Image encryption algorithm based on genetic operations and chaotic DNA encoding
Based on the two-dimensional logistic map and two genetic operations, a new image encryption algorithm is suggested. Encrypted image is constructed in two phases: confusion and genetic operations. In the first phase, the confusion is used to overcome the problem of uniform images. In the second phas...
Uložené v:
| Vydané v: | Soft computing (Berlin, Germany) Ročník 26; číslo 12; s. 5823 - 5832 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.06.2022
|
| Predmet: | |
| ISSN: | 1432-7643, 1433-7479 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Based on the two-dimensional logistic map and two genetic operations, a new image encryption algorithm is suggested. Encrypted image is constructed in two phases: confusion and genetic operations. In the first phase, the confusion is used to overcome the problem of uniform images. In the second phase, the image is encoded into DNA (deoxyribonucleic acid) sequences; then, the genetic operations are performed including crossover and mutation after decomposition the image into blocks of 12 nucleotides (adenine (A), guanine (G), cytosine (C) and thymine (T)). A cipher block chaining (CBC) mode based on genetic operations is used to ensure the security of our algorithm from any differential attack. Simulations performed on large number of images of different size ensure that our method is not subject to any known attacks. |
|---|---|
| AbstractList | Based on the two-dimensional logistic map and two genetic operations, a new image encryption algorithm is suggested. Encrypted image is constructed in two phases: confusion and genetic operations. In the first phase, the confusion is used to overcome the problem of uniform images. In the second phase, the image is encoded into DNA (deoxyribonucleic acid) sequences; then, the genetic operations are performed including crossover and mutation after decomposition the image into blocks of 12 nucleotides (adenine (A), guanine (G), cytosine (C) and thymine (T)). A cipher block chaining (CBC) mode based on genetic operations is used to ensure the security of our algorithm from any differential attack. Simulations performed on large number of images of different size ensure that our method is not subject to any known attacks. |
| Author | Qobbi, Younes Essaid, Mohamed Benazzi, Abdelhamid Jarjar, Abdeltif |
| Author_xml | – sequence: 1 givenname: Younes orcidid: 0000-0002-3533-7960 surname: Qobbi fullname: Qobbi, Younes email: qobbi.younes@ump.ac.ma organization: AMSPCS Laboratory, Mohamed First University, HSTO – sequence: 2 givenname: Abdeltif surname: Jarjar fullname: Jarjar, Abdeltif organization: High School Moulay Rachid – sequence: 3 givenname: Mohamed surname: Essaid fullname: Essaid, Mohamed organization: LSI, Sidi Mohamed Ben Abdellah University – sequence: 4 givenname: Abdelhamid surname: Benazzi fullname: Benazzi, Abdelhamid organization: AMSPCS Laboratory, Mohamed First University, HSTO |
| BookMark | eNp9kM1uwjAQhK2KSgXaF-gpL-B2_R-OiP4hoXLhbjmOHYLARnZ64O2bhJ564LSr1XyjnZmhSYjBIfRM4IUAqNcMIAAwUIJBCqmwukNTwhnDiqvFZNwpVpKzBzTL-QC9Ugk2Rdv1yTSucMGmy7lrYyjMsYmp7fanojLZ1UV_alxwXWuLeHbJDKJcmFAXdm_icH77Xg4GsW5D84juvTlm9_Q352j38b5bfeHN9nO9Wm6wpZR0uOLA61JUgplFab11UgKVhnAurK-pIYowJisgdWmlE8JYX3JPK1J6DzVhc1RebW2KOSfntW278bUumfaoCeihF33tRfdp9diLVj1K_6Hn1J5MutyG2BXKvTg0LulD_EmhT3iL-gVfkngT |
| CitedBy_id | crossref_primary_10_1007_s11071_023_09020_6 crossref_primary_10_3390_sym17071042 crossref_primary_10_1016_j_dsp_2024_104725 crossref_primary_10_1109_ACCESS_2024_3481230 crossref_primary_10_3390_e25020261 crossref_primary_10_1016_j_dsp_2023_104367 crossref_primary_10_3390_e26050351 crossref_primary_10_1007_s11042_024_19774_9 crossref_primary_10_1007_s11042_024_19472_6 crossref_primary_10_1007_s11042_023_15707_0 crossref_primary_10_1088_1402_4896_ada11b crossref_primary_10_1016_j_chaos_2024_114923 crossref_primary_10_3390_math10173180 crossref_primary_10_1088_1402_4896_ad996a crossref_primary_10_3390_cryptography8040045 crossref_primary_10_1007_s11042_023_15458_y crossref_primary_10_1016_j_eswa_2024_124413 crossref_primary_10_1007_s11554_024_01506_9 crossref_primary_10_1016_j_vlsi_2023_102126 crossref_primary_10_1109_ACCESS_2022_3194730 crossref_primary_10_1109_ACCESS_2022_3233321 crossref_primary_10_1007_s10489_023_04996_5 crossref_primary_10_1007_s00500_024_10388_9 crossref_primary_10_1016_j_ins_2024_120332 crossref_primary_10_1109_ACCESS_2022_3199738 crossref_primary_10_1049_ipr2_12974 crossref_primary_10_1016_j_compeleceng_2025_110402 |
| Cites_doi | 10.1007/978-3-319-89533-8_2 10.1016/j.optlaseng.2016.10.019 10.1007/s11071-014-1517-8 10.1016/j.optlaseng.2020.106040 10.1007/s11071-019-05413-8 10.1016/j.compeleceng.2012.02.007 10.1142/S021812749800098X 10.1007/s00521-018-3541-y 10.1016/j.optlastec.2017.10.024 10.1007/s11042-020-09237-2 10.1007/s11071-016-3030-8 10.1016/j.camwa.2010.03.017 10.1016/j.optlastec.2019.105818 10.1016/j.sigpro.2018.03.010 10.1007/s11071-017-3874-6 10.1049/iet-ipr.2019.1340 10.1016/j.physleta.2011.10.040 10.3390/e22020158 10.1007/s11042-020-09058-3 10.1016/j.optlaseng.2015.03.022 10.1007/s11042-020-09233-6 10.1016/j.optlaseng.2016.10.006 10.1007/s11045-018-0589-x |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021 |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021 |
| DBID | AAYXX CITATION |
| DOI | 10.1007/s00500-021-06567-7 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1433-7479 |
| EndPage | 5832 |
| ExternalDocumentID | 10_1007_s00500_021_06567_7 |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C .86 .VR 06D 0R~ 0VY 1N0 1SB 203 29~ 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K7- KDC KOV LAS LLZTM M4Y MA- N2Q NB0 NPVJJ NQJWS NU0 O9- O93 O9J OAM P2P P9P PF0 PT4 PT5 QOS R89 R9I RIG RNI ROL RPX RSV RZK S16 S1Z S27 S3B SAP SDH SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z5O Z7R Z7X Z7Y Z7Z Z81 Z83 Z88 ZMTXR AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB |
| ID | FETCH-LOGICAL-c221t-b404d85b53a98cfce66026a1445cfd2a171336b01d8c6e55acf84f2b18ff0d13 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 29 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000741612500006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1432-7643 |
| IngestDate | Tue Nov 18 21:32:20 EST 2025 Sat Nov 29 03:36:14 EST 2025 Fri Feb 21 02:45:26 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 12 |
| Keywords | Image encryption Chaotic map Mutation Crossover DNA encoding Genetic operation |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c221t-b404d85b53a98cfce66026a1445cfd2a171336b01d8c6e55acf84f2b18ff0d13 |
| ORCID | 0000-0002-3533-7960 |
| PageCount | 10 |
| ParticipantIDs | crossref_citationtrail_10_1007_s00500_021_06567_7 crossref_primary_10_1007_s00500_021_06567_7 springer_journals_10_1007_s00500_021_06567_7 |
| PublicationCentury | 2000 |
| PublicationDate | 20220600 2022-06-00 |
| PublicationDateYYYYMMDD | 2022-06-01 |
| PublicationDate_xml | – month: 6 year: 2022 text: 20220600 |
| PublicationDecade | 2020 |
| PublicationPlace | Berlin/Heidelberg |
| PublicationPlace_xml | – name: Berlin/Heidelberg |
| PublicationSubtitle | A Fusion of Foundations, Methodologies and Applications |
| PublicationTitle | Soft computing (Berlin, Germany) |
| PublicationTitleAbbrev | Soft Comput |
| PublicationYear | 2022 |
| Publisher | Springer Berlin Heidelberg |
| Publisher_xml | – name: Springer Berlin Heidelberg |
| References | Wang J, Li X (2015) A chaotic system with one line equilibria and image encryption with avalanche effects. In Proceedings of the 2015 International Conference on Electronics, Electrical Engineering and Information Science-EEEIS MahmudMLeeMChoiJYEvolutionary-based image encryption using RNA codons truth tableOptics Laser Technol202012110581810.1016/j.optlastec.2019.105818 KhanJSAhmadJChaos based efficient selective image encryptionMultidimension Syst Signal Process2019302943961393348910.1007/s11045-018-0589-x GhazviniMMirzadiMParvarNA modified method for image encryption based on chaotic map and genetic algorithmMultimedia Tools Appl20207937269272695010.1007/s11042-020-09058-3 ParvazRZarebniaMA combination chaotic system and application in color image encryptionOpt Laser Technol2018101304110.1016/j.optlastec.2017.10.024 WeiZDynamical behaviors of a chaotic system with no equilibriaPhys Lett A20113762102108285930710.1016/j.physleta.2011.10.040 MohamedHGElKamchouchiDHMoussaKHA novel color image encryption algorithm based on hyperchaotic maps and mitochondrial DNA sequencesEntropy2020222158407575710.3390/e22020158 http://sipi.usc.edu/database/database.php?volume=misc NiuYZhouZZhangXAn image encryption approach based on chaotic maps and genetic operationsMultimedia Tools Appl20207935256132563310.1007/s11042-020-09237-2 HuaZJinFXuBHuangH2D Logistic-Sine-coupling map for image encryptionSignal Process201814914816110.1016/j.sigpro.2018.03.010 LiuHWangXColor image encryption based on one-time keys and robust chaotic mapsComput Math Appl2010591033203327265187110.1016/j.camwa.2010.03.017 Boubaker O, Jafary S (2019) Recent advances in chaotic systems and synchronization ZhengJLiuLNovel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine mapIET Image Proc202014112310232010.1049/iet-ipr.2019.1340 NoshadianSEbrahimzadeAKazemitabarSJBreaking a chaotic image encryption algorithmMultimedia Tools Appl20207935256352565510.1007/s11042-020-09233-6 WangXYZhangYQBaoXMA novel chaotic image encryption scheme using DNA sequence operationsOpt Lasers Eng201573536110.1016/j.optlaseng.2015.03.022 LiuLZhangQWeiXA RGB image encryption algorithm based on DNA encoding and chaos mapComput Electr Eng20123851240124810.1016/j.compeleceng.2012.02.007 ÖzkaynakFYavuzSAnalysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic systemNonlinear Dyn20147821311132010.1007/s11071-014-1517-8 NiyatAYMoattarMHTorshizMNColor image encryption based on hybrid hyper-chaotic system and cellular automataOpt Lasers Eng20179022523710.1016/j.optlaseng.2016.10.019 FuXQLiuBCXieYYLiWLiuYImage encryption-then-transmission using DNA encryption algorithm and the double chaosIEEE Photonics J2018103115 GanZHChaiXLHanDJChenYRA chaotic image encryption algorithm based on 3-D bit-plane permutationNeural Comput Appl201931117111713010.1007/s00521-018-3541-y FridrichJSymmetric ciphers based on two-dimensional chaotic mapsInt J Bifurcation Chaos199880612591284166378210.1142/S021812749800098X LiCLuoGQinKLiCAn image encryption scheme based on chaotic tent mapNonlinear Dyn201787112713310.1007/s11071-016-3030-8 Thanki RM, Kothari AM (2019) Image enhancement in the spatial domain. In Digital Image Processing Using SCILAB (pp. 19–50). Springer, Cham JithinKCSankarSColour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot setJ Inf Security Appl202050102428 Farah MB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn, 1–24 ZhangYQHeYLiPWangXYA new color image encryption scheme based on 2DNLCML system and genetic operationsOptics and Lasers in Engineering202012810604010.1016/j.optlaseng.2020.106040 UllahAJamalSSShahTA novel scheme for image encryption using substitution box and chaotic systemNonlinear Dyn2018911359370374047010.1007/s11071-017-3874-6 Schaefer G, Stich M (2004) UCID—an uncompressed color image database. In: storage and retrieval methods and applications for multimedia 2004, Proceedings of SPIE, 5307; pp. 472–80 EnayatifarRAbdullahAHIsninIFAltameemALeeMImage encryption using a synchronous permutation-diffusion techniqueOpt Lasers Eng20179014615410.1016/j.optlaseng.2016.10.006 R Enayatifar (6567_CR3) 2017; 90 KC Jithin (6567_CR10) 2020; 50 6567_CR25 H Liu (6567_CR13) 2010; 59 Y Niu (6567_CR17) 2020; 79 R Parvaz (6567_CR20) 2018; 101 S Noshadian (6567_CR19) 2020; 79 A Ullah (6567_CR23) 2018; 91 F Özkaynak (6567_CR29) 2014; 78 YQ Zhang (6567_CR27) 2020; 128 6567_CR22 6567_CR21 6567_CR1 Z Wei (6567_CR26) 2011; 376 6567_CR4 6567_CR2 L Liu (6567_CR14) 2012; 38 ZH Gan (6567_CR7) 2019; 31 JS Khan (6567_CR11) 2019; 30 M Mahmud (6567_CR15) 2020; 121 HG Mohamed (6567_CR16) 2020; 22 M Ghazvini (6567_CR8) 2020; 79 J Fridrich (6567_CR5) 1998; 8 Z Hua (6567_CR9) 2018; 149 J Zheng (6567_CR28) 2020; 14 XQ Fu (6567_CR6) 2018; 10 XY Wang (6567_CR24) 2015; 73 C Li (6567_CR12) 2017; 87 AY Niyat (6567_CR18) 2017; 90 |
| References_xml | – reference: FuXQLiuBCXieYYLiWLiuYImage encryption-then-transmission using DNA encryption algorithm and the double chaosIEEE Photonics J2018103115 – reference: ZhengJLiuLNovel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine mapIET Image Proc202014112310232010.1049/iet-ipr.2019.1340 – reference: LiuHWangXColor image encryption based on one-time keys and robust chaotic mapsComput Math Appl2010591033203327265187110.1016/j.camwa.2010.03.017 – reference: NiyatAYMoattarMHTorshizMNColor image encryption based on hybrid hyper-chaotic system and cellular automataOpt Lasers Eng20179022523710.1016/j.optlaseng.2016.10.019 – reference: MahmudMLeeMChoiJYEvolutionary-based image encryption using RNA codons truth tableOptics Laser Technol202012110581810.1016/j.optlastec.2019.105818 – reference: WangXYZhangYQBaoXMA novel chaotic image encryption scheme using DNA sequence operationsOpt Lasers Eng201573536110.1016/j.optlaseng.2015.03.022 – reference: GhazviniMMirzadiMParvarNA modified method for image encryption based on chaotic map and genetic algorithmMultimedia Tools Appl20207937269272695010.1007/s11042-020-09058-3 – reference: KhanJSAhmadJChaos based efficient selective image encryptionMultidimension Syst Signal Process2019302943961393348910.1007/s11045-018-0589-x – reference: Boubaker O, Jafary S (2019) Recent advances in chaotic systems and synchronization – reference: LiuLZhangQWeiXA RGB image encryption algorithm based on DNA encoding and chaos mapComput Electr Eng20123851240124810.1016/j.compeleceng.2012.02.007 – reference: LiCLuoGQinKLiCAn image encryption scheme based on chaotic tent mapNonlinear Dyn201787112713310.1007/s11071-016-3030-8 – reference: EnayatifarRAbdullahAHIsninIFAltameemALeeMImage encryption using a synchronous permutation-diffusion techniqueOpt Lasers Eng20179014615410.1016/j.optlaseng.2016.10.006 – reference: FridrichJSymmetric ciphers based on two-dimensional chaotic mapsInt J Bifurcation Chaos199880612591284166378210.1142/S021812749800098X – reference: MohamedHGElKamchouchiDHMoussaKHA novel color image encryption algorithm based on hyperchaotic maps and mitochondrial DNA sequencesEntropy2020222158407575710.3390/e22020158 – reference: Schaefer G, Stich M (2004) UCID—an uncompressed color image database. In: storage and retrieval methods and applications for multimedia 2004, Proceedings of SPIE, 5307; pp. 472–80 – reference: http://sipi.usc.edu/database/database.php?volume=misc – reference: ÖzkaynakFYavuzSAnalysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic systemNonlinear Dyn20147821311132010.1007/s11071-014-1517-8 – reference: HuaZJinFXuBHuangH2D Logistic-Sine-coupling map for image encryptionSignal Process201814914816110.1016/j.sigpro.2018.03.010 – reference: UllahAJamalSSShahTA novel scheme for image encryption using substitution box and chaotic systemNonlinear Dyn2018911359370374047010.1007/s11071-017-3874-6 – reference: GanZHChaiXLHanDJChenYRA chaotic image encryption algorithm based on 3-D bit-plane permutationNeural Comput Appl201931117111713010.1007/s00521-018-3541-y – reference: Wang J, Li X (2015) A chaotic system with one line equilibria and image encryption with avalanche effects. In Proceedings of the 2015 International Conference on Electronics, Electrical Engineering and Information Science-EEEIS – reference: Thanki RM, Kothari AM (2019) Image enhancement in the spatial domain. In Digital Image Processing Using SCILAB (pp. 19–50). Springer, Cham – reference: ParvazRZarebniaMA combination chaotic system and application in color image encryptionOpt Laser Technol2018101304110.1016/j.optlastec.2017.10.024 – reference: WeiZDynamical behaviors of a chaotic system with no equilibriaPhys Lett A20113762102108285930710.1016/j.physleta.2011.10.040 – reference: JithinKCSankarSColour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot setJ Inf Security Appl202050102428 – reference: ZhangYQHeYLiPWangXYA new color image encryption scheme based on 2DNLCML system and genetic operationsOptics and Lasers in Engineering202012810604010.1016/j.optlaseng.2020.106040 – reference: NoshadianSEbrahimzadeAKazemitabarSJBreaking a chaotic image encryption algorithmMultimedia Tools Appl20207935256352565510.1007/s11042-020-09233-6 – reference: Farah MB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn, 1–24 – reference: NiuYZhouZZhangXAn image encryption approach based on chaotic maps and genetic operationsMultimedia Tools Appl20207935256132563310.1007/s11042-020-09237-2 – ident: 6567_CR22 doi: 10.1007/978-3-319-89533-8_2 – ident: 6567_CR1 – volume: 90 start-page: 225 year: 2017 ident: 6567_CR18 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.10.019 – volume: 78 start-page: 1311 issue: 2 year: 2014 ident: 6567_CR29 publication-title: Nonlinear Dyn doi: 10.1007/s11071-014-1517-8 – volume: 128 start-page: 106040 year: 2020 ident: 6567_CR27 publication-title: Optics and Lasers in Engineering doi: 10.1016/j.optlaseng.2020.106040 – ident: 6567_CR4 doi: 10.1007/s11071-019-05413-8 – volume: 38 start-page: 1240 issue: 5 year: 2012 ident: 6567_CR14 publication-title: Comput Electr Eng doi: 10.1016/j.compeleceng.2012.02.007 – volume: 8 start-page: 1259 issue: 06 year: 1998 ident: 6567_CR5 publication-title: Int J Bifurcation Chaos doi: 10.1142/S021812749800098X – volume: 31 start-page: 7111 issue: 11 year: 2019 ident: 6567_CR7 publication-title: Neural Comput Appl doi: 10.1007/s00521-018-3541-y – volume: 50 start-page: 102428 year: 2020 ident: 6567_CR10 publication-title: J Inf Security Appl – volume: 101 start-page: 30 year: 2018 ident: 6567_CR20 publication-title: Opt Laser Technol doi: 10.1016/j.optlastec.2017.10.024 – ident: 6567_CR21 – volume: 79 start-page: 25613 issue: 35 year: 2020 ident: 6567_CR17 publication-title: Multimedia Tools Appl doi: 10.1007/s11042-020-09237-2 – volume: 87 start-page: 127 issue: 1 year: 2017 ident: 6567_CR12 publication-title: Nonlinear Dyn doi: 10.1007/s11071-016-3030-8 – volume: 59 start-page: 3320 issue: 10 year: 2010 ident: 6567_CR13 publication-title: Comput Math Appl doi: 10.1016/j.camwa.2010.03.017 – volume: 121 start-page: 105818 year: 2020 ident: 6567_CR15 publication-title: Optics Laser Technol doi: 10.1016/j.optlastec.2019.105818 – ident: 6567_CR25 – ident: 6567_CR2 – volume: 149 start-page: 148 year: 2018 ident: 6567_CR9 publication-title: Signal Process doi: 10.1016/j.sigpro.2018.03.010 – volume: 91 start-page: 359 issue: 1 year: 2018 ident: 6567_CR23 publication-title: Nonlinear Dyn doi: 10.1007/s11071-017-3874-6 – volume: 14 start-page: 2310 issue: 11 year: 2020 ident: 6567_CR28 publication-title: IET Image Proc doi: 10.1049/iet-ipr.2019.1340 – volume: 376 start-page: 102 issue: 2 year: 2011 ident: 6567_CR26 publication-title: Phys Lett A doi: 10.1016/j.physleta.2011.10.040 – volume: 22 start-page: 158 issue: 2 year: 2020 ident: 6567_CR16 publication-title: Entropy doi: 10.3390/e22020158 – volume: 79 start-page: 26927 issue: 37 year: 2020 ident: 6567_CR8 publication-title: Multimedia Tools Appl doi: 10.1007/s11042-020-09058-3 – volume: 73 start-page: 53 year: 2015 ident: 6567_CR24 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2015.03.022 – volume: 10 start-page: 1 issue: 3 year: 2018 ident: 6567_CR6 publication-title: IEEE Photonics J – volume: 79 start-page: 25635 issue: 35 year: 2020 ident: 6567_CR19 publication-title: Multimedia Tools Appl doi: 10.1007/s11042-020-09233-6 – volume: 90 start-page: 146 year: 2017 ident: 6567_CR3 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2016.10.006 – volume: 30 start-page: 943 issue: 2 year: 2019 ident: 6567_CR11 publication-title: Multidimension Syst Signal Process doi: 10.1007/s11045-018-0589-x |
| SSID | ssj0021753 |
| Score | 2.4436095 |
| Snippet | Based on the two-dimensional logistic map and two genetic operations, a new image encryption algorithm is suggested. Encrypted image is constructed in two... |
| SourceID | crossref springer |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 5823 |
| SubjectTerms | Application of Soft Computing Artificial Intelligence Computational Intelligence Control Engineering Mathematical Logic and Foundations Mechatronics Robotics |
| Title | Image encryption algorithm based on genetic operations and chaotic DNA encoding |
| URI | https://link.springer.com/article/10.1007/s00500-021-06567-7 |
| Volume | 26 |
| WOSCitedRecordID | wos000741612500006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1433-7479 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0021753 issn: 1432-7643 databaseCode: P5Z dateStart: 20090101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1433-7479 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0021753 issn: 1432-7643 databaseCode: K7- dateStart: 20090101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1433-7479 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0021753 issn: 1432-7643 databaseCode: BENPR dateStart: 20090101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1433-7479 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0021753 issn: 1432-7643 databaseCode: RSV dateStart: 19970401 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED90-qAPTqfi_Bh58E0LbfqVPg51KMIUHbK3kubDDbZ2tFXwvzfJ2uJABvqapqFc7u531-TuB3ApVEoRhYaljgeWJyNsqajatShOiMttWzLJDdlEOByS8Th6rorCivq2e30kaTx1U-ymW5XYlr5SoGBTmXe4CVsK7ogmbHh5fWvSrKr3pAoEVOyoALcqlfl9jVU4Wj0LNRAzaP_v4_ZhrwopUX-pAwewIdIOtGu6BlRZbwd2f_QePISnh7lyJUg9yr-M20B09p7l03IyRxraOFJDSrt0kSPKFmKpKQWiKUdsQjM9fDvs6wUyjX9HMBrcjW7urYpdwWIYO6WVeLbHiZ_4Lo0Ik0wEmo2KqgTLV_uDqaPT1yCxHU5YIHyfMkk8iROHSGlzxz2GVpql4gSQ9IhLA44dzjyPqhRKODyiCaXMFzgStAtOLeOYVZ3HNQHGLG56JhvxxUp8sRFfHHbhqnlnsey7sXb2db0tcWWDxZrpp3-bfgY7WBc9mH8v59Aq8w9xAdvss5wWeQ82H0OrZ1TwG0mh00k |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED90CuqD06k4P_Pgmxaa9GPt41DHhrOKDtlbSfPhBls71in435tk7XAgA31N01Aud_e7a3K_A7gSKqUIG6ZLHfctV4bEUlG1Y1GSBA63bckkN80mGlEU9Pvhc1EUlpe33csjSeOpF8VumqrEtvSVAgWbyrwb67DhKsTSjPkvr2-LNKvgnlSBgIodFeAWpTK_r7EMR8tnoQZiWtX_fdwe7BYhJWrOdWAf1kRag2rZrgEV1luDnR_cgwfw1BkrV4LUo-mXcRuIjt6z6XA2GCMNbRypIaVdusgRZRMx15Qc0ZQjNqCZHr6LmnqBTOPfIfRa973btlV0V7AYIXhmJa7t8sBLPIeGAZNM-LobFVUJlqf2h1Cs01c_sTEPmC88jzIZuJIkOJDS5tg5gkqapeIYkHQDh_qcYM5cl6oUSmAe0oRS5gkSCloHXMo4ZgXzuG6AMYoXnMlGfLESX2zEFzfqcL14ZzLn3Vg5-6bclriwwXzF9JO_Tb-ErXbvsRt3O9HDKWwTXQBh_sOcQWU2_RDnsMk-Z8N8emEU8RtBOdVd |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwED90iuiD06k4P_Pgm5a16ffjcA6HUgcO2VtJ8-EGWzu2Kvjfm6Rd2UAE8TVNQ7nc5e7X3P0O4IZLSBH6uksd8wxHhNiQUbVtEJwENjNNQQXTzSb8KAqGw7C_UsWvs92XV5JFTYNiaUrz1oyJVlX4pmhLTEOlF0gXKk3d34QtRyXSK7z--lZBrpKHUgYFMo6Uzrcsm_l5jXXXtH4vqt1Nt_7_Dz2A_TLURO1CNw5hg6cNqC_bOKDSqhuwt8JJeAQvvak8YpB8NP_Sxwkik_dsPs5HU6RcHkNySGqdKn5E2YwXGrRAJGWIjkimhjtRWy2QKb94DIPuw-D-0Si7LhgUYys3Esd0WOAmrk3CgArKPdWlikjg5cp9w8RSsNZLTIsF1OOuS6gIHIETKxDCZJZ9ArU0S_kpIOEENvEYthh1HCKhFbdYSBJCqMtxyEkTrKW8Y1oykqvGGJO44lLW4oul-GItvthvwm31zqzg4_h19t1yi-LSNhe_TD_72_Rr2Ol3uvFzL3o6h12s6iL075kLqOXzD34J2_QzHy_mV1onvwGfOt5B |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+encryption+algorithm+based+on+genetic+operations+and+chaotic+DNA+encoding&rft.jtitle=Soft+computing+%28Berlin%2C+Germany%29&rft.au=Qobbi%2C+Younes&rft.au=Jarjar%2C+Abdeltif&rft.au=Essaid%2C+Mohamed&rft.au=Benazzi%2C+Abdelhamid&rft.date=2022-06-01&rft.issn=1432-7643&rft.eissn=1433-7479&rft.volume=26&rft.issue=12&rft.spage=5823&rft.epage=5832&rft_id=info:doi/10.1007%2Fs00500-021-06567-7&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s00500_021_06567_7 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1432-7643&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1432-7643&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1432-7643&client=summon |