A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm

In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image...

Full description

Saved in:
Bibliographic Details
Published inThe Artificial intelligence review Vol. 57; no. 4; p. 87
Main Authors Kumar, Sanjay, Sharma, Deepmala
Format Journal Article
LanguageEnglish
Published Dordrecht Springer Netherlands 01.04.2024
Springer
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1573-7462
0269-2821
1573-7462
DOI10.1007/s10462-024-10719-0

Cover

Abstract In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image encryption by combining the power of a chaotic map, elliptic curve cryptography, and genetic algorithm. The chaotic map, specifically Arnold’s cat map, is employed to introduce chaos and randomness into the encryption process. The proposed image encryption process involves applying Arnold’s cat map for shuffling the pixel positions, followed by elliptic curve cryptography for encrypting the pixel values using public and private keys. Additionally, a genetic algorithm is employed to optimize the key generation process, enhancing the security of the encryption scheme. The combined utilization of these techniques aims to achieve a high level of confidentiality and robustness in image encryption. The algorithm underwent thorough analysis. It achieved a maximum entropy score of 7.99, indicating a high level of randomness and unpredictability in the encrypted data. Additionally, it exhibited near-zero correlation, which suggests strong resistance against statistical attacks. Moreover, the cryptographic range of possible keys was found to be 2 511 . This extensive key space makes the algorithm highly resilient against brute force attacks. It took only 0.5634 s to encrypt a moderately sized 512 × 512 pixel image with an 8-bit image on a standard desktop computer with a 2.3 GHz processor and 16 GB of RAM. The experimental findings confirm that the proposed approach is highly effective and efficient in safeguarding sensitive image data from unauthorized access and potential attacks. This scheme has the benefit of allowing us to protect our private image data while it’s being transmitted.
AbstractList In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image encryption by combining the power of a chaotic map, elliptic curve cryptography, and genetic algorithm. The chaotic map, specifically Arnold’s cat map, is employed to introduce chaos and randomness into the encryption process. The proposed image encryption process involves applying Arnold’s cat map for shuffling the pixel positions, followed by elliptic curve cryptography for encrypting the pixel values using public and private keys. Additionally, a genetic algorithm is employed to optimize the key generation process, enhancing the security of the encryption scheme. The combined utilization of these techniques aims to achieve a high level of confidentiality and robustness in image encryption. The algorithm underwent thorough analysis. It achieved a maximum entropy score of 7.99, indicating a high level of randomness and unpredictability in the encrypted data. Additionally, it exhibited near-zero correlation, which suggests strong resistance against statistical attacks. Moreover, the cryptographic range of possible keys was found to be 2511. This extensive key space makes the algorithm highly resilient against brute force attacks. It took only 0.5634 s to encrypt a moderately sized 512×512 pixel image with an 8-bit image on a standard desktop computer with a 2.3 GHz processor and 16 GB of RAM. The experimental findings confirm that the proposed approach is highly effective and efficient in safeguarding sensitive image data from unauthorized access and potential attacks. This scheme has the benefit of allowing us to protect our private image data while it’s being transmitted.
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image encryption by combining the power of a chaotic map, elliptic curve cryptography, and genetic algorithm. The chaotic map, specifically Arnold's cat map, is employed to introduce chaos and randomness into the encryption process. The proposed image encryption process involves applying Arnold's cat map for shuffling the pixel positions, followed by elliptic curve cryptography for encrypting the pixel values using public and private keys. Additionally, a genetic algorithm is employed to optimize the key generation process, enhancing the security of the encryption scheme. The combined utilization of these techniques aims to achieve a high level of confidentiality and robustness in image encryption. The algorithm underwent thorough analysis. It achieved a maximum entropy score of 7.99, indicating a high level of randomness and unpredictability in the encrypted data. Additionally, it exhibited near-zero correlation, which suggests strong resistance against statistical attacks. Moreover, the cryptographic range of possible keys was found to be [Formula omitted]. This extensive key space makes the algorithm highly resilient against brute force attacks. It took only 0.5634 s to encrypt a moderately sized [Formula omitted] pixel image with an 8-bit image on a standard desktop computer with a 2.3 GHz processor and 16 GB of RAM. The experimental findings confirm that the proposed approach is highly effective and efficient in safeguarding sensitive image data from unauthorized access and potential attacks. This scheme has the benefit of allowing us to protect our private image data while it's being transmitted.
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image encryption by combining the power of a chaotic map, elliptic curve cryptography, and genetic algorithm. The chaotic map, specifically Arnold’s cat map, is employed to introduce chaos and randomness into the encryption process. The proposed image encryption process involves applying Arnold’s cat map for shuffling the pixel positions, followed by elliptic curve cryptography for encrypting the pixel values using public and private keys. Additionally, a genetic algorithm is employed to optimize the key generation process, enhancing the security of the encryption scheme. The combined utilization of these techniques aims to achieve a high level of confidentiality and robustness in image encryption. The algorithm underwent thorough analysis. It achieved a maximum entropy score of 7.99, indicating a high level of randomness and unpredictability in the encrypted data. Additionally, it exhibited near-zero correlation, which suggests strong resistance against statistical attacks. Moreover, the cryptographic range of possible keys was found to be $$2^{511}$$ 2 511 . This extensive key space makes the algorithm highly resilient against brute force attacks. It took only 0.5634 s to encrypt a moderately sized $$512\times 512$$ 512 × 512 pixel image with an 8-bit image on a standard desktop computer with a 2.3 GHz processor and 16 GB of RAM. The experimental findings confirm that the proposed approach is highly effective and efficient in safeguarding sensitive image data from unauthorized access and potential attacks. This scheme has the benefit of allowing us to protect our private image data while it’s being transmitted.
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image encryption by combining the power of a chaotic map, elliptic curve cryptography, and genetic algorithm. The chaotic map, specifically Arnold’s cat map, is employed to introduce chaos and randomness into the encryption process. The proposed image encryption process involves applying Arnold’s cat map for shuffling the pixel positions, followed by elliptic curve cryptography for encrypting the pixel values using public and private keys. Additionally, a genetic algorithm is employed to optimize the key generation process, enhancing the security of the encryption scheme. The combined utilization of these techniques aims to achieve a high level of confidentiality and robustness in image encryption. The algorithm underwent thorough analysis. It achieved a maximum entropy score of 7.99, indicating a high level of randomness and unpredictability in the encrypted data. Additionally, it exhibited near-zero correlation, which suggests strong resistance against statistical attacks. Moreover, the cryptographic range of possible keys was found to be 2 511 . This extensive key space makes the algorithm highly resilient against brute force attacks. It took only 0.5634 s to encrypt a moderately sized 512 × 512 pixel image with an 8-bit image on a standard desktop computer with a 2.3 GHz processor and 16 GB of RAM. The experimental findings confirm that the proposed approach is highly effective and efficient in safeguarding sensitive image data from unauthorized access and potential attacks. This scheme has the benefit of allowing us to protect our private image data while it’s being transmitted.
ArticleNumber 87
Audience Academic
Author Kumar, Sanjay
Sharma, Deepmala
Author_xml – sequence: 1
  givenname: Sanjay
  surname: Kumar
  fullname: Kumar, Sanjay
  organization: Department of Mathematics, National Institute of Technology Raipur
– sequence: 2
  givenname: Deepmala
  surname: Sharma
  fullname: Sharma, Deepmala
  email: deepsha.maths@nitrr.ac.in
  organization: Department of Mathematics, National Institute of Technology Raipur
BookMark eNqNkU1P3DAQhi0EErDwBzhZ6jkw_kicHFeoLUhIvcDZ8jqTrFFiBztptf--XhaJtqoQ8sHW-H2smcfn5NgHj4RcMbhmAOomMZAVL4DLgoFiTQFH5IyVShQq14__OJ-S85SeAaDkUpwRvaZ2a8LsLN2YhC11o-mRordxN80ueJrsFkekS3K-pzgMbtqH7RJ_In0NhT6aabujxre0R4_7azP0Ibp5O16Qk84MCS_f9hV5-vb18fauePjx_f52_VBYKWAumqqTTBjWlq0RG8Ws7eq2aky9aVhXVw00vLQ1KgUdCGONlKqqQXEUG64UtmJFxOHdxU9m98sMg55iniXuNAO9d6QPjnR2pF8dacjUlwM1xfCyYJr1c1iiz41q3pRlo2St5HuqNwNq57swR2NHl6xeq7ripRTZ7opc_yeVV4ujs_m7OpfrfwH1AbAxpBSx09bNZu88g274uG_-D_qpYd8UpRz2Pcb3YT-gfgONrrWr
CitedBy_id crossref_primary_10_1109_JIOT_2024_3432494
crossref_primary_10_3390_electronics13132647
crossref_primary_10_1007_s11071_025_11001_w
crossref_primary_10_1080_1206212X_2024_2392168
crossref_primary_10_1007_s10586_024_04746_3
crossref_primary_10_1016_j_procs_2024_09_145
crossref_primary_10_1088_1402_4896_ad9d90
crossref_primary_10_1016_j_asoc_2024_112016
crossref_primary_10_1109_ACCESS_2024_3445277
crossref_primary_10_1007_s11227_024_06624_6
crossref_primary_10_1109_ACCESS_2024_3489452
crossref_primary_10_1007_s11071_024_10331_5
crossref_primary_10_1155_jece_8839945
crossref_primary_10_3390_cryptography9010003
crossref_primary_10_1007_s10586_024_04948_9
crossref_primary_10_1016_j_eswa_2025_127403
crossref_primary_10_1016_j_jisa_2025_103995
crossref_primary_10_1117_1_JEI_34_1_013048
crossref_primary_10_1007_s11042_024_19963_6
crossref_primary_10_1088_1402_4896_ad9ee7
crossref_primary_10_1016_j_aej_2024_12_001
crossref_primary_10_1016_j_compeleceng_2024_109722
crossref_primary_10_1016_j_chaos_2024_115521
crossref_primary_10_33889_IJMEMS_2025_10_1_005
crossref_primary_10_1088_1402_4896_ad4f64
crossref_primary_10_1016_j_aej_2024_11_012
crossref_primary_10_1007_s11071_024_09999_6
crossref_primary_10_1007_s11227_024_06639_z
crossref_primary_10_1016_j_iot_2025_101559
crossref_primary_10_1088_1402_4896_ad6062
crossref_primary_10_1080_13682199_2025_2454055
crossref_primary_10_1007_s11071_024_10841_2
crossref_primary_10_1016_j_aej_2025_02_056
Cites_doi 10.1155/2022/1912603
10.1007/s11042-015-2479-7
10.1016/j.gltp.2021.08.055
10.1109/ACCESS.2021.3072075
10.1007/s11554-023-01278-8
10.1016/j.optlaseng.2016.08.009
10.1016/j.optlaseng.2016.10.019
10.1007/s11042-023-16303-y
10.1109/ACCESS.2019.2906052
10.1007/978-3-319-93025-1_4
10.3390/math11020457
10.1109/TCSVT.2019.2896270
10.1007/s11071-012-0539-3
10.1016/j.optlaseng.2016.03.019
10.1080/0161-118991863745
10.1007/s00500-014-1539-7
10.1016/j.sigpro.2013.10.034
10.21275/ART20162488
10.1016/j.cpc.2012.11.017
10.3390/math11081769
10.1007/s11042-018-5817-8
10.1016/j.sigpro.2018.03.010
10.1007/s11042-020-09058-3
10.1109/ACCESS.2021.3107608
10.1007/s11071-016-3024-6
10.1007/s11042-022-11985-2
10.1016/j.aeue.2012.01.015
10.1016/j.optlaseng.2016.10.012
10.1109/ACCESS.2022.3230096
10.1063/1.5099261
10.1007/s11042-021-10700-x
10.1007/s11277-019-06793-1
10.1007/s00521-017-2993-9
10.1504/IJCSM.2022.122144
10.1016/j.eswa.2023.120622
10.1109/ACCESS.2022.3230141
10.1016/j.image.2017.07.006
10.1090/S0025-5718-1987-0866109-5
10.1007/s11071-023-08331-y
10.1016/j.optlaseng.2016.10.006
10.1016/j.optlaseng.2016.07.010
10.1007/s11042-016-3311-8
10.48550/arXiv.1408.3838
10.1007/s10586-018-02895-w
10.1109/ACCESS.2023.3261568
10.1016/j.asoc.2012.01.016
10.1016/s0895-6111(02)00073-3
10.1117/1.JEI.26.1.013021
10.1007/s11042-016-3274-9
10.1109/ICACCS.2013.6938729
10.1007/978-3-642-31698-2121
ContentType Journal Article
Copyright The Author(s) 2024
COPYRIGHT 2024 Springer
Copyright Springer Nature B.V. Apr 2024
Copyright_xml – notice: The Author(s) 2024
– notice: COPYRIGHT 2024 Springer
– notice: Copyright Springer Nature B.V. Apr 2024
DBID C6C
AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
ABUWG
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
CNYFK
DWQXO
E3H
F2A
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M1O
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PRQQA
PSYQQ
Q9U
ADTOC
UNPAY
DOI 10.1007/s10462-024-10719-0
DatabaseName Springer Nature OA Free Journals
CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Social Science Premium Collection
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
ProQuest Technology Collection
ProQuest One Community College
ProQuest Library & Information Science Collection
ProQuest Central
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global (OCUL)
Computing Database
Library Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest One Social Sciences
ProQuest One Psychology [Accès UNIL ; CHUV ; HEP Vaud ; Sites BCUL]
ProQuest Central Basic
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
ProQuest Business Collection (Alumni Edition)
ProQuest One Psychology
Computer Science Database
ProQuest Central Student
Library and Information Science Abstracts (LISA)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest One Applied & Life Sciences
Library & Information Science Collection
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest Business Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Library Science
ProQuest Central Korea
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
ProQuest Computing
ProQuest One Social Sciences
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Business (Alumni)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList ProQuest Business Collection (Alumni Edition)

CrossRef

Database_xml – sequence: 1
  dbid: C6C
  name: Springer Nature OA Free Journals
  url: http://www.springeropen.com/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 3
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-7462
ExternalDocumentID 10.1007/s10462-024-10719-0
A786254357
10_1007_s10462_024_10719_0
GroupedDBID -4Z
-59
-5G
-BR
-EM
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
1N0
203
23N
2J2
2JN
2JY
2KG
2LR
2~H
30V
4.4
406
408
409
40D
40E
5GY
5VS
67Z
6J9
6NX
77K
7WY
8FL
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AAHNG
AAIAL
AAJKR
AAJSJ
AAKKN
AANZL
AARTL
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABEEZ
ABFTD
ABFTV
ABHLI
ABHQN
ABIVO
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABWNU
ABXPI
ACACY
ACGFS
ACHSB
ACHXU
ACIHN
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACREN
ACSNA
ACULB
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEAQA
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGXO
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIIXL
AILAN
AITGF
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALSLI
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BENPR
BGNMA
C24
C6C
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
EBLON
EBS
EDO
EIOEI
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FNLPD
FRRFC
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GXS
HCIFZ
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IAO
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6~
KDC
KOV
LLZTM
M1O
M4Y
MA-
N9A
NB0
NPVJJ
NQJWS
NU0
O93
O9G
O9I
O9J
OAM
P19
P9O
PF0
PT5
QOK
QOS
R89
R9I
RHV
RNS
ROL
RPX
RSV
S16
S27
S3B
SAP
SCO
SDH
SDM
SHX
SISQX
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
VC2
W23
W48
WH7
WK8
YLTOR
Z45
Z5O
Z7R
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~A9
~EX
77I
8FE
8FG
AAFWJ
AASML
AAYXX
ABDBE
ABFSG
ABUWG
ACSTC
AEZWR
AFHIU
AFKRA
AHPBZ
AHWEU
AIXLP
AYFIA
AZQEC
BEZIV
BGLVJ
BPHCQ
CITATION
CNYFK
ICD
K6V
M0C
MK~
P62
PQBIZ
PQQKQ
PROAC
PSYQQ
PUEGO
Q2X
8AO
CCPQU
DWQXO
GNUQQ
K7-
PHGZM
PHGZT
PQBZA
PQGLB
PRQQA
3V.
7SC
7XB
8AL
8FD
8FK
E3H
F2A
FRNLG
JQ2
L.-
L7M
L~C
L~D
M0N
PKEHL
PQEST
PQUKI
PRINS
Q9U
-Y2
1SB
2.D
28-
2P1
2VQ
5QI
AAOBN
AARHV
AAYTO
ABJNI
ABQSL
ACBXY
ADHKG
ADTOC
AEBTG
AEFIE
AEKMD
AFEXP
AFFNX
AFGCZ
AGGDS
AGJBK
AGQPQ
AJBLW
BBWZM
BDATZ
CAG
COF
EJD
FINBP
FSGXE
H13
HF~
IHE
KOW
LAK
N2Q
NDZJH
O9-
OVD
R4E
RNI
RZC
RZE
RZK
S1Z
S26
S28
SCJ
SCLPG
T16
TEORI
UNPAY
UZXMN
VFIZW
ID FETCH-LOGICAL-c430t-96f413a1d5da3b71ccf8d69a8b91f8690925c8e770f03aca44768072e3b277ed3
IEDL.DBID M1O
ISSN 1573-7462
0269-2821
IngestDate Tue Aug 19 17:40:15 EDT 2025
Sat Oct 25 06:56:41 EDT 2025
Mon Oct 20 22:44:55 EDT 2025
Mon Oct 20 16:51:14 EDT 2025
Wed Oct 01 02:07:40 EDT 2025
Thu Apr 24 23:08:18 EDT 2025
Fri Feb 21 02:42:05 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Image encryption
Elliptic curve cryptography
Chaotic map
Genetic algorithm
Language English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c430t-96f413a1d5da3b71ccf8d69a8b91f8690925c8e770f03aca44768072e3b277ed3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://proxy.k.utb.cz/login?url=https://link.springer.com/content/pdf/10.1007/s10462-024-10719-0.pdf
PQID 2955974874
PQPubID 36790
ParticipantIDs unpaywall_primary_10_1007_s10462_024_10719_0
proquest_journals_2955974874
gale_infotracmisc_A786254357
gale_infotracacademiconefile_A786254357
crossref_citationtrail_10_1007_s10462_024_10719_0
crossref_primary_10_1007_s10462_024_10719_0
springer_journals_10_1007_s10462_024_10719_0
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-04-01
PublicationDateYYYYMMDD 2024-04-01
PublicationDate_xml – month: 04
  year: 2024
  text: 2024-04-01
  day: 01
PublicationDecade 2020
PublicationPlace Dordrecht
PublicationPlace_xml – name: Dordrecht
PublicationSubtitle An International Science and Engineering Journal
PublicationTitle The Artificial intelligence review
PublicationTitleAbbrev Artif Intell Rev
PublicationYear 2024
Publisher Springer Netherlands
Springer
Springer Nature B.V
Publisher_xml – name: Springer Netherlands
– name: Springer
– name: Springer Nature B.V
References Zhan, Wei, Shi, Yu (CR52) 2017; 26
Chai, Gan, Yuan, Chen, Liu (CR10) 2019; 31
Cavusoglu, Kacar (CR9) 2019; 22
Choi, Seok, Seo, Kim (CR12) 2016; 75
Mahboob, Asif, Nadeem, Saleem, Eldin, Siddique (CR34) 2022; 10
Mirjalili, Mirjalili (CR36) 2019; 780
Hariyanto, Rahim (CR18) 2016; 5
Hafsa, Sghaier, Malek, Machhout (CR17) 2021; 80
Liu, Sun, Zhu (CR30) 2016; 84
Belazi, El-Latif, Diaconu, Rhouma, Belghith (CR7) 2017; 88
Matthews (CR35) 1989; 13
Mozaffari (CR38) 2018; 77
Bao, Yang (CR6) 2012; 70
Lin, Wu, Chen (CR27) 2021; 9
Cao, Huang, Zhou (CR8) 2003; 27
Abdullah, Enayatifar, Lee (CR1) 2012; 66
Zhou, Bao, Chen (CR53) 2014; 97
Mishra, Routray, Kumar (CR37) 2014; 37
Pareek, Patidar (CR42) 2016; 20
CR47
Wang, Liu (CR49) 2017; 76
Banu, Al-Alawi, Padmaa, Priya, Thanikaiselvan, Amirtharajan (CR5) 2023; 82
CR44
Mahalingam, Velupillai Meikandan, Thenmozhi, Moria, Lakshmi, Chidambaram, Amirtharajan (CR33) 2023; 11
Nepomuceno, Nardo, Arias-Garcia, Butusov, Tutueva (CR39) 2019
Raj, Janakiraman, Amirtharajan (CR45) 2023; 20
Ghazvini, Mirzadi, Parvar (CR16) 2020; 79
Khalid, Shah, Eldin, Shah, Asif, Saddique (CR23) 2022; 11
Chai, Chen, Broyde (CR11) 2017; 88
Attaullah, Jamal (CR4) 2020; 110
Niyat, Moattar, Torshiz (CR40) 2017; 90
Liu, Wang (CR29) 2012; 12
Hu, Liu, Ding (CR19) 2013; 184
Parida, Pradhan, Gao (CR43) 2021; 9
Mahalingam, Veeramalai, Menon, Amirtharajan (CR32) 2023; 11
CR14
Al-Hazaimeh, Al-Jamal, Alomari (CR2) 2022; 15
CR51
Asif, Asamoah, Hazzazi, Alharbi, Ashraf, Alghamdi (CR3) 2022; 2022
Liao, Yu, Li, Li, Qin (CR26) 2019; 30
Liu, Wang, Fan, Gong (CR28) 2016; 75
Dash, Padhy, Devi, Sachi, Patro (CR13) 2023; 231
Luo, Ouyang, Liu, Cao (CR31) 2019; 7
Hu, Liu, Gong, Ouyang (CR20) 2017; 87
Enayatifar, Abdullah, Isnin, Altameem, Lee (CR15) 2017; 90
Liao, Qin, Ding (CR25) 2017; 58
Xu, Gou, Li, Li (CR50) 2017; 91
Koblitz (CR24) 1987; 48
Rezaei, Ghanbari, Enayatifar (CR46) 2023; 111
Hua, Jin, Xu, Huang (CR21) 2018; 149
Hussain, Asif, Shah, Mahboob, Eldin (CR22) 2023; 11
Noshadian, Ebrahimzade, Kazemitabar (CR41) 2018; 77
Tora, Gokcay, Turan, Buker (CR48) 2022; 81
K Zhan (10719_CR52) 2017; 26
M Mishra (10719_CR37) 2014; 37
A Belazi (10719_CR7) 2017; 88
10719_CR47
EG Nepomuceno (10719_CR39) 2019
X Wang (10719_CR49) 2017; 76
Z Hua (10719_CR21) 2018; 149
Shah T Attaullah (10719_CR4) 2020; 110
10719_CR44
J Choi (10719_CR12) 2016; 75
J Bao (10719_CR6) 2012; 70
CH Lin (10719_CR27) 2021; 9
B Rezaei (10719_CR46) 2023; 111
NK Pareek (10719_CR42) 2016; 20
M Asif (10719_CR3) 2022; 2022
A Mahboob (10719_CR34) 2022; 10
X Chai (10719_CR11) 2017; 88
I Khalid (10719_CR23) 2022; 11
F Cao (10719_CR8) 2003; 27
H Hu (10719_CR19) 2013; 184
Y Liu (10719_CR28) 2016; 75
R Enayatifar (10719_CR15) 2017; 90
AH Abdullah (10719_CR1) 2012; 66
U Cavusoglu (10719_CR9) 2019; 22
H Liu (10719_CR29) 2012; 12
S Hussain (10719_CR22) 2023; 11
H Mahalingam (10719_CR33) 2023; 11
R Matthews (10719_CR35) 1989; 13
E Hariyanto (10719_CR18) 2016; 5
N Koblitz (10719_CR24) 1987; 48
M Ghazvini (10719_CR16) 2020; 79
X Liao (10719_CR26) 2019; 30
X Liao (10719_CR25) 2017; 58
S Mirjalili (10719_CR36) 2019; 780
H Tora (10719_CR48) 2022; 81
Y Zhou (10719_CR53) 2014; 97
X Chai (10719_CR10) 2019; 31
A Hafsa (10719_CR17) 2021; 80
Y Luo (10719_CR31) 2019; 7
T Hu (10719_CR20) 2017; 87
OM Al-Hazaimeh (10719_CR2) 2022; 15
S Mozaffari (10719_CR38) 2018; 77
10719_CR14
AY Niyat (10719_CR40) 2017; 90
W Liu (10719_CR30) 2016; 84
L Xu (10719_CR50) 2017; 91
S Dash (10719_CR13) 2023; 231
SA Banu (10719_CR5) 2023; 82
V Raj (10719_CR45) 2023; 20
S Noshadian (10719_CR41) 2018; 77
P Parida (10719_CR43) 2021; 9
H Mahalingam (10719_CR32) 2023; 11
10719_CR51
References_xml – volume: 2022
  start-page: 1
  year: 2022
  end-page: 9
  ident: CR3
  article-title: A novel image encryption technique based on cyclic codes over Galois field
  publication-title: Comput Intell Neurosci
  doi: 10.1155/2022/1912603
– volume: 75
  start-page: 4363
  year: 2016
  end-page: 4382
  ident: CR28
  article-title: Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-2479-7
– volume: 77
  start-page: 25569
  year: 2018
  end-page: 25590
  ident: CR41
  article-title: Optimizing chaos based image encryption
  publication-title: Multimed Tools Appl
  doi: 10.1016/j.gltp.2021.08.055
– volume: 9
  start-page: 76191
  year: 2021
  end-page: 76204
  ident: CR43
  article-title: Image encryption and authentication with elliptic curve cryptography and multidimensional chaotic maps
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3072075
– volume: 20
  start-page: 1
  issue: 2
  year: 2023
  end-page: 26
  ident: CR45
  article-title: Reconfigurable color medical image encryptor using hardware accelerated Chao (S)-box triplets
  publication-title: J Real-Time Image Process
  doi: 10.1007/s11554-023-01278-8
– ident: CR51
– volume: 88
  start-page: 197
  year: 2017
  end-page: 213
  ident: CR11
  article-title: A novel chaos-based image encryption algorithm using DNA sequence operations
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.08.009
– volume: 90
  start-page: 225
  year: 2017
  end-page: 237
  ident: CR40
  article-title: Color image encryption based on hybrid hyper-chaotic system and cellular automata
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.10.019
– volume: 82
  start-page: 1
  year: 2023
  end-page: 18
  ident: CR5
  article-title: Healthcare with datacare-a triangular DNA security
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-023-16303-y
– volume: 7
  start-page: 38507
  year: 2019
  end-page: 38522
  ident: CR31
  article-title: An image encryption method based on elliptic curve elgamal encryption and chaotic systems
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2906052
– volume: 780
  start-page: 43
  year: 2019
  end-page: 55
  ident: CR36
  article-title: Genetic algorithm
  publication-title: Evol Algorithms Neural Netw Theor Appl
  doi: 10.1007/978-3-319-93025-1_4
– volume: 11
  start-page: 1
  issue: 2
  year: 2023
  end-page: 23
  ident: CR32
  article-title: Dual-domain image encryption in unsecure medium: a secure communication perspective
  publication-title: Mathematics
  doi: 10.3390/math11020457
– volume: 30
  start-page: 685
  issue: 3
  year: 2019
  end-page: 696
  ident: CR26
  article-title: A new payload partition strategy in color image steganography
  publication-title: IEEE Trans Circuits Syst Video Technol
  doi: 10.1109/TCSVT.2019.2896270
– volume: 70
  start-page: 1365
  year: 2012
  end-page: 1375
  ident: CR6
  article-title: Period of the discrete arnold cat map and general cat map
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-012-0539-3
– volume: 84
  start-page: 26
  year: 2016
  end-page: 36
  ident: CR30
  article-title: A fast image encryption algorithm based on chaotic map
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.03.019
– volume: 13
  start-page: 29
  issue: 1
  year: 1989
  end-page: 42
  ident: CR35
  article-title: On the derivation of a chaotic encryption algorithm
  publication-title: Cryptologia
  doi: 10.1080/0161-118991863745
– volume: 20
  start-page: 763
  year: 2016
  end-page: 772
  ident: CR42
  article-title: Medical image protection using genetic algorithm operations
  publication-title: Soft Comput
  doi: 10.1007/s00500-014-1539-7
– volume: 97
  start-page: 172
  year: 2014
  end-page: 182
  ident: CR53
  article-title: A new 1D chaotic system for image encryption
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2013.10.034
– volume: 5
  start-page: 1363
  issue: 10
  year: 2016
  end-page: 1365
  ident: CR18
  article-title: Arnold’s cat map algorithm in digital image encryption
  publication-title: Int J Sci Res
  doi: 10.21275/ART20162488
– volume: 184
  start-page: 765
  issue: 3
  year: 2013
  end-page: 768
  ident: CR19
  article-title: Pseudorandom sequence generator based on the Chen chaotic system
  publication-title: Comput Phys Commun
  doi: 10.1016/j.cpc.2012.11.017
– volume: 11
  start-page: 1
  issue: 8
  year: 2023
  end-page: 23
  ident: CR33
  article-title: Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments
  publication-title: Mathematics
  doi: 10.3390/math11081769
– volume: 77
  start-page: 25799
  year: 2018
  end-page: 25819
  ident: CR38
  article-title: Parallel image encryption with bitplane decomposition and genetic algorithm
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-018-5817-8
– volume: 149
  start-page: 148
  year: 2018
  end-page: 161
  ident: CR21
  article-title: 2D Logistic-Sine-coupling map for image encryption
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2018.03.010
– volume: 79
  start-page: 26927
  year: 2020
  end-page: 26950
  ident: CR16
  article-title: A modified method for image encryption based on chaotic map and genetic algorithm
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-020-09058-3
– volume: 9
  start-page: 118624
  year: 2021
  end-page: 118639
  ident: CR27
  article-title: Intelligent symmetric cryptography with chaotic map and quantum based key generator for medical images info security
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3107608
– volume: 87
  start-page: 51
  year: 2017
  end-page: 66
  ident: CR20
  article-title: An image encryption scheme combining chaos with cycle operation for DNA sequences
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-016-3024-6
– ident: CR47
– volume: 81
  start-page: 31349
  issue: 22
  year: 2022
  end-page: 31362
  ident: CR48
  article-title: A generalized Arnold’s Cat Map transformation for image scrambling
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-022-11985-2
– ident: CR14
– volume: 66
  start-page: 806
  issue: 10
  year: 2012
  end-page: 816
  ident: CR1
  article-title: A hybrid genetic algorithm and chaotic function model for image encryption
  publication-title: AEU-Int J Electron Commun
  doi: 10.1016/j.aeue.2012.01.015
– volume: 91
  start-page: 41
  year: 2017
  end-page: 52
  ident: CR50
  article-title: A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.10.012
– volume: 11
  start-page: 5483
  year: 2022
  end-page: 5501
  ident: CR23
  article-title: An integrated image encryption scheme based on elliptic curve
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3230096
– year: 2019
  ident: CR39
  article-title: Image encryption based on the pseudo-orbits from 1D chaotic map
  publication-title: Chaos Interdiscip J Nonlinear Sci
  doi: 10.1063/1.5099261
– volume: 80
  start-page: 19769
  year: 2021
  end-page: 19801
  ident: CR17
  article-title: Image encryption method based on improved ECC and modified AES algorithm
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-021-10700-x
– volume: 110
  start-page: 1429
  year: 2020
  end-page: 1442
  ident: CR4
  article-title: An improved chaotic cryptosystem for image encryption and digital watermarking
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-019-06793-1
– volume: 31
  start-page: 219
  issue: 1
  year: 2019
  end-page: 237
  ident: CR10
  article-title: A novel image encryption scheme based on DNA sequence operations and chaotic systems
  publication-title: Neural Comput Appl
  doi: 10.1007/s00521-017-2993-9
– volume: 15
  start-page: 43
  issue: 1
  year: 2022
  end-page: 59
  ident: CR2
  article-title: Image encryption using anti-synchronisation and bogdanov transformation map
  publication-title: Int J Comput Sci Math
  doi: 10.1504/IJCSM.2022.122144
– ident: CR44
– volume: 231
  year: 2023
  ident: CR13
  article-title: An efficient Intra-Inter pixel encryption scheme to secure healthcare images for an IoT environment
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2023.120622
– volume: 10
  start-page: 132908
  year: 2022
  end-page: 132916
  ident: CR34
  article-title: A cryptographic scheme for construction of substitution boxes using quantic fractional transformation
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3230141
– volume: 58
  start-page: 146
  year: 2017
  end-page: 156
  ident: CR25
  article-title: Data embedding in digital images using critical functions
  publication-title: Signal Process Image Commun
  doi: 10.1016/j.image.2017.07.006
– volume: 48
  start-page: 203
  issue: 177
  year: 1987
  end-page: 209
  ident: CR24
  article-title: Elliptic curve cryptosystems
  publication-title: Math Comput
  doi: 10.1090/S0025-5718-1987-0866109-5
– volume: 111
  start-page: 9629
  issue: 10
  year: 2023
  end-page: 9647
  ident: CR46
  article-title: An image encryption approach using tuned Henon chaotic map and evolutionary algorithm
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-023-08331-y
– volume: 90
  start-page: 146
  year: 2017
  end-page: 154
  ident: CR15
  article-title: Image encryption using a synchronous permutation-diffusion technique
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.10.006
– volume: 88
  start-page: 37
  year: 2017
  end-page: 50
  ident: CR7
  article-title: Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.07.010
– volume: 76
  start-page: 6229
  year: 2017
  end-page: 6245
  ident: CR49
  article-title: A novel and effective image encryption algorithm based on chaos and DNA encoding
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-016-3311-8
– volume: 37
  start-page: 16
  issue: 9
  year: 2014
  end-page: 20
  ident: CR37
  article-title: High security image steganography with modified Arnold cat map
  publication-title: Int J Comput Appl
  doi: 10.48550/arXiv.1408.3838
– volume: 22
  start-page: 1211
  year: 2019
  end-page: 1223
  ident: CR9
  article-title: A novel parallel image encryption algorithm based on chaos
  publication-title: Clust Comput
  doi: 10.1007/s10586-018-02895-w
– volume: 11
  start-page: 29698
  year: 2023
  end-page: 29710
  ident: CR22
  article-title: Redesigning the serpent algorithm by PA-Loop and its image encryption application
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2023.3261568
– volume: 12
  start-page: 1457
  issue: 5
  year: 2012
  end-page: 1466
  ident: CR29
  article-title: Image encryption using DNA complementary rule and chaotic maps
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2012.01.016
– volume: 27
  start-page: 185
  year: 2003
  end-page: 196
  ident: CR8
  article-title: Medical image security in a HIPAA mandated PACS environment
  publication-title: Comput Med Imaging Gr
  doi: 10.1016/s0895-6111(02)00073-3
– volume: 26
  start-page: 013021
  issue: 1
  year: 2017
  end-page: 013021
  ident: CR52
  article-title: Cross-utilizing hyperchaotic and DNA sequences for image encryption
  publication-title: J Electron Imaging
  doi: 10.1117/1.JEI.26.1.013021
– volume: 75
  start-page: 14685
  year: 2016
  end-page: 14706
  ident: CR12
  article-title: A fast ARX model-based image encryption scheme
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-016-3274-9
– volume: 82
  start-page: 1
  year: 2023
  ident: 10719_CR5
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-023-16303-y
– volume: 5
  start-page: 1363
  issue: 10
  year: 2016
  ident: 10719_CR18
  publication-title: Int J Sci Res
  doi: 10.21275/ART20162488
– volume: 22
  start-page: 1211
  year: 2019
  ident: 10719_CR9
  publication-title: Clust Comput
  doi: 10.1007/s10586-018-02895-w
– volume: 30
  start-page: 685
  issue: 3
  year: 2019
  ident: 10719_CR26
  publication-title: IEEE Trans Circuits Syst Video Technol
  doi: 10.1109/TCSVT.2019.2896270
– volume: 111
  start-page: 9629
  issue: 10
  year: 2023
  ident: 10719_CR46
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-023-08331-y
– ident: 10719_CR14
– volume: 87
  start-page: 51
  year: 2017
  ident: 10719_CR20
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-016-3024-6
– volume: 84
  start-page: 26
  year: 2016
  ident: 10719_CR30
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.03.019
– volume: 20
  start-page: 1
  issue: 2
  year: 2023
  ident: 10719_CR45
  publication-title: J Real-Time Image Process
  doi: 10.1007/s11554-023-01278-8
– volume: 12
  start-page: 1457
  issue: 5
  year: 2012
  ident: 10719_CR29
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2012.01.016
– volume: 91
  start-page: 41
  year: 2017
  ident: 10719_CR50
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.10.012
– volume: 15
  start-page: 43
  issue: 1
  year: 2022
  ident: 10719_CR2
  publication-title: Int J Comput Sci Math
  doi: 10.1504/IJCSM.2022.122144
– volume: 11
  start-page: 1
  issue: 8
  year: 2023
  ident: 10719_CR33
  publication-title: Mathematics
  doi: 10.3390/math11081769
– volume: 149
  start-page: 148
  year: 2018
  ident: 10719_CR21
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2018.03.010
– volume: 184
  start-page: 765
  issue: 3
  year: 2013
  ident: 10719_CR19
  publication-title: Comput Phys Commun
  doi: 10.1016/j.cpc.2012.11.017
– volume: 7
  start-page: 38507
  year: 2019
  ident: 10719_CR31
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2906052
– volume: 77
  start-page: 25569
  year: 2018
  ident: 10719_CR41
  publication-title: Multimed Tools Appl
  doi: 10.1016/j.gltp.2021.08.055
– volume: 231
  year: 2023
  ident: 10719_CR13
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2023.120622
– volume: 26
  start-page: 013021
  issue: 1
  year: 2017
  ident: 10719_CR52
  publication-title: J Electron Imaging
  doi: 10.1117/1.JEI.26.1.013021
– volume: 48
  start-page: 203
  issue: 177
  year: 1987
  ident: 10719_CR24
  publication-title: Math Comput
  doi: 10.1090/S0025-5718-1987-0866109-5
– volume: 2022
  start-page: 1
  year: 2022
  ident: 10719_CR3
  publication-title: Comput Intell Neurosci
  doi: 10.1155/2022/1912603
– volume: 88
  start-page: 37
  year: 2017
  ident: 10719_CR7
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.07.010
– volume: 11
  start-page: 29698
  year: 2023
  ident: 10719_CR22
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2023.3261568
– volume: 11
  start-page: 1
  issue: 2
  year: 2023
  ident: 10719_CR32
  publication-title: Mathematics
  doi: 10.3390/math11020457
– volume: 13
  start-page: 29
  issue: 1
  year: 1989
  ident: 10719_CR35
  publication-title: Cryptologia
  doi: 10.1080/0161-118991863745
– volume: 20
  start-page: 763
  year: 2016
  ident: 10719_CR42
  publication-title: Soft Comput
  doi: 10.1007/s00500-014-1539-7
– volume: 77
  start-page: 25799
  year: 2018
  ident: 10719_CR38
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-018-5817-8
– volume: 31
  start-page: 219
  issue: 1
  year: 2019
  ident: 10719_CR10
  publication-title: Neural Comput Appl
  doi: 10.1007/s00521-017-2993-9
– volume: 66
  start-page: 806
  issue: 10
  year: 2012
  ident: 10719_CR1
  publication-title: AEU-Int J Electron Commun
  doi: 10.1016/j.aeue.2012.01.015
– volume: 75
  start-page: 4363
  year: 2016
  ident: 10719_CR28
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-2479-7
– ident: 10719_CR44
  doi: 10.1109/ICACCS.2013.6938729
– volume: 58
  start-page: 146
  year: 2017
  ident: 10719_CR25
  publication-title: Signal Process Image Commun
  doi: 10.1016/j.image.2017.07.006
– volume: 37
  start-page: 16
  issue: 9
  year: 2014
  ident: 10719_CR37
  publication-title: Int J Comput Appl
  doi: 10.48550/arXiv.1408.3838
– ident: 10719_CR47
– volume: 81
  start-page: 31349
  issue: 22
  year: 2022
  ident: 10719_CR48
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-022-11985-2
– volume: 88
  start-page: 197
  year: 2017
  ident: 10719_CR11
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.08.009
– volume: 97
  start-page: 172
  year: 2014
  ident: 10719_CR53
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2013.10.034
– volume: 76
  start-page: 6229
  year: 2017
  ident: 10719_CR49
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-016-3311-8
– volume: 70
  start-page: 1365
  year: 2012
  ident: 10719_CR6
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-012-0539-3
– volume: 110
  start-page: 1429
  year: 2020
  ident: 10719_CR4
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-019-06793-1
– volume: 79
  start-page: 26927
  year: 2020
  ident: 10719_CR16
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-020-09058-3
– volume: 11
  start-page: 5483
  year: 2022
  ident: 10719_CR23
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3230096
– volume: 780
  start-page: 43
  year: 2019
  ident: 10719_CR36
  publication-title: Evol Algorithms Neural Netw Theor Appl
  doi: 10.1007/978-3-319-93025-1_4
– volume: 27
  start-page: 185
  year: 2003
  ident: 10719_CR8
  publication-title: Comput Med Imaging Gr
  doi: 10.1016/s0895-6111(02)00073-3
– ident: 10719_CR51
  doi: 10.1007/978-3-642-31698-2121
– volume: 9
  start-page: 118624
  year: 2021
  ident: 10719_CR27
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3107608
– volume: 90
  start-page: 146
  year: 2017
  ident: 10719_CR15
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.10.006
– volume: 80
  start-page: 19769
  year: 2021
  ident: 10719_CR17
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-021-10700-x
– volume: 9
  start-page: 76191
  year: 2021
  ident: 10719_CR43
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3072075
– volume: 10
  start-page: 132908
  year: 2022
  ident: 10719_CR34
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3230141
– year: 2019
  ident: 10719_CR39
  publication-title: Chaos Interdiscip J Nonlinear Sci
  doi: 10.1063/1.5099261
– volume: 75
  start-page: 14685
  year: 2016
  ident: 10719_CR12
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-016-3274-9
– volume: 90
  start-page: 225
  year: 2017
  ident: 10719_CR40
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.10.019
SSID ssj0005243
Score 2.5963645
Snippet In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual...
SourceID unpaywall
proquest
gale
crossref
springer
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 87
SubjectTerms Algorithms
Analysis
Artificial Intelligence
Chaos theory
Computer Science
Cryptography
Curves
Data security
Digital imaging
Encryption
Equipment and supplies
Genetic algorithms
Image enhancement
Image processing
Investment analysis
Maximum entropy
Medical imaging equipment
Microprocessors
Personal computers
Pixels
Randomness
Security
SummonAdditionalLinks – databaseName: Springer Nature OA Free Journals
  dbid: C24
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB58HNSDb7FaJQfBg13Y3WQ3u8ciShH0ZMFbSPNoC-221Fbx3ztZs7UVKXrOJGR33mTmG4ArDHK10lIFWpowYJbSQOY2CWiO3iJKcxVZ96L7-JS22uzhJXnxTWGvVbV79SRZWuqFZjeWxgH6FDQd3LXerMMmxh-xG9hw63oc5oUdjPr2mN_3Lbmgn4Z44UV0B7ZmxVh-vMvBYMHp3O_Dro8WSfOLvQewZopD2KsmMRCvmEcgmkT15AipiHNLmvSHaCcILk4-SptAMIk1Q0NcmXuXOBDOsSNWs8mbISWRh64mstAEhcr1NhI56I4m_WlveAzt-7vn21bgRycEitFwGuSpRe8kI51oSTs8UspmOs1l1snx52NGnMeJygznoQ2pVJIxTDtCHhvaiTk3mp7ARjEqzCkQm4RMoZfH0zIWZam03EYof8ohxUdK1yCq_qZQHlfcjbcYiG9EZMcBgRwQJQdEWIOb-Z7xF6rGSuprxyThVA5PVtJ3DuD9HHiVaHJMyxKM-3gN6kuUqCpqeblis_Cq-iriEoMP8zZWg0bF-u_lVddqzMXjD19x9r_Tz2E7djJbFgnVYWM6mZkLjH-mnctS3D8Bi_n6Pw
  priority: 102
  providerName: Springer Nature
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT9swFH9i5bBxGLAPrRtDPkziMFyS2ImTY7UNoUlDO1AJTpbjD0C0aVXSTeyv33PiQIsmBNr5PVu28z7j934G-IRBrtFGaWqUjSh3jFFVuJSyAr1FnBU6dv5G98dxdjTi30_T0zX42vXCNNXu3ZVk29PgUZqq-mBm3MFS4xvPEor-Bc2I8G04AyQ_g_UsxYi8B-uj45_Ds_b3SkExq2hhUwWjAseF3pl_T7Tin-5b6aXr0g14vqhm6ua3Go-XPNLhJthuL20hytVgUZcD_ecezOP_bnYLXoaQlQxbGduGNVu9gs3uOQgSrMNrkEOiL9QUuYj3jYZcTtBYESTObxrDRDCTthNLfK39OfFIoDPPrBfzX5Y0TAE_m6jKEJRs32BJ1Ph8Or-sLyZvYHT47eTLEQ3vN1DNWVTTInPoIlVsUqNYKWKtXW6yQuVlgRKAaXmRpDq3QkQuYkorzjH3iURiWZkIYQ17C71qWtl3QFwacY2hBs6W8zjPlBMuRiXQHq4-1qYPcffVpA7g5v6NjbG8g2X2pyjxFGVzijLqw-fbMbMW2uNB7j0vDNLrPc6sVWhfwPV5BC05FJgbphh8ij7srHCivupVcidOMtiLa5k0QICYPPI-7HcScUd-aFn7t2L4iF28fxr7B3iReLlrKpV2oFfPF_YjBmF1uRt07C83SSTW
  priority: 102
  providerName: Unpaywall
Title A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
URI https://link.springer.com/article/10.1007/s10462-024-10719-0
https://www.proquest.com/docview/2955974874
https://link.springer.com/content/pdf/10.1007/s10462-024-10719-0.pdf
UnpaywallVersion publishedVersion
Volume 57
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1573-7462
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0005243
  issn: 0269-2821
  databaseCode: ADMLS
  dateStart: 20081201
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1573-7462
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0005243
  issn: 0269-2821
  databaseCode: AFBBN
  dateStart: 19970201
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVPQU
  databaseName: Library Science Database
  customDbUrl:
  eissn: 1573-7462
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0005243
  issn: 0269-2821
  databaseCode: M1O
  dateStart: 20240101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/libraryscience
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1573-7462
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0005243
  issn: 0269-2821
  databaseCode: BENPR
  dateStart: 20240101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1573-7462
  dateEnd: 20241105
  omitProxy: true
  ssIdentifier: ssj0005243
  issn: 0269-2821
  databaseCode: 8FG
  dateStart: 19970201
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: Springer Nature HAS Fully OA
  customDbUrl:
  eissn: 1573-7462
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0005243
  issn: 0269-2821
  databaseCode: AAJSJ
  dateStart: 19970201
  isFulltext: true
  titleUrlDefault: https://www.springernature.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: Springer Nature OA Free Journals
  customDbUrl:
  eissn: 1573-7462
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0005243
  issn: 0269-2821
  databaseCode: C6C
  dateStart: 20240101
  isFulltext: true
  titleUrlDefault: http://www.springeropen.com/
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: Springer Nature OA Free Journals
  customDbUrl:
  eissn: 1573-7462
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0005243
  issn: 0269-2821
  databaseCode: C24
  dateStart: 20240101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1573-7462
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0005243
  issn: 0269-2821
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1573-7462
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0005243
  issn: 0269-2821
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1Nb9Mw1GLbATgwPkXHqHxA4sAy4sSJkxMKpd0EtExApe1kObazobVp6VLQ-PW8lzpru0OFuDiH9-LYes_vI34fhLwCI9doo7RnlPU9XoShp9Ii8sIUtAWLU80KvNHtD-LjIf94Gp26H25XLqyykYm1oDYTjf_I3wZ1qTQwr_m76U8Pu0bh7aprobFFdvDyETsY9NmXlRCPRdRcEKceuBbMJc241DkeBx5oKBBEAhN51hTTbfG8ck96n9ydl1N1_VuNRiuqqLdLZLOJRQTK5eG8yg_1n1v1Hf9_lw_JA2el0mzBVo_IHVs-JrtNBwjqBMITIjOqL9QEsCiqQ0N_jEE-UQDOrmtZRMF5tmNLMbz-nGLxzyki6_nsl6U1kiuZTVVpKDAz5lRSNTqHRVUX46dk2Ot-7xx7rmWDp3noV14aF6AVFTORUWEumNZFYuJUJXkKRAdPPA0inVgh_MIPlVacg7vji8CGeSCENeEzsl1OSvuc0CLyuQbrAmZLOEtiVYiCAd9rrFDPtGkR1tBLalfPHNtqjOSyEjPSWAKNZU1j6bfIm5t3potqHhuxXyMbSDzqMLNWLmMB1odFs2QmwB2MwN4ULbK_hglHVK-DG2pLJyKu5JLULXLQMNcSvGlZBzcM-A-72Nv88RfkXoCnoA5G2ifb1WxuX4KdVeVtspX0jtpkJ_vQ__wNn0dnn7rwfN8dnHwFaCfgOMaddn3sYBwGGcCHg5Ps7C9TfSya
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTxsxEB5RONAe-q6aAq0PrXooVnfX3vX6gKrQgkKBqKpA4mYc2wtIySaEBJQ_19_W8cZLkh6iXjh71uv1jOexnvkG4CM6udZYbajVLqK8YIxqWaSUSbQWcSZNXPgb3eN21jrlP8_SsxX4U9fC-LTKWidWitr2jf9H_jWpoNLQvebfBtfUd43yt6t1Cw0dWivYnQpiLBR2HLrJHYZwNzsHP5Dfn5Jkf-_ke4uGLgPUcBaNqMwKVOQ6tqnVrCNiY4rcZlLnHYnrxOBRJqnJnRBRETFtNOfooUcicayTCOEsw3kfwRpnXGLwt7a71_71ey7JZJq3l2SSYnATh7KdULzHs4SijURVKHwp0YJp_NdAzN3UPoH1cTnQkzvd7c4Zw_3n8DR4saQ5FbsXsOLKl_Cs7hBBgsJ4BapJzKXuIxXx5tKSqx7qL4KDw0mlqwgG167niE-_vyAeHHTgic14eOtIRRQgtYkuLUFh9zWXRHcvkDWjy95rOH2QzX4Dq2W_dG-BFGnEDXofOFvO4zzThShiPBfGI9jHxjYgrndTmYB37ttudNUMqdlzQCEHVMUBFTXgy_0zgynax1Lqz55JyqsCnNnoUNGA6_OgWqopMFxM0R8VDdhcoMQjbBaHazaroEJu1EzgG7Bds342vGxZ2_fi8R9f8W75yz_Aeuvk-EgdHbQPN-Bx4uW1SlzahNXRcOy20Ccbdd4HwSdw_tBn7S_d9UKx
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LbxMxEB6VIvE4UJ4iUMAHEAfqdr0v7x4QiihRS6FwoFJvxutHi0g2IdlQhZ_GX-HPMN71NkkPEZceOHvW63W--WYczwPgOTq5WmmpqJYmoLGNIipzm9AoR2vB0lwx6250Px6me0fx--PkeA1-t7kwLqyy5cSaqPVQuf_Id8K6VBq61_GO9WERn3d7b0Y_qOsg5W5a23YaDUQOzOwMj2-T1_u7-Fu_CMPeuy9v96jvMEBVHAUVzVOLJC6ZTrSMCs6UsplOc5kVOa4RD455mKjMcB7YIJJKxjF65wEPTVSEnBsd4bxX4Cp3xwgXNsg-LYSXNBF7YZpTPNYwn7Dj0_biNKRoHZEEuUsiWjKKF03Dwh3tTbg-LUdydib7_QUz2NuAP-0GNtEv37enVbGtfl2oLfl_7vBtuOW9c9Jt1OkOrJnyLmy0nS-IJ8J7ILpEncohShHnBmjybYC8THBwPKs5mExQGQaGuLSCE-KKno6csJqOfxpSC_lS4USWmqASu1xSIvsnuAnV6eA-HF3KZz6A9XJYmodAbBLECr0qnC2LWZZKyy1DfVeuMj9TugOsxYpQvo67ayfSF_MK1A5fAvElanyJoAOvzp8ZNVVMVkq_dBAUjuJwZiV9pgauzxULE12Ox-AE_Wzegc0lSaQmtTzcIk14apyIOcw6sNUCez68allb5-D_h694tPrlz-Aaolt82D88eAw3QqeMdTzWJqxX46l5gq5mVTytdZrA18uG-F9t9oep
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT9swFH9i5bBxGLAPrRtDPkziMFyS2ImTY7UNoUlDO1AJTpbjD0C0aVXSTeyv33PiQIsmBNr5PVu28z7j934G-IRBrtFGaWqUjSh3jFFVuJSyAr1FnBU6dv5G98dxdjTi30_T0zX42vXCNNXu3ZVk29PgUZqq-mBm3MFS4xvPEor-Bc2I8G04AyQ_g_UsxYi8B-uj45_Ds_b3SkExq2hhUwWjAseF3pl_T7Tin-5b6aXr0g14vqhm6ua3Go-XPNLhJthuL20hytVgUZcD_ecezOP_bnYLXoaQlQxbGduGNVu9gs3uOQgSrMNrkEOiL9QUuYj3jYZcTtBYESTObxrDRDCTthNLfK39OfFIoDPPrBfzX5Y0TAE_m6jKEJRs32BJ1Ph8Or-sLyZvYHT47eTLEQ3vN1DNWVTTInPoIlVsUqNYKWKtXW6yQuVlgRKAaXmRpDq3QkQuYkorzjH3iURiWZkIYQ17C71qWtl3QFwacY2hBs6W8zjPlBMuRiXQHq4-1qYPcffVpA7g5v6NjbG8g2X2pyjxFGVzijLqw-fbMbMW2uNB7j0vDNLrPc6sVWhfwPV5BC05FJgbphh8ij7srHCivupVcidOMtiLa5k0QICYPPI-7HcScUd-aFn7t2L4iF28fxr7B3iReLlrKpV2oFfPF_YjBmF1uRt07C83SSTW
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+chaotic+based+image+encryption+scheme+using+elliptic+curve+cryptography+and+genetic+algorithm&rft.jtitle=The+Artificial+intelligence+review&rft.date=2024-04-01&rft.pub=Springer+Nature+B.V&rft.issn=0269-2821&rft.eissn=1573-7462&rft.volume=57&rft.issue=4&rft.spage=87&rft_id=info:doi/10.1007%2Fs10462-024-10719-0&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1573-7462&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1573-7462&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1573-7462&client=summon