A novel image encryption algorithm based on chaotic maps and GF(28) exponent transformation
In this paper, we propose an image encryption algorithm that is based on GF(2 8 ) transformations, using the Arnold cat map and incorporating the nonlinear chaotic algorithm. The plain image is processed with the nonlinear chaotic algorithm and is shuffled iteratively with the Arnold cat map, while...
Saved in:
| Published in | Nonlinear dynamics Vol. 72; no. 1-2; pp. 399 - 406 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
Dordrecht
Springer Netherlands
01.04.2013
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0924-090X 1573-269X |
| DOI | 10.1007/s11071-012-0723-5 |
Cover
| Abstract | In this paper, we propose an image encryption algorithm that is based on GF(2
8
) transformations, using the Arnold cat map and incorporating the nonlinear chaotic algorithm. The plain image is processed with the nonlinear chaotic algorithm and is shuffled iteratively with the Arnold cat map, while transforming the image pixel values into GF(2
8
). We show that the encryption characteristics of this approach are better as compared to some well known encryption algorithms. |
|---|---|
| AbstractList | In this paper, we propose an image encryption algorithm that is based on GF(28) transformations, using the Arnold cat map and incorporating the nonlinear chaotic algorithm. The plain image is processed with the nonlinear chaotic algorithm and is shuffled iteratively with the Arnold cat map, while transforming the image pixel values into GF(28). We show that the encryption characteristics of this approach are better as compared to some well known encryption algorithms. In this paper, we propose an image encryption algorithm that is based on GF(2 8 ) transformations, using the Arnold cat map and incorporating the nonlinear chaotic algorithm. The plain image is processed with the nonlinear chaotic algorithm and is shuffled iteratively with the Arnold cat map, while transforming the image pixel values into GF(2 8 ). We show that the encryption characteristics of this approach are better as compared to some well known encryption algorithms. |
| Author | Hussain, Iqtadar Mahmood, Hasan Shah, Tariq Gondal, Muhammad Asif |
| Author_xml | – sequence: 1 givenname: Iqtadar surname: Hussain fullname: Hussain, Iqtadar email: iqtadarqau@gmail.com organization: Department of Mathematics, Quaid-i-Azam University – sequence: 2 givenname: Tariq surname: Shah fullname: Shah, Tariq organization: Department of Mathematics, Quaid-i-Azam University – sequence: 3 givenname: Muhammad Asif surname: Gondal fullname: Gondal, Muhammad Asif organization: Department of Sciences and Humanities, National University of Computer and Emerging Sciences – sequence: 4 givenname: Hasan surname: Mahmood fullname: Mahmood, Hasan organization: Department of Electronics, Quaid-i-Azam University |
| BookMark | eNp9kE1LxDAQhoMouH78AG8BL3qoTtKmSY4ifoHgRUHwELLpdK20SU26ov_erCsIgp4GhveZeXl2yKYPHgk5YHDCAORpYgwkK4DxAiQvC7FBZkzIsuC1ftwkM9C8KkDD4zbZSekFAEoOakaezqgPb9jTbrALpOhd_BinLnhq-0WI3fQ80LlN2NC8cs82TJ2jgx0Ttb6hV5dHXB1TfB9zGz_RKVqf2hAHuzqxR7Za2yfc_5675OHy4v78uri9u7o5P7stXKn4VNSIElA6XTotlBMIEpRonWrBCgGoVMsVOlc3HDjWdeOYhkbN58JZwFKWu-RofXeM4XWJaTJDlxz2vfUYlsmwimulJKvKHD38FX0Jy-hzO8O50BXnla5yiq1TLoaUIrZmjNlP_DAMzEq3Wes2WbdZ6TYiM_IX47rpS0OW0vX_knxNpvzFLzD-dPob-gTaapVh |
| CitedBy_id | crossref_primary_10_1007_s11071_013_1068_4 crossref_primary_10_1007_s11071_017_3874_6 crossref_primary_10_1007_s11277_022_09524_1 crossref_primary_10_1007_s13319_014_0017_4 crossref_primary_10_1016_j_optlaseng_2019_05_027 crossref_primary_10_1007_s11042_016_3311_8 crossref_primary_10_1007_s13319_014_0030_7 crossref_primary_10_1007_s13319_014_0031_6 crossref_primary_10_1007_s13319_014_0032_5 crossref_primary_10_1007_s11071_013_1086_2 crossref_primary_10_1016_j_aej_2015_01_003 crossref_primary_10_1088_1402_4896_abed7d crossref_primary_10_1007_s11277_019_06793_1 crossref_primary_10_1007_s11071_023_08281_5 crossref_primary_10_3934_math_20231074 crossref_primary_10_1007_s13319_015_0049_4 crossref_primary_10_1088_1402_4896_ad0c13 crossref_primary_10_2298_TSCI2406205B crossref_primary_10_23919_JSEE_2022_000053 crossref_primary_10_1007_s11042_017_4772_0 crossref_primary_10_1007_s11071_014_1767_5 crossref_primary_10_1155_2016_1496329 crossref_primary_10_1007_s13319_014_0025_4 crossref_primary_10_32604_cmc_2023_035347 crossref_primary_10_1080_19393555_2016_1212954 crossref_primary_10_1007_s11071_023_08317_w crossref_primary_10_1007_s11071_013_0904_x crossref_primary_10_1007_s11071_018_4056_x crossref_primary_10_1142_S0219467822500206 crossref_primary_10_1007_s11071_024_09517_8 crossref_primary_10_1016_j_ins_2018_03_055 crossref_primary_10_1007_s12065_020_00440_6 crossref_primary_10_1007_s11071_013_1074_6 crossref_primary_10_1155_2019_7074264 crossref_primary_10_1007_s11071_014_1729_y crossref_primary_10_1007_s11071_016_3028_2 crossref_primary_10_1155_2021_1912859 crossref_primary_10_1007_s11071_013_1132_0 crossref_primary_10_1007_s11071_015_2590_3 crossref_primary_10_1007_s11071_013_0750_x crossref_primary_10_1177_1077546314559295 crossref_primary_10_1016_j_optlaseng_2014_12_025 crossref_primary_10_1016_j_heliyon_2024_e30353 |
| Cites_doi | 10.1016/j.chaos.2007.07.083 10.1016/j.chaos.2009.03.084 10.5560/ZNA.2012-0090 10.1016/j.mcm.2012.10.007 10.1016/j.camwa.2010.03.017 10.1016/j.optlaseng.2010.07.005 10.1016/j.chaos.2003.12.022 10.1007/s11071-012-0621-x 10.5560/ZNA.2012-0022 10.1016/j.chaos.2004.09.035 10.5560/ZNA.2012-0023 10.5560/zna.2012-0023 10.1007/s11071-012-0675-9 10.5560/zna.2012-0090 10.5560/zna.2012-0022 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media Dordrecht 2013 Nonlinear Dynamics is a copyright of Springer, (2013). All Rights Reserved. |
| Copyright_xml | – notice: Springer Science+Business Media Dordrecht 2013 – notice: Nonlinear Dynamics is a copyright of Springer, (2013). All Rights Reserved. |
| DBID | AAYXX CITATION 8FE 8FG ABJCF AFKRA BENPR BGLVJ CCPQU DWQXO HCIFZ L6V M7S PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS 7SC 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
| DOI | 10.1007/s11071-012-0723-5 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland ProQuest One Academic Technology Collection ProQuest One ProQuest Central Korea SciTech Premium Collection ProQuest Engineering Collection Engineering Database ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection Computer and Information Systems Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Engineering Database Technology Collection ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest One Academic UKI Edition ProQuest Central Korea Materials Science & Engineering Collection ProQuest One Academic ProQuest Central (New) Engineering Collection ProQuest One Academic (New) Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Engineering Database Civil Engineering Abstracts |
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences Engineering |
| EISSN | 1573-269X |
| EndPage | 406 |
| ExternalDocumentID | 10_1007_s11071_012_0723_5 |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C -~X .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29N 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 8FE 8FG 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFFNX AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARCEE ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG F5P FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW L6V LAK LLZTM M4Y M7S MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P9T PF0 PT4 PT5 PTHSS QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SDM SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WH7 WK8 YLTOR Z45 Z5O Z7R Z7S Z7X Z7Y Z7Z Z83 Z86 Z88 Z8M Z8N Z8R Z8S Z8T Z8W Z8Z Z92 ZMTXR _50 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP AMVHM ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PUEGO DWQXO PKEHL PQEST PQQKQ PQUKI PRINS 7SC 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
| ID | FETCH-LOGICAL-c382t-6ee70e7c93c958c5e07085fc8f0a550e88f28ecc6d202e66dc190d8bb5ca0e373 |
| IEDL.DBID | BENPR |
| ISSN | 0924-090X |
| IngestDate | Thu Oct 02 07:06:05 EDT 2025 Fri Jul 25 11:06:46 EDT 2025 Wed Oct 01 01:25:26 EDT 2025 Thu Apr 24 22:55:15 EDT 2025 Fri Feb 21 02:32:07 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1-2 |
| Keywords | Nonlinear chaotic algorithm Arnold cat maps Image encryption |
| Language | English |
| License | http://www.springer.com/tdm |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c382t-6ee70e7c93c958c5e07085fc8f0a550e88f28ecc6d202e66dc190d8bb5ca0e373 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
| PQID | 2259422494 |
| PQPubID | 2043746 |
| PageCount | 8 |
| ParticipantIDs | proquest_miscellaneous_1429887143 proquest_journals_2259422494 crossref_primary_10_1007_s11071_012_0723_5 crossref_citationtrail_10_1007_s11071_012_0723_5 springer_journals_10_1007_s11071_012_0723_5 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2013-04-01 |
| PublicationDateYYYYMMDD | 2013-04-01 |
| PublicationDate_xml | – month: 04 year: 2013 text: 2013-04-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Dordrecht |
| PublicationPlace_xml | – name: Dordrecht |
| PublicationSubtitle | An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems |
| PublicationTitle | Nonlinear dynamics |
| PublicationTitleAbbrev | Nonlinear Dyn |
| PublicationYear | 2013 |
| Publisher | Springer Netherlands Springer Nature B.V |
| Publisher_xml | – name: Springer Netherlands – name: Springer Nature B.V |
| References | Hussain, Shah, Gondal, Mahmood (CR19) 2012 Hussain, Shah, Mahmood (CR16) 2012 Wheeler, Matthews (CR1) 1991; 15 Rhouma, Soumaya, Safya (CR10) 2009; 40 Hussain (CR27) 2013; 57 Hussain, Shah, Gondal, Mahmood (CR14) 2012; 67a Scharinger (CR4) 1998 Hussain, Shah, Gondal, Hassan (CR25) 2012; 67a Guo, Liu, Liu (CR9) 2010; 48 Liu, Wang (CR12) 2010; 59 Sahar, Amir (CR11) 2009; 42 Hussain, Shah, Gondal, Mahmood (CR13) 2012 Hussain, Shah, Gondal, Wang (CR21) 2011; 13 Hussain, Shah, Gondal (CR17) 2012 Zhang, Liao, Wang (CR2) 2005; 24 CR23 Hussain, Shah, Mahmood, Afzal (CR26) 2010; 2 Hussain, Shah, Mahmood (CR7) 2010; 5 Hussain, Shah (CR18) 2012 Khan, Shah, Mahmood, Asif Gondal, Hussain (CR24) 2012; 70 Belmouhoub, Djemai, Barbot (CR3) 2003 Chen, Mao, Chui (CR5) 2004; 21 Hussain, Shah, Gondal (CR20) 2012 Zhou, Yang, Zhu, Pan, Zhang (CR6) 2009 Hussain, Shah, Gondal, Khan (CR22) 2011; 13 Sobhy, Shehata (CR8) 2001; 2 Hussain, Shah, Gondal, Mahmood (CR15) 2012; 67a I. Belmouhoub (723_CR3) 2003 I. Hussain (723_CR22) 2011; 13 I. Hussain (723_CR20) 2012 M.I. Sobhy (723_CR8) 2001; 2 I. Hussain (723_CR17) 2012 J. Scharinger (723_CR4) 1998 R. Rhouma (723_CR10) 2009; 40 I. Hussain (723_CR13) 2012 H.J. Liu (723_CR12) 2010; 59 I. Hussain (723_CR18) 2012 I. Hussain (723_CR21) 2011; 13 I. Hussain (723_CR14) 2012; 67a D.D. Wheeler (723_CR1) 1991; 15 M. Sahar (723_CR11) 2009; 42 Z. Zhou (723_CR6) 2009 I. Hussain (723_CR26) 2010; 2 Q. Guo (723_CR9) 2010; 48 I. Hussain (723_CR16) 2012 723_CR23 I. Hussain (723_CR19) 2012 I. Hussain (723_CR27) 2013; 57 I. Hussain (723_CR15) 2012; 67a M. Khan (723_CR24) 2012; 70 L.H. Zhang (723_CR2) 2005; 24 I. Hussain (723_CR7) 2010; 5 G. Chen (723_CR5) 2004; 21 I. Hussain (723_CR25) 2012; 67a |
| References_xml | – volume: 5 start-page: 1263 issue: 26 year: 2010 end-page: 1270 ident: CR7 article-title: A New Algorithm to Construct Secure Keys for AES publication-title: Int. J. Cont. Math. Sci. – volume: 40 start-page: 309 issue: 1 year: 2009 end-page: 318 ident: CR10 article-title: OCML-based colour image encryption publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2007.07.083 – volume: 42 start-page: 1745 issue: 3 year: 2009 end-page: 1754 ident: CR11 article-title: Colour image encryption based on coupled nonlinear chaotic map publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2009.03.084 – year: 2012 ident: CR16 article-title: A group theoretic approach to construct cryptographically strong substitution boxes publication-title: Neural Comput. Appl. – start-page: 124 year: 1998 end-page: 125 ident: CR4 article-title: Secure and fast encryption using chaotic Kolmogorov flows publication-title: Information Theory Workshop – year: 2009 ident: CR6 article-title: A block encryption scheme based on 3D chaotic Arnold maps publication-title: Intelligent Interaction and Affective Computing (ASIA’09), International Asia Symposium – volume: 67a start-page: 705 year: 2012 end-page: 710 ident: CR25 article-title: Construction of new s-boxes over finite field and their application to watermarking publication-title: Z. Naturforsch. doi: 10.5560/ZNA.2012-0090 – volume: 2 start-page: 975 issue: 5 year: 2010 end-page: 8887 ident: CR26 article-title: Comparative analysis of S-boxes based on graphical SAC publication-title: Int. J. Comput. Appl. – volume: 57 start-page: 963 issue: 3–4 year: 2013 end-page: 969 ident: CR27 article-title: A novel approach of audio watermarking based on -box transformation publication-title: Math. Comput. Model. doi: 10.1016/j.mcm.2012.10.007 – volume: 59 start-page: 3320 issue: 10 year: 2010 end-page: 3327 ident: CR12 article-title: Colour image encryption based on one-time keys and robust chaotic maps publication-title: Comput. Math. Appl. doi: 10.1016/j.camwa.2010.03.017 – volume: 48 start-page: 1174 issue: 12 year: 2010 end-page: 1181 ident: CR9 article-title: Colour image encryption by using Arnold and discrete fractional random transforms in IHS space publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2010.07.005 – volume: 13 start-page: 2385 issue: 11 year: 2011 end-page: 2388 ident: CR21 article-title: Analyses of SKIPJACK S-box publication-title: World Appl. Sci. J. – year: 2012 ident: CR19 article-title: Construction of S8 Lui J S-boxes and their application publication-title: Comput. Math. Appl. – start-page: 1902 year: 2003 end-page: 1907 ident: CR3 article-title: Cryptography by discrete-time hyperchaotic systems publication-title: Proceedings of 42nd IEEE Conference on Decision and Control – volume: 21 start-page: 749 year: 2004 end-page: 761 ident: CR5 article-title: A symmetric image encryption scheme based on 3D chaotic cat maps publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2003.12.022 – volume: 70 start-page: 2303 year: 2012 end-page: 2311 ident: CR24 article-title: A novel technique for the construction of strong s-boxes based on chaotic Lorenz systems publication-title: Nonlinear Dyn. doi: 10.1007/s11071-012-0621-x – ident: CR23 – volume: 67a start-page: 282 year: 2012 end-page: 288 ident: CR15 article-title: Generalized majority logic criterion to analyze the statistical strength of S-boxes publication-title: Z. Naturforsch. A doi: 10.5560/ZNA.2012-0022 – year: 2012 ident: CR20 article-title: An efficient image encryption algorithm based on S8 S-box transformation and NCA map publication-title: Opt. Commun. – year: 2012 ident: CR17 article-title: Image encryption algorithm based on PGL(2,GF(2 8)) S-boxes and TD-ERCS chaotic sequence publication-title: Nonlinear Dyn. – year: 2012 ident: CR18 article-title: S8 affine power affine S-boxes and their application publication-title: Neural Comput. Appl. – volume: 24 start-page: 759 year: 2005 end-page: 765 ident: CR2 article-title: An image encryption approach based on chaotic maps publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2004.09.035 – year: 2012 ident: CR13 article-title: A projective general linear group based algorithm for the construction of substitution box for block ciphers publication-title: Neural Comput. Appl. – volume: 2 start-page: 1001 year: 2001 end-page: 1004 ident: CR8 article-title: Methods of attacking chaotic encryption and countermeasures publication-title: IEEE Trans. Acoust Speech Signal Process – volume: 15 start-page: 40 year: 1991 end-page: 52 ident: CR1 article-title: Super computer investigations of a chaotic encryption algorithm publication-title: Cryptologia – volume: 67a start-page: 327 year: 2012 end-page: 332 ident: CR14 article-title: Analysis of S-box in image encryption using root mean square error method publication-title: Z. Naturforsch. A doi: 10.5560/ZNA.2012-0023 – volume: 13 start-page: 2389 issue: 11 year: 2011 end-page: 2395 ident: CR22 article-title: Construction of cryptographically strong 8×8 S-boxes publication-title: World Appl. Sci. J. – year: 2012 ident: 723_CR17 publication-title: Nonlinear Dyn. – volume: 67a start-page: 327 year: 2012 ident: 723_CR14 publication-title: Z. Naturforsch. A doi: 10.5560/zna.2012-0023 – volume: 13 start-page: 2389 issue: 11 year: 2011 ident: 723_CR22 publication-title: World Appl. Sci. J. – ident: 723_CR23 doi: 10.1007/s11071-012-0675-9 – volume: 67a start-page: 705 year: 2012 ident: 723_CR25 publication-title: Z. Naturforsch. doi: 10.5560/zna.2012-0090 – volume: 21 start-page: 749 year: 2004 ident: 723_CR5 publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2003.12.022 – volume: 24 start-page: 759 year: 2005 ident: 723_CR2 publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2004.09.035 – volume: 2 start-page: 1001 year: 2001 ident: 723_CR8 publication-title: IEEE Trans. Acoust Speech Signal Process – volume-title: Intelligent Interaction and Affective Computing (ASIA’09), International Asia Symposium year: 2009 ident: 723_CR6 – volume: 48 start-page: 1174 issue: 12 year: 2010 ident: 723_CR9 publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2010.07.005 – start-page: 1902 volume-title: Proceedings of 42nd IEEE Conference on Decision and Control year: 2003 ident: 723_CR3 – volume: 59 start-page: 3320 issue: 10 year: 2010 ident: 723_CR12 publication-title: Comput. Math. Appl. doi: 10.1016/j.camwa.2010.03.017 – year: 2012 ident: 723_CR16 publication-title: Neural Comput. Appl. – volume: 70 start-page: 2303 year: 2012 ident: 723_CR24 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-012-0621-x – volume: 13 start-page: 2385 issue: 11 year: 2011 ident: 723_CR21 publication-title: World Appl. Sci. J. – year: 2012 ident: 723_CR20 publication-title: Opt. Commun. – volume: 57 start-page: 963 issue: 3–4 year: 2013 ident: 723_CR27 publication-title: Math. Comput. Model. doi: 10.1016/j.mcm.2012.10.007 – year: 2012 ident: 723_CR18 publication-title: Neural Comput. Appl. – volume: 40 start-page: 309 issue: 1 year: 2009 ident: 723_CR10 publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2007.07.083 – volume: 15 start-page: 40 year: 1991 ident: 723_CR1 publication-title: Cryptologia – volume: 42 start-page: 1745 issue: 3 year: 2009 ident: 723_CR11 publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2009.03.084 – volume: 67a start-page: 282 year: 2012 ident: 723_CR15 publication-title: Z. Naturforsch. A doi: 10.5560/zna.2012-0022 – year: 2012 ident: 723_CR13 publication-title: Neural Comput. Appl. – year: 2012 ident: 723_CR19 publication-title: Comput. Math. Appl. – start-page: 124 volume-title: Information Theory Workshop year: 1998 ident: 723_CR4 – volume: 5 start-page: 1263 issue: 26 year: 2010 ident: 723_CR7 publication-title: Int. J. Cont. Math. Sci. – volume: 2 start-page: 975 issue: 5 year: 2010 ident: 723_CR26 publication-title: Int. J. Comput. Appl. |
| SSID | ssj0003208 |
| Score | 2.2417114 |
| Snippet | In this paper, we propose an image encryption algorithm that is based on GF(2
8
) transformations, using the Arnold cat map and incorporating the nonlinear... In this paper, we propose an image encryption algorithm that is based on GF(28) transformations, using the Arnold cat map and incorporating the nonlinear... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 399 |
| SubjectTerms | Algorithms Automotive Engineering Chaos theory Classical Mechanics Control Data encryption Dynamical Systems Encryption Engineering Mechanical Engineering Nonlinearity Original Paper Pixels Transformations Vibration |
| SummonAdditionalLinks | – databaseName: SpringerLink Journals (ICM) dbid: U2A link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwEA86X_TBj6k4nRLBBz8oZGnSpo9DnEPQJwcDH0qaZG6wtWPtRP97L127TlFB6FObD7jL3f2ud7lD6AIQsqZGM8cojzksoi1HaCodEkQtMaADovIbco9PXrfHHvq8X9zjTsts9zIkmWvq6rIbeCrW9bXZktR1-Dra4LaaFxziHm0v1a9L8zZ0BBwL-xOiX4Yyf1riqzGqEOa3oGhuazq7aLsAibi94OoeWjNxHe0UgBEX4pjW0dZKNcF99NLGcfJmxng0ASWBYczsI1cIWI5fk9koG06wNVoawys1lAmsjidymmIZa3zfuaTiCpv3aRKDIcLZCqJN4gPU69w933adoneCo1xBM8czxifGV4GrAi4UNyDawuZrDYgEp8QIYIQA9nmaEmo8TytABlpEEVeSGNd3D1Ethv2OEOZGa-3xgPl6wIR9As0EZ1SaSEU-byBSEjFURWFx299iHFYlkS3dQ6B7aOkewpTr5ZTpoqrGX4ObJWfCQsDSENRQwAB-BKyBzpefQTRsvEPGJpmn4NXQAHQoIMIGuik5Wi3x64bH_xp9gjZp3iLDZvM0US2bzc0pAJUsOssP5ifGFN4w priority: 102 providerName: Springer Nature |
| Title | A novel image encryption algorithm based on chaotic maps and GF(28) exponent transformation |
| URI | https://link.springer.com/article/10.1007/s11071-012-0723-5 https://www.proquest.com/docview/2259422494 https://www.proquest.com/docview/1429887143 |
| Volume | 72 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Mathematics Source customDbUrl: eissn: 1573-269X dateEnd: 20241103 omitProxy: false ssIdentifier: ssj0003208 issn: 0924-090X databaseCode: AMVHM dateStart: 19900301 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source providerName: EBSCOhost – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1573-269X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0003208 issn: 0924-090X databaseCode: AFBBN dateStart: 19900101 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVPQU databaseName: ProQuest One Academic customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1573-269X dateEnd: 20241103 omitProxy: true ssIdentifier: ssj0003208 issn: 0924-090X databaseCode: BENPR dateStart: 19970101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1573-269X dateEnd: 20241103 omitProxy: true ssIdentifier: ssj0003208 issn: 0924-090X databaseCode: 8FG dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1573-269X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0003208 issn: 0924-090X databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1573-269X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0003208 issn: 0924-090X databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dT9swED_R9mU88NGBViiVkfawDVkLjpM4DwgV1BYNUU3TKnXaQ-TY7kBqk9KmCP57zmnSwiSQ8uTYsXLnu_udfb4D-IwIWTOjOTXK55TH7JQKzSR1wvhUjNjIUfkNuZu-fzXgP4becAP65V0YG1ZZ6sRcUetU2T3y77juQo72JuTn03tqq0bZ09WyhIYsSivoszzFWAVqzGbGqkLtotP_-Wulm12W16hz0OuwOxTD8pwzv0yHnpB1rW00JnOp99pSreHnfyemuSHq7sBWgSBJe8nyXdgwSR22CzRJClmd12HzRarBj_C3TZL0wYzJ3QQ1CME-s6dcWxA5_of_md1OiLVommCTupUpfp1M5HROZKJJr_uFia_EPE7TBK0UyV7A3TTZg0G38_vyihaFFahyBcuob0zgmECFrgo9oTyDci9sMNfIkeixGIFcEshbXzOHGd_XCmGDFnHsKekYN3D3oZrgfJ-AeEZr7SNrAj3iwj6h5sLjTJpYxYHXAKckYqSKrOO2-MU4WudLtnSPkO6RpXuEQ76thkyXKTfe69wsORMV0jeP1mulAcer1yg39jBEJiZdzNHlYSEqWISLDTgpObr-xJsTHrw_4SF8YHnBDBvb04RqNluYI4QtWdyCiuj2WlBr9_5cd1rFysTWAWs_A7yR67E |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR1NT9RA9AXhoB5EPowrqGOiCWImlum0nR6IQWVdBDbGQLKJhzqdeSsmu-1Ki8qf87f5pkx30QRuJD2105n2zfuc9wXwnDRkK9BKjiaWXOZiiysrNA_SfEsNxTAwTYbcYT_uHcuPg2gwB3_aXBgXVtnyxIZR29K4M_LXhHepJHmTyjeTH9x1jXLe1baFhvatFex2U2LMJ3bs4_kvMuGq7b33tN8vhOjuHr3rcd9lgJtQiZrHiEmAiUlDk0bKREhEoFxk0zDQpL6jok9W9KOxFYHAOLaGZKhVeR4ZHWCYhDTvLViQoUzJ-Ft4u9v_9HkqC0LR9MQLyMpxJyKD1q_aJO-R5eVMeRf9KUIe_SsZZ-rufx7aRvB178M9r7GynQsUW4I5LJZh0WuvzPOGahnuXiptuAJfdlhR_sQR-z4mjsVozOl5w52YHn0juNYnY-YkqGV0y5zokmZnYz2pmC4s-9DdEOolw9-TsiCpyOpL6nVZrMLxjYD4AcwXtN5DYBFaa2NChcQOpXJXaqWKpNCYmzyJOhC0QMyMr3Lumm2Msll9Zgf3jOCeObhn9Mrm9JXJRYmP6wavtzuTeWqvshluduDZ9DHRqXO-6ALLs4pMLJESQyf1tAOv2h2dTXHlgo-uX_Ap3O4dHR5kB3v9_TW4I5pmHS6uaB3m69MzfEwqU50_8XjJ4OtNk8Jffqsl_w |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS-QwEB_8gEMf1NMT188I96B3lK1p0qaPi7rq-YEPLiz4UNIkVWG3XbZV9L930m13VU5B6FM7SWAmM_lNZzID8BsRsqZGM8conzkspgeO0FQ6bhgfiIQmripvyF1e-acd9q_Lu1Wf07zOdq9DkqM7DbZKU1o0BzppTi6-oddi3WCbOUk9h0_DLLN1EnBDd2hrbIo9Wrakc9HJsD8kunVY839TvD-YJmjzQ4C0PHfaS7BQAUbSGkn4J0yZdBkWK_BIKtXMl2H-TWXBFbhtkTR7Mj3y0EeDQZBm-FIaByJ7d9nwobjvE3uAaYKv1L3McHbSl4OcyFSTk_YeFfvEPA-yFJlCijfoNkt_Qad9fHN46lR9FBzlCVo4vjGBawIVeirkQnGDai5s7lbiSnRQjEChCBSlr6lLje9rhShBizjmSrrGC7xVmElxvTUg3GitfR6yQCdM2CfUTHBGpYlVHPAGuDUTI1UVGbe9LnrRpDyy5XuEfI8s3yMc8mc8ZDCqsPEV8WYtmahStjxCkxQyhCIha8Du-DOqiY19yNRkjzl6ODREe4rosAF_a4lOpvh0wfVvUe_Aj-ujdnRxdnW-AXO07Jxhk3w2YaYYPpotxC9FvF3u0Vd1EOVY |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+image+encryption+algorithm+based+on+chaotic+maps+and+GF%2828%29+exponent+transformation&rft.jtitle=Nonlinear+dynamics&rft.au=Hussain%2C+Iqtadar&rft.au=Shah%2C+Tariq&rft.au=Gondal%2C+Muhammad+Asif&rft.au=Mahmood%2C+Hasan&rft.date=2013-04-01&rft.pub=Springer+Nature+B.V&rft.issn=0924-090X&rft.eissn=1573-269X&rft.volume=72&rft.issue=1-2&rft.spage=399&rft.epage=406&rft_id=info:doi/10.1007%2Fs11071-012-0723-5 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0924-090X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0924-090X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0924-090X&client=summon |