Multi‐image encryption algorithm based on image hash, bit‐plane decomposition and dynamic DNA coding

Problems such as large data volumes, slow transmission rates and low security often occur when transmitting multiple digital images over the internet. In order to protect the content security of multiple images and improve the speed of internet transmission, a multi‐image encryption algorithm based...

Full description

Saved in:
Bibliographic Details
Published in:IET image processing Vol. 15; no. 4; pp. 885 - 896
Main Authors: Zhang, Qiuyu, Han, Jitian, Ye, Yutong
Format: Journal Article
Language:English
Published: Wiley 01.03.2021
Subjects:
ISSN:1751-9659, 1751-9667
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Problems such as large data volumes, slow transmission rates and low security often occur when transmitting multiple digital images over the internet. In order to protect the content security of multiple images and improve the speed of internet transmission, a multi‐image encryption algorithm based on image hash, bit‐plane decomposition and dynamic DNA coding is proposed in this study. First, the proposed algorithm merges several grey images and image hashing algorithm is used to generate the initial key for chaotic mapping. Second, the random sequence generated by the improved three‐dimensional chaotic map is used to decompose the bit plane of the merged image and the bit‐plane matrix is substituted numerically. Finally, the random sequence generated by the four‐dimensional hyperchaotic system is used to perform dynamic DNA coding and calculation on the image and the final multiple ciphertext images are generated by decomposition of the pixel matrix. The experimental results show that the proposed algorithm has large key space, strong key sensitivity, strong security and robustness, and can resist various conventional attacks such as statistical analysis, differential attack, exhaustive attack, cropping and noise attack.
AbstractList Problems such as large data volumes, slow transmission rates and low security often occur when transmitting multiple digital images over the internet. In order to protect the content security of multiple images and improve the speed of internet transmission, a multi‐image encryption algorithm based on image hash, bit‐plane decomposition and dynamic DNA coding is proposed in this study. First, the proposed algorithm merges several grey images and image hashing algorithm is used to generate the initial key for chaotic mapping. Second, the random sequence generated by the improved three‐dimensional chaotic map is used to decompose the bit plane of the merged image and the bit‐plane matrix is substituted numerically. Finally, the random sequence generated by the four‐dimensional hyperchaotic system is used to perform dynamic DNA coding and calculation on the image and the final multiple ciphertext images are generated by decomposition of the pixel matrix. The experimental results show that the proposed algorithm has large key space, strong key sensitivity, strong security and robustness, and can resist various conventional attacks such as statistical analysis, differential attack, exhaustive attack, cropping and noise attack.
Abstract Problems such as large data volumes, slow transmission rates and low security often occur when transmitting multiple digital images over the internet. In order to protect the content security of multiple images and improve the speed of internet transmission, a multi‐image encryption algorithm based on image hash, bit‐plane decomposition and dynamic DNA coding is proposed in this study. First, the proposed algorithm merges several grey images and image hashing algorithm is used to generate the initial key for chaotic mapping. Second, the random sequence generated by the improved three‐dimensional chaotic map is used to decompose the bit plane of the merged image and the bit‐plane matrix is substituted numerically. Finally, the random sequence generated by the four‐dimensional hyperchaotic system is used to perform dynamic DNA coding and calculation on the image and the final multiple ciphertext images are generated by decomposition of the pixel matrix. The experimental results show that the proposed algorithm has large key space, strong key sensitivity, strong security and robustness, and can resist various conventional attacks such as statistical analysis, differential attack, exhaustive attack, cropping and noise attack.
Author Zhang, Qiuyu
Ye, Yutong
Han, Jitian
Author_xml – sequence: 1
  givenname: Qiuyu
  orcidid: 0000-0003-1488-388X
  surname: Zhang
  fullname: Zhang, Qiuyu
  email: zhangqylz@163.com
  organization: Lanzhou University of Technology
– sequence: 2
  givenname: Jitian
  surname: Han
  fullname: Han, Jitian
  organization: Lanzhou University of Technology
– sequence: 3
  givenname: Yutong
  surname: Ye
  fullname: Ye, Yutong
  organization: Lanzhou University of Technology
BookMark eNp9kMtKxDAUhoOM4HXjE2Qtzpi0adIsZbwNjBdE1-E0OZ2JdJqSVmR2PoLP6JPYseJCxNU5HP7v4_DvkVEdaiTkiLMJZ0Kf-iYmE54wqbfILlcZH2sp1ehnz_QO2WvbZ8YyzfJslyxvXqrOf7y9-xUskGJt47rpfKgpVIsQfbdc0QJadLQ_DZkltMsTWviup5oKaqQObVg1ofUDWDvq1jWsvKXnt2fUBufrxQHZLqFq8fB77pOny4vH6fV4fnc1m57NxzZVmR4DF3lZKkwsSuUKx51L0jwVkqtSJqW0QivHdCZSByxFKWTOFS8k2FJYBZDuk9ngdQGeTRP7n-PaBPDm6xDiwkDsvK3QaC5R5kWWFcqKhDGAAhW6BIUrSifz3nU8uGwMbRux_PFxZjZ9m03f5qvvPsx-ha3vYNNIF8FXfyN8QF59het_5GZ2_5AMzCfsL5gG
CitedBy_id crossref_primary_10_1016_j_jisa_2022_103340
crossref_primary_10_1088_1402_4896_ad826f
crossref_primary_10_3390_app13148509
crossref_primary_10_1016_j_jisa_2023_103686
crossref_primary_10_1088_2040_8986_ad4373
crossref_primary_10_1007_s11071_025_11690_3
crossref_primary_10_1186_s13677_024_00702_z
crossref_primary_10_2478_amns_2023_2_01686
crossref_primary_10_1371_journal_pone_0295060
crossref_primary_10_1080_09500340_2022_2101070
crossref_primary_10_1109_ACCESS_2024_3389975
crossref_primary_10_1109_TCSI_2024_3407809
crossref_primary_10_1016_j_ins_2025_122502
crossref_primary_10_1016_j_eswa_2025_126521
crossref_primary_10_1049_ipr2_12600
crossref_primary_10_1109_ACCESS_2021_3094129
crossref_primary_10_1007_s11042_023_15992_9
crossref_primary_10_2174_0126662558298517240918034745
crossref_primary_10_1007_s40747_024_01568_z
crossref_primary_10_1049_ipr2_12882
crossref_primary_10_1109_JIOT_2024_3418859
crossref_primary_10_1016_j_ijleo_2022_169357
crossref_primary_10_1109_TII_2022_3194590
crossref_primary_10_1016_j_jksuci_2023_101858
crossref_primary_10_3390_math13081330
crossref_primary_10_3390_sym13122317
crossref_primary_10_1371_journal_pone_0260014
crossref_primary_10_1117_1_JEI_31_5_053007
crossref_primary_10_1007_s11042_022_12791_6
crossref_primary_10_1007_s41870_024_02109_0
Cites_doi 10.1007/s00340-019-7286-9
10.1016/j.optlaseng.2018.01.012
10.1016/j.optlaseng.2018.11.017
10.1016/j.ijleo.2019.163505
10.1016/j.ijleo.2018.10.025
10.1016/j.optlastec.2018.06.014
10.1016/j.optlaseng.2016.12.005
10.1016/j.optlastec.2018.03.004
10.1016/j.optlaseng.2017.10.010
10.1016/j.optcom.2017.12.015
10.1007/s11128-018-2104-6
10.1007/s11042-017-4637-6
10.1364/AO.58.0000G6
10.1016/j.ijleo.2018.06.029
10.1080/09500340.2018.1498547
10.1088/1674-1056/25/10/100503
10.1109/ICIRCA.2018.8597245
10.1364/OE.27.035096
10.1007/s11042-018-6496-1
10.1016/j.optlaseng.2017.10.023
10.1016/j.optcom.2019.03.072
10.1016/j.optlastec.2017.04.019
10.1016/j.optlaseng.2018.10.002
10.3390/e20100801
ContentType Journal Article
Copyright 2020 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology
Copyright_xml – notice: 2020 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology
DBID 24P
AAYXX
CITATION
DOA
DOI 10.1049/ipr2.12069
DatabaseName Wiley Online Library Open Access
CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList CrossRef


Database_xml – sequence: 1
  dbid: 24P
  name: Wiley Online Library Open Access
  url: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  sourceTypes: Publisher
– sequence: 2
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
EISSN 1751-9667
EndPage 896
ExternalDocumentID oai_doaj_org_article_916e68b55b7c4200aabe7ed2e4dbfd68
10_1049_ipr2_12069
IPR212069
Genre article
GrantInformation_xml – fundername: National Natural Science Foundation of China
  funderid: 61862041; 61363078
GroupedDBID .DC
0R~
1OC
24P
29I
4.4
5GY
6IK
8FE
8FG
8VB
AAHHS
AAHJG
AAJGR
ABJCF
ABQXS
ACCFJ
ACCMX
ACESK
ACGFS
ACIWK
ACXQS
ADZOD
AEEZP
AENEX
AEQDE
AFKRA
AIWBW
AJBDE
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ARAPS
AVUZU
BENPR
BGLVJ
CCPQU
CS3
DU5
EBS
EJD
ESX
GROUPED_DOAJ
HCIFZ
HZ~
IAO
IFIPE
IPLJI
ITC
JAVBF
K1G
L6V
LAI
M43
M7S
MCNEO
MS~
O9-
OCL
OK1
P2P
P62
PTHSS
QWB
RIE
RNS
ROL
RUI
S0W
ZL0
AAMMB
AAYXX
AEFGJ
AFFHD
AGXDD
AIDQK
AIDYY
CITATION
IDLOA
PHGZM
PHGZT
PQGLB
WIN
ID FETCH-LOGICAL-c3759-a148ff7e2ce67dbd1dd23834617f62f6c497d09543da03e6468171b6acf4c7aa3
IEDL.DBID DOA
ISICitedReferencesCount 37
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000604125000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1751-9659
IngestDate Fri Oct 03 12:39:01 EDT 2025
Tue Nov 18 21:00:30 EST 2025
Wed Oct 29 21:20:04 EDT 2025
Wed Jan 22 16:31:21 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License Attribution
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3759-a148ff7e2ce67dbd1dd23834617f62f6c497d09543da03e6468171b6acf4c7aa3
ORCID 0000-0003-1488-388X
OpenAccessLink https://doaj.org/article/916e68b55b7c4200aabe7ed2e4dbfd68
PageCount 12
ParticipantIDs doaj_primary_oai_doaj_org_article_916e68b55b7c4200aabe7ed2e4dbfd68
crossref_primary_10_1049_ipr2_12069
crossref_citationtrail_10_1049_ipr2_12069
wiley_primary_10_1049_ipr2_12069_IPR212069
PublicationCentury 2000
PublicationDate March 2021
2021-03-00
2021-03-01
PublicationDateYYYYMMDD 2021-03-01
PublicationDate_xml – month: 03
  year: 2021
  text: March 2021
PublicationDecade 2020
PublicationTitle IET image processing
PublicationYear 2021
Publisher Wiley
Publisher_xml – name: Wiley
References 2017; 95
2018; 17
2018; 171
2017; 92
2018; 105
2018; 107
2018; 102
2019; 78
2018; 101
2018; 412
2019; 58
2019; 445
2019; 115
2019; 27
2019; 179
2018
2019; 113
2019; 125
2020; 202
2018; 77
2018; 65
2018; 20
2016; 25
e_1_2_7_6_1
e_1_2_7_5_1
e_1_2_7_4_1
e_1_2_7_3_1
e_1_2_7_9_1
e_1_2_7_8_1
e_1_2_7_7_1
e_1_2_7_19_1
e_1_2_7_18_1
e_1_2_7_17_1
e_1_2_7_16_1
e_1_2_7_2_1
e_1_2_7_15_1
e_1_2_7_14_1
e_1_2_7_25_1
e_1_2_7_13_1
e_1_2_7_24_1
e_1_2_7_12_1
e_1_2_7_23_1
e_1_2_7_11_1
e_1_2_7_22_1
e_1_2_7_10_1
e_1_2_7_21_1
e_1_2_7_20_1
References_xml – volume: 107
  start-page: 353
  year: 2018
  end-page: 360
  article-title: Nonlinear double image encryption using 2D non‐separable linear canonical transform and phase retrieval algorithm
  publication-title: Opt. Laser Technol.
– volume: 102
  start-page: 106
  year: 2018
  end-page: 111
  article-title: Multiple‐image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme
  publication-title: Opt. Lasers Eng.
– volume: 445
  start-page: 19
  year: 2019
  end-page: 23
  article-title: Optical encryption method of multiple‐image based on θ modulation and computer generated hologram
  publication-title: Opt. Commun.
– volume: 107
  start-page: 281
  year: 2018
  end-page: 287
  article-title: Interference‐based multiple‐image encryption using binary phase masks
  publication-title: Opt. Lasers Eng.
– volume: 101
  start-page: 113
  year: 2018
  end-page: 121
  article-title: Multiple image encryption scheme based on pixel exchange operation and vector decomposition
  publication-title: Opt. Lasers Eng.
– volume: 78
  start-page: 7841
  issue: 6
  year: 2019
  end-page: 7869
  article-title: Multiple‐image encryption algorithm based on DNA encoding and chaotic system
  publication-title: Multimedia Tools Appl.
– volume: 105
  start-page: 162
  year: 2018
  end-page: 170
  article-title: Multiple‐image encryption based on double random phase encoding and compressive sensing by using a measurement array preprocessed with orthogonal‐basis matrices
  publication-title: Opt. Laser Technol.
– volume: 25
  issue: 10
  year: 2016
  article-title: A novel color image encryption algorithm based on genetic recombination and the four‐dimensional memristive hyperchaotic system
  publication-title: Chinese Phys. B
– volume: 92
  start-page: 6
  year: 2017
  end-page: 16
  article-title: Multiple‐image encryption algorithm based on mixed image element and permutation
  publication-title: Opt. Lasers Eng.
– volume: 412
  start-page: 155
  year: 2018
  end-page: 160
  article-title: Topological charge number multiplexing for JTC multiple‐image encryption
  publication-title: Opt. Commun.
– volume: 58
  start-page: 6
  issue: 34
  year: 2019
  end-page: 10
  article-title: Multiple‐image encryption based on angular‐multiplexing holography with quick response code and spiral phase keys
  publication-title: Appl. Opt.
– volume: 115
  start-page: 131
  year: 2019
  end-page: 140
  article-title: Index‐based permutation‐diffusion in multiple‐image encryption using DNA sequence
  publication-title: Opt. Lasers Eng.
– volume: 171
  start-page: 277
  year: 2018
  end-page: 286
  article-title: Multiple‐image encryption by using robust chaotic map in wavelet transform domain
  publication-title: Optik
– volume: 202
  year: 2020
  article-title: Binary search tree image encryption with DNA
  publication-title: Optik
– volume: 77
  start-page: 4585
  issue: 4
  year: 2018
  end-page: 4608
  article-title: Four‐image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram
  publication-title: Multimedia Tools Appl.
– volume: 17
  start-page: 338
  issue: 12
  year: 2018
  article-title: Multi‐image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system
  publication-title: Quantum Inf. Process.
– volume: 125
  start-page: 174
  issue: 9
  year: 2019
  article-title: Multiple‐image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing
  publication-title: Appl. Phys. B
– volume: 27
  start-page: 35096
  issue: 24
  year: 2019
  end-page: 35107
  article-title: Multiple‐image optical encryption based on phase retrieval algorithm and fractional Talbot effect
  publication-title: Opt. Express
– volume: 95
  start-page: 63
  year: 2017
  end-page: 71
  article-title: Multiple‐image encryption and authentication in interference‐based scheme by aid of space multiplexing
  publication-title: Opt. Laser Technol.
– start-page: 676
  year: 2018)
  end-page: 682
– volume: 179
  start-page: 761
  year: 2019
  end-page: 773
  article-title: A fast multiple‐image encryption algorithm based on hybrid chaotic systems for gray scale images
  publication-title: Optik
– volume: 20
  start-page: 801
  issue: 10
  year: 2018
  article-title: Encryption algorithm of multiple‐image using mixed image elements and two dimensional chaotic economic map
  publication-title: Entropy
– volume: 113
  start-page: 29
  year: 2019
  end-page: 37
  article-title: Silhouette‐free interference‐based multiple‐image encryption using cascaded fractional Fourier transforms
  publication-title: Opt. Lasers Eng.
– volume: 65
  start-page: 2093
  issue: 18
  year: 2018
  end-page: 2102
  article-title: Multiple‐image encryption scheme via compressive sensing and orthogonal encoding based on double random phase encoding
  publication-title: J. Mod. Opt.
– ident: e_1_2_7_18_1
  doi: 10.1007/s00340-019-7286-9
– ident: e_1_2_7_10_1
  doi: 10.1016/j.optlaseng.2018.01.012
– ident: e_1_2_7_14_1
  doi: 10.1016/j.optlaseng.2018.11.017
– ident: e_1_2_7_13_1
  doi: 10.1016/j.ijleo.2019.163505
– ident: e_1_2_7_8_1
  doi: 10.1016/j.ijleo.2018.10.025
– ident: e_1_2_7_11_1
  doi: 10.1016/j.optlastec.2018.06.014
– ident: e_1_2_7_7_1
  doi: 10.1016/j.optlaseng.2016.12.005
– ident: e_1_2_7_4_1
  doi: 10.1016/j.optlastec.2018.03.004
– ident: e_1_2_7_17_1
  doi: 10.1016/j.optlaseng.2017.10.010
– ident: e_1_2_7_2_1
  doi: 10.1016/j.optcom.2017.12.015
– ident: e_1_2_7_19_1
  doi: 10.1007/s11128-018-2104-6
– ident: e_1_2_7_9_1
  doi: 10.1007/s11042-017-4637-6
– ident: e_1_2_7_21_1
  doi: 10.1364/AO.58.0000G6
– ident: e_1_2_7_16_1
  doi: 10.1016/j.ijleo.2018.06.029
– ident: e_1_2_7_24_1
  doi: 10.1080/09500340.2018.1498547
– ident: e_1_2_7_25_1
  doi: 10.1088/1674-1056/25/10/100503
– ident: e_1_2_7_12_1
  doi: 10.1109/ICIRCA.2018.8597245
– ident: e_1_2_7_22_1
  doi: 10.1364/OE.27.035096
– ident: e_1_2_7_15_1
  doi: 10.1007/s11042-018-6496-1
– ident: e_1_2_7_23_1
  doi: 10.1016/j.optlaseng.2017.10.023
– ident: e_1_2_7_3_1
  doi: 10.1016/j.optcom.2019.03.072
– ident: e_1_2_7_6_1
  doi: 10.1016/j.optlastec.2017.04.019
– ident: e_1_2_7_20_1
  doi: 10.1016/j.optlaseng.2018.10.002
– ident: e_1_2_7_5_1
  doi: 10.3390/e20100801
SSID ssj0059085
Score 2.4215288
Snippet Problems such as large data volumes, slow transmission rates and low security often occur when transmitting multiple digital images over the internet. In order...
Abstract Problems such as large data volumes, slow transmission rates and low security often occur when transmitting multiple digital images over the internet....
SourceID doaj
crossref
wiley
SourceType Open Website
Enrichment Source
Index Database
Publisher
StartPage 885
SubjectTerms Computer vision and image processing techniques
Cryptography
Data security
Image and video coding
SummonAdditionalLinks – databaseName: Wiley Online Library Open Access
  dbid: 24P
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LixQxEC7W1YMX1yc7vgjoRbG1O0nnAV7Wx6IgwyAKe2sqqfROw-7M0DMK3vwJ_kZ_iUm6Z2RBBPHWFBW6qeeXTqUK4DFpMsrYsghxt1xIbaiISS-6e-l5haiMp6zpD3o6NScndrYHL7d3YYb-ELsfbskzcrxODo5umEISQW1UYrfq-fOKl8pegstVJXSyaS5n2zichnnX-TpkGiSvarttTirti99rL6Sj3LX_IkrNaeb44P8-8DpcG-ElOxrs4QbshcVNOBihJhsdeX0L5vni7c_vP7rzGFBYpPbfcvBgeHa67LvN_JylBEcskgaeOa7nz5jrNnHVKpXIMgqpIH2s-mK4IEbDfHv2ZnrE_DKlxdvw-fjtp9fvinHoQuGFrm2BcX_UtjpwH5QmRxVRzOpCRqTTKt4qL62miMukICxFUFKZSldOoW-l14jiDuwvlotwCAxVjaVBR8KUkoJDYRQGZQVay7WyE3iylX3jx47kaTDGWZNPxqVtkgibLMIJPNrxroY-HH_kepVUuONIvbMzYdmfNqMrNhEQB2VcXTvtZQwSiC7oQDxIci0pM4GnWa1_eU_zfvaR56e7_8J8D67yVBKTS9juw_6m_xIewBX_ddOt-4fZen8BtpLz6w
  priority: 102
  providerName: Wiley-Blackwell
Title Multi‐image encryption algorithm based on image hash, bit‐plane decomposition and dynamic DNA coding
URI https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fipr2.12069
https://doaj.org/article/916e68b55b7c4200aabe7ed2e4dbfd68
Volume 15
WOSCitedRecordID wos000604125000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1751-9667
  dateEnd: 20241231
  omitProxy: false
  ssIdentifier: ssj0059085
  issn: 1751-9659
  databaseCode: DOA
  dateStart: 20210101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVWIB
  databaseName: Wiley Online Library Free Content
  customDbUrl:
  eissn: 1751-9667
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0059085
  issn: 1751-9659
  databaseCode: WIN
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1751-9667
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0059085
  issn: 1751-9659
  databaseCode: 24P
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LSxxBEG4SycGLxhdujNJgLorjzvT09OOoJotCWBZR9DZUd_VkF9bdZXcVvPkT8hvzS9LdMysKQS-5DENTQw_16Kqiv6oi5BtKVELpNHE-W064VJh4p-fNPbUsAxDKYpT0T9ntqttb3Xsx6itgwur2wDXj2j58cUKZojDSci9SAOOkQ-Y4mgpFLPNNpV4kU_UZHAZ5F7EUMgyRF4VeNCbluj2YTNlxxtIAcX7himLH_tcRanQxnc9kpYkN6Un9T2vkgxutk9UmTqSNFc42SD9Wzf55-j2486cB9avTx2j5FIa_xj7b79_R4J2Q-qWapg-z_hE1g7n_ahLwrRRdQJM3kC0KI6RYD6en37sn1I6DT9sk150fV2fnSTMxIbG5LHQCPrmpKumYdUKiwQzRu-Sc-zClEqwSlmuJPqjiOUKaO8GFymRmBNiKWwmQb5Gl0XjktgkFUUCqwGCuUo7OQK4EOKFz0JpJoVvkYMG80jbtxMNUi2EZr7W5LgOjy8joFtl_pp3UTTT-SXUaZPBMERpfxwWvDmWjDuV76tAih1GCb-xTXvQuWXz78j923CHLLOBcIi7tK1maT-_dLvlkH-aD2XSPfGS8txeV0z9vLrp_AWGI6rM
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LixQxEC50FfTi-sTxGdCLYq_d6XQex_Wx7OI4DLLC3ppKKr3TsDsz9IyCN3-Cv9FfYpLuGVkQQbw1oUI3Van6KunKVwDPSZGW2uSZD7vlTChNWQC94O654wWi1I6SpcdqMtEnJ2Y61ObEuzA9P8T2wC16RorX0cHjgXS_4RSRJLNddnyv4Lk0l-GKCDATGxhwMd0E4tjNu0r3IWMneVmZDTupMK9_z72AR4m2_2KamnDmYPc_v_Am3BgSTLbfr4hbcMnPb8PukGyywZVXd2CWrt7-_P6jPQ8hhYXR7lsKHwzPThddu56dswhxxMJQLzPD1ewVs-06zFrGIllGPpakD3VfDOfEqO9wz95N9plbRGC8C58P3h-_PcyGtguZK1VlMgw7pKZRnjsvFVkqiAKul0HDqpG8kU4YRSEzEyVhXnoppC5UYSW6RjiFWN6Dnfli7u8DQ1lhrtFSqXNB3mKpJXppSjSGK2lG8GKj_NoNnOSxNcZZnf6NC1NHFdZJhSN4tpVd9kwcf5R6E224lYjs2Wlg0Z3WgzPWISX2UtuqssqJECYQrVeeuBdkG5J6BC-TXf_ynvpo-omnpwf_IvwUrh0efxzX46PJh4dwnccCmVTQ9gh21t0X_xiuuq_rdtU9SUv5FyiL980
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Li9RAEC50FfHi-sTx2aAXxaxJp9OP4-o6uLgMgyjsLVR3dXYCuzNDZnbBmz_B3-gvsbuTGVkQQbyFopqErq5XuuorgJekSEtt8syHbDkTSlMWnF5Q99zxAlFqR0nSR2oy0cfHZjrU5sRemB4fYvvDLWpGstdRwf2Smj7hFBEks112fK_guTRX4ZqogpGNwM5iujHEcZp3lfoh4yR5WZkNOqkwb3-vveSPEmz_5TA1-Znx7n9-4W24NQSYbL8_EXfgip_fhd0h2GSDKq_uwSy13v78_qM9CyaFBWr3LZkPhqcni65dz85YdHHEAqnnmeFq9obZdh1WLWORLCMfS9KHui-Gc2LUT7hnB5N95hbRMd6Hr-MPX95_zIaxC5krVWUyDBlS0yjPnZeKLBVEwa-XIsQ6jeSNdMIoCpGZKAnz0kshdaEKK9E1winE8gHszBdz_xAYygpzjZZKnQvyFkst0UtTojFcSTOCV5vNr92ASR5HY5zW6W5cmDpuYZ22cAQvtrzLHonjj1zvogy3HBE9OxEW3Uk9KGMdQmIvta0qq5wIZgLReuWJe0G2IalH8DrJ9S_vqQ-nn3l6evQvzM_hxvRgXB8dTj49hps81sekerYnsLPuzv1TuO4u1u2qe5ZO8i_ZE_dR
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Multi%E2%80%90image+encryption+algorithm+based+on+image+hash%2C+bit%E2%80%90plane+decomposition+and+dynamic+DNA+coding&rft.jtitle=IET+image+processing&rft.au=Zhang%2C+Qiuyu&rft.au=Han%2C+Jitian&rft.au=Ye%2C+Yutong&rft.date=2021-03-01&rft.issn=1751-9659&rft.eissn=1751-9667&rft.volume=15&rft.issue=4&rft.spage=885&rft.epage=896&rft_id=info:doi/10.1049%2Fipr2.12069&rft.externalDBID=n%2Fa&rft.externalDocID=10_1049_ipr2_12069
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-9659&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-9659&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-9659&client=summon