An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic—Tent Map
Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and diffe...
Saved in:
| Published in | Entropy (Basel, Switzerland) Vol. 21; no. 7; p. 656 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Switzerland
MDPI AG
03.07.2019
MDPI |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1099-4300 1099-4300 |
| DOI | 10.3390/e21070656 |
Cover
| Abstract | Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method. |
|---|---|
| AbstractList | Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method. Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method. |
| Author | Ranganathan, Vidhyapriya Ramasamy, Priya Damaševičius, Robertas Kadry, Seifedine Blažauskas, Tomas |
| AuthorAffiliation | 2 Department of Biomedical Engineering, PSG College of Technology, Coimbatore, TamilNadu 641004, India 4 Department of Software Engineering, Kaunas University of Technology, Kaunas 51386, Lithuania 1 Department of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, TamilNadu 641004, India 3 Department of Mathematics and Computer Science, Beirut Arab University, Beirut 11-5020, Lebanon |
| AuthorAffiliation_xml | – name: 1 Department of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, TamilNadu 641004, India – name: 2 Department of Biomedical Engineering, PSG College of Technology, Coimbatore, TamilNadu 641004, India – name: 3 Department of Mathematics and Computer Science, Beirut Arab University, Beirut 11-5020, Lebanon – name: 4 Department of Software Engineering, Kaunas University of Technology, Kaunas 51386, Lithuania |
| Author_xml | – sequence: 1 givenname: Priya surname: Ramasamy fullname: Ramasamy, Priya – sequence: 2 givenname: Vidhyapriya surname: Ranganathan fullname: Ranganathan, Vidhyapriya – sequence: 3 givenname: Seifedine surname: Kadry fullname: Kadry, Seifedine – sequence: 4 givenname: Robertas orcidid: 0000-0001-9990-1084 surname: Damaševičius fullname: Damaševičius, Robertas – sequence: 5 givenname: Tomas surname: Blažauskas fullname: Blažauskas, Tomas |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/33267370$$D View this record in MEDLINE/PubMed |
| BookMark | eNp1Uk1vEzEQtVARbQMH_gBaiQtUhHrttXf3gtRWpUSk4kB64WKNP3bjsGsHewNKT5w58wv5JZikRG0F8sH2-M2bN_N8iPacdwahpzl-TWmNjw3JcYk54w_QQY7relxQjPdunffRYYwLjAklOX-E9iklvKQlPkA_Tlw26aE12blTYb0crHfZRzU3vclOIRqdpftp59XnFA3Qy8669lV26bVtbHr9ZNtraLNZABcbH3rYEIDT2Xuzzi6MM2EbuoopMRWZg1Mpb-pbGwerfn3_OTNuyC5h-Rg9bKCL5snNPkJXb89nZ-_G0w8Xk7OT6VgVvB7GtGqAcoMVq4EXuWaVaqQqpKRMlQqorsuaGi2p1lDLWvOclY3iJSdKF1Vh6AhNtrzaw0Isg-0hrIUHKzYBH1oBIUnrjNCUsFSOS9OwAiopAVekkopRUxGqVeI62nKt3BLW36DrdoQ5Fn_METtzEvjNFrxcyd5olfoO0N1RcPfF2blo_VdRsjwtkghe3BAE_2Vl4iB6G5XpOnDGr6IgBU991jh5O0LP70EXfhVcmqsgrKhoSSvOEurZbUU7KX__RwIcbwEq-BiDaYSyw8bQJNB2_2zy5b2M_w_kN9tG27M |
| CitedBy_id | crossref_primary_10_1155_2020_7913061 crossref_primary_10_1007_s11042_020_09168_y crossref_primary_10_2478_cait_2020_0005 crossref_primary_10_1007_s11042_020_10218_8 crossref_primary_10_3390_e22050589 crossref_primary_10_1080_09720529_2021_2020427 crossref_primary_10_1016_j_gltp_2021_08_055 crossref_primary_10_32628_IJSRSET2411450 crossref_primary_10_1016_j_ijleo_2021_167286 crossref_primary_10_3390_jcp4010007 crossref_primary_10_3390_e24070885 crossref_primary_10_1088_1742_6596_2304_1_012007 crossref_primary_10_1002_ett_4034 crossref_primary_10_1007_s40747_021_00515_6 crossref_primary_10_1117_1_JEI_32_5_052303 crossref_primary_10_3390_e25020378 crossref_primary_10_1007_s11042_021_11408_8 crossref_primary_10_1007_s40747_023_01258_2 crossref_primary_10_3390_e25050746 crossref_primary_10_3390_e25050787 crossref_primary_10_1007_s11042_023_16698_8 crossref_primary_10_1109_ACCESS_2023_3255779 crossref_primary_10_1007_s00371_022_02517_y crossref_primary_10_1007_s11042_022_13003_x crossref_primary_10_1016_j_amc_2020_125039 crossref_primary_10_3390_sym13081447 crossref_primary_10_1007_s00500_025_10477_3 crossref_primary_10_2478_cait_2021_0004 crossref_primary_10_3390_app13127113 crossref_primary_10_1007_s11042_022_11917_0 crossref_primary_10_3390_e24101332 crossref_primary_10_31590_ejosat_1106823 crossref_primary_10_1016_j_prime_2024_100421 crossref_primary_10_1142_S0218127422500547 crossref_primary_10_1364_AO_544224 crossref_primary_10_3390_e25040631 crossref_primary_10_4018_IJISP_307071 crossref_primary_10_3390_electronics10091066 crossref_primary_10_3390_electronics10091024 crossref_primary_10_1109_ACCESS_2022_3212145 crossref_primary_10_1155_2021_5499538 crossref_primary_10_1155_2021_1898998 crossref_primary_10_3390_e22020158 crossref_primary_10_1007_s12596_024_02396_7 crossref_primary_10_1109_ACCESS_2021_3099214 crossref_primary_10_3390_s22166243 crossref_primary_10_3390_e21111075 crossref_primary_10_1007_s11042_021_11051_3 crossref_primary_10_1007_s11042_023_17970_7 crossref_primary_10_3390_app112311206 crossref_primary_10_1080_01611194_2020_1814447 crossref_primary_10_1007_s12524_024_01984_1 crossref_primary_10_1088_1742_6596_1818_1_012085 crossref_primary_10_32604_iasc_2022_022743 crossref_primary_10_3390_app13064034 crossref_primary_10_3390_e22010073 crossref_primary_10_3390_e22010112 crossref_primary_10_3390_sym13050824 crossref_primary_10_32604_cmc_2023_043424 crossref_primary_10_1109_ACCESS_2022_3233321 crossref_primary_10_1016_j_chaos_2024_114793 crossref_primary_10_3390_e23060672 crossref_primary_10_4018_IJISSCM_305845 crossref_primary_10_1016_j_compeleceng_2022_107860 crossref_primary_10_1109_ACCESS_2021_3123571 crossref_primary_10_1016_j_optlastec_2020_106837 crossref_primary_10_3390_math11071589 |
| Cites_doi | 10.1007/s11071-011-0155-7 10.1109/GrC.2010.11 10.3390/e20100801 10.1016/j.sigpro.2013.10.034 10.1109/MMUL.2017.3051512 10.1007/978-3-662-48683-2_1 10.1016/j.optcom.2014.12.043 10.3390/e17042117 10.1109/ICCTICT.2016.7514653 10.3390/e20120974 10.1016/j.neucom.2017.04.016 10.1016/j.micpro.2018.12.003 10.3390/e17010181 10.1109/CEEC.2018.8674208 10.1016/j.optcom.2011.08.079 10.3390/e20070535 10.1016/j.camwa.2010.03.017 10.1016/j.optlaseng.2012.11.001 10.3390/e20060463 10.1016/j.imavis.2006.02.021 10.1007/s11071-012-0440-0 10.1016/j.optlaseng.2015.12.004 10.1016/j.optlaseng.2015.09.007 10.1007/s11042-018-6996-z 10.3233/JIFS-169696 10.1109/ACCESS.2019.2893538 10.1007/s11071-015-2057-6 10.1007/s11071-010-9749-8 10.1016/j.optlaseng.2015.03.022 10.3390/e21030319 10.1016/j.patrec.2009.11.008 10.1007/s11042-017-4606-0 10.1016/j.asoc.2012.04.002 10.3390/e20110867 10.1016/j.ijleo.2013.09.040 10.1007/s11235-016-0212-0 10.1007/s11071-016-3051-3 10.3390/e20120901 10.1016/j.compeleceng.2016.12.025 10.1016/j.dsp.2013.10.020 10.1016/j.sigpro.2011.10.023 10.3390/e20060445 10.1016/j.asoc.2014.09.039 10.1049/iet-ipr.2016.0906 10.1007/s11042-015-2973-y 10.1016/j.cnsns.2013.06.031 10.1109/ACCESS.2018.2805847 10.1371/journal.pone.0084655 10.3390/e21010044 10.1016/j.neucom.2018.06.075 10.1007/s11036-018-1058-3 10.1007/s11071-013-0924-6 10.1109/APCASE.2015.50 10.1049/iet-cvi.2015.0344 10.1007/s11071-016-3030-8 10.1007/s11042-018-6214-z 10.1016/j.cosrev.2017.11.003 10.1007/s11071-012-0402-6 10.1016/j.optcom.2012.01.029 |
| ContentType | Journal Article |
| Copyright | 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2019 by the authors. 2019 |
| Copyright_xml | – notice: 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2019 by the authors. 2019 |
| DBID | AAYXX CITATION NPM 7TB 8FD 8FE 8FG ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU DWQXO FR3 HCIFZ KR7 L6V M7S PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS 7X8 5PM ADTOC UNPAY DOA |
| DOI | 10.3390/e21070656 |
| DatabaseName | CrossRef PubMed Mechanical & Transportation Engineering Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials - QC ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Korea Engineering Research Database SciTech Premium Collection Civil Engineering Abstracts ProQuest Engineering Collection Engineering Database ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection MEDLINE - Academic PubMed Central (Full Participant titles) Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database Technology Collection Technology Research Database ProQuest One Academic Middle East (New) Mechanical & Transportation Engineering Abstracts ProQuest Central Essentials ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Civil Engineering Abstracts Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest One Academic UKI Edition Materials Science & Engineering Collection Engineering Research Database ProQuest One Academic ProQuest One Academic (New) MEDLINE - Academic |
| DatabaseTitleList | MEDLINE - Academic PubMed CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 4 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 1099-4300 |
| ExternalDocumentID | oai_doaj_org_article_d3258fa6bef54a8bba0828bc53e823dc 10.3390/e21070656 PMC7515152 33267370 10_3390_e21070656 |
| Genre | Journal Article |
| GroupedDBID | 29G 2WC 5GY 5VS 8FE 8FG AADQD AAFWJ AAYXX ABDBF ABJCF ACIWK ACUHS ADBBV AEGXH AENEX AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS BCNDV BENPR BGLVJ CCPQU CITATION CS3 DU5 E3Z ESX F5P GROUPED_DOAJ GX1 HCIFZ HH5 IAO J9A KQ8 L6V M7S MODMG M~E OK1 OVT PGMZT PHGZM PHGZT PIMPY PQGLB PROAC PTHSS RNS RPM TR2 TUS XSB ~8M NPM 7TB 8FD ABUWG AZQEC DWQXO FR3 KR7 PKEHL PQEST PQQKQ PQUKI PRINS 7X8 PUEGO 5PM ADTOC C1A CH8 IPNFZ ITC RIG UNPAY |
| ID | FETCH-LOGICAL-c469t-38fa36e0c59a641d58cfbc4bb35c7ca3d9793edb3dda9b9d6157fc6762cd484e3 |
| IEDL.DBID | BENPR |
| ISSN | 1099-4300 |
| IngestDate | Fri Oct 03 12:43:57 EDT 2025 Sun Oct 26 04:09:25 EDT 2025 Tue Sep 30 16:41:03 EDT 2025 Thu Sep 04 19:32:21 EDT 2025 Fri Jul 25 11:58:08 EDT 2025 Mon Jul 21 06:04:01 EDT 2025 Thu Oct 16 04:28:09 EDT 2025 Thu Apr 24 22:51:49 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 7 |
| Keywords | 3D logistic map modified zigzag transformation image encryption chaotic system block scrambling entropy analysis |
| Language | English |
| License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c469t-38fa36e0c59a641d58cfbc4bb35c7ca3d9793edb3dda9b9d6157fc6762cd484e3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0001-9990-1084 |
| OpenAccessLink | https://www.proquest.com/docview/2548373865?pq-origsite=%requestingapplication%&accountid=15518 |
| PMID | 33267370 |
| PQID | 2548373865 |
| PQPubID | 2032401 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_d3258fa6bef54a8bba0828bc53e823dc unpaywall_primary_10_3390_e21070656 pubmedcentral_primary_oai_pubmedcentral_nih_gov_7515152 proquest_miscellaneous_2466769067 proquest_journals_2548373865 pubmed_primary_33267370 crossref_citationtrail_10_3390_e21070656 crossref_primary_10_3390_e21070656 |
| PublicationCentury | 2000 |
| PublicationDate | 20190703 |
| PublicationDateYYYYMMDD | 2019-07-03 |
| PublicationDate_xml | – month: 7 year: 2019 text: 20190703 day: 3 |
| PublicationDecade | 2010 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Basel |
| PublicationTitle | Entropy (Basel, Switzerland) |
| PublicationTitleAlternate | Entropy (Basel) |
| PublicationYear | 2019 |
| Publisher | MDPI AG MDPI |
| Publisher_xml | – name: MDPI AG – name: MDPI |
| References | Stoyanov (ref_18) 2015; 17 ref_50 Wang (ref_59) 2015; 73 Guo (ref_33) 2010; 38 ref_14 Zhu (ref_22) 2019; 7 ref_13 ref_12 Wu (ref_30) 2017; 5 ref_55 ref_10 Zhang (ref_28) 2013; 51 ref_54 Wang (ref_36) 2014; 25 ref_19 Pareek (ref_51) 2006; 24 Xu (ref_58) 2016; 78 ref_15 Murugan (ref_40) 2016; 10 Zhang (ref_65) 2017; 62 Li (ref_29) 2017; 87 Wang (ref_26) 2010; 62 (ref_44) 2017; 87 Liu (ref_60) 2010; 59 Tang (ref_64) 2016; 80 Liu (ref_11) 2019; 78 Huang (ref_23) 2012; 67 Li (ref_31) 2017; 24 ref_67 Wang (ref_21) 2018; 6 ref_66 Wang (ref_37) 2012; 92 Hussain (ref_61) 2012; 70 Hanis (ref_9) 2018; 77 Zhou (ref_45) 2014; 97 Naseer (ref_47) 2019; 65 Zhang (ref_62) 2015; 342 Ye (ref_24) 2010; 31 Qasim (ref_2) 2018; 27 Chen (ref_38) 2015; 81 Sam (ref_35) 2012; 69 Ahmad (ref_56) 2016; 75 Sinha (ref_42) 2018; 35 Ye (ref_48) 2017; 251 Li (ref_32) 2013; 73 Zhang (ref_27) 2014; 19 Khade (ref_52) 2012; 9 Kadir (ref_53) 2014; 125 Liu (ref_39) 2014; 6 Zhu (ref_25) 2012; 285 Zhang (ref_43) 2012; 285 Tong (ref_20) 2015; 17 ref_46 Mondal (ref_16) 2018; 77 Zhang (ref_34) 2015; 26 ref_3 Khalifa (ref_5) 2016; 45 Kadhim (ref_1) 2019; 335 Wu (ref_57) 2011; 1 Praveenkumar (ref_41) 2017; 65 ref_49 Sreelaja (ref_17) 2012; 12 ref_8 ref_4 ref_7 ref_6 Askar (ref_63) 2018; 12 |
| References_xml | – volume: 67 start-page: 2411 year: 2012 ident: ref_23 article-title: Image encryption algorithm using chaotic Chebyshev generator publication-title: Nonlinear Dyn. doi: 10.1007/s11071-011-0155-7 – ident: ref_54 doi: 10.1109/GrC.2010.11 – ident: ref_66 doi: 10.3390/e20100801 – volume: 97 start-page: 172 year: 2014 ident: ref_45 article-title: A new 1D chaotic system for image encryption publication-title: Signal Process. doi: 10.1016/j.sigpro.2013.10.034 – volume: 24 start-page: 64 year: 2017 ident: ref_31 article-title: Cryptanalyzing an image-scrambling encryption algorithm of pixel bits publication-title: IEEE Multimed. doi: 10.1109/MMUL.2017.3051512 – ident: ref_50 doi: 10.1007/978-3-662-48683-2_1 – volume: 342 start-page: 51 year: 2015 ident: ref_62 article-title: A color image encryption with heterogeneous bit-permutation and correlated chaos publication-title: Opt. Commun. doi: 10.1016/j.optcom.2014.12.043 – volume: 17 start-page: 2117 year: 2015 ident: ref_18 article-title: Image Encryption Using Chebyshev Map and Rotation Equation publication-title: Entropy doi: 10.3390/e17042117 – ident: ref_49 doi: 10.1109/ICCTICT.2016.7514653 – ident: ref_12 doi: 10.3390/e20120974 – volume: 251 start-page: 45 year: 2017 ident: ref_48 article-title: An efficient symmetric image encryption algorithm based on an intertwining logistic map publication-title: Neurocomputing doi: 10.1016/j.neucom.2017.04.016 – volume: 9 start-page: 323 year: 2012 ident: ref_52 article-title: 3D chaotic functions for image encryption publication-title: Int. J. Comput. Sci. Issues – volume: 65 start-page: 1 year: 2019 ident: ref_47 article-title: A Novel Approach to improve multimedia security utilizing 3D Mixed Chaotic map publication-title: Microprocess. Microsyst. doi: 10.1016/j.micpro.2018.12.003 – volume: 17 start-page: 181 year: 2015 ident: ref_20 article-title: An Image Encryption Scheme Based on Hyper chaotic Rabinovich and Exponential Chaos Maps publication-title: Entropy doi: 10.3390/e17010181 – ident: ref_55 doi: 10.1109/CEEC.2018.8674208 – volume: 285 start-page: 29 year: 2012 ident: ref_25 article-title: A novel image encryption scheme based on improved hyper-chaotic sequences publication-title: Opt. Commun. doi: 10.1016/j.optcom.2011.08.079 – ident: ref_10 doi: 10.3390/e20070535 – volume: 59 start-page: 3320 year: 2010 ident: ref_60 article-title: Color image encryption based on one-time keys and robust chaotic maps publication-title: Comput. Math. Appl. doi: 10.1016/j.camwa.2010.03.017 – volume: 51 start-page: 472 year: 2013 ident: ref_28 article-title: Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2012.11.001 – ident: ref_13 doi: 10.3390/e20060463 – volume: 24 start-page: 926 year: 2006 ident: ref_51 article-title: Image encryption using chaotic logistic map publication-title: Image Vis. Comput. doi: 10.1016/j.imavis.2006.02.021 – volume: 70 start-page: 181 year: 2012 ident: ref_61 article-title: Image encryption algorithm based on PGL (2, GF (28)) S-boxes and TD-ERCS chaotic sequence publication-title: Nonlinear Dyn. doi: 10.1007/s11071-012-0440-0 – volume: 80 start-page: 1 year: 2016 ident: ref_64 article-title: Multiple-image encryption with bit-plane decomposition and chaotic maps publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2015.12.004 – volume: 78 start-page: 17 year: 2016 ident: ref_58 article-title: A novel bit-level image encryption algorithm based on chaotic maps publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2015.09.007 – volume: 78 start-page: 15997 year: 2019 ident: ref_11 article-title: Construction of a new 2D chebyshev-sine map and its application to color image encryption publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-018-6996-z – volume: 35 start-page: 1567 year: 2018 ident: ref_42 article-title: Secure image encryption based on improved bat optimized piecewise linear chaotic map through integrated permutation-confusion and double diffusion publication-title: J. Intell. Fuzzy Syst. doi: 10.3233/JIFS-169696 – volume: 7 start-page: 14081 year: 2019 ident: ref_22 article-title: 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2893538 – volume: 81 start-page: 1151 year: 2015 ident: ref_38 article-title: An efficient image encryption scheme using lookup table-based confusion and diffusion publication-title: Nonlinear Dyn. doi: 10.1007/s11071-015-2057-6 – volume: 62 start-page: 615 year: 2010 ident: ref_26 article-title: A chaotic image encryption algorithm based on perceptron model publication-title: Nonlinear Dyn. doi: 10.1007/s11071-010-9749-8 – volume: 73 start-page: 53 year: 2015 ident: ref_59 article-title: A novel chaotic image encryption scheme using DNA sequence operations publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2015.03.022 – ident: ref_14 doi: 10.3390/e21030319 – volume: 31 start-page: 347 year: 2010 ident: ref_24 article-title: Image scrambling encryption algorithm of pixel bit based on chaos map publication-title: Pattern Recognit. Lett. doi: 10.1016/j.patrec.2009.11.008 – volume: 77 start-page: 6897 year: 2018 ident: ref_9 article-title: Double image compression and encryption scheme using logistic mapped convolution and cellular automata publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-017-4606-0 – volume: 12 start-page: 2879 year: 2012 ident: ref_17 article-title: Stream cipher for binary image encryption using ant colony optimization based key generation publication-title: Appl. Soft Comput. J. doi: 10.1016/j.asoc.2012.04.002 – ident: ref_15 doi: 10.3390/e20110867 – ident: ref_67 – volume: 125 start-page: 1671 year: 2014 ident: ref_53 article-title: Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN publication-title: Opt.-Int. J. Light Electron Opt. doi: 10.1016/j.ijleo.2013.09.040 – volume: 65 start-page: 65 year: 2017 ident: ref_41 article-title: Fusion of confusion and diffusion: A novel image encryption approach publication-title: Telecommun. Syst. doi: 10.1007/s11235-016-0212-0 – volume: 5 start-page: 6429 year: 2017 ident: ref_30 article-title: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps publication-title: IEEE Access – volume: 6 start-page: 621 year: 2014 ident: ref_39 article-title: New binary image encryption algorithm based on combination of confusion and diffusion publication-title: J. Chem. Pharm. Res. – volume: 87 start-page: 407 year: 2017 ident: ref_44 article-title: A novel pseudorandom number generator based on pseudorandomly enhanced logistic map publication-title: Nonlinear Dyn. doi: 10.1007/s11071-016-3051-3 – ident: ref_7 doi: 10.3390/e20120901 – volume: 62 start-page: 401 year: 2017 ident: ref_65 article-title: Multiple-image encryption algorithm based on mixed image element and chaos publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2016.12.025 – volume: 25 start-page: 244 year: 2014 ident: ref_36 article-title: Cryptanalysis of an image encryption algorithm using Chebyshev generator publication-title: Digit. Signal Process. doi: 10.1016/j.dsp.2013.10.020 – volume: 92 start-page: 1101 year: 2012 ident: ref_37 article-title: A novel colour image encryption algorithm based on chaos publication-title: Signal Process. doi: 10.1016/j.sigpro.2011.10.023 – ident: ref_8 doi: 10.3390/e20060445 – volume: 38 start-page: 781 year: 2010 ident: ref_33 article-title: An equivalent key attack on an image cryptosystem publication-title: Acta Electron. Sin. – volume: 26 start-page: 10 year: 2015 ident: ref_34 article-title: A new image encryption algorithm based on non-adjacent coupled map lattices publication-title: Appl. Soft. Comput. doi: 10.1016/j.asoc.2014.09.039 – volume: 12 start-page: 158 year: 2018 ident: ref_63 article-title: Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map publication-title: IET Image Process. doi: 10.1049/iet-ipr.2016.0906 – volume: 1 start-page: 31 year: 2011 ident: ref_57 article-title: NPCR and UACI randomness tests for image encryption publication-title: J. Sel. Areas Telecommun. – volume: 75 start-page: 13951 year: 2016 ident: ref_56 article-title: A secure image encryption scheme based on chaotic maps and affine transformation publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-015-2973-y – ident: ref_46 – volume: 19 start-page: 74 year: 2014 ident: ref_27 article-title: An image encryption scheme based on rotationmatrix bit-level permutation and block diffusion publication-title: Commun. Nonlinear Sci. Numer. Simul. doi: 10.1016/j.cnsns.2013.06.031 – volume: 6 start-page: 23733 year: 2018 ident: ref_21 article-title: An image encryption algorithm based on Josephus traversing and mixed chaotic map publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2805847 – ident: ref_19 doi: 10.1371/journal.pone.0084655 – volume: 45 start-page: 235 year: 2016 ident: ref_5 article-title: A Fast Selective Image Encryption Using Discrete Wavelet Transform and Chaotic Systems Synchronization publication-title: Inf. Technol. Control. – ident: ref_6 doi: 10.3390/e21010044 – volume: 335 start-page: 299 year: 2019 ident: ref_1 article-title: Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research publication-title: Neurocomputing doi: 10.1016/j.neucom.2018.06.075 – ident: ref_3 doi: 10.1007/s11036-018-1058-3 – volume: 73 start-page: 2083 year: 2013 ident: ref_32 article-title: Breaking a novel image encryption scheme based on improved hyperchaotic sequences publication-title: Nonlinear Dyn. doi: 10.1007/s11071-013-0924-6 – ident: ref_4 doi: 10.1109/APCASE.2015.50 – volume: 10 start-page: 593 year: 2016 ident: ref_40 article-title: Image encryption scheme based on block-based confusion and multiple levels of diffusion publication-title: IET Comput. Vis. doi: 10.1049/iet-cvi.2015.0344 – volume: 87 start-page: 127 year: 2017 ident: ref_29 article-title: An image encryption scheme based on chaotic tent map publication-title: Nonlinear Dyn. doi: 10.1007/s11071-016-3030-8 – volume: 77 start-page: 31177 year: 2018 ident: ref_16 article-title: A chaotic permutation and diffusion based image encryption algorithm for secure communications publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-018-6214-z – volume: 27 start-page: 45 year: 2018 ident: ref_2 article-title: Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review publication-title: Comput. Sci. Rev. doi: 10.1016/j.cosrev.2017.11.003 – volume: 69 start-page: 1995 year: 2012 ident: ref_35 article-title: An intertwining chaotic maps based image encryption scheme publication-title: Nonlinear Dyn. doi: 10.1007/s11071-012-0402-6 – volume: 285 start-page: 2343 year: 2012 ident: ref_43 article-title: An image encryption scheme using lightweight bit-level confusion and cascade cross circular diffusion publication-title: Opt. Commun. doi: 10.1016/j.optcom.2012.01.029 |
| SSID | ssj0023216 |
| Score | 2.4947703 |
| Snippet | Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in... |
| SourceID | doaj unpaywall pubmedcentral proquest pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
| StartPage | 656 |
| SubjectTerms | 3D logistic map Algorithms block scrambling Chaos theory chaotic system Correlation analysis Cryptography Diffusion barriers Efficiency entropy analysis Histograms image encryption Image enhancement Mapping modified zigzag transformation Open channels Permutations Scrambling (communication) Security Signal to noise ratio Wavelet transforms Wireless networks |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9NAEF6hXuCCQLwMLVoeBw5Ydbwv77FBrcojXEilios1-3AbkThRSFSlp5459xf2lzC7dqxEFHHh6PVaXs1j5xvv-BtC3kKWA0fUlirMNVLOFE-1NL3U5ZkxSlTS-_BpYPBVHp_wT6fidKPVV6gJa-iBG8HtO5aLogJpfCU4FMZAIF0zVjBf5MzZsPtmhV4nU22qxfKebHiEGCb1-x4Tm3CeJ7eiTyTpvw1Z_lkgeXdZz2B1AePxRvQ5ekDut7CRHjTLfUju-PoR-XVQ048T3BDoYW3nq-j89BtqYeJpH6OTo3jdx2j1A0fnMDHh1_P3dDB1owqRJ_0-OruEMzrcwK74ANSOfvYr2hBSx6FYV4AvOY_lAvRL_GtoZG-uroe4dDqA2WNycnQ4_HCctr0VUosJ8SJlKFMmfWaFBsl7ThS2MpYbw4RVFpjT6LjeGeYcaKMdAh9VWYlbp3W84J49ITv1tPbPCDWYsQldaBCxkXHP5FKAVUY6L7UBl5B3a5mXtiUeD_0vxiUmIEE9ZaeehLzups4ato3bJvWD4roJgSA7DqDZlK3ZlP8ym4TsrtVetl77s8RkuWCxC2pCXnW30d_CIQrUfrrEOTxWBWOQT8jTxkq6lTDEwoqpLCFqy362lrp9px6dR05vJQKyzBPyprO0v0vg-f-QwAtyD8GfjqXHbJfsLOZLv4cAa2FeRl_6DZrPJ50 priority: 102 providerName: Directory of Open Access Journals – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9MwFLegO8CFgfhY2EDm48CBLB-O7eSEWrRpfHRCopUGl8hf6aK1adW1oO7EmTN_IX8Jz04arTAkxCmK_azYyfN7v2e__IzQcxHGIgHU5nOINfyE8MTPmIx8HYdSclowY-zSQP-YHQ2Ttyf0pFlwO2_SKiEUL52Rtrs20D4MgzgKeADQI5jp4tWXZiUpsr475jRj19EWg0vYQVvD4w_dT26Ls2lb0wkRiO0DA_GN3dZjG07IcfVfBTD_zJO8saxmYvVVjMeXnNDhNsrX3a9zT872lwu5ry5-Y3b8__HdRrcafIq7tULdQddMdRd971b4zQQsDz6o1HzlrAz-CJ97YnAP3KDGcN8Dt3gGpXMxkfYf95e4P9VlARAXfy5HF2KEB5dAMjQQlcbvzArXzNeuyCUwwENOXV4Cfu9-TyrVz28_BvBycF_M7qHh4cHg9ZHfHOLgK4i8Fz5JC0GYCRXNBEsiTVNVSJVISajiShCdgYUwWhKtRSYzDQiLF4qBjVY6SRND7qNONa3MDsISQkOapZmg7sTkSMaMCsUl04ZlUmgPvVh_1Vw1DOf2oI1xDpGOVYC8VQAPPW1FZzWtx1VCPasarYBl4nYF0_kobyZ2rklMYYhMmoImIpVSWFJAqSgxaUy08tDeWrHyxjyc5xCVp8Qdt-qhJ201TGy7WyMqM12CTOLSjwFNeOhBrYdtTwiAbk546CG-oaEbXd2sqcpTRx7OqYWwsYeetbr89zfw8J-kdtFNgJGZS2Ime6izmC_NI4BqC_m4mY-_APxeO0E priority: 102 providerName: Unpaywall |
| Title | An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic—Tent Map |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/33267370 https://www.proquest.com/docview/2548373865 https://www.proquest.com/docview/2466769067 https://pubmed.ncbi.nlm.nih.gov/PMC7515152 https://www.mdpi.com/1099-4300/21/7/656/pdf?version=1562327596 https://doaj.org/article/d3258fa6bef54a8bba0828bc53e823dc |
| UnpaywallVersion | publishedVersion |
| Volume | 21 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVFSB databaseName: Free Full-Text Journals in Chemistry customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: HH5 dateStart: 19990101 isFulltext: true titleUrlDefault: http://abc-chemistry.org/ providerName: ABC ChemistRy – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: KQ8 dateStart: 19990101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: DOA dateStart: 20160101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVEBS databaseName: EBSCOhost Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: ABDBF dateStart: 20081201 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVFQY databaseName: GFMER Free Medical Journals customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: GX1 dateStart: 19990101 isFulltext: true titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php providerName: Geneva Foundation for Medical Education and Research – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: M~E dateStart: 19990101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVAQN databaseName: PubMed Central customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: RPM dateStart: 20180101 isFulltext: true titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/ providerName: National Library of Medicine – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: BENPR dateStart: 19990301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: 8FG dateStart: 19990301 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lj9MwEB7tdg9wQYt4BZbKPA4ciLaJYyc5INSidpdHqxW0UuES-ZVuRZt2SytUTpw58wv5JYzdNGzFwqVSnInqZDzjb-zxNwBPRSMUEaI2P8ZYw49oHPkpl4Gvw4aUMcu5MXZpoNvjp4PozZAN96C3PQtj0yq3PtE5aj1Tdo38GAOZhLoKlS_nF76tGmV3V7clNERZWkG_cBRj-3AQWmasGhy02r2z91UIRsOAb_iFKAb7xwZl7D4f35mVHHn_VYjz78TJa6tiLtZfxWRyaVbqHMKNEk6S5kb_N2HPFLfgR7Mgr6foKEi7UIu1cwrkA2pnakgLZy1N8LqFs9hnbF2IqbRH0p-T7kyPc0Sk5NN49E2MSP8SpsUHRKHJW7MmG6Jq1-TyDfBPzl0aAXnnThON1a_vP_vYddIV89sw6LT7r079suaCrzBQXvo0yQXlpqFYKngUaJaoXKpISspUrATVKRq00ZJqLVKZagREca44ulSloyQy9A7Uillh7gGRGMmxNEkFcwWOAxlyJlQsuTY8lUJ78Gz7zTNVEpLbuhiTDAMTq56sUo8HjyvR-YaF4yqhllVcJWCJs13DbDHKSjvMNA0ZviKXJmeRSKQUlsNPKkZNElKtPDjaqj0rrflL9mfsefCouo12aDdXRGFmK5SJXLYwTv4e3N2MkqonFDFyTOOGB_HO-Nnp6u6dYnzuuL5jZhFn6MGTaqT9-wvc_3_nH8B1hHupSzamR1BbLlbmIUKqpazDftI5qZfWUncLE_h7MgywbdA7a378DeJRKPo |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEF6V9lAuCMTLUGB5SRyw6ngf9h4q1ECqhCYRglSquJh9OY1InJAmqsKJM2d-Dz-GX8LsxjGNKNx69Hptr3dmZ79vd3YGoWcyiiUF1BYmwDVCShIaCq5qoYkjpRKWc2vd0kCny5tH9O0xO95AP1dnYZxb5comekNtxtqtke8CkUmJz1D5avIldFmj3O7qKoWGLFMrmD0fYqw82HFoF2dA4U73Wm9A3s_j-KDRe90MyywDoQZqOAtJmkvCbaSZkJzWDEt1rjRVijCdaEmMABW2RhFjpFDCAARIcs3BiGhDU2oJvPcK2qKECiB_W_VG9937ivKRuMaX8YwIEdGuBYLl9hX52izokwVchHD_dtTcnhcTuTiTw-G5WfDgOrpWwle8v9S3G2jDFjfR9_0Ct0ZgmHCj0NOFN0L4A2jDyOI6zJIGw3UdZs3PUDqVI-WOwL_EnbEZ5ICA8cdB_6vs4945DA0PyMJg6Fq8DIzti7x_A3zkxLst4LY_vTTQv7796EHTcUdObqGjS-n922izGBf2LsIKmCMTqZDMJ1SuqZgzqRPFjeVCSROgF6s-z3QZAN3l4RhmQISceLJKPAF6UlWdLKN-XFSp7gRXVXCBun3BeNrPynGfGRIz-EWubM6oTJWSLmag0ozYNCZGB2hnJfastB6n2R9dD9Dj6jaMe7eZIws7nkMd6r2TAWwE6M5SS6qWEMDkCUmiACVr-rPW1PU7xeDExxZPmEO4cYCeVpr27x649__GP0LbzV6nnbVb3cP76CpATeEdnckO2pxN5_YBwLmZeliOGYw-XfYw_Q0KZmNS |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9MwFLbGkIAXBOIWGGBuEg9ETePYTh4QWtnKytYJiU6a9hJ8S1fRJqVrNZUnnnnm1_Bz-CUcOxdWMXjbYxwncXxu37GPz0HouQhCEQFq8zn4Gn5EeOQnTLZ9HQZScpoxY-zSQH-f7RxE7w_p4Rr6WZ-FsWGVtU50iloXyq6Rt8CRiYmrUNnKqrCID1vdN9Mvvq0gZXda63IaJYvsmuUpuG8nr3tbQOsXYdjdHrzd8asKA74Ct3DukzgThJlA0USwqK1prDKpIikJVVwJohNgX6Ml0VokMtFg_nmmGCgQpaM4MgTeewld5jaLuz2l3n3XOHskbLMykxEhSdAy4FrZHUW2Yv9cmYDzsO3fIZpXF_lULE_FeHzG_nVvoOsVcMWbJafdRGsmv4W-b-a4NwGVhLdzNVs69YM_Ah9MDO6AfdQYrjtgLz9D60xMpD38_gr3Cz3KAPvio9HwqxjiwRn0DA-IXGOYWFymxHZNLrIBPnLsAhbwnju3NFK_vv0YwNBxX0xvo4MLmfs7aD0vcnMPYQk-I03iRFBXSrktQ0aF4pJpwxIptIde1nOeqir1ua3AMU7BBbLkSRvyeOhp03Va5vs4r1PHEq7pYFN0u4ZiNkwriU81CSn8IpMmo5GIpRQ2W6BUlJg4JFp5aKMme1rpjZP0D5d76ElzGyTebuOI3BQL6BO5uGSAGR66W3JJMxICaJwTHniIr_DPylBX7-SjY5dVnFOLbUMPPWs47d8zcP__g3-MroBwpnu9_d0H6BpgzMRFOJMNtD6fLcxDwHFz-cgJDEafLlpCfwNwi2Ds |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9MwFLegO8CFgfhY2EDm48CBLB-O7eSEWrRpfHRCopUGl8hf6aK1adW1oO7EmTN_IX8Jz04arTAkxCmK_azYyfN7v2e__IzQcxHGIgHU5nOINfyE8MTPmIx8HYdSclowY-zSQP-YHQ2Ttyf0pFlwO2_SKiEUL52Rtrs20D4MgzgKeADQI5jp4tWXZiUpsr475jRj19EWg0vYQVvD4w_dT26Ls2lb0wkRiO0DA_GN3dZjG07IcfVfBTD_zJO8saxmYvVVjMeXnNDhNsrX3a9zT872lwu5ry5-Y3b8__HdRrcafIq7tULdQddMdRd971b4zQQsDz6o1HzlrAz-CJ97YnAP3KDGcN8Dt3gGpXMxkfYf95e4P9VlARAXfy5HF2KEB5dAMjQQlcbvzArXzNeuyCUwwENOXV4Cfu9-TyrVz28_BvBycF_M7qHh4cHg9ZHfHOLgK4i8Fz5JC0GYCRXNBEsiTVNVSJVISajiShCdgYUwWhKtRSYzDQiLF4qBjVY6SRND7qNONa3MDsISQkOapZmg7sTkSMaMCsUl04ZlUmgPvVh_1Vw1DOf2oI1xDpGOVYC8VQAPPW1FZzWtx1VCPasarYBl4nYF0_kobyZ2rklMYYhMmoImIpVSWFJAqSgxaUy08tDeWrHyxjyc5xCVp8Qdt-qhJ201TGy7WyMqM12CTOLSjwFNeOhBrYdtTwiAbk546CG-oaEbXd2sqcpTRx7OqYWwsYeetbr89zfw8J-kdtFNgJGZS2Ime6izmC_NI4BqC_m4mY-_APxeO0E |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Image+Encryption+Scheme+Based+on+Block+Scrambling%2C+Modified+Zigzag+Transformation+and+Key+Generation+Using+Enhanced+Logistic-Tent+Map&rft.jtitle=Entropy+%28Basel%2C+Switzerland%29&rft.au=Ramasamy%2C+Priya&rft.au=Ranganathan%2C+Vidhyapriya&rft.au=Kadry%2C+Seifedine&rft.au=Dama%C5%A1evi%C4%8Dius%2C+Robertas&rft.date=2019-07-03&rft.issn=1099-4300&rft.eissn=1099-4300&rft.volume=21&rft.issue=7&rft_id=info:doi/10.3390%2Fe21070656&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1099-4300&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1099-4300&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1099-4300&client=summon |