Image Encryption Algorithm Based on an Improved Tent Map and Dynamic DNA Coding
As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-t...
Saved in:
| Published in | Entropy (Basel, Switzerland) Vol. 27; no. 8; p. 796 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
Switzerland
MDPI AG
26.07.2025
MDPI |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1099-4300 1099-4300 |
| DOI | 10.3390/e27080796 |
Cover
| Abstract | As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, we proposes a new IEA that integrates an improved chaotic map (Tent map), an improved Zigzag transform, and dynamic DNA coding. Firstly, a pseudo-wavelet transform (PWT) is applied to plain images to produce four sub-images I1, I2, I3, and I4. Secondly, the improved Zigzag transform and its three variants are used to rearrange the sub-image I1, and then the scrambled sub-image is diffused using XOR operation. Thirdly, an inverse pseudo-wavelet transform (IPWT) is employed on the four sub-images to reconstruct the image, and then the reconstructed image is encoded into a DNA sequence utilizing dynamic DNA encoding. Finally, the DNA sequence is scrambled and diffused employing DNA-level index scrambling and dynamic DNA operations. The experimental results and performance evaluations, including chaotic performance evaluation and comprehensive security analysis, demonstrate that our IEA achieves high key sensitivity, low correlation, excellent entropy, and strong resistance to common attacks. This highlights its potential for deployment in real-time, high-security image cryptosystems, especially in fields such as medical image security and social media privacy. |
|---|---|
| AbstractList | As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, we proposes a new IEA that integrates an improved chaotic map (Tent map), an improved Zigzag transform, and dynamic DNA coding. Firstly, a pseudo-wavelet transform (PWT) is applied to plain images to produce four sub-images I1, I2, I3, and I4. Secondly, the improved Zigzag transform and its three variants are used to rearrange the sub-image I1, and then the scrambled sub-image is diffused using XOR operation. Thirdly, an inverse pseudo-wavelet transform (IPWT) is employed on the four sub-images to reconstruct the image, and then the reconstructed image is encoded into a DNA sequence utilizing dynamic DNA encoding. Finally, the DNA sequence is scrambled and diffused employing DNA-level index scrambling and dynamic DNA operations. The experimental results and performance evaluations, including chaotic performance evaluation and comprehensive security analysis, demonstrate that our IEA achieves high key sensitivity, low correlation, excellent entropy, and strong resistance to common attacks. This highlights its potential for deployment in real-time, high-security image cryptosystems, especially in fields such as medical image security and social media privacy. As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, we proposes a new IEA that integrates an improved chaotic map (Tent map), an improved Zigzag transform, and dynamic DNA coding. Firstly, a pseudo-wavelet transform (PWT) is applied to plain images to produce four sub-images I1, I2, I3, and I4. Secondly, the improved Zigzag transform and its three variants are used to rearrange the sub-image I1, and then the scrambled sub-image is diffused using XOR operation. Thirdly, an inverse pseudo-wavelet transform (IPWT) is employed on the four sub-images to reconstruct the image, and then the reconstructed image is encoded into a DNA sequence utilizing dynamic DNA encoding. Finally, the DNA sequence is scrambled and diffused employing DNA-level index scrambling and dynamic DNA operations. The experimental results and performance evaluations, including chaotic performance evaluation and comprehensive security analysis, demonstrate that our IEA achieves high key sensitivity, low correlation, excellent entropy, and strong resistance to common attacks. This highlights its potential for deployment in real-time, high-security image cryptosystems, especially in fields such as medical image security and social media privacy.As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, we proposes a new IEA that integrates an improved chaotic map (Tent map), an improved Zigzag transform, and dynamic DNA coding. Firstly, a pseudo-wavelet transform (PWT) is applied to plain images to produce four sub-images I1, I2, I3, and I4. Secondly, the improved Zigzag transform and its three variants are used to rearrange the sub-image I1, and then the scrambled sub-image is diffused using XOR operation. Thirdly, an inverse pseudo-wavelet transform (IPWT) is employed on the four sub-images to reconstruct the image, and then the reconstructed image is encoded into a DNA sequence utilizing dynamic DNA encoding. Finally, the DNA sequence is scrambled and diffused employing DNA-level index scrambling and dynamic DNA operations. The experimental results and performance evaluations, including chaotic performance evaluation and comprehensive security analysis, demonstrate that our IEA achieves high key sensitivity, low correlation, excellent entropy, and strong resistance to common attacks. This highlights its potential for deployment in real-time, high-security image cryptosystems, especially in fields such as medical image security and social media privacy. As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, we proposes a new IEA that integrates an improved chaotic map (Tent map), an improved Zigzag transform, and dynamic DNA coding. Firstly, a pseudo-wavelet transform (PWT) is applied to plain images to produce four sub-images I[sub.1], I[sub.2], I[sub.3], and I[sub.4]. Secondly, the improved Zigzag transform and its three variants are used to rearrange the sub-image I[sub.1], and then the scrambled sub-image is diffused using XOR operation. Thirdly, an inverse pseudo-wavelet transform (IPWT) is employed on the four sub-images to reconstruct the image, and then the reconstructed image is encoded into a DNA sequence utilizing dynamic DNA encoding. Finally, the DNA sequence is scrambled and diffused employing DNA-level index scrambling and dynamic DNA operations. The experimental results and performance evaluations, including chaotic performance evaluation and comprehensive security analysis, demonstrate that our IEA achieves high key sensitivity, low correlation, excellent entropy, and strong resistance to common attacks. This highlights its potential for deployment in real-time, high-security image cryptosystems, especially in fields such as medical image security and social media privacy. |
| Audience | Academic |
| Author | Zhou, Wei Li, Xianwei Xin, Zhenghua |
| AuthorAffiliation | 1 School of Information Engineering, Suzhou University, Suzhou 234000, China; weizhou@ahszu.edu.cn (W.Z.) 2 School of Computer and Information Engineering, Bengbu University, Bengbu 233000, China |
| AuthorAffiliation_xml | – name: 2 School of Computer and Information Engineering, Bengbu University, Bengbu 233000, China – name: 1 School of Information Engineering, Suzhou University, Suzhou 234000, China; weizhou@ahszu.edu.cn (W.Z.) |
| Author_xml | – sequence: 1 givenname: Wei orcidid: 0000-0001-5956-0684 surname: Zhou fullname: Zhou, Wei – sequence: 2 givenname: Xianwei orcidid: 0000-0002-6295-6089 surname: Li fullname: Li, Xianwei – sequence: 3 givenname: Zhenghua surname: Xin fullname: Xin, Zhenghua |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/40870268$$D View this record in MEDLINE/PubMed |
| BookMark | eNp9kk1v1DAQhi1URD_gwB9AkbgA0hZ_xbFPaNkWWKnQSzlbs7aTepXYqZMt2n-Pw5alixDywZ7Xz7z2jH2KjkIMDqGXBJ8zpvB7RysscaXEE3RCsFIzzjA-erQ-RqfDsMaYMkrEM3TMsawwFfIEXS87aFxxGUza9qOPoZi3TUx-vO2KjzA4W2QJQrHs-hTvc3jjwlh8hT6LtrjYBui8KS6-zYtFtD40z9HTGtrBvXiYz9D3T5c3iy-zq-vPy8X8ama4UuPMEEMwsJrxKa4ISEIrIkA5w6xx3AjGVS3LjFTESo5BlUI5YoSzlNaEnaHlztdGWOs--Q7SVkfw-pcQU6Mhjd60Tlcqj1XOtha4ZasVM44yYIbUdamMyV7vdl6b0MP2B7Tt3pBgPXVY7zuc4Q87uN-sOpfvGsYE7cENDneCv9VNvNeEMllyUWWHNw8OKd5t3DDqzg_GtS0EFzeDZpQLqmSpyoy-_gtdx00KubETxTGhWIo_VAO5XB_qmA82k6mey5JVmFMyHXv-DyoP6_IT5g9V-6wfJLx6XOm-xN-fJwNvd4BJcRiSq__Ttp_geM-E |
| Cites_doi | 10.1109/ACCESS.2021.3108789 10.1007/s00521-017-3199-x 10.1016/j.bspc.2024.107174 10.1007/s11071-015-2330-8 10.1016/j.chaos.2021.110962 10.1007/s11071-021-06941-y 10.1016/j.optlaseng.2021.106881 10.3390/fractalfract9070426 10.1007/s11071-020-05625-3 10.3390/app13127113 10.1016/j.bspc.2023.105877 10.1016/j.jksuci.2023.101858 10.3390/math12243917 10.1016/j.ins.2021.04.013 10.1016/j.chaos.2024.114800 10.1007/s00371-023-03219-9 10.1016/j.optlaseng.2015.03.022 10.3390/math12203297 10.1016/j.ins.2014.02.156 10.1109/ACCESS.2019.2893760 10.1016/j.chaos.2023.113492 10.1088/1402-4896/ad7330 10.1016/j.jvcir.2021.103424 10.1007/s12652-019-01385-0 10.1007/s10489-024-05613-9 10.1007/s11554-023-01294-8 10.1016/j.optlastec.2020.106366 10.3390/fractalfract7040287 10.1016/j.optlastec.2019.105581 10.1016/j.eswa.2024.125328 10.1142/S0218127421500218 10.1016/j.physd.2024.134162 10.1016/j.ins.2020.07.058 10.1109/TCSVT.2024.3394951 10.1016/j.ins.2020.09.032 10.1016/j.eswa.2024.125854 10.1109/ACCESS.2021.3123571 10.1016/j.optlastec.2019.105661 10.1016/j.chaos.2024.115146 10.1088/1402-4896/ad3487 10.1016/j.eswa.2024.123190 10.1049/ipr2.12882 10.1007/s11071-022-08185-w 10.3390/math11030767 10.1016/j.optlastec.2022.109033 10.1088/1674-1056/ac6861 10.1016/j.ins.2022.07.120 10.3390/e22020180 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2025 MDPI AG 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2025 by the authors. 2025 |
| Copyright_xml | – notice: COPYRIGHT 2025 MDPI AG – notice: 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2025 by the authors. 2025 |
| DBID | AAYXX CITATION NPM 7TB 8FD 8FE 8FG ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU DWQXO FR3 HCIFZ KR7 L6V M7S PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PTHSS 7X8 5PM ADTOC UNPAY DOA |
| DOI | 10.3390/e27080796 |
| DatabaseName | CrossRef PubMed Mechanical & Transportation Engineering Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Engineering Research Database SciTech Premium Collection Civil Engineering Abstracts ProQuest Engineering Collection Engineering Database ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition Engineering Collection MEDLINE - Academic PubMed Central (Full Participant titles) Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database Technology Collection Technology Research Database ProQuest One Academic Middle East (New) Mechanical & Transportation Engineering Abstracts ProQuest Central Essentials ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Civil Engineering Abstracts Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest One Academic UKI Edition Materials Science & Engineering Collection Engineering Research Database ProQuest One Academic ProQuest One Academic (New) MEDLINE - Academic |
| DatabaseTitleList | CrossRef Publicly Available Content Database PubMed MEDLINE - Academic |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 4 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 1099-4300 |
| ExternalDocumentID | oai_doaj_org_article_79797b69edda4d3bb3ce23a3c1ff59cc 10.3390/e27080796 PMC12385467 A853704217 40870268 10_3390_e27080796 |
| Genre | Journal Article |
| GrantInformation_xml | – fundername: Anhui Provincial Federation of Social Sciences Project grantid: 2023CX154 – fundername: Anhui Provincial Scientific Research Project grantid: 2022AH051376 – fundername: Quality Engineering Project grantid: szxy2023jyjf82 |
| GroupedDBID | 29G 2WC 5GY 5VS 8FE 8FG AADQD AAFWJ AAYXX ABDBF ABJCF ACIWK ACUHS ADBBV AEGXH AENEX AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS BCNDV BENPR BGLVJ CCPQU CITATION CS3 DU5 E3Z ESX F5P GROUPED_DOAJ GX1 HCIFZ HH5 IAO ITC J9A KQ8 L6V M7S MODMG M~E OK1 OVT PGMZT PHGZM PHGZT PIMPY PQGLB PROAC PTHSS RNS RPM TR2 TUS XSB ~8M NPM PUEGO 7TB 8FD ABUWG AZQEC DWQXO FR3 KR7 PKEHL PQEST PQQKQ PQUKI 7X8 5PM ADTOC C1A CH8 IPNFZ RIG UNPAY |
| ID | FETCH-LOGICAL-c499t-c1c10a3f34c49971a812716a9ec3dce4c6349f85a3f71d840a9569e1c6ed22f13 |
| IEDL.DBID | DOA |
| ISSN | 1099-4300 |
| IngestDate | Tue Oct 14 19:08:42 EDT 2025 Sun Oct 26 04:01:58 EDT 2025 Tue Sep 30 17:01:13 EDT 2025 Thu Sep 04 12:31:05 EDT 2025 Wed Aug 27 14:44:57 EDT 2025 Mon Oct 20 22:39:39 EDT 2025 Mon Oct 20 16:50:55 EDT 2025 Tue Sep 16 01:42:38 EDT 2025 Thu Oct 16 04:43:21 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 8 |
| Keywords | chaotic performance evaluation security analysis Zigzag transform pseudo-wavelet transform DNA coding image encryption chaotic map |
| Language | English |
| License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c499t-c1c10a3f34c49971a812716a9ec3dce4c6349f85a3f71d840a9569e1c6ed22f13 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0001-5956-0684 0000-0002-6295-6089 |
| OpenAccessLink | https://doaj.org/article/79797b69edda4d3bb3ce23a3c1ff59cc |
| PMID | 40870268 |
| PQID | 3244012086 |
| PQPubID | 2032401 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_79797b69edda4d3bb3ce23a3c1ff59cc unpaywall_primary_10_3390_e27080796 pubmedcentral_primary_oai_pubmedcentral_nih_gov_12385467 proquest_miscellaneous_3246298595 proquest_journals_3244012086 gale_infotracmisc_A853704217 gale_infotracacademiconefile_A853704217 pubmed_primary_40870268 crossref_primary_10_3390_e27080796 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-07-26 |
| PublicationDateYYYYMMDD | 2025-07-26 |
| PublicationDate_xml | – month: 07 year: 2025 text: 2025-07-26 day: 26 |
| PublicationDecade | 2020 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Basel |
| PublicationTitle | Entropy (Basel, Switzerland) |
| PublicationTitleAlternate | Entropy (Basel) |
| PublicationYear | 2025 |
| Publisher | MDPI AG MDPI |
| Publisher_xml | – name: MDPI AG – name: MDPI |
| References | Li (ref_37) 2024; 182 Naskar (ref_8) 2020; 100 Su (ref_54) 2022; 31 Duan (ref_30) 2022; 150 Wang (ref_41) 2015; 73 Wang (ref_14) 2021; 147 Wang (ref_17) 2019; 119 ref_18 Zhang (ref_22) 2023; 35 Chen (ref_25) 2022; 83 Yang (ref_50) 2019; 119 Chen (ref_52) 2023; 98 Zhang (ref_33) 2023; 111 Feng (ref_35) 2024; 246 Wang (ref_2) 2021; 569 Zhang (ref_55) 2024; 99 Singh (ref_4) 2022; 18 Mandal (ref_5) 2022; 609 Alawida (ref_19) 2024; 83 ref_24 Yan (ref_46) 2024; 185 Hua (ref_15) 2021; 106 Yu (ref_47) 2024; 40 Zhang (ref_6) 2014; 273 Mao (ref_38) 2023; 20 Wang (ref_16) 2020; 131 Wang (ref_36) 2022; 70 Wang (ref_42) 2016; 83 Zou (ref_1) 2022; 430 Sneha (ref_11) 2020; 11 Liang (ref_51) 2023; 160 Ghebleh (ref_10) 2019; 31 Teng (ref_20) 2024; 54 Feng (ref_26) 2019; 7 Lai (ref_23) 2025; 264 ref_34 Wang (ref_53) 2021; 9 ref_32 ref_31 Mondal (ref_12) 2019; 45 Wang (ref_9) 2025; 261 Hua (ref_28) 2021; 546 ref_43 Zheng (ref_21) 2023; 17 Wang (ref_48) 2021; 31 ref_40 Zhang (ref_39) 2021; 547 ref_3 Wu (ref_45) 2023; 172 Zhang (ref_13) 2024; 34 Feng (ref_27) 2021; 9 Belazi (ref_29) 2022; 66 Huang (ref_49) 2024; 463 Yan (ref_44) 2024; 99 ref_7 |
| References_xml | – volume: 9 start-page: 120596 year: 2021 ident: ref_53 article-title: A new image encryption algorithm based on single S-Box and dynamic encryption step publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3108789 – volume: 31 start-page: 2415 year: 2019 ident: ref_10 article-title: A novel efficient image encryption scheme based on chained skew tent maps publication-title: Neural Comput. Appl. doi: 10.1007/s00521-017-3199-x – ident: ref_24 doi: 10.1016/j.bspc.2024.107174 – volume: 83 start-page: 333 year: 2016 ident: ref_42 article-title: A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems publication-title: Nonlinear Dyn. doi: 10.1007/s11071-015-2330-8 – volume: 147 start-page: 110962 year: 2021 ident: ref_14 article-title: An image encryption algorithm based on dynamic row scrambling and Zigzag transformation publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2021.110962 – volume: 106 start-page: 3583 year: 2021 ident: ref_15 article-title: Image encryption using value-differencing transformation and modified ZigZag transformation publication-title: Nonlinear Dyn. doi: 10.1007/s11071-021-06941-y – volume: 150 start-page: 106881 year: 2022 ident: ref_30 article-title: New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2021.106881 – ident: ref_3 doi: 10.3390/fractalfract9070426 – volume: 100 start-page: 2877 year: 2020 ident: ref_8 article-title: A robust image encryption scheme using chaotic tent map and cellular automata publication-title: Nonlinear Dyn. doi: 10.1007/s11071-020-05625-3 – ident: ref_43 doi: 10.3390/app13127113 – ident: ref_7 doi: 10.1016/j.bspc.2023.105877 – volume: 35 start-page: 101858 year: 2023 ident: ref_22 article-title: DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane publication-title: J. King Saud Univ. Comput. Inf. Sci. doi: 10.1016/j.jksuci.2023.101858 – ident: ref_34 doi: 10.3390/math12243917 – volume: 569 start-page: 217 year: 2021 ident: ref_2 article-title: A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient publication-title: Inf. Sci. doi: 10.1016/j.ins.2021.04.013 – volume: 182 start-page: 114800 year: 2024 ident: ref_37 article-title: A joint image encryption based on a memristive Rulkov neuron with controllable multistability and compressive sensing publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2024.114800 – volume: 40 start-page: 8001 year: 2024 ident: ref_47 article-title: Image encryption algorithm based on DNA network and hyperchaotic system publication-title: Vis. Comput. doi: 10.1007/s00371-023-03219-9 – volume: 98 start-page: 035227 year: 2023 ident: ref_52 article-title: Selective region medical image encryption algorithm based on cascade chaos and two-dimensional Joseph traversal publication-title: Phys. Scr. – volume: 73 start-page: 53 year: 2015 ident: ref_41 article-title: A novel chaotic image encryption scheme using DNA sequence operations publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2015.03.022 – ident: ref_18 doi: 10.3390/math12203297 – volume: 273 start-page: 329 year: 2014 ident: ref_6 article-title: A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice publication-title: Inf. Sci. doi: 10.1016/j.ins.2014.02.156 – volume: 7 start-page: 12584 year: 2019 ident: ref_26 article-title: Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2893760 – volume: 172 start-page: 113492 year: 2023 ident: ref_45 article-title: A novel image compression and encryption scheme based on conservative chaotic system and DNA method publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2023.113492 – volume: 70 start-page: 103340 year: 2022 ident: ref_36 article-title: Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding publication-title: J. Inf. Secur. Appl. – volume: 99 start-page: 105215 year: 2024 ident: ref_44 article-title: A novel plaintext-related dynamic DNA image encryption algorithm based on a 4D conservative chaotic system publication-title: Phys. Scr. doi: 10.1088/1402-4896/ad7330 – volume: 83 start-page: 103424 year: 2022 ident: ref_25 article-title: Security measurement of a medical communication scheme based on chaos and DNA coding publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2021.103424 – volume: 18 start-page: 1 year: 2022 ident: ref_4 article-title: Towards integrating image encryption with compression: A survey publication-title: ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) – volume: 83 start-page: 103791 year: 2024 ident: ref_19 article-title: A novel DNA tree-based chaotic image encryption algorithm publication-title: J. Inf. Secur. Appl. – volume: 66 start-page: 103131 year: 2022 ident: ref_29 article-title: Improved Sine-Tangent chaotic map with application in medical images encryption publication-title: J. Inf. Secur. Appl. – volume: 430 start-page: 127291 year: 2022 ident: ref_1 article-title: A novel image encryption algorithm based on DNA strand exchange and diffusion publication-title: Appl. Math. Comput. – volume: 11 start-page: 1289 year: 2020 ident: ref_11 article-title: A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–Tent maps publication-title: J. Ambient Intell. Humaniz. Comput. doi: 10.1007/s12652-019-01385-0 – volume: 54 start-page: 10360 year: 2024 ident: ref_20 article-title: Chaotic image encryption based on partial face recognition and DNA diffusion publication-title: Appl. Intell. doi: 10.1007/s10489-024-05613-9 – volume: 20 start-page: 35 year: 2023 ident: ref_38 article-title: Real-time image encryption algorithm based on combined chaotic map and optimized lifting wavelet transform publication-title: J. Real-Time Image Process. doi: 10.1007/s11554-023-01294-8 – volume: 131 start-page: 106366 year: 2020 ident: ref_16 article-title: A novel chaotic image encryption algorithm based on extended Zigzag confusion and RNA operation publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2020.106366 – ident: ref_31 doi: 10.3390/fractalfract7040287 – volume: 119 start-page: 105581 year: 2019 ident: ref_17 article-title: An image encryption algorithm based on ZigZag transform and LL compound chaotic system publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2019.105581 – volume: 261 start-page: 125328 year: 2025 ident: ref_9 article-title: A new 2D cross hyperchaotic Sine-modulation-Logistic map and its application in bit-level image encryption publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2024.125328 – volume: 31 start-page: 2150021 year: 2021 ident: ref_48 article-title: A plaintext-related image encryption algorithm based on compressive sensing and a novel hyperchaotic system publication-title: Int. J. Bifurc. Chaos doi: 10.1142/S0218127421500218 – volume: 463 start-page: 134162 year: 2024 ident: ref_49 article-title: Drive–response asymptotic shape synchronization for a class of two-dimensional chaotic systems and its application in image encryption publication-title: Phys. D Nonlinear Phenom. doi: 10.1016/j.physd.2024.134162 – volume: 547 start-page: 307 year: 2021 ident: ref_39 article-title: A new unified image encryption algorithm based on a lifting transformation and chaos publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.07.058 – volume: 34 start-page: 9250 year: 2024 ident: ref_13 article-title: Medical Image Encryption Based on Josephus Scrambling and Dynamic Cross-Diffusion for Patient Privacy Security publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2024.3394951 – volume: 546 start-page: 1063 year: 2021 ident: ref_28 article-title: Cross-plane colour image encryption using a two-dimensional logistic tent modular map publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.09.032 – volume: 264 start-page: 125854 year: 2025 ident: ref_23 article-title: Secure medical image encryption scheme for Healthcare IoT using novel hyperchaotic map and DNA cubes publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2024.125854 – volume: 9 start-page: 145459 year: 2021 ident: ref_27 article-title: Cryptanalysis and improvement of the image encryption scheme based on Feistel network and dynamic DNA encoding publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3123571 – volume: 119 start-page: 105661 year: 2019 ident: ref_50 article-title: Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2019.105661 – volume: 185 start-page: 115146 year: 2024 ident: ref_46 article-title: Unmanned ship image encryption method based on a new four-wing three-dimensional chaotic system and compressed sensing publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2024.115146 – volume: 45 start-page: 117 year: 2019 ident: ref_12 article-title: A secure image encryption scheme based on cellular automata and chaotic skew tent map publication-title: J. Inf. Secur. Appl. – volume: 99 start-page: 055204 year: 2024 ident: ref_55 article-title: An image encryption scheme based on the four-dimensional chaotic system and the Mealy finite state machine publication-title: Phys. Scr. doi: 10.1088/1402-4896/ad3487 – volume: 246 start-page: 123190 year: 2024 ident: ref_35 article-title: Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2024.123190 – volume: 17 start-page: 3510 year: 2023 ident: ref_21 article-title: An image encryption algorithm based on cascade chaotic map and DNA coding publication-title: IET Image Process. doi: 10.1049/ipr2.12882 – volume: 111 start-page: 6839 year: 2023 ident: ref_33 article-title: Fast image encryption algorithm based on 2D-FCSM and pseudo-wavelet transform publication-title: Nonlinear Dyn. doi: 10.1007/s11071-022-08185-w – ident: ref_40 doi: 10.3390/math11030767 – volume: 160 start-page: 109033 year: 2023 ident: ref_51 article-title: A new one-dimensional chaotic map for image encryption scheme based on random DNA coding publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2022.109033 – volume: 31 start-page: 110503 year: 2022 ident: ref_54 article-title: An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree publication-title: Chin. Phys. B doi: 10.1088/1674-1056/ac6861 – volume: 609 start-page: 1451 year: 2022 ident: ref_5 article-title: Digital image steganography: A literature survey publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.07.120 – ident: ref_32 doi: 10.3390/e22020180 |
| SSID | ssj0023216 |
| Score | 2.378276 |
| Snippet | As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image... |
| SourceID | doaj unpaywall pubmedcentral proquest gale pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database |
| StartPage | 796 |
| SubjectTerms | Algorithms chaotic map chaotic performance evaluation Computer systems Data encryption Design DNA DNA coding DNA sequencing Efficiency Encryption Gene sequencing image encryption Image reconstruction Investment analysis Medical imaging Medical imaging equipment Nucleotide sequencing Performance evaluation Privacy pseudo-wavelet transform Real time Scrambling (communication) Security Wavelet transforms Zigzag transform |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bb9MwFLZG9wAvCMQtMJC5SDxFqy9x7AeE2q3TQFpBaJP2Fjm2s03qktK1mvbvOSc3GhAoT7GdxD4-V8f-DiEfcu9yzVgRg7FWsVRSxzrgMlxuc6WDKVidteRkro7P5Nfz5HyHzLuzMLitstOJtaL2lcM18n14l8SDnlp9Xv6MMWsU_l3tUmjYNrWC_1RDjN0juxyRsUZkdzqbf__Rh2CCM9XgCwkI9vcDT8FjShGxf8sq1eD9f6voLRv15_7J-5tyae9u7WKxZZyOHpGHrVdJJw0bPCY7oXxCvn25BmVBZ6Vb3dWKgU4WFzCk9eU1nYLx8hSKbEmbdQW4PYUP0RO7hEJPD5tU9fRwPqEHFVq4p-TsaHZ6cBy3-RNiB3HMOnbMsbEVhZB4nzILxhzCI2uCE9B36ZSQptAJNEmZh0jPQrBkAnMqeM5hlp6RUVmV4QVugHLCFUVhEg3TaYBoNhibJ954qYNKIvKuo1-2bGAyMggvkMhZT-SITJGyfQNEtq4LqtVF1gpKlhq4cuiG91Z6kefCBS6scKwoEuNcRD7ivGQof0B8Z9tjBNBPRLLKJuB_pKCJWBqRvUFLkBs3rO5mNmvl9ib7zWURedtX45O4F60M1aZuo7hBXLiIPG8YoR-SHIP-40pHRA9YZDDmYU15dVmjeoMLoRMwWxF533PTv2n58v-9f0UecExUPE5jrvbIaL3ahNfgPa3zN61I_AJpDRid priority: 102 providerName: ProQuest – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLage4AXBuKywEDmIvGUtY4dx35C2U0DaYWHVRpPkW_ZKtqk6tKh8us5TtKoGUJCKE-xTySfnLtz8hmhD9oaLQjJQwjWPGSciVA4vw2nlebCyZzUp5acj_nZhH25jC_bDbebtq0SSvFp7aT9V5uQ0dFoCAW6GCaSDxc2_3Tb7iR5kEkuGdjJfbTDY8jFB2hnMv6Wfq8_cbbPNnBCFGr7oYsSSJASD9C_FYRqrP4_PfJWSLrbLvlgVSzU-qeazbZi0ekuyjZcNC0oPw5WlT4wv-4APP4_m4_RozZNxWmjV0_QPVc8RV8_z8H74JPCLNe1p8Hp7KpcTqvrOT6EaGgxDKkCNxsVcHsBrOBztYBBi4_XhZpPDT4ep_io9CHzGZqcnlwcnYXtgQyhgcKoCg0xZKRoTpm_T4iC7ADqLSWdofB2mOGUyVzEQJIQC6WjgupLOmK4s1EEYn-OBkVZuD3fUWWoyfNcxgL0Q4JYlJNKx1ZaJhyPA_RuI6Fs0eBuZFCveDFmnRgDdOhl1xF4qOx6oFxeZa3lZYmES8MyrFXMUq2pcRFV1JA8j6UxAfroJZ95gwbxGtX-lwDr9NBYWQoJTQKujSQB2u9RgiGa_vRGd7LWEdxkYALM_58sYLFvu2n_pG9uK1y5qml4JD3QXIBeNKrWsQRiT6BMFgESPSXs8dyfKabXNUw45CQihjgYoPedvv79Xb78J6pX6GHkD0AeJWHE99GgWq7ca8jKKv2mNb3fB3wvuA priority: 102 providerName: Unpaywall |
| Title | Image Encryption Algorithm Based on an Improved Tent Map and Dynamic DNA Coding |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/40870268 https://www.proquest.com/docview/3244012086 https://www.proquest.com/docview/3246298595 https://pubmed.ncbi.nlm.nih.gov/PMC12385467 https://www.mdpi.com/1099-4300/27/8/796/pdf?version=1753694088 https://doaj.org/article/79797b69edda4d3bb3ce23a3c1ff59cc |
| UnpaywallVersion | publishedVersion |
| Volume | 27 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVFSB databaseName: Free Full-Text Journals in Chemistry customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: HH5 dateStart: 19990101 isFulltext: true titleUrlDefault: http://abc-chemistry.org/ providerName: ABC ChemistRy – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: KQ8 dateStart: 19990101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: DOA dateStart: 20160101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVEBS databaseName: EBSCOhost Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: ABDBF dateStart: 20081201 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVFQY databaseName: GFMER Free Medical Journals customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: GX1 dateStart: 19990101 isFulltext: true titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php providerName: Geneva Foundation for Medical Education and Research – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: M~E dateStart: 19990101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVAQN databaseName: PubMed Central customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: RPM dateStart: 20180101 isFulltext: true titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/ providerName: National Library of Medicine – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: BENPR dateStart: 19990301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: 8FG dateStart: 19990301 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1ba9swFBZb97C9jJXdvHVBu8CeTKOLZenRaZN2g2ZlNJA9CVmXdZA6oUsY_fc7sh0Tt4y-jEDAkkLk70jnnM_I30HoU-lsKQkJKQRrkXLBZSp9fAxXmlJIrwKpq5acTcXpjH-dZ_OdUl_xTFgjD9wAd5gr-JRCeecMd6wsmfWUGWZJCJmyNnrfoVRbMtVSLUaJaHSEGJD6Q09zyIzyqMy_E31qkf67rngnFt0-J_l4U63MzR-zWOwEockz9LTNHnHRzHofPfDVc_TtyxU4BTyu7PVN7QBwsfi5BNJ_eYVHEKQchiZT4eb5AVxewB_hM7OCRoePm5L0-Hha4KNljGQv0Gwyvjg6Tds6CakFvrJOLbFkaFhgPF7nxEDQBhpklLcM5s6tYFwFmcGQnDhgdAZIkfLECu8oBWu8RHvVsvKv40Eny2wIQWUSzKYANOOVKTOnHJdeZAn6sMVPrxo5DA00IoKsO5ATNIrIdgOignXdAHbVrV31fXZN0OdoFx33GYBvTfu6AMwzKlbpAvKMHDwOyRN00BsJ-8P2u7eW1e3-_K1hZfL42rCEyb7vuuMv45mzyi839RhBVdR_S9CrZiF0t8SH4OeokAmSvSXSu-d-T_XrslbvhlRBZhCeEvSxW03_xvLN_8DyLXpCY9niYZ5ScYD21tcb_w5yqXU5QA_l5GSAHo3G0_Pvg3oTwffJnEDbbHpe_PgLmlkhgw |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9owFLa69qF7mTrtlq3dvJv2FBVf4tgP1QSFCtbCpolKfUsd22krQcIoqOLP7bftOIQMNm1vFU-xD8H-fK7GPgehD6k1qSQkC8FYi5ALLkPp_DZcqlMhncpIWbWkPxDdc_7lIrrYQj9Xd2H8scqVTiwVtS2M3yM_hHdxf9FTis-TH6GvGuX_XV2V0NBVaQV7VKYYqy52nLrFHYRwt0e9Nqz3R0pPOsPjblhVGQgNePuz0BBDGppljPvnmGgweRBEaOUMs8ZxIxhXmYyAJCYW4iENIYVyxAhnKYW5wHsfoB0OVBD87bQ6g2_f65CPUSKW-YwYU41DR2Pw0GJfIWDNCpbFAv42CWs28c_zmrvzfKIXd3o0WjOGJ3voUeXF4uaS7R6jLZc_QV97Y1BOuJOb6aJURLg5ugIIZ9dj3AJjaTE06Rwv9zHgcQg_hPt6Ao0Wtxe5Ht8Y3B408XHhLepTdH4vSD5D23mRuxf-wJVhJssyFUlgHwWgaad0GllluXQiCtC7FX7JZJmWI4FwxoOc1CAHqOWRrQl8Ju2yoZheJZVgJrGCTwrDsFZzy9KUGUeZZoZkWaSMCdAnvy6Jl3cA3-jq2gKM02fOSprg78Sg-UgcoP0NSpBTs9m9Wtmk0hO3yW-uDtDbutt_0599y10xL2kEVT4PXYCeLxmhnhJvgL6lQgZIbrDIxpw3e_Kb6zKLOLgsMgIzGaD3NTf9G8uX_x_9G7TbHfbPkrPe4PQVekh9keRGHFKxj7Zn07k7AM9tlr6uxAOjy_uWyF8q_lUV |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwELfGkIAXBOIrMMB8iaeotZ049gNC3bqyMlZ42KS9Bcd2tkltUrpWU_81_jrukjS0IHib-hTbTe3z3f3u3PMdIW8zZzPFWB4CWMswkpEKlcdjuMxkUnmds6pqydFIHpxEn0_j0y3yc3UXBsMqVzqxUtSutHhG3oF3RXjRU8lO3oRFfOsPPk5_hFhBCv9pXZXTqFnk0C-vwH27_DDsw16_43ywf7x3EDYVBkILlv48tMyyrhG5iPA5YQbgDhwIo70VzvrIShHpXMUwJGEOfCED7oT2zErvOId1wHtvkJsJZnHHW-qDT62zJziTdSYjIXS343kCtlmCtQHW8K8qE_A3GKyh4Z-RmrcXxdQsr8x4vAaDg3vkbmO_0l7NcPfJli8ekK_DCaglul_Y2bJSQbQ3PgOCzc8ndBdg0lFoMgWtTzDg8Rh-iB6ZKTQ62l8WZnJhaX_Uo3slYulDcnItdHxEtouy8E8w1MoKm-e5jhUwjgaiGa9NFjvtIuVlHJDXK_ql0zohRwqODBI5bYkckF2kbDsAc2hXDeXsLG1EMk00fDKYhnMmciLLhPVcGGFZnsfa2oC8x31JUdKB-NY0FxZgnpgzK-2BpZOAzmNJQHY2RoKE2s3u1c6mjYa4TH_zc0Betd34TYx6K3y5qMZIrjEDXUAe14zQLinqgqblUgVEbbDIxpo3e4qL8yp_OBgrKgaADMiblpv-Tcun_5_9S3IL5DD9MhwdPiN3OFZH7iYhlztkez5b-Odgss2zF5VsUPL9uoXxF9TKUq8 |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLage4AXBuKywEDmIvGUtY4dx35C2U0DaYWHVRpPkW_ZKtqk6tKh8us5TtKoGUJCKE-xTySfnLtz8hmhD9oaLQjJQwjWPGSciVA4vw2nlebCyZzUp5acj_nZhH25jC_bDbebtq0SSvFp7aT9V5uQ0dFoCAW6GCaSDxc2_3Tb7iR5kEkuGdjJfbTDY8jFB2hnMv6Wfq8_cbbPNnBCFGr7oYsSSJASD9C_FYRqrP4_PfJWSLrbLvlgVSzU-qeazbZi0ekuyjZcNC0oPw5WlT4wv-4APP4_m4_RozZNxWmjV0_QPVc8RV8_z8H74JPCLNe1p8Hp7KpcTqvrOT6EaGgxDKkCNxsVcHsBrOBztYBBi4_XhZpPDT4ep_io9CHzGZqcnlwcnYXtgQyhgcKoCg0xZKRoTpm_T4iC7ADqLSWdofB2mOGUyVzEQJIQC6WjgupLOmK4s1EEYn-OBkVZuD3fUWWoyfNcxgL0Q4JYlJNKx1ZaJhyPA_RuI6Fs0eBuZFCveDFmnRgDdOhl1xF4qOx6oFxeZa3lZYmES8MyrFXMUq2pcRFV1JA8j6UxAfroJZ95gwbxGtX-lwDr9NBYWQoJTQKujSQB2u9RgiGa_vRGd7LWEdxkYALM_58sYLFvu2n_pG9uK1y5qml4JD3QXIBeNKrWsQRiT6BMFgESPSXs8dyfKabXNUw45CQihjgYoPedvv79Xb78J6pX6GHkD0AeJWHE99GgWq7ca8jKKv2mNb3fB3wvuA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+Encryption+Algorithm+Based+on+an+Improved+Tent+Map+and+Dynamic+DNA+Coding&rft.jtitle=Entropy+%28Basel%2C+Switzerland%29&rft.au=Wei+Zhou&rft.au=Xianwei+Li&rft.au=Zhenghua+Xin&rft.date=2025-07-26&rft.pub=MDPI+AG&rft.eissn=1099-4300&rft.volume=27&rft.issue=8&rft.spage=796&rft_id=info:doi/10.3390%2Fe27080796&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_79797b69edda4d3bb3ce23a3c1ff59cc |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1099-4300&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1099-4300&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1099-4300&client=summon |