Image Encryption Algorithm Based on an Improved Tent Map and Dynamic DNA Coding

As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-t...

Full description

Saved in:
Bibliographic Details
Published inEntropy (Basel, Switzerland) Vol. 27; no. 8; p. 796
Main Authors Zhou, Wei, Li, Xianwei, Xin, Zhenghua
Format Journal Article
LanguageEnglish
Published Switzerland MDPI AG 26.07.2025
MDPI
Subjects
Online AccessGet full text
ISSN1099-4300
1099-4300
DOI10.3390/e27080796

Cover

Abstract As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, we proposes a new IEA that integrates an improved chaotic map (Tent map), an improved Zigzag transform, and dynamic DNA coding. Firstly, a pseudo-wavelet transform (PWT) is applied to plain images to produce four sub-images I1, I2, I3, and I4. Secondly, the improved Zigzag transform and its three variants are used to rearrange the sub-image I1, and then the scrambled sub-image is diffused using XOR operation. Thirdly, an inverse pseudo-wavelet transform (IPWT) is employed on the four sub-images to reconstruct the image, and then the reconstructed image is encoded into a DNA sequence utilizing dynamic DNA encoding. Finally, the DNA sequence is scrambled and diffused employing DNA-level index scrambling and dynamic DNA operations. The experimental results and performance evaluations, including chaotic performance evaluation and comprehensive security analysis, demonstrate that our IEA achieves high key sensitivity, low correlation, excellent entropy, and strong resistance to common attacks. This highlights its potential for deployment in real-time, high-security image cryptosystems, especially in fields such as medical image security and social media privacy.
AbstractList As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, we proposes a new IEA that integrates an improved chaotic map (Tent map), an improved Zigzag transform, and dynamic DNA coding. Firstly, a pseudo-wavelet transform (PWT) is applied to plain images to produce four sub-images I1, I2, I3, and I4. Secondly, the improved Zigzag transform and its three variants are used to rearrange the sub-image I1, and then the scrambled sub-image is diffused using XOR operation. Thirdly, an inverse pseudo-wavelet transform (IPWT) is employed on the four sub-images to reconstruct the image, and then the reconstructed image is encoded into a DNA sequence utilizing dynamic DNA encoding. Finally, the DNA sequence is scrambled and diffused employing DNA-level index scrambling and dynamic DNA operations. The experimental results and performance evaluations, including chaotic performance evaluation and comprehensive security analysis, demonstrate that our IEA achieves high key sensitivity, low correlation, excellent entropy, and strong resistance to common attacks. This highlights its potential for deployment in real-time, high-security image cryptosystems, especially in fields such as medical image security and social media privacy.
As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, we proposes a new IEA that integrates an improved chaotic map (Tent map), an improved Zigzag transform, and dynamic DNA coding. Firstly, a pseudo-wavelet transform (PWT) is applied to plain images to produce four sub-images I1, I2, I3, and I4. Secondly, the improved Zigzag transform and its three variants are used to rearrange the sub-image I1, and then the scrambled sub-image is diffused using XOR operation. Thirdly, an inverse pseudo-wavelet transform (IPWT) is employed on the four sub-images to reconstruct the image, and then the reconstructed image is encoded into a DNA sequence utilizing dynamic DNA encoding. Finally, the DNA sequence is scrambled and diffused employing DNA-level index scrambling and dynamic DNA operations. The experimental results and performance evaluations, including chaotic performance evaluation and comprehensive security analysis, demonstrate that our IEA achieves high key sensitivity, low correlation, excellent entropy, and strong resistance to common attacks. This highlights its potential for deployment in real-time, high-security image cryptosystems, especially in fields such as medical image security and social media privacy.As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, we proposes a new IEA that integrates an improved chaotic map (Tent map), an improved Zigzag transform, and dynamic DNA coding. Firstly, a pseudo-wavelet transform (PWT) is applied to plain images to produce four sub-images I1, I2, I3, and I4. Secondly, the improved Zigzag transform and its three variants are used to rearrange the sub-image I1, and then the scrambled sub-image is diffused using XOR operation. Thirdly, an inverse pseudo-wavelet transform (IPWT) is employed on the four sub-images to reconstruct the image, and then the reconstructed image is encoded into a DNA sequence utilizing dynamic DNA encoding. Finally, the DNA sequence is scrambled and diffused employing DNA-level index scrambling and dynamic DNA operations. The experimental results and performance evaluations, including chaotic performance evaluation and comprehensive security analysis, demonstrate that our IEA achieves high key sensitivity, low correlation, excellent entropy, and strong resistance to common attacks. This highlights its potential for deployment in real-time, high-security image cryptosystems, especially in fields such as medical image security and social media privacy.
As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, we proposes a new IEA that integrates an improved chaotic map (Tent map), an improved Zigzag transform, and dynamic DNA coding. Firstly, a pseudo-wavelet transform (PWT) is applied to plain images to produce four sub-images I[sub.1], I[sub.2], I[sub.3], and I[sub.4]. Secondly, the improved Zigzag transform and its three variants are used to rearrange the sub-image I[sub.1], and then the scrambled sub-image is diffused using XOR operation. Thirdly, an inverse pseudo-wavelet transform (IPWT) is employed on the four sub-images to reconstruct the image, and then the reconstructed image is encoded into a DNA sequence utilizing dynamic DNA encoding. Finally, the DNA sequence is scrambled and diffused employing DNA-level index scrambling and dynamic DNA operations. The experimental results and performance evaluations, including chaotic performance evaluation and comprehensive security analysis, demonstrate that our IEA achieves high key sensitivity, low correlation, excellent entropy, and strong resistance to common attacks. This highlights its potential for deployment in real-time, high-security image cryptosystems, especially in fields such as medical image security and social media privacy.
Audience Academic
Author Zhou, Wei
Li, Xianwei
Xin, Zhenghua
AuthorAffiliation 1 School of Information Engineering, Suzhou University, Suzhou 234000, China; weizhou@ahszu.edu.cn (W.Z.)
2 School of Computer and Information Engineering, Bengbu University, Bengbu 233000, China
AuthorAffiliation_xml – name: 2 School of Computer and Information Engineering, Bengbu University, Bengbu 233000, China
– name: 1 School of Information Engineering, Suzhou University, Suzhou 234000, China; weizhou@ahszu.edu.cn (W.Z.)
Author_xml – sequence: 1
  givenname: Wei
  orcidid: 0000-0001-5956-0684
  surname: Zhou
  fullname: Zhou, Wei
– sequence: 2
  givenname: Xianwei
  orcidid: 0000-0002-6295-6089
  surname: Li
  fullname: Li, Xianwei
– sequence: 3
  givenname: Zhenghua
  surname: Xin
  fullname: Xin, Zhenghua
BackLink https://www.ncbi.nlm.nih.gov/pubmed/40870268$$D View this record in MEDLINE/PubMed
BookMark eNp9kk1v1DAQhi1URD_gwB9AkbgA0hZ_xbFPaNkWWKnQSzlbs7aTepXYqZMt2n-Pw5alixDywZ7Xz7z2jH2KjkIMDqGXBJ8zpvB7RysscaXEE3RCsFIzzjA-erQ-RqfDsMaYMkrEM3TMsawwFfIEXS87aFxxGUza9qOPoZi3TUx-vO2KjzA4W2QJQrHs-hTvc3jjwlh8hT6LtrjYBui8KS6-zYtFtD40z9HTGtrBvXiYz9D3T5c3iy-zq-vPy8X8ama4UuPMEEMwsJrxKa4ISEIrIkA5w6xx3AjGVS3LjFTESo5BlUI5YoSzlNaEnaHlztdGWOs--Q7SVkfw-pcQU6Mhjd60Tlcqj1XOtha4ZasVM44yYIbUdamMyV7vdl6b0MP2B7Tt3pBgPXVY7zuc4Q87uN-sOpfvGsYE7cENDneCv9VNvNeEMllyUWWHNw8OKd5t3DDqzg_GtS0EFzeDZpQLqmSpyoy-_gtdx00KubETxTGhWIo_VAO5XB_qmA82k6mey5JVmFMyHXv-DyoP6_IT5g9V-6wfJLx6XOm-xN-fJwNvd4BJcRiSq__Ttp_geM-E
Cites_doi 10.1109/ACCESS.2021.3108789
10.1007/s00521-017-3199-x
10.1016/j.bspc.2024.107174
10.1007/s11071-015-2330-8
10.1016/j.chaos.2021.110962
10.1007/s11071-021-06941-y
10.1016/j.optlaseng.2021.106881
10.3390/fractalfract9070426
10.1007/s11071-020-05625-3
10.3390/app13127113
10.1016/j.bspc.2023.105877
10.1016/j.jksuci.2023.101858
10.3390/math12243917
10.1016/j.ins.2021.04.013
10.1016/j.chaos.2024.114800
10.1007/s00371-023-03219-9
10.1016/j.optlaseng.2015.03.022
10.3390/math12203297
10.1016/j.ins.2014.02.156
10.1109/ACCESS.2019.2893760
10.1016/j.chaos.2023.113492
10.1088/1402-4896/ad7330
10.1016/j.jvcir.2021.103424
10.1007/s12652-019-01385-0
10.1007/s10489-024-05613-9
10.1007/s11554-023-01294-8
10.1016/j.optlastec.2020.106366
10.3390/fractalfract7040287
10.1016/j.optlastec.2019.105581
10.1016/j.eswa.2024.125328
10.1142/S0218127421500218
10.1016/j.physd.2024.134162
10.1016/j.ins.2020.07.058
10.1109/TCSVT.2024.3394951
10.1016/j.ins.2020.09.032
10.1016/j.eswa.2024.125854
10.1109/ACCESS.2021.3123571
10.1016/j.optlastec.2019.105661
10.1016/j.chaos.2024.115146
10.1088/1402-4896/ad3487
10.1016/j.eswa.2024.123190
10.1049/ipr2.12882
10.1007/s11071-022-08185-w
10.3390/math11030767
10.1016/j.optlastec.2022.109033
10.1088/1674-1056/ac6861
10.1016/j.ins.2022.07.120
10.3390/e22020180
ContentType Journal Article
Copyright COPYRIGHT 2025 MDPI AG
2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2025 by the authors. 2025
Copyright_xml – notice: COPYRIGHT 2025 MDPI AG
– notice: 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2025 by the authors. 2025
DBID AAYXX
CITATION
NPM
7TB
8FD
8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FR3
HCIFZ
KR7
L6V
M7S
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PTHSS
7X8
5PM
ADTOC
UNPAY
DOA
DOI 10.3390/e27080796
DatabaseName CrossRef
PubMed
Mechanical & Transportation Engineering Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
Engineering Research Database
SciTech Premium Collection
Civil Engineering Abstracts
ProQuest Engineering Collection
Engineering Database
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
Engineering Collection
MEDLINE - Academic
PubMed Central (Full Participant titles)
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
Technology Collection
Technology Research Database
ProQuest One Academic Middle East (New)
Mechanical & Transportation Engineering Abstracts
ProQuest Central Essentials
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Civil Engineering Abstracts
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Engineering Research Database
ProQuest One Academic
ProQuest One Academic (New)
MEDLINE - Academic
DatabaseTitleList CrossRef
Publicly Available Content Database
PubMed

MEDLINE - Academic


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 4
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
EISSN 1099-4300
ExternalDocumentID oai_doaj_org_article_79797b69edda4d3bb3ce23a3c1ff59cc
10.3390/e27080796
PMC12385467
A853704217
40870268
10_3390_e27080796
Genre Journal Article
GrantInformation_xml – fundername: Anhui Provincial Federation of Social Sciences Project
  grantid: 2023CX154
– fundername: Anhui Provincial Scientific Research Project
  grantid: 2022AH051376
– fundername: Quality Engineering Project
  grantid: szxy2023jyjf82
GroupedDBID 29G
2WC
5GY
5VS
8FE
8FG
AADQD
AAFWJ
AAYXX
ABDBF
ABJCF
ACIWK
ACUHS
ADBBV
AEGXH
AENEX
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BENPR
BGLVJ
CCPQU
CITATION
CS3
DU5
E3Z
ESX
F5P
GROUPED_DOAJ
GX1
HCIFZ
HH5
IAO
ITC
J9A
KQ8
L6V
M7S
MODMG
M~E
OK1
OVT
PGMZT
PHGZM
PHGZT
PIMPY
PQGLB
PROAC
PTHSS
RNS
RPM
TR2
TUS
XSB
~8M
NPM
PUEGO
7TB
8FD
ABUWG
AZQEC
DWQXO
FR3
KR7
PKEHL
PQEST
PQQKQ
PQUKI
7X8
5PM
ADTOC
C1A
CH8
IPNFZ
RIG
UNPAY
ID FETCH-LOGICAL-c499t-c1c10a3f34c49971a812716a9ec3dce4c6349f85a3f71d840a9569e1c6ed22f13
IEDL.DBID DOA
ISSN 1099-4300
IngestDate Tue Oct 14 19:08:42 EDT 2025
Sun Oct 26 04:01:58 EDT 2025
Tue Sep 30 17:01:13 EDT 2025
Thu Sep 04 12:31:05 EDT 2025
Wed Aug 27 14:44:57 EDT 2025
Mon Oct 20 22:39:39 EDT 2025
Mon Oct 20 16:50:55 EDT 2025
Tue Sep 16 01:42:38 EDT 2025
Thu Oct 16 04:43:21 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 8
Keywords chaotic performance evaluation
security analysis
Zigzag transform
pseudo-wavelet transform
DNA coding
image encryption
chaotic map
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c499t-c1c10a3f34c49971a812716a9ec3dce4c6349f85a3f71d840a9569e1c6ed22f13
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0001-5956-0684
0000-0002-6295-6089
OpenAccessLink https://doaj.org/article/79797b69edda4d3bb3ce23a3c1ff59cc
PMID 40870268
PQID 3244012086
PQPubID 2032401
ParticipantIDs doaj_primary_oai_doaj_org_article_79797b69edda4d3bb3ce23a3c1ff59cc
unpaywall_primary_10_3390_e27080796
pubmedcentral_primary_oai_pubmedcentral_nih_gov_12385467
proquest_miscellaneous_3246298595
proquest_journals_3244012086
gale_infotracmisc_A853704217
gale_infotracacademiconefile_A853704217
pubmed_primary_40870268
crossref_primary_10_3390_e27080796
PublicationCentury 2000
PublicationDate 2025-07-26
PublicationDateYYYYMMDD 2025-07-26
PublicationDate_xml – month: 07
  year: 2025
  text: 2025-07-26
  day: 26
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Entropy (Basel, Switzerland)
PublicationTitleAlternate Entropy (Basel)
PublicationYear 2025
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Li (ref_37) 2024; 182
Naskar (ref_8) 2020; 100
Su (ref_54) 2022; 31
Duan (ref_30) 2022; 150
Wang (ref_41) 2015; 73
Wang (ref_14) 2021; 147
Wang (ref_17) 2019; 119
ref_18
Zhang (ref_22) 2023; 35
Chen (ref_25) 2022; 83
Yang (ref_50) 2019; 119
Chen (ref_52) 2023; 98
Zhang (ref_33) 2023; 111
Feng (ref_35) 2024; 246
Wang (ref_2) 2021; 569
Zhang (ref_55) 2024; 99
Singh (ref_4) 2022; 18
Mandal (ref_5) 2022; 609
Alawida (ref_19) 2024; 83
ref_24
Yan (ref_46) 2024; 185
Hua (ref_15) 2021; 106
Yu (ref_47) 2024; 40
Zhang (ref_6) 2014; 273
Mao (ref_38) 2023; 20
Wang (ref_16) 2020; 131
Wang (ref_36) 2022; 70
Wang (ref_42) 2016; 83
Zou (ref_1) 2022; 430
Sneha (ref_11) 2020; 11
Liang (ref_51) 2023; 160
Ghebleh (ref_10) 2019; 31
Teng (ref_20) 2024; 54
Feng (ref_26) 2019; 7
Lai (ref_23) 2025; 264
ref_34
Wang (ref_53) 2021; 9
ref_32
ref_31
Mondal (ref_12) 2019; 45
Wang (ref_9) 2025; 261
Hua (ref_28) 2021; 546
ref_43
Zheng (ref_21) 2023; 17
Wang (ref_48) 2021; 31
ref_40
Zhang (ref_39) 2021; 547
ref_3
Wu (ref_45) 2023; 172
Zhang (ref_13) 2024; 34
Feng (ref_27) 2021; 9
Belazi (ref_29) 2022; 66
Huang (ref_49) 2024; 463
Yan (ref_44) 2024; 99
ref_7
References_xml – volume: 9
  start-page: 120596
  year: 2021
  ident: ref_53
  article-title: A new image encryption algorithm based on single S-Box and dynamic encryption step
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3108789
– volume: 31
  start-page: 2415
  year: 2019
  ident: ref_10
  article-title: A novel efficient image encryption scheme based on chained skew tent maps
  publication-title: Neural Comput. Appl.
  doi: 10.1007/s00521-017-3199-x
– ident: ref_24
  doi: 10.1016/j.bspc.2024.107174
– volume: 83
  start-page: 333
  year: 2016
  ident: ref_42
  article-title: A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-015-2330-8
– volume: 147
  start-page: 110962
  year: 2021
  ident: ref_14
  article-title: An image encryption algorithm based on dynamic row scrambling and Zigzag transformation
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2021.110962
– volume: 106
  start-page: 3583
  year: 2021
  ident: ref_15
  article-title: Image encryption using value-differencing transformation and modified ZigZag transformation
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-021-06941-y
– volume: 150
  start-page: 106881
  year: 2022
  ident: ref_30
  article-title: New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2021.106881
– ident: ref_3
  doi: 10.3390/fractalfract9070426
– volume: 100
  start-page: 2877
  year: 2020
  ident: ref_8
  article-title: A robust image encryption scheme using chaotic tent map and cellular automata
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-020-05625-3
– ident: ref_43
  doi: 10.3390/app13127113
– ident: ref_7
  doi: 10.1016/j.bspc.2023.105877
– volume: 35
  start-page: 101858
  year: 2023
  ident: ref_22
  article-title: DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane
  publication-title: J. King Saud Univ. Comput. Inf. Sci.
  doi: 10.1016/j.jksuci.2023.101858
– ident: ref_34
  doi: 10.3390/math12243917
– volume: 569
  start-page: 217
  year: 2021
  ident: ref_2
  article-title: A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2021.04.013
– volume: 182
  start-page: 114800
  year: 2024
  ident: ref_37
  article-title: A joint image encryption based on a memristive Rulkov neuron with controllable multistability and compressive sensing
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2024.114800
– volume: 40
  start-page: 8001
  year: 2024
  ident: ref_47
  article-title: Image encryption algorithm based on DNA network and hyperchaotic system
  publication-title: Vis. Comput.
  doi: 10.1007/s00371-023-03219-9
– volume: 98
  start-page: 035227
  year: 2023
  ident: ref_52
  article-title: Selective region medical image encryption algorithm based on cascade chaos and two-dimensional Joseph traversal
  publication-title: Phys. Scr.
– volume: 73
  start-page: 53
  year: 2015
  ident: ref_41
  article-title: A novel chaotic image encryption scheme using DNA sequence operations
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2015.03.022
– ident: ref_18
  doi: 10.3390/math12203297
– volume: 273
  start-page: 329
  year: 2014
  ident: ref_6
  article-title: A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2014.02.156
– volume: 7
  start-page: 12584
  year: 2019
  ident: ref_26
  article-title: Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2893760
– volume: 172
  start-page: 113492
  year: 2023
  ident: ref_45
  article-title: A novel image compression and encryption scheme based on conservative chaotic system and DNA method
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2023.113492
– volume: 70
  start-page: 103340
  year: 2022
  ident: ref_36
  article-title: Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding
  publication-title: J. Inf. Secur. Appl.
– volume: 99
  start-page: 105215
  year: 2024
  ident: ref_44
  article-title: A novel plaintext-related dynamic DNA image encryption algorithm based on a 4D conservative chaotic system
  publication-title: Phys. Scr.
  doi: 10.1088/1402-4896/ad7330
– volume: 83
  start-page: 103424
  year: 2022
  ident: ref_25
  article-title: Security measurement of a medical communication scheme based on chaos and DNA coding
  publication-title: J. Vis. Commun. Image Represent.
  doi: 10.1016/j.jvcir.2021.103424
– volume: 18
  start-page: 1
  year: 2022
  ident: ref_4
  article-title: Towards integrating image encryption with compression: A survey
  publication-title: ACM Trans. Multimed. Comput. Commun. Appl. (TOMM)
– volume: 83
  start-page: 103791
  year: 2024
  ident: ref_19
  article-title: A novel DNA tree-based chaotic image encryption algorithm
  publication-title: J. Inf. Secur. Appl.
– volume: 66
  start-page: 103131
  year: 2022
  ident: ref_29
  article-title: Improved Sine-Tangent chaotic map with application in medical images encryption
  publication-title: J. Inf. Secur. Appl.
– volume: 430
  start-page: 127291
  year: 2022
  ident: ref_1
  article-title: A novel image encryption algorithm based on DNA strand exchange and diffusion
  publication-title: Appl. Math. Comput.
– volume: 11
  start-page: 1289
  year: 2020
  ident: ref_11
  article-title: A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–Tent maps
  publication-title: J. Ambient Intell. Humaniz. Comput.
  doi: 10.1007/s12652-019-01385-0
– volume: 54
  start-page: 10360
  year: 2024
  ident: ref_20
  article-title: Chaotic image encryption based on partial face recognition and DNA diffusion
  publication-title: Appl. Intell.
  doi: 10.1007/s10489-024-05613-9
– volume: 20
  start-page: 35
  year: 2023
  ident: ref_38
  article-title: Real-time image encryption algorithm based on combined chaotic map and optimized lifting wavelet transform
  publication-title: J. Real-Time Image Process.
  doi: 10.1007/s11554-023-01294-8
– volume: 131
  start-page: 106366
  year: 2020
  ident: ref_16
  article-title: A novel chaotic image encryption algorithm based on extended Zigzag confusion and RNA operation
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2020.106366
– ident: ref_31
  doi: 10.3390/fractalfract7040287
– volume: 119
  start-page: 105581
  year: 2019
  ident: ref_17
  article-title: An image encryption algorithm based on ZigZag transform and LL compound chaotic system
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2019.105581
– volume: 261
  start-page: 125328
  year: 2025
  ident: ref_9
  article-title: A new 2D cross hyperchaotic Sine-modulation-Logistic map and its application in bit-level image encryption
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2024.125328
– volume: 31
  start-page: 2150021
  year: 2021
  ident: ref_48
  article-title: A plaintext-related image encryption algorithm based on compressive sensing and a novel hyperchaotic system
  publication-title: Int. J. Bifurc. Chaos
  doi: 10.1142/S0218127421500218
– volume: 463
  start-page: 134162
  year: 2024
  ident: ref_49
  article-title: Drive–response asymptotic shape synchronization for a class of two-dimensional chaotic systems and its application in image encryption
  publication-title: Phys. D Nonlinear Phenom.
  doi: 10.1016/j.physd.2024.134162
– volume: 547
  start-page: 307
  year: 2021
  ident: ref_39
  article-title: A new unified image encryption algorithm based on a lifting transformation and chaos
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2020.07.058
– volume: 34
  start-page: 9250
  year: 2024
  ident: ref_13
  article-title: Medical Image Encryption Based on Josephus Scrambling and Dynamic Cross-Diffusion for Patient Privacy Security
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2024.3394951
– volume: 546
  start-page: 1063
  year: 2021
  ident: ref_28
  article-title: Cross-plane colour image encryption using a two-dimensional logistic tent modular map
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2020.09.032
– volume: 264
  start-page: 125854
  year: 2025
  ident: ref_23
  article-title: Secure medical image encryption scheme for Healthcare IoT using novel hyperchaotic map and DNA cubes
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2024.125854
– volume: 9
  start-page: 145459
  year: 2021
  ident: ref_27
  article-title: Cryptanalysis and improvement of the image encryption scheme based on Feistel network and dynamic DNA encoding
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3123571
– volume: 119
  start-page: 105661
  year: 2019
  ident: ref_50
  article-title: Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2019.105661
– volume: 185
  start-page: 115146
  year: 2024
  ident: ref_46
  article-title: Unmanned ship image encryption method based on a new four-wing three-dimensional chaotic system and compressed sensing
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2024.115146
– volume: 45
  start-page: 117
  year: 2019
  ident: ref_12
  article-title: A secure image encryption scheme based on cellular automata and chaotic skew tent map
  publication-title: J. Inf. Secur. Appl.
– volume: 99
  start-page: 055204
  year: 2024
  ident: ref_55
  article-title: An image encryption scheme based on the four-dimensional chaotic system and the Mealy finite state machine
  publication-title: Phys. Scr.
  doi: 10.1088/1402-4896/ad3487
– volume: 246
  start-page: 123190
  year: 2024
  ident: ref_35
  article-title: Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2024.123190
– volume: 17
  start-page: 3510
  year: 2023
  ident: ref_21
  article-title: An image encryption algorithm based on cascade chaotic map and DNA coding
  publication-title: IET Image Process.
  doi: 10.1049/ipr2.12882
– volume: 111
  start-page: 6839
  year: 2023
  ident: ref_33
  article-title: Fast image encryption algorithm based on 2D-FCSM and pseudo-wavelet transform
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-022-08185-w
– ident: ref_40
  doi: 10.3390/math11030767
– volume: 160
  start-page: 109033
  year: 2023
  ident: ref_51
  article-title: A new one-dimensional chaotic map for image encryption scheme based on random DNA coding
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2022.109033
– volume: 31
  start-page: 110503
  year: 2022
  ident: ref_54
  article-title: An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree
  publication-title: Chin. Phys. B
  doi: 10.1088/1674-1056/ac6861
– volume: 609
  start-page: 1451
  year: 2022
  ident: ref_5
  article-title: Digital image steganography: A literature survey
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.07.120
– ident: ref_32
  doi: 10.3390/e22020180
SSID ssj0023216
Score 2.378276
Snippet As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image...
SourceID doaj
unpaywall
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
StartPage 796
SubjectTerms Algorithms
chaotic map
chaotic performance evaluation
Computer systems
Data encryption
Design
DNA
DNA coding
DNA sequencing
Efficiency
Encryption
Gene sequencing
image encryption
Image reconstruction
Investment analysis
Medical imaging
Medical imaging equipment
Nucleotide sequencing
Performance evaluation
Privacy
pseudo-wavelet transform
Real time
Scrambling (communication)
Security
Wavelet transforms
Zigzag transform
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bb9MwFLZG9wAvCMQtMJC5SDxFqy9x7AeE2q3TQFpBaJP2Fjm2s03qktK1mvbvOSc3GhAoT7GdxD4-V8f-DiEfcu9yzVgRg7FWsVRSxzrgMlxuc6WDKVidteRkro7P5Nfz5HyHzLuzMLitstOJtaL2lcM18n14l8SDnlp9Xv6MMWsU_l3tUmjYNrWC_1RDjN0juxyRsUZkdzqbf__Rh2CCM9XgCwkI9vcDT8FjShGxf8sq1eD9f6voLRv15_7J-5tyae9u7WKxZZyOHpGHrVdJJw0bPCY7oXxCvn25BmVBZ6Vb3dWKgU4WFzCk9eU1nYLx8hSKbEmbdQW4PYUP0RO7hEJPD5tU9fRwPqEHFVq4p-TsaHZ6cBy3-RNiB3HMOnbMsbEVhZB4nzILxhzCI2uCE9B36ZSQptAJNEmZh0jPQrBkAnMqeM5hlp6RUVmV4QVugHLCFUVhEg3TaYBoNhibJ954qYNKIvKuo1-2bGAyMggvkMhZT-SITJGyfQNEtq4LqtVF1gpKlhq4cuiG91Z6kefCBS6scKwoEuNcRD7ivGQof0B8Z9tjBNBPRLLKJuB_pKCJWBqRvUFLkBs3rO5mNmvl9ib7zWURedtX45O4F60M1aZuo7hBXLiIPG8YoR-SHIP-40pHRA9YZDDmYU15dVmjeoMLoRMwWxF533PTv2n58v-9f0UecExUPE5jrvbIaL3ahNfgPa3zN61I_AJpDRid
  priority: 102
  providerName: ProQuest
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLage4AXBuKywEDmIvGUtY4dx35C2U0DaYWHVRpPkW_ZKtqk6tKh8us5TtKoGUJCKE-xTySfnLtz8hmhD9oaLQjJQwjWPGSciVA4vw2nlebCyZzUp5acj_nZhH25jC_bDbebtq0SSvFp7aT9V5uQ0dFoCAW6GCaSDxc2_3Tb7iR5kEkuGdjJfbTDY8jFB2hnMv6Wfq8_cbbPNnBCFGr7oYsSSJASD9C_FYRqrP4_PfJWSLrbLvlgVSzU-qeazbZi0ekuyjZcNC0oPw5WlT4wv-4APP4_m4_RozZNxWmjV0_QPVc8RV8_z8H74JPCLNe1p8Hp7KpcTqvrOT6EaGgxDKkCNxsVcHsBrOBztYBBi4_XhZpPDT4ep_io9CHzGZqcnlwcnYXtgQyhgcKoCg0xZKRoTpm_T4iC7ADqLSWdofB2mOGUyVzEQJIQC6WjgupLOmK4s1EEYn-OBkVZuD3fUWWoyfNcxgL0Q4JYlJNKx1ZaJhyPA_RuI6Fs0eBuZFCveDFmnRgDdOhl1xF4qOx6oFxeZa3lZYmES8MyrFXMUq2pcRFV1JA8j6UxAfroJZ95gwbxGtX-lwDr9NBYWQoJTQKujSQB2u9RgiGa_vRGd7LWEdxkYALM_58sYLFvu2n_pG9uK1y5qml4JD3QXIBeNKrWsQRiT6BMFgESPSXs8dyfKabXNUw45CQihjgYoPedvv79Xb78J6pX6GHkD0AeJWHE99GgWq7ca8jKKv2mNb3fB3wvuA
  priority: 102
  providerName: Unpaywall
Title Image Encryption Algorithm Based on an Improved Tent Map and Dynamic DNA Coding
URI https://www.ncbi.nlm.nih.gov/pubmed/40870268
https://www.proquest.com/docview/3244012086
https://www.proquest.com/docview/3246298595
https://pubmed.ncbi.nlm.nih.gov/PMC12385467
https://www.mdpi.com/1099-4300/27/8/796/pdf?version=1753694088
https://doaj.org/article/79797b69edda4d3bb3ce23a3c1ff59cc
UnpaywallVersion publishedVersion
Volume 27
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVFSB
  databaseName: Free Full-Text Journals in Chemistry
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: HH5
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: http://abc-chemistry.org/
  providerName: ABC ChemistRy
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: KQ8
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: DOA
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVEBS
  databaseName: EBSCOhost Academic Search Ultimate
  customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: ABDBF
  dateStart: 20081201
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn
  providerName: EBSCOhost
– providerCode: PRVFQY
  databaseName: GFMER Free Medical Journals
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: GX1
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php
  providerName: Geneva Foundation for Medical Education and Research
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: M~E
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVAQN
  databaseName: PubMed Central
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: RPM
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/
  providerName: National Library of Medicine
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: BENPR
  dateStart: 19990301
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: 8FG
  dateStart: 19990301
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1ba9swFBZb97C9jJXdvHVBu8CeTKOLZenRaZN2g2ZlNJA9CVmXdZA6oUsY_fc7sh0Tt4y-jEDAkkLk70jnnM_I30HoU-lsKQkJKQRrkXLBZSp9fAxXmlJIrwKpq5acTcXpjH-dZ_OdUl_xTFgjD9wAd5gr-JRCeecMd6wsmfWUGWZJCJmyNnrfoVRbMtVSLUaJaHSEGJD6Q09zyIzyqMy_E31qkf67rngnFt0-J_l4U63MzR-zWOwEockz9LTNHnHRzHofPfDVc_TtyxU4BTyu7PVN7QBwsfi5BNJ_eYVHEKQchiZT4eb5AVxewB_hM7OCRoePm5L0-Hha4KNljGQv0Gwyvjg6Tds6CakFvrJOLbFkaFhgPF7nxEDQBhpklLcM5s6tYFwFmcGQnDhgdAZIkfLECu8oBWu8RHvVsvKv40Eny2wIQWUSzKYANOOVKTOnHJdeZAn6sMVPrxo5DA00IoKsO5ATNIrIdgOignXdAHbVrV31fXZN0OdoFx33GYBvTfu6AMwzKlbpAvKMHDwOyRN00BsJ-8P2u7eW1e3-_K1hZfL42rCEyb7vuuMv45mzyi839RhBVdR_S9CrZiF0t8SH4OeokAmSvSXSu-d-T_XrslbvhlRBZhCeEvSxW03_xvLN_8DyLXpCY9niYZ5ScYD21tcb_w5yqXU5QA_l5GSAHo3G0_Pvg3oTwffJnEDbbHpe_PgLmlkhgw
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9owFLa69qF7mTrtlq3dvJv2FBVf4tgP1QSFCtbCpolKfUsd22krQcIoqOLP7bftOIQMNm1vFU-xD8H-fK7GPgehD6k1qSQkC8FYi5ALLkPp_DZcqlMhncpIWbWkPxDdc_7lIrrYQj9Xd2H8scqVTiwVtS2M3yM_hHdxf9FTis-TH6GvGuX_XV2V0NBVaQV7VKYYqy52nLrFHYRwt0e9Nqz3R0pPOsPjblhVGQgNePuz0BBDGppljPvnmGgweRBEaOUMs8ZxIxhXmYyAJCYW4iENIYVyxAhnKYW5wHsfoB0OVBD87bQ6g2_f65CPUSKW-YwYU41DR2Pw0GJfIWDNCpbFAv42CWs28c_zmrvzfKIXd3o0WjOGJ3voUeXF4uaS7R6jLZc_QV97Y1BOuJOb6aJURLg5ugIIZ9dj3AJjaTE06Rwv9zHgcQg_hPt6Ao0Wtxe5Ht8Y3B408XHhLepTdH4vSD5D23mRuxf-wJVhJssyFUlgHwWgaad0GllluXQiCtC7FX7JZJmWI4FwxoOc1CAHqOWRrQl8Ju2yoZheJZVgJrGCTwrDsFZzy9KUGUeZZoZkWaSMCdAnvy6Jl3cA3-jq2gKM02fOSprg78Sg-UgcoP0NSpBTs9m9Wtmk0hO3yW-uDtDbutt_0599y10xL2kEVT4PXYCeLxmhnhJvgL6lQgZIbrDIxpw3e_Kb6zKLOLgsMgIzGaD3NTf9G8uX_x_9G7TbHfbPkrPe4PQVekh9keRGHFKxj7Zn07k7AM9tlr6uxAOjy_uWyF8q_lUV
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwELfGkIAXBOIrMMB8iaeotZ049gNC3bqyMlZ42KS9Bcd2tkltUrpWU_81_jrukjS0IHib-hTbTe3z3f3u3PMdIW8zZzPFWB4CWMswkpEKlcdjuMxkUnmds6pqydFIHpxEn0_j0y3yc3UXBsMqVzqxUtSutHhG3oF3RXjRU8lO3oRFfOsPPk5_hFhBCv9pXZXTqFnk0C-vwH27_DDsw16_43ywf7x3EDYVBkILlv48tMyyrhG5iPA5YQbgDhwIo70VzvrIShHpXMUwJGEOfCED7oT2zErvOId1wHtvkJsJZnHHW-qDT62zJziTdSYjIXS343kCtlmCtQHW8K8qE_A3GKyh4Z-RmrcXxdQsr8x4vAaDg3vkbmO_0l7NcPfJli8ekK_DCaglul_Y2bJSQbQ3PgOCzc8ndBdg0lFoMgWtTzDg8Rh-iB6ZKTQ62l8WZnJhaX_Uo3slYulDcnItdHxEtouy8E8w1MoKm-e5jhUwjgaiGa9NFjvtIuVlHJDXK_ql0zohRwqODBI5bYkckF2kbDsAc2hXDeXsLG1EMk00fDKYhnMmciLLhPVcGGFZnsfa2oC8x31JUdKB-NY0FxZgnpgzK-2BpZOAzmNJQHY2RoKE2s3u1c6mjYa4TH_zc0Betd34TYx6K3y5qMZIrjEDXUAe14zQLinqgqblUgVEbbDIxpo3e4qL8yp_OBgrKgaADMiblpv-Tcun_5_9S3IL5DD9MhwdPiN3OFZH7iYhlztkez5b-Odgss2zF5VsUPL9uoXxF9TKUq8
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLage4AXBuKywEDmIvGUtY4dx35C2U0DaYWHVRpPkW_ZKtqk6tKh8us5TtKoGUJCKE-xTySfnLtz8hmhD9oaLQjJQwjWPGSciVA4vw2nlebCyZzUp5acj_nZhH25jC_bDbebtq0SSvFp7aT9V5uQ0dFoCAW6GCaSDxc2_3Tb7iR5kEkuGdjJfbTDY8jFB2hnMv6Wfq8_cbbPNnBCFGr7oYsSSJASD9C_FYRqrP4_PfJWSLrbLvlgVSzU-qeazbZi0ekuyjZcNC0oPw5WlT4wv-4APP4_m4_RozZNxWmjV0_QPVc8RV8_z8H74JPCLNe1p8Hp7KpcTqvrOT6EaGgxDKkCNxsVcHsBrOBztYBBi4_XhZpPDT4ep_io9CHzGZqcnlwcnYXtgQyhgcKoCg0xZKRoTpm_T4iC7ADqLSWdofB2mOGUyVzEQJIQC6WjgupLOmK4s1EEYn-OBkVZuD3fUWWoyfNcxgL0Q4JYlJNKx1ZaJhyPA_RuI6Fs0eBuZFCveDFmnRgDdOhl1xF4qOx6oFxeZa3lZYmES8MyrFXMUq2pcRFV1JA8j6UxAfroJZ95gwbxGtX-lwDr9NBYWQoJTQKujSQB2u9RgiGa_vRGd7LWEdxkYALM_58sYLFvu2n_pG9uK1y5qml4JD3QXIBeNKrWsQRiT6BMFgESPSXs8dyfKabXNUw45CQihjgYoPedvv79Xb78J6pX6GHkD0AeJWHE99GgWq7ca8jKKv2mNb3fB3wvuA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+Encryption+Algorithm+Based+on+an+Improved+Tent+Map+and+Dynamic+DNA+Coding&rft.jtitle=Entropy+%28Basel%2C+Switzerland%29&rft.au=Wei+Zhou&rft.au=Xianwei+Li&rft.au=Zhenghua+Xin&rft.date=2025-07-26&rft.pub=MDPI+AG&rft.eissn=1099-4300&rft.volume=27&rft.issue=8&rft.spage=796&rft_id=info:doi/10.3390%2Fe27080796&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_79797b69edda4d3bb3ce23a3c1ff59cc
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1099-4300&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1099-4300&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1099-4300&client=summon