix as a diffusion layer for a 256-bit block cipher, in: Information Security and Cryptology–ICISC 2006, Springer, 2006, pp. 51–64.
Biham, Shamir (bib42) 1991; 4
Peng, Zhu, Long (bib5) 2013; 8
Behnia, Akhshani, Mahmodi, Akhavan (bib39) 2008; 35
Lian, Sun, Wang, Wang (bib28) 2007; 34
Chen, Wong, Liao, Xiang (bib23) 2012; 58
Fog (bib26) 2012
François, Grosges, Barchiesi, Erra (bib4) 2012; 27
Masuda, Jakimoski, Aihara, Kocarev (bib20) 2006; 53
R.L. Tataru, D. Battikh, S.E. Assad, H. Noura, O. Déforges, Enhanced adaptive data hiding in spatial lsb domain by using chaotic sequences, in: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), IEEE, 2012, pp. 85–88.
Wu, Zhou, Noonan, Agaian (bib35) 2014; 264
Wong, Kwok, Law (bib32) 2008; 372
R.L. Rivest, M.J. Robshaw, R. Sidney, Y.L. Yin, The rc6 block cipher, in: In First Advanced Encryption Standard (AES) Conference, Citeseer, 1998.
Zhang, Zhao, Wang (bib15) 2014; 29
Zhang, Xiao, Shu, Li (bib16) 2013; 28
Chen, Mao, Chui (bib38) 2004; 21
Zhu, Zhao, Zhang (bib18) 2013; 28
S. EL ASSAD, H. NOURA, Generator of chaotic sequences and corresponding generating system, wO Patent 2,011,121,218 October 7, 2011.
Yang, Wong, Liao, Zhang, Wei (bib22) 2010; 15
Akhshani, Akhavan, Lim, Hassan (bib36) 2012; 17
C.K. Volos, I.M. Kyprianidis, I.N. Stouboulos, Image encryption process based on chaotic synchronization phenomena, Signal Process.
B. Schneier, Applied cryptography. Protocols, algorithms, and source code in c/bruce schneier, 1996.
Schonberg, Draper, Yeo, Ramchandran (bib1) 2008; 3
Baptista (bib9) 1998; 240
Fridrich (bib19) 1998; 8
A.A. Abd El-Latif, X. Niu, M. Amin, A new image cipher in time and frequency domains, Optics Commun.
.
Ye, Zhao (bib12) 2012; 4
Zhao, Adhikari, Xiao, Sakurai (bib41) 2012; 17
Y. Wang, J. Wang, A new image encryption algorithm based on compound chaotic sequence, in: 2012 International Conference on Measurement, Information and Control (MIC), vol. 2, IEEE, 2012, pp. 962–966.
Tong, Liu, Zhang, Chen (bib17) 2013; 28
Y. Wu, J.P. Noonan, S. Agaian, Npcr and uaci randomness tests for image encryption, Cyber J.: Multidiscip. J. Sci. Technol., J. Sel. Areas Telecommun. (JSAT), 2011, pp. 31–38.
Rakesh, Kaller, Shadakshari, Annappa (bib7) 2012; 2
M. Farajallah, Z. Fawaz, S. El Assad, O. Deforges, Efficient image encryption and authentication scheme based on chaotic sequences, in: SECURWARE 2013, The Seventh International Conference on Emerging Security Information, Systems and Technologies, 2013, pp. 150–155.
Lian, Sun, Wang (bib31) 2005; 26
M. Farajallah, S. El Assad, M. Chetto, Dynamic adjustment of the chaos-based security in real-time energy harvesting sensors, in: Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, 2013, pp. 282–289.
W. Amidouche, M. Farajallah, M. Raulet, O. Deforges, S. El-Assad, Selective video encryption using chaotic system in the shvc extension, in: In 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP, Brisbane Australia), IEEE, 2015.
F. Maleki, A. Mohades, S.M. Hashemi, M.E. Shiri, An image encryption system by cellular automata with memory, in: Third International Conference on Availability, Reliability and Security, 2008. ARES 08, IEEE, 2008, pp. 1266–1271.
Baptista (10.1016/j.image.2015.10.004_bib9) 1998; 240
10.1016/j.image.2015.10.004_bib10
10.1016/j.image.2015.10.004_bib37
10.1016/j.image.2015.10.004_bib13
Li (10.1016/j.image.2015.10.004_bib30) 2011; 5
Lian (10.1016/j.image.2015.10.004_bib31) 2005; 26
10.1016/j.image.2015.10.004_bib14
Schonberg (10.1016/j.image.2015.10.004_bib1) 2008; 3
Zhao (10.1016/j.image.2015.10.004_bib41) 2012; 17
Fog (10.1016/j.image.2015.10.004_bib26) 2012
Al-Maadeed (10.1016/j.image.2015.10.004_bib11) 2012; 2012
Ye (10.1016/j.image.2015.10.004_bib12) 2012; 4
10.1016/j.image.2015.10.004_bib29
Zhu (10.1016/j.image.2015.10.004_bib18) 2013; 28
François (10.1016/j.image.2015.10.004_bib4) 2012; 27
Zhang (10.1016/j.image.2015.10.004_bib15) 2014; 29
10.1016/j.image.2015.10.004_bib44
Wong (10.1016/j.image.2015.10.004_bib32) 2008; 372
Biham (10.1016/j.image.2015.10.004_bib42) 1991; 4
10.1016/j.image.2015.10.004_bib3
Masuda (10.1016/j.image.2015.10.004_bib20) 2006; 53
10.1016/j.image.2015.10.004_bib2
10.1016/j.image.2015.10.004_bib21
Wu (10.1016/j.image.2015.10.004_bib35) 2014; 264
10.1016/j.image.2015.10.004_bib43
10.1016/j.image.2015.10.004_bib8
10.1016/j.image.2015.10.004_bib27
10.1016/j.image.2015.10.004_bib24
10.1016/j.image.2015.10.004_bib6
Rakesh (10.1016/j.image.2015.10.004_bib7) 2012; 2
Fridrich (10.1016/j.image.2015.10.004_bib19) 1998; 8
10.1016/j.image.2015.10.004_bib25
Yang (10.1016/j.image.2015.10.004_bib22) 2010; 15
Zhang (10.1016/j.image.2015.10.004_bib16) 2013; 28
Lian (10.1016/j.image.2015.10.004_bib28) 2007; 34
Chen (10.1016/j.image.2015.10.004_bib38) 2004; 21
10.1016/j.image.2015.10.004_bib40
Stinson (10.1016/j.image.2015.10.004_bib33) 2006
Behnia (10.1016/j.image.2015.10.004_bib39) 2008; 35
Tong (10.1016/j.image.2015.10.004_bib17) 2013; 28
Chen (10.1016/j.image.2015.10.004_bib23) 2012; 58
Akhshani (10.1016/j.image.2015.10.004_bib36) 2012; 17
Alvarez (10.1016/j.image.2015.10.004_bib34) 2006; 16
Peng (10.1016/j.image.2015.10.004_bib5) 2013; 8
References_xml – volume: 34
  start-page: 851
  year: 2007
  end-page: 859
  ident: bib28
  article-title: A chaotic stream cipher and the usage in video protection
  publication-title: Chaos, Solitons & Fractals
– volume: 21
  start-page: 749
  year: 2004
  end-page: 761
  ident: bib38
  article-title: A symmetric image encryption scheme based on 3d chaotic cat maps
  publication-title: Chaos, Solitons & Fractals
– volume: 2
  start-page: 49
  year: 2012
  end-page: 57
  ident: bib7
  article-title: Image encryption using block based uniform scrambling and chaotic logistic mapping
  publication-title: Int. J. Cryptogr. Inf. Secur. (IJCIS)
– volume: 26
  start-page: 117
  year: 2005
  end-page: 129
  ident: bib31
  article-title: A block cipher based on a suitable use of the chaotic standard map
  publication-title: Chaos, Solitons & Fractals
– volume: 15
  start-page: 3507
  year: 2010
  end-page: 3517
  ident: bib22
  article-title: A fast image encryption and authentication scheme based on chaotic maps
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
– year: 2012
  ident: bib26
  article-title: Lists of Instruction Latencies, Throughputs and Micro-Operation Breakdowns for Intel, amd and via cpus
– volume: 27
  start-page: 249
  year: 2012
  end-page: 259
  ident: bib4
  article-title: A new image encryption scheme based on a chaotic function
  publication-title: Signal Process.: Image Commun.
– volume: 17
  start-page: 4653
  year: 2012
  end-page: 4661
  ident: bib36
  article-title: An image encryption scheme based on quantum logistic map
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
– volume: 3
  start-page: 749
  year: 2008
  end-page: 762
  ident: bib1
  article-title: Toward compression of encrypted images and video sequences
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 2012
  start-page: 15
  year: 2012
  ident: bib11
  article-title: A new chaos-based image-encryption and compression algorithm
  publication-title: J. Electr. Comput. Eng.
– volume: 372
  start-page: 2645
  year: 2008
  end-page: 2652
  ident: bib32
  article-title: A fast image encryption scheme based on chaotic standard map
  publication-title: Phys. Lett. A
– reference: B. Schneier, Applied cryptography. Protocols, algorithms, and source code in c/bruce schneier, 1996.
– volume: 35
  start-page: 408
  year: 2008
  end-page: 419
  ident: bib39
  article-title: A novel algorithm for image encryption based on mixture of chaotic maps
  publication-title: Chaos, Solitons & Fractals
– volume: 16
  start-page: 2129
  year: 2006
  end-page: 2151
  ident: bib34
  article-title: Some basic cryptographic requirements for chaos-based cryptosystems
  publication-title: Int. J. Bifurc. Chaos
– reference: A. Rukhin, J. Soto, J. Nechvatal, E. Barker, S. Leigh, M. Levenson, D. Banks, A. Heckert, J. Dray, S. Vo, et al., Statistical test suite for random and pseudorandom number generators for cryptographic applications, nist special publication.
– reference: A.A. Abd El-Latif, X. Niu, M. Amin, A new image cipher in time and frequency domains, Optics Commun.
– volume: 8
  start-page: 1688
  year: 2013
  end-page: 1699
  ident: bib5
  article-title: A roi privacy protection scheme for h. 264 video based on fmo and chaos
  publication-title: IEEE Trans. Inf. Forensics Secur.
– reference: Y. Wang, J. Wang, A new image encryption algorithm based on compound chaotic sequence, in: 2012 International Conference on Measurement, Information and Control (MIC), vol. 2, IEEE, 2012, pp. 962–966.
– reference: D. Socek, S. Li, S.S. Maglivera, B. Furht, Short paper: enhanced 1-d chaotic key based algorithm for image encryption, September, 2005.
– reference: M. Farajallah, S. El Assad, M. Chetto, Dynamic adjustment of the chaos-based security in real-time energy harvesting sensors, in: Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, 2013, pp. 282–289.
– volume: 29
  start-page: 902
  year: 2014
  end-page: 913
  ident: bib15
  article-title: Chaotic image encryption based on circular substitution box and key stream buffer
  publication-title: Signal Process.: Image Commun.
– year: 2006
  ident: bib33
  article-title: Cryptography Theory and Practice
– volume: 28
  start-page: 301
  year: 2013
  end-page: 308
  ident: bib17
  article-title: A novel chaos-based fragile watermarking for image tampering detection and self-recovery
  publication-title: Signal Process.: Image Commun.
– reference: S. EL ASSAD, H. NOURA, Generator of chaotic sequences and corresponding generating system, wO Patent 2,011,121,218 October 7, 2011.
– volume: 28
  start-page: 292
  year: 2013
  end-page: 300
  ident: bib16
  article-title: A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations
  publication-title: Signal Process.: Image Commun.
– volume: 5
  start-page: 111
  year: 2011
  end-page: 120
  ident: bib30
  article-title: Impossible differential cryptanalysis of spn ciphers
  publication-title: IET Inf. Secur.
– volume: 240
  start-page: 50
  year: 1998
  end-page: 54
  ident: bib9
  article-title: Cryptography with chaos
  publication-title: Phys. Lett. A
– volume: 8
  start-page: 1259
  year: 1998
  end-page: 1284
  ident: bib19
  article-title: Symmetric ciphers based on two-dimensional chaotic maps
  publication-title: Int. J. Bifurc. Chaos
– volume: 28
  start-page: 670
  year: 2013
  end-page: 680
  ident: bib18
  article-title: A novel image encryption—compression scheme using hyper-chaos and chinese remainder theorem
  publication-title: Signal Process.: Image Commun.
– volume: 58
  start-page: 445
  year: 2012
  end-page: 452
  ident: bib23
  article-title: Period distribution of generalized discrete arnold cat map for
  publication-title: IEEE Trans. Inf. Theory
– volume: 17
  start-page: 3303
  year: 2012
  end-page: 3327
  ident: bib41
  article-title: On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
– reference: F. Maleki, A. Mohades, S.M. Hashemi, M.E. Shiri, An image encryption system by cellular automata with memory, in: Third International Conference on Availability, Reliability and Security, 2008. ARES 08, IEEE, 2008, pp. 1266–1271.
– reference: C.-Y. Song, Y.-L. Qiao, X.-Z. Zhang, An image encryption scheme based on new spatiotemporal chaos, Opt.—Int. J. Light Electron Opt.
– reference: .
– reference: R.L. Tataru, D. Battikh, S.E. Assad, H. Noura, O. Déforges, Enhanced adaptive data hiding in spatial lsb domain by using chaotic sequences, in: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), IEEE, 2012, pp. 85–88.
– reference: Y. Wu, J.P. Noonan, S. Agaian, Npcr and uaci randomness tests for image encryption, Cyber J.: Multidiscip. J. Sci. Technol., J. Sel. Areas Telecommun. (JSAT), 2011, pp. 31–38.
– reference: R.L. Rivest, M.J. Robshaw, R. Sidney, Y.L. Yin, The rc6 block cipher, in: In First Advanced Encryption Standard (AES) Conference, Citeseer, 1998.
– reference: B.W. Koo, H.S. Jang, J.H. Song, On constructing of a 32×32 binary matrix as a diffusion layer for a 256-bit block cipher, in: Information Security and Cryptology–ICISC 2006, Springer, 2006, pp. 51–64.
– volume: 4
  start-page: 41
  year: 2012
  ident: bib12
  article-title: An efficient chaos-based image encryption scheme using affine modular maps
  publication-title: Int. J. Comput. Netw. Inf. Secur. (IJCNIS)
– volume: 4
  start-page: 3
  year: 1991
  end-page: 72
  ident: bib42
  article-title: Differential cryptanalysis of des-like cryptosystems
  publication-title: J. CRYPTOL.
– volume: 53
  start-page: 1341
  year: 2006
  end-page: 1352
  ident: bib20
  article-title: Chaotic block ciphers
  publication-title: IEEE Trans. Circuits Syst. I: Regul. Pap.
– reference: C.K. Volos, I.M. Kyprianidis, I.N. Stouboulos, Image encryption process based on chaotic synchronization phenomena, Signal Process.
– reference: W. Amidouche, M. Farajallah, M. Raulet, O. Deforges, S. El-Assad, Selective video encryption using chaotic system in the shvc extension, in: In 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP, Brisbane Australia), IEEE, 2015.
– reference: M. Farajallah, Z. Fawaz, S. El Assad, O. Deforges, Efficient image encryption and authentication scheme based on chaotic sequences, in: SECURWARE 2013, The Seventh International Conference on Emerging Security Information, Systems and Technologies, 2013, pp. 150–155.
– volume: 264
  start-page: 317
  year: 2014
  end-page: 339
  ident: bib35
  article-title: Design of image cipher using latin squares
  publication-title: Inf. Sci.
– volume: 29
  start-page: 902
  issue: 8
  year: 2014
  ident: 10.1016/j.image.2015.10.004_bib15
  article-title: Chaotic image encryption based on circular substitution box and key stream buffer
  publication-title: Signal Process.: Image Commun.
– volume: 34
  start-page: 851
  issue: 3
  year: 2007
  ident: 10.1016/j.image.2015.10.004_bib28
  article-title: A chaotic stream cipher and the usage in video protection
  publication-title: Chaos, Solitons & Fractals
  doi: 10.1016/j.chaos.2006.03.120
– ident: 10.1016/j.image.2015.10.004_bib40
– volume: 17
  start-page: 3303
  issue: 8
  year: 2012
  ident: 10.1016/j.image.2015.10.004_bib41
  article-title: On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
  doi: 10.1016/j.cnsns.2011.12.015
– volume: 4
  start-page: 3
  issue: 1
  year: 1991
  ident: 10.1016/j.image.2015.10.004_bib42
  article-title: Differential cryptanalysis of des-like cryptosystems
  publication-title: J. CRYPTOL.
  doi: 10.1007/BF00630563
– year: 2006
  ident: 10.1016/j.image.2015.10.004_bib33
– ident: 10.1016/j.image.2015.10.004_bib25
  doi: 10.1109/IIH-MSP.2012.26
– volume: 28
  start-page: 292
  issue: 3
  year: 2013
  ident: 10.1016/j.image.2015.10.004_bib16
  article-title: A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations
  publication-title: Signal Process.: Image Commun.
– volume: 28
  start-page: 301
  issue: 3
  year: 2013
  ident: 10.1016/j.image.2015.10.004_bib17
  article-title: A novel chaos-based fragile watermarking for image tampering detection and self-recovery
  publication-title: Signal Process.: Image Commun.
– volume: 5
  start-page: 111
  issue: 2
  year: 2011
  ident: 10.1016/j.image.2015.10.004_bib30
  article-title: Impossible differential cryptanalysis of spn ciphers
  publication-title: IET Inf. Secur.
  doi: 10.1049/iet-ifs.2010.0174
– ident: 10.1016/j.image.2015.10.004_bib8
– ident: 10.1016/j.image.2015.10.004_bib10
  doi: 10.1109/GreenCom-iThings-CPSCom.2013.65
– volume: 53
  start-page: 1341
  issue: 6
  year: 2006
  ident: 10.1016/j.image.2015.10.004_bib20
  article-title: Chaotic block ciphers
  publication-title: IEEE Trans. Circuits Syst. I: Regul. Pap.
  doi: 10.1109/TCSI.2006.874182
– volume: 372
  start-page: 2645
  issue: 15
  year: 2008
  ident: 10.1016/j.image.2015.10.004_bib32
  article-title: A fast image encryption scheme based on chaotic standard map
  publication-title: Phys. Lett. A
  doi: 10.1016/j.physleta.2007.12.026
– volume: 3
  start-page: 749
  issue: 4
  year: 2008
  ident: 10.1016/j.image.2015.10.004_bib1
  article-title: Toward compression of encrypted images and video sequences
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2008.2007244
– ident: 10.1016/j.image.2015.10.004_bib6
  doi: 10.1109/ICASSP.2015.7178273
– volume: 2012
  start-page: 15
  year: 2012
  ident: 10.1016/j.image.2015.10.004_bib11
  article-title: A new chaos-based image-encryption and compression algorithm
  publication-title: J. Electr. Comput. Eng.
– volume: 16
  start-page: 2129
  issue: 08
  year: 2006
  ident: 10.1016/j.image.2015.10.004_bib34
  article-title: Some basic cryptographic requirements for chaos-based cryptosystems
  publication-title: Int. J. Bifurc. Chaos
  doi: 10.1142/S0218127406015970
– ident: 10.1016/j.image.2015.10.004_bib44
  doi: 10.1109/ARES.2008.121
– ident: 10.1016/j.image.2015.10.004_bib43
– volume: 58
  start-page: 445
  issue: 1
  year: 2012
  ident: 10.1016/j.image.2015.10.004_bib23
  article-title: Period distribution of generalized discrete arnold cat map for
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.2011.2171534
– ident: 10.1016/j.image.2015.10.004_bib37
– volume: 2
  start-page: 49
  issue: 1
  year: 2012
  ident: 10.1016/j.image.2015.10.004_bib7
  article-title: Image encryption using block based uniform scrambling and chaotic logistic mapping
  publication-title: Int. J. Cryptogr. Inf. Secur. (IJCIS)
– volume: 35
  start-page: 408
  issue: 2
  year: 2008
  ident: 10.1016/j.image.2015.10.004_bib39
  article-title: A novel algorithm for image encryption based on mixture of chaotic maps
  publication-title: Chaos, Solitons & Fractals
  doi: 10.1016/j.chaos.2006.05.011
– ident: 10.1016/j.image.2015.10.004_bib2
– volume: 21
  start-page: 749
  issue: 3
  year: 2004
  ident: 10.1016/j.image.2015.10.004_bib38
  article-title: A symmetric image encryption scheme based on 3d chaotic cat maps
  publication-title: Chaos, Solitons & Fractals
  doi: 10.1016/j.chaos.2003.12.022
– volume: 240
  start-page: 50
  issue: 1
  year: 1998
  ident: 10.1016/j.image.2015.10.004_bib9
  article-title: Cryptography with chaos
  publication-title: Phys. Lett. A
  doi: 10.1016/S0375-9601(98)00086-3
– volume: 26
  start-page: 117
  issue: 1
  year: 2005
  ident: 10.1016/j.image.2015.10.004_bib31
  article-title: A block cipher based on a suitable use of the chaotic standard map
  publication-title: Chaos, Solitons & Fractals
  doi: 10.1016/j.chaos.2004.11.096
– ident: 10.1016/j.image.2015.10.004_bib14
– volume: 15
  start-page: 3507
  issue: 11
  year: 2010
  ident: 10.1016/j.image.2015.10.004_bib22
  article-title: A fast image encryption and authentication scheme based on chaotic maps
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
  doi: 10.1016/j.cnsns.2010.01.004
– volume: 27
  start-page: 249
  issue: 3
  year: 2012
  ident: 10.1016/j.image.2015.10.004_bib4
  article-title: A new image encryption scheme based on a chaotic function
  publication-title: Signal Process.: Image Commun.
– volume: 8
  start-page: 1688
  issue: 10
  year: 2013
  ident: 10.1016/j.image.2015.10.004_bib5
  article-title: A roi privacy protection scheme for h. 264 video based on fmo and chaos
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2013.2259819
– volume: 28
  start-page: 670
  issue: 6
  year: 2013
  ident: 10.1016/j.image.2015.10.004_bib18
  article-title: A novel image encryption—compression scheme using hyper-chaos and chinese remainder theorem
  publication-title: Signal Process.: Image Commun.
– ident: 10.1016/j.image.2015.10.004_bib27
– volume: 17
  start-page: 4653
  issue: 12
  year: 2012
  ident: 10.1016/j.image.2015.10.004_bib36
  article-title: An image encryption scheme based on quantum logistic map
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
  doi: 10.1016/j.cnsns.2012.05.033
– ident: 10.1016/j.image.2015.10.004_bib29
– ident: 10.1016/j.image.2015.10.004_bib3
– year: 2012
  ident: 10.1016/j.image.2015.10.004_bib26
– ident: 10.1016/j.image.2015.10.004_bib24
  doi: 10.1007/11927587_7
– ident: 10.1016/j.image.2015.10.004_bib13
  doi: 10.1109/MIC.2012.6273464
– volume: 264
  start-page: 317
  year: 2014
  ident: 10.1016/j.image.2015.10.004_bib35
  article-title: Design of image cipher using latin squares
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2013.11.027
– volume: 8
  start-page: 1259
  issue: 06
  year: 1998
  ident: 10.1016/j.image.2015.10.004_bib19
  article-title: Symmetric ciphers based on two-dimensional chaotic maps
  publication-title: Int. J. Bifurc. Chaos
  doi: 10.1142/S021812749800098X
– volume: 4
  start-page: 41
  issue: 7
  year: 2012
  ident: 10.1016/j.image.2015.10.004_bib12
  article-title: An efficient chaos-based image encryption scheme using affine modular maps
  publication-title: Int. J. Comput. Netw. Inf. Secur. (IJCNIS)
– ident: 10.1016/j.image.2015.10.004_bib21
SSID ssj0002409
Score 2.48006
Snippet During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose...
During the last decade, a variety of chaos-based cryptosystems has been introduced toprotect the content of the transmitted images. In this paper, we propose a...
SourceID hal
proquest
crossref
elsevier
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 144
SubjectTerms Binary diffusion matrix
Chaos-based cryptosystem
Computer systems
Cryptography
Encryption
Engineering Sciences
Generators
Logic
New formulation of the 2D-cat map
Permutations
Security
Security analysis
Signal and Image processing
Title A new chaos-based image encryption system
URI https://dx.doi.org/10.1016/j.image.2015.10.004
https://www.proquest.com/docview/1825476021
https://hal.science/hal-01218346
Volume 41
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1879-2677
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002409
  issn: 0923-5965
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  customDbUrl:
  eissn: 1879-2677
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002409
  issn: 0923-5965
  databaseCode: ACRLP
  dateStart: 19950201
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Science Direct
  customDbUrl:
  eissn: 1879-2677
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002409
  issn: 0923-5965
  databaseCode: AIKHN
  dateStart: 19950201
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Science Direct
  customDbUrl:
  eissn: 1879-2677
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002409
  issn: 0923-5965
  databaseCode: .~1
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58XPTgW1xfVPEiWLdtmrQ5LqKsz4sK3kKbB67orrir4MXf7kyb-gI9eOyQ0OkkM_O1nXwDsMOTnGdGyJCn6E1pHMkw15oR721RGGFj5-iD_vmF6F6nJzf8ZgwOmrMwVFbpY38d06to7SVtb832Y6_XvowQm3BJrbwJt9Qn2NOMuhjsv32WeWDGqvn2EhbS6IZ5qKrx6j2g01J9F9-vSrzS37LT-C2VSf6I1lUKOpqDGY8dg06t3jyM2f4CzHocGXgvHaKoadXQyBZg-gvv4CLsdgJE04G-LQbDkPKYCSodAxz89FoFkaCmeF6C66PDq4Nu6HsmhJpl0SiU2nGWmjgRRckSa10eSW0RJxgXOUzFmTCsdLoU-N7FUuFchk7MSyt5qaVGrLAME_1B365AkLvEZAgouE1kynVWIPaTNo6cMaxgzrQgaWyltCcUp74W96qpHLtTlfKKDExCNHAL9j4mPdZ8Gn8PF80iqG_bQmHE_3viNi7Zxy2IRLvbOVMkIxa7HJ_9JW7BVrOiCr2KfpUUfTt4HqqYXpwzgQBo9b8arMEUXvkK73WYGD092w0EMKNys9qhmzDZOT7tXrwDNkXr9A
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9tAEB6F9AAc2vISaUtxERcknNhe79p7jFBRCoFLQeK2svehBEESkYDEpb-9M_aaAhIceh3vyuNZz8y39uw3APs8yXlmhAx5it6UxpEMc60Z8d4WhRE2do4-6J-di8FlenLFr1pw1JyFobJKH_vrmF5Fay_peWv2ZuNx73eE2IRLauVNuIVOsH9IeZLRDqz751-dB6asmnAvYSENb6iHqiKv8S16LRV48W5V45W-lZ6WRlQn-SpcVzno-DN89OAx6Nf6rUHLTtbhkweSgXfTOYqaXg2NbB1WnxEPbsBBP0A4HehRMZ2HlMhMUOkY4OC7xyqKBDXH8yZcHv-8OBqEvmlCqFkWLUKpHWepiRNRlCyx1uWR1BaBgnGRw1ycCcNKp0uBGy-WCucy9GJeWslLLTWChS1oT6YTuw1B7hKTIaLgNpEp11mB4E_aOHLGsII504GksZXSnlGcGlvcqKZ07FpVyisyMAnRwB04fJo0qwk13h8umkVQL94LhSH__Yl7uGRPtyAW7UF_qEhGNHY5PvtD3IEfzYoqdCv6V1JM7PR-rmLaOWcCEdCX_9VgF5YHF2dDNfx1fvoVVvCKL_f-Bu3F3b3dQTSzKL9Xb-tfuajtiQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+new+chaos-based+image+encryption+system&rft.jtitle=Signal+processing.+Image+communication&rft.au=El+Assad%2C+Safwan&rft.au=Farajallah%2C+Mousa&rft.date=2016-02-01&rft.pub=Elsevier+B.V&rft.issn=0923-5965&rft.eissn=1879-2677&rft.volume=41&rft.spage=144&rft.epage=157&rft_id=info:doi/10.1016%2Fj.image.2015.10.004&rft.externalDocID=S0923596515001691
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0923-5965&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0923-5965&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0923-5965&client=summon