Efficient image encryption scheme based on generalized logistic map for real time image processing
In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information...
Uloženo v:
| Vydáno v: | Journal of real-time image processing Ročník 17; číslo 6; s. 2139 - 2151 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.12.2020
Springer Nature B.V |
| Témata: | |
| ISSN: | 1861-8200, 1861-8219 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most of the time, schemes are proposed with a high level of security. However, the challenge always remains the slower speeds due to their high complexity which makes them unusable in the applications of real-time images. In this paper, an efficient image encryption algorithm has been developed and tested for real-time images. The proposed scheme makes use of encryption with an efficient permutation technique based on a modular logistic map to bring down the size of the chaotic value vector, required to permute real-time image. We show that an efficient permutation is obtained using only
N
chaotic numbers for a square image with 3
N
pixels (
N
Pixels in each color bit plane). The algorithm makes use of a 192-bit key; divided into smaller blocks and each block selected chaotically to diffuse the pixel using multiple XOR operations. The experimental analysis reveals that the proposed algorithm is immune to various statistical and differential attacks such as entropy, histogram analysis, spectral characteristic analysis, etc. A comparison of the proposed scheme with some state-of-the-art techniques show that it performs better, and as such, can be utilized for efficient real-time image encryption. |
|---|---|
| AbstractList | In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most of the time, schemes are proposed with a high level of security. However, the challenge always remains the slower speeds due to their high complexity which makes them unusable in the applications of real-time images. In this paper, an efficient image encryption algorithm has been developed and tested for real-time images. The proposed scheme makes use of encryption with an efficient permutation technique based on a modular logistic map to bring down the size of the chaotic value vector, required to permute real-time image. We show that an efficient permutation is obtained using only
N
chaotic numbers for a square image with 3
N
pixels (
N
Pixels in each color bit plane). The algorithm makes use of a 192-bit key; divided into smaller blocks and each block selected chaotically to diffuse the pixel using multiple XOR operations. The experimental analysis reveals that the proposed algorithm is immune to various statistical and differential attacks such as entropy, histogram analysis, spectral characteristic analysis, etc. A comparison of the proposed scheme with some state-of-the-art techniques show that it performs better, and as such, can be utilized for efficient real-time image encryption. In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most of the time, schemes are proposed with a high level of security. However, the challenge always remains the slower speeds due to their high complexity which makes them unusable in the applications of real-time images. In this paper, an efficient image encryption algorithm has been developed and tested for real-time images. The proposed scheme makes use of encryption with an efficient permutation technique based on a modular logistic map to bring down the size of the chaotic value vector, required to permute real-time image. We show that an efficient permutation is obtained using only N chaotic numbers for a square image with 3N pixels (N Pixels in each color bit plane). The algorithm makes use of a 192-bit key; divided into smaller blocks and each block selected chaotically to diffuse the pixel using multiple XOR operations. The experimental analysis reveals that the proposed algorithm is immune to various statistical and differential attacks such as entropy, histogram analysis, spectral characteristic analysis, etc. A comparison of the proposed scheme with some state-of-the-art techniques show that it performs better, and as such, can be utilized for efficient real-time image encryption. |
| Author | Rashid, Mamoon Shah, Asif A. Parah, Shabir A. Elhoseny, Mohamed |
| Author_xml | – sequence: 1 givenname: Asif A. surname: Shah fullname: Shah, Asif A. organization: Department of Electronics and Instrumentation Technology, University of Kashmir – sequence: 2 givenname: Shabir A. surname: Parah fullname: Parah, Shabir A. email: shabireltr@gmail.com organization: Department of Electronics and Instrumentation Technology, University of Kashmir – sequence: 3 givenname: Mamoon surname: Rashid fullname: Rashid, Mamoon organization: School of Computer Science and Engineering, Lovely Professional University – sequence: 4 givenname: Mohamed surname: Elhoseny fullname: Elhoseny, Mohamed organization: Faculty of Computers and Information, Mansoura University |
| BookMark | eNp9kE1LAzEQhoNUsK3-AU8Bz6vJfu9RSv2Aghc9h2R2sqZss2uSHuqvN3VFwUNPyQzvO-_MsyAzO1gk5JqzW85Ydec5L4o8YSlLWGzUSX5G5rwueVKnvJn9_hm7IAvvt4yVVZkVc6LWWhswaAM1O9khRQvuMAYzWOrhHXdIlfTY0lh3aNHJ3nzGsh8644MBupMj1YOjDmVPg4n6ac7oBkDvje0uybmWvcern3dJ3h7Wr6unZPPy-Ly63ySQ8SYkHGQLqOpMybxCrplktdSIspVpqUHlLFeZgloVUKVNC6yNd1aAVYlQFsCzJbmZ5sbojz36ILbD3tkYKdIm3l8VDcuiKp1U4AbvHWoxurixOwjOxJGlmFiKyFJ8sxR5NNX_TGCCPEIKTpr-tDWbrD7m2A7d31YnXF_aDI0R |
| CitedBy_id | crossref_primary_10_1186_s12880_024_01546_4 crossref_primary_10_4018_IJISSCM_305852 crossref_primary_10_1007_s11042_022_12210_w crossref_primary_10_1007_s11276_022_03162_y crossref_primary_10_1016_j_jisa_2021_102854 crossref_primary_10_1016_j_eswa_2022_118067 crossref_primary_10_1117_1_JEI_32_4_043002 crossref_primary_10_1177_00375497221098417 crossref_primary_10_1007_s11042_023_14715_4 crossref_primary_10_1007_s11042_024_18222_y crossref_primary_10_1080_09500340_2022_2101070 crossref_primary_10_1007_s11265_023_01853_z crossref_primary_10_1186_s13638_022_02111_9 crossref_primary_10_1038_s41598_025_89397_z crossref_primary_10_1109_ACCESS_2022_3183990 crossref_primary_10_1007_s12652_022_04339_1 crossref_primary_10_3233_JIFS_189415 crossref_primary_10_1007_s11071_021_06761_0 crossref_primary_10_1016_j_vlsi_2024_102302 crossref_primary_10_1117_1_JEI_33_2_023034 crossref_primary_10_1007_s11042_022_13444_4 crossref_primary_10_3390_computers11030039 crossref_primary_10_1007_s11554_024_01506_9 crossref_primary_10_1111_exsy_12894 crossref_primary_10_1109_TKDE_2021_3119140 crossref_primary_10_1007_s11277_023_10382_8 crossref_primary_10_1016_j_ijleo_2022_170152 crossref_primary_10_1155_2022_7952860 crossref_primary_10_1007_s00500_023_08829_y crossref_primary_10_1088_1742_6596_1738_1_012054 crossref_primary_10_1155_2023_5767102 crossref_primary_10_1007_s11042_023_17034_w crossref_primary_10_1002_cpe_6849 |
| Cites_doi | 10.1007/s11042-014-2115-y 10.1007/s11042-016-4253-x 10.1016/j.cnsns.2010.01.004 10.1007/978-3-319-44790-2_19 10.1109/TDSC.2017.2763593 10.1360/csb2006-51-12-1413 10.1007/s11045-015-0358-z 10.1016/j.optlaseng.2019.04.011 10.1016/j.dsp.2016.02.005 10.1007/s11042-016-4196-2 10.1016/S0303-2647(00)00083-6 10.3844/pisp.2011.31.35 10.1109/MCOM.1978.1089772 10.1016/j.aeue.2012.07.004 10.1109/TIT.1976.1055638 10.1504/IJSCCPS.2017.088770 10.1007/s11045-017-0490-z 10.1145/359340.359342 10.1007/s00530-013-0314-4 10.1016/j.dsp.2013.01.005 10.1016/j.imavis.2007.09.005 10.1016/S0030-4018(03)01261-6 10.1080/00207217.2014.954635 10.1080/00207217.2016.1242162 10.1093/acprof:oso/9780198507239.001.0001 10.1016/j.compeleceng.2013.11.006 10.1007/978-1-4419-5906-5_421 10.1109/ETNCC.2011.6255930 10.1007/978-3-642-04292-8_49 |
| ContentType | Journal Article |
| Copyright | Springer-Verlag GmbH Germany, part of Springer Nature 2020 Springer-Verlag GmbH Germany, part of Springer Nature 2020. |
| Copyright_xml | – notice: Springer-Verlag GmbH Germany, part of Springer Nature 2020 – notice: Springer-Verlag GmbH Germany, part of Springer Nature 2020. |
| DBID | AAYXX CITATION 8FE 8FG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI |
| DOI | 10.1007/s11554-020-01008-4 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central UK/Ireland ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition |
| DatabaseTitle | CrossRef Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Advanced Technologies & Aerospace Collection |
| Database_xml | – sequence: 1 dbid: P5Z name: Advanced Technologies & Aerospace Database url: https://search.proquest.com/hightechjournals sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1861-8219 |
| EndPage | 2151 |
| ExternalDocumentID | 10_1007_s11554_020_01008_4 |
| GroupedDBID | -59 -5G -BR -EM -Y2 -~C .VR 06D 0R~ 0VY 1N0 203 29L 2J2 2JN 2JY 2KG 2KM 2LR 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5VS 67Z 6NX 8TC 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HLICF HMJXF HQYDN HRMNR HVGLF HZ~ IHE IJ- IKXTQ ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K7- KDC KOV LLZTM M4Y MA- N2Q N9A NPVJJ NQJWS NU0 O9- O93 O9J OAM P9O PF0 PT4 QOS R89 R9I ROL RPX RSV S16 S1Z S27 S3B SAP SCO SDH SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7X Z83 Z88 ZMTXR ~A9 AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB 8FE 8FG AZQEC DWQXO GNUQQ JQ2 P62 PKEHL PQEST PQQKQ PQUKI |
| ID | FETCH-LOGICAL-c319t-1cadceb83ba47e1f0a08afeeada26fcb404b3bc8b5c729dc0d0087ce76ec65c13 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 41 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000557219200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1861-8200 |
| IngestDate | Wed Nov 05 04:19:29 EST 2025 Sat Nov 29 03:23:16 EST 2025 Tue Nov 18 22:27:17 EST 2025 Fri Feb 21 02:39:40 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Keywords | Chaos Logistic map Encryption Image processing Real time Computational complexity |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-1cadceb83ba47e1f0a08afeeada26fcb404b3bc8b5c729dc0d0087ce76ec65c13 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2918675903 |
| PQPubID | 2044148 |
| PageCount | 13 |
| ParticipantIDs | proquest_journals_2918675903 crossref_primary_10_1007_s11554_020_01008_4 crossref_citationtrail_10_1007_s11554_020_01008_4 springer_journals_10_1007_s11554_020_01008_4 |
| PublicationCentury | 2000 |
| PublicationDate | 20201200 2020-12-00 20201201 |
| PublicationDateYYYYMMDD | 2020-12-01 |
| PublicationDate_xml | – month: 12 year: 2020 text: 20201200 |
| PublicationDecade | 2020 |
| PublicationPlace | Berlin/Heidelberg |
| PublicationPlace_xml | – name: Berlin/Heidelberg – name: Heidelberg |
| PublicationTitle | Journal of real-time image processing |
| PublicationTitleAbbrev | J Real-Time Image Proc |
| PublicationYear | 2020 |
| Publisher | Springer Berlin Heidelberg Springer Nature B.V |
| Publisher_xml | – name: Springer Berlin Heidelberg – name: Springer Nature B.V |
| References | Gaurav (CR34) 2012; 2 Blackedge, Ahmed, Farooq (CR40) 2010 Navnish, Amitabh, Babloo (CR4) 2011; 2 Manogaran, Priyan (CR7) 2017 Akhoon, Parah, Sheikh, Bhat (CR19) 2016; 77 Tong, Cui (CR32) 2008; 26 CR37 Sinha, Singh (CR39) 2003; 218 Stallings (CR5) 2003 CR35 Rivest, Shamir, Adleman (CR36) 1978; 21 Parah, Sheikh, Bhat (CR10) 2013; 2 El-Latif, Niu (CR56) 2013; 67 Debbarma, Kumari, Raheja (CR46) 2013; 2 Leier, Richter, Banzhaf, Rauhe (CR43) 2000; 57 Ahad, Parah, Sheikh, Loan, Bhat (CR21) 2016; 76 Parah, Sheikh, Bhat (CR13) 2014; 40 Joshi, Kumari (CR52) 2015; 4 CR9 CR48 Patro, Acharya (CR58) 2019; 46 Sheikh, Parah, Bhat (CR11) 2013; 4 CR45 Auyporn, Vongpradhip (CR53) 2015; 3 Loan, Parah, Sheikh, Bhat (CR20) 2016; 53 Maniyath, Supriya (CR44) 2011; 2 Kim, Lee, Ling, Tan, Wang (CR1) 2017; 16 CR41 Nilsson, Johansson, Wagner (CR27) 2019; 2019 Nazir, Parah, Sheikh, Farhana, Bhat (CR17) 2015; 76 Parah, Sheikh, Bhat (CR8) 2012; 49 Parvin, Seyedarabi, Shamsi (CR31) 2016; 75 Hellman (CR2) 1978; 16 Pareek, Patidar, Sud (CR54) 2013; 23 Goubin, Patarin, Yang, van Tilborg, Jajodia (CR26) 2011 Waghmare, Bhagat, Surve, Kalgutkar (CR49) 2016; 5 CR16 Forouzan, Mukhopadhyay (CR6) 2011 CR12 Sheikh, Parah, Bhat (CR15) 2015; 102 CR51 Xiao, Lu, Qin, Lai (CR42) 2006; 51 Shah, Parah (CR50) 2017; 2 Xu, Sun, Cao, Zhu (CR25) 2019; 121 Parah, Sheikh, Bhat (CR18) 2015; 28 Farheen, Bikiran, Shobha, Jitendranath (CR38) 2017; 5 Norouzi, Seyedzadeh, Mirzakuchaki, Mosavi (CR57) 2014; 20 Parah, Sheikh, Bhat (CR14) 2014; 14 Sheikh, Sheikh, Assad, Bhat (CR23) 2016; 104 CR29 CR28 Diffie, Hellman (CR3) 1976; 22 Sheikh, Parah, Bhat (CR22) 2016; 660 Bhat, Parah, Sheikh, Loan (CR24) 2017; 29 Afolabi, Adagunodo (CR33) 2011; 2 Sakthidasan, Krishna (CR47) 2011; 1 Yang, Wong, Liao, Zhang, Wei (CR55) 2010; 15 Hilborn (CR30) 2000 N Debbarma (1008_CR46) 2013; 2 SR Maniyath (1008_CR44) 2011; 2 JA Sheikh (1008_CR11) 2013; 4 JM Blackedge (1008_CR40) 2010 A Nilsson (1008_CR27) 2019; 2019 1008_CR37 1008_CR35 JA Sheikh (1008_CR15) 2015; 102 AA Shah (1008_CR50) 2017; 2 A Sinha (1008_CR39) 2003; 218 KAK Patro (1008_CR58) 2019; 46 H Yang (1008_CR55) 2010; 15 BA Forouzan (1008_CR6) 2011 SA Parah (1008_CR8) 2012; 49 1008_CR29 G Navnish (1008_CR4) 2011; 2 1008_CR28 Z Parvin (1008_CR31) 2016; 75 F Ahad (1008_CR21) 2016; 76 Q Xu (1008_CR25) 2019; 121 A Nazir (1008_CR17) 2015; 76 NK Pareek (1008_CR54) 2013; 23 1008_CR9 AO Afolabi (1008_CR33) 2011; 2 A Joshi (1008_CR52) 2015; 4 SA Parah (1008_CR18) 2015; 28 JA Akhoon (1008_CR19) 2016; 77 1008_CR51 N Loan (1008_CR20) 2016; 53 1008_CR16 RC Hilborn (1008_CR30) 2000 1008_CR12 W Diffie (1008_CR3) 1976; 22 SA Parah (1008_CR13) 2014; 40 CTG Manogaran (1008_CR7) 2017 SA Parah (1008_CR14) 2014; 14 S Gaurav (1008_CR34) 2012; 2 A Leier (1008_CR43) 2000; 57 K Sakthidasan (1008_CR47) 2011; 1 S Parah (1008_CR10) 2013; 2 1008_CR41 AAA El-Latif (1008_CR56) 2013; 67 M Kim (1008_CR1) 2017; 16 JA Sheikh (1008_CR23) 2016; 104 1008_CR48 1008_CR45 A Waghmare (1008_CR49) 2016; 5 G Xiao (1008_CR42) 2006; 51 L Goubin (1008_CR26) 2011 X Tong (1008_CR32) 2008; 26 RL Rivest (1008_CR36) 1978; 21 JA Sheikh (1008_CR22) 2016; 660 W Stallings (1008_CR5) 2003 GM Bhat (1008_CR24) 2017; 29 W Auyporn (1008_CR53) 2015; 3 M Hellman (1008_CR2) 1978; 16 S Farheen (1008_CR38) 2017; 5 B Norouzi (1008_CR57) 2014; 20 |
| References_xml | – ident: CR45 – volume: 75 start-page: 10631 year: 2016 end-page: 10648 ident: CR31 article-title: A new secure and sensitive image encryption scheme based on new substitution with chaotic function publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-014-2115-y – volume: 3 start-page: 8 issue: 1 year: 2015 end-page: 13 ident: CR53 article-title: A robust image encryption method based on bit plane decomposition and multiple chaotic maps publication-title: Int. J. Signal Process. Syst. – volume: 5 start-page: 8807 issue: 4 year: 2017 end-page: 8811 ident: CR38 article-title: A study on data encryption using AES and RSA publication-title: Int. J. Innov. Res. Comput. Commun. Eng. – volume: 76 start-page: 10599 issue: 8 year: 2015 end-page: 10633 ident: CR17 article-title: Information hiding in medical images: a robust medical image watermarking system for e-healthcare publication-title: Multimedia Tools Appl. – volume: 2019 start-page: 238 issue: 1 year: 2019 end-page: 258 ident: CR27 article-title: Error amplification in code-based cryptography publication-title: IACR Trans. Cryptogr. Hardw. Embed Syst. – volume: 49 start-page: 10141 year: 2012 end-page: 10146 ident: CR8 article-title: On the realization of a secure, high capacity data embedding technique using joint top-down and down-top embedding approach publication-title: Elixir Comp. Sci. Eng. – ident: CR16 – ident: CR51 – ident: CR12 – volume: 2 start-page: 1 issue: 11 year: 2013 end-page: 11 ident: CR10 article-title: High capacity data embedding using joint intermediate significant bit and least significant technique publication-title: Int. J. Inf. Eng. Appl. – volume: 77 start-page: 185 year: 2016 end-page: 207 ident: CR19 article-title: Information hiding in edges: a high capacity information hiding technique using hybrid edge detection publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-016-4253-x – ident: CR35 – volume: 15 start-page: 3507 issue: 11 year: 2010 end-page: 3517 ident: CR55 article-title: A fast image encryption and authentication scheme based on chaotic maps publication-title: Commun. Nonlinear Sci. Numer. Simul. doi: 10.1016/j.cnsns.2010.01.004 – ident: CR29 – year: 2003 ident: CR5 publication-title: Cryptography and network security: principles and practice – volume: 660 start-page: 427 year: 2016 end-page: 452 ident: CR22 article-title: StegNmark: a joint Stego-watermark approach for early tamper detection publication-title: Intell. Techn. Signal Process. Multimedia Secur. doi: 10.1007/978-3-319-44790-2_19 – year: 2011 ident: CR6 publication-title: Cryptography and network security (Sie) – volume: 16 start-page: 743 issue: 5 year: 2017 end-page: 756 ident: CR1 article-title: Private compound wildcard queries using fully homomorphic encryption publication-title: IEEE Trans. Depend. Secure. Comput. doi: 10.1109/TDSC.2017.2763593 – volume: 2 start-page: 229 issue: 1 year: 2012 end-page: 238 ident: CR34 article-title: Secure file transmission scheme based on hybrid encryption technique publication-title: Int. J. Manag. IT Eng. – volume: 51 start-page: 1413 issue: 12 year: 2006 end-page: 1420 ident: CR42 article-title: New field of cryptography: DNA cryptography publication-title: Chin. Sci. Bull. doi: 10.1360/csb2006-51-12-1413 – year: 2010 ident: CR40 publication-title: Chaotic image encryption algorithm based on frequency domain scrambling – volume: 28 start-page: 549 year: 2015 end-page: 572 ident: CR18 article-title: Hiding in encrypted images: a three-tier security data hiding system publication-title: Multidimens. Syst. Signal Process. doi: 10.1007/s11045-015-0358-z – ident: CR9 – volume: 121 start-page: 203 year: 2019 end-page: 214 ident: CR25 article-title: A fast image encryption algorithm based on compressive sensing and hyperchaotic map publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.04.011 – volume: 53 start-page: 11 year: 2016 end-page: 24 ident: CR20 article-title: Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing publication-title: Digital Signal Process. doi: 10.1016/j.dsp.2016.02.005 – volume: 4 start-page: 113 issue: 13 year: 2013 end-page: 118 ident: CR11 article-title: Data hiding in color images: a high capacity data hiding technique for covert communication publication-title: Comput. Eng. Intell. Syst. – volume: 1 start-page: 137 issue: 2 year: 2011 end-page: 141 ident: CR47 article-title: A new chaotic algorithm for image encryption and decryption of digital color images publication-title: Int. J. Inf. Educ. Technol. – volume: 76 start-page: 3943 year: 2016 end-page: 3975 ident: CR21 article-title: Reversible and high capacity data hiding technique for e-healthcare applications publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-016-4196-2 – volume: 57 start-page: 13 issue: 1 year: 2000 end-page: 22 ident: CR43 article-title: Cryptography with DNA binary strands publication-title: Biosystems doi: 10.1016/S0303-2647(00)00083-6 – volume: 14 start-page: 38 issue: 2 year: 2014 end-page: 44 ident: CR14 article-title: ‘A secure and efficient spatial domain data hiding technique based on pixel adjustment publication-title: Am. J. Eng. Technol. Res. – volume: 2 start-page: 31 issue: 1 year: 2011 end-page: 35 ident: CR33 article-title: Implementation of an improved data encryption algorithm in a web-based learning system publication-title: Phys. Int. doi: 10.3844/pisp.2011.31.35 – ident: CR37 – volume: 16 start-page: 24 issue: 6 year: 1978 end-page: 32 ident: CR2 article-title: An overview of public-key cryptography publication-title: IEEE Commun. Soc. Mag. doi: 10.1109/MCOM.1978.1089772 – volume: 67 start-page: 136 issue: 2 year: 2013 end-page: 143 ident: CR56 article-title: A hybrid chaotic system and cyclic elliptic curve for image encryption publication-title: AEU Int. J. Electron. Commun. doi: 10.1016/j.aeue.2012.07.004 – volume: 22 start-page: 644 issue: 6 year: 1976 end-page: 654 ident: CR3 article-title: New directions in cryptography publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.1976.1055638 – volume: 2 start-page: 73 issue: 1 year: 2017 end-page: 94 ident: CR50 article-title: Chaos-based novel cryptographic technique based on a new logistic map publication-title: Int. J. Soc. Comput. Cyber Phys. Syst. doi: 10.1504/IJSCCPS.2017.088770 – volume: 29 start-page: 1095 issue: 3 year: 2017 end-page: 1117 ident: CR24 article-title: Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks publication-title: Multidimension. Syst. Signal Process. doi: 10.1007/s11045-017-0490-z – volume: 21 start-page: 120 issue: 2 year: 1978 end-page: 126 ident: CR36 article-title: A method for obtaining digital signatures and public-key cryptosystems publication-title: Commun. ACM doi: 10.1145/359340.359342 – volume: 2 start-page: 387 issue: 4 year: 2013 end-page: 392 ident: CR46 article-title: 2D Chaos based color image encryption using pseudorandom key generation publication-title: Chaos – volume: 20 start-page: 45 issue: 1 year: 2014 end-page: 64 ident: CR57 article-title: A novel image encryption based on a hash function with only a two-round diffusion process publication-title: Multimedia Syst. doi: 10.1007/s00530-013-0314-4 – volume: 23 start-page: 894 issue: 8 year: 2013 end-page: 901 ident: CR54 article-title: Diffusion-substitution based gray image encryption algorithm publication-title: Digital Signal Process. doi: 10.1016/j.dsp.2013.01.005 – volume: 46 start-page: 23 year: 2019 end-page: 41 ident: CR58 article-title: An efficient colour image encryption scheme based on 1-D chaotic maps publication-title: J. Inf. Secur. Appl. – volume: 26 start-page: 843 issue: 6 year: 2008 end-page: 850 ident: CR32 article-title: Image encryption with compound chaotic sequence cipher shifting dynamically publication-title: Image Vis. Comput. doi: 10.1016/j.imavis.2007.09.005 – volume: 4 start-page: 489 issue: 9 year: 2015 end-page: 494 ident: CR52 article-title: Encryption of RGB image using Arnold transform and involuntary matrices publication-title: IJARCCE – ident: CR48 – volume: 2 start-page: 1 issue: 1 year: 2011 end-page: 4 ident: CR4 article-title: Information security: encryption and decryption with polyalphabetic substitution publication-title: Int. J. Comput. Sci. Commun. – volume: 2 start-page: 258 year: 2011 end-page: 270 ident: CR44 article-title: An uncompressed image encryption algorithm based on DNA sequences publication-title: Comput. Sci. Inf. Technol. – volume: 218 start-page: 229 issue: 4–6 year: 2003 end-page: 234 ident: CR39 article-title: A technique for image encryption using a digital signature publication-title: Opt. Commun. doi: 10.1016/S0030-4018(03)01261-6 – volume: 102 start-page: 1253 issue: 8 year: 2015 end-page: 1266 ident: CR15 article-title: A secure and robust information hiding technique for covert communication publication-title: Int. J. Electron. doi: 10.1080/00207217.2014.954635 – volume: 104 start-page: 659 issue: 4 year: 2016 end-page: 672 ident: CR23 article-title: Realization and robustness evaluation of a blind spatial domain watermarking technique publication-title: Int. J. Electron. doi: 10.1080/00207217.2016.1242162 – year: 2000 ident: CR30 publication-title: Chaos and nonlinear dynamics: an introduction for scientists and engineers doi: 10.1093/acprof:oso/9780198507239.001.0001 – volume: 5 start-page: 64 issue: 4 year: 2016 end-page: 68 ident: CR49 article-title: Chaos based image encryption and decryption publication-title: Int. J. Adv. Res. Comput. Commun. Eng. – volume: 40 start-page: 70 issue: 1 year: 2014 end-page: 82 ident: CR13 article-title: Data hiding in scrambled images: a new double-layer security data hiding technique publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2013.11.006 – start-page: 141 year: 2017 end-page: 154 ident: CR7 article-title: Centralized fog computing security platform for IoT and cloud in the healthcare system publication-title: Exploring the convergence of big data and the internet of things – ident: CR28 – ident: CR41 – year: 2011 ident: CR26 article-title: Multivariate cryptography publication-title: Encyclopedia of cryptography and security doi: 10.1007/978-1-4419-5906-5_421 – volume: 2 start-page: 1 issue: 1 year: 2011 ident: 1008_CR4 publication-title: Int. J. Comput. Sci. Commun. – volume: 16 start-page: 743 issue: 5 year: 2017 ident: 1008_CR1 publication-title: IEEE Trans. Depend. Secure. Comput. doi: 10.1109/TDSC.2017.2763593 – volume-title: Chaos and nonlinear dynamics: an introduction for scientists and engineers year: 2000 ident: 1008_CR30 doi: 10.1093/acprof:oso/9780198507239.001.0001 – volume: 218 start-page: 229 issue: 4–6 year: 2003 ident: 1008_CR39 publication-title: Opt. Commun. doi: 10.1016/S0030-4018(03)01261-6 – volume: 1 start-page: 137 issue: 2 year: 2011 ident: 1008_CR47 publication-title: Int. J. Inf. Educ. Technol. – volume: 22 start-page: 644 issue: 6 year: 1976 ident: 1008_CR3 publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.1976.1055638 – volume-title: Cryptography and network security (Sie) year: 2011 ident: 1008_CR6 – volume: 76 start-page: 10599 issue: 8 year: 2015 ident: 1008_CR17 publication-title: Multimedia Tools Appl. – volume: 104 start-page: 659 issue: 4 year: 2016 ident: 1008_CR23 publication-title: Int. J. Electron. doi: 10.1080/00207217.2016.1242162 – ident: 1008_CR51 – start-page: 141 volume-title: Exploring the convergence of big data and the internet of things year: 2017 ident: 1008_CR7 – volume-title: Encyclopedia of cryptography and security year: 2011 ident: 1008_CR26 doi: 10.1007/978-1-4419-5906-5_421 – ident: 1008_CR35 – ident: 1008_CR41 – ident: 1008_CR45 doi: 10.1109/ETNCC.2011.6255930 – volume-title: Cryptography and network security: principles and practice year: 2003 ident: 1008_CR5 – volume: 20 start-page: 45 issue: 1 year: 2014 ident: 1008_CR57 publication-title: Multimedia Syst. doi: 10.1007/s00530-013-0314-4 – volume: 121 start-page: 203 year: 2019 ident: 1008_CR25 publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.04.011 – volume: 5 start-page: 8807 issue: 4 year: 2017 ident: 1008_CR38 publication-title: Int. J. Innov. Res. Comput. Commun. Eng. – ident: 1008_CR28 – volume: 2 start-page: 229 issue: 1 year: 2012 ident: 1008_CR34 publication-title: Int. J. Manag. IT Eng. – volume: 53 start-page: 11 year: 2016 ident: 1008_CR20 publication-title: Digital Signal Process. doi: 10.1016/j.dsp.2016.02.005 – volume: 75 start-page: 10631 year: 2016 ident: 1008_CR31 publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-014-2115-y – volume: 57 start-page: 13 issue: 1 year: 2000 ident: 1008_CR43 publication-title: Biosystems doi: 10.1016/S0303-2647(00)00083-6 – volume: 46 start-page: 23 year: 2019 ident: 1008_CR58 publication-title: J. Inf. Secur. Appl. – volume: 2 start-page: 31 issue: 1 year: 2011 ident: 1008_CR33 publication-title: Phys. Int. doi: 10.3844/pisp.2011.31.35 – volume: 4 start-page: 489 issue: 9 year: 2015 ident: 1008_CR52 publication-title: IJARCCE – volume: 3 start-page: 8 issue: 1 year: 2015 ident: 1008_CR53 publication-title: Int. J. Signal Process. Syst. – volume: 23 start-page: 894 issue: 8 year: 2013 ident: 1008_CR54 publication-title: Digital Signal Process. doi: 10.1016/j.dsp.2013.01.005 – volume-title: Chaotic image encryption algorithm based on frequency domain scrambling year: 2010 ident: 1008_CR40 – volume: 51 start-page: 1413 issue: 12 year: 2006 ident: 1008_CR42 publication-title: Chin. Sci. Bull. doi: 10.1360/csb2006-51-12-1413 – ident: 1008_CR29 doi: 10.1007/978-3-642-04292-8_49 – volume: 5 start-page: 64 issue: 4 year: 2016 ident: 1008_CR49 publication-title: Int. J. Adv. Res. Comput. Commun. Eng. – volume: 29 start-page: 1095 issue: 3 year: 2017 ident: 1008_CR24 publication-title: Multidimension. Syst. Signal Process. doi: 10.1007/s11045-017-0490-z – ident: 1008_CR48 – ident: 1008_CR9 – volume: 4 start-page: 113 issue: 13 year: 2013 ident: 1008_CR11 publication-title: Comput. Eng. Intell. Syst. – volume: 660 start-page: 427 year: 2016 ident: 1008_CR22 publication-title: Intell. Techn. Signal Process. Multimedia Secur. doi: 10.1007/978-3-319-44790-2_19 – volume: 26 start-page: 843 issue: 6 year: 2008 ident: 1008_CR32 publication-title: Image Vis. Comput. doi: 10.1016/j.imavis.2007.09.005 – volume: 2 start-page: 1 issue: 11 year: 2013 ident: 1008_CR10 publication-title: Int. J. Inf. Eng. Appl. – volume: 67 start-page: 136 issue: 2 year: 2013 ident: 1008_CR56 publication-title: AEU Int. J. Electron. Commun. doi: 10.1016/j.aeue.2012.07.004 – ident: 1008_CR12 – volume: 28 start-page: 549 year: 2015 ident: 1008_CR18 publication-title: Multidimens. Syst. Signal Process. doi: 10.1007/s11045-015-0358-z – volume: 2019 start-page: 238 issue: 1 year: 2019 ident: 1008_CR27 publication-title: IACR Trans. Cryptogr. Hardw. Embed Syst. – ident: 1008_CR37 – volume: 21 start-page: 120 issue: 2 year: 1978 ident: 1008_CR36 publication-title: Commun. ACM doi: 10.1145/359340.359342 – ident: 1008_CR16 – volume: 16 start-page: 24 issue: 6 year: 1978 ident: 1008_CR2 publication-title: IEEE Commun. Soc. Mag. doi: 10.1109/MCOM.1978.1089772 – volume: 77 start-page: 185 year: 2016 ident: 1008_CR19 publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-016-4253-x – volume: 15 start-page: 3507 issue: 11 year: 2010 ident: 1008_CR55 publication-title: Commun. Nonlinear Sci. Numer. Simul. doi: 10.1016/j.cnsns.2010.01.004 – volume: 49 start-page: 10141 year: 2012 ident: 1008_CR8 publication-title: Elixir Comp. Sci. Eng. – volume: 102 start-page: 1253 issue: 8 year: 2015 ident: 1008_CR15 publication-title: Int. J. Electron. doi: 10.1080/00207217.2014.954635 – volume: 40 start-page: 70 issue: 1 year: 2014 ident: 1008_CR13 publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2013.11.006 – volume: 14 start-page: 38 issue: 2 year: 2014 ident: 1008_CR14 publication-title: Am. J. Eng. Technol. Res. – volume: 76 start-page: 3943 year: 2016 ident: 1008_CR21 publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-016-4196-2 – volume: 2 start-page: 73 issue: 1 year: 2017 ident: 1008_CR50 publication-title: Int. J. Soc. Comput. Cyber Phys. Syst. doi: 10.1504/IJSCCPS.2017.088770 – volume: 2 start-page: 258 year: 2011 ident: 1008_CR44 publication-title: Comput. Sci. Inf. Technol. – volume: 2 start-page: 387 issue: 4 year: 2013 ident: 1008_CR46 publication-title: Chaos |
| SSID | ssj0067635 |
| Score | 2.475268 |
| Snippet | In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 2139 |
| SubjectTerms | Algorithms Computer Graphics Computer Science Cryptography Data encryption Digital signatures Digitization Image processing Image Processing and Computer Vision Literature reviews Multimedia Information Systems Pattern Recognition Permutations Pixels Prime numbers Real time Signal,Image and Speech Processing Special Issue Paper |
| SummonAdditionalLinks | – databaseName: Advanced Technologies & Aerospace Database dbid: P5Z link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELagMLBQnqJQkAc2sHASO3UmhFArpqoDSBVL5DgOitRHaAsS_HruEocIJLowJo6tJGffd37c9xFyiQzegGOaWcAPJhIZMi29jIXcCh7IzEheiU30hkM1Hkcjt-C2dMcqa59YOup0bnCN_MaPkHpNRjy4LV4Zqkbh7qqT0NgkW8iSgNINI_lce-IQydZwwqVCjwHScZc0U6XOIZAynDxx5Ldh4icwNdHmrw3SEncG7f--8R7ZdREnvau6yD7ZsLMD0q7VHKgb3Ick6ZdsEgBCNJ-Cl6Fwe_FRehQKU2A7tRQhL6Vw_VKRVeefcFnlEOWGTnVBIQSmEIZOKGrWu3aKKhcBvu6IPA36j_cPzCkwMANDc8U8o1NjExUkWvSsl3HNlc4s9D7th5lJBBdJkBiVSANBemp4ihR3xvZCa0JpvOCYtGbzmT0hFHnhoYSHUFVIq5QVWvo2EsZLlfWjDvHq3x8bR0-OKhmTuCFWRpPFYLK4NFksOuTqu05RkXOsfbpb2yl2A3UZN0bqkOva0k3x362drm_tjOz42LnKgy9d0lot3uw52Tbvq3y5uCi76ReWyu2l priority: 102 providerName: ProQuest |
| Title | Efficient image encryption scheme based on generalized logistic map for real time image processing |
| URI | https://link.springer.com/article/10.1007/s11554-020-01008-4 https://www.proquest.com/docview/2918675903 |
| Volume | 17 |
| WOSCitedRecordID | wos000557219200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1861-8219 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0067635 issn: 1861-8200 databaseCode: P5Z dateStart: 20060301 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1861-8219 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0067635 issn: 1861-8200 databaseCode: K7- dateStart: 20060301 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1861-8219 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0067635 issn: 1861-8200 databaseCode: BENPR dateStart: 20060301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLink customDbUrl: eissn: 1861-8219 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0067635 issn: 1861-8200 databaseCode: RSV dateStart: 20060301 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB5s68GL9YnVWnLwpoHsbrKbPaq0CEIp9UHxsmSzWSm0tbRV0F_vZB8uigp6WcjmQZgk882QzDcAJ5bBG3FMUYP4QXksfKqEk1KfGc48kWrB8mQTQb8vR6NwUASFLcvX7uWVZKapq2A3C33UujvMMtJQXoMGwp20CRuGN_el_vUtxZp1s6TvUMQ3VoTKfD_GZziqbMwv16IZ2vSa_5vnFmwW1iU5z7fDNqyZ2Q40y8wNpDjIuxB3M-YIBBwynqJGIfh78ZppD4LurpkaYuEtIVh-zImpx29YzOOFxppM1ZyguUvQ5JwQm5--GGeexx3gfPfgrte9vbyiRbYFqvEYrqijVaJNLL1Y8cA4KVNMqtTgTlOun-qYMx57sZax0GiQJ5olls5Om8A32hfa8fahPnuamQMglgMea5iPXbkwUhquhGtCrp1EGjdsgVMKPdIFFbnNiDGJKhJlK8QIhRhlQox4C04_-sxzIo5fW7fLtYyKQ7mM3NCy94mQeS04K9euqv55tMO_NT-CDdcuf_bopQ311eLZHMO6flmNl4sONC66_cGwA7XrgOJ3IB462QZ-B_Ej5rc |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB61BalcWp5iSwEf4AQWTmInzqFCCFq12rLiUKTeguNMqki722V3W1R-FL-xM3HCCiR664FjYnuk2J_nEXu-AXjFDN5kx5xEsh9SlyaVzkS1TBVqlZjaGxWKTWSjkT09zb-swa8-F4avVfY6sVXU1bnnf-Tv4pyp10yukvez75KrRvHpal9CI8BiiFc_KGRb7B19ovV9HccH-ycfD2VXVUB6gttSRt5VHkublE5nGNXKKetqpBl1cVr7UitdJqW3pfHkeFZeVUzb5jFL0afGRwnJXYc7OrEZ76thJnvNnzK5Gwd4No0kWVbVJemEVD023JKDNcV8OlL_aQhX3u1fB7KtnTvY_t9m6D5sdR61-BC2wANYw-lD2O6rVYhOeT2Ccr9lyyAjK5oJaVFBr-dXrcYUFOLjBAWb9ErQ81kg425-0mPIkWq8mLiZIBdfkJs9FsuG-gc5s5BrQbP5GL7eypc-gY3p-RSfgmDee2pRKQ3VBq1F7UyMufZRZTHOBxD1y134jn6dq4CMixVxNEOkIIgULUQKPYA3v8fMAvnIjb13e1wUnSJaFCtQDOBtj6xV87-l7dws7SVsHp58Pi6Oj0bDZ3AvZmC3l3x2YWM5v8DncNdfLpvF_EW7RQR8u23EXQOHm09G |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB60inixPrFaNQdvGszuJtvdo2iLopSCD3pbstmsFNpa2iror3dmH1ZFBfGY1xCSSb4ZkvkG4JAYvBHHNLeIH1zGyudaOSn3hZXCU6lRIk820Wi3g2437HyI4s9-u5dPknlMA7E0DacnoyQ9mQW-EQxycn0EsdNwOQ8Lkj7Sk79-c1_exT7RrZHLFfgOR6wTRdjM9zI-Q9PM3vzyRJohT6v6_zmvwkphdbLTXE3WYM4O16FaZnRgxQHfgLiZMUqgUNYb4E3DsHr8kt0qDN1gO7CMYC9hWH7ICat7r1jM44h6hg30iKEZzNAU7TPKW1_IGeXxCDj3TbhrNW_PLniRhYEbPJ5T7hidGBsHXqxlwzqp0CLQqUUN1K6fmlgKGXuxCWJl0FBPjEiI5s7Yhm-Nr4zjbUFl-Di028CIGx5bhI9DpbJBYKVWrg2lcZLAumENnHIDIlNQlFOmjH40I1emRYxwEaNsESNZg6P3MaOcoOPX3vVyX6PisE4iNyRWPxUKrwbH5T7Omn-WtvO37gew1DlvRdeX7atdWHZJE7J_MXWoTMdPdg8WzfO0NxnvZzr8BrQS7xU |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficient+image+encryption+scheme+based+on+generalized+logistic+map+for+real+time+image+processing&rft.jtitle=Journal+of+real-time+image+processing&rft.au=Shah%2C+Asif+A.&rft.au=Parah%2C+Shabir+A.&rft.au=Rashid%2C+Mamoon&rft.au=Elhoseny%2C+Mohamed&rft.date=2020-12-01&rft.issn=1861-8200&rft.eissn=1861-8219&rft.volume=17&rft.issue=6&rft.spage=2139&rft.epage=2151&rft_id=info:doi/10.1007%2Fs11554-020-01008-4&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11554_020_01008_4 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1861-8200&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1861-8200&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1861-8200&client=summon |