An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map

In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algor...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 2018; no. 2018; pp. 1 - 11
Main Authors Huang, Xiaoling, Pan, Chen, Jiao, Kaixin, Ye, Guodong
Format Journal Article
LanguageEnglish
Published Cairo, Egypt Hindawi Publishing Corporation 01.01.2018
Hindawi
John Wiley & Sons, Inc
Subjects
Online AccessGet full text
ISSN1939-0114
1939-0122
1939-0122
DOI10.1155/2018/8402578

Cover

Abstract In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.
AbstractList In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: ( 1 ) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; ( 2 ) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.
In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.
Author Ye, Guodong
Pan, Chen
Jiao, Kaixin
Huang, Xiaoling
Author_xml – sequence: 1
  fullname: Huang, Xiaoling
– sequence: 2
  fullname: Pan, Chen
– sequence: 3
  fullname: Jiao, Kaixin
– sequence: 4
  fullname: Ye, Guodong
BookMark eNqF0M1PwjAYBvDGYCKgN8-miUed9mtfR0RQEowXPS8vXQvF0c5uSPjv3TKiiYnh1Pfwe988fQaoZ51VCF1SckdpGN4zQpP7RBAWxskJ6tOUpwGhjPV-ZirO0KCq1oREVMSij-YjiydaK1mbL4WnHjZq5_wH1s7j8QpcbSSebWCp8MRKvy9r4yx-gErluBn4I567pala9QLlOTrVUFTq4vAO0ft08jZ-DuavT7PxaB5IwaI6yDkXAnKm0zgFGlOaai4kyZNIhqHkC2AyVQvCaEKk1kkSpZBDvKA6IlI2UfkQBd3drS1hv4OiyEpvNuD3GSVZW0XWVpEdqmj8dedL7z63qqqztdt620TMmAgbETFKGsU6Jb2rKq90Jk0N7YdrD6b47_Ttn6UjSW46vjI2h505pq86rRqjNPxqRoXgEf8G52GSsw
CitedBy_id crossref_primary_10_1155_2021_6650515
crossref_primary_10_1007_s11042_020_10116_z
crossref_primary_10_1007_s00500_023_09144_2
crossref_primary_10_3390_e25111516
crossref_primary_10_1007_s00521_024_10800_3
crossref_primary_10_1007_s11227_024_05937_w
crossref_primary_10_1016_j_micpro_2020_103737
crossref_primary_10_1007_s11042_021_11160_z
crossref_primary_10_1155_2020_8842376
crossref_primary_10_3390_e24101344
crossref_primary_10_1002_ett_4534
crossref_primary_10_1109_ACCESS_2021_3071501
crossref_primary_10_38124_ijisrt_IJISRT24JUL1510
crossref_primary_10_1007_s11042_022_12993_y
crossref_primary_10_1007_s11042_022_13314_z
crossref_primary_10_1080_00032719_2022_2098313
crossref_primary_10_1142_S0129183124500682
crossref_primary_10_1109_ACCESS_2019_2923018
crossref_primary_10_1002_ett_4594
crossref_primary_10_1007_s11042_024_18628_8
crossref_primary_10_1155_2022_3676265
crossref_primary_10_1007_s10916_019_1389_z
crossref_primary_10_1080_09500340_2020_1810344
crossref_primary_10_1007_s11071_024_09306_3
crossref_primary_10_1002_nem_2256
crossref_primary_10_1088_1402_4896_ad3698
crossref_primary_10_1049_el_2020_0992
crossref_primary_10_1109_ACCESS_2021_3096995
crossref_primary_10_1016_j_apenergy_2024_124953
crossref_primary_10_1007_s11042_023_15587_4
crossref_primary_10_3390_e23050535
crossref_primary_10_1007_s11042_024_18351_4
crossref_primary_10_1109_ACCESS_2021_3073514
crossref_primary_10_1142_S0219691320500423
Cites_doi 10.1016/j.optlaseng.2016.03.019
10.1016/j.sigpro.2015.07.008
10.1161/01.CIR.101.23.e215
10.1109/42.938246
10.1049/iet-ipr.2014.0702
10.1007/s11042-013-1699-y
10.1007/s11042-015-2691-5
10.1016/j.ins.2016.01.017
10.1016/j.sigpro.2016.01.017
10.1016/j.optcom.2013.06.036
10.1016/j.physleta.2008.07.057
10.1016/j.optlaseng.2015.07.015
10.1016/j.optlaseng.2016.08.009
10.1109/TIFS.2015.2489178
10.1155/2016/2670494
10.1016/j.neucom.2014.11.095
10.1016/j.optcom.2011.08.013
10.1016/j.image.2015.10.004
10.1016/j.cnsns.2013.04.008
10.1016/j.ijleo.2014.06.149
10.1016/j.cnsns.2014.04.012
10.1364/OE.21.027873
10.1007/s11071-015-2392-7
10.1007/978-3-662-48683-2_1
10.1142/S0218127406015970
10.1080/0161-118991863745
10.1080/02564602.2015.1087350
10.1007/s11071-014-1235-2
10.3390/e18080276
10.1016/j.optcom.2012.07.052
10.1016/j.ins.2017.02.036
10.1088/1674-1056/17/11/015
10.1016/j.optlastec.2016.02.018
10.1016/j.ins.2012.01.016
10.1016/j.chaos.2016.12.018
10.1007/s11042-015-3064-9
10.1016/j.ins.2013.11.027
10.1016/j.cnsns.2011.11.030
10.1007/s11071-015-2465-7
10.1142/S0218127416501935
10.1016/j.cnsns.2013.07.016
10.1088/1674-1056/26/1/010501
10.1007/s11128-015-0926-z
10.1007/s11071-016-2642-3
10.1007/s10916-017-0698-3
10.1007/s11042-012-1331-6
10.1016/j.sigpro.2011.11.004
10.1016/j.mcm.2013.01.009
ContentType Journal Article
Copyright Copyright © 2018 Guodong Ye et al.
Copyright © 2018 Guodong Ye et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2018 Guodong Ye et al.
– notice: Copyright © 2018 Guodong Ye et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID ADJCN
AHFXO
RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
DOI 10.1155/2018/8402578
DatabaseName الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals
معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete
Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef


Technology Research Database
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
Editor Antonopoulos, Angelos
Editor_xml – sequence: 1
  givenname: Angelos
  surname: Antonopoulos
  fullname: Antonopoulos, Angelos
EndPage 11
ExternalDocumentID 10.1155/2018/8402578
10_1155_2018_8402578
1214436
GrantInformation_xml – fundername: Natural Science Foundation of Guangdong Ocean University of China
  grantid: P15238
– fundername: Science and Technology Planning Project of Guangdong Province of China
  grantid: 2017A010101025
– fundername: National Natural Science Foundation of China
  grantid: 61602124; 61702116
– fundername: Natural Science Foundation of Guangdong Province
  grantid: 2016A030310333
– fundername: Program for Scientific Research Start-up Funds of Guangdong Ocean University of China
  grantid: R17037
– fundername: Special Funding Program for Excellent Young Scholars of Guangdong Ocean University of China
  grantid: HDYQ2017006
GroupedDBID .4S
.DC
05W
0R~
123
24P
31~
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAEVG
AAFWJ
AAMMB
AANHP
AAONW
AAZKR
ACBWZ
ACCMX
ACGFO
ACRPL
ACXQS
ACYXJ
ADBBV
ADIZJ
ADJCN
ADMLS
ADNMO
AEFGJ
AEIMD
AENEX
AFBPY
AGQPQ
AGXDD
AHFXO
AIDQK
AIDYY
AJXKR
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARCSS
ASPBG
ATUGU
AVWKF
AZFZN
AZVAB
BCNDV
BDRZF
BHBCM
BNHUX
BOGZA
BRXPI
CS3
DR2
DU5
EBS
EIS
EJD
F1Z
FEDTE
G-S
GODZA
H13
HVGLF
HZ~
IX1
LH4
LITHE
LW6
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PUEGO
ROL
SUPJJ
TH9
TUS
W99
WBKPD
XV2
1OC
AAJEY
AFKRA
ARAPS
BENPR
BGLVJ
CCPQU
GROUPED_DOAJ
HCIFZ
IAO
ICD
ITC
K7-
PIMPY
RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
ID FETCH-LOGICAL-c426t-d3344ad2f979a17119f34c0d86c55c3ba2c9eb02180cff8869ada7b1f60ccfec3
IEDL.DBID UNPAY
ISSN 1939-0114
1939-0122
IngestDate Tue Aug 19 23:19:47 EDT 2025
Fri Jul 25 10:00:51 EDT 2025
Wed Oct 01 02:25:58 EDT 2025
Thu Apr 24 22:59:24 EDT 2025
Sun Jun 02 18:54:25 EDT 2024
Thu Sep 25 15:27:18 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2018
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
http://creativecommons.org/licenses/by/4.0
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c426t-d3344ad2f979a17119f34c0d86c55c3ba2c9eb02180cff8869ada7b1f60ccfec3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-4222-1824
0000-0001-6129-1188
OpenAccessLink https://proxy.k.utb.cz/login?url=https://downloads.hindawi.com/journals/scn/2018/8402578.pdf
PQID 2455786210
PQPubID 1046363
PageCount 11
ParticipantIDs unpaywall_primary_10_1155_2018_8402578
proquest_journals_2455786210
crossref_citationtrail_10_1155_2018_8402578
crossref_primary_10_1155_2018_8402578
hindawi_primary_10_1155_2018_8402578
emarefa_primary_1214436
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-01-01
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – month: 01
  year: 2018
  text: 2018-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Cairo, Egypt
PublicationPlace_xml – name: Cairo, Egypt
– name: London
PublicationTitle Security and communication networks
PublicationYear 2018
Publisher Hindawi Publishing Corporation
Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi Publishing Corporation
– name: Hindawi
– name: John Wiley & Sons, Inc
References 22
44
23
45
24
46
25
47
26
48
27
49
28
29
30
31
10
32
11
33
12
34
13
35
14
15
37
16
38
17
39
18
19
1
2
3
4
5
6
7
8
9
40
41
20
42
21
43
References_xml – ident: 3
  doi: 10.1016/j.optlaseng.2016.03.019
– ident: 28
  doi: 10.1016/j.sigpro.2015.07.008
– ident: 37
  doi: 10.1161/01.CIR.101.23.e215
– ident: 1
  doi: 10.1109/42.938246
– ident: 30
  doi: 10.1049/iet-ipr.2014.0702
– ident: 18
  doi: 10.1007/s11042-013-1699-y
– ident: 21
  doi: 10.1007/s11042-015-2691-5
– ident: 46
  doi: 10.1016/j.ins.2016.01.017
– ident: 41
  doi: 10.1016/j.sigpro.2016.01.017
– ident: 2
  doi: 10.1016/j.optcom.2013.06.036
– ident: 29
  doi: 10.1016/j.physleta.2008.07.057
– ident: 44
  doi: 10.1016/j.optlaseng.2015.07.015
– ident: 19
  doi: 10.1016/j.optlaseng.2016.08.009
– ident: 24
  doi: 10.1109/TIFS.2015.2489178
– ident: 31
  doi: 10.1155/2016/2670494
– ident: 12
  doi: 10.1016/j.neucom.2014.11.095
– ident: 23
  doi: 10.1016/j.optcom.2011.08.013
– ident: 13
  doi: 10.1016/j.image.2015.10.004
– ident: 15
  doi: 10.1016/j.cnsns.2013.04.008
– ident: 25
  doi: 10.1016/j.ijleo.2014.06.149
– ident: 7
  doi: 10.1016/j.cnsns.2014.04.012
– ident: 5
  doi: 10.1364/OE.21.027873
– ident: 20
  doi: 10.1007/s11071-015-2392-7
– ident: 35
  doi: 10.1007/978-3-662-48683-2_1
– ident: 39
  doi: 10.1142/S0218127406015970
– ident: 11
  doi: 10.1080/0161-118991863745
– ident: 22
  doi: 10.1080/02564602.2015.1087350
– ident: 27
  doi: 10.1007/s11071-014-1235-2
– ident: 45
  doi: 10.3390/e18080276
– ident: 49
  doi: 10.1016/j.optcom.2012.07.052
– ident: 48
  doi: 10.1016/j.ins.2017.02.036
– ident: 17
  doi: 10.1088/1674-1056/17/11/015
– ident: 10
  doi: 10.1016/j.optlastec.2016.02.018
– ident: 38
  doi: 10.1016/j.ins.2012.01.016
– ident: 33
  doi: 10.1016/j.chaos.2016.12.018
– ident: 34
  doi: 10.1007/s11042-015-3064-9
– ident: 4
  doi: 10.1016/j.ins.2013.11.027
– ident: 8
  doi: 10.1016/j.cnsns.2011.11.030
– ident: 40
  doi: 10.1007/s11071-015-2465-7
– ident: 42
  doi: 10.1142/S0218127416501935
– ident: 43
  doi: 10.1016/j.cnsns.2013.07.016
– ident: 6
  doi: 10.1088/1674-1056/26/1/010501
– ident: 9
  doi: 10.1007/s11128-015-0926-z
– ident: 26
  doi: 10.1007/s11071-016-2642-3
– ident: 32
  doi: 10.1007/s10916-017-0698-3
– ident: 47
  doi: 10.1007/s11042-012-1331-6
– ident: 14
  doi: 10.1016/j.sigpro.2011.11.004
– ident: 16
  doi: 10.1016/j.mcm.2013.01.009
SSID ssj0061474
Score 2.3360298
Snippet In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3...
SourceID unpaywall
proquest
crossref
hindawi
emarefa
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Cryptography
Data encryption
Electrocardiography
Encryption
Invariance
Multimedia
Permutations
SummonAdditionalLinks – databaseName: Hindawi Publishing Open Access
  dbid: RHX
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dT8IwEG-EhKgPxm_nV_qAvpjFbV277RERggZ8MJLwtnTdGkxgED5C-O-9bh2Cxo-3Lrt2y113v7v1-itCVWoJTwLMmJGkwnSZsE0eJGo3Go0tajkxyWgXOy-s1XWfe7SnSZKm35fwAe0gPbf9e8hD1OQqoZLPVOXWa6tXOFwAGE8vHqvSH9st6tu_9N1Ankoy5NAAOKr0VfK7eN8IMbfn6ZgvF3wwWEOb5j7a02EiruV2PUBbSXqIdtfIA49Qu5binHsYHBZuFkVWGKJQXO_zEfTET0NwF7iRiskycw34AUArxtAgj7idbf4BqQ4fH6Nus_FWb5n6bARTAKbOTNCh6_LYkYEXcNuz7UASV1ixzwSlgkTcEUESKQC3hJS-zwIecy-yJbOEgFcjJ6icjtLkDGEWR1JYgqnkB8ITi3MacUakwyWhiRMb6K7QWyg0cbg6v2IQZgkEpaHScqi1bKCblfQ4J8z4Qe5Um-BTTNG3EWagqjbJHwNcFvYK9Xc3DR2Xwi0GeayBblc2_HWc8_897gLtqMv878slKs8m8-QK4pFZdJ3Nxg8IoNLk
  priority: 102
  providerName: Hindawi Publishing
Title An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map
URI https://search.emarefa.net/detail/BIM-1214436
https://dx.doi.org/10.1155/2018/8402578
https://www.proquest.com/docview/2455786210
https://downloads.hindawi.com/journals/scn/2018/8402578.pdf
UnpaywallVersion publishedVersion
Volume 2018
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  issn: 1939-0122
  databaseCode: ADMLS
  dateStart: 20110501
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVWIB
  databaseName: Wiley Online Library - Core collection (SURFmarket)
  issn: 1939-0122
  databaseCode: DR2
  dateStart: 20070101
  customDbUrl:
  isFulltext: true
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0061474
  issn: 1939-0122
  databaseCode: 24P
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fT9swED5BEWJ72A9g0A2QH4AXlJI4sdtoTx2j6iZACFGpSEiRc47FtJJWtBVif_3OiQMUCZj2EjnKxXF8p7vvkvNngG3hY9NQmPFSI9CLJAaeijO7Gk1oX_hchwXt4vGJ7Pain33Rn4Ov1VoYbSnih0qPG1c2J739VXhrN6_j_THmlK4HrX3KS6yxNUbazMOCFATEa7DQOzltX5T_kW0VUBA9tDmvyt6FmOliJiAtZteKGhSlFt3zZ5Dn0jQfqbtbNRg8CkKd93BZDb-sPfndmE7SBv55wuz4n-_3Ad45cMrapTV9hLksX4a3jygLV-ConbOS8ZjcJOtUpV2MsC87uFJDupP9uCYnxQ5zvLkrHBL7RqFSM2qE39lRseSIpI7VaBV6ncPzg67ndmTwkCL5xCPNRZHS3MTNWAXNIIhNGKGvWxKFwDBVHOMstbDBR2NaLRkrrZppYKSPSEMLP0EtH-bZOjCpU4M-SptyESjylRKpkqHhyoQi47oOe5VaEnR05XbXjEFSpC1CJHaeEjdPddi5lx6VNB3PyK05DT-IWdK4UNZh22nklQ42KnNIKq0lPBJ0SVL2XIfdexN5sZ_P_yr4Bd7Y0_KrzwbUJjfTbJNw0CTdogzgjNPxrNvfcrb_F0LIAQE
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT-MwEB5BEQIOwPIsL_kAe1mlzctuI07lUbErQHugEkgrRc44FoiSVrQVgl_POHGArsRD3Bxl4jie0cw3zvgzwC53saEpzDiJ5uiEAj1HRqnZjcaVy11fBTnt4tm5OOmEfy755QTsl3thlKGI70k1qF2bnPThJvfWdl4H9QFmlK57zTrlJcbYan2lJ2FKcALiFZjqnP9tXRX_kU0VkBe-tn2_LHvnfKyLsYA0nd5JalCUmrbvH0OeM6OsLx8fZLf7Jgi1F-BfOfyi9uS2NhomNXz6j9nxm9-3CPMWnLJWYU0_YCLNlmDuDWXhMpy2MlYwHpObZO2ytIsR9mWH17JHT7Lfd-Sk2HGG94-5Q2IHFCoVo0ZwxE7zLUckdSb7K9BpH18cnjj2RAYHKZIPHdJcGErl66gRSa_heZEOQnRVUyDnGCTSxyhNDGxwUetmU0RSyUbiaeEi0tCCVahkvSxdByZUotFFYVIuAkWulDyRItC-1AFPfVWFX6VaYrR05ebUjG6cpy2cx2aeYjtPVdh7ke4XNB3vyK1ZDb-KGdK4QFRh12rkkw62SnOIS63FfsjplqDsuQo_X0zkw342viq4CbPmslj12YLK8H6UbhMOGiY71t6fAUh2_vY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Effective+Framework+for+Chaotic+Image+Encryption+Based+on+3D+Logistic+Map&rft.jtitle=Security+and+communication+networks&rft.au=Huang%2C+Xiaoling&rft.au=Pan%2C+Chen&rft.au=Jiao%2C+Kaixin&rft.au=Ye%2C+Guodong&rft.date=2018-01-01&rft.pub=Hindawi+Publishing+Corporation&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2018&rft.issue=2018&rft.spage=1&rft.epage=11&rft_id=info:doi/10.1155%2F2018%2F8402578&rft.externalDBID=ADJCN&rft.externalDocID=1214436
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon