An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map
In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algor...
        Saved in:
      
    
          | Published in | Security and communication networks Vol. 2018; no. 2018; pp. 1 - 11 | 
|---|---|
| Main Authors | , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Cairo, Egypt
          Hindawi Publishing Corporation
    
        01.01.2018
     Hindawi John Wiley & Sons, Inc  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1939-0114 1939-0122 1939-0122  | 
| DOI | 10.1155/2018/8402578 | 
Cover
| Abstract | In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality. | 
    
|---|---|
| AbstractList | In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions:
(
1
)
removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map;
(
2
)
resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality. In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.  | 
    
| Author | Ye, Guodong Pan, Chen Jiao, Kaixin Huang, Xiaoling  | 
    
| Author_xml | – sequence: 1 fullname: Huang, Xiaoling – sequence: 2 fullname: Pan, Chen – sequence: 3 fullname: Jiao, Kaixin – sequence: 4 fullname: Ye, Guodong  | 
    
| BookMark | eNqF0M1PwjAYBvDGYCKgN8-miUed9mtfR0RQEowXPS8vXQvF0c5uSPjv3TKiiYnh1Pfwe988fQaoZ51VCF1SckdpGN4zQpP7RBAWxskJ6tOUpwGhjPV-ZirO0KCq1oREVMSij-YjiydaK1mbL4WnHjZq5_wH1s7j8QpcbSSebWCp8MRKvy9r4yx-gErluBn4I567pala9QLlOTrVUFTq4vAO0ft08jZ-DuavT7PxaB5IwaI6yDkXAnKm0zgFGlOaai4kyZNIhqHkC2AyVQvCaEKk1kkSpZBDvKA6IlI2UfkQBd3drS1hv4OiyEpvNuD3GSVZW0XWVpEdqmj8dedL7z63qqqztdt620TMmAgbETFKGsU6Jb2rKq90Jk0N7YdrD6b47_Ttn6UjSW46vjI2h505pq86rRqjNPxqRoXgEf8G52GSsw | 
    
| CitedBy_id | crossref_primary_10_1155_2021_6650515 crossref_primary_10_1007_s11042_020_10116_z crossref_primary_10_1007_s00500_023_09144_2 crossref_primary_10_3390_e25111516 crossref_primary_10_1007_s00521_024_10800_3 crossref_primary_10_1007_s11227_024_05937_w crossref_primary_10_1016_j_micpro_2020_103737 crossref_primary_10_1007_s11042_021_11160_z crossref_primary_10_1155_2020_8842376 crossref_primary_10_3390_e24101344 crossref_primary_10_1002_ett_4534 crossref_primary_10_1109_ACCESS_2021_3071501 crossref_primary_10_38124_ijisrt_IJISRT24JUL1510 crossref_primary_10_1007_s11042_022_12993_y crossref_primary_10_1007_s11042_022_13314_z crossref_primary_10_1080_00032719_2022_2098313 crossref_primary_10_1142_S0129183124500682 crossref_primary_10_1109_ACCESS_2019_2923018 crossref_primary_10_1002_ett_4594 crossref_primary_10_1007_s11042_024_18628_8 crossref_primary_10_1155_2022_3676265 crossref_primary_10_1007_s10916_019_1389_z crossref_primary_10_1080_09500340_2020_1810344 crossref_primary_10_1007_s11071_024_09306_3 crossref_primary_10_1002_nem_2256 crossref_primary_10_1088_1402_4896_ad3698 crossref_primary_10_1049_el_2020_0992 crossref_primary_10_1109_ACCESS_2021_3096995 crossref_primary_10_1016_j_apenergy_2024_124953 crossref_primary_10_1007_s11042_023_15587_4 crossref_primary_10_3390_e23050535 crossref_primary_10_1007_s11042_024_18351_4 crossref_primary_10_1109_ACCESS_2021_3073514 crossref_primary_10_1142_S0219691320500423  | 
    
| Cites_doi | 10.1016/j.optlaseng.2016.03.019 10.1016/j.sigpro.2015.07.008 10.1161/01.CIR.101.23.e215 10.1109/42.938246 10.1049/iet-ipr.2014.0702 10.1007/s11042-013-1699-y 10.1007/s11042-015-2691-5 10.1016/j.ins.2016.01.017 10.1016/j.sigpro.2016.01.017 10.1016/j.optcom.2013.06.036 10.1016/j.physleta.2008.07.057 10.1016/j.optlaseng.2015.07.015 10.1016/j.optlaseng.2016.08.009 10.1109/TIFS.2015.2489178 10.1155/2016/2670494 10.1016/j.neucom.2014.11.095 10.1016/j.optcom.2011.08.013 10.1016/j.image.2015.10.004 10.1016/j.cnsns.2013.04.008 10.1016/j.ijleo.2014.06.149 10.1016/j.cnsns.2014.04.012 10.1364/OE.21.027873 10.1007/s11071-015-2392-7 10.1007/978-3-662-48683-2_1 10.1142/S0218127406015970 10.1080/0161-118991863745 10.1080/02564602.2015.1087350 10.1007/s11071-014-1235-2 10.3390/e18080276 10.1016/j.optcom.2012.07.052 10.1016/j.ins.2017.02.036 10.1088/1674-1056/17/11/015 10.1016/j.optlastec.2016.02.018 10.1016/j.ins.2012.01.016 10.1016/j.chaos.2016.12.018 10.1007/s11042-015-3064-9 10.1016/j.ins.2013.11.027 10.1016/j.cnsns.2011.11.030 10.1007/s11071-015-2465-7 10.1142/S0218127416501935 10.1016/j.cnsns.2013.07.016 10.1088/1674-1056/26/1/010501 10.1007/s11128-015-0926-z 10.1007/s11071-016-2642-3 10.1007/s10916-017-0698-3 10.1007/s11042-012-1331-6 10.1016/j.sigpro.2011.11.004 10.1016/j.mcm.2013.01.009  | 
    
| ContentType | Journal Article | 
    
| Copyright | Copyright © 2018 Guodong Ye et al. Copyright © 2018 Guodong Ye et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0  | 
    
| Copyright_xml | – notice: Copyright © 2018 Guodong Ye et al. – notice: Copyright © 2018 Guodong Ye et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0  | 
    
| DBID | ADJCN AHFXO RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D ADTOC UNPAY  | 
    
| DOI | 10.1155/2018/8402578 | 
    
| DatabaseName | الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts  Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall  | 
    
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional  | 
    
| DatabaseTitleList | CrossRef Technology Research Database  | 
    
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISSN | 1939-0122 | 
    
| Editor | Antonopoulos, Angelos | 
    
| Editor_xml | – sequence: 1 givenname: Angelos surname: Antonopoulos fullname: Antonopoulos, Angelos  | 
    
| EndPage | 11 | 
    
| ExternalDocumentID | 10.1155/2018/8402578 10_1155_2018_8402578 1214436  | 
    
| GrantInformation_xml | – fundername: Natural Science Foundation of Guangdong Ocean University of China grantid: P15238 – fundername: Science and Technology Planning Project of Guangdong Province of China grantid: 2017A010101025 – fundername: National Natural Science Foundation of China grantid: 61602124; 61702116 – fundername: Natural Science Foundation of Guangdong Province grantid: 2016A030310333 – fundername: Program for Scientific Research Start-up Funds of Guangdong Ocean University of China grantid: R17037 – fundername: Special Funding Program for Excellent Young Scholars of Guangdong Ocean University of China grantid: HDYQ2017006  | 
    
| GroupedDBID | .4S .DC 05W 0R~ 123 24P 31~ 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAEVG AAFWJ AAMMB AANHP AAONW AAZKR ACBWZ ACCMX ACGFO ACRPL ACXQS ACYXJ ADBBV ADIZJ ADJCN ADMLS ADNMO AEFGJ AEIMD AENEX AFBPY AGQPQ AGXDD AHFXO AIDQK AIDYY AJXKR ALMA_UNASSIGNED_HOLDINGS AMBMR ARCSS ASPBG ATUGU AVWKF AZFZN AZVAB BCNDV BDRZF BHBCM BNHUX BOGZA BRXPI CS3 DR2 DU5 EBS EIS EJD F1Z FEDTE G-S GODZA H13 HVGLF HZ~ IX1 LH4 LITHE LW6 MY. MY~ NNB O9- OIG OK1 P2P PUEGO ROL SUPJJ TH9 TUS W99 WBKPD XV2 1OC AAJEY AFKRA ARAPS BENPR BGLVJ CCPQU GROUPED_DOAJ HCIFZ IAO ICD ITC K7- PIMPY RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D ADTOC UNPAY  | 
    
| ID | FETCH-LOGICAL-c426t-d3344ad2f979a17119f34c0d86c55c3ba2c9eb02180cff8869ada7b1f60ccfec3 | 
    
| IEDL.DBID | UNPAY | 
    
| ISSN | 1939-0114 1939-0122  | 
    
| IngestDate | Tue Aug 19 23:19:47 EDT 2025 Fri Jul 25 10:00:51 EDT 2025 Wed Oct 01 02:25:58 EDT 2025 Thu Apr 24 22:59:24 EDT 2025 Sun Jun 02 18:54:25 EDT 2024 Thu Sep 25 15:27:18 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 2018 | 
    
| Language | English | 
    
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. http://creativecommons.org/licenses/by/4.0 cc-by  | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c426t-d3344ad2f979a17119f34c0d86c55c3ba2c9eb02180cff8869ada7b1f60ccfec3 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
    
| ORCID | 0000-0003-4222-1824 0000-0001-6129-1188  | 
    
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://downloads.hindawi.com/journals/scn/2018/8402578.pdf | 
    
| PQID | 2455786210 | 
    
| PQPubID | 1046363 | 
    
| PageCount | 11 | 
    
| ParticipantIDs | unpaywall_primary_10_1155_2018_8402578 proquest_journals_2455786210 crossref_citationtrail_10_1155_2018_8402578 crossref_primary_10_1155_2018_8402578 hindawi_primary_10_1155_2018_8402578 emarefa_primary_1214436  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2018-01-01 | 
    
| PublicationDateYYYYMMDD | 2018-01-01 | 
    
| PublicationDate_xml | – month: 01 year: 2018 text: 2018-01-01 day: 01  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Cairo, Egypt | 
    
| PublicationPlace_xml | – name: Cairo, Egypt – name: London  | 
    
| PublicationTitle | Security and communication networks | 
    
| PublicationYear | 2018 | 
    
| Publisher | Hindawi Publishing Corporation Hindawi John Wiley & Sons, Inc  | 
    
| Publisher_xml | – name: Hindawi Publishing Corporation – name: Hindawi – name: John Wiley & Sons, Inc  | 
    
| References | 22 44 23 45 24 46 25 47 26 48 27 49 28 29 30 31 10 32 11 33 12 34 13 35 14 15 37 16 38 17 39 18 19 1 2 3 4 5 6 7 8 9 40 41 20 42 21 43  | 
    
| References_xml | – ident: 3 doi: 10.1016/j.optlaseng.2016.03.019 – ident: 28 doi: 10.1016/j.sigpro.2015.07.008 – ident: 37 doi: 10.1161/01.CIR.101.23.e215 – ident: 1 doi: 10.1109/42.938246 – ident: 30 doi: 10.1049/iet-ipr.2014.0702 – ident: 18 doi: 10.1007/s11042-013-1699-y – ident: 21 doi: 10.1007/s11042-015-2691-5 – ident: 46 doi: 10.1016/j.ins.2016.01.017 – ident: 41 doi: 10.1016/j.sigpro.2016.01.017 – ident: 2 doi: 10.1016/j.optcom.2013.06.036 – ident: 29 doi: 10.1016/j.physleta.2008.07.057 – ident: 44 doi: 10.1016/j.optlaseng.2015.07.015 – ident: 19 doi: 10.1016/j.optlaseng.2016.08.009 – ident: 24 doi: 10.1109/TIFS.2015.2489178 – ident: 31 doi: 10.1155/2016/2670494 – ident: 12 doi: 10.1016/j.neucom.2014.11.095 – ident: 23 doi: 10.1016/j.optcom.2011.08.013 – ident: 13 doi: 10.1016/j.image.2015.10.004 – ident: 15 doi: 10.1016/j.cnsns.2013.04.008 – ident: 25 doi: 10.1016/j.ijleo.2014.06.149 – ident: 7 doi: 10.1016/j.cnsns.2014.04.012 – ident: 5 doi: 10.1364/OE.21.027873 – ident: 20 doi: 10.1007/s11071-015-2392-7 – ident: 35 doi: 10.1007/978-3-662-48683-2_1 – ident: 39 doi: 10.1142/S0218127406015970 – ident: 11 doi: 10.1080/0161-118991863745 – ident: 22 doi: 10.1080/02564602.2015.1087350 – ident: 27 doi: 10.1007/s11071-014-1235-2 – ident: 45 doi: 10.3390/e18080276 – ident: 49 doi: 10.1016/j.optcom.2012.07.052 – ident: 48 doi: 10.1016/j.ins.2017.02.036 – ident: 17 doi: 10.1088/1674-1056/17/11/015 – ident: 10 doi: 10.1016/j.optlastec.2016.02.018 – ident: 38 doi: 10.1016/j.ins.2012.01.016 – ident: 33 doi: 10.1016/j.chaos.2016.12.018 – ident: 34 doi: 10.1007/s11042-015-3064-9 – ident: 4 doi: 10.1016/j.ins.2013.11.027 – ident: 8 doi: 10.1016/j.cnsns.2011.11.030 – ident: 40 doi: 10.1007/s11071-015-2465-7 – ident: 42 doi: 10.1142/S0218127416501935 – ident: 43 doi: 10.1016/j.cnsns.2013.07.016 – ident: 6 doi: 10.1088/1674-1056/26/1/010501 – ident: 9 doi: 10.1007/s11128-015-0926-z – ident: 26 doi: 10.1007/s11071-016-2642-3 – ident: 32 doi: 10.1007/s10916-017-0698-3 – ident: 47 doi: 10.1007/s11042-012-1331-6 – ident: 14 doi: 10.1016/j.sigpro.2011.11.004 – ident: 16 doi: 10.1016/j.mcm.2013.01.009  | 
    
| SSID | ssj0061474 | 
    
| Score | 2.3360298 | 
    
| Snippet | In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3... | 
    
| SourceID | unpaywall proquest crossref hindawi emarefa  | 
    
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher  | 
    
| StartPage | 1 | 
    
| SubjectTerms | Algorithms Cryptography Data encryption Electrocardiography Encryption Invariance Multimedia Permutations  | 
    
| SummonAdditionalLinks | – databaseName: Hindawi Publishing Open Access dbid: RHX link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dT8IwEG-EhKgPxm_nV_qAvpjFbV277RERggZ8MJLwtnTdGkxgED5C-O-9bh2Cxo-3Lrt2y113v7v1-itCVWoJTwLMmJGkwnSZsE0eJGo3Go0tajkxyWgXOy-s1XWfe7SnSZKm35fwAe0gPbf9e8hD1OQqoZLPVOXWa6tXOFwAGE8vHqvSH9st6tu_9N1Ankoy5NAAOKr0VfK7eN8IMbfn6ZgvF3wwWEOb5j7a02EiruV2PUBbSXqIdtfIA49Qu5binHsYHBZuFkVWGKJQXO_zEfTET0NwF7iRiskycw34AUArxtAgj7idbf4BqQ4fH6Nus_FWb5n6bARTAKbOTNCh6_LYkYEXcNuz7UASV1ixzwSlgkTcEUESKQC3hJS-zwIecy-yJbOEgFcjJ6icjtLkDGEWR1JYgqnkB8ITi3MacUakwyWhiRMb6K7QWyg0cbg6v2IQZgkEpaHScqi1bKCblfQ4J8z4Qe5Um-BTTNG3EWagqjbJHwNcFvYK9Xc3DR2Xwi0GeayBblc2_HWc8_897gLtqMv878slKs8m8-QK4pFZdJ3Nxg8IoNLk priority: 102 providerName: Hindawi Publishing  | 
    
| Title | An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map | 
    
| URI | https://search.emarefa.net/detail/BIM-1214436 https://dx.doi.org/10.1155/2018/8402578 https://www.proquest.com/docview/2455786210 https://downloads.hindawi.com/journals/scn/2018/8402578.pdf  | 
    
| UnpaywallVersion | publishedVersion | 
    
| Volume | 2018 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 issn: 1939-0122 databaseCode: ADMLS dateStart: 20110501 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 1939-0122 databaseCode: DR2 dateStart: 20070101 customDbUrl: isFulltext: true eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0061474 issn: 1939-0122 databaseCode: 24P dateStart: 20170101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fT9swED5BEWJ72A9g0A2QH4AXlJI4sdtoTx2j6iZACFGpSEiRc47FtJJWtBVif_3OiQMUCZj2EjnKxXF8p7vvkvNngG3hY9NQmPFSI9CLJAaeijO7Gk1oX_hchwXt4vGJ7Pain33Rn4Ov1VoYbSnih0qPG1c2J739VXhrN6_j_THmlK4HrX3KS6yxNUbazMOCFATEa7DQOzltX5T_kW0VUBA9tDmvyt6FmOliJiAtZteKGhSlFt3zZ5Dn0jQfqbtbNRg8CkKd93BZDb-sPfndmE7SBv55wuz4n-_3Ad45cMrapTV9hLksX4a3jygLV-ConbOS8ZjcJOtUpV2MsC87uFJDupP9uCYnxQ5zvLkrHBL7RqFSM2qE39lRseSIpI7VaBV6ncPzg67ndmTwkCL5xCPNRZHS3MTNWAXNIIhNGKGvWxKFwDBVHOMstbDBR2NaLRkrrZppYKSPSEMLP0EtH-bZOjCpU4M-SptyESjylRKpkqHhyoQi47oOe5VaEnR05XbXjEFSpC1CJHaeEjdPddi5lx6VNB3PyK05DT-IWdK4UNZh22nklQ42KnNIKq0lPBJ0SVL2XIfdexN5sZ_P_yr4Bd7Y0_KrzwbUJjfTbJNw0CTdogzgjNPxrNvfcrb_F0LIAQE | 
    
| linkProvider | Unpaywall | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT-MwEB5BEQIOwPIsL_kAe1mlzctuI07lUbErQHugEkgrRc44FoiSVrQVgl_POHGArsRD3Bxl4jie0cw3zvgzwC53saEpzDiJ5uiEAj1HRqnZjcaVy11fBTnt4tm5OOmEfy755QTsl3thlKGI70k1qF2bnPThJvfWdl4H9QFmlK57zTrlJcbYan2lJ2FKcALiFZjqnP9tXRX_kU0VkBe-tn2_LHvnfKyLsYA0nd5JalCUmrbvH0OeM6OsLx8fZLf7Jgi1F-BfOfyi9uS2NhomNXz6j9nxm9-3CPMWnLJWYU0_YCLNlmDuDWXhMpy2MlYwHpObZO2ytIsR9mWH17JHT7Lfd-Sk2HGG94-5Q2IHFCoVo0ZwxE7zLUckdSb7K9BpH18cnjj2RAYHKZIPHdJcGErl66gRSa_heZEOQnRVUyDnGCTSxyhNDGxwUetmU0RSyUbiaeEi0tCCVahkvSxdByZUotFFYVIuAkWulDyRItC-1AFPfVWFX6VaYrR05ebUjG6cpy2cx2aeYjtPVdh7ke4XNB3vyK1ZDb-KGdK4QFRh12rkkw62SnOIS63FfsjplqDsuQo_X0zkw342viq4CbPmslj12YLK8H6UbhMOGiY71t6fAUh2_vY | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Effective+Framework+for+Chaotic+Image+Encryption+Based+on+3D+Logistic+Map&rft.jtitle=Security+and+communication+networks&rft.au=Huang%2C+Xiaoling&rft.au=Pan%2C+Chen&rft.au=Jiao%2C+Kaixin&rft.au=Ye%2C+Guodong&rft.date=2018-01-01&rft.pub=Hindawi+Publishing+Corporation&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2018&rft.issue=2018&rft.spage=1&rft.epage=11&rft_id=info:doi/10.1155%2F2018%2F8402578&rft.externalDBID=ADJCN&rft.externalDocID=1214436 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |