A new chaos-based image encryption system
During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose a new fast, simple, and robust chaos-based cryptosystem structure and we analyze its performances. The cryptosystem uses a diffusion layer fo...
Saved in:
| Published in | Signal processing. Image communication Vol. 41; pp. 144 - 157 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier B.V
01.02.2016
Elsevier |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0923-5965 1879-2677 |
| DOI | 10.1016/j.image.2015.10.004 |
Cover
| Abstract | During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose a new fast, simple, and robust chaos-based cryptosystem structure and we analyze its performances. The cryptosystem uses a diffusion layer followed by a bit-permutation layer, instead of byte-permutation, to shuffle the positions of the image pixels. Moreover, the permutation layer is achieved by a new proposed formulation of the 2D cat map that allows an efficient implementation, measured by the time complexity, in terms of arithmetic and logic operations, and also, in terms of clock cycles, of the key-dependent permutation process in comparison with the standard one. Hence, it provides a very fast diffusion process to spread the influence of a single bit over the others. The new cryptosystem includes a robust and uniform chaotic pseudo-random generator (a very simplified version of a generator published in our patent) to change the control parameters in each round of the encryption/decryption processes. The generator is highly nonlinear and produces robust sequences of discrete values having very long orbits. The proposed cryptosystem is defined on finite numbers, and its speed is faster than many chaos-based cryptosystems, while having a very high security level. The security analysis and the obtained simulation results show that the proposed cryptosystem is resistant to various types of attacks and it is efficient for hardware and software implementation.
•The proposed chaos-based cryptosystem is a new and efficient structure•It is based on a binary diffusion layer, followed by a bit-permutation layer•The permutation is achieved by an efficient proposed formulation of the 2D cat map.•It has a shorter encryption, while having a very high level of security.•It is adequate for a software and hardware implementations (FPGA card or an ASIC |
|---|---|
| AbstractList | During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose a new fast, simple, and robust chaos-based cryptosystem structure and we analyze its performances. The cryptosystem uses a diffusion layer followed by a bit-permutation layer, instead of byte-permutation, to shuffle the positions of the image pixels. Moreover, the permutation layer is achieved by a new proposed formulation of the 2D cat map that allows an efficient implementation, measured by the time complexity, in terms of arithmetic and logic operations, and also, in terms of clock cycles, of the key-dependent permutation process in comparison with the standard one. Hence, it provides a very fast diffusion process to spread the influence of a single bit over the others. The new cryptosystem includes a robust and uniform chaotic pseudo-random generator (a very simplified version of a generator published in our patent) to change the control parameters in each round of the encryption/decryption processes. The generator is highly nonlinear and produces robust sequences of discrete values having very long orbits. The proposed cryptosystem is defined on finite numbers, and its speed is faster than many chaos-based cryptosystems, while having a very high security level. The security analysis and the obtained simulation results show that the proposed cryptosystem is resistant to various types of attacks and it is efficient for hardware and software implementation. During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose a new fast, simple, and robust chaos-based cryptosystem structure and we analyze its performances. The cryptosystem uses a diffusion layer followed by a bit-permutation layer, instead of byte-permutation, to shuffle the positions of the image pixels. Moreover, the permutation layer is achieved by a new proposed formulation of the 2D cat map that allows an efficient implementation, measured by the time complexity, in terms of arithmetic and logic operations, and also, in terms of clock cycles, of the key-dependent permutation process in comparison with the standard one. Hence, it provides a very fast diffusion process to spread the influence of a single bit over the others. The new cryptosystem includes a robust and uniform chaotic pseudo-random generator (a very simplified version of a generator published in our patent) to change the control parameters in each round of the encryption/decryption processes. The generator is highly nonlinear and produces robust sequences of discrete values having very long orbits. The proposed cryptosystem is defined on finite numbers, and its speed is faster than many chaos-based cryptosystems, while having a very high security level. The security analysis and the obtained simulation results show that the proposed cryptosystem is resistant to various types of attacks and it is efficient for hardware and software implementation. •The proposed chaos-based cryptosystem is a new and efficient structure•It is based on a binary diffusion layer, followed by a bit-permutation layer•The permutation is achieved by an efficient proposed formulation of the 2D cat map.•It has a shorter encryption, while having a very high level of security.•It is adequate for a software and hardware implementations (FPGA card or an ASIC During the last decade, a variety of chaos-based cryptosystems has been introduced toprotect the content of the transmitted images. In this paper, we propose a new fast, simple, and robustchaos-based cryptosystem structure and we analyze its performances. The cryptosystem uses adiffusion layer followed by a bit-permutation layer, instead of byte-permutation, to shuffle thepositions of the image pixels. Moreover, the permutation layer is achieved by a new proposedformulation of the 2D cat map that allows an efficient implementation, measured by the timecomplexity, in terms of arithmetic and logic operations, and also, in terms of clock cycles, of the keydependentpermutation process in comparison with the standard one. Hence, it provides a very fastdiffusion process to spread the influence of a single bit over the others. The new cryptosystem includesa robust and uniform chaotic pseudo-random generator (a very simplified version of a generatorpublished in our patent) to change the control parameters in each round of the encryption/decryptionprocesses. The generator is highly nonlinear and produces robust sequences of discrete values havingvery long orbits. The proposed cryptosystem is defined on finite numbers, and its speed is faster thanmany chaos-based cryptosystems, while having a very high security level. The security analysis and theobtained simulation results show that the proposed cryptosystem is resistant to various types ofattacks and it is efficient for hardware and software implementation. |
| Author | Farajallah, Mousa El Assad, Safwan |
| Author_xml | – sequence: 1 givenname: Safwan surname: El Assad fullname: El Assad, Safwan organization: Ecole polytech – University of Nantes-Rue Christian Pauc-44306, Nantes cedex 3, France – sequence: 2 givenname: Mousa surname: Farajallah fullname: Farajallah, Mousa organization: Ecole polytech – University of Nantes-Rue Christian Pauc-44306, Nantes cedex 3, France |
| BackLink | https://hal.science/hal-01218346$$DView record in HAL |
| BookMark | eNp9kD1PwzAQhi0EEm3hF7BkpEPC2c6XB4aqAopUiQVmy3HO1FWaFDst6r_HaWFh6GTp1fuc754xuWy7Fgm5o5BQoPnDOrEb9YkJA5qFJAFIL8iIloWIWV4Ul2QEgvE4E3l2TcberwGApSBGZDqLWvyO9Ep1Pq6Uxzo6joqw1e6w7W3XRv7ge9zckCujGo-3v--EfDw_vc8X8fLt5XU-W8aaF9DHQpuMpzVluao4QzQlCI1QpLUBk9O0yGteGV3lgqU8zY0pUoCsQpFVWmjG-IRMT3NXqpFbF7ZxB9kpKxezpRwyoIyWAd3T0L0_dbeu-9qh7-XGeo1No1rsdl7SkmXhR2BDVZyq2nXeOzRS214N9_VO2UZSkINKuZbH--WgcgiDysDyf-zfXuepxxOFwdbeopNe26AVa-tQ97Lu7Fn-B9MAjiU |
| CitedBy_id | crossref_primary_10_1007_s10916_017_0809_1 crossref_primary_10_48084_etasr_8557 crossref_primary_10_1155_2020_7913061 crossref_primary_10_1007_s11042_019_07794_9 crossref_primary_10_1007_s11042_024_18803_x crossref_primary_10_1007_s00371_020_01936_z crossref_primary_10_1002_cpe_7187 crossref_primary_10_1063_5_0191005 crossref_primary_10_1088_1674_1056_ac5a43 crossref_primary_10_3390_sym11010082 crossref_primary_10_1007_s11042_020_09775_9 crossref_primary_10_1007_s11517_019_02037_3 crossref_primary_10_1142_S0218127422500043 crossref_primary_10_1007_s11042_019_08282_w crossref_primary_10_1155_2018_8402578 crossref_primary_10_1088_1742_6596_2304_1_012007 crossref_primary_10_1016_j_jksuci_2018_09_015 crossref_primary_10_7498_aps_71_20220466 crossref_primary_10_1007_s11042_018_7000_7 crossref_primary_10_3390_app12199952 crossref_primary_10_1007_s12652_019_01493_x crossref_primary_10_1007_s11042_020_09497_y crossref_primary_10_3390_e23091127 crossref_primary_10_1109_ACCESS_2019_2906292 crossref_primary_10_1007_s11071_017_3390_8 crossref_primary_10_3390_e21080748 crossref_primary_10_3390_e22020243 crossref_primary_10_1007_s11042_021_11644_y crossref_primary_10_1016_j_health_2023_100149 crossref_primary_10_1016_j_ijleo_2020_165838 crossref_primary_10_1007_s00521_020_05447_9 crossref_primary_10_1007_s11042_022_12071_3 crossref_primary_10_1007_s11042_020_09648_1 crossref_primary_10_1016_j_future_2020_02_029 crossref_primary_10_1007_s40998_018_0061_9 crossref_primary_10_1088_1742_6596_1881_4_042010 crossref_primary_10_1109_ACCESS_2024_3432008 crossref_primary_10_3390_sym14020424 crossref_primary_10_1007_s11042_018_6326_5 crossref_primary_10_1007_s13538_023_01268_y crossref_primary_10_1007_s00500_021_06423_8 crossref_primary_10_1007_s11042_022_12471_5 crossref_primary_10_1088_1361_6501_ac329c crossref_primary_10_1007_s11042_017_4953_x crossref_primary_10_1007_s00530_021_00861_y crossref_primary_10_1007_s11071_016_2912_0 crossref_primary_10_1016_j_ijleo_2022_168880 crossref_primary_10_1007_s11235_024_01251_1 crossref_primary_10_3390_e22060640 crossref_primary_10_3390_e23030341 crossref_primary_10_1016_j_sigpro_2019_03_022 crossref_primary_10_1155_2020_8034196 crossref_primary_10_1007_s11042_023_14863_7 crossref_primary_10_1016_j_optlastec_2018_04_030 crossref_primary_10_1016_j_sigpro_2018_11_010 crossref_primary_10_1016_j_optlaseng_2019_05_008 crossref_primary_10_3390_e21080815 crossref_primary_10_1007_s11042_019_08562_5 crossref_primary_10_1007_s11042_018_6471_x crossref_primary_10_1088_1674_1056_26_12_120504 crossref_primary_10_1088_1674_1056_26_2_020504 crossref_primary_10_1155_2020_8937676 crossref_primary_10_1007_s11071_018_4208_z crossref_primary_10_1007_s00500_022_06841_2 crossref_primary_10_1007_s13319_017_0154_7 crossref_primary_10_1109_ACCESS_2019_2916600 crossref_primary_10_1007_s11042_019_08396_1 crossref_primary_10_1155_2020_6665702 crossref_primary_10_1007_s10489_021_02508_x crossref_primary_10_1080_03772063_2023_2284956 crossref_primary_10_1109_ACCESS_2020_3006513 crossref_primary_10_1007_s11042_018_6145_8 crossref_primary_10_1364_OE_555781 crossref_primary_10_1109_ACCESS_2019_2911559 crossref_primary_10_1109_TNB_2017_2780881 crossref_primary_10_1007_s11042_018_7110_2 crossref_primary_10_3390_e22050548 crossref_primary_10_1016_j_sigpro_2019_107280 crossref_primary_10_1002_cpe_6990 crossref_primary_10_1038_s41598_025_85539_5 crossref_primary_10_3390_s19051228 crossref_primary_10_1007_s42835_020_00393_x crossref_primary_10_1080_13682199_2018_1505327 crossref_primary_10_1080_19393555_2024_2312975 crossref_primary_10_1007_s00521_019_04637_4 crossref_primary_10_1088_1402_4896_adaa39 crossref_primary_10_3390_math10122034 crossref_primary_10_1007_s11063_020_10412_7 crossref_primary_10_1007_s12596_024_02405_9 crossref_primary_10_1109_JIOT_2024_3391661 crossref_primary_10_1007_s11042_017_4606_0 crossref_primary_10_3390_e26100885 crossref_primary_10_1007_s11042_021_10719_0 crossref_primary_10_30521_jes_1160773 crossref_primary_10_1109_ACCESS_2018_2858839 crossref_primary_10_1007_s11042_020_08826_5 crossref_primary_10_1007_s10916_016_0611_5 crossref_primary_10_1007_s11042_019_07893_7 crossref_primary_10_1140_epjs_s11734_021_00365_w crossref_primary_10_1007_s11042_022_12791_6 crossref_primary_10_1109_ACCESS_2020_3032403 |
| Cites_doi | 10.1016/j.chaos.2006.03.120 10.1016/j.cnsns.2011.12.015 10.1007/BF00630563 10.1109/IIH-MSP.2012.26 10.1049/iet-ifs.2010.0174 10.1109/GreenCom-iThings-CPSCom.2013.65 10.1109/TCSI.2006.874182 10.1016/j.physleta.2007.12.026 10.1109/TIFS.2008.2007244 10.1109/ICASSP.2015.7178273 10.1142/S0218127406015970 10.1109/ARES.2008.121 10.1109/TIT.2011.2171534 10.1016/j.chaos.2006.05.011 10.1016/j.chaos.2003.12.022 10.1016/S0375-9601(98)00086-3 10.1016/j.chaos.2004.11.096 10.1016/j.cnsns.2010.01.004 10.1109/TIFS.2013.2259819 10.1016/j.cnsns.2012.05.033 10.1007/11927587_7 10.1109/MIC.2012.6273464 10.1016/j.ins.2013.11.027 10.1142/S021812749800098X |
| ContentType | Journal Article |
| Copyright | 2017 Elsevier B.V. Distributed under a Creative Commons Attribution 4.0 International License |
| Copyright_xml | – notice: 2017 Elsevier B.V. – notice: Distributed under a Creative Commons Attribution 4.0 International License |
| DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D 1XC |
| DOI | 10.1016/j.image.2015.10.004 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Hyper Article en Ligne (HAL) |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences Engineering Computer Science |
| EISSN | 1879-2677 |
| EndPage | 157 |
| ExternalDocumentID | oai:HAL:hal-01218346v1 10_1016_j_image_2015_10_004 S0923596515001691 |
| GroupedDBID | --K --M .DC .~1 0R~ 123 1B1 1~. 1~5 4.4 457 4G. 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K WUQ XPP ZMT ~G- AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ADNMO AEIPS AFJKZ AGQPQ AIIUN ANKPU APXCP CITATION EFKBS ~HD 7SC 7SP 8FD JQ2 L7M L~C L~D 1XC |
| ID | FETCH-LOGICAL-c370t-9cf534d126ab32eef809ce074df0f61476d3bfcb6924346ff74005be95bc9c223 |
| IEDL.DBID | .~1 |
| ISSN | 0923-5965 |
| IngestDate | Tue Oct 14 20:13:14 EDT 2025 Sat Sep 27 17:01:58 EDT 2025 Wed Oct 01 03:57:10 EDT 2025 Thu Apr 24 23:08:05 EDT 2025 Fri Feb 23 02:28:18 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Binary diffusion matrix Chaos-based cryptosystem New formulation of the 2D-cat map Security analysis binary diffusion matrix security analysis new formulation of the 2D-cat map |
| Language | English |
| License | Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c370t-9cf534d126ab32eef809ce074df0f61476d3bfcb6924346ff74005be95bc9c223 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| PQID | 1825476021 |
| PQPubID | 23500 |
| PageCount | 14 |
| ParticipantIDs | hal_primary_oai_HAL_hal_01218346v1 proquest_miscellaneous_1825476021 crossref_citationtrail_10_1016_j_image_2015_10_004 crossref_primary_10_1016_j_image_2015_10_004 elsevier_sciencedirect_doi_10_1016_j_image_2015_10_004 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2016-02-01 |
| PublicationDateYYYYMMDD | 2016-02-01 |
| PublicationDate_xml | – month: 02 year: 2016 text: 2016-02-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | Signal processing. Image communication |
| PublicationYear | 2016 |
| Publisher | Elsevier B.V Elsevier |
| Publisher_xml | – name: Elsevier B.V – name: Elsevier |
| References | Al-Maadeed, Al-Ali, Abdalla (bib11) 2012; 2012 Stinson (bib33) 2006 D. Socek, S. Li, S.S. Maglivera, B. Furht, Short paper: enhanced 1-d chaotic key based algorithm for image encryption, September, 2005. C.-Y. Song, Y.-L. Qiao, X.-Z. Zhang, An image encryption scheme based on new spatiotemporal chaos, Opt.—Int. J. Light Electron Opt. Alvarez, Li (bib34) 2006; 16 A. Rukhin, J. Soto, J. Nechvatal, E. Barker, S. Leigh, M. Levenson, D. Banks, A. Heckert, J. Dray, S. Vo, et al., Statistical test suite for random and pseudorandom number generators for cryptographic applications, nist special publication. Li, Sun, Li (bib30) 2011; 5 B.W. Koo, H.S. Jang, J.H. Song, On constructing of a 32×32 binary matrix as a diffusion layer for a 256-bit block cipher, in: Information Security and Cryptology–ICISC 2006, Springer, 2006, pp. 51–64. Biham, Shamir (bib42) 1991; 4 Peng, Zhu, Long (bib5) 2013; 8 Behnia, Akhshani, Mahmodi, Akhavan (bib39) 2008; 35 Lian, Sun, Wang, Wang (bib28) 2007; 34 Chen, Wong, Liao, Xiang (bib23) 2012; 58 Fog (bib26) 2012 François, Grosges, Barchiesi, Erra (bib4) 2012; 27 Masuda, Jakimoski, Aihara, Kocarev (bib20) 2006; 53 R.L. Tataru, D. Battikh, S.E. Assad, H. Noura, O. Déforges, Enhanced adaptive data hiding in spatial lsb domain by using chaotic sequences, in: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), IEEE, 2012, pp. 85–88. Wu, Zhou, Noonan, Agaian (bib35) 2014; 264 Wong, Kwok, Law (bib32) 2008; 372 R.L. Rivest, M.J. Robshaw, R. Sidney, Y.L. Yin, The rc6 block cipher, in: In First Advanced Encryption Standard (AES) Conference, Citeseer, 1998. Zhang, Zhao, Wang (bib15) 2014; 29 Zhang, Xiao, Shu, Li (bib16) 2013; 28 Chen, Mao, Chui (bib38) 2004; 21 Zhu, Zhao, Zhang (bib18) 2013; 28 S. EL ASSAD, H. NOURA, Generator of chaotic sequences and corresponding generating system, wO Patent 2,011,121,218 October 7, 2011. Yang, Wong, Liao, Zhang, Wei (bib22) 2010; 15 Akhshani, Akhavan, Lim, Hassan (bib36) 2012; 17 C.K. Volos, I.M. Kyprianidis, I.N. Stouboulos, Image encryption process based on chaotic synchronization phenomena, Signal Process. B. Schneier, Applied cryptography. Protocols, algorithms, and source code in c/bruce schneier, 1996. Schonberg, Draper, Yeo, Ramchandran (bib1) 2008; 3 Baptista (bib9) 1998; 240 Fridrich (bib19) 1998; 8 A.A. Abd El-Latif, X. Niu, M. Amin, A new image cipher in time and frequency domains, Optics Commun. . Ye, Zhao (bib12) 2012; 4 Zhao, Adhikari, Xiao, Sakurai (bib41) 2012; 17 Y. Wang, J. Wang, A new image encryption algorithm based on compound chaotic sequence, in: 2012 International Conference on Measurement, Information and Control (MIC), vol. 2, IEEE, 2012, pp. 962–966. Tong, Liu, Zhang, Chen (bib17) 2013; 28 Y. Wu, J.P. Noonan, S. Agaian, Npcr and uaci randomness tests for image encryption, Cyber J.: Multidiscip. J. Sci. Technol., J. Sel. Areas Telecommun. (JSAT), 2011, pp. 31–38. Rakesh, Kaller, Shadakshari, Annappa (bib7) 2012; 2 M. Farajallah, Z. Fawaz, S. El Assad, O. Deforges, Efficient image encryption and authentication scheme based on chaotic sequences, in: SECURWARE 2013, The Seventh International Conference on Emerging Security Information, Systems and Technologies, 2013, pp. 150–155. Lian, Sun, Wang (bib31) 2005; 26 M. Farajallah, S. El Assad, M. Chetto, Dynamic adjustment of the chaos-based security in real-time energy harvesting sensors, in: Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, 2013, pp. 282–289. W. Amidouche, M. Farajallah, M. Raulet, O. Deforges, S. El-Assad, Selective video encryption using chaotic system in the shvc extension, in: In 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP, Brisbane Australia), IEEE, 2015. F. Maleki, A. Mohades, S.M. Hashemi, M.E. Shiri, An image encryption system by cellular automata with memory, in: Third International Conference on Availability, Reliability and Security, 2008. ARES 08, IEEE, 2008, pp. 1266–1271. Baptista (10.1016/j.image.2015.10.004_bib9) 1998; 240 10.1016/j.image.2015.10.004_bib10 10.1016/j.image.2015.10.004_bib37 10.1016/j.image.2015.10.004_bib13 Li (10.1016/j.image.2015.10.004_bib30) 2011; 5 Lian (10.1016/j.image.2015.10.004_bib31) 2005; 26 10.1016/j.image.2015.10.004_bib14 Schonberg (10.1016/j.image.2015.10.004_bib1) 2008; 3 Zhao (10.1016/j.image.2015.10.004_bib41) 2012; 17 Fog (10.1016/j.image.2015.10.004_bib26) 2012 Al-Maadeed (10.1016/j.image.2015.10.004_bib11) 2012; 2012 Ye (10.1016/j.image.2015.10.004_bib12) 2012; 4 10.1016/j.image.2015.10.004_bib29 Zhu (10.1016/j.image.2015.10.004_bib18) 2013; 28 François (10.1016/j.image.2015.10.004_bib4) 2012; 27 Zhang (10.1016/j.image.2015.10.004_bib15) 2014; 29 10.1016/j.image.2015.10.004_bib44 Wong (10.1016/j.image.2015.10.004_bib32) 2008; 372 Biham (10.1016/j.image.2015.10.004_bib42) 1991; 4 10.1016/j.image.2015.10.004_bib3 Masuda (10.1016/j.image.2015.10.004_bib20) 2006; 53 10.1016/j.image.2015.10.004_bib2 10.1016/j.image.2015.10.004_bib21 Wu (10.1016/j.image.2015.10.004_bib35) 2014; 264 10.1016/j.image.2015.10.004_bib43 10.1016/j.image.2015.10.004_bib8 10.1016/j.image.2015.10.004_bib27 10.1016/j.image.2015.10.004_bib24 10.1016/j.image.2015.10.004_bib6 Rakesh (10.1016/j.image.2015.10.004_bib7) 2012; 2 Fridrich (10.1016/j.image.2015.10.004_bib19) 1998; 8 10.1016/j.image.2015.10.004_bib25 Yang (10.1016/j.image.2015.10.004_bib22) 2010; 15 Zhang (10.1016/j.image.2015.10.004_bib16) 2013; 28 Lian (10.1016/j.image.2015.10.004_bib28) 2007; 34 Chen (10.1016/j.image.2015.10.004_bib38) 2004; 21 10.1016/j.image.2015.10.004_bib40 Stinson (10.1016/j.image.2015.10.004_bib33) 2006 Behnia (10.1016/j.image.2015.10.004_bib39) 2008; 35 Tong (10.1016/j.image.2015.10.004_bib17) 2013; 28 Chen (10.1016/j.image.2015.10.004_bib23) 2012; 58 Akhshani (10.1016/j.image.2015.10.004_bib36) 2012; 17 Alvarez (10.1016/j.image.2015.10.004_bib34) 2006; 16 Peng (10.1016/j.image.2015.10.004_bib5) 2013; 8 |
| References_xml | – volume: 34 start-page: 851 year: 2007 end-page: 859 ident: bib28 article-title: A chaotic stream cipher and the usage in video protection publication-title: Chaos, Solitons & Fractals – volume: 21 start-page: 749 year: 2004 end-page: 761 ident: bib38 article-title: A symmetric image encryption scheme based on 3d chaotic cat maps publication-title: Chaos, Solitons & Fractals – volume: 2 start-page: 49 year: 2012 end-page: 57 ident: bib7 article-title: Image encryption using block based uniform scrambling and chaotic logistic mapping publication-title: Int. J. Cryptogr. Inf. Secur. (IJCIS) – volume: 26 start-page: 117 year: 2005 end-page: 129 ident: bib31 article-title: A block cipher based on a suitable use of the chaotic standard map publication-title: Chaos, Solitons & Fractals – volume: 15 start-page: 3507 year: 2010 end-page: 3517 ident: bib22 article-title: A fast image encryption and authentication scheme based on chaotic maps publication-title: Commun. Nonlinear Sci. Numer. Simul. – year: 2012 ident: bib26 article-title: Lists of Instruction Latencies, Throughputs and Micro-Operation Breakdowns for Intel, amd and via cpus – volume: 27 start-page: 249 year: 2012 end-page: 259 ident: bib4 article-title: A new image encryption scheme based on a chaotic function publication-title: Signal Process.: Image Commun. – volume: 17 start-page: 4653 year: 2012 end-page: 4661 ident: bib36 article-title: An image encryption scheme based on quantum logistic map publication-title: Commun. Nonlinear Sci. Numer. Simul. – volume: 3 start-page: 749 year: 2008 end-page: 762 ident: bib1 article-title: Toward compression of encrypted images and video sequences publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 2012 start-page: 15 year: 2012 ident: bib11 article-title: A new chaos-based image-encryption and compression algorithm publication-title: J. Electr. Comput. Eng. – volume: 372 start-page: 2645 year: 2008 end-page: 2652 ident: bib32 article-title: A fast image encryption scheme based on chaotic standard map publication-title: Phys. Lett. A – reference: B. Schneier, Applied cryptography. Protocols, algorithms, and source code in c/bruce schneier, 1996. – volume: 35 start-page: 408 year: 2008 end-page: 419 ident: bib39 article-title: A novel algorithm for image encryption based on mixture of chaotic maps publication-title: Chaos, Solitons & Fractals – volume: 16 start-page: 2129 year: 2006 end-page: 2151 ident: bib34 article-title: Some basic cryptographic requirements for chaos-based cryptosystems publication-title: Int. J. Bifurc. Chaos – reference: A. Rukhin, J. Soto, J. Nechvatal, E. Barker, S. Leigh, M. Levenson, D. Banks, A. Heckert, J. Dray, S. Vo, et al., Statistical test suite for random and pseudorandom number generators for cryptographic applications, nist special publication. – reference: A.A. Abd El-Latif, X. Niu, M. Amin, A new image cipher in time and frequency domains, Optics Commun. – volume: 8 start-page: 1688 year: 2013 end-page: 1699 ident: bib5 article-title: A roi privacy protection scheme for h. 264 video based on fmo and chaos publication-title: IEEE Trans. Inf. Forensics Secur. – reference: Y. Wang, J. Wang, A new image encryption algorithm based on compound chaotic sequence, in: 2012 International Conference on Measurement, Information and Control (MIC), vol. 2, IEEE, 2012, pp. 962–966. – reference: D. Socek, S. Li, S.S. Maglivera, B. Furht, Short paper: enhanced 1-d chaotic key based algorithm for image encryption, September, 2005. – reference: M. Farajallah, S. El Assad, M. Chetto, Dynamic adjustment of the chaos-based security in real-time energy harvesting sensors, in: Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, 2013, pp. 282–289. – volume: 29 start-page: 902 year: 2014 end-page: 913 ident: bib15 article-title: Chaotic image encryption based on circular substitution box and key stream buffer publication-title: Signal Process.: Image Commun. – year: 2006 ident: bib33 article-title: Cryptography Theory and Practice – volume: 28 start-page: 301 year: 2013 end-page: 308 ident: bib17 article-title: A novel chaos-based fragile watermarking for image tampering detection and self-recovery publication-title: Signal Process.: Image Commun. – reference: S. EL ASSAD, H. NOURA, Generator of chaotic sequences and corresponding generating system, wO Patent 2,011,121,218 October 7, 2011. – volume: 28 start-page: 292 year: 2013 end-page: 300 ident: bib16 article-title: A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations publication-title: Signal Process.: Image Commun. – volume: 5 start-page: 111 year: 2011 end-page: 120 ident: bib30 article-title: Impossible differential cryptanalysis of spn ciphers publication-title: IET Inf. Secur. – volume: 240 start-page: 50 year: 1998 end-page: 54 ident: bib9 article-title: Cryptography with chaos publication-title: Phys. Lett. A – volume: 8 start-page: 1259 year: 1998 end-page: 1284 ident: bib19 article-title: Symmetric ciphers based on two-dimensional chaotic maps publication-title: Int. J. Bifurc. Chaos – volume: 28 start-page: 670 year: 2013 end-page: 680 ident: bib18 article-title: A novel image encryption—compression scheme using hyper-chaos and chinese remainder theorem publication-title: Signal Process.: Image Commun. – volume: 58 start-page: 445 year: 2012 end-page: 452 ident: bib23 article-title: Period distribution of generalized discrete arnold cat map for publication-title: IEEE Trans. Inf. Theory – volume: 17 start-page: 3303 year: 2012 end-page: 3327 ident: bib41 article-title: On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption publication-title: Commun. Nonlinear Sci. Numer. Simul. – reference: F. Maleki, A. Mohades, S.M. Hashemi, M.E. Shiri, An image encryption system by cellular automata with memory, in: Third International Conference on Availability, Reliability and Security, 2008. ARES 08, IEEE, 2008, pp. 1266–1271. – reference: C.-Y. Song, Y.-L. Qiao, X.-Z. Zhang, An image encryption scheme based on new spatiotemporal chaos, Opt.—Int. J. Light Electron Opt. – reference: . – reference: R.L. Tataru, D. Battikh, S.E. Assad, H. Noura, O. Déforges, Enhanced adaptive data hiding in spatial lsb domain by using chaotic sequences, in: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), IEEE, 2012, pp. 85–88. – reference: Y. Wu, J.P. Noonan, S. Agaian, Npcr and uaci randomness tests for image encryption, Cyber J.: Multidiscip. J. Sci. Technol., J. Sel. Areas Telecommun. (JSAT), 2011, pp. 31–38. – reference: R.L. Rivest, M.J. Robshaw, R. Sidney, Y.L. Yin, The rc6 block cipher, in: In First Advanced Encryption Standard (AES) Conference, Citeseer, 1998. – reference: B.W. Koo, H.S. Jang, J.H. Song, On constructing of a 32×32 binary matrix as a diffusion layer for a 256-bit block cipher, in: Information Security and Cryptology–ICISC 2006, Springer, 2006, pp. 51–64. – volume: 4 start-page: 41 year: 2012 ident: bib12 article-title: An efficient chaos-based image encryption scheme using affine modular maps publication-title: Int. J. Comput. Netw. Inf. Secur. (IJCNIS) – volume: 4 start-page: 3 year: 1991 end-page: 72 ident: bib42 article-title: Differential cryptanalysis of des-like cryptosystems publication-title: J. CRYPTOL. – volume: 53 start-page: 1341 year: 2006 end-page: 1352 ident: bib20 article-title: Chaotic block ciphers publication-title: IEEE Trans. Circuits Syst. I: Regul. Pap. – reference: C.K. Volos, I.M. Kyprianidis, I.N. Stouboulos, Image encryption process based on chaotic synchronization phenomena, Signal Process. – reference: W. Amidouche, M. Farajallah, M. Raulet, O. Deforges, S. El-Assad, Selective video encryption using chaotic system in the shvc extension, in: In 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP, Brisbane Australia), IEEE, 2015. – reference: M. Farajallah, Z. Fawaz, S. El Assad, O. Deforges, Efficient image encryption and authentication scheme based on chaotic sequences, in: SECURWARE 2013, The Seventh International Conference on Emerging Security Information, Systems and Technologies, 2013, pp. 150–155. – volume: 264 start-page: 317 year: 2014 end-page: 339 ident: bib35 article-title: Design of image cipher using latin squares publication-title: Inf. Sci. – volume: 29 start-page: 902 issue: 8 year: 2014 ident: 10.1016/j.image.2015.10.004_bib15 article-title: Chaotic image encryption based on circular substitution box and key stream buffer publication-title: Signal Process.: Image Commun. – volume: 34 start-page: 851 issue: 3 year: 2007 ident: 10.1016/j.image.2015.10.004_bib28 article-title: A chaotic stream cipher and the usage in video protection publication-title: Chaos, Solitons & Fractals doi: 10.1016/j.chaos.2006.03.120 – ident: 10.1016/j.image.2015.10.004_bib40 – volume: 17 start-page: 3303 issue: 8 year: 2012 ident: 10.1016/j.image.2015.10.004_bib41 article-title: On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption publication-title: Commun. Nonlinear Sci. Numer. Simul. doi: 10.1016/j.cnsns.2011.12.015 – volume: 4 start-page: 3 issue: 1 year: 1991 ident: 10.1016/j.image.2015.10.004_bib42 article-title: Differential cryptanalysis of des-like cryptosystems publication-title: J. CRYPTOL. doi: 10.1007/BF00630563 – year: 2006 ident: 10.1016/j.image.2015.10.004_bib33 – ident: 10.1016/j.image.2015.10.004_bib25 doi: 10.1109/IIH-MSP.2012.26 – volume: 28 start-page: 292 issue: 3 year: 2013 ident: 10.1016/j.image.2015.10.004_bib16 article-title: A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations publication-title: Signal Process.: Image Commun. – volume: 28 start-page: 301 issue: 3 year: 2013 ident: 10.1016/j.image.2015.10.004_bib17 article-title: A novel chaos-based fragile watermarking for image tampering detection and self-recovery publication-title: Signal Process.: Image Commun. – volume: 5 start-page: 111 issue: 2 year: 2011 ident: 10.1016/j.image.2015.10.004_bib30 article-title: Impossible differential cryptanalysis of spn ciphers publication-title: IET Inf. Secur. doi: 10.1049/iet-ifs.2010.0174 – ident: 10.1016/j.image.2015.10.004_bib8 – ident: 10.1016/j.image.2015.10.004_bib10 doi: 10.1109/GreenCom-iThings-CPSCom.2013.65 – volume: 53 start-page: 1341 issue: 6 year: 2006 ident: 10.1016/j.image.2015.10.004_bib20 article-title: Chaotic block ciphers publication-title: IEEE Trans. Circuits Syst. I: Regul. Pap. doi: 10.1109/TCSI.2006.874182 – volume: 372 start-page: 2645 issue: 15 year: 2008 ident: 10.1016/j.image.2015.10.004_bib32 article-title: A fast image encryption scheme based on chaotic standard map publication-title: Phys. Lett. A doi: 10.1016/j.physleta.2007.12.026 – volume: 3 start-page: 749 issue: 4 year: 2008 ident: 10.1016/j.image.2015.10.004_bib1 article-title: Toward compression of encrypted images and video sequences publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2008.2007244 – ident: 10.1016/j.image.2015.10.004_bib6 doi: 10.1109/ICASSP.2015.7178273 – volume: 2012 start-page: 15 year: 2012 ident: 10.1016/j.image.2015.10.004_bib11 article-title: A new chaos-based image-encryption and compression algorithm publication-title: J. Electr. Comput. Eng. – volume: 16 start-page: 2129 issue: 08 year: 2006 ident: 10.1016/j.image.2015.10.004_bib34 article-title: Some basic cryptographic requirements for chaos-based cryptosystems publication-title: Int. J. Bifurc. Chaos doi: 10.1142/S0218127406015970 – ident: 10.1016/j.image.2015.10.004_bib44 doi: 10.1109/ARES.2008.121 – ident: 10.1016/j.image.2015.10.004_bib43 – volume: 58 start-page: 445 issue: 1 year: 2012 ident: 10.1016/j.image.2015.10.004_bib23 article-title: Period distribution of generalized discrete arnold cat map for publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.2011.2171534 – ident: 10.1016/j.image.2015.10.004_bib37 – volume: 2 start-page: 49 issue: 1 year: 2012 ident: 10.1016/j.image.2015.10.004_bib7 article-title: Image encryption using block based uniform scrambling and chaotic logistic mapping publication-title: Int. J. Cryptogr. Inf. Secur. (IJCIS) – volume: 35 start-page: 408 issue: 2 year: 2008 ident: 10.1016/j.image.2015.10.004_bib39 article-title: A novel algorithm for image encryption based on mixture of chaotic maps publication-title: Chaos, Solitons & Fractals doi: 10.1016/j.chaos.2006.05.011 – ident: 10.1016/j.image.2015.10.004_bib2 – volume: 21 start-page: 749 issue: 3 year: 2004 ident: 10.1016/j.image.2015.10.004_bib38 article-title: A symmetric image encryption scheme based on 3d chaotic cat maps publication-title: Chaos, Solitons & Fractals doi: 10.1016/j.chaos.2003.12.022 – volume: 240 start-page: 50 issue: 1 year: 1998 ident: 10.1016/j.image.2015.10.004_bib9 article-title: Cryptography with chaos publication-title: Phys. Lett. A doi: 10.1016/S0375-9601(98)00086-3 – volume: 26 start-page: 117 issue: 1 year: 2005 ident: 10.1016/j.image.2015.10.004_bib31 article-title: A block cipher based on a suitable use of the chaotic standard map publication-title: Chaos, Solitons & Fractals doi: 10.1016/j.chaos.2004.11.096 – ident: 10.1016/j.image.2015.10.004_bib14 – volume: 15 start-page: 3507 issue: 11 year: 2010 ident: 10.1016/j.image.2015.10.004_bib22 article-title: A fast image encryption and authentication scheme based on chaotic maps publication-title: Commun. Nonlinear Sci. Numer. Simul. doi: 10.1016/j.cnsns.2010.01.004 – volume: 27 start-page: 249 issue: 3 year: 2012 ident: 10.1016/j.image.2015.10.004_bib4 article-title: A new image encryption scheme based on a chaotic function publication-title: Signal Process.: Image Commun. – volume: 8 start-page: 1688 issue: 10 year: 2013 ident: 10.1016/j.image.2015.10.004_bib5 article-title: A roi privacy protection scheme for h. 264 video based on fmo and chaos publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2013.2259819 – volume: 28 start-page: 670 issue: 6 year: 2013 ident: 10.1016/j.image.2015.10.004_bib18 article-title: A novel image encryption—compression scheme using hyper-chaos and chinese remainder theorem publication-title: Signal Process.: Image Commun. – ident: 10.1016/j.image.2015.10.004_bib27 – volume: 17 start-page: 4653 issue: 12 year: 2012 ident: 10.1016/j.image.2015.10.004_bib36 article-title: An image encryption scheme based on quantum logistic map publication-title: Commun. Nonlinear Sci. Numer. Simul. doi: 10.1016/j.cnsns.2012.05.033 – ident: 10.1016/j.image.2015.10.004_bib29 – ident: 10.1016/j.image.2015.10.004_bib3 – year: 2012 ident: 10.1016/j.image.2015.10.004_bib26 – ident: 10.1016/j.image.2015.10.004_bib24 doi: 10.1007/11927587_7 – ident: 10.1016/j.image.2015.10.004_bib13 doi: 10.1109/MIC.2012.6273464 – volume: 264 start-page: 317 year: 2014 ident: 10.1016/j.image.2015.10.004_bib35 article-title: Design of image cipher using latin squares publication-title: Inf. Sci. doi: 10.1016/j.ins.2013.11.027 – volume: 8 start-page: 1259 issue: 06 year: 1998 ident: 10.1016/j.image.2015.10.004_bib19 article-title: Symmetric ciphers based on two-dimensional chaotic maps publication-title: Int. J. Bifurc. Chaos doi: 10.1142/S021812749800098X – volume: 4 start-page: 41 issue: 7 year: 2012 ident: 10.1016/j.image.2015.10.004_bib12 article-title: An efficient chaos-based image encryption scheme using affine modular maps publication-title: Int. J. Comput. Netw. Inf. Secur. (IJCNIS) – ident: 10.1016/j.image.2015.10.004_bib21 |
| SSID | ssj0002409 |
| Score | 2.48006 |
| Snippet | During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose... During the last decade, a variety of chaos-based cryptosystems has been introduced toprotect the content of the transmitted images. In this paper, we propose a... |
| SourceID | hal proquest crossref elsevier |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 144 |
| SubjectTerms | Binary diffusion matrix Chaos-based cryptosystem Computer systems Cryptography Encryption Engineering Sciences Generators Logic New formulation of the 2D-cat map Permutations Security Security analysis Signal and Image processing |
| Title | A new chaos-based image encryption system |
| URI | https://dx.doi.org/10.1016/j.image.2015.10.004 https://www.proquest.com/docview/1825476021 https://hal.science/hal-01218346 |
| Volume | 41 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1879-2677 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002409 issn: 0923-5965 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] customDbUrl: eissn: 1879-2677 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002409 issn: 0923-5965 databaseCode: ACRLP dateStart: 19950201 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Science Direct customDbUrl: eissn: 1879-2677 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002409 issn: 0923-5965 databaseCode: AIKHN dateStart: 19950201 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Science Direct customDbUrl: eissn: 1879-2677 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002409 issn: 0923-5965 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58XPTgW1xfVPEiWLdtmrQ5LqKsz4sK3kKbB67orrir4MXf7kyb-gI9eOyQ0OkkM_O1nXwDsMOTnGdGyJCn6E1pHMkw15oR721RGGFj5-iD_vmF6F6nJzf8ZgwOmrMwVFbpY38d06to7SVtb832Y6_XvowQm3BJrbwJt9Qn2NOMuhjsv32WeWDGqvn2EhbS6IZ5qKrx6j2g01J9F9-vSrzS37LT-C2VSf6I1lUKOpqDGY8dg06t3jyM2f4CzHocGXgvHaKoadXQyBZg-gvv4CLsdgJE04G-LQbDkPKYCSodAxz89FoFkaCmeF6C66PDq4Nu6HsmhJpl0SiU2nGWmjgRRckSa10eSW0RJxgXOUzFmTCsdLoU-N7FUuFchk7MSyt5qaVGrLAME_1B365AkLvEZAgouE1kynVWIPaTNo6cMaxgzrQgaWyltCcUp74W96qpHLtTlfKKDExCNHAL9j4mPdZ8Gn8PF80iqG_bQmHE_3viNi7Zxy2IRLvbOVMkIxa7HJ_9JW7BVrOiCr2KfpUUfTt4HqqYXpwzgQBo9b8arMEUXvkK73WYGD092w0EMKNys9qhmzDZOT7tXrwDNkXr9A |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9tAEB6F9AAc2vISaUtxERcknNhe79p7jFBRCoFLQeK2svehBEESkYDEpb-9M_aaAhIceh3vyuNZz8y39uw3APs8yXlmhAx5it6UxpEMc60Z8d4WhRE2do4-6J-di8FlenLFr1pw1JyFobJKH_vrmF5Fay_peWv2ZuNx73eE2IRLauVNuIVOsH9IeZLRDqz751-dB6asmnAvYSENb6iHqiKv8S16LRV48W5V45W-lZ6WRlQn-SpcVzno-DN89OAx6Nf6rUHLTtbhkweSgXfTOYqaXg2NbB1WnxEPbsBBP0A4HehRMZ2HlMhMUOkY4OC7xyqKBDXH8yZcHv-8OBqEvmlCqFkWLUKpHWepiRNRlCyx1uWR1BaBgnGRw1ycCcNKp0uBGy-WCucy9GJeWslLLTWChS1oT6YTuw1B7hKTIaLgNpEp11mB4E_aOHLGsII504GksZXSnlGcGlvcqKZ07FpVyisyMAnRwB04fJo0qwk13h8umkVQL94LhSH__Yl7uGRPtyAW7UF_qEhGNHY5PvtD3IEfzYoqdCv6V1JM7PR-rmLaOWcCEdCX_9VgF5YHF2dDNfx1fvoVVvCKL_f-Bu3F3b3dQTSzKL9Xb-tfuajtiQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+new+chaos-based+image+encryption+system&rft.jtitle=Signal+processing.+Image+communication&rft.au=El+Assad%2C+Safwan&rft.au=Farajallah%2C+Mousa&rft.date=2016-02-01&rft.pub=Elsevier+B.V&rft.issn=0923-5965&rft.eissn=1879-2677&rft.volume=41&rft.spage=144&rft.epage=157&rft_id=info:doi/10.1016%2Fj.image.2015.10.004&rft.externalDocID=S0923596515001691 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0923-5965&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0923-5965&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0923-5965&client=summon |