An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic—Tent Map

Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and diffe...

Full description

Saved in:
Bibliographic Details
Published inEntropy (Basel, Switzerland) Vol. 21; no. 7; p. 656
Main Authors Ramasamy, Priya, Ranganathan, Vidhyapriya, Kadry, Seifedine, Damaševičius, Robertas, Blažauskas, Tomas
Format Journal Article
LanguageEnglish
Published Switzerland MDPI AG 03.07.2019
MDPI
Subjects
Online AccessGet full text
ISSN1099-4300
1099-4300
DOI10.3390/e21070656

Cover

Abstract Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.
AbstractList Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.
Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.
Author Ranganathan, Vidhyapriya
Ramasamy, Priya
Damaševičius, Robertas
Kadry, Seifedine
Blažauskas, Tomas
AuthorAffiliation 2 Department of Biomedical Engineering, PSG College of Technology, Coimbatore, TamilNadu 641004, India
4 Department of Software Engineering, Kaunas University of Technology, Kaunas 51386, Lithuania
1 Department of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, TamilNadu 641004, India
3 Department of Mathematics and Computer Science, Beirut Arab University, Beirut 11-5020, Lebanon
AuthorAffiliation_xml – name: 1 Department of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, TamilNadu 641004, India
– name: 2 Department of Biomedical Engineering, PSG College of Technology, Coimbatore, TamilNadu 641004, India
– name: 3 Department of Mathematics and Computer Science, Beirut Arab University, Beirut 11-5020, Lebanon
– name: 4 Department of Software Engineering, Kaunas University of Technology, Kaunas 51386, Lithuania
Author_xml – sequence: 1
  givenname: Priya
  surname: Ramasamy
  fullname: Ramasamy, Priya
– sequence: 2
  givenname: Vidhyapriya
  surname: Ranganathan
  fullname: Ranganathan, Vidhyapriya
– sequence: 3
  givenname: Seifedine
  surname: Kadry
  fullname: Kadry, Seifedine
– sequence: 4
  givenname: Robertas
  orcidid: 0000-0001-9990-1084
  surname: Damaševičius
  fullname: Damaševičius, Robertas
– sequence: 5
  givenname: Tomas
  surname: Blažauskas
  fullname: Blažauskas, Tomas
BackLink https://www.ncbi.nlm.nih.gov/pubmed/33267370$$D View this record in MEDLINE/PubMed
BookMark eNp1Uk1vEzEQtVARbQMH_gBaiQtUhHrttXf3gtRWpUSk4kB64WKNP3bjsGsHewNKT5w58wv5JZikRG0F8sH2-M2bN_N8iPacdwahpzl-TWmNjw3JcYk54w_QQY7relxQjPdunffRYYwLjAklOX-E9iklvKQlPkA_Tlw26aE12blTYb0crHfZRzU3vclOIRqdpftp59XnFA3Qy8669lV26bVtbHr9ZNtraLNZABcbH3rYEIDT2Xuzzi6MM2EbuoopMRWZg1Mpb-pbGwerfn3_OTNuyC5h-Rg9bKCL5snNPkJXb89nZ-_G0w8Xk7OT6VgVvB7GtGqAcoMVq4EXuWaVaqQqpKRMlQqorsuaGi2p1lDLWvOclY3iJSdKF1Vh6AhNtrzaw0Isg-0hrIUHKzYBH1oBIUnrjNCUsFSOS9OwAiopAVekkopRUxGqVeI62nKt3BLW36DrdoQ5Fn_METtzEvjNFrxcyd5olfoO0N1RcPfF2blo_VdRsjwtkghe3BAE_2Vl4iB6G5XpOnDGr6IgBU991jh5O0LP70EXfhVcmqsgrKhoSSvOEurZbUU7KX__RwIcbwEq-BiDaYSyw8bQJNB2_2zy5b2M_w_kN9tG27M
CitedBy_id crossref_primary_10_1155_2020_7913061
crossref_primary_10_1007_s11042_020_09168_y
crossref_primary_10_2478_cait_2020_0005
crossref_primary_10_1007_s11042_020_10218_8
crossref_primary_10_3390_e22050589
crossref_primary_10_1080_09720529_2021_2020427
crossref_primary_10_1016_j_gltp_2021_08_055
crossref_primary_10_32628_IJSRSET2411450
crossref_primary_10_1016_j_ijleo_2021_167286
crossref_primary_10_3390_jcp4010007
crossref_primary_10_3390_e24070885
crossref_primary_10_1088_1742_6596_2304_1_012007
crossref_primary_10_1002_ett_4034
crossref_primary_10_1007_s40747_021_00515_6
crossref_primary_10_1117_1_JEI_32_5_052303
crossref_primary_10_3390_e25020378
crossref_primary_10_1007_s11042_021_11408_8
crossref_primary_10_1007_s40747_023_01258_2
crossref_primary_10_3390_e25050746
crossref_primary_10_3390_e25050787
crossref_primary_10_1007_s11042_023_16698_8
crossref_primary_10_1109_ACCESS_2023_3255779
crossref_primary_10_1007_s00371_022_02517_y
crossref_primary_10_1007_s11042_022_13003_x
crossref_primary_10_1016_j_amc_2020_125039
crossref_primary_10_3390_sym13081447
crossref_primary_10_1007_s00500_025_10477_3
crossref_primary_10_2478_cait_2021_0004
crossref_primary_10_3390_app13127113
crossref_primary_10_1007_s11042_022_11917_0
crossref_primary_10_3390_e24101332
crossref_primary_10_31590_ejosat_1106823
crossref_primary_10_1016_j_prime_2024_100421
crossref_primary_10_1142_S0218127422500547
crossref_primary_10_1364_AO_544224
crossref_primary_10_3390_e25040631
crossref_primary_10_4018_IJISP_307071
crossref_primary_10_3390_electronics10091066
crossref_primary_10_3390_electronics10091024
crossref_primary_10_1109_ACCESS_2022_3212145
crossref_primary_10_1155_2021_5499538
crossref_primary_10_1155_2021_1898998
crossref_primary_10_3390_e22020158
crossref_primary_10_1007_s12596_024_02396_7
crossref_primary_10_1109_ACCESS_2021_3099214
crossref_primary_10_3390_s22166243
crossref_primary_10_3390_e21111075
crossref_primary_10_1007_s11042_021_11051_3
crossref_primary_10_1007_s11042_023_17970_7
crossref_primary_10_3390_app112311206
crossref_primary_10_1080_01611194_2020_1814447
crossref_primary_10_1007_s12524_024_01984_1
crossref_primary_10_1088_1742_6596_1818_1_012085
crossref_primary_10_32604_iasc_2022_022743
crossref_primary_10_3390_app13064034
crossref_primary_10_3390_e22010073
crossref_primary_10_3390_e22010112
crossref_primary_10_3390_sym13050824
crossref_primary_10_32604_cmc_2023_043424
crossref_primary_10_1109_ACCESS_2022_3233321
crossref_primary_10_1016_j_chaos_2024_114793
crossref_primary_10_3390_e23060672
crossref_primary_10_4018_IJISSCM_305845
crossref_primary_10_1016_j_compeleceng_2022_107860
crossref_primary_10_1109_ACCESS_2021_3123571
crossref_primary_10_1016_j_optlastec_2020_106837
crossref_primary_10_3390_math11071589
Cites_doi 10.1007/s11071-011-0155-7
10.1109/GrC.2010.11
10.3390/e20100801
10.1016/j.sigpro.2013.10.034
10.1109/MMUL.2017.3051512
10.1007/978-3-662-48683-2_1
10.1016/j.optcom.2014.12.043
10.3390/e17042117
10.1109/ICCTICT.2016.7514653
10.3390/e20120974
10.1016/j.neucom.2017.04.016
10.1016/j.micpro.2018.12.003
10.3390/e17010181
10.1109/CEEC.2018.8674208
10.1016/j.optcom.2011.08.079
10.3390/e20070535
10.1016/j.camwa.2010.03.017
10.1016/j.optlaseng.2012.11.001
10.3390/e20060463
10.1016/j.imavis.2006.02.021
10.1007/s11071-012-0440-0
10.1016/j.optlaseng.2015.12.004
10.1016/j.optlaseng.2015.09.007
10.1007/s11042-018-6996-z
10.3233/JIFS-169696
10.1109/ACCESS.2019.2893538
10.1007/s11071-015-2057-6
10.1007/s11071-010-9749-8
10.1016/j.optlaseng.2015.03.022
10.3390/e21030319
10.1016/j.patrec.2009.11.008
10.1007/s11042-017-4606-0
10.1016/j.asoc.2012.04.002
10.3390/e20110867
10.1016/j.ijleo.2013.09.040
10.1007/s11235-016-0212-0
10.1007/s11071-016-3051-3
10.3390/e20120901
10.1016/j.compeleceng.2016.12.025
10.1016/j.dsp.2013.10.020
10.1016/j.sigpro.2011.10.023
10.3390/e20060445
10.1016/j.asoc.2014.09.039
10.1049/iet-ipr.2016.0906
10.1007/s11042-015-2973-y
10.1016/j.cnsns.2013.06.031
10.1109/ACCESS.2018.2805847
10.1371/journal.pone.0084655
10.3390/e21010044
10.1016/j.neucom.2018.06.075
10.1007/s11036-018-1058-3
10.1007/s11071-013-0924-6
10.1109/APCASE.2015.50
10.1049/iet-cvi.2015.0344
10.1007/s11071-016-3030-8
10.1007/s11042-018-6214-z
10.1016/j.cosrev.2017.11.003
10.1007/s11071-012-0402-6
10.1016/j.optcom.2012.01.029
ContentType Journal Article
Copyright 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2019 by the authors. 2019
Copyright_xml – notice: 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2019 by the authors. 2019
DBID AAYXX
CITATION
NPM
7TB
8FD
8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FR3
HCIFZ
KR7
L6V
M7S
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
7X8
5PM
ADTOC
UNPAY
DOA
DOI 10.3390/e21070656
DatabaseName CrossRef
PubMed
Mechanical & Transportation Engineering Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials - QC
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
Engineering Research Database
SciTech Premium Collection
Civil Engineering Abstracts
ProQuest Engineering Collection
Engineering Database
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
MEDLINE - Academic
PubMed Central (Full Participant titles)
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
Technology Collection
Technology Research Database
ProQuest One Academic Middle East (New)
Mechanical & Transportation Engineering Abstracts
ProQuest Central Essentials
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Civil Engineering Abstracts
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Engineering Research Database
ProQuest One Academic
ProQuest One Academic (New)
MEDLINE - Academic
DatabaseTitleList MEDLINE - Academic

PubMed
CrossRef
Publicly Available Content Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 4
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
EISSN 1099-4300
ExternalDocumentID oai_doaj_org_article_d3258fa6bef54a8bba0828bc53e823dc
10.3390/e21070656
PMC7515152
33267370
10_3390_e21070656
Genre Journal Article
GroupedDBID 29G
2WC
5GY
5VS
8FE
8FG
AADQD
AAFWJ
AAYXX
ABDBF
ABJCF
ACIWK
ACUHS
ADBBV
AEGXH
AENEX
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BENPR
BGLVJ
CCPQU
CITATION
CS3
DU5
E3Z
ESX
F5P
GROUPED_DOAJ
GX1
HCIFZ
HH5
IAO
J9A
KQ8
L6V
M7S
MODMG
M~E
OK1
OVT
PGMZT
PHGZM
PHGZT
PIMPY
PQGLB
PROAC
PTHSS
RNS
RPM
TR2
TUS
XSB
~8M
NPM
7TB
8FD
ABUWG
AZQEC
DWQXO
FR3
KR7
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
7X8
PUEGO
5PM
ADTOC
C1A
CH8
IPNFZ
ITC
RIG
UNPAY
ID FETCH-LOGICAL-c469t-38fa36e0c59a641d58cfbc4bb35c7ca3d9793edb3dda9b9d6157fc6762cd484e3
IEDL.DBID BENPR
ISSN 1099-4300
IngestDate Fri Oct 03 12:43:57 EDT 2025
Sun Oct 26 04:09:25 EDT 2025
Tue Sep 30 16:41:03 EDT 2025
Thu Sep 04 19:32:21 EDT 2025
Fri Jul 25 11:58:08 EDT 2025
Mon Jul 21 06:04:01 EDT 2025
Thu Oct 16 04:28:09 EDT 2025
Thu Apr 24 22:51:49 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 7
Keywords 3D logistic map
modified zigzag transformation
image encryption
chaotic system
block scrambling
entropy analysis
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c469t-38fa36e0c59a641d58cfbc4bb35c7ca3d9793edb3dda9b9d6157fc6762cd484e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0001-9990-1084
OpenAccessLink https://www.proquest.com/docview/2548373865?pq-origsite=%requestingapplication%&accountid=15518
PMID 33267370
PQID 2548373865
PQPubID 2032401
ParticipantIDs doaj_primary_oai_doaj_org_article_d3258fa6bef54a8bba0828bc53e823dc
unpaywall_primary_10_3390_e21070656
pubmedcentral_primary_oai_pubmedcentral_nih_gov_7515152
proquest_miscellaneous_2466769067
proquest_journals_2548373865
pubmed_primary_33267370
crossref_citationtrail_10_3390_e21070656
crossref_primary_10_3390_e21070656
PublicationCentury 2000
PublicationDate 20190703
PublicationDateYYYYMMDD 2019-07-03
PublicationDate_xml – month: 7
  year: 2019
  text: 20190703
  day: 3
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Entropy (Basel, Switzerland)
PublicationTitleAlternate Entropy (Basel)
PublicationYear 2019
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Stoyanov (ref_18) 2015; 17
ref_50
Wang (ref_59) 2015; 73
Guo (ref_33) 2010; 38
ref_14
Zhu (ref_22) 2019; 7
ref_13
ref_12
Wu (ref_30) 2017; 5
ref_55
ref_10
Zhang (ref_28) 2013; 51
ref_54
Wang (ref_36) 2014; 25
ref_19
Pareek (ref_51) 2006; 24
Xu (ref_58) 2016; 78
ref_15
Murugan (ref_40) 2016; 10
Zhang (ref_65) 2017; 62
Li (ref_29) 2017; 87
Wang (ref_26) 2010; 62
(ref_44) 2017; 87
Liu (ref_60) 2010; 59
Tang (ref_64) 2016; 80
Liu (ref_11) 2019; 78
Huang (ref_23) 2012; 67
Li (ref_31) 2017; 24
ref_67
Wang (ref_21) 2018; 6
ref_66
Wang (ref_37) 2012; 92
Hussain (ref_61) 2012; 70
Hanis (ref_9) 2018; 77
Zhou (ref_45) 2014; 97
Naseer (ref_47) 2019; 65
Zhang (ref_62) 2015; 342
Ye (ref_24) 2010; 31
Qasim (ref_2) 2018; 27
Chen (ref_38) 2015; 81
Sam (ref_35) 2012; 69
Ahmad (ref_56) 2016; 75
Sinha (ref_42) 2018; 35
Ye (ref_48) 2017; 251
Li (ref_32) 2013; 73
Zhang (ref_27) 2014; 19
Khade (ref_52) 2012; 9
Kadir (ref_53) 2014; 125
Liu (ref_39) 2014; 6
Zhu (ref_25) 2012; 285
Zhang (ref_43) 2012; 285
Tong (ref_20) 2015; 17
ref_46
Mondal (ref_16) 2018; 77
Zhang (ref_34) 2015; 26
ref_3
Khalifa (ref_5) 2016; 45
Kadhim (ref_1) 2019; 335
Wu (ref_57) 2011; 1
Praveenkumar (ref_41) 2017; 65
ref_49
Sreelaja (ref_17) 2012; 12
ref_8
ref_4
ref_7
ref_6
Askar (ref_63) 2018; 12
References_xml – volume: 67
  start-page: 2411
  year: 2012
  ident: ref_23
  article-title: Image encryption algorithm using chaotic Chebyshev generator
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-011-0155-7
– ident: ref_54
  doi: 10.1109/GrC.2010.11
– ident: ref_66
  doi: 10.3390/e20100801
– volume: 97
  start-page: 172
  year: 2014
  ident: ref_45
  article-title: A new 1D chaotic system for image encryption
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2013.10.034
– volume: 24
  start-page: 64
  year: 2017
  ident: ref_31
  article-title: Cryptanalyzing an image-scrambling encryption algorithm of pixel bits
  publication-title: IEEE Multimed.
  doi: 10.1109/MMUL.2017.3051512
– ident: ref_50
  doi: 10.1007/978-3-662-48683-2_1
– volume: 342
  start-page: 51
  year: 2015
  ident: ref_62
  article-title: A color image encryption with heterogeneous bit-permutation and correlated chaos
  publication-title: Opt. Commun.
  doi: 10.1016/j.optcom.2014.12.043
– volume: 17
  start-page: 2117
  year: 2015
  ident: ref_18
  article-title: Image Encryption Using Chebyshev Map and Rotation Equation
  publication-title: Entropy
  doi: 10.3390/e17042117
– ident: ref_49
  doi: 10.1109/ICCTICT.2016.7514653
– ident: ref_12
  doi: 10.3390/e20120974
– volume: 251
  start-page: 45
  year: 2017
  ident: ref_48
  article-title: An efficient symmetric image encryption algorithm based on an intertwining logistic map
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2017.04.016
– volume: 9
  start-page: 323
  year: 2012
  ident: ref_52
  article-title: 3D chaotic functions for image encryption
  publication-title: Int. J. Comput. Sci. Issues
– volume: 65
  start-page: 1
  year: 2019
  ident: ref_47
  article-title: A Novel Approach to improve multimedia security utilizing 3D Mixed Chaotic map
  publication-title: Microprocess. Microsyst.
  doi: 10.1016/j.micpro.2018.12.003
– volume: 17
  start-page: 181
  year: 2015
  ident: ref_20
  article-title: An Image Encryption Scheme Based on Hyper chaotic Rabinovich and Exponential Chaos Maps
  publication-title: Entropy
  doi: 10.3390/e17010181
– ident: ref_55
  doi: 10.1109/CEEC.2018.8674208
– volume: 285
  start-page: 29
  year: 2012
  ident: ref_25
  article-title: A novel image encryption scheme based on improved hyper-chaotic sequences
  publication-title: Opt. Commun.
  doi: 10.1016/j.optcom.2011.08.079
– ident: ref_10
  doi: 10.3390/e20070535
– volume: 59
  start-page: 3320
  year: 2010
  ident: ref_60
  article-title: Color image encryption based on one-time keys and robust chaotic maps
  publication-title: Comput. Math. Appl.
  doi: 10.1016/j.camwa.2010.03.017
– volume: 51
  start-page: 472
  year: 2013
  ident: ref_28
  article-title: Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2012.11.001
– ident: ref_13
  doi: 10.3390/e20060463
– volume: 24
  start-page: 926
  year: 2006
  ident: ref_51
  article-title: Image encryption using chaotic logistic map
  publication-title: Image Vis. Comput.
  doi: 10.1016/j.imavis.2006.02.021
– volume: 70
  start-page: 181
  year: 2012
  ident: ref_61
  article-title: Image encryption algorithm based on PGL (2, GF (28)) S-boxes and TD-ERCS chaotic sequence
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-012-0440-0
– volume: 80
  start-page: 1
  year: 2016
  ident: ref_64
  article-title: Multiple-image encryption with bit-plane decomposition and chaotic maps
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2015.12.004
– volume: 78
  start-page: 17
  year: 2016
  ident: ref_58
  article-title: A novel bit-level image encryption algorithm based on chaotic maps
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2015.09.007
– volume: 78
  start-page: 15997
  year: 2019
  ident: ref_11
  article-title: Construction of a new 2D chebyshev-sine map and its application to color image encryption
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-018-6996-z
– volume: 35
  start-page: 1567
  year: 2018
  ident: ref_42
  article-title: Secure image encryption based on improved bat optimized piecewise linear chaotic map through integrated permutation-confusion and double diffusion
  publication-title: J. Intell. Fuzzy Syst.
  doi: 10.3233/JIFS-169696
– volume: 7
  start-page: 14081
  year: 2019
  ident: ref_22
  article-title: 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2893538
– volume: 81
  start-page: 1151
  year: 2015
  ident: ref_38
  article-title: An efficient image encryption scheme using lookup table-based confusion and diffusion
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-015-2057-6
– volume: 62
  start-page: 615
  year: 2010
  ident: ref_26
  article-title: A chaotic image encryption algorithm based on perceptron model
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-010-9749-8
– volume: 73
  start-page: 53
  year: 2015
  ident: ref_59
  article-title: A novel chaotic image encryption scheme using DNA sequence operations
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2015.03.022
– ident: ref_14
  doi: 10.3390/e21030319
– volume: 31
  start-page: 347
  year: 2010
  ident: ref_24
  article-title: Image scrambling encryption algorithm of pixel bit based on chaos map
  publication-title: Pattern Recognit. Lett.
  doi: 10.1016/j.patrec.2009.11.008
– volume: 77
  start-page: 6897
  year: 2018
  ident: ref_9
  article-title: Double image compression and encryption scheme using logistic mapped convolution and cellular automata
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-017-4606-0
– volume: 12
  start-page: 2879
  year: 2012
  ident: ref_17
  article-title: Stream cipher for binary image encryption using ant colony optimization based key generation
  publication-title: Appl. Soft Comput. J.
  doi: 10.1016/j.asoc.2012.04.002
– ident: ref_15
  doi: 10.3390/e20110867
– ident: ref_67
– volume: 125
  start-page: 1671
  year: 2014
  ident: ref_53
  article-title: Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN
  publication-title: Opt.-Int. J. Light Electron Opt.
  doi: 10.1016/j.ijleo.2013.09.040
– volume: 65
  start-page: 65
  year: 2017
  ident: ref_41
  article-title: Fusion of confusion and diffusion: A novel image encryption approach
  publication-title: Telecommun. Syst.
  doi: 10.1007/s11235-016-0212-0
– volume: 5
  start-page: 6429
  year: 2017
  ident: ref_30
  article-title: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps
  publication-title: IEEE Access
– volume: 6
  start-page: 621
  year: 2014
  ident: ref_39
  article-title: New binary image encryption algorithm based on combination of confusion and diffusion
  publication-title: J. Chem. Pharm. Res.
– volume: 87
  start-page: 407
  year: 2017
  ident: ref_44
  article-title: A novel pseudorandom number generator based on pseudorandomly enhanced logistic map
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-016-3051-3
– ident: ref_7
  doi: 10.3390/e20120901
– volume: 62
  start-page: 401
  year: 2017
  ident: ref_65
  article-title: Multiple-image encryption algorithm based on mixed image element and chaos
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2016.12.025
– volume: 25
  start-page: 244
  year: 2014
  ident: ref_36
  article-title: Cryptanalysis of an image encryption algorithm using Chebyshev generator
  publication-title: Digit. Signal Process.
  doi: 10.1016/j.dsp.2013.10.020
– volume: 92
  start-page: 1101
  year: 2012
  ident: ref_37
  article-title: A novel colour image encryption algorithm based on chaos
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2011.10.023
– ident: ref_8
  doi: 10.3390/e20060445
– volume: 38
  start-page: 781
  year: 2010
  ident: ref_33
  article-title: An equivalent key attack on an image cryptosystem
  publication-title: Acta Electron. Sin.
– volume: 26
  start-page: 10
  year: 2015
  ident: ref_34
  article-title: A new image encryption algorithm based on non-adjacent coupled map lattices
  publication-title: Appl. Soft. Comput.
  doi: 10.1016/j.asoc.2014.09.039
– volume: 12
  start-page: 158
  year: 2018
  ident: ref_63
  article-title: Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map
  publication-title: IET Image Process.
  doi: 10.1049/iet-ipr.2016.0906
– volume: 1
  start-page: 31
  year: 2011
  ident: ref_57
  article-title: NPCR and UACI randomness tests for image encryption
  publication-title: J. Sel. Areas Telecommun.
– volume: 75
  start-page: 13951
  year: 2016
  ident: ref_56
  article-title: A secure image encryption scheme based on chaotic maps and affine transformation
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-015-2973-y
– ident: ref_46
– volume: 19
  start-page: 74
  year: 2014
  ident: ref_27
  article-title: An image encryption scheme based on rotationmatrix bit-level permutation and block diffusion
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
  doi: 10.1016/j.cnsns.2013.06.031
– volume: 6
  start-page: 23733
  year: 2018
  ident: ref_21
  article-title: An image encryption algorithm based on Josephus traversing and mixed chaotic map
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2805847
– ident: ref_19
  doi: 10.1371/journal.pone.0084655
– volume: 45
  start-page: 235
  year: 2016
  ident: ref_5
  article-title: A Fast Selective Image Encryption Using Discrete Wavelet Transform and Chaotic Systems Synchronization
  publication-title: Inf. Technol. Control.
– ident: ref_6
  doi: 10.3390/e21010044
– volume: 335
  start-page: 299
  year: 2019
  ident: ref_1
  article-title: Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2018.06.075
– ident: ref_3
  doi: 10.1007/s11036-018-1058-3
– volume: 73
  start-page: 2083
  year: 2013
  ident: ref_32
  article-title: Breaking a novel image encryption scheme based on improved hyperchaotic sequences
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-013-0924-6
– ident: ref_4
  doi: 10.1109/APCASE.2015.50
– volume: 10
  start-page: 593
  year: 2016
  ident: ref_40
  article-title: Image encryption scheme based on block-based confusion and multiple levels of diffusion
  publication-title: IET Comput. Vis.
  doi: 10.1049/iet-cvi.2015.0344
– volume: 87
  start-page: 127
  year: 2017
  ident: ref_29
  article-title: An image encryption scheme based on chaotic tent map
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-016-3030-8
– volume: 77
  start-page: 31177
  year: 2018
  ident: ref_16
  article-title: A chaotic permutation and diffusion based image encryption algorithm for secure communications
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-018-6214-z
– volume: 27
  start-page: 45
  year: 2018
  ident: ref_2
  article-title: Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review
  publication-title: Comput. Sci. Rev.
  doi: 10.1016/j.cosrev.2017.11.003
– volume: 69
  start-page: 1995
  year: 2012
  ident: ref_35
  article-title: An intertwining chaotic maps based image encryption scheme
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-012-0402-6
– volume: 285
  start-page: 2343
  year: 2012
  ident: ref_43
  article-title: An image encryption scheme using lightweight bit-level confusion and cascade cross circular diffusion
  publication-title: Opt. Commun.
  doi: 10.1016/j.optcom.2012.01.029
SSID ssj0023216
Score 2.4947703
Snippet Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in...
SourceID doaj
unpaywall
pubmedcentral
proquest
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 656
SubjectTerms 3D logistic map
Algorithms
block scrambling
Chaos theory
chaotic system
Correlation analysis
Cryptography
Diffusion barriers
Efficiency
entropy analysis
Histograms
image encryption
Image enhancement
Mapping
modified zigzag transformation
Open channels
Permutations
Scrambling (communication)
Security
Signal to noise ratio
Wavelet transforms
Wireless networks
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9NAEF6hXuCCQLwMLVoeBw5Ydbwv77FBrcojXEilios1-3AbkThRSFSlp5459xf2lzC7dqxEFHHh6PVaXs1j5xvv-BtC3kKWA0fUlirMNVLOFE-1NL3U5ZkxSlTS-_BpYPBVHp_wT6fidKPVV6gJa-iBG8HtO5aLogJpfCU4FMZAIF0zVjBf5MzZsPtmhV4nU22qxfKebHiEGCb1-x4Tm3CeJ7eiTyTpvw1Z_lkgeXdZz2B1AePxRvQ5ekDut7CRHjTLfUju-PoR-XVQ048T3BDoYW3nq-j89BtqYeJpH6OTo3jdx2j1A0fnMDHh1_P3dDB1owqRJ_0-OruEMzrcwK74ANSOfvYr2hBSx6FYV4AvOY_lAvRL_GtoZG-uroe4dDqA2WNycnQ4_HCctr0VUosJ8SJlKFMmfWaFBsl7ThS2MpYbw4RVFpjT6LjeGeYcaKMdAh9VWYlbp3W84J49ITv1tPbPCDWYsQldaBCxkXHP5FKAVUY6L7UBl5B3a5mXtiUeD_0vxiUmIEE9ZaeehLzups4ato3bJvWD4roJgSA7DqDZlK3ZlP8ym4TsrtVetl77s8RkuWCxC2pCXnW30d_CIQrUfrrEOTxWBWOQT8jTxkq6lTDEwoqpLCFqy362lrp9px6dR05vJQKyzBPyprO0v0vg-f-QwAtyD8GfjqXHbJfsLOZLv4cAa2FeRl_6DZrPJ50
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9MwFLegO8CFgfhY2EDm48CBLB-O7eSEWrRpfHRCopUGl8hf6aK1adW1oO7EmTN_IX8Jz04arTAkxCmK_azYyfN7v2e__IzQcxHGIgHU5nOINfyE8MTPmIx8HYdSclowY-zSQP-YHQ2Ttyf0pFlwO2_SKiEUL52Rtrs20D4MgzgKeADQI5jp4tWXZiUpsr475jRj19EWg0vYQVvD4w_dT26Ls2lb0wkRiO0DA_GN3dZjG07IcfVfBTD_zJO8saxmYvVVjMeXnNDhNsrX3a9zT872lwu5ry5-Y3b8__HdRrcafIq7tULdQddMdRd971b4zQQsDz6o1HzlrAz-CJ97YnAP3KDGcN8Dt3gGpXMxkfYf95e4P9VlARAXfy5HF2KEB5dAMjQQlcbvzArXzNeuyCUwwENOXV4Cfu9-TyrVz28_BvBycF_M7qHh4cHg9ZHfHOLgK4i8Fz5JC0GYCRXNBEsiTVNVSJVISajiShCdgYUwWhKtRSYzDQiLF4qBjVY6SRND7qNONa3MDsISQkOapZmg7sTkSMaMCsUl04ZlUmgPvVh_1Vw1DOf2oI1xDpGOVYC8VQAPPW1FZzWtx1VCPasarYBl4nYF0_kobyZ2rklMYYhMmoImIpVSWFJAqSgxaUy08tDeWrHyxjyc5xCVp8Qdt-qhJ201TGy7WyMqM12CTOLSjwFNeOhBrYdtTwiAbk546CG-oaEbXd2sqcpTRx7OqYWwsYeetbr89zfw8J-kdtFNgJGZS2Ime6izmC_NI4BqC_m4mY-_APxeO0E
  priority: 102
  providerName: Unpaywall
Title An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic—Tent Map
URI https://www.ncbi.nlm.nih.gov/pubmed/33267370
https://www.proquest.com/docview/2548373865
https://www.proquest.com/docview/2466769067
https://pubmed.ncbi.nlm.nih.gov/PMC7515152
https://www.mdpi.com/1099-4300/21/7/656/pdf?version=1562327596
https://doaj.org/article/d3258fa6bef54a8bba0828bc53e823dc
UnpaywallVersion publishedVersion
Volume 21
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVFSB
  databaseName: Free Full-Text Journals in Chemistry
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: HH5
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: http://abc-chemistry.org/
  providerName: ABC ChemistRy
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: KQ8
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: DOA
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVEBS
  databaseName: EBSCOhost Academic Search Ultimate
  customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: ABDBF
  dateStart: 20081201
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn
  providerName: EBSCOhost
– providerCode: PRVFQY
  databaseName: GFMER Free Medical Journals
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: GX1
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php
  providerName: Geneva Foundation for Medical Education and Research
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: M~E
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVAQN
  databaseName: PubMed Central
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: RPM
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/
  providerName: National Library of Medicine
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: BENPR
  dateStart: 19990301
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: 8FG
  dateStart: 19990301
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lj9MwEB7tdg9wQYt4BZbKPA4ciLaJYyc5INSidpdHqxW0UuES-ZVuRZt2SytUTpw58wv5JYzdNGzFwqVSnInqZDzjb-zxNwBPRSMUEaI2P8ZYw49oHPkpl4Gvw4aUMcu5MXZpoNvjp4PozZAN96C3PQtj0yq3PtE5aj1Tdo38GAOZhLoKlS_nF76tGmV3V7clNERZWkG_cBRj-3AQWmasGhy02r2z91UIRsOAb_iFKAb7xwZl7D4f35mVHHn_VYjz78TJa6tiLtZfxWRyaVbqHMKNEk6S5kb_N2HPFLfgR7Mgr6foKEi7UIu1cwrkA2pnakgLZy1N8LqFs9hnbF2IqbRH0p-T7kyPc0Sk5NN49E2MSP8SpsUHRKHJW7MmG6Jq1-TyDfBPzl0aAXnnThON1a_vP_vYddIV89sw6LT7r079suaCrzBQXvo0yQXlpqFYKngUaJaoXKpISspUrATVKRq00ZJqLVKZagREca44ulSloyQy9A7Uillh7gGRGMmxNEkFcwWOAxlyJlQsuTY8lUJ78Gz7zTNVEpLbuhiTDAMTq56sUo8HjyvR-YaF4yqhllVcJWCJs13DbDHKSjvMNA0ZviKXJmeRSKQUlsNPKkZNElKtPDjaqj0rrflL9mfsefCouo12aDdXRGFmK5SJXLYwTv4e3N2MkqonFDFyTOOGB_HO-Nnp6u6dYnzuuL5jZhFn6MGTaqT9-wvc_3_nH8B1hHupSzamR1BbLlbmIUKqpazDftI5qZfWUncLE_h7MgywbdA7a378DeJRKPo
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEF6V9lAuCMTLUGB5SRyw6ngf9h4q1ECqhCYRglSquJh9OY1InJAmqsKJM2d-Dz-GX8LsxjGNKNx69Hptr3dmZ79vd3YGoWcyiiUF1BYmwDVCShIaCq5qoYkjpRKWc2vd0kCny5tH9O0xO95AP1dnYZxb5comekNtxtqtke8CkUmJz1D5avIldFmj3O7qKoWGLFMrmD0fYqw82HFoF2dA4U73Wm9A3s_j-KDRe90MyywDoQZqOAtJmkvCbaSZkJzWDEt1rjRVijCdaEmMABW2RhFjpFDCAARIcs3BiGhDU2oJvPcK2qKECiB_W_VG9937ivKRuMaX8YwIEdGuBYLl9hX52izokwVchHD_dtTcnhcTuTiTw-G5WfDgOrpWwle8v9S3G2jDFjfR9_0Ct0ZgmHCj0NOFN0L4A2jDyOI6zJIGw3UdZs3PUDqVI-WOwL_EnbEZ5ICA8cdB_6vs4945DA0PyMJg6Fq8DIzti7x_A3zkxLst4LY_vTTQv7796EHTcUdObqGjS-n922izGBf2LsIKmCMTqZDMJ1SuqZgzqRPFjeVCSROgF6s-z3QZAN3l4RhmQISceLJKPAF6UlWdLKN-XFSp7gRXVXCBun3BeNrPynGfGRIz-EWubM6oTJWSLmag0ozYNCZGB2hnJfastB6n2R9dD9Dj6jaMe7eZIws7nkMd6r2TAWwE6M5SS6qWEMDkCUmiACVr-rPW1PU7xeDExxZPmEO4cYCeVpr27x649__GP0LbzV6nnbVb3cP76CpATeEdnckO2pxN5_YBwLmZeliOGYw-XfYw_Q0KZmNS
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9MwFLbGkIAXBOIWGGBuEg9ETePYTh4QWtnKytYJiU6a9hJ8S1fRJqVrNZUnnnnm1_Bz-CUcOxdWMXjbYxwncXxu37GPz0HouQhCEQFq8zn4Gn5EeOQnTLZ9HQZScpoxY-zSQH-f7RxE7w_p4Rr6WZ-FsWGVtU50iloXyq6Rt8CRiYmrUNnKqrCID1vdN9Mvvq0gZXda63IaJYvsmuUpuG8nr3tbQOsXYdjdHrzd8asKA74Ct3DukzgThJlA0USwqK1prDKpIikJVVwJohNgX6Ml0VokMtFg_nmmGCgQpaM4MgTeewld5jaLuz2l3n3XOHskbLMykxEhSdAy4FrZHUW2Yv9cmYDzsO3fIZpXF_lULE_FeHzG_nVvoOsVcMWbJafdRGsmv4W-b-a4NwGVhLdzNVs69YM_Ah9MDO6AfdQYrjtgLz9D60xMpD38_gr3Cz3KAPvio9HwqxjiwRn0DA-IXGOYWFymxHZNLrIBPnLsAhbwnju3NFK_vv0YwNBxX0xvo4MLmfs7aD0vcnMPYQk-I03iRFBXSrktQ0aF4pJpwxIptIde1nOeqir1ua3AMU7BBbLkSRvyeOhp03Va5vs4r1PHEq7pYFN0u4ZiNkwriU81CSn8IpMmo5GIpRQ2W6BUlJg4JFp5aKMme1rpjZP0D5d76ElzGyTebuOI3BQL6BO5uGSAGR66W3JJMxICaJwTHniIr_DPylBX7-SjY5dVnFOLbUMPPWs47d8zcP__g3-MroBwpnu9_d0H6BpgzMRFOJMNtD6fLcxDwHFz-cgJDEafLlpCfwNwi2Ds
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9MwFLegO8CFgfhY2EDm48CBLB-O7eSEWrRpfHRCopUGl8hf6aK1adW1oO7EmTN_IX8Jz04arTAkxCmK_azYyfN7v2e__IzQcxHGIgHU5nOINfyE8MTPmIx8HYdSclowY-zSQP-YHQ2Ttyf0pFlwO2_SKiEUL52Rtrs20D4MgzgKeADQI5jp4tWXZiUpsr475jRj19EWg0vYQVvD4w_dT26Ls2lb0wkRiO0DA_GN3dZjG07IcfVfBTD_zJO8saxmYvVVjMeXnNDhNsrX3a9zT872lwu5ry5-Y3b8__HdRrcafIq7tULdQddMdRd971b4zQQsDz6o1HzlrAz-CJ97YnAP3KDGcN8Dt3gGpXMxkfYf95e4P9VlARAXfy5HF2KEB5dAMjQQlcbvzArXzNeuyCUwwENOXV4Cfu9-TyrVz28_BvBycF_M7qHh4cHg9ZHfHOLgK4i8Fz5JC0GYCRXNBEsiTVNVSJVISajiShCdgYUwWhKtRSYzDQiLF4qBjVY6SRND7qNONa3MDsISQkOapZmg7sTkSMaMCsUl04ZlUmgPvVh_1Vw1DOf2oI1xDpGOVYC8VQAPPW1FZzWtx1VCPasarYBl4nYF0_kobyZ2rklMYYhMmoImIpVSWFJAqSgxaUy08tDeWrHyxjyc5xCVp8Qdt-qhJ201TGy7WyMqM12CTOLSjwFNeOhBrYdtTwiAbk546CG-oaEbXd2sqcpTRx7OqYWwsYeetbr89zfw8J-kdtFNgJGZS2Ime6izmC_NI4BqC_m4mY-_APxeO0E
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Image+Encryption+Scheme+Based+on+Block+Scrambling%2C+Modified+Zigzag+Transformation+and+Key+Generation+Using+Enhanced+Logistic-Tent+Map&rft.jtitle=Entropy+%28Basel%2C+Switzerland%29&rft.au=Ramasamy%2C+Priya&rft.au=Ranganathan%2C+Vidhyapriya&rft.au=Kadry%2C+Seifedine&rft.au=Dama%C5%A1evi%C4%8Dius%2C+Robertas&rft.date=2019-07-03&rft.issn=1099-4300&rft.eissn=1099-4300&rft.volume=21&rft.issue=7&rft_id=info:doi/10.3390%2Fe21070656&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1099-4300&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1099-4300&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1099-4300&client=summon