A novel image encryption algorithm based on chaotic maps and GF(28) exponent transformation

In this paper, we propose an image encryption algorithm that is based on GF(2 8 ) transformations, using the Arnold cat map and incorporating the nonlinear chaotic algorithm. The plain image is processed with the nonlinear chaotic algorithm and is shuffled iteratively with the Arnold cat map, while...

Full description

Saved in:
Bibliographic Details
Published inNonlinear dynamics Vol. 72; no. 1-2; pp. 399 - 406
Main Authors Hussain, Iqtadar, Shah, Tariq, Gondal, Muhammad Asif, Mahmood, Hasan
Format Journal Article
LanguageEnglish
Published Dordrecht Springer Netherlands 01.04.2013
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0924-090X
1573-269X
DOI10.1007/s11071-012-0723-5

Cover

Abstract In this paper, we propose an image encryption algorithm that is based on GF(2 8 ) transformations, using the Arnold cat map and incorporating the nonlinear chaotic algorithm. The plain image is processed with the nonlinear chaotic algorithm and is shuffled iteratively with the Arnold cat map, while transforming the image pixel values into GF(2 8 ). We show that the encryption characteristics of this approach are better as compared to some well known encryption algorithms.
AbstractList In this paper, we propose an image encryption algorithm that is based on GF(28) transformations, using the Arnold cat map and incorporating the nonlinear chaotic algorithm. The plain image is processed with the nonlinear chaotic algorithm and is shuffled iteratively with the Arnold cat map, while transforming the image pixel values into GF(28). We show that the encryption characteristics of this approach are better as compared to some well known encryption algorithms.
In this paper, we propose an image encryption algorithm that is based on GF(2 8 ) transformations, using the Arnold cat map and incorporating the nonlinear chaotic algorithm. The plain image is processed with the nonlinear chaotic algorithm and is shuffled iteratively with the Arnold cat map, while transforming the image pixel values into GF(2 8 ). We show that the encryption characteristics of this approach are better as compared to some well known encryption algorithms.
Author Hussain, Iqtadar
Mahmood, Hasan
Shah, Tariq
Gondal, Muhammad Asif
Author_xml – sequence: 1
  givenname: Iqtadar
  surname: Hussain
  fullname: Hussain, Iqtadar
  email: iqtadarqau@gmail.com
  organization: Department of Mathematics, Quaid-i-Azam University
– sequence: 2
  givenname: Tariq
  surname: Shah
  fullname: Shah, Tariq
  organization: Department of Mathematics, Quaid-i-Azam University
– sequence: 3
  givenname: Muhammad Asif
  surname: Gondal
  fullname: Gondal, Muhammad Asif
  organization: Department of Sciences and Humanities, National University of Computer and Emerging Sciences
– sequence: 4
  givenname: Hasan
  surname: Mahmood
  fullname: Mahmood, Hasan
  organization: Department of Electronics, Quaid-i-Azam University
BookMark eNp9kE1LxDAQhoMouH78AG8BL3qoTtKmSY4ifoHgRUHwELLpdK20SU26ov_erCsIgp4GhveZeXl2yKYPHgk5YHDCAORpYgwkK4DxAiQvC7FBZkzIsuC1ftwkM9C8KkDD4zbZSekFAEoOakaezqgPb9jTbrALpOhd_BinLnhq-0WI3fQ80LlN2NC8cs82TJ2jgx0Ttb6hV5dHXB1TfB9zGz_RKVqf2hAHuzqxR7Za2yfc_5675OHy4v78uri9u7o5P7stXKn4VNSIElA6XTotlBMIEpRonWrBCgGoVMsVOlc3HDjWdeOYhkbN58JZwFKWu-RofXeM4XWJaTJDlxz2vfUYlsmwimulJKvKHD38FX0Jy-hzO8O50BXnla5yiq1TLoaUIrZmjNlP_DAMzEq3Wes2WbdZ6TYiM_IX47rpS0OW0vX_knxNpvzFLzD-dPob-gTaapVh
CitedBy_id crossref_primary_10_1007_s11071_013_1068_4
crossref_primary_10_1007_s11071_017_3874_6
crossref_primary_10_1007_s11277_022_09524_1
crossref_primary_10_1007_s13319_014_0017_4
crossref_primary_10_1016_j_optlaseng_2019_05_027
crossref_primary_10_1007_s11042_016_3311_8
crossref_primary_10_1007_s13319_014_0030_7
crossref_primary_10_1007_s13319_014_0031_6
crossref_primary_10_1007_s13319_014_0032_5
crossref_primary_10_1007_s11071_013_1086_2
crossref_primary_10_1016_j_aej_2015_01_003
crossref_primary_10_1088_1402_4896_abed7d
crossref_primary_10_1007_s11277_019_06793_1
crossref_primary_10_1007_s11071_023_08281_5
crossref_primary_10_3934_math_20231074
crossref_primary_10_1007_s13319_015_0049_4
crossref_primary_10_1088_1402_4896_ad0c13
crossref_primary_10_2298_TSCI2406205B
crossref_primary_10_23919_JSEE_2022_000053
crossref_primary_10_1007_s11042_017_4772_0
crossref_primary_10_1007_s11071_014_1767_5
crossref_primary_10_1155_2016_1496329
crossref_primary_10_1007_s13319_014_0025_4
crossref_primary_10_32604_cmc_2023_035347
crossref_primary_10_1080_19393555_2016_1212954
crossref_primary_10_1007_s11071_023_08317_w
crossref_primary_10_1007_s11071_013_0904_x
crossref_primary_10_1007_s11071_018_4056_x
crossref_primary_10_1142_S0219467822500206
crossref_primary_10_1007_s11071_024_09517_8
crossref_primary_10_1016_j_ins_2018_03_055
crossref_primary_10_1007_s12065_020_00440_6
crossref_primary_10_1007_s11071_013_1074_6
crossref_primary_10_1155_2019_7074264
crossref_primary_10_1007_s11071_014_1729_y
crossref_primary_10_1007_s11071_016_3028_2
crossref_primary_10_1155_2021_1912859
crossref_primary_10_1007_s11071_013_1132_0
crossref_primary_10_1007_s11071_015_2590_3
crossref_primary_10_1007_s11071_013_0750_x
crossref_primary_10_1177_1077546314559295
crossref_primary_10_1016_j_optlaseng_2014_12_025
crossref_primary_10_1016_j_heliyon_2024_e30353
Cites_doi 10.1016/j.chaos.2007.07.083
10.1016/j.chaos.2009.03.084
10.5560/ZNA.2012-0090
10.1016/j.mcm.2012.10.007
10.1016/j.camwa.2010.03.017
10.1016/j.optlaseng.2010.07.005
10.1016/j.chaos.2003.12.022
10.1007/s11071-012-0621-x
10.5560/ZNA.2012-0022
10.1016/j.chaos.2004.09.035
10.5560/ZNA.2012-0023
10.5560/zna.2012-0023
10.1007/s11071-012-0675-9
10.5560/zna.2012-0090
10.5560/zna.2012-0022
ContentType Journal Article
Copyright Springer Science+Business Media Dordrecht 2013
Nonlinear Dynamics is a copyright of Springer, (2013). All Rights Reserved.
Copyright_xml – notice: Springer Science+Business Media Dordrecht 2013
– notice: Nonlinear Dynamics is a copyright of Springer, (2013). All Rights Reserved.
DBID AAYXX
CITATION
8FE
8FG
ABJCF
AFKRA
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
L6V
M7S
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
7SC
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
DOI 10.1007/s11071-012-0723-5
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central UK/Ireland
ProQuest One Academic
Technology Collection
ProQuest One
ProQuest Central Korea
SciTech Premium Collection
ProQuest Engineering Collection
Engineering Database
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
Computer and Information Systems Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Engineering Database
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest One Academic UKI Edition
ProQuest Central Korea
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest Central (New)
Engineering Collection
ProQuest One Academic (New)
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Engineering Database

Civil Engineering Abstracts
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Engineering
EISSN 1573-269X
EndPage 406
ExternalDocumentID 10_1007_s11071_012_0723_5
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
-~X
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29N
29~
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
8FE
8FG
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJCF
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFFNX
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARCEE
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
L6V
LAK
LLZTM
M4Y
M7S
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P9T
PF0
PT4
PT5
PTHSS
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCV
SDH
SDM
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WH7
WK8
YLTOR
Z45
Z5O
Z7R
Z7S
Z7X
Z7Y
Z7Z
Z83
Z86
Z88
Z8M
Z8N
Z8R
Z8S
Z8T
Z8W
Z8Z
Z92
ZMTXR
_50
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
AMVHM
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PUEGO
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
7SC
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
ID FETCH-LOGICAL-c382t-6ee70e7c93c958c5e07085fc8f0a550e88f28ecc6d202e66dc190d8bb5ca0e373
IEDL.DBID BENPR
ISSN 0924-090X
IngestDate Thu Oct 02 07:06:05 EDT 2025
Fri Jul 25 11:06:46 EDT 2025
Wed Oct 01 01:25:26 EDT 2025
Thu Apr 24 22:55:15 EDT 2025
Fri Feb 21 02:32:07 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1-2
Keywords Nonlinear chaotic algorithm
Arnold cat maps
Image encryption
Language English
License http://www.springer.com/tdm
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c382t-6ee70e7c93c958c5e07085fc8f0a550e88f28ecc6d202e66dc190d8bb5ca0e373
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 2259422494
PQPubID 2043746
PageCount 8
ParticipantIDs proquest_miscellaneous_1429887143
proquest_journals_2259422494
crossref_primary_10_1007_s11071_012_0723_5
crossref_citationtrail_10_1007_s11071_012_0723_5
springer_journals_10_1007_s11071_012_0723_5
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2013-04-01
PublicationDateYYYYMMDD 2013-04-01
PublicationDate_xml – month: 04
  year: 2013
  text: 2013-04-01
  day: 01
PublicationDecade 2010
PublicationPlace Dordrecht
PublicationPlace_xml – name: Dordrecht
PublicationSubtitle An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems
PublicationTitle Nonlinear dynamics
PublicationTitleAbbrev Nonlinear Dyn
PublicationYear 2013
Publisher Springer Netherlands
Springer Nature B.V
Publisher_xml – name: Springer Netherlands
– name: Springer Nature B.V
References Hussain, Shah, Gondal, Mahmood (CR19) 2012
Hussain, Shah, Mahmood (CR16) 2012
Wheeler, Matthews (CR1) 1991; 15
Rhouma, Soumaya, Safya (CR10) 2009; 40
Hussain (CR27) 2013; 57
Hussain, Shah, Gondal, Mahmood (CR14) 2012; 67a
Scharinger (CR4) 1998
Hussain, Shah, Gondal, Hassan (CR25) 2012; 67a
Guo, Liu, Liu (CR9) 2010; 48
Liu, Wang (CR12) 2010; 59
Sahar, Amir (CR11) 2009; 42
Hussain, Shah, Gondal, Mahmood (CR13) 2012
Hussain, Shah, Gondal, Wang (CR21) 2011; 13
Hussain, Shah, Gondal (CR17) 2012
Zhang, Liao, Wang (CR2) 2005; 24
CR23
Hussain, Shah, Mahmood, Afzal (CR26) 2010; 2
Hussain, Shah, Mahmood (CR7) 2010; 5
Hussain, Shah (CR18) 2012
Khan, Shah, Mahmood, Asif Gondal, Hussain (CR24) 2012; 70
Belmouhoub, Djemai, Barbot (CR3) 2003
Chen, Mao, Chui (CR5) 2004; 21
Hussain, Shah, Gondal (CR20) 2012
Zhou, Yang, Zhu, Pan, Zhang (CR6) 2009
Hussain, Shah, Gondal, Khan (CR22) 2011; 13
Sobhy, Shehata (CR8) 2001; 2
Hussain, Shah, Gondal, Mahmood (CR15) 2012; 67a
I. Belmouhoub (723_CR3) 2003
I. Hussain (723_CR22) 2011; 13
I. Hussain (723_CR20) 2012
M.I. Sobhy (723_CR8) 2001; 2
I. Hussain (723_CR17) 2012
J. Scharinger (723_CR4) 1998
R. Rhouma (723_CR10) 2009; 40
I. Hussain (723_CR13) 2012
H.J. Liu (723_CR12) 2010; 59
I. Hussain (723_CR18) 2012
I. Hussain (723_CR21) 2011; 13
I. Hussain (723_CR14) 2012; 67a
D.D. Wheeler (723_CR1) 1991; 15
M. Sahar (723_CR11) 2009; 42
Z. Zhou (723_CR6) 2009
I. Hussain (723_CR26) 2010; 2
Q. Guo (723_CR9) 2010; 48
I. Hussain (723_CR16) 2012
723_CR23
I. Hussain (723_CR19) 2012
I. Hussain (723_CR27) 2013; 57
I. Hussain (723_CR15) 2012; 67a
M. Khan (723_CR24) 2012; 70
L.H. Zhang (723_CR2) 2005; 24
I. Hussain (723_CR7) 2010; 5
G. Chen (723_CR5) 2004; 21
I. Hussain (723_CR25) 2012; 67a
References_xml – volume: 5
  start-page: 1263
  issue: 26
  year: 2010
  end-page: 1270
  ident: CR7
  article-title: A New Algorithm to Construct Secure Keys for AES
  publication-title: Int. J. Cont. Math. Sci.
– volume: 40
  start-page: 309
  issue: 1
  year: 2009
  end-page: 318
  ident: CR10
  article-title: OCML-based colour image encryption
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2007.07.083
– volume: 42
  start-page: 1745
  issue: 3
  year: 2009
  end-page: 1754
  ident: CR11
  article-title: Colour image encryption based on coupled nonlinear chaotic map
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2009.03.084
– year: 2012
  ident: CR16
  article-title: A group theoretic approach to construct cryptographically strong substitution boxes
  publication-title: Neural Comput. Appl.
– start-page: 124
  year: 1998
  end-page: 125
  ident: CR4
  article-title: Secure and fast encryption using chaotic Kolmogorov flows
  publication-title: Information Theory Workshop
– year: 2009
  ident: CR6
  article-title: A block encryption scheme based on 3D chaotic Arnold maps
  publication-title: Intelligent Interaction and Affective Computing (ASIA’09), International Asia Symposium
– volume: 67a
  start-page: 705
  year: 2012
  end-page: 710
  ident: CR25
  article-title: Construction of new s-boxes over finite field and their application to watermarking
  publication-title: Z. Naturforsch.
  doi: 10.5560/ZNA.2012-0090
– volume: 2
  start-page: 975
  issue: 5
  year: 2010
  end-page: 8887
  ident: CR26
  article-title: Comparative analysis of S-boxes based on graphical SAC
  publication-title: Int. J. Comput. Appl.
– volume: 57
  start-page: 963
  issue: 3–4
  year: 2013
  end-page: 969
  ident: CR27
  article-title: A novel approach of audio watermarking based on -box transformation
  publication-title: Math. Comput. Model.
  doi: 10.1016/j.mcm.2012.10.007
– volume: 59
  start-page: 3320
  issue: 10
  year: 2010
  end-page: 3327
  ident: CR12
  article-title: Colour image encryption based on one-time keys and robust chaotic maps
  publication-title: Comput. Math. Appl.
  doi: 10.1016/j.camwa.2010.03.017
– volume: 48
  start-page: 1174
  issue: 12
  year: 2010
  end-page: 1181
  ident: CR9
  article-title: Colour image encryption by using Arnold and discrete fractional random transforms in IHS space
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2010.07.005
– volume: 13
  start-page: 2385
  issue: 11
  year: 2011
  end-page: 2388
  ident: CR21
  article-title: Analyses of SKIPJACK S-box
  publication-title: World Appl. Sci. J.
– year: 2012
  ident: CR19
  article-title: Construction of S8 Lui J S-boxes and their application
  publication-title: Comput. Math. Appl.
– start-page: 1902
  year: 2003
  end-page: 1907
  ident: CR3
  article-title: Cryptography by discrete-time hyperchaotic systems
  publication-title: Proceedings of 42nd IEEE Conference on Decision and Control
– volume: 21
  start-page: 749
  year: 2004
  end-page: 761
  ident: CR5
  article-title: A symmetric image encryption scheme based on 3D chaotic cat maps
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2003.12.022
– volume: 70
  start-page: 2303
  year: 2012
  end-page: 2311
  ident: CR24
  article-title: A novel technique for the construction of strong s-boxes based on chaotic Lorenz systems
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-012-0621-x
– ident: CR23
– volume: 67a
  start-page: 282
  year: 2012
  end-page: 288
  ident: CR15
  article-title: Generalized majority logic criterion to analyze the statistical strength of S-boxes
  publication-title: Z. Naturforsch. A
  doi: 10.5560/ZNA.2012-0022
– year: 2012
  ident: CR20
  article-title: An efficient image encryption algorithm based on S8 S-box transformation and NCA map
  publication-title: Opt. Commun.
– year: 2012
  ident: CR17
  article-title: Image encryption algorithm based on PGL(2,GF(2 8)) S-boxes and TD-ERCS chaotic sequence
  publication-title: Nonlinear Dyn.
– year: 2012
  ident: CR18
  article-title: S8 affine power affine S-boxes and their application
  publication-title: Neural Comput. Appl.
– volume: 24
  start-page: 759
  year: 2005
  end-page: 765
  ident: CR2
  article-title: An image encryption approach based on chaotic maps
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2004.09.035
– year: 2012
  ident: CR13
  article-title: A projective general linear group based algorithm for the construction of substitution box for block ciphers
  publication-title: Neural Comput. Appl.
– volume: 2
  start-page: 1001
  year: 2001
  end-page: 1004
  ident: CR8
  article-title: Methods of attacking chaotic encryption and countermeasures
  publication-title: IEEE Trans. Acoust Speech Signal Process
– volume: 15
  start-page: 40
  year: 1991
  end-page: 52
  ident: CR1
  article-title: Super computer investigations of a chaotic encryption algorithm
  publication-title: Cryptologia
– volume: 67a
  start-page: 327
  year: 2012
  end-page: 332
  ident: CR14
  article-title: Analysis of S-box in image encryption using root mean square error method
  publication-title: Z. Naturforsch. A
  doi: 10.5560/ZNA.2012-0023
– volume: 13
  start-page: 2389
  issue: 11
  year: 2011
  end-page: 2395
  ident: CR22
  article-title: Construction of cryptographically strong 8×8 S-boxes
  publication-title: World Appl. Sci. J.
– year: 2012
  ident: 723_CR17
  publication-title: Nonlinear Dyn.
– volume: 67a
  start-page: 327
  year: 2012
  ident: 723_CR14
  publication-title: Z. Naturforsch. A
  doi: 10.5560/zna.2012-0023
– volume: 13
  start-page: 2389
  issue: 11
  year: 2011
  ident: 723_CR22
  publication-title: World Appl. Sci. J.
– ident: 723_CR23
  doi: 10.1007/s11071-012-0675-9
– volume: 67a
  start-page: 705
  year: 2012
  ident: 723_CR25
  publication-title: Z. Naturforsch.
  doi: 10.5560/zna.2012-0090
– volume: 21
  start-page: 749
  year: 2004
  ident: 723_CR5
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2003.12.022
– volume: 24
  start-page: 759
  year: 2005
  ident: 723_CR2
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2004.09.035
– volume: 2
  start-page: 1001
  year: 2001
  ident: 723_CR8
  publication-title: IEEE Trans. Acoust Speech Signal Process
– volume-title: Intelligent Interaction and Affective Computing (ASIA’09), International Asia Symposium
  year: 2009
  ident: 723_CR6
– volume: 48
  start-page: 1174
  issue: 12
  year: 2010
  ident: 723_CR9
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2010.07.005
– start-page: 1902
  volume-title: Proceedings of 42nd IEEE Conference on Decision and Control
  year: 2003
  ident: 723_CR3
– volume: 59
  start-page: 3320
  issue: 10
  year: 2010
  ident: 723_CR12
  publication-title: Comput. Math. Appl.
  doi: 10.1016/j.camwa.2010.03.017
– year: 2012
  ident: 723_CR16
  publication-title: Neural Comput. Appl.
– volume: 70
  start-page: 2303
  year: 2012
  ident: 723_CR24
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-012-0621-x
– volume: 13
  start-page: 2385
  issue: 11
  year: 2011
  ident: 723_CR21
  publication-title: World Appl. Sci. J.
– year: 2012
  ident: 723_CR20
  publication-title: Opt. Commun.
– volume: 57
  start-page: 963
  issue: 3–4
  year: 2013
  ident: 723_CR27
  publication-title: Math. Comput. Model.
  doi: 10.1016/j.mcm.2012.10.007
– year: 2012
  ident: 723_CR18
  publication-title: Neural Comput. Appl.
– volume: 40
  start-page: 309
  issue: 1
  year: 2009
  ident: 723_CR10
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2007.07.083
– volume: 15
  start-page: 40
  year: 1991
  ident: 723_CR1
  publication-title: Cryptologia
– volume: 42
  start-page: 1745
  issue: 3
  year: 2009
  ident: 723_CR11
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2009.03.084
– volume: 67a
  start-page: 282
  year: 2012
  ident: 723_CR15
  publication-title: Z. Naturforsch. A
  doi: 10.5560/zna.2012-0022
– year: 2012
  ident: 723_CR13
  publication-title: Neural Comput. Appl.
– year: 2012
  ident: 723_CR19
  publication-title: Comput. Math. Appl.
– start-page: 124
  volume-title: Information Theory Workshop
  year: 1998
  ident: 723_CR4
– volume: 5
  start-page: 1263
  issue: 26
  year: 2010
  ident: 723_CR7
  publication-title: Int. J. Cont. Math. Sci.
– volume: 2
  start-page: 975
  issue: 5
  year: 2010
  ident: 723_CR26
  publication-title: Int. J. Comput. Appl.
SSID ssj0003208
Score 2.2417114
Snippet In this paper, we propose an image encryption algorithm that is based on GF(2 8 ) transformations, using the Arnold cat map and incorporating the nonlinear...
In this paper, we propose an image encryption algorithm that is based on GF(28) transformations, using the Arnold cat map and incorporating the nonlinear...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 399
SubjectTerms Algorithms
Automotive Engineering
Chaos theory
Classical Mechanics
Control
Data encryption
Dynamical Systems
Encryption
Engineering
Mechanical Engineering
Nonlinearity
Original Paper
Pixels
Transformations
Vibration
SummonAdditionalLinks – databaseName: SpringerLink Journals (ICM)
  dbid: U2A
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwEA86X_TBj6k4nRLBBz8oZGnSpo9DnEPQJwcDH0qaZG6wtWPtRP97L127TlFB6FObD7jL3f2ud7lD6AIQsqZGM8cojzksoi1HaCodEkQtMaADovIbco9PXrfHHvq8X9zjTsts9zIkmWvq6rIbeCrW9bXZktR1-Dra4LaaFxziHm0v1a9L8zZ0BBwL-xOiX4Yyf1riqzGqEOa3oGhuazq7aLsAibi94OoeWjNxHe0UgBEX4pjW0dZKNcF99NLGcfJmxng0ASWBYczsI1cIWI5fk9koG06wNVoawys1lAmsjidymmIZa3zfuaTiCpv3aRKDIcLZCqJN4gPU69w933adoneCo1xBM8czxifGV4GrAi4UNyDawuZrDYgEp8QIYIQA9nmaEmo8TytABlpEEVeSGNd3D1Ethv2OEOZGa-3xgPl6wIR9As0EZ1SaSEU-byBSEjFURWFx299iHFYlkS3dQ6B7aOkewpTr5ZTpoqrGX4ObJWfCQsDSENRQwAB-BKyBzpefQTRsvEPGJpmn4NXQAHQoIMIGuik5Wi3x64bH_xp9gjZp3iLDZvM0US2bzc0pAJUsOssP5ifGFN4w
  priority: 102
  providerName: Springer Nature
Title A novel image encryption algorithm based on chaotic maps and GF(28) exponent transformation
URI https://link.springer.com/article/10.1007/s11071-012-0723-5
https://www.proquest.com/docview/2259422494
https://www.proquest.com/docview/1429887143
Volume 72
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Mathematics Source
  customDbUrl:
  eissn: 1573-269X
  dateEnd: 20241103
  omitProxy: false
  ssIdentifier: ssj0003208
  issn: 0924-090X
  databaseCode: AMVHM
  dateStart: 19900301
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source
  providerName: EBSCOhost
– providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1573-269X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0003208
  issn: 0924-090X
  databaseCode: AFBBN
  dateStart: 19900101
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVPQU
  databaseName: ProQuest One Academic
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1573-269X
  dateEnd: 20241103
  omitProxy: true
  ssIdentifier: ssj0003208
  issn: 0924-090X
  databaseCode: BENPR
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1573-269X
  dateEnd: 20241103
  omitProxy: true
  ssIdentifier: ssj0003208
  issn: 0924-090X
  databaseCode: 8FG
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1573-269X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0003208
  issn: 0924-090X
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1573-269X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0003208
  issn: 0924-090X
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dT9swED_R9mU88NGBViiVkfawDVkLjpM4DwgV1BYNUU3TKnXaQ-TY7kBqk9KmCP57zmnSwiSQ8uTYsXLnu_udfb4D-IwIWTOjOTXK55TH7JQKzSR1wvhUjNjIUfkNuZu-fzXgP4becAP65V0YG1ZZ6sRcUetU2T3y77juQo72JuTn03tqq0bZ09WyhIYsSivoszzFWAVqzGbGqkLtotP_-Wulm12W16hz0OuwOxTD8pwzv0yHnpB1rW00JnOp99pSreHnfyemuSHq7sBWgSBJe8nyXdgwSR22CzRJClmd12HzRarBj_C3TZL0wYzJ3QQ1CME-s6dcWxA5_of_md1OiLVommCTupUpfp1M5HROZKJJr_uFia_EPE7TBK0UyV7A3TTZg0G38_vyihaFFahyBcuob0zgmECFrgo9oTyDci9sMNfIkeixGIFcEshbXzOHGd_XCmGDFnHsKekYN3D3oZrgfJ-AeEZr7SNrAj3iwj6h5sLjTJpYxYHXAKckYqSKrOO2-MU4WudLtnSPkO6RpXuEQ76thkyXKTfe69wsORMV0jeP1mulAcer1yg39jBEJiZdzNHlYSEqWISLDTgpObr-xJsTHrw_4SF8YHnBDBvb04RqNluYI4QtWdyCiuj2WlBr9_5cd1rFysTWAWs_A7yR67E
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR1NT9RA9AXhoB5EPowrqGOiCWImlum0nR6IQWVdBDbGQLKJhzqdeSsmu-1Ki8qf87f5pkx30QRuJD2105n2zfuc9wXwnDRkK9BKjiaWXOZiiysrNA_SfEsNxTAwTYbcYT_uHcuPg2gwB3_aXBgXVtnyxIZR29K4M_LXhHepJHmTyjeTH9x1jXLe1baFhvatFex2U2LMJ3bs4_kvMuGq7b33tN8vhOjuHr3rcd9lgJtQiZrHiEmAiUlDk0bKREhEoFxk0zDQpL6jok9W9KOxFYHAOLaGZKhVeR4ZHWCYhDTvLViQoUzJ-Ft4u9v_9HkqC0LR9MQLyMpxJyKD1q_aJO-R5eVMeRf9KUIe_SsZZ-rufx7aRvB178M9r7GynQsUW4I5LJZh0WuvzPOGahnuXiptuAJfdlhR_sQR-z4mjsVozOl5w52YHn0juNYnY-YkqGV0y5zokmZnYz2pmC4s-9DdEOolw9-TsiCpyOpL6nVZrMLxjYD4AcwXtN5DYBFaa2NChcQOpXJXaqWKpNCYmzyJOhC0QMyMr3Lumm2Msll9Zgf3jOCeObhn9Mrm9JXJRYmP6wavtzuTeWqvshluduDZ9DHRqXO-6ALLs4pMLJESQyf1tAOv2h2dTXHlgo-uX_Ap3O4dHR5kB3v9_TW4I5pmHS6uaB3m69MzfEwqU50_8XjJ4OtNk8Jffqsl_w
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS-QwEB_8gEMf1NMT188I96B3lK1p0qaPi7rq-YEPLiz4UNIkVWG3XbZV9L930m13VU5B6FM7SWAmM_lNZzID8BsRsqZGM8conzkspgeO0FQ6bhgfiIQmripvyF1e-acd9q_Lu1Wf07zOdq9DkqM7DbZKU1o0BzppTi6-oddi3WCbOUk9h0_DLLN1EnBDd2hrbIo9Wrakc9HJsD8kunVY839TvD-YJmjzQ4C0PHfaS7BQAUbSGkn4J0yZdBkWK_BIKtXMl2H-TWXBFbhtkTR7Mj3y0EeDQZBm-FIaByJ7d9nwobjvE3uAaYKv1L3McHbSl4OcyFSTk_YeFfvEPA-yFJlCijfoNkt_Qad9fHN46lR9FBzlCVo4vjGBawIVeirkQnGDai5s7lbiSnRQjEChCBSlr6lLje9rhShBizjmSrrGC7xVmElxvTUg3GitfR6yQCdM2CfUTHBGpYlVHPAGuDUTI1UVGbe9LnrRpDyy5XuEfI8s3yMc8mc8ZDCqsPEV8WYtmahStjxCkxQyhCIha8Du-DOqiY19yNRkjzl6ODREe4rosAF_a4lOpvh0wfVvUe_Aj-ujdnRxdnW-AXO07Jxhk3w2YaYYPpotxC9FvF3u0Vd1EOVY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+image+encryption+algorithm+based+on+chaotic+maps+and+GF%2828%29+exponent+transformation&rft.jtitle=Nonlinear+dynamics&rft.au=Hussain%2C+Iqtadar&rft.au=Shah%2C+Tariq&rft.au=Gondal%2C+Muhammad+Asif&rft.au=Mahmood%2C+Hasan&rft.date=2013-04-01&rft.pub=Springer+Nature+B.V&rft.issn=0924-090X&rft.eissn=1573-269X&rft.volume=72&rft.issue=1-2&rft.spage=399&rft.epage=406&rft_id=info:doi/10.1007%2Fs11071-012-0723-5
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0924-090X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0924-090X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0924-090X&client=summon