Efficient image encryption scheme based on generalized logistic map for real time image processing

In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Journal of real-time image processing Ročník 17; číslo 6; s. 2139 - 2151
Hlavní autoři: Shah, Asif A., Parah, Shabir A., Rashid, Mamoon, Elhoseny, Mohamed
Médium: Journal Article
Jazyk:angličtina
Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.12.2020
Springer Nature B.V
Témata:
ISSN:1861-8200, 1861-8219
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most of the time, schemes are proposed with a high level of security. However, the challenge always remains the slower speeds due to their high complexity which makes them unusable in the applications of real-time images. In this paper, an efficient image encryption algorithm has been developed and tested for real-time images. The proposed scheme makes use of encryption with an efficient permutation technique based on a modular logistic map to bring down the size of the chaotic value vector, required to permute real-time image. We show that an efficient permutation is obtained using only N chaotic numbers for a square image with 3 N pixels ( N Pixels in each color bit plane). The algorithm makes use of a 192-bit key; divided into smaller blocks and each block selected chaotically to diffuse the pixel using multiple XOR operations. The experimental analysis reveals that the proposed algorithm is immune to various statistical and differential attacks such as entropy, histogram analysis, spectral characteristic analysis, etc. A comparison of the proposed scheme with some state-of-the-art techniques show that it performs better, and as such, can be utilized for efficient real-time image encryption.
AbstractList In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most of the time, schemes are proposed with a high level of security. However, the challenge always remains the slower speeds due to their high complexity which makes them unusable in the applications of real-time images. In this paper, an efficient image encryption algorithm has been developed and tested for real-time images. The proposed scheme makes use of encryption with an efficient permutation technique based on a modular logistic map to bring down the size of the chaotic value vector, required to permute real-time image. We show that an efficient permutation is obtained using only N chaotic numbers for a square image with 3 N pixels ( N Pixels in each color bit plane). The algorithm makes use of a 192-bit key; divided into smaller blocks and each block selected chaotically to diffuse the pixel using multiple XOR operations. The experimental analysis reveals that the proposed algorithm is immune to various statistical and differential attacks such as entropy, histogram analysis, spectral characteristic analysis, etc. A comparison of the proposed scheme with some state-of-the-art techniques show that it performs better, and as such, can be utilized for efficient real-time image encryption.
In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most of the time, schemes are proposed with a high level of security. However, the challenge always remains the slower speeds due to their high complexity which makes them unusable in the applications of real-time images. In this paper, an efficient image encryption algorithm has been developed and tested for real-time images. The proposed scheme makes use of encryption with an efficient permutation technique based on a modular logistic map to bring down the size of the chaotic value vector, required to permute real-time image. We show that an efficient permutation is obtained using only N chaotic numbers for a square image with 3N pixels (N Pixels in each color bit plane). The algorithm makes use of a 192-bit key; divided into smaller blocks and each block selected chaotically to diffuse the pixel using multiple XOR operations. The experimental analysis reveals that the proposed algorithm is immune to various statistical and differential attacks such as entropy, histogram analysis, spectral characteristic analysis, etc. A comparison of the proposed scheme with some state-of-the-art techniques show that it performs better, and as such, can be utilized for efficient real-time image encryption.
Author Rashid, Mamoon
Shah, Asif A.
Parah, Shabir A.
Elhoseny, Mohamed
Author_xml – sequence: 1
  givenname: Asif A.
  surname: Shah
  fullname: Shah, Asif A.
  organization: Department of Electronics and Instrumentation Technology, University of Kashmir
– sequence: 2
  givenname: Shabir A.
  surname: Parah
  fullname: Parah, Shabir A.
  email: shabireltr@gmail.com
  organization: Department of Electronics and Instrumentation Technology, University of Kashmir
– sequence: 3
  givenname: Mamoon
  surname: Rashid
  fullname: Rashid, Mamoon
  organization: School of Computer Science and Engineering, Lovely Professional University
– sequence: 4
  givenname: Mohamed
  surname: Elhoseny
  fullname: Elhoseny, Mohamed
  organization: Faculty of Computers and Information, Mansoura University
BookMark eNp9kE1LAzEQhoNUsK3-AU8Bz6vJfu9RSv2Aghc9h2R2sqZss2uSHuqvN3VFwUNPyQzvO-_MsyAzO1gk5JqzW85Ydec5L4o8YSlLWGzUSX5G5rwueVKnvJn9_hm7IAvvt4yVVZkVc6LWWhswaAM1O9khRQvuMAYzWOrhHXdIlfTY0lh3aNHJ3nzGsh8644MBupMj1YOjDmVPg4n6ac7oBkDvje0uybmWvcern3dJ3h7Wr6unZPPy-Ly63ySQ8SYkHGQLqOpMybxCrplktdSIspVpqUHlLFeZgloVUKVNC6yNd1aAVYlQFsCzJbmZ5sbojz36ILbD3tkYKdIm3l8VDcuiKp1U4AbvHWoxurixOwjOxJGlmFiKyFJ8sxR5NNX_TGCCPEIKTpr-tDWbrD7m2A7d31YnXF_aDI0R
CitedBy_id crossref_primary_10_1186_s12880_024_01546_4
crossref_primary_10_4018_IJISSCM_305852
crossref_primary_10_1007_s11042_022_12210_w
crossref_primary_10_1007_s11276_022_03162_y
crossref_primary_10_1016_j_jisa_2021_102854
crossref_primary_10_1016_j_eswa_2022_118067
crossref_primary_10_1117_1_JEI_32_4_043002
crossref_primary_10_1177_00375497221098417
crossref_primary_10_1007_s11042_023_14715_4
crossref_primary_10_1007_s11042_024_18222_y
crossref_primary_10_1080_09500340_2022_2101070
crossref_primary_10_1007_s11265_023_01853_z
crossref_primary_10_1186_s13638_022_02111_9
crossref_primary_10_1038_s41598_025_89397_z
crossref_primary_10_1109_ACCESS_2022_3183990
crossref_primary_10_1007_s12652_022_04339_1
crossref_primary_10_3233_JIFS_189415
crossref_primary_10_1007_s11071_021_06761_0
crossref_primary_10_1016_j_vlsi_2024_102302
crossref_primary_10_1117_1_JEI_33_2_023034
crossref_primary_10_1007_s11042_022_13444_4
crossref_primary_10_3390_computers11030039
crossref_primary_10_1007_s11554_024_01506_9
crossref_primary_10_1111_exsy_12894
crossref_primary_10_1109_TKDE_2021_3119140
crossref_primary_10_1007_s11277_023_10382_8
crossref_primary_10_1016_j_ijleo_2022_170152
crossref_primary_10_1155_2022_7952860
crossref_primary_10_1007_s00500_023_08829_y
crossref_primary_10_1088_1742_6596_1738_1_012054
crossref_primary_10_1155_2023_5767102
crossref_primary_10_1007_s11042_023_17034_w
crossref_primary_10_1002_cpe_6849
Cites_doi 10.1007/s11042-014-2115-y
10.1007/s11042-016-4253-x
10.1016/j.cnsns.2010.01.004
10.1007/978-3-319-44790-2_19
10.1109/TDSC.2017.2763593
10.1360/csb2006-51-12-1413
10.1007/s11045-015-0358-z
10.1016/j.optlaseng.2019.04.011
10.1016/j.dsp.2016.02.005
10.1007/s11042-016-4196-2
10.1016/S0303-2647(00)00083-6
10.3844/pisp.2011.31.35
10.1109/MCOM.1978.1089772
10.1016/j.aeue.2012.07.004
10.1109/TIT.1976.1055638
10.1504/IJSCCPS.2017.088770
10.1007/s11045-017-0490-z
10.1145/359340.359342
10.1007/s00530-013-0314-4
10.1016/j.dsp.2013.01.005
10.1016/j.imavis.2007.09.005
10.1016/S0030-4018(03)01261-6
10.1080/00207217.2014.954635
10.1080/00207217.2016.1242162
10.1093/acprof:oso/9780198507239.001.0001
10.1016/j.compeleceng.2013.11.006
10.1007/978-1-4419-5906-5_421
10.1109/ETNCC.2011.6255930
10.1007/978-3-642-04292-8_49
ContentType Journal Article
Copyright Springer-Verlag GmbH Germany, part of Springer Nature 2020
Springer-Verlag GmbH Germany, part of Springer Nature 2020.
Copyright_xml – notice: Springer-Verlag GmbH Germany, part of Springer Nature 2020
– notice: Springer-Verlag GmbH Germany, part of Springer Nature 2020.
DBID AAYXX
CITATION
8FE
8FG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
DOI 10.1007/s11554-020-01008-4
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
ProQuest Technology Collection
ProQuest One
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
DatabaseTitle CrossRef
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
Advanced Technologies & Aerospace Collection
Database_xml – sequence: 1
  dbid: P5Z
  name: ProQuest advanced technologies & aerospace journals
  url: https://search.proquest.com/hightechjournals
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1861-8219
EndPage 2151
ExternalDocumentID 10_1007_s11554_020_01008_4
GroupedDBID -59
-5G
-BR
-EM
-Y2
-~C
.VR
06D
0R~
0VY
1N0
203
29L
2J2
2JN
2JY
2KG
2KM
2LR
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5VS
67Z
6NX
8TC
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HLICF
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K7-
KDC
KOV
LLZTM
M4Y
MA-
N2Q
N9A
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
P9O
PF0
PT4
QOS
R89
R9I
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SCO
SDH
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7X
Z83
Z88
ZMTXR
~A9
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
8FE
8FG
AZQEC
DWQXO
GNUQQ
JQ2
P62
PKEHL
PQEST
PQQKQ
PQUKI
ID FETCH-LOGICAL-c319t-1cadceb83ba47e1f0a08afeeada26fcb404b3bc8b5c729dc0d0087ce76ec65c13
IEDL.DBID RSV
ISICitedReferencesCount 41
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000557219200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1861-8200
IngestDate Wed Nov 05 04:19:29 EST 2025
Sat Nov 29 03:23:16 EST 2025
Tue Nov 18 22:27:17 EST 2025
Fri Feb 21 02:39:40 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords Chaos
Logistic map
Encryption
Image processing
Real time
Computational complexity
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-1cadceb83ba47e1f0a08afeeada26fcb404b3bc8b5c729dc0d0087ce76ec65c13
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2918675903
PQPubID 2044148
PageCount 13
ParticipantIDs proquest_journals_2918675903
crossref_primary_10_1007_s11554_020_01008_4
crossref_citationtrail_10_1007_s11554_020_01008_4
springer_journals_10_1007_s11554_020_01008_4
PublicationCentury 2000
PublicationDate 20201200
2020-12-00
20201201
PublicationDateYYYYMMDD 2020-12-01
PublicationDate_xml – month: 12
  year: 2020
  text: 20201200
PublicationDecade 2020
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
– name: Heidelberg
PublicationTitle Journal of real-time image processing
PublicationTitleAbbrev J Real-Time Image Proc
PublicationYear 2020
Publisher Springer Berlin Heidelberg
Springer Nature B.V
Publisher_xml – name: Springer Berlin Heidelberg
– name: Springer Nature B.V
References Gaurav (CR34) 2012; 2
Blackedge, Ahmed, Farooq (CR40) 2010
Navnish, Amitabh, Babloo (CR4) 2011; 2
Manogaran, Priyan (CR7) 2017
Akhoon, Parah, Sheikh, Bhat (CR19) 2016; 77
Tong, Cui (CR32) 2008; 26
CR37
Sinha, Singh (CR39) 2003; 218
Stallings (CR5) 2003
CR35
Rivest, Shamir, Adleman (CR36) 1978; 21
Parah, Sheikh, Bhat (CR10) 2013; 2
El-Latif, Niu (CR56) 2013; 67
Debbarma, Kumari, Raheja (CR46) 2013; 2
Leier, Richter, Banzhaf, Rauhe (CR43) 2000; 57
Ahad, Parah, Sheikh, Loan, Bhat (CR21) 2016; 76
Parah, Sheikh, Bhat (CR13) 2014; 40
Joshi, Kumari (CR52) 2015; 4
CR9
CR48
Patro, Acharya (CR58) 2019; 46
Sheikh, Parah, Bhat (CR11) 2013; 4
CR45
Auyporn, Vongpradhip (CR53) 2015; 3
Loan, Parah, Sheikh, Bhat (CR20) 2016; 53
Maniyath, Supriya (CR44) 2011; 2
Kim, Lee, Ling, Tan, Wang (CR1) 2017; 16
CR41
Nilsson, Johansson, Wagner (CR27) 2019; 2019
Nazir, Parah, Sheikh, Farhana, Bhat (CR17) 2015; 76
Parah, Sheikh, Bhat (CR8) 2012; 49
Parvin, Seyedarabi, Shamsi (CR31) 2016; 75
Hellman (CR2) 1978; 16
Pareek, Patidar, Sud (CR54) 2013; 23
Goubin, Patarin, Yang, van Tilborg, Jajodia (CR26) 2011
Waghmare, Bhagat, Surve, Kalgutkar (CR49) 2016; 5
CR16
Forouzan, Mukhopadhyay (CR6) 2011
CR12
Sheikh, Parah, Bhat (CR15) 2015; 102
CR51
Xiao, Lu, Qin, Lai (CR42) 2006; 51
Shah, Parah (CR50) 2017; 2
Xu, Sun, Cao, Zhu (CR25) 2019; 121
Parah, Sheikh, Bhat (CR18) 2015; 28
Farheen, Bikiran, Shobha, Jitendranath (CR38) 2017; 5
Norouzi, Seyedzadeh, Mirzakuchaki, Mosavi (CR57) 2014; 20
Parah, Sheikh, Bhat (CR14) 2014; 14
Sheikh, Sheikh, Assad, Bhat (CR23) 2016; 104
CR29
CR28
Diffie, Hellman (CR3) 1976; 22
Sheikh, Parah, Bhat (CR22) 2016; 660
Bhat, Parah, Sheikh, Loan (CR24) 2017; 29
Afolabi, Adagunodo (CR33) 2011; 2
Sakthidasan, Krishna (CR47) 2011; 1
Yang, Wong, Liao, Zhang, Wei (CR55) 2010; 15
Hilborn (CR30) 2000
N Debbarma (1008_CR46) 2013; 2
SR Maniyath (1008_CR44) 2011; 2
JA Sheikh (1008_CR11) 2013; 4
JM Blackedge (1008_CR40) 2010
A Nilsson (1008_CR27) 2019; 2019
1008_CR37
1008_CR35
JA Sheikh (1008_CR15) 2015; 102
AA Shah (1008_CR50) 2017; 2
A Sinha (1008_CR39) 2003; 218
KAK Patro (1008_CR58) 2019; 46
H Yang (1008_CR55) 2010; 15
BA Forouzan (1008_CR6) 2011
SA Parah (1008_CR8) 2012; 49
1008_CR29
G Navnish (1008_CR4) 2011; 2
1008_CR28
Z Parvin (1008_CR31) 2016; 75
F Ahad (1008_CR21) 2016; 76
Q Xu (1008_CR25) 2019; 121
A Nazir (1008_CR17) 2015; 76
NK Pareek (1008_CR54) 2013; 23
1008_CR9
AO Afolabi (1008_CR33) 2011; 2
A Joshi (1008_CR52) 2015; 4
SA Parah (1008_CR18) 2015; 28
JA Akhoon (1008_CR19) 2016; 77
1008_CR51
N Loan (1008_CR20) 2016; 53
1008_CR16
RC Hilborn (1008_CR30) 2000
1008_CR12
W Diffie (1008_CR3) 1976; 22
SA Parah (1008_CR13) 2014; 40
CTG Manogaran (1008_CR7) 2017
SA Parah (1008_CR14) 2014; 14
S Gaurav (1008_CR34) 2012; 2
A Leier (1008_CR43) 2000; 57
K Sakthidasan (1008_CR47) 2011; 1
S Parah (1008_CR10) 2013; 2
1008_CR41
AAA El-Latif (1008_CR56) 2013; 67
M Kim (1008_CR1) 2017; 16
JA Sheikh (1008_CR23) 2016; 104
1008_CR48
1008_CR45
A Waghmare (1008_CR49) 2016; 5
G Xiao (1008_CR42) 2006; 51
L Goubin (1008_CR26) 2011
X Tong (1008_CR32) 2008; 26
RL Rivest (1008_CR36) 1978; 21
JA Sheikh (1008_CR22) 2016; 660
W Stallings (1008_CR5) 2003
GM Bhat (1008_CR24) 2017; 29
W Auyporn (1008_CR53) 2015; 3
M Hellman (1008_CR2) 1978; 16
S Farheen (1008_CR38) 2017; 5
B Norouzi (1008_CR57) 2014; 20
References_xml – ident: CR45
– volume: 75
  start-page: 10631
  year: 2016
  end-page: 10648
  ident: CR31
  article-title: A new secure and sensitive image encryption scheme based on new substitution with chaotic function
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-014-2115-y
– volume: 3
  start-page: 8
  issue: 1
  year: 2015
  end-page: 13
  ident: CR53
  article-title: A robust image encryption method based on bit plane decomposition and multiple chaotic maps
  publication-title: Int. J. Signal Process. Syst.
– volume: 5
  start-page: 8807
  issue: 4
  year: 2017
  end-page: 8811
  ident: CR38
  article-title: A study on data encryption using AES and RSA
  publication-title: Int. J. Innov. Res. Comput. Commun. Eng.
– volume: 76
  start-page: 10599
  issue: 8
  year: 2015
  end-page: 10633
  ident: CR17
  article-title: Information hiding in medical images: a robust medical image watermarking system for e-healthcare
  publication-title: Multimedia Tools Appl.
– volume: 2019
  start-page: 238
  issue: 1
  year: 2019
  end-page: 258
  ident: CR27
  article-title: Error amplification in code-based cryptography
  publication-title: IACR Trans. Cryptogr. Hardw. Embed Syst.
– volume: 49
  start-page: 10141
  year: 2012
  end-page: 10146
  ident: CR8
  article-title: On the realization of a secure, high capacity data embedding technique using joint top-down and down-top embedding approach
  publication-title: Elixir Comp. Sci. Eng.
– ident: CR16
– ident: CR51
– ident: CR12
– volume: 2
  start-page: 1
  issue: 11
  year: 2013
  end-page: 11
  ident: CR10
  article-title: High capacity data embedding using joint intermediate significant bit and least significant technique
  publication-title: Int. J. Inf. Eng. Appl.
– volume: 77
  start-page: 185
  year: 2016
  end-page: 207
  ident: CR19
  article-title: Information hiding in edges: a high capacity information hiding technique using hybrid edge detection
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-016-4253-x
– ident: CR35
– volume: 15
  start-page: 3507
  issue: 11
  year: 2010
  end-page: 3517
  ident: CR55
  article-title: A fast image encryption and authentication scheme based on chaotic maps
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
  doi: 10.1016/j.cnsns.2010.01.004
– ident: CR29
– year: 2003
  ident: CR5
  publication-title: Cryptography and network security: principles and practice
– volume: 660
  start-page: 427
  year: 2016
  end-page: 452
  ident: CR22
  article-title: StegNmark: a joint Stego-watermark approach for early tamper detection
  publication-title: Intell. Techn. Signal Process. Multimedia Secur.
  doi: 10.1007/978-3-319-44790-2_19
– year: 2011
  ident: CR6
  publication-title: Cryptography and network security (Sie)
– volume: 16
  start-page: 743
  issue: 5
  year: 2017
  end-page: 756
  ident: CR1
  article-title: Private compound wildcard queries using fully homomorphic encryption
  publication-title: IEEE Trans. Depend. Secure. Comput.
  doi: 10.1109/TDSC.2017.2763593
– volume: 2
  start-page: 229
  issue: 1
  year: 2012
  end-page: 238
  ident: CR34
  article-title: Secure file transmission scheme based on hybrid encryption technique
  publication-title: Int. J. Manag. IT Eng.
– volume: 51
  start-page: 1413
  issue: 12
  year: 2006
  end-page: 1420
  ident: CR42
  article-title: New field of cryptography: DNA cryptography
  publication-title: Chin. Sci. Bull.
  doi: 10.1360/csb2006-51-12-1413
– year: 2010
  ident: CR40
  publication-title: Chaotic image encryption algorithm based on frequency domain scrambling
– volume: 28
  start-page: 549
  year: 2015
  end-page: 572
  ident: CR18
  article-title: Hiding in encrypted images: a three-tier security data hiding system
  publication-title: Multidimens. Syst. Signal Process.
  doi: 10.1007/s11045-015-0358-z
– ident: CR9
– volume: 121
  start-page: 203
  year: 2019
  end-page: 214
  ident: CR25
  article-title: A fast image encryption algorithm based on compressive sensing and hyperchaotic map
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2019.04.011
– volume: 53
  start-page: 11
  year: 2016
  end-page: 24
  ident: CR20
  article-title: Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing
  publication-title: Digital Signal Process.
  doi: 10.1016/j.dsp.2016.02.005
– volume: 4
  start-page: 113
  issue: 13
  year: 2013
  end-page: 118
  ident: CR11
  article-title: Data hiding in color images: a high capacity data hiding technique for covert communication
  publication-title: Comput. Eng. Intell. Syst.
– volume: 1
  start-page: 137
  issue: 2
  year: 2011
  end-page: 141
  ident: CR47
  article-title: A new chaotic algorithm for image encryption and decryption of digital color images
  publication-title: Int. J. Inf. Educ. Technol.
– volume: 76
  start-page: 3943
  year: 2016
  end-page: 3975
  ident: CR21
  article-title: Reversible and high capacity data hiding technique for e-healthcare applications
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-016-4196-2
– volume: 57
  start-page: 13
  issue: 1
  year: 2000
  end-page: 22
  ident: CR43
  article-title: Cryptography with DNA binary strands
  publication-title: Biosystems
  doi: 10.1016/S0303-2647(00)00083-6
– volume: 14
  start-page: 38
  issue: 2
  year: 2014
  end-page: 44
  ident: CR14
  article-title: ‘A secure and efficient spatial domain data hiding technique based on pixel adjustment
  publication-title: Am. J. Eng. Technol. Res.
– volume: 2
  start-page: 31
  issue: 1
  year: 2011
  end-page: 35
  ident: CR33
  article-title: Implementation of an improved data encryption algorithm in a web-based learning system
  publication-title: Phys. Int.
  doi: 10.3844/pisp.2011.31.35
– ident: CR37
– volume: 16
  start-page: 24
  issue: 6
  year: 1978
  end-page: 32
  ident: CR2
  article-title: An overview of public-key cryptography
  publication-title: IEEE Commun. Soc. Mag.
  doi: 10.1109/MCOM.1978.1089772
– volume: 67
  start-page: 136
  issue: 2
  year: 2013
  end-page: 143
  ident: CR56
  article-title: A hybrid chaotic system and cyclic elliptic curve for image encryption
  publication-title: AEU Int. J. Electron. Commun.
  doi: 10.1016/j.aeue.2012.07.004
– volume: 22
  start-page: 644
  issue: 6
  year: 1976
  end-page: 654
  ident: CR3
  article-title: New directions in cryptography
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.1976.1055638
– volume: 2
  start-page: 73
  issue: 1
  year: 2017
  end-page: 94
  ident: CR50
  article-title: Chaos-based novel cryptographic technique based on a new logistic map
  publication-title: Int. J. Soc. Comput. Cyber Phys. Syst.
  doi: 10.1504/IJSCCPS.2017.088770
– volume: 29
  start-page: 1095
  issue: 3
  year: 2017
  end-page: 1117
  ident: CR24
  article-title: Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks
  publication-title: Multidimension. Syst. Signal Process.
  doi: 10.1007/s11045-017-0490-z
– volume: 21
  start-page: 120
  issue: 2
  year: 1978
  end-page: 126
  ident: CR36
  article-title: A method for obtaining digital signatures and public-key cryptosystems
  publication-title: Commun. ACM
  doi: 10.1145/359340.359342
– volume: 2
  start-page: 387
  issue: 4
  year: 2013
  end-page: 392
  ident: CR46
  article-title: 2D Chaos based color image encryption using pseudorandom key generation
  publication-title: Chaos
– volume: 20
  start-page: 45
  issue: 1
  year: 2014
  end-page: 64
  ident: CR57
  article-title: A novel image encryption based on a hash function with only a two-round diffusion process
  publication-title: Multimedia Syst.
  doi: 10.1007/s00530-013-0314-4
– volume: 23
  start-page: 894
  issue: 8
  year: 2013
  end-page: 901
  ident: CR54
  article-title: Diffusion-substitution based gray image encryption algorithm
  publication-title: Digital Signal Process.
  doi: 10.1016/j.dsp.2013.01.005
– volume: 46
  start-page: 23
  year: 2019
  end-page: 41
  ident: CR58
  article-title: An efficient colour image encryption scheme based on 1-D chaotic maps
  publication-title: J. Inf. Secur. Appl.
– volume: 26
  start-page: 843
  issue: 6
  year: 2008
  end-page: 850
  ident: CR32
  article-title: Image encryption with compound chaotic sequence cipher shifting dynamically
  publication-title: Image Vis. Comput.
  doi: 10.1016/j.imavis.2007.09.005
– volume: 4
  start-page: 489
  issue: 9
  year: 2015
  end-page: 494
  ident: CR52
  article-title: Encryption of RGB image using Arnold transform and involuntary matrices
  publication-title: IJARCCE
– ident: CR48
– volume: 2
  start-page: 1
  issue: 1
  year: 2011
  end-page: 4
  ident: CR4
  article-title: Information security: encryption and decryption with polyalphabetic substitution
  publication-title: Int. J. Comput. Sci. Commun.
– volume: 2
  start-page: 258
  year: 2011
  end-page: 270
  ident: CR44
  article-title: An uncompressed image encryption algorithm based on DNA sequences
  publication-title: Comput. Sci. Inf. Technol.
– volume: 218
  start-page: 229
  issue: 4–6
  year: 2003
  end-page: 234
  ident: CR39
  article-title: A technique for image encryption using a digital signature
  publication-title: Opt. Commun.
  doi: 10.1016/S0030-4018(03)01261-6
– volume: 102
  start-page: 1253
  issue: 8
  year: 2015
  end-page: 1266
  ident: CR15
  article-title: A secure and robust information hiding technique for covert communication
  publication-title: Int. J. Electron.
  doi: 10.1080/00207217.2014.954635
– volume: 104
  start-page: 659
  issue: 4
  year: 2016
  end-page: 672
  ident: CR23
  article-title: Realization and robustness evaluation of a blind spatial domain watermarking technique
  publication-title: Int. J. Electron.
  doi: 10.1080/00207217.2016.1242162
– year: 2000
  ident: CR30
  publication-title: Chaos and nonlinear dynamics: an introduction for scientists and engineers
  doi: 10.1093/acprof:oso/9780198507239.001.0001
– volume: 5
  start-page: 64
  issue: 4
  year: 2016
  end-page: 68
  ident: CR49
  article-title: Chaos based image encryption and decryption
  publication-title: Int. J. Adv. Res. Comput. Commun. Eng.
– volume: 40
  start-page: 70
  issue: 1
  year: 2014
  end-page: 82
  ident: CR13
  article-title: Data hiding in scrambled images: a new double-layer security data hiding technique
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2013.11.006
– start-page: 141
  year: 2017
  end-page: 154
  ident: CR7
  article-title: Centralized fog computing security platform for IoT and cloud in the healthcare system
  publication-title: Exploring the convergence of big data and the internet of things
– ident: CR28
– ident: CR41
– year: 2011
  ident: CR26
  article-title: Multivariate cryptography
  publication-title: Encyclopedia of cryptography and security
  doi: 10.1007/978-1-4419-5906-5_421
– volume: 2
  start-page: 1
  issue: 1
  year: 2011
  ident: 1008_CR4
  publication-title: Int. J. Comput. Sci. Commun.
– volume: 16
  start-page: 743
  issue: 5
  year: 2017
  ident: 1008_CR1
  publication-title: IEEE Trans. Depend. Secure. Comput.
  doi: 10.1109/TDSC.2017.2763593
– volume-title: Chaos and nonlinear dynamics: an introduction for scientists and engineers
  year: 2000
  ident: 1008_CR30
  doi: 10.1093/acprof:oso/9780198507239.001.0001
– volume: 218
  start-page: 229
  issue: 4–6
  year: 2003
  ident: 1008_CR39
  publication-title: Opt. Commun.
  doi: 10.1016/S0030-4018(03)01261-6
– volume: 1
  start-page: 137
  issue: 2
  year: 2011
  ident: 1008_CR47
  publication-title: Int. J. Inf. Educ. Technol.
– volume: 22
  start-page: 644
  issue: 6
  year: 1976
  ident: 1008_CR3
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.1976.1055638
– volume-title: Cryptography and network security (Sie)
  year: 2011
  ident: 1008_CR6
– volume: 76
  start-page: 10599
  issue: 8
  year: 2015
  ident: 1008_CR17
  publication-title: Multimedia Tools Appl.
– volume: 104
  start-page: 659
  issue: 4
  year: 2016
  ident: 1008_CR23
  publication-title: Int. J. Electron.
  doi: 10.1080/00207217.2016.1242162
– ident: 1008_CR51
– start-page: 141
  volume-title: Exploring the convergence of big data and the internet of things
  year: 2017
  ident: 1008_CR7
– volume-title: Encyclopedia of cryptography and security
  year: 2011
  ident: 1008_CR26
  doi: 10.1007/978-1-4419-5906-5_421
– ident: 1008_CR35
– ident: 1008_CR41
– ident: 1008_CR45
  doi: 10.1109/ETNCC.2011.6255930
– volume-title: Cryptography and network security: principles and practice
  year: 2003
  ident: 1008_CR5
– volume: 20
  start-page: 45
  issue: 1
  year: 2014
  ident: 1008_CR57
  publication-title: Multimedia Syst.
  doi: 10.1007/s00530-013-0314-4
– volume: 121
  start-page: 203
  year: 2019
  ident: 1008_CR25
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2019.04.011
– volume: 5
  start-page: 8807
  issue: 4
  year: 2017
  ident: 1008_CR38
  publication-title: Int. J. Innov. Res. Comput. Commun. Eng.
– ident: 1008_CR28
– volume: 2
  start-page: 229
  issue: 1
  year: 2012
  ident: 1008_CR34
  publication-title: Int. J. Manag. IT Eng.
– volume: 53
  start-page: 11
  year: 2016
  ident: 1008_CR20
  publication-title: Digital Signal Process.
  doi: 10.1016/j.dsp.2016.02.005
– volume: 75
  start-page: 10631
  year: 2016
  ident: 1008_CR31
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-014-2115-y
– volume: 57
  start-page: 13
  issue: 1
  year: 2000
  ident: 1008_CR43
  publication-title: Biosystems
  doi: 10.1016/S0303-2647(00)00083-6
– volume: 46
  start-page: 23
  year: 2019
  ident: 1008_CR58
  publication-title: J. Inf. Secur. Appl.
– volume: 2
  start-page: 31
  issue: 1
  year: 2011
  ident: 1008_CR33
  publication-title: Phys. Int.
  doi: 10.3844/pisp.2011.31.35
– volume: 4
  start-page: 489
  issue: 9
  year: 2015
  ident: 1008_CR52
  publication-title: IJARCCE
– volume: 3
  start-page: 8
  issue: 1
  year: 2015
  ident: 1008_CR53
  publication-title: Int. J. Signal Process. Syst.
– volume: 23
  start-page: 894
  issue: 8
  year: 2013
  ident: 1008_CR54
  publication-title: Digital Signal Process.
  doi: 10.1016/j.dsp.2013.01.005
– volume-title: Chaotic image encryption algorithm based on frequency domain scrambling
  year: 2010
  ident: 1008_CR40
– volume: 51
  start-page: 1413
  issue: 12
  year: 2006
  ident: 1008_CR42
  publication-title: Chin. Sci. Bull.
  doi: 10.1360/csb2006-51-12-1413
– ident: 1008_CR29
  doi: 10.1007/978-3-642-04292-8_49
– volume: 5
  start-page: 64
  issue: 4
  year: 2016
  ident: 1008_CR49
  publication-title: Int. J. Adv. Res. Comput. Commun. Eng.
– volume: 29
  start-page: 1095
  issue: 3
  year: 2017
  ident: 1008_CR24
  publication-title: Multidimension. Syst. Signal Process.
  doi: 10.1007/s11045-017-0490-z
– ident: 1008_CR48
– ident: 1008_CR9
– volume: 4
  start-page: 113
  issue: 13
  year: 2013
  ident: 1008_CR11
  publication-title: Comput. Eng. Intell. Syst.
– volume: 660
  start-page: 427
  year: 2016
  ident: 1008_CR22
  publication-title: Intell. Techn. Signal Process. Multimedia Secur.
  doi: 10.1007/978-3-319-44790-2_19
– volume: 26
  start-page: 843
  issue: 6
  year: 2008
  ident: 1008_CR32
  publication-title: Image Vis. Comput.
  doi: 10.1016/j.imavis.2007.09.005
– volume: 2
  start-page: 1
  issue: 11
  year: 2013
  ident: 1008_CR10
  publication-title: Int. J. Inf. Eng. Appl.
– volume: 67
  start-page: 136
  issue: 2
  year: 2013
  ident: 1008_CR56
  publication-title: AEU Int. J. Electron. Commun.
  doi: 10.1016/j.aeue.2012.07.004
– ident: 1008_CR12
– volume: 28
  start-page: 549
  year: 2015
  ident: 1008_CR18
  publication-title: Multidimens. Syst. Signal Process.
  doi: 10.1007/s11045-015-0358-z
– volume: 2019
  start-page: 238
  issue: 1
  year: 2019
  ident: 1008_CR27
  publication-title: IACR Trans. Cryptogr. Hardw. Embed Syst.
– ident: 1008_CR37
– volume: 21
  start-page: 120
  issue: 2
  year: 1978
  ident: 1008_CR36
  publication-title: Commun. ACM
  doi: 10.1145/359340.359342
– ident: 1008_CR16
– volume: 16
  start-page: 24
  issue: 6
  year: 1978
  ident: 1008_CR2
  publication-title: IEEE Commun. Soc. Mag.
  doi: 10.1109/MCOM.1978.1089772
– volume: 77
  start-page: 185
  year: 2016
  ident: 1008_CR19
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-016-4253-x
– volume: 15
  start-page: 3507
  issue: 11
  year: 2010
  ident: 1008_CR55
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
  doi: 10.1016/j.cnsns.2010.01.004
– volume: 49
  start-page: 10141
  year: 2012
  ident: 1008_CR8
  publication-title: Elixir Comp. Sci. Eng.
– volume: 102
  start-page: 1253
  issue: 8
  year: 2015
  ident: 1008_CR15
  publication-title: Int. J. Electron.
  doi: 10.1080/00207217.2014.954635
– volume: 40
  start-page: 70
  issue: 1
  year: 2014
  ident: 1008_CR13
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2013.11.006
– volume: 14
  start-page: 38
  issue: 2
  year: 2014
  ident: 1008_CR14
  publication-title: Am. J. Eng. Technol. Res.
– volume: 76
  start-page: 3943
  year: 2016
  ident: 1008_CR21
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-016-4196-2
– volume: 2
  start-page: 73
  issue: 1
  year: 2017
  ident: 1008_CR50
  publication-title: Int. J. Soc. Comput. Cyber Phys. Syst.
  doi: 10.1504/IJSCCPS.2017.088770
– volume: 2
  start-page: 258
  year: 2011
  ident: 1008_CR44
  publication-title: Comput. Sci. Inf. Technol.
– volume: 2
  start-page: 387
  issue: 4
  year: 2013
  ident: 1008_CR46
  publication-title: Chaos
SSID ssj0067635
Score 2.4753442
Snippet In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2139
SubjectTerms Algorithms
Computer Graphics
Computer Science
Cryptography
Data encryption
Digital signatures
Digitization
Image processing
Image Processing and Computer Vision
Literature reviews
Multimedia Information Systems
Pattern Recognition
Permutations
Pixels
Prime numbers
Real time
Signal,Image and Speech Processing
Special Issue Paper
SummonAdditionalLinks – databaseName: Advanced Technologies & Aerospace Database
  dbid: P5Z
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEA6-Dl58i-uLHLxpsN2mTXoSEcWDLHtQES8lmSay4D7cXQX99c60qYuCXjz2FdrOZL7JY76PsSPpfawgdaKtjRLSKCsMAolQsVNeWlC6ItK-v1Gdjn54yLthwm0StlU2MbEK1OUQaI78tJ0T9VqaR8nZ6EWQahStrgYJjXm2SCwJJN3QTR-bSJwR2RoNuHQWC0S6KBTN1KVzBKSCBk8R8dsI-R2YZtnmjwXSCneuVv_7xmtsJWSc_Lx2kXU25wYbbLVRc-Chc28ye1mxSSAI8V4fowzH0-P3KqJwHAK7vuMEeSXH46earLr3gYd1DVEPeN-MOKbAHNPQZ06a9aGdUV2LgF-3xe6uLm8vrkVQYBCAXXMqYjAlOKsTa6RysY9MpI136H2mnXmwMpI2saBtCpiklxCVRHEHTmUOshTiZJstDIYDt8O4NJgMeBnnNncSJGiXAWZrYLQH6ZOoxeLm9xcQ6MlJJeO5mBErk8kKNFlRmayQLXb89cyoJuf48-79xk5F6KiTYmakFjtpLD27_Htru3-3tseW2-Rc1caXfbYwHb-6A7YEb9PeZHxYueknmT7u2A
  priority: 102
  providerName: ProQuest
Title Efficient image encryption scheme based on generalized logistic map for real time image processing
URI https://link.springer.com/article/10.1007/s11554-020-01008-4
https://www.proquest.com/docview/2918675903
Volume 17
WOSCitedRecordID wos000557219200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1861-8219
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0067635
  issn: 1861-8200
  databaseCode: K7-
  dateStart: 20060301
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest advanced technologies & aerospace journals
  customDbUrl:
  eissn: 1861-8219
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0067635
  issn: 1861-8200
  databaseCode: P5Z
  dateStart: 20060301
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1861-8219
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0067635
  issn: 1861-8200
  databaseCode: BENPR
  dateStart: 20060301
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1861-8219
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0067635
  issn: 1861-8200
  databaseCode: RSV
  dateStart: 20060301
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB58HbxYn1itJQdvGtjtZjfZo0pFUErxhXhZkmkiBVtLWwX99U72YVFU0MtCdrMhTGbmm5DMNwD7wrlQYmx5S2nJhZaGawISLkMrnTAoVU6kfXshOx11d5d2y6SwSXXbvTqSzD31LNnNQx_3253AM9JwMQ-LBHfKF2y4vLqt_G_iKdb8NkslISd8C8pUme_H-AxHsxjzy7Fojjantf_NcxVWyuiSHRXqsAZzdrgOtapyAysNeQNMO2eOIMBh_QF5FEavx6-592C03bUDyzy89Ri1Hwpi6v4bNYt8oT6ygR4xCncZhZyPzNenL8cZFXkHNN9NuDltX5-c8bLaAkcywykPUffQGhUZLaQNXaADpZ0lTdOtxKERgTCRQWVipIC8h0HP09mhlYnFJMYw2oKF4dPQbgMTmoDfiTA1qRUoUNkEKTJDrRwKFwV1CCuhZ1hSkfuKGI_ZjETZCzEjIWa5EDNRh4OPf0YFEcevvRvVWmalUU6yVurZ--I0iOpwWK3d7PPPo-38rfsuLLf88ueXXhqwMB0_2z1YwpdpfzJuwuJxu9O9bML8ueT07Mb3zVyB3wENtufq
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LTxsxEB4BrQSXpi9EWmh9gFOxug9n7T0ghHgIlDTiQBG3rT1ro5WSkCYpKP1R_EbG-yBqpXLj0KN3vSOt_XketucbgG3hXCixY3mktORCS8M1GRIuQyudMChVSaR92ZP9vrq6Ss-X4L7JhfHXKhudWCrq_Ab9HvnXKPXUa500iPfHP7mvGuVPV5sSGhUsunZ-RyHbdO_siOZ3J4pOji8OT3ldVYAjwW3GQ9Q5WqNio4W0oQt0oLSzNKI6ShwaEQgTG1Smg-R45hjknrYNrUwsJh0MY5K7DC9ErKRfV13JG82feHI3H-CpJORkWYM6SadK1fOGm_tgLfB8Olz8aQgX3u1fB7KlnTtp_W8j9Bpe1R41O6iWwBtYsqO30GqqVbBaeb0Dc1yyZZCRZcWQtCijx5N5qTEZhfh2aJk36Tmj9nVFxl38pmaVI1UgG-oxIxefkZs9YLOC-ldyxlWuBY3me_j-LH-6Diujm5HdACY0OTtOhKlJrUCByiZI3ihq5VC4OGhD2Ex3hjX9uq8CMsgWxNEeIhlBJCshkok2fHn8ZlyRjzzZe7PBRVYromm2AEUbdhtkLV7_W9qHp6V9htXTi2-9rHfW736EtcgDu7zkswkrs8kvuwUv8XZWTCefyiXC4MdzI-4BzttQeQ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB58IV58i9WqOXjT4G433WSPohbFUgQfeFuS2UQKtpZaBf31TvZhVVQQj9lNhpBMMt-QmW8AdoVzocSm5Q2lJRdaGq7JkHAZWumEQalyIu2btux01O1tcvEhiz-Pdq-eJIucBs_S1B8dDDJ3ME5882aQe9cn8Ow0XEzCtPCB9N5fv7yp7uLY0615l0vFISdbF5RpM9_L-GyaxnjzyxNpbnlaC_-f8yLMl6iTHRZqsgQTtr8MC1VFB1Ye8BUwJzmjBAll3R7dNIw-D1_yW4WRG2x7lnmzlzFq3xWE1d1XahZ5RF1kPT1gBIMZQdF75uvWl3IGRT4CzX0VrlsnV0envKzCwJGO54iHqDO0RkVGC2lDF-hAaWdJA3UjdmhEIExkUJkmElDPMMg8zR1aGVuMmxhGazDVf-jbdWBCEyBwIkxMYgUKVDZGQmyolUPhoqAGYbUBKZYU5b5Sxn06Jlf2i5jSIqb5IqaiBnvvYwYFQcevvevVvqblYX1MG4ln9WsmQVSD_Wofx79_lrbxt-47MHtx3ErbZ53zTZhreE3I42LqMDUaPtktmMHnUfdxuJ3r8BvaU_BI
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficient+image+encryption+scheme+based+on+generalized+logistic+map+for+real+time+image+processing&rft.jtitle=Journal+of+real-time+image+processing&rft.au=Shah%2C+Asif+A.&rft.au=Parah%2C+Shabir+A.&rft.au=Rashid%2C+Mamoon&rft.au=Elhoseny%2C+Mohamed&rft.date=2020-12-01&rft.pub=Springer+Berlin+Heidelberg&rft.issn=1861-8200&rft.eissn=1861-8219&rft.volume=17&rft.issue=6&rft.spage=2139&rft.epage=2151&rft_id=info:doi/10.1007%2Fs11554-020-01008-4&rft.externalDocID=10_1007_s11554_020_01008_4
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1861-8200&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1861-8200&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1861-8200&client=summon