Image encryption algorithm based on genetic operations and chaotic DNA encoding

Based on the two-dimensional logistic map and two genetic operations, a new image encryption algorithm is suggested. Encrypted image is constructed in two phases: confusion and genetic operations. In the first phase, the confusion is used to overcome the problem of uniform images. In the second phas...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Soft computing (Berlin, Germany) Ročník 26; číslo 12; s. 5823 - 5832
Hlavní autori: Qobbi, Younes, Jarjar, Abdeltif, Essaid, Mohamed, Benazzi, Abdelhamid
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2022
Predmet:
ISSN:1432-7643, 1433-7479
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Based on the two-dimensional logistic map and two genetic operations, a new image encryption algorithm is suggested. Encrypted image is constructed in two phases: confusion and genetic operations. In the first phase, the confusion is used to overcome the problem of uniform images. In the second phase, the image is encoded into DNA (deoxyribonucleic acid) sequences; then, the genetic operations are performed including crossover and mutation after decomposition the image into blocks of 12 nucleotides (adenine (A), guanine (G), cytosine (C) and thymine (T)). A cipher block chaining (CBC) mode based on genetic operations is used to ensure the security of our algorithm from any differential attack. Simulations performed on large number of images of different size ensure that our method is not subject to any known attacks.
AbstractList Based on the two-dimensional logistic map and two genetic operations, a new image encryption algorithm is suggested. Encrypted image is constructed in two phases: confusion and genetic operations. In the first phase, the confusion is used to overcome the problem of uniform images. In the second phase, the image is encoded into DNA (deoxyribonucleic acid) sequences; then, the genetic operations are performed including crossover and mutation after decomposition the image into blocks of 12 nucleotides (adenine (A), guanine (G), cytosine (C) and thymine (T)). A cipher block chaining (CBC) mode based on genetic operations is used to ensure the security of our algorithm from any differential attack. Simulations performed on large number of images of different size ensure that our method is not subject to any known attacks.
Author Qobbi, Younes
Essaid, Mohamed
Benazzi, Abdelhamid
Jarjar, Abdeltif
Author_xml – sequence: 1
  givenname: Younes
  orcidid: 0000-0002-3533-7960
  surname: Qobbi
  fullname: Qobbi, Younes
  email: qobbi.younes@ump.ac.ma
  organization: AMSPCS Laboratory, Mohamed First University, HSTO
– sequence: 2
  givenname: Abdeltif
  surname: Jarjar
  fullname: Jarjar, Abdeltif
  organization: High School Moulay Rachid
– sequence: 3
  givenname: Mohamed
  surname: Essaid
  fullname: Essaid, Mohamed
  organization: LSI, Sidi Mohamed Ben Abdellah University
– sequence: 4
  givenname: Abdelhamid
  surname: Benazzi
  fullname: Benazzi, Abdelhamid
  organization: AMSPCS Laboratory, Mohamed First University, HSTO
BookMark eNp9kM1uwjAQhK2KSgXaF-gpL-B2_R-OiP4hoXLhbjmOHYLARnZ64O2bhJ564LSr1XyjnZmhSYjBIfRM4IUAqNcMIAAwUIJBCqmwukNTwhnDiqvFZNwpVpKzBzTL-QC9Ugk2Rdv1yTSucMGmy7lrYyjMsYmp7fanojLZ1UV_alxwXWuLeHbJDKJcmFAXdm_icH77Xg4GsW5D84juvTlm9_Q352j38b5bfeHN9nO9Wm6wpZR0uOLA61JUgplFab11UgKVhnAurK-pIYowJisgdWmlE8JYX3JPK1J6DzVhc1RebW2KOSfntW278bUumfaoCeihF33tRfdp9diLVj1K_6Hn1J5MutyG2BXKvTg0LulD_EmhT3iL-gVfkngT
CitedBy_id crossref_primary_10_1007_s11071_023_09020_6
crossref_primary_10_3390_sym17071042
crossref_primary_10_1016_j_dsp_2024_104725
crossref_primary_10_1109_ACCESS_2024_3481230
crossref_primary_10_3390_e25020261
crossref_primary_10_1016_j_dsp_2023_104367
crossref_primary_10_3390_e26050351
crossref_primary_10_1007_s11042_024_19774_9
crossref_primary_10_1007_s11042_024_19472_6
crossref_primary_10_1007_s11042_023_15707_0
crossref_primary_10_1088_1402_4896_ada11b
crossref_primary_10_1016_j_chaos_2024_114923
crossref_primary_10_3390_math10173180
crossref_primary_10_1088_1402_4896_ad996a
crossref_primary_10_3390_cryptography8040045
crossref_primary_10_1007_s11042_023_15458_y
crossref_primary_10_1016_j_eswa_2024_124413
crossref_primary_10_1007_s11554_024_01506_9
crossref_primary_10_1016_j_vlsi_2023_102126
crossref_primary_10_1109_ACCESS_2022_3194730
crossref_primary_10_1109_ACCESS_2022_3233321
crossref_primary_10_1007_s10489_023_04996_5
crossref_primary_10_1007_s00500_024_10388_9
crossref_primary_10_1016_j_ins_2024_120332
crossref_primary_10_1109_ACCESS_2022_3199738
crossref_primary_10_1049_ipr2_12974
crossref_primary_10_1016_j_compeleceng_2025_110402
Cites_doi 10.1007/978-3-319-89533-8_2
10.1016/j.optlaseng.2016.10.019
10.1007/s11071-014-1517-8
10.1016/j.optlaseng.2020.106040
10.1007/s11071-019-05413-8
10.1016/j.compeleceng.2012.02.007
10.1142/S021812749800098X
10.1007/s00521-018-3541-y
10.1016/j.optlastec.2017.10.024
10.1007/s11042-020-09237-2
10.1007/s11071-016-3030-8
10.1016/j.camwa.2010.03.017
10.1016/j.optlastec.2019.105818
10.1016/j.sigpro.2018.03.010
10.1007/s11071-017-3874-6
10.1049/iet-ipr.2019.1340
10.1016/j.physleta.2011.10.040
10.3390/e22020158
10.1007/s11042-020-09058-3
10.1016/j.optlaseng.2015.03.022
10.1007/s11042-020-09233-6
10.1016/j.optlaseng.2016.10.006
10.1007/s11045-018-0589-x
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021
Copyright_xml – notice: The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021
DBID AAYXX
CITATION
DOI 10.1007/s00500-021-06567-7
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1433-7479
EndPage 5832
ExternalDocumentID 10_1007_s00500_021_06567_7
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.86
.VR
06D
0R~
0VY
1N0
1SB
203
29~
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K7-
KDC
KOV
LAS
LLZTM
M4Y
MA-
N2Q
NB0
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
P2P
P9P
PF0
PT4
PT5
QOS
R89
R9I
RIG
RNI
ROL
RPX
RSV
RZK
S16
S1Z
S27
S3B
SAP
SDH
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z5O
Z7R
Z7X
Z7Y
Z7Z
Z81
Z83
Z88
ZMTXR
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
ID FETCH-LOGICAL-c221t-b404d85b53a98cfce66026a1445cfd2a171336b01d8c6e55acf84f2b18ff0d13
IEDL.DBID RSV
ISICitedReferencesCount 29
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000741612500006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1432-7643
IngestDate Tue Nov 18 21:32:20 EST 2025
Sat Nov 29 03:36:14 EST 2025
Fri Feb 21 02:45:26 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 12
Keywords Image encryption
Chaotic map
Mutation
Crossover
DNA encoding
Genetic operation
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c221t-b404d85b53a98cfce66026a1445cfd2a171336b01d8c6e55acf84f2b18ff0d13
ORCID 0000-0002-3533-7960
PageCount 10
ParticipantIDs crossref_citationtrail_10_1007_s00500_021_06567_7
crossref_primary_10_1007_s00500_021_06567_7
springer_journals_10_1007_s00500_021_06567_7
PublicationCentury 2000
PublicationDate 20220600
2022-06-00
PublicationDateYYYYMMDD 2022-06-01
PublicationDate_xml – month: 6
  year: 2022
  text: 20220600
PublicationDecade 2020
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
PublicationSubtitle A Fusion of Foundations, Methodologies and Applications
PublicationTitle Soft computing (Berlin, Germany)
PublicationTitleAbbrev Soft Comput
PublicationYear 2022
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
References Wang J, Li X (2015) A chaotic system with one line equilibria and image encryption with avalanche effects. In Proceedings of the 2015 International Conference on Electronics, Electrical Engineering and Information Science-EEEIS
MahmudMLeeMChoiJYEvolutionary-based image encryption using RNA codons truth tableOptics Laser Technol202012110581810.1016/j.optlastec.2019.105818
KhanJSAhmadJChaos based efficient selective image encryptionMultidimension Syst Signal Process2019302943961393348910.1007/s11045-018-0589-x
GhazviniMMirzadiMParvarNA modified method for image encryption based on chaotic map and genetic algorithmMultimedia Tools Appl20207937269272695010.1007/s11042-020-09058-3
ParvazRZarebniaMA combination chaotic system and application in color image encryptionOpt Laser Technol2018101304110.1016/j.optlastec.2017.10.024
WeiZDynamical behaviors of a chaotic system with no equilibriaPhys Lett A20113762102108285930710.1016/j.physleta.2011.10.040
MohamedHGElKamchouchiDHMoussaKHA novel color image encryption algorithm based on hyperchaotic maps and mitochondrial DNA sequencesEntropy2020222158407575710.3390/e22020158
http://sipi.usc.edu/database/database.php?volume=misc
NiuYZhouZZhangXAn image encryption approach based on chaotic maps and genetic operationsMultimedia Tools Appl20207935256132563310.1007/s11042-020-09237-2
HuaZJinFXuBHuangH2D Logistic-Sine-coupling map for image encryptionSignal Process201814914816110.1016/j.sigpro.2018.03.010
LiuHWangXColor image encryption based on one-time keys and robust chaotic mapsComput Math Appl2010591033203327265187110.1016/j.camwa.2010.03.017
Boubaker O, Jafary S (2019) Recent advances in chaotic systems and synchronization
ZhengJLiuLNovel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine mapIET Image Proc202014112310232010.1049/iet-ipr.2019.1340
NoshadianSEbrahimzadeAKazemitabarSJBreaking a chaotic image encryption algorithmMultimedia Tools Appl20207935256352565510.1007/s11042-020-09233-6
WangXYZhangYQBaoXMA novel chaotic image encryption scheme using DNA sequence operationsOpt Lasers Eng201573536110.1016/j.optlaseng.2015.03.022
LiuLZhangQWeiXA RGB image encryption algorithm based on DNA encoding and chaos mapComput Electr Eng20123851240124810.1016/j.compeleceng.2012.02.007
ÖzkaynakFYavuzSAnalysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic systemNonlinear Dyn20147821311132010.1007/s11071-014-1517-8
NiyatAYMoattarMHTorshizMNColor image encryption based on hybrid hyper-chaotic system and cellular automataOpt Lasers Eng20179022523710.1016/j.optlaseng.2016.10.019
FuXQLiuBCXieYYLiWLiuYImage encryption-then-transmission using DNA encryption algorithm and the double chaosIEEE Photonics J2018103115
GanZHChaiXLHanDJChenYRA chaotic image encryption algorithm based on 3-D bit-plane permutationNeural Comput Appl201931117111713010.1007/s00521-018-3541-y
FridrichJSymmetric ciphers based on two-dimensional chaotic mapsInt J Bifurcation Chaos199880612591284166378210.1142/S021812749800098X
LiCLuoGQinKLiCAn image encryption scheme based on chaotic tent mapNonlinear Dyn201787112713310.1007/s11071-016-3030-8
Thanki RM, Kothari AM (2019) Image enhancement in the spatial domain. In Digital Image Processing Using SCILAB (pp. 19–50). Springer, Cham
JithinKCSankarSColour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot setJ Inf Security Appl202050102428
Farah MB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn, 1–24
ZhangYQHeYLiPWangXYA new color image encryption scheme based on 2DNLCML system and genetic operationsOptics and Lasers in Engineering202012810604010.1016/j.optlaseng.2020.106040
UllahAJamalSSShahTA novel scheme for image encryption using substitution box and chaotic systemNonlinear Dyn2018911359370374047010.1007/s11071-017-3874-6
Schaefer G, Stich M (2004) UCID—an uncompressed color image database. In: storage and retrieval methods and applications for multimedia 2004, Proceedings of SPIE, 5307; pp. 472–80
EnayatifarRAbdullahAHIsninIFAltameemALeeMImage encryption using a synchronous permutation-diffusion techniqueOpt Lasers Eng20179014615410.1016/j.optlaseng.2016.10.006
R Enayatifar (6567_CR3) 2017; 90
KC Jithin (6567_CR10) 2020; 50
6567_CR25
H Liu (6567_CR13) 2010; 59
Y Niu (6567_CR17) 2020; 79
R Parvaz (6567_CR20) 2018; 101
S Noshadian (6567_CR19) 2020; 79
A Ullah (6567_CR23) 2018; 91
F Özkaynak (6567_CR29) 2014; 78
YQ Zhang (6567_CR27) 2020; 128
6567_CR22
6567_CR21
6567_CR1
Z Wei (6567_CR26) 2011; 376
6567_CR4
6567_CR2
L Liu (6567_CR14) 2012; 38
ZH Gan (6567_CR7) 2019; 31
JS Khan (6567_CR11) 2019; 30
M Mahmud (6567_CR15) 2020; 121
HG Mohamed (6567_CR16) 2020; 22
M Ghazvini (6567_CR8) 2020; 79
J Fridrich (6567_CR5) 1998; 8
Z Hua (6567_CR9) 2018; 149
J Zheng (6567_CR28) 2020; 14
XQ Fu (6567_CR6) 2018; 10
XY Wang (6567_CR24) 2015; 73
C Li (6567_CR12) 2017; 87
AY Niyat (6567_CR18) 2017; 90
References_xml – reference: FuXQLiuBCXieYYLiWLiuYImage encryption-then-transmission using DNA encryption algorithm and the double chaosIEEE Photonics J2018103115
– reference: ZhengJLiuLNovel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine mapIET Image Proc202014112310232010.1049/iet-ipr.2019.1340
– reference: LiuHWangXColor image encryption based on one-time keys and robust chaotic mapsComput Math Appl2010591033203327265187110.1016/j.camwa.2010.03.017
– reference: NiyatAYMoattarMHTorshizMNColor image encryption based on hybrid hyper-chaotic system and cellular automataOpt Lasers Eng20179022523710.1016/j.optlaseng.2016.10.019
– reference: MahmudMLeeMChoiJYEvolutionary-based image encryption using RNA codons truth tableOptics Laser Technol202012110581810.1016/j.optlastec.2019.105818
– reference: WangXYZhangYQBaoXMA novel chaotic image encryption scheme using DNA sequence operationsOpt Lasers Eng201573536110.1016/j.optlaseng.2015.03.022
– reference: GhazviniMMirzadiMParvarNA modified method for image encryption based on chaotic map and genetic algorithmMultimedia Tools Appl20207937269272695010.1007/s11042-020-09058-3
– reference: KhanJSAhmadJChaos based efficient selective image encryptionMultidimension Syst Signal Process2019302943961393348910.1007/s11045-018-0589-x
– reference: Boubaker O, Jafary S (2019) Recent advances in chaotic systems and synchronization
– reference: LiuLZhangQWeiXA RGB image encryption algorithm based on DNA encoding and chaos mapComput Electr Eng20123851240124810.1016/j.compeleceng.2012.02.007
– reference: LiCLuoGQinKLiCAn image encryption scheme based on chaotic tent mapNonlinear Dyn201787112713310.1007/s11071-016-3030-8
– reference: EnayatifarRAbdullahAHIsninIFAltameemALeeMImage encryption using a synchronous permutation-diffusion techniqueOpt Lasers Eng20179014615410.1016/j.optlaseng.2016.10.006
– reference: FridrichJSymmetric ciphers based on two-dimensional chaotic mapsInt J Bifurcation Chaos199880612591284166378210.1142/S021812749800098X
– reference: MohamedHGElKamchouchiDHMoussaKHA novel color image encryption algorithm based on hyperchaotic maps and mitochondrial DNA sequencesEntropy2020222158407575710.3390/e22020158
– reference: Schaefer G, Stich M (2004) UCID—an uncompressed color image database. In: storage and retrieval methods and applications for multimedia 2004, Proceedings of SPIE, 5307; pp. 472–80
– reference: http://sipi.usc.edu/database/database.php?volume=misc
– reference: ÖzkaynakFYavuzSAnalysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic systemNonlinear Dyn20147821311132010.1007/s11071-014-1517-8
– reference: HuaZJinFXuBHuangH2D Logistic-Sine-coupling map for image encryptionSignal Process201814914816110.1016/j.sigpro.2018.03.010
– reference: UllahAJamalSSShahTA novel scheme for image encryption using substitution box and chaotic systemNonlinear Dyn2018911359370374047010.1007/s11071-017-3874-6
– reference: GanZHChaiXLHanDJChenYRA chaotic image encryption algorithm based on 3-D bit-plane permutationNeural Comput Appl201931117111713010.1007/s00521-018-3541-y
– reference: Wang J, Li X (2015) A chaotic system with one line equilibria and image encryption with avalanche effects. In Proceedings of the 2015 International Conference on Electronics, Electrical Engineering and Information Science-EEEIS
– reference: Thanki RM, Kothari AM (2019) Image enhancement in the spatial domain. In Digital Image Processing Using SCILAB (pp. 19–50). Springer, Cham
– reference: ParvazRZarebniaMA combination chaotic system and application in color image encryptionOpt Laser Technol2018101304110.1016/j.optlastec.2017.10.024
– reference: WeiZDynamical behaviors of a chaotic system with no equilibriaPhys Lett A20113762102108285930710.1016/j.physleta.2011.10.040
– reference: JithinKCSankarSColour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot setJ Inf Security Appl202050102428
– reference: ZhangYQHeYLiPWangXYA new color image encryption scheme based on 2DNLCML system and genetic operationsOptics and Lasers in Engineering202012810604010.1016/j.optlaseng.2020.106040
– reference: NoshadianSEbrahimzadeAKazemitabarSJBreaking a chaotic image encryption algorithmMultimedia Tools Appl20207935256352565510.1007/s11042-020-09233-6
– reference: Farah MB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn, 1–24
– reference: NiuYZhouZZhangXAn image encryption approach based on chaotic maps and genetic operationsMultimedia Tools Appl20207935256132563310.1007/s11042-020-09237-2
– ident: 6567_CR22
  doi: 10.1007/978-3-319-89533-8_2
– ident: 6567_CR1
– volume: 90
  start-page: 225
  year: 2017
  ident: 6567_CR18
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.10.019
– volume: 78
  start-page: 1311
  issue: 2
  year: 2014
  ident: 6567_CR29
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-014-1517-8
– volume: 128
  start-page: 106040
  year: 2020
  ident: 6567_CR27
  publication-title: Optics and Lasers in Engineering
  doi: 10.1016/j.optlaseng.2020.106040
– ident: 6567_CR4
  doi: 10.1007/s11071-019-05413-8
– volume: 38
  start-page: 1240
  issue: 5
  year: 2012
  ident: 6567_CR14
  publication-title: Comput Electr Eng
  doi: 10.1016/j.compeleceng.2012.02.007
– volume: 8
  start-page: 1259
  issue: 06
  year: 1998
  ident: 6567_CR5
  publication-title: Int J Bifurcation Chaos
  doi: 10.1142/S021812749800098X
– volume: 31
  start-page: 7111
  issue: 11
  year: 2019
  ident: 6567_CR7
  publication-title: Neural Comput Appl
  doi: 10.1007/s00521-018-3541-y
– volume: 50
  start-page: 102428
  year: 2020
  ident: 6567_CR10
  publication-title: J Inf Security Appl
– volume: 101
  start-page: 30
  year: 2018
  ident: 6567_CR20
  publication-title: Opt Laser Technol
  doi: 10.1016/j.optlastec.2017.10.024
– ident: 6567_CR21
– volume: 79
  start-page: 25613
  issue: 35
  year: 2020
  ident: 6567_CR17
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-020-09237-2
– volume: 87
  start-page: 127
  issue: 1
  year: 2017
  ident: 6567_CR12
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-016-3030-8
– volume: 59
  start-page: 3320
  issue: 10
  year: 2010
  ident: 6567_CR13
  publication-title: Comput Math Appl
  doi: 10.1016/j.camwa.2010.03.017
– volume: 121
  start-page: 105818
  year: 2020
  ident: 6567_CR15
  publication-title: Optics Laser Technol
  doi: 10.1016/j.optlastec.2019.105818
– ident: 6567_CR25
– ident: 6567_CR2
– volume: 149
  start-page: 148
  year: 2018
  ident: 6567_CR9
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2018.03.010
– volume: 91
  start-page: 359
  issue: 1
  year: 2018
  ident: 6567_CR23
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-017-3874-6
– volume: 14
  start-page: 2310
  issue: 11
  year: 2020
  ident: 6567_CR28
  publication-title: IET Image Proc
  doi: 10.1049/iet-ipr.2019.1340
– volume: 376
  start-page: 102
  issue: 2
  year: 2011
  ident: 6567_CR26
  publication-title: Phys Lett A
  doi: 10.1016/j.physleta.2011.10.040
– volume: 22
  start-page: 158
  issue: 2
  year: 2020
  ident: 6567_CR16
  publication-title: Entropy
  doi: 10.3390/e22020158
– volume: 79
  start-page: 26927
  issue: 37
  year: 2020
  ident: 6567_CR8
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-020-09058-3
– volume: 73
  start-page: 53
  year: 2015
  ident: 6567_CR24
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2015.03.022
– volume: 10
  start-page: 1
  issue: 3
  year: 2018
  ident: 6567_CR6
  publication-title: IEEE Photonics J
– volume: 79
  start-page: 25635
  issue: 35
  year: 2020
  ident: 6567_CR19
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-020-09233-6
– volume: 90
  start-page: 146
  year: 2017
  ident: 6567_CR3
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2016.10.006
– volume: 30
  start-page: 943
  issue: 2
  year: 2019
  ident: 6567_CR11
  publication-title: Multidimension Syst Signal Process
  doi: 10.1007/s11045-018-0589-x
SSID ssj0021753
Score 2.4436095
Snippet Based on the two-dimensional logistic map and two genetic operations, a new image encryption algorithm is suggested. Encrypted image is constructed in two...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 5823
SubjectTerms Application of Soft Computing
Artificial Intelligence
Computational Intelligence
Control
Engineering
Mathematical Logic and Foundations
Mechatronics
Robotics
Title Image encryption algorithm based on genetic operations and chaotic DNA encoding
URI https://link.springer.com/article/10.1007/s00500-021-06567-7
Volume 26
WOSCitedRecordID wos000741612500006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 1433-7479
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0021753
  issn: 1432-7643
  databaseCode: P5Z
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1433-7479
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0021753
  issn: 1432-7643
  databaseCode: K7-
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1433-7479
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0021753
  issn: 1432-7643
  databaseCode: BENPR
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1433-7479
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0021753
  issn: 1432-7643
  databaseCode: RSV
  dateStart: 19970401
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED90-qAPTqfi_Bh58E0LbfqVPg51KMIUHbK3kubDDbZ2tFXwvzfJ2uJABvqapqFc7u531-TuB3ApVEoRhYaljgeWJyNsqajatShOiMttWzLJDdlEOByS8Th6rorCivq2e30kaTx1U-ymW5XYlr5SoGBTmXe4CVsK7ogmbHh5fWvSrKr3pAoEVOyoALcqlfl9jVU4Wj0LNRAzaP_v4_ZhrwopUX-pAwewIdIOtGu6BlRZbwd2f_QePISnh7lyJUg9yr-M20B09p7l03IyRxraOFJDSrt0kSPKFmKpKQWiKUdsQjM9fDvs6wUyjX9HMBrcjW7urYpdwWIYO6WVeLbHiZ_4Lo0Ik0wEmo2KqgTLV_uDqaPT1yCxHU5YIHyfMkk8iROHSGlzxz2GVpql4gSQ9IhLA44dzjyPqhRKODyiCaXMFzgStAtOLeOYVZ3HNQHGLG56JhvxxUp8sRFfHHbhqnlnsey7sXb2db0tcWWDxZrpp3-bfgY7WBc9mH8v59Aq8w9xAdvss5wWeQ82H0OrZ1TwG0mh00k
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED90CuqD06k4P_Pgmxaa9GPt41DHhrOKDtlbSfPhBls71in435tk7XAgA31N01Aud_e7a3K_A7gSKqUIG6ZLHfctV4bEUlG1Y1GSBA63bckkN80mGlEU9Pvhc1EUlpe33csjSeOpF8VumqrEtvSVAgWbyrwb67DhKsTSjPkvr2-LNKvgnlSBgIodFeAWpTK_r7EMR8tnoQZiWtX_fdwe7BYhJWrOdWAf1kRag2rZrgEV1luDnR_cgwfw1BkrV4LUo-mXcRuIjt6z6XA2GCMNbRypIaVdusgRZRMx15Qc0ZQjNqCZHr6LmnqBTOPfIfRa973btlV0V7AYIXhmJa7t8sBLPIeGAZNM-LobFVUJlqf2h1Cs01c_sTEPmC88jzIZuJIkOJDS5tg5gkqapeIYkHQDh_qcYM5cl6oUSmAe0oRS5gkSCloHXMo4ZgXzuG6AMYoXnMlGfLESX2zEFzfqcL14ZzLn3Vg5-6bclriwwXzF9JO_Tb-ErXbvsRt3O9HDKWwTXQBh_sOcQWU2_RDnsMk-Z8N8emEU8RtBOdVd
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwED90iuiD06k4P_Pgm5a16ffjcA6HUgcO2VtJ8-EGWzu2Kvjfm6Rd2UAE8TVNQ7nc5e7X3P0O4IZLSBH6uksd8wxHhNiQUbVtEJwENjNNQQXTzSb8KAqGw7C_UsWvs92XV5JFTYNiaUrz1oyJVlX4pmhLTEOlF0gXKk3d34QtRyXSK7z--lZBrpKHUgYFMo6Uzrcsm_l5jXXXtH4vqt1Nt_7_Dz2A_TLURO1CNw5hg6cNqC_bOKDSqhuwt8JJeAQvvak8YpB8NP_Sxwkik_dsPs5HU6RcHkNySGqdKn5E2YwXGrRAJGWIjkimhjtRWy2QKb94DIPuw-D-0Si7LhgUYys3Esd0WOAmrk3CgArKPdWlikjg5cp9w8RSsNZLTIsF1OOuS6gIHIETKxDCZJZ9ArU0S_kpIOEENvEYthh1HCKhFbdYSBJCqMtxyEkTrKW8Y1oykqvGGJO44lLW4oul-GItvthvwm31zqzg4_h19t1yi-LSNhe_TD_72_Rr2Ol3uvFzL3o6h12s6iL075kLqOXzD34J2_QzHy_mV1onvwGfOt5B
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+encryption+algorithm+based+on+genetic+operations+and+chaotic+DNA+encoding&rft.jtitle=Soft+computing+%28Berlin%2C+Germany%29&rft.au=Qobbi%2C+Younes&rft.au=Jarjar%2C+Abdeltif&rft.au=Essaid%2C+Mohamed&rft.au=Benazzi%2C+Abdelhamid&rft.date=2022-06-01&rft.issn=1432-7643&rft.eissn=1433-7479&rft.volume=26&rft.issue=12&rft.spage=5823&rft.epage=5832&rft_id=info:doi/10.1007%2Fs00500-021-06567-7&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s00500_021_06567_7
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1432-7643&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1432-7643&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1432-7643&client=summon