Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform
Image encryption is an effective way to protect image data. However, existing image encryption algorithms are still unable to strike a good balance between security and efficiency. To overcome the shortcomings of these algorithms, an image encryption algorithm based on plane-level image filtering an...
Gespeichert in:
| Veröffentlicht in: | Mathematics (Basel) Jg. 10; H. 15; S. 2751 |
|---|---|
| Hauptverfasser: | , , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Basel
MDPI AG
01.08.2022
|
| Schlagworte: | |
| ISSN: | 2227-7390, 2227-7390 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Image encryption is an effective way to protect image data. However, existing image encryption algorithms are still unable to strike a good balance between security and efficiency. To overcome the shortcomings of these algorithms, an image encryption algorithm based on plane-level image filtering and discrete logarithmic transformation (IEA-IF-DLT) is proposed. By utilizing the hash value more rationally, our proposed IEA-IF-DLT avoids the overhead caused by repeated generations of chaotic sequences and further improves the encryption efficiency through plane-level and three-dimensional (3D) encryption operations. Aiming at the problem that common modular addition and XOR operations are subject to differential attacks, IEA-IF-DLT additionally includes discrete logarithmic transformation to boost security. In IEA-IF-DLT, the plain image is first transformed into a 3D image, and then three rounds of plane-level permutation, plane-level pixel filtering, and 3D chaotic image superposition are performed. Next, after a discrete logarithmic transformation, a random pixel swapping is conducted to obtain the cipher image. To demonstrate the superiority of IEA-IF-DLT, we compared it with some state-of-the-art algorithms. The test and analysis results show that IEA-IF-DLT not only has better security performance, but also exhibits significant efficiency advantages. |
|---|---|
| AbstractList | Image encryption is an effective way to protect image data. However, existing image encryption algorithms are still unable to strike a good balance between security and efficiency. To overcome the shortcomings of these algorithms, an image encryption algorithm based on plane-level image filtering and discrete logarithmic transformation (IEA-IF-DLT) is proposed. By utilizing the hash value more rationally, our proposed IEA-IF-DLT avoids the overhead caused by repeated generations of chaotic sequences and further improves the encryption efficiency through plane-level and three-dimensional (3D) encryption operations. Aiming at the problem that common modular addition and XOR operations are subject to differential attacks, IEA-IF-DLT additionally includes discrete logarithmic transformation to boost security. In IEA-IF-DLT, the plain image is first transformed into a 3D image, and then three rounds of plane-level permutation, plane-level pixel filtering, and 3D chaotic image superposition are performed. Next, after a discrete logarithmic transformation, a random pixel swapping is conducted to obtain the cipher image. To demonstrate the superiority of IEA-IF-DLT, we compared it with some state-of-the-art algorithms. The test and analysis results show that IEA-IF-DLT not only has better security performance, but also exhibits significant efficiency advantages. |
| Author | Zhang, Jing Zhang, Junkun Zhao, Xiangyu Qin, Zhentao He, Yigang Feng, Wei |
| Author_xml | – sequence: 1 givenname: Wei orcidid: 0000-0003-3023-5225 surname: Feng fullname: Feng, Wei – sequence: 2 givenname: Xiangyu orcidid: 0000-0003-2538-8657 surname: Zhao fullname: Zhao, Xiangyu – sequence: 3 givenname: Jing orcidid: 0000-0001-9834-081X surname: Zhang fullname: Zhang, Jing – sequence: 4 givenname: Zhentao orcidid: 0000-0002-1583-6164 surname: Qin fullname: Qin, Zhentao – sequence: 5 givenname: Junkun orcidid: 0000-0001-7053-1462 surname: Zhang fullname: Zhang, Junkun – sequence: 6 givenname: Yigang orcidid: 0000-0002-6642-0740 surname: He fullname: He, Yigang |
| BookMark | eNptkU1PHDEMhqMKpFLg1h8QqdcO5GOSzBwpXWClleBAz1EmcYasZpJtEirx7xnYCiGEL7bsx68t-xs6iCkCQt8pOeO8J-ezqQ-UUMGUoF_QEWNMNWopHLyLv6LTUrZksZ7yru2P0LCezQh4FW1-2tWQIr6YxpRDfZjxL1PA4SV1N5kIzQb-wYT3_FWYKuQQR2yiw79DsRkq4E0azWtvsPg-m1h8yvMJOvRmKnD63x-jP1er-8ubZnN7vb682DSWS1Wbgbf9wDo_QAuWOg9sEExYoaxjwrWcSt-RXhEugTrXdoOwbed7y5lVgnDDj9F6r-uS2epdDrPJTzqZoF8TKY_a5BrsBFoy74CDXQb1rbSqB95R20lhJOOd8YvWj73WLqe_j1Cq3qbHHJf1NVOESEVkSxbq556yOZWSwb9NpUS_PEW_f8qCsw-4DdW8HL1mE6bPm54BrvCR3A |
| CitedBy_id | crossref_primary_10_1145_3745785 crossref_primary_10_3390_app14031311 crossref_primary_10_1109_ACCESS_2023_3285481 crossref_primary_10_1007_s11227_025_06943_2 crossref_primary_10_1109_JIOT_2024_3409373 crossref_primary_10_3390_fractalfract7120887 crossref_primary_10_3390_math11163608 crossref_primary_10_1088_1402_4896_ad9869 crossref_primary_10_1038_s41598_024_59277_z crossref_primary_10_1155_cplx_2910833 crossref_primary_10_1038_s41598_025_95511_y crossref_primary_10_1038_s41598_025_92065_x crossref_primary_10_1142_S0218127425500968 crossref_primary_10_1038_s41598_025_85814_5 crossref_primary_10_3390_math12172764 crossref_primary_10_1088_1402_4896_ad5ed1 crossref_primary_10_1016_j_chaos_2024_115952 crossref_primary_10_1371_journal_pone_0300228 crossref_primary_10_3390_electronics14132592 crossref_primary_10_1007_s00340_025_08412_3 crossref_primary_10_3390_math13060982 crossref_primary_10_1007_s11571_025_10217_1 crossref_primary_10_1016_j_jestch_2024_101634 crossref_primary_10_1109_TCSVT_2024_3470110 crossref_primary_10_1007_s10586_024_04948_9 crossref_primary_10_1109_ACCESS_2024_3454562 crossref_primary_10_1109_ACCESS_2023_3302012 crossref_primary_10_3390_math12131990 crossref_primary_10_3390_fractalfract8070421 crossref_primary_10_33889_IJMEMS_2025_10_5_066 crossref_primary_10_1088_1402_4896_ad7c8f crossref_primary_10_3390_electronics13245019 crossref_primary_10_1088_1402_4896_ad30ec crossref_primary_10_3390_e25081147 crossref_primary_10_3390_electronics13224337 crossref_primary_10_3390_sym16081093 crossref_primary_10_1007_s00530_024_01449_y crossref_primary_10_1016_j_asr_2025_08_070 crossref_primary_10_1080_09500340_2024_2395982 crossref_primary_10_1140_epjb_s10051_024_00820_2 crossref_primary_10_3390_sym16070840 crossref_primary_10_1088_1402_4896_ad8a9f crossref_primary_10_1016_j_isci_2024_110768 crossref_primary_10_3390_math11143133 crossref_primary_10_1109_JIOT_2024_3432494 crossref_primary_10_3390_mi14112090 crossref_primary_10_1016_j_jisa_2024_103785 crossref_primary_10_1007_s11071_024_10726_4 crossref_primary_10_3390_electronics13132649 crossref_primary_10_1016_j_jisa_2025_103981 crossref_primary_10_3390_math12182798 crossref_primary_10_1109_ACCESS_2023_3311038 crossref_primary_10_3390_math12243917 crossref_primary_10_3390_math12050638 crossref_primary_10_3390_math12213345 crossref_primary_10_1088_1402_4896_adcdd5 crossref_primary_10_1088_1402_4896_ad7bf5 crossref_primary_10_3390_e25081178 crossref_primary_10_1007_s11071_025_11696_x crossref_primary_10_1080_09500340_2025_2508790 crossref_primary_10_1016_j_eswa_2024_123190 crossref_primary_10_1109_ACCESS_2024_3389975 crossref_primary_10_1088_1402_4896_adaa39 crossref_primary_10_1007_s11071_024_10317_3 crossref_primary_10_1109_ACCESS_2025_3558948 crossref_primary_10_1109_ACCESS_2022_3204873 crossref_primary_10_1109_JIOT_2025_3542996 crossref_primary_10_1109_TII_2024_3395631 crossref_primary_10_1038_s41598_025_90502_5 crossref_primary_10_1088_1402_4896_ad99a0 crossref_primary_10_1007_s12145_024_01424_1 crossref_primary_10_3390_sym17020166 crossref_primary_10_1080_13682199_2024_2398954 crossref_primary_10_3390_math12243948 crossref_primary_10_1016_j_cosrev_2025_100759 crossref_primary_10_1109_ACCESS_2025_3525729 crossref_primary_10_3390_e24111551 crossref_primary_10_1088_1402_4896_addef7 crossref_primary_10_1007_s11071_024_09861_9 crossref_primary_10_3390_sym17030349 crossref_primary_10_1016_j_chaos_2025_116674 crossref_primary_10_3390_systems13050341 crossref_primary_10_1016_j_cjph_2025_05_037 crossref_primary_10_1038_s41598_024_53325_4 crossref_primary_10_1145_3708546 crossref_primary_10_1088_1402_4896_ad63dd crossref_primary_10_1088_1402_4896_adc2a8 crossref_primary_10_1016_j_jksuci_2024_102169 crossref_primary_10_1109_ACCESS_2025_3533611 crossref_primary_10_3390_e27080852 crossref_primary_10_1088_1402_4896_ad6062 crossref_primary_10_3390_fractalfract9070426 crossref_primary_10_3390_math13040644 crossref_primary_10_1007_s11071_025_10979_7 crossref_primary_10_1016_j_chaos_2024_114958 |
| Cites_doi | 10.1016/j.ijleo.2018.12.103 10.1109/TII.2020.2966511 10.1016/j.ins.2021.06.032 10.1016/j.chaos.2021.111235 10.1109/ACCESS.2019.2893760 10.3390/e23111373 10.1016/j.chaos.2020.110309 10.1016/j.jvcir.2021.103424 10.1109/MMUL.2021.3114589 10.1109/JIOT.2017.2781737 10.1007/s11071-018-4056-x 10.1016/j.chaos.2021.110962 10.1016/j.chaos.2006.01.042 10.1155/2021/1898998 10.1140/epjst/e2019-800209-3 10.1109/TIFS.2018.2812080 10.1142/S0218127406015970 10.1109/TII.2020.3008914 10.1109/TNSM.2020.2969863 10.1109/TCSI.2018.2888688 10.1016/j.sigpro.2018.03.010 10.1109/TII.2019.2957404 10.1016/j.sigpro.2019.06.010 10.1016/j.ins.2020.10.007 10.1109/ACCESS.2019.2893538 10.1109/TC.2021.3051387 10.1016/j.sigpro.2020.107563 10.1007/s11042-020-09111-1 10.1016/j.ins.2015.10.027 10.1016/j.sigpro.2017.08.020 10.1016/j.ins.2016.02.041 10.1016/j.optlaseng.2020.106403 10.1016/j.ins.2020.10.031 10.1016/j.optlastec.2019.105942 10.1109/ACCESS.2018.2890116 10.1109/JPHOT.2018.2880590 10.1109/ACCESS.2021.3123571 10.1109/ACCESS.2020.3038006 10.1016/j.ins.2020.09.032 10.1109/ACCESS.2019.2959137 10.1016/j.ijleo.2012.11.018 10.1016/j.ins.2017.02.036 10.1016/j.optlaseng.2016.08.009 10.1016/j.ins.2018.12.048 10.1016/j.optlaseng.2014.08.005 10.3390/e23030341 10.3390/electronics10121392 10.1016/j.ins.2014.11.018 10.1007/s00521-021-06225-x |
| ContentType | Journal Article |
| Copyright | 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION 3V. 7SC 7TB 7XB 8AL 8FD 8FE 8FG 8FK ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO FR3 GNUQQ HCIFZ JQ2 K7- KR7 L6V L7M L~C L~D M0N M7S P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS Q9U DOA |
| DOI | 10.3390/math10152751 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts Mechanical & Transportation Engineering Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One Community College ProQuest Central Engineering Research Database ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Civil Engineering Abstracts ProQuest Engineering Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Engineering Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Databases ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection ProQuest Central Basic DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) Mechanical & Transportation Engineering Abstracts ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Engineering Collection Advanced Technologies & Aerospace Collection Civil Engineering Abstracts ProQuest Computing Engineering Database ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional ProQuest One Academic UKI Edition Materials Science & Engineering Collection Engineering Research Database ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | Publicly Available Content Database CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Mathematics |
| EISSN | 2227-7390 |
| ExternalDocumentID | oai_doaj_org_article_62fde3ecec1946c79e381c865a6238af 10_3390_math10152751 |
| GroupedDBID | -~X 5VS 85S 8FE 8FG AADQD AAFWJ AAYXX ABDBF ABJCF ABPPZ ABUWG ACIPV ACIWK ADBBV AFFHD AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS AMVHM ARAPS AZQEC BCNDV BENPR BGLVJ BPHCQ CCPQU CITATION DWQXO GNUQQ GROUPED_DOAJ HCIFZ IAO ITC K6V K7- KQ8 L6V M7S MODMG M~E OK1 PHGZM PHGZT PIMPY PQGLB PQQKQ PROAC PTHSS RNS 3V. 7SC 7TB 7XB 8AL 8FD 8FK FR3 JQ2 KR7 L7M L~C L~D M0N P62 PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c367t-b349b28fbe4ec1dfe2b525c57cd25d4316f8097036e1dd48b5c48f9c32c7503a3 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 104 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000839860500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2227-7390 |
| IngestDate | Tue Oct 14 15:08:10 EDT 2025 Fri Jul 25 12:08:21 EDT 2025 Tue Nov 18 21:50:22 EST 2025 Sat Nov 29 07:13:56 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 15 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c367t-b349b28fbe4ec1dfe2b525c57cd25d4316f8097036e1dd48b5c48f9c32c7503a3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-7053-1462 0000-0001-9834-081X 0000-0003-2538-8657 0000-0002-6642-0740 0000-0003-3023-5225 0000-0002-1583-6164 |
| OpenAccessLink | https://doaj.org/article/62fde3ecec1946c79e381c865a6238af |
| PQID | 2700670640 |
| PQPubID | 2032364 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_62fde3ecec1946c79e381c865a6238af proquest_journals_2700670640 crossref_primary_10_3390_math10152751 crossref_citationtrail_10_3390_math10152751 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-08-01 |
| PublicationDateYYYYMMDD | 2022-08-01 |
| PublicationDate_xml | – month: 08 year: 2022 text: 2022-08-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Basel |
| PublicationPlace_xml | – name: Basel |
| PublicationTitle | Mathematics (Basel) |
| PublicationYear | 2022 |
| Publisher | MDPI AG |
| Publisher_xml | – name: MDPI AG |
| References | Wang (ref_51) 2015; 66 Hua (ref_48) 2019; 480 Hua (ref_42) 2017; 396 (ref_5) 2018; 92 Ma (ref_44) 2020; 54 Chai (ref_20) 2021; 556 ref_13 Hua (ref_40) 2018; 149 ref_10 Sahasrabuddhe (ref_37) 2021; 550 Ye (ref_19) 2020; 172 Feng (ref_41) 2021; 2021 Feng (ref_28) 2019; 7 Feng (ref_29) 2019; 186 Li (ref_15) 2021; 61 Alvarez (ref_32) 2006; 16 Hua (ref_43) 2019; 7 Iliyasu (ref_18) 2021; 138 Bezerra (ref_24) 2021; 151 Feng (ref_31) 2021; 9 Preishuber (ref_33) 2018; 13 Zhang (ref_8) 2020; 16 Wang (ref_21) 2021; 574 Gan (ref_38) 2021; 33 Wang (ref_23) 2021; 147 Gao (ref_34) 2007; 33 Liu (ref_45) 2022; 29 Mazurczyk (ref_11) 2020; 17 Zhang (ref_4) 2020; 16 Chen (ref_46) 2022; 83 Feng (ref_14) 2019; 7 Feng (ref_30) 2020; 8 Chai (ref_53) 2017; 88 Feng (ref_27) 2018; 10 Ghadirli (ref_1) 2019; 164 Li (ref_36) 2022; 71 Diaconu (ref_25) 2016; 355–356 Feng (ref_39) 2019; 228 Hua (ref_22) 2021; 546 Ahmad (ref_9) 2021; 33 Li (ref_3) 2019; 48 Zhang (ref_16) 2013; 124 Wang (ref_12) 2020; 141 Wu (ref_52) 2016; 349–350 (ref_17) 2020; 124 Cao (ref_50) 2018; 143 Zhu (ref_49) 2019; 7 Hua (ref_47) 2015; 297 Zhang (ref_6) 2020; 17 Li (ref_35) 2019; 66 Zefreh (ref_26) 2020; 79 Zhang (ref_2) 2018; 5 ref_7 |
| References_xml | – volume: 186 start-page: 449 year: 2019 ident: ref_29 article-title: Cryptanalysis of the integrated chaotic systems based image encryption algorithm publication-title: Optik doi: 10.1016/j.ijleo.2018.12.103 – volume: 16 start-page: 6641 year: 2020 ident: ref_8 article-title: Secure Transmission of Compressed Sampling Data Using Edge Clouds publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2020.2966511 – volume: 574 start-page: 505 year: 2021 ident: ref_21 article-title: A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT publication-title: Inf. Sci. doi: 10.1016/j.ins.2021.06.032 – volume: 61 start-page: 102844 year: 2021 ident: ref_15 article-title: A novel image encryption scheme based on non-adjacent parallelable permutation and dynamic DNA-level two-way diffusion publication-title: J. Inf. Secur. Appl. – volume: 151 start-page: 111235 year: 2021 ident: ref_24 article-title: A new efficient permutation-diffusion encryption algorithm based on a chaotic map publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2021.111235 – volume: 7 start-page: 12584 year: 2019 ident: ref_28 article-title: Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2893760 – ident: ref_7 doi: 10.3390/e23111373 – volume: 141 start-page: 110309 year: 2020 ident: ref_12 article-title: Image encryption algorithm based on tent-dynamics coupled map lattices and diffusion of household publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2020.110309 – volume: 83 start-page: 103424 year: 2022 ident: ref_46 article-title: Security Measurement of a Medical Image Communication Scheme based on Chaos and DNA publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2021.103424 – volume: 29 start-page: 74 year: 2022 ident: ref_45 article-title: Cryptanalyzing two image encryption algorithms based on a first-order time-delay system publication-title: IEEE Multimed. doi: 10.1109/MMUL.2021.3114589 – volume: 5 start-page: 3442 year: 2018 ident: ref_2 article-title: Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2017.2781737 – volume: 92 start-page: 305 year: 2018 ident: ref_5 article-title: Brief review on application of nonlinear dynamics in image encryption publication-title: Nonlinear Dyn. doi: 10.1007/s11071-018-4056-x – volume: 147 start-page: 110962 year: 2021 ident: ref_23 article-title: An image encryption algorithm based on dynamic row scrambling and Zigzag transformation publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2021.110962 – volume: 33 start-page: 922 year: 2007 ident: ref_34 article-title: Adaptive synchronization of a new hyperchaotic system with uncertain parameters publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2006.01.042 – volume: 2021 start-page: 1898998 year: 2021 ident: ref_41 article-title: A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps publication-title: Complexity doi: 10.1155/2021/1898998 – volume: 228 start-page: 1951 year: 2019 ident: ref_39 article-title: Image encryption algorithm based on discrete logarithm and memristive chaotic system publication-title: Eur. Phys. J. Spec. Top. doi: 10.1140/epjst/e2019-800209-3 – volume: 54 start-page: 102566 year: 2020 ident: ref_44 article-title: Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps publication-title: J. Inf. Secur. Appl. – volume: 13 start-page: 2137 year: 2018 ident: ref_33 article-title: Depreciating motivation and empirical security analysis of chaos-based image and video encryption publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2018.2812080 – volume: 16 start-page: 2129 year: 2006 ident: ref_32 article-title: Some basic cryptographic requirements for chaos-based cryptosystems publication-title: Int. J. Bifurc. Chaos doi: 10.1142/S0218127406015970 – volume: 17 start-page: 3401 year: 2020 ident: ref_6 article-title: Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2020.3008914 – volume: 17 start-page: 118 year: 2020 ident: ref_11 article-title: Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario publication-title: IEEE Trans. Netw. Serv. Manag. doi: 10.1109/TNSM.2020.2969863 – volume: 66 start-page: 2322 year: 2019 ident: ref_35 article-title: Dynamic analysis of digital chaotic maps via state-mapping networks publication-title: IEEE Trans. Circuits Syst. I Regul. Pap. doi: 10.1109/TCSI.2018.2888688 – volume: 149 start-page: 148 year: 2018 ident: ref_40 article-title: 2D Logistic-Sine-coupling map for image encryption publication-title: Signal Process. doi: 10.1016/j.sigpro.2018.03.010 – volume: 16 start-page: 7566 year: 2020 ident: ref_4 article-title: A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2019.2957404 – volume: 164 start-page: 163 year: 2019 ident: ref_1 article-title: An overview of encryption algorithms in color images publication-title: Signal Process. doi: 10.1016/j.sigpro.2019.06.010 – volume: 556 start-page: 305 year: 2021 ident: ref_20 article-title: An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.10.007 – volume: 7 start-page: 14081 year: 2019 ident: ref_49 article-title: 2D Logistic-Modulated-Sine-Coupling-Logistic Chaotic Map for Image Encryption publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2893538 – volume: 48 start-page: 102361 year: 2019 ident: ref_3 article-title: When an attacker meets a cipher-image in 2018: A Year in Review publication-title: J. Inf. Secur. Appl. – volume: 71 start-page: 364 year: 2022 ident: ref_36 article-title: The graph structure of the generalized discrete Arnold’s Cat map publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2021.3051387 – volume: 172 start-page: 107563 year: 2020 ident: ref_19 article-title: Image encryption and hiding algorithm based on compressive sensing and random numbers insertion publication-title: Signal Process. doi: 10.1016/j.sigpro.2020.107563 – volume: 79 start-page: 24993 year: 2020 ident: ref_26 article-title: An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-020-09111-1 – volume: 355–356 start-page: 314 year: 2016 ident: ref_25 article-title: Circular inter-intra pixels bit-level permutation and chaos-based image encryption publication-title: Inf. Sci. doi: 10.1016/j.ins.2015.10.027 – volume: 143 start-page: 122 year: 2018 ident: ref_50 article-title: A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map publication-title: Signal Process. doi: 10.1016/j.sigpro.2017.08.020 – volume: 349–350 start-page: 137 year: 2016 ident: ref_52 article-title: A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system publication-title: Inf. Sci. doi: 10.1016/j.ins.2016.02.041 – volume: 138 start-page: 106403 year: 2021 ident: ref_18 article-title: Optical image encryption based on quantum walks publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2020.106403 – volume: 550 start-page: 252 year: 2021 ident: ref_37 article-title: Multiple images encryption based on 3D scrambling and hyper-chaotic system publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.10.031 – volume: 124 start-page: 105942 year: 2020 ident: ref_17 article-title: Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2019.105942 – volume: 7 start-page: 8660 year: 2019 ident: ref_43 article-title: Image Encryption Using Josephus Problem and Filtering Diffusion publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2890116 – volume: 33 start-page: 77 year: 2021 ident: ref_9 article-title: Security analysis and enhancements of an image cryptosystem based on hyperchaotic system publication-title: J. King Saud Univ.-Comput. Inf. Sci. – volume: 10 start-page: 7909215 year: 2018 ident: ref_27 article-title: Cryptanalysis and improvement of the hyper-chaotic image encryption scheme based on DNA encoding and scrambling publication-title: IEEE Photonics J. doi: 10.1109/JPHOT.2018.2880590 – volume: 9 start-page: 145459 year: 2021 ident: ref_31 article-title: Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3123571 – volume: 8 start-page: 209471 year: 2020 ident: ref_30 article-title: Cryptanalyzing a Novel Hyper-Chaotic Image Encryption Scheme Based on Pixel-Level Filtering and DNA-Level Diffusion publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3038006 – volume: 546 start-page: 1063 year: 2021 ident: ref_22 article-title: Cross-plane colour image encryption using a two-dimensional logistic tent modular map publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.09.032 – volume: 7 start-page: 181589 year: 2019 ident: ref_14 article-title: A Plain-Image-Related Chaotic Image Encryption Algorithm Based on DNA Sequence Operation and Discrete Logarithm publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2959137 – volume: 124 start-page: 3596 year: 2013 ident: ref_16 article-title: A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system publication-title: Opt.-Int. J. Light Electron Opt. doi: 10.1016/j.ijleo.2012.11.018 – volume: 396 start-page: 97 year: 2017 ident: ref_42 article-title: Design of image cipher using block-based scrambling and image filtering publication-title: Inf. Sci. doi: 10.1016/j.ins.2017.02.036 – volume: 88 start-page: 197 year: 2017 ident: ref_53 article-title: A novel chaos-based image encryption algorithm using DNA sequence operations publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2016.08.009 – volume: 480 start-page: 403 year: 2019 ident: ref_48 article-title: Cosine-transform-based chaotic system for image encryption publication-title: Inf. Sci. doi: 10.1016/j.ins.2018.12.048 – volume: 66 start-page: 10 year: 2015 ident: ref_51 article-title: A novel chaotic block image encryption algorithm based on dynamic random growth technique publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2014.08.005 – ident: ref_13 doi: 10.3390/e23030341 – ident: ref_10 doi: 10.3390/electronics10121392 – volume: 297 start-page: 80 year: 2015 ident: ref_47 article-title: 2D Sine Logistic modulation map for image encryption publication-title: Inf. Sci. doi: 10.1016/j.ins.2014.11.018 – volume: 33 start-page: 16251 year: 2021 ident: ref_38 article-title: Image cipher using image filtering with 3D DNA-based confusion and diffusion strategy publication-title: Neural Comput. Appl. doi: 10.1007/s00521-021-06225-x |
| SSID | ssj0000913849 |
| Score | 2.5220606 |
| Snippet | Image encryption is an effective way to protect image data. However, existing image encryption algorithms are still unable to strike a good balance between... |
| SourceID | doaj proquest crossref |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database |
| StartPage | 2751 |
| SubjectTerms | Algorithms Chaos theory cryptanalysis Data encryption discrete logarithm Efficiency Encryption image encryption image filtering Image filters Logarithms Mathematics Permutations Pixels Security security analysis Transformations |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9MwFLfYx2EcgH2JwkA-jNNkrXHsxDmhFVqBNKoJDWm3yH62u0pburXdpP33vJe6hWliF67OS5TkPb9v_x5jhzJiWOUtCK8VCOV0V1Q-KlEa34WowWala4dNlMOhubiozlLCbZbaKpc6sVXUfgKUIz-mAmlRUt3p882toKlRVF1NIzTW2AYhlaGcb_T6w7OfqywLoV4aVS063nOM74_RD7xEMdSy1NkjW9RC9j_RyK2ZGbz-3xd8w14lB5OfLCRim70IzQ57-WOFzjrbZe77NWoR3m9g-tBqDH5yNcJHzS-veQ-tmue4RNOMgjilniK-oB-MqbKOpo7bxvOvY1Q46HHz08nItveOgZ8v3eA99mvQP__yTaRZCwLyopwLl6vKSRNdUAEyH4N0WmrQJXipPZ2Xj6ZbEVpXyLxXxmlQJlaQS6BKqM332XozacJbxl2Oex4yaTMADL_Ih3O2yMEAOAWu22FHy79eQwIip3kYVzUGJMSj-m8eddinFfXNAoDjH3Q9YuCKhmCz24XJdFSnXVgXMvqQB8BPrFQBZRXQYQFTaIteoLGxww6WvK3TXp7Vfxj77vnL79mWpMMRbXvgAVufT-_CB7YJ9_PxbPoxieZv_QvvwQ priority: 102 providerName: ProQuest |
| Title | Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform |
| URI | https://www.proquest.com/docview/2700670640 https://doaj.org/article/62fde3ecec1946c79e381c865a6238af |
| Volume | 10 |
| WOSCitedRecordID | wos000839860500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2227-7390 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913849 issn: 2227-7390 databaseCode: DOA dateStart: 20130101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2227-7390 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913849 issn: 2227-7390 databaseCode: M~E dateStart: 20130101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 2227-7390 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913849 issn: 2227-7390 databaseCode: K7- dateStart: 20130301 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 2227-7390 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913849 issn: 2227-7390 databaseCode: M7S dateStart: 20130301 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2227-7390 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913849 issn: 2227-7390 databaseCode: BENPR dateStart: 20130301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 2227-7390 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913849 issn: 2227-7390 databaseCode: PIMPY dateStart: 20130301 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LbxMxELZQ4QAHRHmIQIl8gBOyuuu11_axgUStaKMIilROK3tst5HaDUoCEhd-O2PvJgpCVS9cfPDOalfjeWrG3xDylkdMq7wF5qUAJpwsmPFRMKV9AVGCLZXLwybUdKovLsxsZ9RX6gnr4IE7xh3WPPpQBQiA6XYNygT0MaBradFxaxuT9S2U2Ummsg02ZaWF6TrdK8zrDzH-u0Lxk1zJ8i8flKH6_7HE2b1MnpDHfVxIj7r_2Sf3QvuUPDrbgqqunhF3coPKT8ctLH9lRadH15cLTO6vbugInZGnuJWGEAV2mlqBaEc_maeCOHooaltPP87RTmCgTE8Xlza_Owd6volen5Ovk_H5h2PWj0hgUNVqzVwljOM6uiCQQT4G7iSXIBV4Ln265h51YRLIVii9F9pJEDoaqDikAqatXpC9dtGGl4S6ClUVSm5LAMyaUujlbF2BBnACXDEg7zdMa6DHD09jLK4bzCMSi5tdFg_Iuy319w434xa6UeL_liahXecNlIGml4HmLhkYkIPN6TW9Cq6aVFGvVSpUvvof33hNHvJ08yH3_h2QvfXyR3hDHsDP9Xy1HJL7o_F09nmYpRDXT4oNUxvpl7T-HuPz2cnZ7NsfNennXw |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VggQceBY1UGAP9IRWtfdhrw8ItbRRo6QRhyD1Zryz6zRS67RJAPVP8RvZ8SOAENx64LoeW17v529mdmZnAN6IMrhVrkDutEKurI545krFU-MiLDUWcWrrZhPpeGxOT7OPG_C9OwtDaZUdJ9ZE7eZIe-R7FCBNUoo7vb-84tQ1iqKrXQuNBhZDf_0tuGzLd4PDsL67QvSPJh-OedtVgKNM0hW3UmVWmNJ65TF2pRdWC406RSe0o5PhpYkyqkvlY-eUsRqVKTOUAinmV8jw3FtwW0mTUK3-YcrXezpUY9OorMmvlzKL9oLVeRZAr0Wq4980X90g4A_-r5Va_-H_9jkewYPWfGb7Dd4fw4avnsD9k3Xt2eVTsIOLwJHsqMLFdc2HbP98Gl59dXbBDoLOdiwMUa8mz0eUMcUa-f6M8gaCImdF5djhLNBp8CfYaD4t6ntnyCadkb8Fn25kks9gs5pXfhuYlYHRMBZFjBicS7JQbZFINIhWoY168LZb5RzbMuvU7eM8D-4WYSL_FRM92F1LXzblRf4id0CAWctQUfB6YL6Y5i3H5IkonZcewxQzlWCa-WCOoUl0EWxcU5Q92OmwlLdMtcx_Aun5vy-_hrvHk5NRPhqMhy_gnqBjIHUi5A5srhZf_Eu4g19Xs-XiVf1TMPh807D7AeuYS4A |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3fb9MwELbGQIg98HOIwgA_sCcUNXHsxHlAaKOrqFaqSQxpbyE-212lLR1tB9q_xl_HnZMUEIK3PfCaXKI4_vzdne98x9gr4dGtshVEVkmIpFFxVFgvo1zbGLyCKslNaDaRTyb65KQ42mDfu7MwlFbZcWIgajsH2iPvU4A0yynu1PdtWsTRYPj24ktEHaQo0tq102ggcuiuvqH7tnwzGuBc7woxPDh-9z5qOwxEkGb5KjKpLIzQ3jjpILHeCaOEApWDFcrSKXGv44JqVLnEWqmNAql9AakAiv9VKb73BruZyywWIW3w43p_h-ptalk0ufZpWsR9tEBPcQEokavkNy0YmgX8oQuCghve-59_zX12tzWr-V6zDh6wDVc_ZFsf1jVpl4-YGZ0jd_KDGhZXgSf53tkUP311es73UZdbjpeoh5OLxpRJxRv54YzyCVDB86q2fDBDmkU_g4_n0yo8OwN-3Bn_2-zTtQzyMdus57V7wrhJkekgEVUCgE4nWa6mylLQAEaCiXvsdTfjJbTl16kLyFmJbhjho_wVHz22u5a-aMqO_EVun8CzlqFi4eHCfDEtW-4pM-GtSx3gEAuZQV44NNNAZ6pC21dXvsd2OlyVLYMty5-gevrv2y_ZbURbOR5NDp-xO4JOh4T8yB22uVpcuufsFnxdzZaLF2F9cPb5ulH3A5caVIg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+Encryption+Algorithm+Based+on+Plane-Level+Image+Filtering+and+Discrete+Logarithmic+Transform&rft.jtitle=Mathematics+%28Basel%29&rft.au=Wei+Feng&rft.au=Xiangyu+Zhao&rft.au=Jing+Zhang&rft.au=Zhentao+Qin&rft.date=2022-08-01&rft.pub=MDPI+AG&rft.eissn=2227-7390&rft.volume=10&rft.issue=15&rft.spage=2751&rft_id=info:doi/10.3390%2Fmath10152751&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_62fde3ecec1946c79e381c865a6238af |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2227-7390&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2227-7390&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2227-7390&client=summon |