High-Performance Encryption Algorithms for Dynamic Images Transmission
With the proliferation of the internet, the issue of image tampering has escalated, necessitating robust image encryption schemes. Despite the multitude of proposed image encryption algorithms, challenges such as slow computational speed, weak security, and suboptimal visibility persist. This study...
Gespeichert in:
| Veröffentlicht in: | Electronics (Basel) Jg. 13; H. 1; S. 131 |
|---|---|
| Hauptverfasser: | , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Basel
MDPI AG
01.01.2024
|
| Schlagworte: | |
| ISSN: | 2079-9292, 2079-9292 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | With the proliferation of the internet, the issue of image tampering has escalated, necessitating robust image encryption schemes. Despite the multitude of proposed image encryption algorithms, challenges such as slow computational speed, weak security, and suboptimal visibility persist. This study addresses these challenges by introducing a high-performance encryption algorithm tailored for dynamic images—QEDI (Quick Encryption Algorithm for Dynamic Images). QEDI leverages elliptic curve-based asymmetric encryption algorithms and hash algorithms. The process involves using a hash algorithm to calculate the hash of the dynamic image slated for encryption, employing the elliptic curve algorithm to generate public and private keys, and utilizing the asymmetric encryption algorithm to process the image hash, resulting in a signature ciphertext. This ciphertext is embedded into the dynamic image, completing the encryption process. To enhance the execution speed without compromising the image quality and visibility, the bit depth of the dynamic image is reduced before hash calculation, and custom information fields are encapsulated to embed the signature ciphertext into the dynamic image. Experimental evaluations, conducted within a dynamic image generation system, encompassed assessments of security, encryption algorithm execution time, and image quality. The results indicate that utilizing QEDI for dynamic image encryption yields better security compared to EDI (Encryption Algorithm for Dynamic Images). QEDI exhibits minimal impact on image quality, with a noteworthy 69.77% reduction in execution time compared to EDI. Furthermore, when compared to existing algorithms employing image conversion for encryption, QEDI-encrypted images demonstrate enhanced visibility, better image quality, and expedited encryption speed. |
|---|---|
| AbstractList | With the proliferation of the internet, the issue of image tampering has escalated, necessitating robust image encryption schemes. Despite the multitude of proposed image encryption algorithms, challenges such as slow computational speed, weak security, and suboptimal visibility persist. This study addresses these challenges by introducing a high-performance encryption algorithm tailored for dynamic images—QEDI (Quick Encryption Algorithm for Dynamic Images). QEDI leverages elliptic curve-based asymmetric encryption algorithms and hash algorithms. The process involves using a hash algorithm to calculate the hash of the dynamic image slated for encryption, employing the elliptic curve algorithm to generate public and private keys, and utilizing the asymmetric encryption algorithm to process the image hash, resulting in a signature ciphertext. This ciphertext is embedded into the dynamic image, completing the encryption process. To enhance the execution speed without compromising the image quality and visibility, the bit depth of the dynamic image is reduced before hash calculation, and custom information fields are encapsulated to embed the signature ciphertext into the dynamic image. Experimental evaluations, conducted within a dynamic image generation system, encompassed assessments of security, encryption algorithm execution time, and image quality. The results indicate that utilizing QEDI for dynamic image encryption yields better security compared to EDI (Encryption Algorithm for Dynamic Images). QEDI exhibits minimal impact on image quality, with a noteworthy 69.77% reduction in execution time compared to EDI. Furthermore, when compared to existing algorithms employing image conversion for encryption, QEDI-encrypted images demonstrate enhanced visibility, better image quality, and expedited encryption speed. |
| Audience | Academic |
| Author | Liu, Zilong Yang, Ying Wang, Juan Xiong, Xingchuang Jin, Shangzhong |
| Author_xml | – sequence: 1 givenname: Ying orcidid: 0009-0001-6434-043X surname: Yang fullname: Yang, Ying – sequence: 2 givenname: Xingchuang surname: Xiong fullname: Xiong, Xingchuang – sequence: 3 givenname: Zilong orcidid: 0000-0003-3637-1586 surname: Liu fullname: Liu, Zilong – sequence: 4 givenname: Shangzhong surname: Jin fullname: Jin, Shangzhong – sequence: 5 givenname: Juan surname: Wang fullname: Wang, Juan |
| BookMark | eNptUD1PwzAQtVCRKKW_gCUSc4rtS2N7rEq_pEowlDlyHDt1ldjFTof-e4zKwMDdcKe79-6e3iMaOe80Qs8EzwAEftWdVkPwzqpIABNMgNyhMcVM5IIKOvrTP6BpjCecQhDggMdovbXtMf_QwfjQS6d0tnIqXM-D9S5bdK0Pdjj2MUvr7O3qZG9Vtutlq2N2CNLF3saYoE_o3sgu6ulvnaDP9eqw3Ob7981uudjnCggZ8lIYgYuaFIY3QGuAEqSWuGHcMI6xrnltuErSGt6wel6XilKKiWSc8qI2BUzQy-3uOfivi45DdfKX4NLLigpCy0JgmCfU7IZqZacr64wfglQpG530J_eMTfMFY8mFpAsSAW4EFXyMQZvqHGwvw7UiuPoxufrHZPgG4Ltzxw |
| Cites_doi | 10.1016/j.optlaseng.2016.08.009 10.1016/j.optlaseng.2017.08.018 10.1016/j.apm.2023.10.004 10.1016/j.jvcir.2016.08.003 10.1109/ACCESS.2023.3242311 10.1016/j.aeue.2012.07.004 10.1016/j.sigpro.2016.03.021 10.1109/JPROC.2015.2458316 10.1109/TIFS.2008.922058 10.1016/j.optlaseng.2019.04.011 10.1016/j.optlaseng.2020.106371 10.1109/TIFS.2008.2007244 10.1007/978-3-642-55220-5_6 10.1007/s11831-018-9298-8 10.3390/sym14030443 10.1016/j.ijleo.2015.11.064 10.1016/j.aeue.2013.08.007 10.1016/j.eij.2015.10.001 10.1016/j.optlaseng.2013.12.003 10.1016/j.aej.2021.12.023 10.1016/j.neunet.2023.12.008 10.1007/s11042-020-09775-9 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION 7SP 8FD 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO HCIFZ L7M P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI |
| DOI | 10.3390/electronics13010131 |
| DatabaseName | CrossRef Electronics & Communications Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One Community College ProQuest Central SciTech Premium Collection Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition |
| DatabaseTitle | CrossRef Publicly Available Content Database Advanced Technologies & Aerospace Collection Technology Collection Technology Research Database ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic Advanced Technologies Database with Aerospace ProQuest One Academic (New) |
| DatabaseTitleList | Publicly Available Content Database CrossRef |
| Database_xml | – sequence: 1 dbid: PIMPY name: ProQuest Publicly Available Content url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2079-9292 |
| ExternalDocumentID | A779133113 10_3390_electronics13010131 |
| GeographicLocations | China |
| GeographicLocations_xml | – name: China |
| GroupedDBID | 5VS 8FE 8FG AAYXX ADMLS AFFHD AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS BENPR BGLVJ CCPQU CITATION HCIFZ IAO ITC KQ8 MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PQGLB PROAC 7SP 8FD ABUWG AZQEC DWQXO L7M PKEHL PQEST PQQKQ PQUKI |
| ID | FETCH-LOGICAL-c311t-69f904b14f8d32b3363aea0d78f7800eb8bf8c138d8d7b5b6c22201a78284bf43 |
| IEDL.DBID | BENPR |
| ISICitedReferencesCount | 2 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001139170000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2079-9292 |
| IngestDate | Fri Jul 25 23:38:31 EDT 2025 Tue Nov 04 18:23:03 EST 2025 Sat Nov 29 07:18:57 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c311t-69f904b14f8d32b3363aea0d78f7800eb8bf8c138d8d7b5b6c22201a78284bf43 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0009-0001-6434-043X 0000-0003-3637-1586 |
| OpenAccessLink | https://www.proquest.com/docview/2912649035?pq-origsite=%requestingapplication% |
| PQID | 2912649035 |
| PQPubID | 2032404 |
| ParticipantIDs | proquest_journals_2912649035 gale_infotracacademiconefile_A779133113 crossref_primary_10_3390_electronics13010131 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-01-01 |
| PublicationDateYYYYMMDD | 2024-01-01 |
| PublicationDate_xml | – month: 01 year: 2024 text: 2024-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Basel |
| PublicationPlace_xml | – name: Basel |
| PublicationTitle | Electronics (Basel) |
| PublicationYear | 2024 |
| Publisher | MDPI AG |
| Publisher_xml | – name: MDPI AG |
| References | Chan (ref_22) 2015; 103 Ye (ref_12) 2022; 61 Kong (ref_15) 2024; 125 Kaur (ref_3) 2020; 27 Kong (ref_14) 2023; 171 Niu (ref_8) 2013; 67 Benssalah (ref_11) 2021; 80 ref_13 Zhang (ref_5) 2014; 68 ref_18 ref_17 Alexan (ref_10) 2023; 11 ref_16 Rawat (ref_24) 2016; 127 Xu (ref_4) 2019; 121 Azam (ref_9) 2021; 137 Abbas (ref_23) 2016; 17 Belazi (ref_19) 2016; 128 Engel (ref_1) 2008; 3 ref_21 Enayatifar (ref_7) 2014; 56 Schonberg (ref_2) 2008; 3 Li (ref_6) 2018; 100 Cao (ref_25) 2017; 44 Chai (ref_20) 2017; 88 |
| References_xml | – volume: 88 start-page: 197 year: 2017 ident: ref_20 article-title: A novel chaos-based image encryption algorithm using DNA sequence operations publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2016.08.009 – volume: 100 start-page: 200 year: 2018 ident: ref_6 article-title: Error-free holographic frames encryption with CA pixel-permutation encoding algorithm publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2017.08.018 – volume: 125 start-page: 351 year: 2024 ident: ref_15 article-title: A class of 2n+ 1 dimensional simplest hamiltonian conservative chaotic systems and fast image encryption schemes publication-title: Appl. Math. Model. doi: 10.1016/j.apm.2023.10.004 – ident: ref_16 – volume: 44 start-page: 236 year: 2017 ident: ref_25 article-title: No embedding: A novel image cryptosystem for meaningful encryption publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2016.08.003 – volume: 11 start-page: 11541 year: 2023 ident: ref_10 article-title: Color image encryption through chaos and kaa map publication-title: IEEE Access doi: 10.1109/ACCESS.2023.3242311 – ident: ref_18 – volume: 67 start-page: 136 year: 2013 ident: ref_8 article-title: A hybrid chaotic system and cyclic elliptic curve for image encryption publication-title: AEU-Int. J. Electron. Commun. doi: 10.1016/j.aeue.2012.07.004 – volume: 128 start-page: 155 year: 2016 ident: ref_19 article-title: A novel image encryption scheme based on substitution-permutation network and chaos publication-title: Signal Process. doi: 10.1016/j.sigpro.2016.03.021 – volume: 103 start-page: 1883 year: 2015 ident: ref_22 article-title: Multivariate mutual information inspired by secret-key agreement publication-title: Proc. IEEE doi: 10.1109/JPROC.2015.2458316 – volume: 3 start-page: 173 year: 2008 ident: ref_1 article-title: An analysis of lightweight encryption schemes for fingerprint images publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2008.922058 – volume: 121 start-page: 203 year: 2019 ident: ref_4 article-title: A fast image encryption algorithm based on compressive sensing and hyperchaotic map publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.04.011 – volume: 137 start-page: 106371 year: 2021 ident: ref_9 article-title: A fast and secure public-key image encryption scheme based on Mordell elliptic curves publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2020.106371 – volume: 3 start-page: 749 year: 2008 ident: ref_2 article-title: Toward compression of encrypted images and video sequences publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2008.2007244 – ident: ref_21 doi: 10.1007/978-3-642-55220-5_6 – volume: 27 start-page: 15 year: 2020 ident: ref_3 article-title: A comprehensive review on image encryption techniques publication-title: Arch. Comput. Methods Eng. doi: 10.1007/s11831-018-9298-8 – ident: ref_13 doi: 10.3390/sym14030443 – volume: 127 start-page: 2282 year: 2016 ident: ref_24 article-title: Fast digital image encryption based on compressive sensing using structurally random matrices and Arnold transform technique publication-title: Optik doi: 10.1016/j.ijleo.2015.11.064 – volume: 68 start-page: 186 year: 2014 ident: ref_5 article-title: Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps publication-title: AEU-Int. J. Electron. Commun. doi: 10.1016/j.aeue.2013.08.007 – ident: ref_17 – volume: 17 start-page: 139 year: 2016 ident: ref_23 article-title: Image encryption based on independent component analysis and arnold’s cat map publication-title: Egypt. Inform. J. doi: 10.1016/j.eij.2015.10.001 – volume: 56 start-page: 83 year: 2014 ident: ref_7 article-title: Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2013.12.003 – volume: 61 start-page: 6785 year: 2022 ident: ref_12 article-title: Double image encryption algorithm based on compressive sensing and elliptic curve publication-title: Alex. Eng. J. doi: 10.1016/j.aej.2021.12.023 – volume: 171 start-page: 85 year: 2023 ident: ref_14 article-title: Memristor-induced hyperchaos, multiscroll and extreme multistability in fractional-order HNN: Image encryption and FPGA implementation publication-title: Neural Netw. doi: 10.1016/j.neunet.2023.12.008 – volume: 80 start-page: 2081 year: 2021 ident: ref_11 article-title: An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-020-09775-9 |
| SSID | ssj0000913830 |
| Score | 2.2846072 |
| Snippet | With the proliferation of the internet, the issue of image tampering has escalated, necessitating robust image encryption schemes. Despite the multitude of... |
| SourceID | proquest gale crossref |
| SourceType | Aggregation Database Index Database |
| StartPage | 131 |
| SubjectTerms | Algorithms Asymmetry Cryptography Curves Data encryption Data security Encryption Image coding Image enhancement Image manipulation Image processing Image quality Image transmission Mathematical analysis Methods Security Visibility Wavelet transforms |
| Title | High-Performance Encryption Algorithms for Dynamic Images Transmission |
| URI | https://www.proquest.com/docview/2912649035 |
| Volume | 13 |
| WOSCitedRecordID | wos001139170000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2079-9292 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913830 issn: 2079-9292 databaseCode: M~E dateStart: 20120101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 2079-9292 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913830 issn: 2079-9292 databaseCode: P5Z dateStart: 20120301 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2079-9292 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913830 issn: 2079-9292 databaseCode: BENPR dateStart: 20120301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Publicly Available Content customDbUrl: eissn: 2079-9292 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913830 issn: 2079-9292 databaseCode: PIMPY dateStart: 20120301 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NS8MwFH-4zYMe_Banc_QgeLGsbbImPcnUDQduFFGZXkrStCq4D9cqePFv96XtnMLw4qWUBtrm5eX3PpL8HsCRkoy7gjATb6RJlWeZQmgwRG9cEoYmPFsxvbti_T4fDDy_SLglxbbKGSZmQK3Goc6RNxzPRtvtWaR5Onk1ddUovbpalNAoQUUzlaGeV87aff_6O8uiWS85sXK6IYLxfWNeXSZB-LY13cwvk7QYmDNr01n_739uwFrhZxqtXDE2YSkabcHqD_bBbejoPR6mPz85YLRH4fQjwxCj9fKIb02fhomBzcZFXrje6A4RfxIjs3CoITrVtgO3nfbN-aVZlFUwQ2Lbqel6sWdRadOYK-JIQlwiImEpxmOG7mMkuYx5iHJTXDHZlG6IPoRlC_QlOJUxJbtQHo1H0R4YSinpRM1YcEqpCF2JES8Vtg65I8dhbhVOZpINJjl7RoBRhx6IYMFAVOFYSz_QcyudilAURwTwY5qlKmgxhuOJnSBVqM2kHxSTLgnmot__u_kAVhz0TfJMSg3K6fQtOoTl8D19Tqb1QofqUOp9tvHqNx_wmd_t-fdf2Y7WNw |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1NT9wwEB3xJVEOfLRU3ULBB1AvRJvY3tg5VGgFrFixrPYACHFJ_ZFQpG6gm1C0f4rf2HGy6YKEuHHgFslSIueN3huP7TcAO1YLGSomPHzQHreR7ynlyBCzcc0ESni5Y3rRE_2-vLyMBjPwWN-Fcccqa04sidreGlcjb9IoQO2OfNbav_vjua5Rbne1bqFRhcVJMn7AJVv-o3uI-O5S2jk6Ozj2Jl0FPMOCoPDCKI18rgOeSsuoZixkKlG-FTIVmD0lWupUmoBJK63QLR0alFA_UCilkuuUM3zvLMxzTn3n1T9oXf2v6TiPTcn8ytyIschvTnvZ5CgWgTO3eSaAL8tAqW2dlff2V1ZheZJFk3YV9mswk2QfYemJt-In6LgTLN5gei-CHGVmNC4ZkrR_X-Msil_DnOAwORxnanhjSHeI7JqTUr8x_l0hcR3O32Qin2Euu82SL0CstZomrVRJzrkyocb1PFeBKygklIqwAXs1kvFd5Q0S45rKAR-_AHwDvju0Y8ccxUgZNbkAgR9zHlxxWwiMH5wEa8BmjXY8oZQ8nkL99fXhbVg8Pjvtxb1u_2QDPlDMwqqa0SbMFaP75BssmL_FTT7aKqOXwM-3Dox_qtEtKg |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1NT9wwEB1RQBUcWqAgFij4AOqFaJPYGzsHVK1YVqyAVQ60glPwRwJIbIBNAO1f66_rOB9sK6HeOPQWyVIiZ57fmxnbMwC7RnERSModfFAOM6HrSGnJEL1xRTlKeLlj-vOUD4fi4iKMZuBXcxfGHqtsOLEkanOvbY687Yceanfo0k47rY9FRL3-94dHx3aQsjutTTuNCiInyeQFw7f8YNBDW-_5fv_o_PDYqTsMOJp6XuEEYRq6THksFYb6itKAykS6houUoyeVKKFSoT0qjDBcdVSgUU5dT6KsCqZSRvG9H2AOXXKKgd9cNDiLLl8zPLbipqBuVeqI0tBtTzvb5Cgdni1185ccvi0KpdL1P__P_2gJPtX-NelWC2IZZpJsBRb_qLr4Bfr2bIsTTW9MkKNMjycld5Lu3TXOorgZ5QSHSW-SydGtJoMR8m5OSmXHlWFTjKvw410msgaz2X2WrAMxxig_6aRSMMakDhRG-kx6NtWQ-D4PWrDfWDV-qKqGxBhtWRDEb4CgBd-s5WPLKcVYallfjcCP2epccZdzxBJOgrZgq7F8XJNNHk_NvvHv4R34iHiITwfDk01Y8NE9q5JJWzBbjJ-SrzCvn4vbfLxdQ5nA1Xsj4zc0Qzda |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=High-Performance+Encryption+Algorithms+for+Dynamic+Images+Transmission&rft.jtitle=Electronics+%28Basel%29&rft.au=Yang%2C+Ying&rft.au=Xiong%2C+Xingchuang&rft.au=Liu%2C+Zilong&rft.au=Jin%2C+Shangzhong&rft.date=2024-01-01&rft.pub=MDPI+AG&rft.eissn=2079-9292&rft.volume=13&rft.issue=1&rft.spage=131&rft_id=info:doi/10.3390%2Felectronics13010131&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2079-9292&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2079-9292&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2079-9292&client=summon |