A Multidimensional Chaotic Image Encryption Algorithm based on DNA Coding
Based on chaotic encryption technology and DNA cryptography, a multidimensional chaotic image encryption algorithm based on DNA coding is proposed in this paper. Firstly, the MD5 algorithm is used to extract the features of the image, generate a new key in association with the user key, and then enc...
Uloženo v:
| Vydáno v: | Multimedia tools and applications Ročník 79; číslo 29-30; s. 21579 - 21601 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York
Springer US
01.08.2020
Springer Nature B.V |
| Témata: | |
| ISSN: | 1380-7501, 1573-7721 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Based on chaotic encryption technology and DNA cryptography, a multidimensional chaotic image encryption algorithm based on DNA coding is proposed in this paper. Firstly, the MD5 algorithm is used to extract the features of the image, generate a new key in association with the user key, and then encode the original image in DNA. The traditional three-dimensional Lorenz system is improved to form a four-dimensional hyperchaotic Lorenz system. According to the principle of DNA cryptography, a series of operations such as scrambling, mutation, DNA addition and DNA XOR are performed on the DNA coding sequence, and finally decoded to obtain a password image. Key space analysis, statistical analysis, known plaintext attack analysis and experimental results show that the algorithm has better image encryption performance and ability to resist various common attacks. |
|---|---|
| AbstractList | Based on chaotic encryption technology and DNA cryptography, a multidimensional chaotic image encryption algorithm based on DNA coding is proposed in this paper. Firstly, the MD5 algorithm is used to extract the features of the image, generate a new key in association with the user key, and then encode the original image in DNA. The traditional three-dimensional Lorenz system is improved to form a four-dimensional hyperchaotic Lorenz system. According to the principle of DNA cryptography, a series of operations such as scrambling, mutation, DNA addition and DNA XOR are performed on the DNA coding sequence, and finally decoded to obtain a password image. Key space analysis, statistical analysis, known plaintext attack analysis and experimental results show that the algorithm has better image encryption performance and ability to resist various common attacks. |
| Author | Liu, Yang Zhang, Jindong |
| Author_xml | – sequence: 1 givenname: Yang surname: Liu fullname: Liu, Yang organization: College of Computer Science and Technology, Jilin University – sequence: 2 givenname: Jindong surname: Zhang fullname: Zhang, Jindong email: zhangjindong_100@163.com organization: College of Computer Science and Technology, Jilin University, Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education, Jilin University, State Key Laboratory of Automobile Simulation and Control, Jilin University |
| BookMark | eNp9kDFPwzAQhS1UJNrCH2CyxBw4202cjFEoUKnAArPlOE7qKomLnQ7tr8clSEgMne50977TuzdDk972GqFbAvcEgD94QmBBI6AQQZqmEB0v0JTEnEWcUzIJPQtDHgO5QjPvtwAkieliilY5ft23g6lMp3tvbC9bXGykHYzCq042Gi975Q67Iaxw3jbWmWHT4VJ6XeEwenzLcWEr0zfX6LKWrdc3v3WOPp-WH8VLtH5_XhX5OlKMZENUQQk0yRKuYlYnlNalhLSsiZQkTliZ1CQmseQyA0UTVVGqJGcxl6DTCnhWsTm6G-_unP3aaz-Ird274NsLumA0SbOMQ1Clo0o5673TtVBmkKcvBidNKwiIU3BiDE6E4MRPcOIYUPoP3TnTSXc4D7ER8kHcN9r9uTpDfQOcHIHq |
| CitedBy_id | crossref_primary_10_1016_j_measurement_2022_111175 crossref_primary_10_1109_ACCESS_2023_3285481 crossref_primary_10_3390_e26100832 crossref_primary_10_1016_j_jksuci_2023_101790 crossref_primary_10_1016_j_eswa_2023_121090 crossref_primary_10_1109_ACCESS_2022_3218886 crossref_primary_10_1007_s42835_022_01157_5 crossref_primary_10_3390_electronics10151770 crossref_primary_10_1007_s11042_020_10218_8 crossref_primary_10_1016_j_jksuci_2022_04_002 crossref_primary_10_1007_s11042_023_16935_0 crossref_primary_10_1109_ACCESS_2021_3108789 crossref_primary_10_3390_e23091159 crossref_primary_10_3390_computation11090178 crossref_primary_10_1007_s11042_023_15577_6 crossref_primary_10_3390_e25030476 crossref_primary_10_1007_s11517_022_02700_2 crossref_primary_10_1088_1402_4896_acb9c6 crossref_primary_10_1007_s11042_021_10798_z crossref_primary_10_25130_tjes_32_3_31 crossref_primary_10_1016_j_chaos_2021_111777 crossref_primary_10_1007_s11042_022_12554_3 crossref_primary_10_1007_s11042_022_12762_x crossref_primary_10_1109_ACCESS_2024_3436558 crossref_primary_10_1109_ACCESS_2025_3588006 crossref_primary_10_1117_1_JEI_32_5_052303 crossref_primary_10_1007_s11517_022_02634_9 crossref_primary_10_1007_s00500_023_07970_y crossref_primary_10_1016_j_jksuci_2021_08_026 crossref_primary_10_1080_13682199_2024_2398954 crossref_primary_10_3390_math9212778 crossref_primary_10_1088_1402_4896_ad76e3 crossref_primary_10_1155_2021_6627005 crossref_primary_10_1155_2021_5554707 crossref_primary_10_1140_epjp_s13360_020_00917_4 crossref_primary_10_1007_s00371_023_03259_1 crossref_primary_10_1007_s40745_022_00457_x crossref_primary_10_1088_1402_4896_ac88a3 crossref_primary_10_1007_s11042_021_10960_7 crossref_primary_10_1007_s11071_024_09644_2 crossref_primary_10_1016_j_jksuci_2023_02_004 crossref_primary_10_3390_e25060865 crossref_primary_10_1007_s41870_022_00887_z crossref_primary_10_3390_math13081330 crossref_primary_10_3390_cryptography6020028 crossref_primary_10_1007_s11042_023_15002_y crossref_primary_10_1016_j_jfranklin_2024_107315 |
| Cites_doi | 10.1016/j.optlaseng.2017.05.001 10.1016/j.sigpro.2017.03.011 10.1007/s11042-018-7110-2 10.1049/cje.2017.08.022 10.1016/j.sigpro.2017.04.006 10.1007/s11042-019-07852-2 10.1016/j.sigpro.2017.05.002 10.1007/s11042-015-2982-x 10.1007/s11128-017-1612-0 10.1109/tsusc.2018.2817043 10.1364/ol.28.000269 10.1109/INVENTIVE.2016.7823276 10.1063/1.4994860 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2020 Springer Science+Business Media, LLC, part of Springer Nature 2020. |
| Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020 – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020. |
| DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI Q9U |
| DOI | 10.1007/s11042-020-08880-z |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) ProQuest Research Library ProQuest Central ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials - QC ProQuest Central Business Premium Collection Technology Collection ProQuest One ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student ProQuest Research Library SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central Basic |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
| DatabaseTitleList | ABI/INFORM Global (Corporate) |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1573-7721 |
| EndPage | 21601 |
| ExternalDocumentID | 10_1007_s11042_020_08880_z |
| GrantInformation_xml | – fundername: Natural Science Foundation of Jilin Province grantid: 20170101133JC funderid: http://dx.doi.org/10.13039/100007847 – fundername: the Korea Foundation for Advanced Studies' International Scholar Exchange Fellowship for the academic year of 2017-2018 grantid: 2017-2018 – fundername: National Key Research and Development Program of China grantid: 2017YFB0102500 – fundername: Jilin University grantid: 5157050847, 2017XYB252, 2017A53216 funderid: http://dx.doi.org/10.13039/501100004032 |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3EH 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 8AO 8FE 8FG 8FL 8G5 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TH9 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB 7SC 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D MBDVC PKEHL PQEST PQUKI Q9U |
| ID | FETCH-LOGICAL-c319t-d0b026967c53f622fba08bf1aa1563b6f1515a7a90c26cd22ca7357a0e8d079d3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 49 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000531131500002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1380-7501 |
| IngestDate | Tue Nov 04 23:06:06 EST 2025 Sat Nov 29 06:20:03 EST 2025 Tue Nov 18 22:39:24 EST 2025 Fri Feb 21 02:37:39 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 29-30 |
| Keywords | Multi-dimensional chaotic sequence DNA sequence Image encryption |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-d0b026967c53f622fba08bf1aa1563b6f1515a7a90c26cd22ca7357a0e8d079d3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2432689970 |
| PQPubID | 54626 |
| PageCount | 23 |
| ParticipantIDs | proquest_journals_2432689970 crossref_citationtrail_10_1007_s11042_020_08880_z crossref_primary_10_1007_s11042_020_08880_z springer_journals_10_1007_s11042_020_08880_z |
| PublicationCentury | 2000 |
| PublicationDate | 20200800 2020-08-00 20200801 |
| PublicationDateYYYYMMDD | 2020-08-01 |
| PublicationDate_xml | – month: 8 year: 2020 text: 20200800 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Dordrecht |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Multimedia tools and applications |
| PublicationTitleAbbrev | Multimed Tools Appl |
| PublicationYear | 2020 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | CR3 CR5 Abuturab (CR1) 2017; 98 CR9 Yu, Liu, Gong, Tian, Tu (CR11) 2019; 78 Zhang (CR12) 2017; 26 Wu, Liao, Yang (CR10) 2017; 141 Ratnavelu, Kalpana, Balasubramaniam, Wong, Raveendran (CR8) 2017; 140 Pak, Huang (CR6) 2017; 138 Psannis, Stergiou, Gupta (CR7) 2018; 4 Zhou, Hu, Gong, Li (CR14) 2017; 16 Zhang, Gao (CR13) 2016; 75 Anwar, Meghana (CR2) 2019; 78 Hennelly, Sheridan (CR4) 2003; 28 8880_CR5 8880_CR3 J Wu (8880_CR10) 2017; 141 MR Abuturab (8880_CR1) 2017; 98 B Hennelly (8880_CR4) 2003; 28 C Pak (8880_CR6) 2017; 138 S Zhang (8880_CR13) 2016; 75 K Ratnavelu (8880_CR8) 2017; 140 W Yu (8880_CR11) 2019; 78 Y Zhang (8880_CR12) 2017; 26 S Anwar (8880_CR2) 2019; 78 8880_CR9 KE Psannis (8880_CR7) 2018; 4 N Zhou (8880_CR14) 2017; 16 |
| References_xml | – volume: 98 start-page: 1 year: 2017 end-page: 16 ident: CR1 article-title: Securing multiple information using chaotic spiral phase encoding with simultaneous interference and superposition methods publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2017.05.001 – volume: 138 start-page: 129 year: 2017 end-page: 137 ident: CR6 article-title: A new color image encryption using combination of the 1D chaotic map publication-title: Signal Process doi: 10.1016/j.sigpro.2017.03.011 – ident: CR3 – volume: 78 start-page: 20037 year: 2019 end-page: 20064 ident: CR11 article-title: Double-image encryption based on spatiotemporal chaos and DNA operations publication-title: Multimed Tools Appl doi: 10.1007/s11042-018-7110-2 – volume: 26 start-page: 1022 year: 2017 end-page: 1031 ident: CR12 article-title: A chaotic system based image encryption scheme with identical encryption and decryption algorithm publication-title: Chinese J Electron doi: 10.1049/cje.2017.08.022 – volume: 141 start-page: 109 year: 2017 end-page: 124 ident: CR10 article-title: Color image encryption based on chaotic systems and elliptic curve ElGamal scheme publication-title: Signal Process doi: 10.1016/j.sigpro.2017.04.006 – ident: CR9 – volume: 78 start-page: 27569 year: 2019 end-page: 27590 ident: CR2 article-title: A pixel permutation based image encryption technique using chaotic map publication-title: Multimed Tools Appl doi: 10.1007/s11042-019-07852-2 – volume: 140 start-page: 87 year: 2017 end-page: 96 ident: CR8 article-title: Image encryption method based on chaotic fuzzy cellular neural networks publication-title: Signal Process doi: 10.1016/j.sigpro.2017.05.002 – ident: CR5 – volume: 75 start-page: 17157 year: 2016 end-page: 17170 ident: CR13 article-title: An image encryption scheme based on DNA coding and permutation of hyper-image publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-2982-x – volume: 16 start-page: 1 year: 2017 end-page: 23 ident: CR14 article-title: Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations publication-title: Quantum Inf Process doi: 10.1007/s11128-017-1612-0 – volume: 4 start-page: 77 year: 2018 end-page: 87 ident: CR7 article-title: Advanced media-based smart big data on intelligent cloud systems publication-title: IEEE Trans Sustain Comput doi: 10.1109/tsusc.2018.2817043 – volume: 28 start-page: 269 year: 2003 end-page: 271 ident: CR4 article-title: Optical image encryption by random shifting in fractional Fourier domains publication-title: Opt Lett doi: 10.1364/ol.28.000269 – ident: 8880_CR3 – ident: 8880_CR5 doi: 10.1109/INVENTIVE.2016.7823276 – volume: 75 start-page: 17157 year: 2016 ident: 8880_CR13 publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-2982-x – volume: 28 start-page: 269 year: 2003 ident: 8880_CR4 publication-title: Opt Lett doi: 10.1364/ol.28.000269 – volume: 141 start-page: 109 year: 2017 ident: 8880_CR10 publication-title: Signal Process doi: 10.1016/j.sigpro.2017.04.006 – volume: 98 start-page: 1 year: 2017 ident: 8880_CR1 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2017.05.001 – volume: 26 start-page: 1022 year: 2017 ident: 8880_CR12 publication-title: Chinese J Electron doi: 10.1049/cje.2017.08.022 – volume: 140 start-page: 87 year: 2017 ident: 8880_CR8 publication-title: Signal Process doi: 10.1016/j.sigpro.2017.05.002 – volume: 138 start-page: 129 year: 2017 ident: 8880_CR6 publication-title: Signal Process doi: 10.1016/j.sigpro.2017.03.011 – volume: 78 start-page: 20037 year: 2019 ident: 8880_CR11 publication-title: Multimed Tools Appl doi: 10.1007/s11042-018-7110-2 – volume: 4 start-page: 77 year: 2018 ident: 8880_CR7 publication-title: IEEE Trans Sustain Comput doi: 10.1109/tsusc.2018.2817043 – volume: 78 start-page: 27569 year: 2019 ident: 8880_CR2 publication-title: Multimed Tools Appl doi: 10.1007/s11042-019-07852-2 – ident: 8880_CR9 doi: 10.1063/1.4994860 – volume: 16 start-page: 1 year: 2017 ident: 8880_CR14 publication-title: Quantum Inf Process doi: 10.1007/s11128-017-1612-0 |
| SSID | ssj0016524 |
| Score | 2.4502847 |
| Snippet | Based on chaotic encryption technology and DNA cryptography, a multidimensional chaotic image encryption algorithm based on DNA coding is proposed in this... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 21579 |
| SubjectTerms | Algorithms Computer Communication Networks Computer Science Cryptography Data encryption Data Structures and Information Theory Deoxyribonucleic acid DNA Encryption Feature extraction Lorenz system Multimedia Information Systems Mutation Scrambling (communication) Special Purpose and Application-Based Systems Statistical analysis |
| SummonAdditionalLinks | – databaseName: ABI/INFORM Global dbid: M0C link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwED1BYYCBQgFRKMgDG1g4ThPHE6pKKzpQMYDULXKchCL1i7Yg0V_POXFaQKILa5w4Uc53987nuwdwyYMYLX_dpTytC4qQOqJR7DKa-qYrrpa-clVGNiG63aDXk492w21mj1UWNjEz1PFYmz3yG15HoIHBgWC3kzdqWKNMdtVSaGzClkE25kjfA2suswi-Z0ltA0bRMzq2aCYvnXNMYYoJnlDPcHzx0zGt0OavBGnmd9rl_37xPuxZxEka-RI5gI1kVIFyweZArHJXYPdba8JD6DRIVpsbm-7_eecO0uyrMU5COkM0QqQ10tPPzOCQxuAFXzzvD4lxijHBS3fdBmmOjWM8gud266l5Ty3tAtWoj3MaswgDM-kL7bmpz3kaKRZEqaMUxnpu5KcGAymhJNPc1zHnWgnXE4olKHchY_cYSqPxKDkBkiinrrTGmCpF3JXIgCGeFCyV0vOU1KoKTvHPQ217khtqjEG46qZs5BSinMJMTuGiClfLZyZ5R461d9cK4YRWO2fhSjJVuC7Euxr-e7bT9bOdwQ7PVxRlTg1K8-l7cg7b-mP-OpteZGvzC3GJ5yc priority: 102 providerName: ProQuest |
| Title | A Multidimensional Chaotic Image Encryption Algorithm based on DNA Coding |
| URI | https://link.springer.com/article/10.1007/s11042-020-08880-z https://www.proquest.com/docview/2432689970 |
| Volume | 79 |
| WOSCitedRecordID | wos000531131500002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLink Journals customDbUrl: eissn: 1573-7721 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLZg4wAHBgPEYEw5cINIafpIexxjExNiTOPNpUrTFpD2QNtAYr8ep2s3QIAEl0ht06iyY_uzUn8G2OduiJ7fMimPLUERUgc0CE1GY0ez4irPkaZMmk2IVsu9vfXaaVHYKPvbPTuSTDz1vNjN0KUkOt1By3AZnSxCHsOdqxs2dC6uZ2cHjp22ssU5GA-NtFTm-zU-h6M5xvxyLJpEm0bhf9-5BqspuiTV6XZYh4WoX4RC1rmBpIZchJUPNIQb0KySpA431Ez_U5YOUnuUA1yENHvocEi9r4ZviXMh1e7DYPg0fuwRHQBDgreOW1VSG-gguAlXjfpl7YSmLRaoQtsb05AFmIR5jlC2GTucx4FkbhAbUmJeZwZOrPGOFNJjijsq5FxJYdpCsgh1LLzQ3IJcf9CPtoFE0rCkUpg_xYixItQLYkfBYs-zbekpWQIjk7SvUv5x3Qaj68-Zk7XkfJScn0jOn5TgYPbO85R949fZ5UyBfmqJI59bCFAxqRSsBIeZwuaPf15t52_Td2GZT3VOmVGG3Hj4Eu3BknodP42GFVgUN3cVyB_VW-0OXp0KiuMZq-mRn-PYtu8ryT5-B0LZ5DM |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3JTsMwEB2xScCBpYAoqw9wAgvHWRwfEKpKEVWh4lAkbsFxEooELbQFBB_FNzLOQgGJ3jhwjZORHL_ZMpl5ADvcj9DyOzbliSMohtQhDSOb0cQzU3G19JStUrIJ0Wz6V1fyYgzei14Y81tlYRNTQx11tflGfsAdDDQwORDs6OGRGtYoU10tKDQyWDTi1xdM2fqH9WM8313OT2qt6inNWQWoRrgNaMRCzDukJ7RrJx7nSaiYHyaWUpjK2KGXGBevhJJMc09HnGslbFcoFuO2hIxslDsOk47tC6NXDUE_qxaem5Po-oyiJ7byJp2sVc8yjTAmWUO9xvW3745wGN3-KMimfu5k_r-9oQWYyyNqUslUYBHG4k4J5gu2CpIbrxLMfhm9uAT1Ckl7jyPDbpBNJiHVtuqiEFK_RyNLah3de00NKqnc3eBGB-17Ypx-RPDScbNCql3j-Jfh8k-2twITnW4nXgUSK8tRWmPOmGBcGUufYbwsWCKl6yqpVRms4owDnc9cN9Qfd8FwWrTBRYC4CFJcBG9l2Pt85iGbODLy7o0CDEFuffrBEAll2C_gNFz-XdraaGnbMH3aOj8LzurNxjrM8AzNlFkbMDHoPcWbMKWfB7f93laqFwSu_xpmH1PSQ3I |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3JTsMwEB2xCcGBHVFWH-AEVh2nieMDQlVLRQWqegAJcQmOEwMStNAWEHwaX8c4CwUkuHHgmmUkx88zb2LPPIBtHsTo-Ssu5aYiKFLqiEaxy6jxbVdcLX3lqlRsQrRawfm5bI_AW1ELY49VFj4xddRxV9t_5GVeQaKByYFgZZMfi2jXGwf3D9QqSNmd1kJOI4PIcfLyjOlbf79Zx7ne4bxxeFo7ornCANUIvQGNWYQ5iPSF9lzjc24ixYLIOEphWuNGvrHhXgklmea-jjnXSrieUCzBIQoZu2h3FMYF5pj2OGHbu_jYwfC9XFA3YBSjspMX7GRle44tirGJG65xvP_6NSgOme63zdk05jVm__PXmoOZnGmTarY05mEk6SzAbKFiQXKntgDTn1oyLkKzStKa5NiqHmQdS0jtWnXRCGneofMlhx3de0kdLaneXuFAB9d3xJKBmOCleqtKal1LCJbg7E-GtwxjnW4nWQGSKKeitMZc0iDfTGTAkEcLZqT0PCW1KoFTzHeo817sVhLkNhx2kbYYCREjYYqR8LUEux_v3GedSH59er0ARph7pX44REUJ9gpoDW__bG31d2tbMInoCk-areM1mOIZsClz1mFs0HtMNmBCPw1u-r3NdIkQuPxrlL0DJ1dMlg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Multidimensional+Chaotic+Image+Encryption+Algorithm+based+on+DNA+Coding&rft.jtitle=Multimedia+tools+and+applications&rft.au=Liu%2C+Yang&rft.au=Zhang%2C+Jindong&rft.date=2020-08-01&rft.pub=Springer+US&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=79&rft.issue=29-30&rft.spage=21579&rft.epage=21601&rft_id=info:doi/10.1007%2Fs11042-020-08880-z&rft.externalDocID=10_1007_s11042_020_08880_z |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon |