Multi‐image encryption algorithm based on image hash, bit‐plane decomposition and dynamic DNA coding
Problems such as large data volumes, slow transmission rates and low security often occur when transmitting multiple digital images over the internet. In order to protect the content security of multiple images and improve the speed of internet transmission, a multi‐image encryption algorithm based...
Uloženo v:
| Vydáno v: | IET image processing Ročník 15; číslo 4; s. 885 - 896 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Wiley
01.03.2021
|
| Témata: | |
| ISSN: | 1751-9659, 1751-9667 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Problems such as large data volumes, slow transmission rates and low security often occur when transmitting multiple digital images over the internet. In order to protect the content security of multiple images and improve the speed of internet transmission, a multi‐image encryption algorithm based on image hash, bit‐plane decomposition and dynamic DNA coding is proposed in this study. First, the proposed algorithm merges several grey images and image hashing algorithm is used to generate the initial key for chaotic mapping. Second, the random sequence generated by the improved three‐dimensional chaotic map is used to decompose the bit plane of the merged image and the bit‐plane matrix is substituted numerically. Finally, the random sequence generated by the four‐dimensional hyperchaotic system is used to perform dynamic DNA coding and calculation on the image and the final multiple ciphertext images are generated by decomposition of the pixel matrix. The experimental results show that the proposed algorithm has large key space, strong key sensitivity, strong security and robustness, and can resist various conventional attacks such as statistical analysis, differential attack, exhaustive attack, cropping and noise attack. |
|---|---|
| AbstractList | Problems such as large data volumes, slow transmission rates and low security often occur when transmitting multiple digital images over the internet. In order to protect the content security of multiple images and improve the speed of internet transmission, a multi‐image encryption algorithm based on image hash, bit‐plane decomposition and dynamic DNA coding is proposed in this study. First, the proposed algorithm merges several grey images and image hashing algorithm is used to generate the initial key for chaotic mapping. Second, the random sequence generated by the improved three‐dimensional chaotic map is used to decompose the bit plane of the merged image and the bit‐plane matrix is substituted numerically. Finally, the random sequence generated by the four‐dimensional hyperchaotic system is used to perform dynamic DNA coding and calculation on the image and the final multiple ciphertext images are generated by decomposition of the pixel matrix. The experimental results show that the proposed algorithm has large key space, strong key sensitivity, strong security and robustness, and can resist various conventional attacks such as statistical analysis, differential attack, exhaustive attack, cropping and noise attack. Abstract Problems such as large data volumes, slow transmission rates and low security often occur when transmitting multiple digital images over the internet. In order to protect the content security of multiple images and improve the speed of internet transmission, a multi‐image encryption algorithm based on image hash, bit‐plane decomposition and dynamic DNA coding is proposed in this study. First, the proposed algorithm merges several grey images and image hashing algorithm is used to generate the initial key for chaotic mapping. Second, the random sequence generated by the improved three‐dimensional chaotic map is used to decompose the bit plane of the merged image and the bit‐plane matrix is substituted numerically. Finally, the random sequence generated by the four‐dimensional hyperchaotic system is used to perform dynamic DNA coding and calculation on the image and the final multiple ciphertext images are generated by decomposition of the pixel matrix. The experimental results show that the proposed algorithm has large key space, strong key sensitivity, strong security and robustness, and can resist various conventional attacks such as statistical analysis, differential attack, exhaustive attack, cropping and noise attack. |
| Author | Zhang, Qiuyu Ye, Yutong Han, Jitian |
| Author_xml | – sequence: 1 givenname: Qiuyu orcidid: 0000-0003-1488-388X surname: Zhang fullname: Zhang, Qiuyu email: zhangqylz@163.com organization: Lanzhou University of Technology – sequence: 2 givenname: Jitian surname: Han fullname: Han, Jitian organization: Lanzhou University of Technology – sequence: 3 givenname: Yutong surname: Ye fullname: Ye, Yutong organization: Lanzhou University of Technology |
| BookMark | eNp9kMtKxDAUhoOM4HXjE2Qtzpi0adIsZbwNjBdE1-E0OZ2JdJqSVmR2PoLP6JPYseJCxNU5HP7v4_DvkVEdaiTkiLMJZ0Kf-iYmE54wqbfILlcZH2sp1ehnz_QO2WvbZ8YyzfJslyxvXqrOf7y9-xUskGJt47rpfKgpVIsQfbdc0QJadLQ_DZkltMsTWviup5oKaqQObVg1ofUDWDvq1jWsvKXnt2fUBufrxQHZLqFq8fB77pOny4vH6fV4fnc1m57NxzZVmR4DF3lZKkwsSuUKx51L0jwVkqtSJqW0QivHdCZSByxFKWTOFS8k2FJYBZDuk9ngdQGeTRP7n-PaBPDm6xDiwkDsvK3QaC5R5kWWFcqKhDGAAhW6BIUrSifz3nU8uGwMbRux_PFxZjZ9m03f5qvvPsx-ha3vYNNIF8FXfyN8QF59het_5GZ2_5AMzCfsL5gG |
| CitedBy_id | crossref_primary_10_1016_j_jisa_2022_103340 crossref_primary_10_1088_1402_4896_ad826f crossref_primary_10_3390_app13148509 crossref_primary_10_1016_j_jisa_2023_103686 crossref_primary_10_1088_2040_8986_ad4373 crossref_primary_10_1007_s11071_025_11690_3 crossref_primary_10_1186_s13677_024_00702_z crossref_primary_10_2478_amns_2023_2_01686 crossref_primary_10_1371_journal_pone_0295060 crossref_primary_10_1080_09500340_2022_2101070 crossref_primary_10_1109_ACCESS_2024_3389975 crossref_primary_10_1109_TCSI_2024_3407809 crossref_primary_10_1016_j_ins_2025_122502 crossref_primary_10_1016_j_eswa_2025_126521 crossref_primary_10_1049_ipr2_12600 crossref_primary_10_1109_ACCESS_2021_3094129 crossref_primary_10_1007_s11042_023_15992_9 crossref_primary_10_2174_0126662558298517240918034745 crossref_primary_10_1007_s40747_024_01568_z crossref_primary_10_1049_ipr2_12882 crossref_primary_10_1109_JIOT_2024_3418859 crossref_primary_10_1016_j_ijleo_2022_169357 crossref_primary_10_1109_TII_2022_3194590 crossref_primary_10_1016_j_jksuci_2023_101858 crossref_primary_10_3390_math13081330 crossref_primary_10_3390_sym13122317 crossref_primary_10_1371_journal_pone_0260014 crossref_primary_10_1117_1_JEI_31_5_053007 crossref_primary_10_1007_s11042_022_12791_6 crossref_primary_10_1007_s41870_024_02109_0 |
| Cites_doi | 10.1007/s00340-019-7286-9 10.1016/j.optlaseng.2018.01.012 10.1016/j.optlaseng.2018.11.017 10.1016/j.ijleo.2019.163505 10.1016/j.ijleo.2018.10.025 10.1016/j.optlastec.2018.06.014 10.1016/j.optlaseng.2016.12.005 10.1016/j.optlastec.2018.03.004 10.1016/j.optlaseng.2017.10.010 10.1016/j.optcom.2017.12.015 10.1007/s11128-018-2104-6 10.1007/s11042-017-4637-6 10.1364/AO.58.0000G6 10.1016/j.ijleo.2018.06.029 10.1080/09500340.2018.1498547 10.1088/1674-1056/25/10/100503 10.1109/ICIRCA.2018.8597245 10.1364/OE.27.035096 10.1007/s11042-018-6496-1 10.1016/j.optlaseng.2017.10.023 10.1016/j.optcom.2019.03.072 10.1016/j.optlastec.2017.04.019 10.1016/j.optlaseng.2018.10.002 10.3390/e20100801 |
| ContentType | Journal Article |
| Copyright | 2020 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology |
| Copyright_xml | – notice: 2020 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology |
| DBID | 24P AAYXX CITATION DOA |
| DOI | 10.1049/ipr2.12069 |
| DatabaseName | Open Access: Wiley-Blackwell Open Access Journals CrossRef Open Access: DOAJ - Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: 24P name: Wiley Online Library Open Access url: https://authorservices.wiley.com/open-science/open-access/browse-journals.html sourceTypes: Publisher – sequence: 2 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences |
| EISSN | 1751-9667 |
| EndPage | 896 |
| ExternalDocumentID | oai_doaj_org_article_916e68b55b7c4200aabe7ed2e4dbfd68 10_1049_ipr2_12069 IPR212069 |
| Genre | article |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China funderid: 61862041; 61363078 |
| GroupedDBID | .DC 0R~ 1OC 24P 29I 4.4 5GY 6IK 8FE 8FG 8VB AAHHS AAHJG AAJGR ABJCF ABQXS ACCFJ ACCMX ACESK ACGFS ACIWK ACXQS ADZOD AEEZP AENEX AEQDE AFKRA AIWBW AJBDE ALMA_UNASSIGNED_HOLDINGS ALUQN ARAPS AVUZU BENPR BGLVJ CCPQU CS3 DU5 EBS EJD ESX GROUPED_DOAJ HCIFZ HZ~ IAO IFIPE IPLJI ITC JAVBF K1G L6V LAI M43 M7S MCNEO MS~ O9- OCL OK1 P2P P62 PTHSS QWB RIE RNS ROL RUI S0W ZL0 AAMMB AAYXX AEFGJ AFFHD AGXDD AIDQK AIDYY CITATION IDLOA PHGZM PHGZT PQGLB WIN |
| ID | FETCH-LOGICAL-c3759-a148ff7e2ce67dbd1dd23834617f62f6c497d09543da03e6468171b6acf4c7aa3 |
| IEDL.DBID | 24P |
| ISICitedReferencesCount | 37 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000604125000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1751-9659 |
| IngestDate | Fri Oct 03 12:39:01 EDT 2025 Tue Nov 18 21:00:30 EST 2025 Wed Oct 29 21:20:04 EDT 2025 Wed Jan 22 16:31:21 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | Attribution |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c3759-a148ff7e2ce67dbd1dd23834617f62f6c497d09543da03e6468171b6acf4c7aa3 |
| ORCID | 0000-0003-1488-388X |
| OpenAccessLink | https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fipr2.12069 |
| PageCount | 12 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_916e68b55b7c4200aabe7ed2e4dbfd68 crossref_primary_10_1049_ipr2_12069 crossref_citationtrail_10_1049_ipr2_12069 wiley_primary_10_1049_ipr2_12069_IPR212069 |
| PublicationCentury | 2000 |
| PublicationDate | March 2021 2021-03-00 2021-03-01 |
| PublicationDateYYYYMMDD | 2021-03-01 |
| PublicationDate_xml | – month: 03 year: 2021 text: March 2021 |
| PublicationDecade | 2020 |
| PublicationTitle | IET image processing |
| PublicationYear | 2021 |
| Publisher | Wiley |
| Publisher_xml | – name: Wiley |
| References | 2017; 95 2018; 17 2018; 171 2017; 92 2018; 105 2018; 107 2018; 102 2019; 78 2018; 101 2018; 412 2019; 58 2019; 445 2019; 115 2019; 27 2019; 179 2018 2019; 113 2019; 125 2020; 202 2018; 77 2018; 65 2018; 20 2016; 25 e_1_2_7_6_1 e_1_2_7_5_1 e_1_2_7_4_1 e_1_2_7_3_1 e_1_2_7_9_1 e_1_2_7_8_1 e_1_2_7_7_1 e_1_2_7_19_1 e_1_2_7_18_1 e_1_2_7_17_1 e_1_2_7_16_1 e_1_2_7_2_1 e_1_2_7_15_1 e_1_2_7_14_1 e_1_2_7_25_1 e_1_2_7_13_1 e_1_2_7_24_1 e_1_2_7_12_1 e_1_2_7_23_1 e_1_2_7_11_1 e_1_2_7_22_1 e_1_2_7_10_1 e_1_2_7_21_1 e_1_2_7_20_1 |
| References_xml | – volume: 107 start-page: 353 year: 2018 end-page: 360 article-title: Nonlinear double image encryption using 2D non‐separable linear canonical transform and phase retrieval algorithm publication-title: Opt. Laser Technol. – volume: 102 start-page: 106 year: 2018 end-page: 111 article-title: Multiple‐image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme publication-title: Opt. Lasers Eng. – volume: 445 start-page: 19 year: 2019 end-page: 23 article-title: Optical encryption method of multiple‐image based on θ modulation and computer generated hologram publication-title: Opt. Commun. – volume: 107 start-page: 281 year: 2018 end-page: 287 article-title: Interference‐based multiple‐image encryption using binary phase masks publication-title: Opt. Lasers Eng. – volume: 101 start-page: 113 year: 2018 end-page: 121 article-title: Multiple image encryption scheme based on pixel exchange operation and vector decomposition publication-title: Opt. Lasers Eng. – volume: 78 start-page: 7841 issue: 6 year: 2019 end-page: 7869 article-title: Multiple‐image encryption algorithm based on DNA encoding and chaotic system publication-title: Multimedia Tools Appl. – volume: 105 start-page: 162 year: 2018 end-page: 170 article-title: Multiple‐image encryption based on double random phase encoding and compressive sensing by using a measurement array preprocessed with orthogonal‐basis matrices publication-title: Opt. Laser Technol. – volume: 25 issue: 10 year: 2016 article-title: A novel color image encryption algorithm based on genetic recombination and the four‐dimensional memristive hyperchaotic system publication-title: Chinese Phys. B – volume: 92 start-page: 6 year: 2017 end-page: 16 article-title: Multiple‐image encryption algorithm based on mixed image element and permutation publication-title: Opt. Lasers Eng. – volume: 412 start-page: 155 year: 2018 end-page: 160 article-title: Topological charge number multiplexing for JTC multiple‐image encryption publication-title: Opt. Commun. – volume: 58 start-page: 6 issue: 34 year: 2019 end-page: 10 article-title: Multiple‐image encryption based on angular‐multiplexing holography with quick response code and spiral phase keys publication-title: Appl. Opt. – volume: 115 start-page: 131 year: 2019 end-page: 140 article-title: Index‐based permutation‐diffusion in multiple‐image encryption using DNA sequence publication-title: Opt. Lasers Eng. – volume: 171 start-page: 277 year: 2018 end-page: 286 article-title: Multiple‐image encryption by using robust chaotic map in wavelet transform domain publication-title: Optik – volume: 202 year: 2020 article-title: Binary search tree image encryption with DNA publication-title: Optik – volume: 77 start-page: 4585 issue: 4 year: 2018 end-page: 4608 article-title: Four‐image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram publication-title: Multimedia Tools Appl. – volume: 17 start-page: 338 issue: 12 year: 2018 article-title: Multi‐image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system publication-title: Quantum Inf. Process. – volume: 125 start-page: 174 issue: 9 year: 2019 article-title: Multiple‐image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing publication-title: Appl. Phys. B – volume: 27 start-page: 35096 issue: 24 year: 2019 end-page: 35107 article-title: Multiple‐image optical encryption based on phase retrieval algorithm and fractional Talbot effect publication-title: Opt. Express – volume: 95 start-page: 63 year: 2017 end-page: 71 article-title: Multiple‐image encryption and authentication in interference‐based scheme by aid of space multiplexing publication-title: Opt. Laser Technol. – start-page: 676 year: 2018) end-page: 682 – volume: 179 start-page: 761 year: 2019 end-page: 773 article-title: A fast multiple‐image encryption algorithm based on hybrid chaotic systems for gray scale images publication-title: Optik – volume: 20 start-page: 801 issue: 10 year: 2018 article-title: Encryption algorithm of multiple‐image using mixed image elements and two dimensional chaotic economic map publication-title: Entropy – volume: 113 start-page: 29 year: 2019 end-page: 37 article-title: Silhouette‐free interference‐based multiple‐image encryption using cascaded fractional Fourier transforms publication-title: Opt. Lasers Eng. – volume: 65 start-page: 2093 issue: 18 year: 2018 end-page: 2102 article-title: Multiple‐image encryption scheme via compressive sensing and orthogonal encoding based on double random phase encoding publication-title: J. Mod. Opt. – ident: e_1_2_7_18_1 doi: 10.1007/s00340-019-7286-9 – ident: e_1_2_7_10_1 doi: 10.1016/j.optlaseng.2018.01.012 – ident: e_1_2_7_14_1 doi: 10.1016/j.optlaseng.2018.11.017 – ident: e_1_2_7_13_1 doi: 10.1016/j.ijleo.2019.163505 – ident: e_1_2_7_8_1 doi: 10.1016/j.ijleo.2018.10.025 – ident: e_1_2_7_11_1 doi: 10.1016/j.optlastec.2018.06.014 – ident: e_1_2_7_7_1 doi: 10.1016/j.optlaseng.2016.12.005 – ident: e_1_2_7_4_1 doi: 10.1016/j.optlastec.2018.03.004 – ident: e_1_2_7_17_1 doi: 10.1016/j.optlaseng.2017.10.010 – ident: e_1_2_7_2_1 doi: 10.1016/j.optcom.2017.12.015 – ident: e_1_2_7_19_1 doi: 10.1007/s11128-018-2104-6 – ident: e_1_2_7_9_1 doi: 10.1007/s11042-017-4637-6 – ident: e_1_2_7_21_1 doi: 10.1364/AO.58.0000G6 – ident: e_1_2_7_16_1 doi: 10.1016/j.ijleo.2018.06.029 – ident: e_1_2_7_24_1 doi: 10.1080/09500340.2018.1498547 – ident: e_1_2_7_25_1 doi: 10.1088/1674-1056/25/10/100503 – ident: e_1_2_7_12_1 doi: 10.1109/ICIRCA.2018.8597245 – ident: e_1_2_7_22_1 doi: 10.1364/OE.27.035096 – ident: e_1_2_7_15_1 doi: 10.1007/s11042-018-6496-1 – ident: e_1_2_7_23_1 doi: 10.1016/j.optlaseng.2017.10.023 – ident: e_1_2_7_3_1 doi: 10.1016/j.optcom.2019.03.072 – ident: e_1_2_7_6_1 doi: 10.1016/j.optlastec.2017.04.019 – ident: e_1_2_7_20_1 doi: 10.1016/j.optlaseng.2018.10.002 – ident: e_1_2_7_5_1 doi: 10.3390/e20100801 |
| SSID | ssj0059085 |
| Score | 2.4214456 |
| Snippet | Problems such as large data volumes, slow transmission rates and low security often occur when transmitting multiple digital images over the internet. In order... Abstract Problems such as large data volumes, slow transmission rates and low security often occur when transmitting multiple digital images over the internet.... |
| SourceID | doaj crossref wiley |
| SourceType | Open Website Enrichment Source Index Database Publisher |
| StartPage | 885 |
| SubjectTerms | Computer vision and image processing techniques Cryptography Data security Image and video coding |
| SummonAdditionalLinks | – databaseName: Open Access: DOAJ - Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3LSsNAFB2kuHDjW6wvBnSjGNsk88gs66MoSCmi0F2Ypw20aUmr4M5P8Bv9EmcmaakgunEXhhsm3Lkz9ww591wATiTC0iRGBcwpECITyiDBOgkEkxhrHotE-ELhe9rpJL0e6y60-nKcsFIeuHRcw8IXTRKBsaAS2SXlXGiqVaSREkYRX-bbpGx2mSrPYNfIG_tSSNdEnmA2EyZFrJGNi-gijJqO4ryQirxi_3eE6lNMex2sVtgQtspv2gBLOt8EaxVOhNUunGyBvq-a_Xz_yIb2NIB2tHjzOx_ywfPI3vb7Q-iyk4J2qLTp80n_HIpsat8aO34rVNqxySvKFuS5gqpsTg-vOy0oRy6nbYOn9s3j1W1QdUwIZEwxC7i93BhDdSQ1oUqoUCmbkmNkYYohkSESMaosqEKx4s1YE0SSkIaCcGmQpJzHO6CWj3K9C6BFAta7wusBIqoM49gdhRblKhKHQtTB6cx5qazkxF1Xi0Hqf2sjljpHp97RdXA8tx2XIho_Wl26NZhbOOFrP2DDIa3CIf0rHOrgzK_gL_Okd92HyD_t_ceM-2AlcjwXz0s7ALVp8aIPwbJ8nWaT4siH5RfyiuoY priority: 102 providerName: Directory of Open Access Journals |
| Title | Multi‐image encryption algorithm based on image hash, bit‐plane decomposition and dynamic DNA coding |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fipr2.12069 https://doaj.org/article/916e68b55b7c4200aabe7ed2e4dbfd68 |
| Volume | 15 |
| WOSCitedRecordID | wos000604125000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1751-9667 dateEnd: 20241231 omitProxy: false ssIdentifier: ssj0059085 issn: 1751-9659 databaseCode: DOA dateStart: 20210101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVWIB databaseName: Wiley Online Library Free Content customDbUrl: eissn: 1751-9667 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0059085 issn: 1751-9659 databaseCode: WIN dateStart: 20130101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1751-9667 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0059085 issn: 1751-9659 databaseCode: 24P dateStart: 20130101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NShxBEC7UePCiRhPcJEqDXhQn2Znpn2nwoiYSQZZFFL0N_esO6O4yuwnk5iPkGX2SVPfMrggSCLkMQ1PNNN1dVd90V30FsGcoM77wNpGBgZD61CQFc0WipWHMqVwXOiYKX4her7i9lf0FOJrlwjT8EPMDt6AZ0V4HBVe6qUKCoBYXsRrX2ec063K5CG_SNBdhT2e0P7PDoZg3i-mQoZA8Z3JGTkrll-e-L9xRZO1_iVKjmzlb-78BrsNqCy_JcbMf3sKCG27AWgs1SavIk00YxMTbp8ff1QMaFIKt9a9oPIi6vxvV1XTwQIKDswSbGpmBmgwOia6m2GscQmSJdSEgvY36ImpoiW3q25OvvWNiRsEtvoPrs29Xp9-TtuhCYnLBZKLw_8h74TLjuLDaptaiV88pIh3PM88NlcIiLqO5Vd3cccqLVKSaK-OpEUrl72FpOBq6LSAIJiwvdKQUpMJ6qViwpgiULc9TrTuwP5v70rSM5KEwxn0Zb8apLMMUlnEKO7A7lx03PByvSp2EJZxLBO7s2DCq78pWFUsExA6HxZgWhqKRUEo74WzmqNUeB9yBg7isf_lOed6_zOLbh38R_ggrWQiJiSFsn2BpWv9w27Bsfk6rSb0Td-9OPBTA58157w_w_fc6 |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1fS9xAEB-qLdiX2qqlZ7VdqC8WY02yf7KPaitKr8dRLPgW9q8X0LsjdxZ88yP0M_pJ3NnkTgQRpG9hmSXL7M7Mb5OZ3wBsGcqML7xNJDIQUp-apGCuSLQ0jDmV60LHQuGu6PWKszPZb3NzsBam4YeYf3BDy4j-Gg0cP0g3F06KJJnVuM5202yPywV4SUOYwQYGGe3PHDF282axHhI7yXMmZ-ykVH67n_sgHkXa_ocwNcaZo-X_XOFbeNMCTLLfnIh38MINV2C5BZukNeXJKgxi6e3tzb_qMrgUEkbr6-g-iLo4H9XVdHBJMMRZEoYamYGaDHaIrqZh1hiTZIl1mJLe5n0RNbTENh3uyffePjEjDIxr8Ofox-nhcdK2XUhMLphMVLgheS9cZhwXVtvU2hDX86Bh4XnmuaFS2IDMaG7VXu445UUqUs2V8dQIpfL3sDgcDd0HIAFOWF7oSCpIhfVSMfSnASpbnqdad2B7pvzStJzk2Brjooz_xqksUYVlVGEHvsxlxw0Tx6NSB7iHcwlkz44Do_q8bI2xDJDYhWUxpoWhwU0opZ1wNnPUah8W3IGvcV-feE950v-dxaf15wh_hqXj01_dsnvS-_kRXmeYIBMT2jZgcVpfuU14Zf5Oq0n9KR7lO-qu-Rg |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1La9wwEB7StJRcmj7J9iloLy11Gtt6WMe0ydLQsCylhdyMpJGyhmR38W4LueUn5Dfml1Qje7cESqH0ZoYRFpJm5pM98w3AG8eFC1XATBMDIQ-5yyrhq8xqJ4Q3pa1sKhQ-VqNRdXKix31uDtXCdPwQ6w9uZBnJX5OB-zmG7sLJiSSzmbfFbl7sSX0LbnMRnSwRO_PxyhFTN2-R6iGpk7wUesVOyvWH32NvxKNE238TpqY4M9z-zxneh3s9wGT73Yl4ABt--hC2e7DJelNePIJJKr29vrxqzqNLYVHaXiT3wczZ6axtlpNzRiEOWRR1OhOzmLxntlnGUXNKkmXoKSW9z_tiZooMuw737GC0z9yMAuNj-D48_Pbpc9a3XchcqYTOTLwhhaB84bxUaDFHjHG95BHrBFkE6bhWGJEZL9HslV5yWeUqt9K4wJ0ypnwCm9PZ1O8Ai3ACZWUTqSBXGLQR5E8jVEZZ5tYO4O1q8WvXc5JTa4yzOv0b57qmJazTEg7g9Vp33jFx_FHrI-3hWoPYs5Ng1p7WvTHWERL7OC0hrHI8ugljrFceC8_RhjjhAbxL-_qX99RH469Fenr6L8qv4O74YFgfH42-PIOtgvJjUj7bc9hctj_8C7jjfi6bRfsyneRfmfr4nA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Multi%E2%80%90image+encryption+algorithm+based+on+image+hash%2C+bit%E2%80%90plane+decomposition+and+dynamic+DNA+coding&rft.jtitle=IET+image+processing&rft.au=Zhang%2C+Qiuyu&rft.au=Han%2C+Jitian&rft.au=Ye%2C+Yutong&rft.date=2021-03-01&rft.issn=1751-9659&rft.eissn=1751-9667&rft.volume=15&rft.issue=4&rft.spage=885&rft.epage=896&rft_id=info:doi/10.1049%2Fipr2.12069&rft.externalDBID=10.1049%252Fipr2.12069&rft.externalDocID=IPR212069 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-9659&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-9659&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-9659&client=summon |