Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform

Image encryption is an effective way to protect image data. However, existing image encryption algorithms are still unable to strike a good balance between security and efficiency. To overcome the shortcomings of these algorithms, an image encryption algorithm based on plane-level image filtering an...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Mathematics (Basel) Jg. 10; H. 15; S. 2751
Hauptverfasser: Feng, Wei, Zhao, Xiangyu, Zhang, Jing, Qin, Zhentao, Zhang, Junkun, He, Yigang
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Basel MDPI AG 01.08.2022
Schlagworte:
ISSN:2227-7390, 2227-7390
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Image encryption is an effective way to protect image data. However, existing image encryption algorithms are still unable to strike a good balance between security and efficiency. To overcome the shortcomings of these algorithms, an image encryption algorithm based on plane-level image filtering and discrete logarithmic transformation (IEA-IF-DLT) is proposed. By utilizing the hash value more rationally, our proposed IEA-IF-DLT avoids the overhead caused by repeated generations of chaotic sequences and further improves the encryption efficiency through plane-level and three-dimensional (3D) encryption operations. Aiming at the problem that common modular addition and XOR operations are subject to differential attacks, IEA-IF-DLT additionally includes discrete logarithmic transformation to boost security. In IEA-IF-DLT, the plain image is first transformed into a 3D image, and then three rounds of plane-level permutation, plane-level pixel filtering, and 3D chaotic image superposition are performed. Next, after a discrete logarithmic transformation, a random pixel swapping is conducted to obtain the cipher image. To demonstrate the superiority of IEA-IF-DLT, we compared it with some state-of-the-art algorithms. The test and analysis results show that IEA-IF-DLT not only has better security performance, but also exhibits significant efficiency advantages.
AbstractList Image encryption is an effective way to protect image data. However, existing image encryption algorithms are still unable to strike a good balance between security and efficiency. To overcome the shortcomings of these algorithms, an image encryption algorithm based on plane-level image filtering and discrete logarithmic transformation (IEA-IF-DLT) is proposed. By utilizing the hash value more rationally, our proposed IEA-IF-DLT avoids the overhead caused by repeated generations of chaotic sequences and further improves the encryption efficiency through plane-level and three-dimensional (3D) encryption operations. Aiming at the problem that common modular addition and XOR operations are subject to differential attacks, IEA-IF-DLT additionally includes discrete logarithmic transformation to boost security. In IEA-IF-DLT, the plain image is first transformed into a 3D image, and then three rounds of plane-level permutation, plane-level pixel filtering, and 3D chaotic image superposition are performed. Next, after a discrete logarithmic transformation, a random pixel swapping is conducted to obtain the cipher image. To demonstrate the superiority of IEA-IF-DLT, we compared it with some state-of-the-art algorithms. The test and analysis results show that IEA-IF-DLT not only has better security performance, but also exhibits significant efficiency advantages.
Author Zhang, Jing
Zhang, Junkun
Zhao, Xiangyu
Qin, Zhentao
He, Yigang
Feng, Wei
Author_xml – sequence: 1
  givenname: Wei
  orcidid: 0000-0003-3023-5225
  surname: Feng
  fullname: Feng, Wei
– sequence: 2
  givenname: Xiangyu
  orcidid: 0000-0003-2538-8657
  surname: Zhao
  fullname: Zhao, Xiangyu
– sequence: 3
  givenname: Jing
  orcidid: 0000-0001-9834-081X
  surname: Zhang
  fullname: Zhang, Jing
– sequence: 4
  givenname: Zhentao
  orcidid: 0000-0002-1583-6164
  surname: Qin
  fullname: Qin, Zhentao
– sequence: 5
  givenname: Junkun
  orcidid: 0000-0001-7053-1462
  surname: Zhang
  fullname: Zhang, Junkun
– sequence: 6
  givenname: Yigang
  orcidid: 0000-0002-6642-0740
  surname: He
  fullname: He, Yigang
BookMark eNptkU1PHDEMhqMKpFLg1h8QqdcO5GOSzBwpXWClleBAz1EmcYasZpJtEirx7xnYCiGEL7bsx68t-xs6iCkCQt8pOeO8J-ezqQ-UUMGUoF_QEWNMNWopHLyLv6LTUrZksZ7yru2P0LCezQh4FW1-2tWQIr6YxpRDfZjxL1PA4SV1N5kIzQb-wYT3_FWYKuQQR2yiw79DsRkq4E0azWtvsPg-m1h8yvMJOvRmKnD63x-jP1er-8ubZnN7vb682DSWS1Wbgbf9wDo_QAuWOg9sEExYoaxjwrWcSt-RXhEugTrXdoOwbed7y5lVgnDDj9F6r-uS2epdDrPJTzqZoF8TKY_a5BrsBFoy74CDXQb1rbSqB95R20lhJOOd8YvWj73WLqe_j1Cq3qbHHJf1NVOESEVkSxbq556yOZWSwb9NpUS_PEW_f8qCsw-4DdW8HL1mE6bPm54BrvCR3A
CitedBy_id crossref_primary_10_1145_3745785
crossref_primary_10_3390_app14031311
crossref_primary_10_1109_ACCESS_2023_3285481
crossref_primary_10_1007_s11227_025_06943_2
crossref_primary_10_1109_JIOT_2024_3409373
crossref_primary_10_3390_fractalfract7120887
crossref_primary_10_3390_math11163608
crossref_primary_10_1088_1402_4896_ad9869
crossref_primary_10_1038_s41598_024_59277_z
crossref_primary_10_1155_cplx_2910833
crossref_primary_10_1038_s41598_025_95511_y
crossref_primary_10_1038_s41598_025_92065_x
crossref_primary_10_1142_S0218127425500968
crossref_primary_10_1038_s41598_025_85814_5
crossref_primary_10_3390_math12172764
crossref_primary_10_1088_1402_4896_ad5ed1
crossref_primary_10_1016_j_chaos_2024_115952
crossref_primary_10_1371_journal_pone_0300228
crossref_primary_10_3390_electronics14132592
crossref_primary_10_1007_s00340_025_08412_3
crossref_primary_10_3390_math13060982
crossref_primary_10_1007_s11571_025_10217_1
crossref_primary_10_1016_j_jestch_2024_101634
crossref_primary_10_1109_TCSVT_2024_3470110
crossref_primary_10_1007_s10586_024_04948_9
crossref_primary_10_1109_ACCESS_2024_3454562
crossref_primary_10_1109_ACCESS_2023_3302012
crossref_primary_10_3390_math12131990
crossref_primary_10_3390_fractalfract8070421
crossref_primary_10_33889_IJMEMS_2025_10_5_066
crossref_primary_10_1088_1402_4896_ad7c8f
crossref_primary_10_3390_electronics13245019
crossref_primary_10_1088_1402_4896_ad30ec
crossref_primary_10_3390_e25081147
crossref_primary_10_3390_electronics13224337
crossref_primary_10_3390_sym16081093
crossref_primary_10_1007_s00530_024_01449_y
crossref_primary_10_1016_j_asr_2025_08_070
crossref_primary_10_1080_09500340_2024_2395982
crossref_primary_10_1140_epjb_s10051_024_00820_2
crossref_primary_10_3390_sym16070840
crossref_primary_10_1088_1402_4896_ad8a9f
crossref_primary_10_1016_j_isci_2024_110768
crossref_primary_10_3390_math11143133
crossref_primary_10_1109_JIOT_2024_3432494
crossref_primary_10_3390_mi14112090
crossref_primary_10_1016_j_jisa_2024_103785
crossref_primary_10_1007_s11071_024_10726_4
crossref_primary_10_3390_electronics13132649
crossref_primary_10_1016_j_jisa_2025_103981
crossref_primary_10_3390_math12182798
crossref_primary_10_1109_ACCESS_2023_3311038
crossref_primary_10_3390_math12243917
crossref_primary_10_3390_math12050638
crossref_primary_10_3390_math12213345
crossref_primary_10_1088_1402_4896_adcdd5
crossref_primary_10_1088_1402_4896_ad7bf5
crossref_primary_10_3390_e25081178
crossref_primary_10_1007_s11071_025_11696_x
crossref_primary_10_1080_09500340_2025_2508790
crossref_primary_10_1016_j_eswa_2024_123190
crossref_primary_10_1109_ACCESS_2024_3389975
crossref_primary_10_1088_1402_4896_adaa39
crossref_primary_10_1007_s11071_024_10317_3
crossref_primary_10_1109_ACCESS_2025_3558948
crossref_primary_10_1109_ACCESS_2022_3204873
crossref_primary_10_1109_JIOT_2025_3542996
crossref_primary_10_1109_TII_2024_3395631
crossref_primary_10_1038_s41598_025_90502_5
crossref_primary_10_1088_1402_4896_ad99a0
crossref_primary_10_1007_s12145_024_01424_1
crossref_primary_10_3390_sym17020166
crossref_primary_10_1080_13682199_2024_2398954
crossref_primary_10_3390_math12243948
crossref_primary_10_1016_j_cosrev_2025_100759
crossref_primary_10_1109_ACCESS_2025_3525729
crossref_primary_10_3390_e24111551
crossref_primary_10_1088_1402_4896_addef7
crossref_primary_10_1007_s11071_024_09861_9
crossref_primary_10_3390_sym17030349
crossref_primary_10_1016_j_chaos_2025_116674
crossref_primary_10_3390_systems13050341
crossref_primary_10_1016_j_cjph_2025_05_037
crossref_primary_10_1038_s41598_024_53325_4
crossref_primary_10_1145_3708546
crossref_primary_10_1088_1402_4896_ad63dd
crossref_primary_10_1088_1402_4896_adc2a8
crossref_primary_10_1016_j_jksuci_2024_102169
crossref_primary_10_1109_ACCESS_2025_3533611
crossref_primary_10_3390_e27080852
crossref_primary_10_1088_1402_4896_ad6062
crossref_primary_10_3390_fractalfract9070426
crossref_primary_10_3390_math13040644
crossref_primary_10_1007_s11071_025_10979_7
crossref_primary_10_1016_j_chaos_2024_114958
Cites_doi 10.1016/j.ijleo.2018.12.103
10.1109/TII.2020.2966511
10.1016/j.ins.2021.06.032
10.1016/j.chaos.2021.111235
10.1109/ACCESS.2019.2893760
10.3390/e23111373
10.1016/j.chaos.2020.110309
10.1016/j.jvcir.2021.103424
10.1109/MMUL.2021.3114589
10.1109/JIOT.2017.2781737
10.1007/s11071-018-4056-x
10.1016/j.chaos.2021.110962
10.1016/j.chaos.2006.01.042
10.1155/2021/1898998
10.1140/epjst/e2019-800209-3
10.1109/TIFS.2018.2812080
10.1142/S0218127406015970
10.1109/TII.2020.3008914
10.1109/TNSM.2020.2969863
10.1109/TCSI.2018.2888688
10.1016/j.sigpro.2018.03.010
10.1109/TII.2019.2957404
10.1016/j.sigpro.2019.06.010
10.1016/j.ins.2020.10.007
10.1109/ACCESS.2019.2893538
10.1109/TC.2021.3051387
10.1016/j.sigpro.2020.107563
10.1007/s11042-020-09111-1
10.1016/j.ins.2015.10.027
10.1016/j.sigpro.2017.08.020
10.1016/j.ins.2016.02.041
10.1016/j.optlaseng.2020.106403
10.1016/j.ins.2020.10.031
10.1016/j.optlastec.2019.105942
10.1109/ACCESS.2018.2890116
10.1109/JPHOT.2018.2880590
10.1109/ACCESS.2021.3123571
10.1109/ACCESS.2020.3038006
10.1016/j.ins.2020.09.032
10.1109/ACCESS.2019.2959137
10.1016/j.ijleo.2012.11.018
10.1016/j.ins.2017.02.036
10.1016/j.optlaseng.2016.08.009
10.1016/j.ins.2018.12.048
10.1016/j.optlaseng.2014.08.005
10.3390/e23030341
10.3390/electronics10121392
10.1016/j.ins.2014.11.018
10.1007/s00521-021-06225-x
ContentType Journal Article
Copyright 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
3V.
7SC
7TB
7XB
8AL
8FD
8FE
8FG
8FK
ABJCF
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FR3
GNUQQ
HCIFZ
JQ2
K7-
KR7
L6V
L7M
L~C
L~D
M0N
M7S
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
Q9U
DOA
DOI 10.3390/math10152751
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
Mechanical & Transportation Engineering Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One Community College
ProQuest Central
Engineering Research Database
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Civil Engineering Abstracts
ProQuest Engineering Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Engineering Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Databases
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
ProQuest Central Basic
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
Mechanical & Transportation Engineering Abstracts
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Engineering Collection
Advanced Technologies & Aerospace Collection
Civil Engineering Abstracts
ProQuest Computing
Engineering Database
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Engineering Research Database
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList Publicly Available Content Database
CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
EISSN 2227-7390
ExternalDocumentID oai_doaj_org_article_62fde3ecec1946c79e381c865a6238af
10_3390_math10152751
GroupedDBID -~X
5VS
85S
8FE
8FG
AADQD
AAFWJ
AAYXX
ABDBF
ABJCF
ABPPZ
ABUWG
ACIPV
ACIWK
ADBBV
AFFHD
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
AMVHM
ARAPS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
CCPQU
CITATION
DWQXO
GNUQQ
GROUPED_DOAJ
HCIFZ
IAO
ITC
K6V
K7-
KQ8
L6V
M7S
MODMG
M~E
OK1
PHGZM
PHGZT
PIMPY
PQGLB
PQQKQ
PROAC
PTHSS
RNS
3V.
7SC
7TB
7XB
8AL
8FD
8FK
FR3
JQ2
KR7
L7M
L~C
L~D
M0N
P62
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c367t-b349b28fbe4ec1dfe2b525c57cd25d4316f8097036e1dd48b5c48f9c32c7503a3
IEDL.DBID DOA
ISICitedReferencesCount 104
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000839860500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2227-7390
IngestDate Tue Oct 14 15:08:10 EDT 2025
Fri Jul 25 12:08:21 EDT 2025
Tue Nov 18 21:50:22 EST 2025
Sat Nov 29 07:13:56 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 15
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c367t-b349b28fbe4ec1dfe2b525c57cd25d4316f8097036e1dd48b5c48f9c32c7503a3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7053-1462
0000-0001-9834-081X
0000-0003-2538-8657
0000-0002-6642-0740
0000-0003-3023-5225
0000-0002-1583-6164
OpenAccessLink https://doaj.org/article/62fde3ecec1946c79e381c865a6238af
PQID 2700670640
PQPubID 2032364
ParticipantIDs doaj_primary_oai_doaj_org_article_62fde3ecec1946c79e381c865a6238af
proquest_journals_2700670640
crossref_primary_10_3390_math10152751
crossref_citationtrail_10_3390_math10152751
PublicationCentury 2000
PublicationDate 2022-08-01
PublicationDateYYYYMMDD 2022-08-01
PublicationDate_xml – month: 08
  year: 2022
  text: 2022-08-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Mathematics (Basel)
PublicationYear 2022
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Wang (ref_51) 2015; 66
Hua (ref_48) 2019; 480
Hua (ref_42) 2017; 396
(ref_5) 2018; 92
Ma (ref_44) 2020; 54
Chai (ref_20) 2021; 556
ref_13
Hua (ref_40) 2018; 149
ref_10
Sahasrabuddhe (ref_37) 2021; 550
Ye (ref_19) 2020; 172
Feng (ref_41) 2021; 2021
Feng (ref_28) 2019; 7
Feng (ref_29) 2019; 186
Li (ref_15) 2021; 61
Alvarez (ref_32) 2006; 16
Hua (ref_43) 2019; 7
Iliyasu (ref_18) 2021; 138
Bezerra (ref_24) 2021; 151
Feng (ref_31) 2021; 9
Preishuber (ref_33) 2018; 13
Zhang (ref_8) 2020; 16
Wang (ref_21) 2021; 574
Gan (ref_38) 2021; 33
Wang (ref_23) 2021; 147
Gao (ref_34) 2007; 33
Liu (ref_45) 2022; 29
Mazurczyk (ref_11) 2020; 17
Zhang (ref_4) 2020; 16
Chen (ref_46) 2022; 83
Feng (ref_14) 2019; 7
Feng (ref_30) 2020; 8
Chai (ref_53) 2017; 88
Feng (ref_27) 2018; 10
Ghadirli (ref_1) 2019; 164
Li (ref_36) 2022; 71
Diaconu (ref_25) 2016; 355–356
Feng (ref_39) 2019; 228
Hua (ref_22) 2021; 546
Ahmad (ref_9) 2021; 33
Li (ref_3) 2019; 48
Zhang (ref_16) 2013; 124
Wang (ref_12) 2020; 141
Wu (ref_52) 2016; 349–350
(ref_17) 2020; 124
Cao (ref_50) 2018; 143
Zhu (ref_49) 2019; 7
Hua (ref_47) 2015; 297
Zhang (ref_6) 2020; 17
Li (ref_35) 2019; 66
Zefreh (ref_26) 2020; 79
Zhang (ref_2) 2018; 5
ref_7
References_xml – volume: 186
  start-page: 449
  year: 2019
  ident: ref_29
  article-title: Cryptanalysis of the integrated chaotic systems based image encryption algorithm
  publication-title: Optik
  doi: 10.1016/j.ijleo.2018.12.103
– volume: 16
  start-page: 6641
  year: 2020
  ident: ref_8
  article-title: Secure Transmission of Compressed Sampling Data Using Edge Clouds
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2020.2966511
– volume: 574
  start-page: 505
  year: 2021
  ident: ref_21
  article-title: A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2021.06.032
– volume: 61
  start-page: 102844
  year: 2021
  ident: ref_15
  article-title: A novel image encryption scheme based on non-adjacent parallelable permutation and dynamic DNA-level two-way diffusion
  publication-title: J. Inf. Secur. Appl.
– volume: 151
  start-page: 111235
  year: 2021
  ident: ref_24
  article-title: A new efficient permutation-diffusion encryption algorithm based on a chaotic map
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2021.111235
– volume: 7
  start-page: 12584
  year: 2019
  ident: ref_28
  article-title: Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2893760
– ident: ref_7
  doi: 10.3390/e23111373
– volume: 141
  start-page: 110309
  year: 2020
  ident: ref_12
  article-title: Image encryption algorithm based on tent-dynamics coupled map lattices and diffusion of household
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2020.110309
– volume: 83
  start-page: 103424
  year: 2022
  ident: ref_46
  article-title: Security Measurement of a Medical Image Communication Scheme based on Chaos and DNA
  publication-title: J. Vis. Commun. Image Represent.
  doi: 10.1016/j.jvcir.2021.103424
– volume: 29
  start-page: 74
  year: 2022
  ident: ref_45
  article-title: Cryptanalyzing two image encryption algorithms based on a first-order time-delay system
  publication-title: IEEE Multimed.
  doi: 10.1109/MMUL.2021.3114589
– volume: 5
  start-page: 3442
  year: 2018
  ident: ref_2
  article-title: Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2017.2781737
– volume: 92
  start-page: 305
  year: 2018
  ident: ref_5
  article-title: Brief review on application of nonlinear dynamics in image encryption
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-018-4056-x
– volume: 147
  start-page: 110962
  year: 2021
  ident: ref_23
  article-title: An image encryption algorithm based on dynamic row scrambling and Zigzag transformation
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2021.110962
– volume: 33
  start-page: 922
  year: 2007
  ident: ref_34
  article-title: Adaptive synchronization of a new hyperchaotic system with uncertain parameters
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2006.01.042
– volume: 2021
  start-page: 1898998
  year: 2021
  ident: ref_41
  article-title: A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps
  publication-title: Complexity
  doi: 10.1155/2021/1898998
– volume: 228
  start-page: 1951
  year: 2019
  ident: ref_39
  article-title: Image encryption algorithm based on discrete logarithm and memristive chaotic system
  publication-title: Eur. Phys. J. Spec. Top.
  doi: 10.1140/epjst/e2019-800209-3
– volume: 54
  start-page: 102566
  year: 2020
  ident: ref_44
  article-title: Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps
  publication-title: J. Inf. Secur. Appl.
– volume: 13
  start-page: 2137
  year: 2018
  ident: ref_33
  article-title: Depreciating motivation and empirical security analysis of chaos-based image and video encryption
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2018.2812080
– volume: 16
  start-page: 2129
  year: 2006
  ident: ref_32
  article-title: Some basic cryptographic requirements for chaos-based cryptosystems
  publication-title: Int. J. Bifurc. Chaos
  doi: 10.1142/S0218127406015970
– volume: 17
  start-page: 3401
  year: 2020
  ident: ref_6
  article-title: Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2020.3008914
– volume: 17
  start-page: 118
  year: 2020
  ident: ref_11
  article-title: Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario
  publication-title: IEEE Trans. Netw. Serv. Manag.
  doi: 10.1109/TNSM.2020.2969863
– volume: 66
  start-page: 2322
  year: 2019
  ident: ref_35
  article-title: Dynamic analysis of digital chaotic maps via state-mapping networks
  publication-title: IEEE Trans. Circuits Syst. I Regul. Pap.
  doi: 10.1109/TCSI.2018.2888688
– volume: 149
  start-page: 148
  year: 2018
  ident: ref_40
  article-title: 2D Logistic-Sine-coupling map for image encryption
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2018.03.010
– volume: 16
  start-page: 7566
  year: 2020
  ident: ref_4
  article-title: A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2019.2957404
– volume: 164
  start-page: 163
  year: 2019
  ident: ref_1
  article-title: An overview of encryption algorithms in color images
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2019.06.010
– volume: 556
  start-page: 305
  year: 2021
  ident: ref_20
  article-title: An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2020.10.007
– volume: 7
  start-page: 14081
  year: 2019
  ident: ref_49
  article-title: 2D Logistic-Modulated-Sine-Coupling-Logistic Chaotic Map for Image Encryption
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2893538
– volume: 48
  start-page: 102361
  year: 2019
  ident: ref_3
  article-title: When an attacker meets a cipher-image in 2018: A Year in Review
  publication-title: J. Inf. Secur. Appl.
– volume: 71
  start-page: 364
  year: 2022
  ident: ref_36
  article-title: The graph structure of the generalized discrete Arnold’s Cat map
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2021.3051387
– volume: 172
  start-page: 107563
  year: 2020
  ident: ref_19
  article-title: Image encryption and hiding algorithm based on compressive sensing and random numbers insertion
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2020.107563
– volume: 79
  start-page: 24993
  year: 2020
  ident: ref_26
  article-title: An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-020-09111-1
– volume: 355–356
  start-page: 314
  year: 2016
  ident: ref_25
  article-title: Circular inter-intra pixels bit-level permutation and chaos-based image encryption
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2015.10.027
– volume: 143
  start-page: 122
  year: 2018
  ident: ref_50
  article-title: A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2017.08.020
– volume: 349–350
  start-page: 137
  year: 2016
  ident: ref_52
  article-title: A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2016.02.041
– volume: 138
  start-page: 106403
  year: 2021
  ident: ref_18
  article-title: Optical image encryption based on quantum walks
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2020.106403
– volume: 550
  start-page: 252
  year: 2021
  ident: ref_37
  article-title: Multiple images encryption based on 3D scrambling and hyper-chaotic system
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2020.10.031
– volume: 124
  start-page: 105942
  year: 2020
  ident: ref_17
  article-title: Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2019.105942
– volume: 7
  start-page: 8660
  year: 2019
  ident: ref_43
  article-title: Image Encryption Using Josephus Problem and Filtering Diffusion
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2890116
– volume: 33
  start-page: 77
  year: 2021
  ident: ref_9
  article-title: Security analysis and enhancements of an image cryptosystem based on hyperchaotic system
  publication-title: J. King Saud Univ.-Comput. Inf. Sci.
– volume: 10
  start-page: 7909215
  year: 2018
  ident: ref_27
  article-title: Cryptanalysis and improvement of the hyper-chaotic image encryption scheme based on DNA encoding and scrambling
  publication-title: IEEE Photonics J.
  doi: 10.1109/JPHOT.2018.2880590
– volume: 9
  start-page: 145459
  year: 2021
  ident: ref_31
  article-title: Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3123571
– volume: 8
  start-page: 209471
  year: 2020
  ident: ref_30
  article-title: Cryptanalyzing a Novel Hyper-Chaotic Image Encryption Scheme Based on Pixel-Level Filtering and DNA-Level Diffusion
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3038006
– volume: 546
  start-page: 1063
  year: 2021
  ident: ref_22
  article-title: Cross-plane colour image encryption using a two-dimensional logistic tent modular map
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2020.09.032
– volume: 7
  start-page: 181589
  year: 2019
  ident: ref_14
  article-title: A Plain-Image-Related Chaotic Image Encryption Algorithm Based on DNA Sequence Operation and Discrete Logarithm
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2959137
– volume: 124
  start-page: 3596
  year: 2013
  ident: ref_16
  article-title: A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system
  publication-title: Opt.-Int. J. Light Electron Opt.
  doi: 10.1016/j.ijleo.2012.11.018
– volume: 396
  start-page: 97
  year: 2017
  ident: ref_42
  article-title: Design of image cipher using block-based scrambling and image filtering
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2017.02.036
– volume: 88
  start-page: 197
  year: 2017
  ident: ref_53
  article-title: A novel chaos-based image encryption algorithm using DNA sequence operations
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2016.08.009
– volume: 480
  start-page: 403
  year: 2019
  ident: ref_48
  article-title: Cosine-transform-based chaotic system for image encryption
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2018.12.048
– volume: 66
  start-page: 10
  year: 2015
  ident: ref_51
  article-title: A novel chaotic block image encryption algorithm based on dynamic random growth technique
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2014.08.005
– ident: ref_13
  doi: 10.3390/e23030341
– ident: ref_10
  doi: 10.3390/electronics10121392
– volume: 297
  start-page: 80
  year: 2015
  ident: ref_47
  article-title: 2D Sine Logistic modulation map for image encryption
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2014.11.018
– volume: 33
  start-page: 16251
  year: 2021
  ident: ref_38
  article-title: Image cipher using image filtering with 3D DNA-based confusion and diffusion strategy
  publication-title: Neural Comput. Appl.
  doi: 10.1007/s00521-021-06225-x
SSID ssj0000913849
Score 2.5220606
Snippet Image encryption is an effective way to protect image data. However, existing image encryption algorithms are still unable to strike a good balance between...
SourceID doaj
proquest
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 2751
SubjectTerms Algorithms
Chaos theory
cryptanalysis
Data encryption
discrete logarithm
Efficiency
Encryption
image encryption
image filtering
Image filters
Logarithms
Mathematics
Permutations
Pixels
Security
security analysis
Transformations
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9MwFLfYx2EcgH2JwkA-jNNkrXHsxDmhFVqBNKoJDWm3yH62u0pburXdpP33vJe6hWliF67OS5TkPb9v_x5jhzJiWOUtCK8VCOV0V1Q-KlEa34WowWala4dNlMOhubiozlLCbZbaKpc6sVXUfgKUIz-mAmlRUt3p882toKlRVF1NIzTW2AYhlaGcb_T6w7OfqywLoV4aVS063nOM74_RD7xEMdSy1NkjW9RC9j_RyK2ZGbz-3xd8w14lB5OfLCRim70IzQ57-WOFzjrbZe77NWoR3m9g-tBqDH5yNcJHzS-veQ-tmue4RNOMgjilniK-oB-MqbKOpo7bxvOvY1Q46HHz08nItveOgZ8v3eA99mvQP__yTaRZCwLyopwLl6vKSRNdUAEyH4N0WmrQJXipPZ2Xj6ZbEVpXyLxXxmlQJlaQS6BKqM332XozacJbxl2Oex4yaTMADL_Ih3O2yMEAOAWu22FHy79eQwIip3kYVzUGJMSj-m8eddinFfXNAoDjH3Q9YuCKhmCz24XJdFSnXVgXMvqQB8BPrFQBZRXQYQFTaIteoLGxww6WvK3TXp7Vfxj77vnL79mWpMMRbXvgAVufT-_CB7YJ9_PxbPoxieZv_QvvwQ
  priority: 102
  providerName: ProQuest
Title Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform
URI https://www.proquest.com/docview/2700670640
https://doaj.org/article/62fde3ecec1946c79e381c865a6238af
Volume 10
WOSCitedRecordID wos000839860500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2227-7390
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913849
  issn: 2227-7390
  databaseCode: DOA
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2227-7390
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913849
  issn: 2227-7390
  databaseCode: M~E
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 2227-7390
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913849
  issn: 2227-7390
  databaseCode: K7-
  dateStart: 20130301
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Engineering Database
  customDbUrl:
  eissn: 2227-7390
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913849
  issn: 2227-7390
  databaseCode: M7S
  dateStart: 20130301
  isFulltext: true
  titleUrlDefault: http://search.proquest.com
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2227-7390
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913849
  issn: 2227-7390
  databaseCode: BENPR
  dateStart: 20130301
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 2227-7390
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913849
  issn: 2227-7390
  databaseCode: PIMPY
  dateStart: 20130301
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LbxMxELZQ4QAHRHmIQIl8gBOyuuu11_axgUStaKMIilROK3tst5HaDUoCEhd-O2PvJgpCVS9cfPDOalfjeWrG3xDylkdMq7wF5qUAJpwsmPFRMKV9AVGCLZXLwybUdKovLsxsZ9RX6gnr4IE7xh3WPPpQBQiA6XYNygT0MaBradFxaxuT9S2U2Ummsg02ZaWF6TrdK8zrDzH-u0Lxk1zJ8i8flKH6_7HE2b1MnpDHfVxIj7r_2Sf3QvuUPDrbgqqunhF3coPKT8ctLH9lRadH15cLTO6vbugInZGnuJWGEAV2mlqBaEc_maeCOHooaltPP87RTmCgTE8Xlza_Owd6volen5Ovk_H5h2PWj0hgUNVqzVwljOM6uiCQQT4G7iSXIBV4Ln265h51YRLIVii9F9pJEDoaqDikAqatXpC9dtGGl4S6ClUVSm5LAMyaUujlbF2BBnACXDEg7zdMa6DHD09jLK4bzCMSi5tdFg_Iuy319w434xa6UeL_liahXecNlIGml4HmLhkYkIPN6TW9Cq6aVFGvVSpUvvof33hNHvJ08yH3_h2QvfXyR3hDHsDP9Xy1HJL7o_F09nmYpRDXT4oNUxvpl7T-HuPz2cnZ7NsfNennXw
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VggQceBY1UGAP9IRWtfdhrw8ItbRRo6QRhyD1Zryz6zRS67RJAPVP8RvZ8SOAENx64LoeW17v529mdmZnAN6IMrhVrkDutEKurI545krFU-MiLDUWcWrrZhPpeGxOT7OPG_C9OwtDaZUdJ9ZE7eZIe-R7FCBNUoo7vb-84tQ1iqKrXQuNBhZDf_0tuGzLd4PDsL67QvSPJh-OedtVgKNM0hW3UmVWmNJ65TF2pRdWC406RSe0o5PhpYkyqkvlY-eUsRqVKTOUAinmV8jw3FtwW0mTUK3-YcrXezpUY9OorMmvlzKL9oLVeRZAr0Wq4980X90g4A_-r5Va_-H_9jkewYPWfGb7Dd4fw4avnsD9k3Xt2eVTsIOLwJHsqMLFdc2HbP98Gl59dXbBDoLOdiwMUa8mz0eUMcUa-f6M8gaCImdF5djhLNBp8CfYaD4t6ntnyCadkb8Fn25kks9gs5pXfhuYlYHRMBZFjBicS7JQbZFINIhWoY168LZb5RzbMuvU7eM8D-4WYSL_FRM92F1LXzblRf4id0CAWctQUfB6YL6Y5i3H5IkonZcewxQzlWCa-WCOoUl0EWxcU5Q92OmwlLdMtcx_Aun5vy-_hrvHk5NRPhqMhy_gnqBjIHUi5A5srhZf_Eu4g19Xs-XiVf1TMPh807D7AeuYS4A
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3fb9MwELbGQIg98HOIwgA_sCcUNXHsxHlAaKOrqFaqSQxpbyE-212lLR1tB9q_xl_HnZMUEIK3PfCaXKI4_vzdne98x9gr4dGtshVEVkmIpFFxVFgvo1zbGLyCKslNaDaRTyb65KQ42mDfu7MwlFbZcWIgajsH2iPvU4A0yynu1PdtWsTRYPj24ktEHaQo0tq102ggcuiuvqH7tnwzGuBc7woxPDh-9z5qOwxEkGb5KjKpLIzQ3jjpILHeCaOEApWDFcrSKXGv44JqVLnEWqmNAql9AakAiv9VKb73BruZyywWIW3w43p_h-ptalk0ufZpWsR9tEBPcQEokavkNy0YmgX8oQuCghve-59_zX12tzWr-V6zDh6wDVc_ZFsf1jVpl4-YGZ0jd_KDGhZXgSf53tkUP311es73UZdbjpeoh5OLxpRJxRv54YzyCVDB86q2fDBDmkU_g4_n0yo8OwN-3Bn_2-zTtQzyMdus57V7wrhJkekgEVUCgE4nWa6mylLQAEaCiXvsdTfjJbTl16kLyFmJbhjho_wVHz22u5a-aMqO_EVun8CzlqFi4eHCfDEtW-4pM-GtSx3gEAuZQV44NNNAZ6pC21dXvsd2OlyVLYMty5-gevrv2y_ZbURbOR5NDp-xO4JOh4T8yB22uVpcuufsFnxdzZaLF2F9cPb5ulH3A5caVIg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+Encryption+Algorithm+Based+on+Plane-Level+Image+Filtering+and+Discrete+Logarithmic+Transform&rft.jtitle=Mathematics+%28Basel%29&rft.au=Wei+Feng&rft.au=Xiangyu+Zhao&rft.au=Jing+Zhang&rft.au=Zhentao+Qin&rft.date=2022-08-01&rft.pub=MDPI+AG&rft.eissn=2227-7390&rft.volume=10&rft.issue=15&rft.spage=2751&rft_id=info:doi/10.3390%2Fmath10152751&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_62fde3ecec1946c79e381c865a6238af
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2227-7390&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2227-7390&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2227-7390&client=summon