A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image...
Saved in:
| Published in | The Artificial intelligence review Vol. 57; no. 4; p. 87 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Dordrecht
Springer Netherlands
01.04.2024
Springer Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1573-7462 0269-2821 1573-7462 |
| DOI | 10.1007/s10462-024-10719-0 |
Cover
| Abstract | In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image encryption by combining the power of a chaotic map, elliptic curve cryptography, and genetic algorithm. The chaotic map, specifically Arnold’s cat map, is employed to introduce chaos and randomness into the encryption process. The proposed image encryption process involves applying Arnold’s cat map for shuffling the pixel positions, followed by elliptic curve cryptography for encrypting the pixel values using public and private keys. Additionally, a genetic algorithm is employed to optimize the key generation process, enhancing the security of the encryption scheme. The combined utilization of these techniques aims to achieve a high level of confidentiality and robustness in image encryption. The algorithm underwent thorough analysis. It achieved a maximum entropy score of 7.99, indicating a high level of randomness and unpredictability in the encrypted data. Additionally, it exhibited near-zero correlation, which suggests strong resistance against statistical attacks. Moreover, the cryptographic range of possible keys was found to be
2
511
. This extensive key space makes the algorithm highly resilient against brute force attacks. It took only 0.5634 s to encrypt a moderately sized
512
×
512
pixel image with an 8-bit image on a standard desktop computer with a 2.3 GHz processor and 16 GB of RAM. The experimental findings confirm that the proposed approach is highly effective and efficient in safeguarding sensitive image data from unauthorized access and potential attacks. This scheme has the benefit of allowing us to protect our private image data while it’s being transmitted. |
|---|---|
| AbstractList | In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image encryption by combining the power of a chaotic map, elliptic curve cryptography, and genetic algorithm. The chaotic map, specifically Arnold’s cat map, is employed to introduce chaos and randomness into the encryption process. The proposed image encryption process involves applying Arnold’s cat map for shuffling the pixel positions, followed by elliptic curve cryptography for encrypting the pixel values using public and private keys. Additionally, a genetic algorithm is employed to optimize the key generation process, enhancing the security of the encryption scheme. The combined utilization of these techniques aims to achieve a high level of confidentiality and robustness in image encryption. The algorithm underwent thorough analysis. It achieved a maximum entropy score of 7.99, indicating a high level of randomness and unpredictability in the encrypted data. Additionally, it exhibited near-zero correlation, which suggests strong resistance against statistical attacks. Moreover, the cryptographic range of possible keys was found to be 2511. This extensive key space makes the algorithm highly resilient against brute force attacks. It took only 0.5634 s to encrypt a moderately sized 512×512 pixel image with an 8-bit image on a standard desktop computer with a 2.3 GHz processor and 16 GB of RAM. The experimental findings confirm that the proposed approach is highly effective and efficient in safeguarding sensitive image data from unauthorized access and potential attacks. This scheme has the benefit of allowing us to protect our private image data while it’s being transmitted. In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image encryption by combining the power of a chaotic map, elliptic curve cryptography, and genetic algorithm. The chaotic map, specifically Arnold's cat map, is employed to introduce chaos and randomness into the encryption process. The proposed image encryption process involves applying Arnold's cat map for shuffling the pixel positions, followed by elliptic curve cryptography for encrypting the pixel values using public and private keys. Additionally, a genetic algorithm is employed to optimize the key generation process, enhancing the security of the encryption scheme. The combined utilization of these techniques aims to achieve a high level of confidentiality and robustness in image encryption. The algorithm underwent thorough analysis. It achieved a maximum entropy score of 7.99, indicating a high level of randomness and unpredictability in the encrypted data. Additionally, it exhibited near-zero correlation, which suggests strong resistance against statistical attacks. Moreover, the cryptographic range of possible keys was found to be [Formula omitted]. This extensive key space makes the algorithm highly resilient against brute force attacks. It took only 0.5634 s to encrypt a moderately sized [Formula omitted] pixel image with an 8-bit image on a standard desktop computer with a 2.3 GHz processor and 16 GB of RAM. The experimental findings confirm that the proposed approach is highly effective and efficient in safeguarding sensitive image data from unauthorized access and potential attacks. This scheme has the benefit of allowing us to protect our private image data while it's being transmitted. In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image encryption by combining the power of a chaotic map, elliptic curve cryptography, and genetic algorithm. The chaotic map, specifically Arnold’s cat map, is employed to introduce chaos and randomness into the encryption process. The proposed image encryption process involves applying Arnold’s cat map for shuffling the pixel positions, followed by elliptic curve cryptography for encrypting the pixel values using public and private keys. Additionally, a genetic algorithm is employed to optimize the key generation process, enhancing the security of the encryption scheme. The combined utilization of these techniques aims to achieve a high level of confidentiality and robustness in image encryption. The algorithm underwent thorough analysis. It achieved a maximum entropy score of 7.99, indicating a high level of randomness and unpredictability in the encrypted data. Additionally, it exhibited near-zero correlation, which suggests strong resistance against statistical attacks. Moreover, the cryptographic range of possible keys was found to be $$2^{511}$$ 2 511 . This extensive key space makes the algorithm highly resilient against brute force attacks. It took only 0.5634 s to encrypt a moderately sized $$512\times 512$$ 512 × 512 pixel image with an 8-bit image on a standard desktop computer with a 2.3 GHz processor and 16 GB of RAM. The experimental findings confirm that the proposed approach is highly effective and efficient in safeguarding sensitive image data from unauthorized access and potential attacks. This scheme has the benefit of allowing us to protect our private image data while it’s being transmitted. In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image encryption by combining the power of a chaotic map, elliptic curve cryptography, and genetic algorithm. The chaotic map, specifically Arnold’s cat map, is employed to introduce chaos and randomness into the encryption process. The proposed image encryption process involves applying Arnold’s cat map for shuffling the pixel positions, followed by elliptic curve cryptography for encrypting the pixel values using public and private keys. Additionally, a genetic algorithm is employed to optimize the key generation process, enhancing the security of the encryption scheme. The combined utilization of these techniques aims to achieve a high level of confidentiality and robustness in image encryption. The algorithm underwent thorough analysis. It achieved a maximum entropy score of 7.99, indicating a high level of randomness and unpredictability in the encrypted data. Additionally, it exhibited near-zero correlation, which suggests strong resistance against statistical attacks. Moreover, the cryptographic range of possible keys was found to be 2 511 . This extensive key space makes the algorithm highly resilient against brute force attacks. It took only 0.5634 s to encrypt a moderately sized 512 × 512 pixel image with an 8-bit image on a standard desktop computer with a 2.3 GHz processor and 16 GB of RAM. The experimental findings confirm that the proposed approach is highly effective and efficient in safeguarding sensitive image data from unauthorized access and potential attacks. This scheme has the benefit of allowing us to protect our private image data while it’s being transmitted. |
| ArticleNumber | 87 |
| Audience | Academic |
| Author | Kumar, Sanjay Sharma, Deepmala |
| Author_xml | – sequence: 1 givenname: Sanjay surname: Kumar fullname: Kumar, Sanjay organization: Department of Mathematics, National Institute of Technology Raipur – sequence: 2 givenname: Deepmala surname: Sharma fullname: Sharma, Deepmala email: deepsha.maths@nitrr.ac.in organization: Department of Mathematics, National Institute of Technology Raipur |
| BookMark | eNqNkU1P3DAQhi0EErDwBzhZ6jkw_kicHFeoLUhIvcDZ8jqTrFFiBztptf--XhaJtqoQ8sHW-H2smcfn5NgHj4RcMbhmAOomMZAVL4DLgoFiTQFH5IyVShQq14__OJ-S85SeAaDkUpwRvaZ2a8LsLN2YhC11o-mRordxN80ueJrsFkekS3K-pzgMbtqH7RJ_In0NhT6aabujxre0R4_7azP0Ibp5O16Qk84MCS_f9hV5-vb18fauePjx_f52_VBYKWAumqqTTBjWlq0RG8Ws7eq2aky9aVhXVw00vLQ1KgUdCGONlKqqQXEUG64UtmJFxOHdxU9m98sMg55iniXuNAO9d6QPjnR2pF8dacjUlwM1xfCyYJr1c1iiz41q3pRlo2St5HuqNwNq57swR2NHl6xeq7ripRTZ7opc_yeVV4ujs_m7OpfrfwH1AbAxpBSx09bNZu88g274uG_-D_qpYd8UpRz2Pcb3YT-gfgONrrWr |
| CitedBy_id | crossref_primary_10_1109_JIOT_2024_3432494 crossref_primary_10_3390_electronics13132647 crossref_primary_10_1007_s11071_025_11001_w crossref_primary_10_1080_1206212X_2024_2392168 crossref_primary_10_1007_s10586_024_04746_3 crossref_primary_10_1016_j_procs_2024_09_145 crossref_primary_10_1088_1402_4896_ad9d90 crossref_primary_10_1016_j_asoc_2024_112016 crossref_primary_10_1109_ACCESS_2024_3445277 crossref_primary_10_1007_s11227_024_06624_6 crossref_primary_10_1109_ACCESS_2024_3489452 crossref_primary_10_1007_s11071_024_10331_5 crossref_primary_10_1155_jece_8839945 crossref_primary_10_3390_cryptography9010003 crossref_primary_10_1007_s10586_024_04948_9 crossref_primary_10_1016_j_eswa_2025_127403 crossref_primary_10_1016_j_jisa_2025_103995 crossref_primary_10_1117_1_JEI_34_1_013048 crossref_primary_10_1007_s11042_024_19963_6 crossref_primary_10_1088_1402_4896_ad9ee7 crossref_primary_10_1016_j_aej_2024_12_001 crossref_primary_10_1016_j_compeleceng_2024_109722 crossref_primary_10_1016_j_chaos_2024_115521 crossref_primary_10_33889_IJMEMS_2025_10_1_005 crossref_primary_10_1088_1402_4896_ad4f64 crossref_primary_10_1016_j_aej_2024_11_012 crossref_primary_10_1007_s11071_024_09999_6 crossref_primary_10_1007_s11227_024_06639_z crossref_primary_10_1016_j_iot_2025_101559 crossref_primary_10_1088_1402_4896_ad6062 crossref_primary_10_1080_13682199_2025_2454055 crossref_primary_10_1007_s11071_024_10841_2 crossref_primary_10_1016_j_aej_2025_02_056 |
| Cites_doi | 10.1155/2022/1912603 10.1007/s11042-015-2479-7 10.1016/j.gltp.2021.08.055 10.1109/ACCESS.2021.3072075 10.1007/s11554-023-01278-8 10.1016/j.optlaseng.2016.08.009 10.1016/j.optlaseng.2016.10.019 10.1007/s11042-023-16303-y 10.1109/ACCESS.2019.2906052 10.1007/978-3-319-93025-1_4 10.3390/math11020457 10.1109/TCSVT.2019.2896270 10.1007/s11071-012-0539-3 10.1016/j.optlaseng.2016.03.019 10.1080/0161-118991863745 10.1007/s00500-014-1539-7 10.1016/j.sigpro.2013.10.034 10.21275/ART20162488 10.1016/j.cpc.2012.11.017 10.3390/math11081769 10.1007/s11042-018-5817-8 10.1016/j.sigpro.2018.03.010 10.1007/s11042-020-09058-3 10.1109/ACCESS.2021.3107608 10.1007/s11071-016-3024-6 10.1007/s11042-022-11985-2 10.1016/j.aeue.2012.01.015 10.1016/j.optlaseng.2016.10.012 10.1109/ACCESS.2022.3230096 10.1063/1.5099261 10.1007/s11042-021-10700-x 10.1007/s11277-019-06793-1 10.1007/s00521-017-2993-9 10.1504/IJCSM.2022.122144 10.1016/j.eswa.2023.120622 10.1109/ACCESS.2022.3230141 10.1016/j.image.2017.07.006 10.1090/S0025-5718-1987-0866109-5 10.1007/s11071-023-08331-y 10.1016/j.optlaseng.2016.10.006 10.1016/j.optlaseng.2016.07.010 10.1007/s11042-016-3311-8 10.48550/arXiv.1408.3838 10.1007/s10586-018-02895-w 10.1109/ACCESS.2023.3261568 10.1016/j.asoc.2012.01.016 10.1016/s0895-6111(02)00073-3 10.1117/1.JEI.26.1.013021 10.1007/s11042-016-3274-9 10.1109/ICACCS.2013.6938729 10.1007/978-3-642-31698-2121 |
| ContentType | Journal Article |
| Copyright | The Author(s) 2024 COPYRIGHT 2024 Springer Copyright Springer Nature B.V. Apr 2024 |
| Copyright_xml | – notice: The Author(s) 2024 – notice: COPYRIGHT 2024 Springer – notice: Copyright Springer Nature B.V. Apr 2024 |
| DBID | C6C AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL ABUWG AFKRA ALSLI ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU CNYFK DWQXO E3H F2A FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M1O P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PRINS PRQQA PSYQQ Q9U ADTOC UNPAY |
| DOI | 10.1007/s10462-024-10719-0 |
| DatabaseName | Springer Nature OA Free Journals CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) ProQuest Central (Alumni) ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection ProQuest Technology Collection ProQuest One Community College ProQuest Library & Information Science Collection ProQuest Central Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global (OCUL) Computing Database Library Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest One Social Sciences ProQuest One Psychology [Accès UNIL ; CHUV ; HEP Vaud ; Sites BCUL] ProQuest Central Basic Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef ProQuest Business Collection (Alumni Edition) ProQuest One Psychology Computer Science Database ProQuest Central Student Library and Information Science Abstracts (LISA) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection ProQuest Central China ABI/INFORM Complete ProQuest One Applied & Life Sciences Library & Information Science Collection ProQuest Central (New) Advanced Technologies & Aerospace Collection Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest Business Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Pharma Collection ProQuest Central ABI/INFORM Professional Advanced ProQuest Library Science ProQuest Central Korea Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) ProQuest Computing ProQuest One Social Sciences ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Business (Alumni) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
| DatabaseTitleList | ProQuest Business Collection (Alumni Edition) CrossRef |
| Database_xml | – sequence: 1 dbid: C6C name: Springer Nature OA Free Journals url: http://www.springeropen.com/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 3 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1573-7462 |
| ExternalDocumentID | 10.1007/s10462-024-10719-0 A786254357 10_1007_s10462_024_10719_0 |
| GroupedDBID | -4Z -59 -5G -BR -EM -~C .4S .86 .DC .VR 06D 0R~ 0VY 1N0 203 23N 2J2 2JN 2JY 2KG 2LR 2~H 30V 4.4 406 408 409 40D 40E 5GY 5VS 67Z 6J9 6NX 77K 7WY 8FL 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AAHNG AAIAL AAJKR AAJSJ AAKKN AANZL AARTL AATVU AAUYE AAWCG AAYIU AAYQN AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABEEZ ABFTD ABFTV ABHLI ABHQN ABIVO ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABWNU ABXPI ACACY ACGFS ACHSB ACHXU ACIHN ACKNC ACMDZ ACMLO ACOKC ACOMO ACREN ACSNA ACULB ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEAQA AEFQL AEGAL AEGNC AEJHL AEJRE AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFGXO AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIIXL AILAN AITGF AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALSLI ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BENPR BGNMA C24 C6C CS3 CSCUP DDRTE DL5 DNIVK DPUIP EBLON EBS EDO EIOEI ESBYG FEDTE FERAY FFXSO FIGPU FNLPD FRRFC FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GXS HCIFZ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IAO IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6~ KDC KOV LLZTM M1O M4Y MA- N9A NB0 NPVJJ NQJWS NU0 O93 O9G O9I O9J OAM P19 P9O PF0 PT5 QOK QOS R89 R9I RHV RNS ROL RPX RSV S16 S27 S3B SAP SCO SDH SDM SHX SISQX SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX VC2 W23 W48 WH7 WK8 YLTOR Z45 Z5O Z7R Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~A9 ~EX 77I 8FE 8FG AAFWJ AASML AAYXX ABDBE ABFSG ABUWG ACSTC AEZWR AFHIU AFKRA AHPBZ AHWEU AIXLP AYFIA AZQEC BEZIV BGLVJ BPHCQ CITATION CNYFK ICD K6V M0C MK~ P62 PQBIZ PQQKQ PROAC PSYQQ PUEGO Q2X 8AO CCPQU DWQXO GNUQQ K7- PHGZM PHGZT PQBZA PQGLB PRQQA 3V. 7SC 7XB 8AL 8FD 8FK E3H F2A FRNLG JQ2 L.- L7M L~C L~D M0N PKEHL PQEST PQUKI PRINS Q9U -Y2 1SB 2.D 28- 2P1 2VQ 5QI AAOBN AARHV AAYTO ABJNI ABQSL ACBXY ADHKG ADTOC AEBTG AEFIE AEKMD AFEXP AFFNX AFGCZ AGGDS AGJBK AGQPQ AJBLW BBWZM BDATZ CAG COF EJD FINBP FSGXE H13 HF~ IHE KOW LAK N2Q NDZJH O9- OVD R4E RNI RZC RZE RZK S1Z S26 S28 SCJ SCLPG T16 TEORI UNPAY UZXMN VFIZW |
| ID | FETCH-LOGICAL-c430t-96f413a1d5da3b71ccf8d69a8b91f8690925c8e770f03aca44768072e3b277ed3 |
| IEDL.DBID | M1O |
| ISSN | 1573-7462 0269-2821 |
| IngestDate | Tue Aug 19 17:40:15 EDT 2025 Sat Oct 25 06:56:41 EDT 2025 Mon Oct 20 22:44:55 EDT 2025 Mon Oct 20 16:51:14 EDT 2025 Wed Oct 01 02:07:40 EDT 2025 Thu Apr 24 23:08:18 EDT 2025 Fri Feb 21 02:42:05 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Image encryption Elliptic curve cryptography Chaotic map Genetic algorithm |
| Language | English |
| License | cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c430t-96f413a1d5da3b71ccf8d69a8b91f8690925c8e770f03aca44768072e3b277ed3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://link.springer.com/content/pdf/10.1007/s10462-024-10719-0.pdf |
| PQID | 2955974874 |
| PQPubID | 36790 |
| ParticipantIDs | unpaywall_primary_10_1007_s10462_024_10719_0 proquest_journals_2955974874 gale_infotracmisc_A786254357 gale_infotracacademiconefile_A786254357 crossref_citationtrail_10_1007_s10462_024_10719_0 crossref_primary_10_1007_s10462_024_10719_0 springer_journals_10_1007_s10462_024_10719_0 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2024-04-01 |
| PublicationDateYYYYMMDD | 2024-04-01 |
| PublicationDate_xml | – month: 04 year: 2024 text: 2024-04-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Dordrecht |
| PublicationPlace_xml | – name: Dordrecht |
| PublicationSubtitle | An International Science and Engineering Journal |
| PublicationTitle | The Artificial intelligence review |
| PublicationTitleAbbrev | Artif Intell Rev |
| PublicationYear | 2024 |
| Publisher | Springer Netherlands Springer Springer Nature B.V |
| Publisher_xml | – name: Springer Netherlands – name: Springer – name: Springer Nature B.V |
| References | Zhan, Wei, Shi, Yu (CR52) 2017; 26 Chai, Gan, Yuan, Chen, Liu (CR10) 2019; 31 Cavusoglu, Kacar (CR9) 2019; 22 Choi, Seok, Seo, Kim (CR12) 2016; 75 Mahboob, Asif, Nadeem, Saleem, Eldin, Siddique (CR34) 2022; 10 Mirjalili, Mirjalili (CR36) 2019; 780 Hariyanto, Rahim (CR18) 2016; 5 Hafsa, Sghaier, Malek, Machhout (CR17) 2021; 80 Liu, Sun, Zhu (CR30) 2016; 84 Belazi, El-Latif, Diaconu, Rhouma, Belghith (CR7) 2017; 88 Matthews (CR35) 1989; 13 Mozaffari (CR38) 2018; 77 Bao, Yang (CR6) 2012; 70 Lin, Wu, Chen (CR27) 2021; 9 Cao, Huang, Zhou (CR8) 2003; 27 Abdullah, Enayatifar, Lee (CR1) 2012; 66 Zhou, Bao, Chen (CR53) 2014; 97 Mishra, Routray, Kumar (CR37) 2014; 37 Pareek, Patidar (CR42) 2016; 20 CR47 Wang, Liu (CR49) 2017; 76 Banu, Al-Alawi, Padmaa, Priya, Thanikaiselvan, Amirtharajan (CR5) 2023; 82 CR44 Mahalingam, Velupillai Meikandan, Thenmozhi, Moria, Lakshmi, Chidambaram, Amirtharajan (CR33) 2023; 11 Nepomuceno, Nardo, Arias-Garcia, Butusov, Tutueva (CR39) 2019 Raj, Janakiraman, Amirtharajan (CR45) 2023; 20 Ghazvini, Mirzadi, Parvar (CR16) 2020; 79 Khalid, Shah, Eldin, Shah, Asif, Saddique (CR23) 2022; 11 Chai, Chen, Broyde (CR11) 2017; 88 Attaullah, Jamal (CR4) 2020; 110 Niyat, Moattar, Torshiz (CR40) 2017; 90 Liu, Wang (CR29) 2012; 12 Hu, Liu, Ding (CR19) 2013; 184 Parida, Pradhan, Gao (CR43) 2021; 9 Mahalingam, Veeramalai, Menon, Amirtharajan (CR32) 2023; 11 CR14 Al-Hazaimeh, Al-Jamal, Alomari (CR2) 2022; 15 CR51 Asif, Asamoah, Hazzazi, Alharbi, Ashraf, Alghamdi (CR3) 2022; 2022 Liao, Yu, Li, Li, Qin (CR26) 2019; 30 Liu, Wang, Fan, Gong (CR28) 2016; 75 Dash, Padhy, Devi, Sachi, Patro (CR13) 2023; 231 Luo, Ouyang, Liu, Cao (CR31) 2019; 7 Hu, Liu, Gong, Ouyang (CR20) 2017; 87 Enayatifar, Abdullah, Isnin, Altameem, Lee (CR15) 2017; 90 Liao, Qin, Ding (CR25) 2017; 58 Xu, Gou, Li, Li (CR50) 2017; 91 Koblitz (CR24) 1987; 48 Rezaei, Ghanbari, Enayatifar (CR46) 2023; 111 Hua, Jin, Xu, Huang (CR21) 2018; 149 Hussain, Asif, Shah, Mahboob, Eldin (CR22) 2023; 11 Noshadian, Ebrahimzade, Kazemitabar (CR41) 2018; 77 Tora, Gokcay, Turan, Buker (CR48) 2022; 81 K Zhan (10719_CR52) 2017; 26 M Mishra (10719_CR37) 2014; 37 A Belazi (10719_CR7) 2017; 88 10719_CR47 EG Nepomuceno (10719_CR39) 2019 X Wang (10719_CR49) 2017; 76 Z Hua (10719_CR21) 2018; 149 Shah T Attaullah (10719_CR4) 2020; 110 10719_CR44 J Choi (10719_CR12) 2016; 75 J Bao (10719_CR6) 2012; 70 CH Lin (10719_CR27) 2021; 9 B Rezaei (10719_CR46) 2023; 111 NK Pareek (10719_CR42) 2016; 20 M Asif (10719_CR3) 2022; 2022 A Mahboob (10719_CR34) 2022; 10 X Chai (10719_CR11) 2017; 88 I Khalid (10719_CR23) 2022; 11 F Cao (10719_CR8) 2003; 27 H Hu (10719_CR19) 2013; 184 Y Liu (10719_CR28) 2016; 75 R Enayatifar (10719_CR15) 2017; 90 AH Abdullah (10719_CR1) 2012; 66 U Cavusoglu (10719_CR9) 2019; 22 H Liu (10719_CR29) 2012; 12 S Hussain (10719_CR22) 2023; 11 H Mahalingam (10719_CR33) 2023; 11 R Matthews (10719_CR35) 1989; 13 E Hariyanto (10719_CR18) 2016; 5 N Koblitz (10719_CR24) 1987; 48 M Ghazvini (10719_CR16) 2020; 79 X Liao (10719_CR26) 2019; 30 X Liao (10719_CR25) 2017; 58 S Mirjalili (10719_CR36) 2019; 780 H Tora (10719_CR48) 2022; 81 Y Zhou (10719_CR53) 2014; 97 X Chai (10719_CR10) 2019; 31 A Hafsa (10719_CR17) 2021; 80 Y Luo (10719_CR31) 2019; 7 T Hu (10719_CR20) 2017; 87 OM Al-Hazaimeh (10719_CR2) 2022; 15 S Mozaffari (10719_CR38) 2018; 77 10719_CR14 AY Niyat (10719_CR40) 2017; 90 W Liu (10719_CR30) 2016; 84 L Xu (10719_CR50) 2017; 91 S Dash (10719_CR13) 2023; 231 SA Banu (10719_CR5) 2023; 82 V Raj (10719_CR45) 2023; 20 S Noshadian (10719_CR41) 2018; 77 P Parida (10719_CR43) 2021; 9 H Mahalingam (10719_CR32) 2023; 11 10719_CR51 |
| References_xml | – volume: 2022 start-page: 1 year: 2022 end-page: 9 ident: CR3 article-title: A novel image encryption technique based on cyclic codes over Galois field publication-title: Comput Intell Neurosci doi: 10.1155/2022/1912603 – volume: 75 start-page: 4363 year: 2016 end-page: 4382 ident: CR28 article-title: Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-2479-7 – volume: 77 start-page: 25569 year: 2018 end-page: 25590 ident: CR41 article-title: Optimizing chaos based image encryption publication-title: Multimed Tools Appl doi: 10.1016/j.gltp.2021.08.055 – volume: 9 start-page: 76191 year: 2021 end-page: 76204 ident: CR43 article-title: Image encryption and authentication with elliptic curve cryptography and multidimensional chaotic maps publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3072075 – volume: 20 start-page: 1 issue: 2 year: 2023 end-page: 26 ident: CR45 article-title: Reconfigurable color medical image encryptor using hardware accelerated Chao (S)-box triplets publication-title: J Real-Time Image Process doi: 10.1007/s11554-023-01278-8 – ident: CR51 – volume: 88 start-page: 197 year: 2017 end-page: 213 ident: CR11 article-title: A novel chaos-based image encryption algorithm using DNA sequence operations publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.08.009 – volume: 90 start-page: 225 year: 2017 end-page: 237 ident: CR40 article-title: Color image encryption based on hybrid hyper-chaotic system and cellular automata publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.10.019 – volume: 82 start-page: 1 year: 2023 end-page: 18 ident: CR5 article-title: Healthcare with datacare-a triangular DNA security publication-title: Multimed Tools Appl doi: 10.1007/s11042-023-16303-y – volume: 7 start-page: 38507 year: 2019 end-page: 38522 ident: CR31 article-title: An image encryption method based on elliptic curve elgamal encryption and chaotic systems publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2906052 – volume: 780 start-page: 43 year: 2019 end-page: 55 ident: CR36 article-title: Genetic algorithm publication-title: Evol Algorithms Neural Netw Theor Appl doi: 10.1007/978-3-319-93025-1_4 – volume: 11 start-page: 1 issue: 2 year: 2023 end-page: 23 ident: CR32 article-title: Dual-domain image encryption in unsecure medium: a secure communication perspective publication-title: Mathematics doi: 10.3390/math11020457 – volume: 30 start-page: 685 issue: 3 year: 2019 end-page: 696 ident: CR26 article-title: A new payload partition strategy in color image steganography publication-title: IEEE Trans Circuits Syst Video Technol doi: 10.1109/TCSVT.2019.2896270 – volume: 70 start-page: 1365 year: 2012 end-page: 1375 ident: CR6 article-title: Period of the discrete arnold cat map and general cat map publication-title: Nonlinear Dyn doi: 10.1007/s11071-012-0539-3 – volume: 84 start-page: 26 year: 2016 end-page: 36 ident: CR30 article-title: A fast image encryption algorithm based on chaotic map publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.03.019 – volume: 13 start-page: 29 issue: 1 year: 1989 end-page: 42 ident: CR35 article-title: On the derivation of a chaotic encryption algorithm publication-title: Cryptologia doi: 10.1080/0161-118991863745 – volume: 20 start-page: 763 year: 2016 end-page: 772 ident: CR42 article-title: Medical image protection using genetic algorithm operations publication-title: Soft Comput doi: 10.1007/s00500-014-1539-7 – volume: 97 start-page: 172 year: 2014 end-page: 182 ident: CR53 article-title: A new 1D chaotic system for image encryption publication-title: Signal Process doi: 10.1016/j.sigpro.2013.10.034 – volume: 5 start-page: 1363 issue: 10 year: 2016 end-page: 1365 ident: CR18 article-title: Arnold’s cat map algorithm in digital image encryption publication-title: Int J Sci Res doi: 10.21275/ART20162488 – volume: 184 start-page: 765 issue: 3 year: 2013 end-page: 768 ident: CR19 article-title: Pseudorandom sequence generator based on the Chen chaotic system publication-title: Comput Phys Commun doi: 10.1016/j.cpc.2012.11.017 – volume: 11 start-page: 1 issue: 8 year: 2023 end-page: 23 ident: CR33 article-title: Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments publication-title: Mathematics doi: 10.3390/math11081769 – volume: 77 start-page: 25799 year: 2018 end-page: 25819 ident: CR38 article-title: Parallel image encryption with bitplane decomposition and genetic algorithm publication-title: Multimed Tools Appl doi: 10.1007/s11042-018-5817-8 – volume: 149 start-page: 148 year: 2018 end-page: 161 ident: CR21 article-title: 2D Logistic-Sine-coupling map for image encryption publication-title: Signal Process doi: 10.1016/j.sigpro.2018.03.010 – volume: 79 start-page: 26927 year: 2020 end-page: 26950 ident: CR16 article-title: A modified method for image encryption based on chaotic map and genetic algorithm publication-title: Multimed Tools Appl doi: 10.1007/s11042-020-09058-3 – volume: 9 start-page: 118624 year: 2021 end-page: 118639 ident: CR27 article-title: Intelligent symmetric cryptography with chaotic map and quantum based key generator for medical images info security publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3107608 – volume: 87 start-page: 51 year: 2017 end-page: 66 ident: CR20 article-title: An image encryption scheme combining chaos with cycle operation for DNA sequences publication-title: Nonlinear Dyn doi: 10.1007/s11071-016-3024-6 – ident: CR47 – volume: 81 start-page: 31349 issue: 22 year: 2022 end-page: 31362 ident: CR48 article-title: A generalized Arnold’s Cat Map transformation for image scrambling publication-title: Multimed Tools Appl doi: 10.1007/s11042-022-11985-2 – ident: CR14 – volume: 66 start-page: 806 issue: 10 year: 2012 end-page: 816 ident: CR1 article-title: A hybrid genetic algorithm and chaotic function model for image encryption publication-title: AEU-Int J Electron Commun doi: 10.1016/j.aeue.2012.01.015 – volume: 91 start-page: 41 year: 2017 end-page: 52 ident: CR50 article-title: A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.10.012 – volume: 11 start-page: 5483 year: 2022 end-page: 5501 ident: CR23 article-title: An integrated image encryption scheme based on elliptic curve publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3230096 – year: 2019 ident: CR39 article-title: Image encryption based on the pseudo-orbits from 1D chaotic map publication-title: Chaos Interdiscip J Nonlinear Sci doi: 10.1063/1.5099261 – volume: 80 start-page: 19769 year: 2021 end-page: 19801 ident: CR17 article-title: Image encryption method based on improved ECC and modified AES algorithm publication-title: Multimed Tools Appl doi: 10.1007/s11042-021-10700-x – volume: 110 start-page: 1429 year: 2020 end-page: 1442 ident: CR4 article-title: An improved chaotic cryptosystem for image encryption and digital watermarking publication-title: Wirel Pers Commun doi: 10.1007/s11277-019-06793-1 – volume: 31 start-page: 219 issue: 1 year: 2019 end-page: 237 ident: CR10 article-title: A novel image encryption scheme based on DNA sequence operations and chaotic systems publication-title: Neural Comput Appl doi: 10.1007/s00521-017-2993-9 – volume: 15 start-page: 43 issue: 1 year: 2022 end-page: 59 ident: CR2 article-title: Image encryption using anti-synchronisation and bogdanov transformation map publication-title: Int J Comput Sci Math doi: 10.1504/IJCSM.2022.122144 – ident: CR44 – volume: 231 year: 2023 ident: CR13 article-title: An efficient Intra-Inter pixel encryption scheme to secure healthcare images for an IoT environment publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2023.120622 – volume: 10 start-page: 132908 year: 2022 end-page: 132916 ident: CR34 article-title: A cryptographic scheme for construction of substitution boxes using quantic fractional transformation publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3230141 – volume: 58 start-page: 146 year: 2017 end-page: 156 ident: CR25 article-title: Data embedding in digital images using critical functions publication-title: Signal Process Image Commun doi: 10.1016/j.image.2017.07.006 – volume: 48 start-page: 203 issue: 177 year: 1987 end-page: 209 ident: CR24 article-title: Elliptic curve cryptosystems publication-title: Math Comput doi: 10.1090/S0025-5718-1987-0866109-5 – volume: 111 start-page: 9629 issue: 10 year: 2023 end-page: 9647 ident: CR46 article-title: An image encryption approach using tuned Henon chaotic map and evolutionary algorithm publication-title: Nonlinear Dyn doi: 10.1007/s11071-023-08331-y – volume: 90 start-page: 146 year: 2017 end-page: 154 ident: CR15 article-title: Image encryption using a synchronous permutation-diffusion technique publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.10.006 – volume: 88 start-page: 37 year: 2017 end-page: 50 ident: CR7 article-title: Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.07.010 – volume: 76 start-page: 6229 year: 2017 end-page: 6245 ident: CR49 article-title: A novel and effective image encryption algorithm based on chaos and DNA encoding publication-title: Multimed Tools Appl doi: 10.1007/s11042-016-3311-8 – volume: 37 start-page: 16 issue: 9 year: 2014 end-page: 20 ident: CR37 article-title: High security image steganography with modified Arnold cat map publication-title: Int J Comput Appl doi: 10.48550/arXiv.1408.3838 – volume: 22 start-page: 1211 year: 2019 end-page: 1223 ident: CR9 article-title: A novel parallel image encryption algorithm based on chaos publication-title: Clust Comput doi: 10.1007/s10586-018-02895-w – volume: 11 start-page: 29698 year: 2023 end-page: 29710 ident: CR22 article-title: Redesigning the serpent algorithm by PA-Loop and its image encryption application publication-title: IEEE Access doi: 10.1109/ACCESS.2023.3261568 – volume: 12 start-page: 1457 issue: 5 year: 2012 end-page: 1466 ident: CR29 article-title: Image encryption using DNA complementary rule and chaotic maps publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2012.01.016 – volume: 27 start-page: 185 year: 2003 end-page: 196 ident: CR8 article-title: Medical image security in a HIPAA mandated PACS environment publication-title: Comput Med Imaging Gr doi: 10.1016/s0895-6111(02)00073-3 – volume: 26 start-page: 013021 issue: 1 year: 2017 end-page: 013021 ident: CR52 article-title: Cross-utilizing hyperchaotic and DNA sequences for image encryption publication-title: J Electron Imaging doi: 10.1117/1.JEI.26.1.013021 – volume: 75 start-page: 14685 year: 2016 end-page: 14706 ident: CR12 article-title: A fast ARX model-based image encryption scheme publication-title: Multimed Tools Appl doi: 10.1007/s11042-016-3274-9 – volume: 82 start-page: 1 year: 2023 ident: 10719_CR5 publication-title: Multimed Tools Appl doi: 10.1007/s11042-023-16303-y – volume: 5 start-page: 1363 issue: 10 year: 2016 ident: 10719_CR18 publication-title: Int J Sci Res doi: 10.21275/ART20162488 – volume: 22 start-page: 1211 year: 2019 ident: 10719_CR9 publication-title: Clust Comput doi: 10.1007/s10586-018-02895-w – volume: 30 start-page: 685 issue: 3 year: 2019 ident: 10719_CR26 publication-title: IEEE Trans Circuits Syst Video Technol doi: 10.1109/TCSVT.2019.2896270 – volume: 111 start-page: 9629 issue: 10 year: 2023 ident: 10719_CR46 publication-title: Nonlinear Dyn doi: 10.1007/s11071-023-08331-y – ident: 10719_CR14 – volume: 87 start-page: 51 year: 2017 ident: 10719_CR20 publication-title: Nonlinear Dyn doi: 10.1007/s11071-016-3024-6 – volume: 84 start-page: 26 year: 2016 ident: 10719_CR30 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.03.019 – volume: 20 start-page: 1 issue: 2 year: 2023 ident: 10719_CR45 publication-title: J Real-Time Image Process doi: 10.1007/s11554-023-01278-8 – volume: 12 start-page: 1457 issue: 5 year: 2012 ident: 10719_CR29 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2012.01.016 – volume: 91 start-page: 41 year: 2017 ident: 10719_CR50 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.10.012 – volume: 15 start-page: 43 issue: 1 year: 2022 ident: 10719_CR2 publication-title: Int J Comput Sci Math doi: 10.1504/IJCSM.2022.122144 – volume: 11 start-page: 1 issue: 8 year: 2023 ident: 10719_CR33 publication-title: Mathematics doi: 10.3390/math11081769 – volume: 149 start-page: 148 year: 2018 ident: 10719_CR21 publication-title: Signal Process doi: 10.1016/j.sigpro.2018.03.010 – volume: 184 start-page: 765 issue: 3 year: 2013 ident: 10719_CR19 publication-title: Comput Phys Commun doi: 10.1016/j.cpc.2012.11.017 – volume: 7 start-page: 38507 year: 2019 ident: 10719_CR31 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2906052 – volume: 77 start-page: 25569 year: 2018 ident: 10719_CR41 publication-title: Multimed Tools Appl doi: 10.1016/j.gltp.2021.08.055 – volume: 231 year: 2023 ident: 10719_CR13 publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2023.120622 – volume: 26 start-page: 013021 issue: 1 year: 2017 ident: 10719_CR52 publication-title: J Electron Imaging doi: 10.1117/1.JEI.26.1.013021 – volume: 48 start-page: 203 issue: 177 year: 1987 ident: 10719_CR24 publication-title: Math Comput doi: 10.1090/S0025-5718-1987-0866109-5 – volume: 2022 start-page: 1 year: 2022 ident: 10719_CR3 publication-title: Comput Intell Neurosci doi: 10.1155/2022/1912603 – volume: 88 start-page: 37 year: 2017 ident: 10719_CR7 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.07.010 – volume: 11 start-page: 29698 year: 2023 ident: 10719_CR22 publication-title: IEEE Access doi: 10.1109/ACCESS.2023.3261568 – volume: 11 start-page: 1 issue: 2 year: 2023 ident: 10719_CR32 publication-title: Mathematics doi: 10.3390/math11020457 – volume: 13 start-page: 29 issue: 1 year: 1989 ident: 10719_CR35 publication-title: Cryptologia doi: 10.1080/0161-118991863745 – volume: 20 start-page: 763 year: 2016 ident: 10719_CR42 publication-title: Soft Comput doi: 10.1007/s00500-014-1539-7 – volume: 77 start-page: 25799 year: 2018 ident: 10719_CR38 publication-title: Multimed Tools Appl doi: 10.1007/s11042-018-5817-8 – volume: 31 start-page: 219 issue: 1 year: 2019 ident: 10719_CR10 publication-title: Neural Comput Appl doi: 10.1007/s00521-017-2993-9 – volume: 66 start-page: 806 issue: 10 year: 2012 ident: 10719_CR1 publication-title: AEU-Int J Electron Commun doi: 10.1016/j.aeue.2012.01.015 – volume: 75 start-page: 4363 year: 2016 ident: 10719_CR28 publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-2479-7 – ident: 10719_CR44 doi: 10.1109/ICACCS.2013.6938729 – volume: 58 start-page: 146 year: 2017 ident: 10719_CR25 publication-title: Signal Process Image Commun doi: 10.1016/j.image.2017.07.006 – volume: 37 start-page: 16 issue: 9 year: 2014 ident: 10719_CR37 publication-title: Int J Comput Appl doi: 10.48550/arXiv.1408.3838 – ident: 10719_CR47 – volume: 81 start-page: 31349 issue: 22 year: 2022 ident: 10719_CR48 publication-title: Multimed Tools Appl doi: 10.1007/s11042-022-11985-2 – volume: 88 start-page: 197 year: 2017 ident: 10719_CR11 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.08.009 – volume: 97 start-page: 172 year: 2014 ident: 10719_CR53 publication-title: Signal Process doi: 10.1016/j.sigpro.2013.10.034 – volume: 76 start-page: 6229 year: 2017 ident: 10719_CR49 publication-title: Multimed Tools Appl doi: 10.1007/s11042-016-3311-8 – volume: 70 start-page: 1365 year: 2012 ident: 10719_CR6 publication-title: Nonlinear Dyn doi: 10.1007/s11071-012-0539-3 – volume: 110 start-page: 1429 year: 2020 ident: 10719_CR4 publication-title: Wirel Pers Commun doi: 10.1007/s11277-019-06793-1 – volume: 79 start-page: 26927 year: 2020 ident: 10719_CR16 publication-title: Multimed Tools Appl doi: 10.1007/s11042-020-09058-3 – volume: 11 start-page: 5483 year: 2022 ident: 10719_CR23 publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3230096 – volume: 780 start-page: 43 year: 2019 ident: 10719_CR36 publication-title: Evol Algorithms Neural Netw Theor Appl doi: 10.1007/978-3-319-93025-1_4 – volume: 27 start-page: 185 year: 2003 ident: 10719_CR8 publication-title: Comput Med Imaging Gr doi: 10.1016/s0895-6111(02)00073-3 – ident: 10719_CR51 doi: 10.1007/978-3-642-31698-2121 – volume: 9 start-page: 118624 year: 2021 ident: 10719_CR27 publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3107608 – volume: 90 start-page: 146 year: 2017 ident: 10719_CR15 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.10.006 – volume: 80 start-page: 19769 year: 2021 ident: 10719_CR17 publication-title: Multimed Tools Appl doi: 10.1007/s11042-021-10700-x – volume: 9 start-page: 76191 year: 2021 ident: 10719_CR43 publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3072075 – volume: 10 start-page: 132908 year: 2022 ident: 10719_CR34 publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3230141 – year: 2019 ident: 10719_CR39 publication-title: Chaos Interdiscip J Nonlinear Sci doi: 10.1063/1.5099261 – volume: 75 start-page: 14685 year: 2016 ident: 10719_CR12 publication-title: Multimed Tools Appl doi: 10.1007/s11042-016-3274-9 – volume: 90 start-page: 225 year: 2017 ident: 10719_CR40 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.10.019 |
| SSID | ssj0005243 |
| Score | 2.5963645 |
| Snippet | In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual... |
| SourceID | unpaywall proquest gale crossref springer |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 87 |
| SubjectTerms | Algorithms Analysis Artificial Intelligence Chaos theory Computer Science Cryptography Curves Data security Digital imaging Encryption Equipment and supplies Genetic algorithms Image enhancement Image processing Investment analysis Maximum entropy Medical imaging equipment Microprocessors Personal computers Pixels Randomness Security |
| SummonAdditionalLinks | – databaseName: Springer Nature OA Free Journals dbid: C24 link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB58HNSDb7FaJQfBg13Y3WQ3u8ciShH0ZMFbSPNoC-221Fbx3ztZs7UVKXrOJGR33mTmG4ArDHK10lIFWpowYJbSQOY2CWiO3iJKcxVZ96L7-JS22uzhJXnxTWGvVbV79SRZWuqFZjeWxgH6FDQd3LXerMMmxh-xG9hw63oc5oUdjPr2mN_3Lbmgn4Z44UV0B7ZmxVh-vMvBYMHp3O_Dro8WSfOLvQewZopD2KsmMRCvmEcgmkT15AipiHNLmvSHaCcILk4-SptAMIk1Q0NcmXuXOBDOsSNWs8mbISWRh64mstAEhcr1NhI56I4m_WlveAzt-7vn21bgRycEitFwGuSpRe8kI51oSTs8UspmOs1l1snx52NGnMeJygznoQ2pVJIxTDtCHhvaiTk3mp7ARjEqzCkQm4RMoZfH0zIWZam03EYof8ohxUdK1yCq_qZQHlfcjbcYiG9EZMcBgRwQJQdEWIOb-Z7xF6rGSuprxyThVA5PVtJ3DuD9HHiVaHJMyxKM-3gN6kuUqCpqeblis_Cq-iriEoMP8zZWg0bF-u_lVddqzMXjD19x9r_Tz2E7djJbFgnVYWM6mZkLjH-mnctS3D8Bi_n6Pw priority: 102 providerName: Springer Nature – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT9swFH9i5bBxGLAPrRtDPkziMFyS2ImTY7UNoUlDO1AJTpbjD0C0aVXSTeyv33PiQIsmBNr5PVu28z7j934G-IRBrtFGaWqUjSh3jFFVuJSyAr1FnBU6dv5G98dxdjTi30_T0zX42vXCNNXu3ZVk29PgUZqq-mBm3MFS4xvPEor-Bc2I8G04AyQ_g_UsxYi8B-uj45_Ds_b3SkExq2hhUwWjAseF3pl_T7Tin-5b6aXr0g14vqhm6ua3Go-XPNLhJthuL20hytVgUZcD_ecezOP_bnYLXoaQlQxbGduGNVu9gs3uOQgSrMNrkEOiL9QUuYj3jYZcTtBYESTObxrDRDCTthNLfK39OfFIoDPPrBfzX5Y0TAE_m6jKEJRs32BJ1Ph8Or-sLyZvYHT47eTLEQ3vN1DNWVTTInPoIlVsUqNYKWKtXW6yQuVlgRKAaXmRpDq3QkQuYkorzjH3iURiWZkIYQ17C71qWtl3QFwacY2hBs6W8zjPlBMuRiXQHq4-1qYPcffVpA7g5v6NjbG8g2X2pyjxFGVzijLqw-fbMbMW2uNB7j0vDNLrPc6sVWhfwPV5BC05FJgbphh8ij7srHCivupVcidOMtiLa5k0QICYPPI-7HcScUd-aFn7t2L4iF28fxr7B3iReLlrKpV2oFfPF_YjBmF1uRt07C83SSTW priority: 102 providerName: Unpaywall |
| Title | A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm |
| URI | https://link.springer.com/article/10.1007/s10462-024-10719-0 https://www.proquest.com/docview/2955974874 https://link.springer.com/content/pdf/10.1007/s10462-024-10719-0.pdf |
| UnpaywallVersion | publishedVersion |
| Volume | 57 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1573-7462 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0005243 issn: 0269-2821 databaseCode: ADMLS dateStart: 20081201 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1573-7462 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0005243 issn: 0269-2821 databaseCode: AFBBN dateStart: 19970201 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVPQU databaseName: Library Science Database customDbUrl: eissn: 1573-7462 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0005243 issn: 0269-2821 databaseCode: M1O dateStart: 20240101 isFulltext: true titleUrlDefault: https://search.proquest.com/libraryscience providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1573-7462 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0005243 issn: 0269-2821 databaseCode: BENPR dateStart: 20240101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1573-7462 dateEnd: 20241105 omitProxy: true ssIdentifier: ssj0005243 issn: 0269-2821 databaseCode: 8FG dateStart: 19970201 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: Springer Nature HAS Fully OA customDbUrl: eissn: 1573-7462 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0005243 issn: 0269-2821 databaseCode: AAJSJ dateStart: 19970201 isFulltext: true titleUrlDefault: https://www.springernature.com providerName: Springer Nature – providerCode: PRVAVX databaseName: Springer Nature OA Free Journals customDbUrl: eissn: 1573-7462 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0005243 issn: 0269-2821 databaseCode: C6C dateStart: 20240101 isFulltext: true titleUrlDefault: http://www.springeropen.com/ providerName: Springer Nature – providerCode: PRVAVX databaseName: Springer Nature OA Free Journals customDbUrl: eissn: 1573-7462 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0005243 issn: 0269-2821 databaseCode: C24 dateStart: 20240101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1573-7462 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0005243 issn: 0269-2821 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1573-7462 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0005243 issn: 0269-2821 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1Nb9Mw1GLbATgwPkXHqHxA4sAy4sSJkxMKpd0EtExApe1kObazobVp6VLQ-PW8lzpru0OFuDiH9-LYes_vI34fhLwCI9doo7RnlPU9XoShp9Ii8sIUtAWLU80KvNHtD-LjIf94Gp26H25XLqyykYm1oDYTjf_I3wZ1qTQwr_m76U8Pu0bh7aprobFFdvDyETsY9NmXlRCPRdRcEKceuBbMJc241DkeBx5oKBBEAhN51hTTbfG8ck96n9ydl1N1_VuNRiuqqLdLZLOJRQTK5eG8yg_1n1v1Hf9_lw_JA2el0mzBVo_IHVs-JrtNBwjqBMITIjOqL9QEsCiqQ0N_jEE-UQDOrmtZRMF5tmNLMbz-nGLxzyki6_nsl6U1kiuZTVVpKDAz5lRSNTqHRVUX46dk2Ot-7xx7rmWDp3noV14aF6AVFTORUWEumNZFYuJUJXkKRAdPPA0inVgh_MIPlVacg7vji8CGeSCENeEzsl1OSvuc0CLyuQbrAmZLOEtiVYiCAd9rrFDPtGkR1tBLalfPHNtqjOSyEjPSWAKNZU1j6bfIm5t3potqHhuxXyMbSDzqMLNWLmMB1odFs2QmwB2MwN4ULbK_hglHVK-DG2pLJyKu5JLULXLQMNcSvGlZBzcM-A-72Nv88RfkXoCnoA5G2ifb1WxuX4KdVeVtspX0jtpkJ_vQ__wNn0dnn7rwfN8dnHwFaCfgOMaddn3sYBwGGcCHg5Ps7C9TfSya |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTxsxEB5RONAe-q6aAq0PrXooVnfX3vX6gKrQgkKBqKpA4mYc2wtIySaEBJQ_19_W8cZLkh6iXjh71uv1jOexnvkG4CM6udZYbajVLqK8YIxqWaSUSbQWcSZNXPgb3eN21jrlP8_SsxX4U9fC-LTKWidWitr2jf9H_jWpoNLQvebfBtfUd43yt6t1Cw0dWivYnQpiLBR2HLrJHYZwNzsHP5Dfn5Jkf-_ke4uGLgPUcBaNqMwKVOQ6tqnVrCNiY4rcZlLnHYnrxOBRJqnJnRBRETFtNOfooUcicayTCOEsw3kfwRpnXGLwt7a71_71ey7JZJq3l2SSYnATh7KdULzHs4SijURVKHwp0YJp_NdAzN3UPoH1cTnQkzvd7c4Zw_3n8DR4saQ5FbsXsOLKl_Cs7hBBgsJ4BapJzKXuIxXx5tKSqx7qL4KDw0mlqwgG167niE-_vyAeHHTgic14eOtIRRQgtYkuLUFh9zWXRHcvkDWjy95rOH2QzX4Dq2W_dG-BFGnEDXofOFvO4zzThShiPBfGI9jHxjYgrndTmYB37ttudNUMqdlzQCEHVMUBFTXgy_0zgynax1Lqz55JyqsCnNnoUNGA6_OgWqopMFxM0R8VDdhcoMQjbBaHazaroEJu1EzgG7Bds342vGxZ2_fi8R9f8W75yz_Aeuvk-EgdHbQPN-Bx4uW1SlzahNXRcOy20Ccbdd4HwSdw_tBn7S_d9UKx |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LbxMxEB6VIvE4UJ4iUMAHEAfqdr0v7x4QiihRS6FwoFJvxutHi0g2IdlQhZ_GX-HPMN71NkkPEZceOHvW63W--WYczwPgOTq5WmmpqJYmoLGNIipzm9AoR2vB0lwx6250Px6me0fx--PkeA1-t7kwLqyy5cSaqPVQuf_Id8K6VBq61_GO9WERn3d7b0Y_qOsg5W5a23YaDUQOzOwMj2-T1_u7-Fu_CMPeuy9v96jvMEBVHAUVzVOLJC6ZTrSMCs6UsplOc5kVOa4RD455mKjMcB7YIJJKxjF65wEPTVSEnBsd4bxX4Cp3xwgXNsg-LYSXNBF7YZpTPNYwn7Dj0_biNKRoHZEEuUsiWjKKF03Dwh3tTbg-LUdydib7_QUz2NuAP-0GNtEv37enVbGtfl2oLfl_7vBtuOW9c9Jt1OkOrJnyLmy0nS-IJ8J7ILpEncohShHnBmjybYC8THBwPKs5mExQGQaGuLSCE-KKno6csJqOfxpSC_lS4USWmqASu1xSIvsnuAnV6eA-HF3KZz6A9XJYmodAbBLECr0qnC2LWZZKyy1DfVeuMj9TugOsxYpQvo67ayfSF_MK1A5fAvElanyJoAOvzp8ZNVVMVkq_dBAUjuJwZiV9pgauzxULE12Ox-AE_Wzegc0lSaQmtTzcIk14apyIOcw6sNUCez68allb5-D_h694tPrlz-Aaolt82D88eAw3QqeMdTzWJqxX46l5gq5mVTytdZrA18uG-F9t9oep |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT9swFH9i5bBxGLAPrRtDPkziMFyS2ImTY7UNoUlDO1AJTpbjD0C0aVXSTeyv33PiQIsmBNr5PVu28z7j934G-IRBrtFGaWqUjSh3jFFVuJSyAr1FnBU6dv5G98dxdjTi30_T0zX42vXCNNXu3ZVk29PgUZqq-mBm3MFS4xvPEor-Bc2I8G04AyQ_g_UsxYi8B-uj45_Ds_b3SkExq2hhUwWjAseF3pl_T7Tin-5b6aXr0g14vqhm6ua3Go-XPNLhJthuL20hytVgUZcD_ecezOP_bnYLXoaQlQxbGduGNVu9gs3uOQgSrMNrkEOiL9QUuYj3jYZcTtBYESTObxrDRDCTthNLfK39OfFIoDPPrBfzX5Y0TAE_m6jKEJRs32BJ1Ph8Or-sLyZvYHT47eTLEQ3vN1DNWVTTInPoIlVsUqNYKWKtXW6yQuVlgRKAaXmRpDq3QkQuYkorzjH3iURiWZkIYQ17C71qWtl3QFwacY2hBs6W8zjPlBMuRiXQHq4-1qYPcffVpA7g5v6NjbG8g2X2pyjxFGVzijLqw-fbMbMW2uNB7j0vDNLrPc6sVWhfwPV5BC05FJgbphh8ij7srHCivupVcidOMtiLa5k0QICYPPI-7HcScUd-aFn7t2L4iF28fxr7B3iReLlrKpV2oFfPF_YjBmF1uRt07C83SSTW |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+chaotic+based+image+encryption+scheme+using+elliptic+curve+cryptography+and+genetic+algorithm&rft.jtitle=The+Artificial+intelligence+review&rft.date=2024-04-01&rft.pub=Springer+Nature+B.V&rft.issn=0269-2821&rft.eissn=1573-7462&rft.volume=57&rft.issue=4&rft.spage=87&rft_id=info:doi/10.1007%2Fs10462-024-10719-0&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1573-7462&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1573-7462&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1573-7462&client=summon |