Enhancing Image Cryptography Performance with Block Left Rotation Operations

In today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages from potential threats such as intruders, abu...

Full description

Saved in:
Bibliographic Details
Published in:Applied Computational Intelligence and Soft Computing Vol. 2024; no. 1
Main Authors: Al-Batah, Mohammad Subhi, Alzboon, Mowafaq Salem, Alzyoud, Mazen, Al-Shanableh, Najah
Format: Journal Article
Language:English
Published: New York John Wiley & Sons, Inc 2024
Wiley
Subjects:
ISSN:1687-9724, 1687-9732
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract In today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages from potential threats such as intruders, abusers, and data hackers becomes imperative. This study introduces an innovative approach aimed at streamlining data protection procedures while concurrently thwarting hacking attempts. At the core of this method lies the utilization of a sophisticated variable content private key designed to facilitate ease of alteration without compromising the integrity of encryption and decryption operations. The pivotal aspect involves leveraging a covert color image to generate this private key, mandating both the sender and receiver to securely retain this image. By employing a selected color image, the private key can seamlessly adapt to match the length of the confidential message. To fortify the level of security, the message is recommended to be segmented into blocks of predetermined sizes, with the sender and receiver jointly establishing these parameters. Subsequently, the bytes within each block are consolidated into a singular vector, which undergoes a left rotation by a predetermined number of bits as specified by the communicating parties. The proposed methodology is empirically validated through the implementation of various color images and text messages. Comparative analyses against existing methods underscore the efficacy and robustness of the proposed approach, substantiating its significant advancements in data protection paradigms.
AbstractList In today's interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages from potential threats such as intruders, abusers, and data hackers becomes imperative. This study introduces an innovative approach aimed at streamlining data protection procedures while concurrently thwarting hacking attempts. At the core of this method lies the utilization of a sophisticated variable content private key designed to facilitate ease of alteration without compromising the integrity of encryption and decryption operations. The pivotal aspect involves leveraging a covert color image to generate this private key, mandating both the sender and receiver to securely retain this image. By employing a selected color image, the private key can seamlessly adapt to match the length of the confidential message. To fortify the level of security, the message is recommended to be segmented into blocks of predetermined sizes, with the sender and receiver jointly establishing these parameters. Subsequently, the bytes within each block are consolidated into a singular vector, which undergoes a left rotation by a predetermined number of bits as specified by the communicating parties. The proposed methodology is empirically validated through the implementation of various color images and text messages. Comparative analyses against existing methods underscore the efficacy and robustness of the proposed approach, substantiating its significant advancements in data protection paradigms.
Audience Academic
Author Al-Batah, Mohammad Subhi
Alzyoud, Mazen
Al-Shanableh, Najah
Alzboon, Mowafaq Salem
Author_xml – sequence: 1
  givenname: Mohammad Subhi
  orcidid: 0000-0002-9341-1727
  surname: Al-Batah
  fullname: Al-Batah, Mohammad Subhi
– sequence: 2
  givenname: Mowafaq Salem
  surname: Alzboon
  fullname: Alzboon, Mowafaq Salem
– sequence: 3
  givenname: Mazen
  orcidid: 0000-0003-4729-2103
  surname: Alzyoud
  fullname: Alzyoud, Mazen
– sequence: 4
  givenname: Najah
  surname: Al-Shanableh
  fullname: Al-Shanableh, Najah
BookMark eNptUdtKJDEQDYuCl_XND2jw1dHcL486uOvAgMvie0jn0hN3utOmIzJ_b8bxgotUFVUU5xyKOkdgb0iDB-AUwQuEGLvEENNLwilSWPwAh4hLMVOC4L2PGdMDcDJNsYWQQEiFlIdgeTOszGDj0DWL3nS-mefNWFKXzbjaNH98Din3FeCb51hWzfU62X_N0ofS_E3FlJiG5m70-XWafoL9YNaTP3nrx-D-1839_Ha2vPu9mF8tZ5YSWmaCKiOVJb5FQknpuSdcKhFsTedwLU6hQEy1pqYnwcnArWsDkwi3jByDxU7WJfOgxxx7kzc6mahfFyl32uQS7dprKxyTVjDvpKLchZYZ3FoPCRNcUsWr1tlOa8zp8clPRT-kpzzU6zWBClEsJJWfqM5U0TiEVLKxfZysvpKQCK4g3d518Q2qhvN9tNWtEOv-CwHvCDanaco-aBt3T63EuNYI6q21emutfrO2ks7_I71_4Fv4CwjgpA4
CitedBy_id crossref_primary_10_56294_dm2025750
crossref_primary_10_56294_dm2025894
crossref_primary_10_2339_politeknik_1567237
crossref_primary_10_56294_mw2024_670
crossref_primary_10_56294_gr202591
crossref_primary_10_56294_gr202563
crossref_primary_10_1155_2024_2330624
crossref_primary_10_56294_dm2025545
crossref_primary_10_56294_dm2025755
crossref_primary_10_56294_dm2025895
Cites_doi 10.1177/03063127221078314
10.1088/1742-6596/2161/1/012014
10.30534/ijatcse/2019/90862019
10.1109/ICNGN59831.2023.10396670
10.1109/TIFS.2020.3040876
10.30534/ijatcse/2020/124932020
10.1109/ACCESS.2020.3044961
10.29350/jops.2020.25.1.999
10.48084/etasr.2088
10.55227/ijhet.v1i2.15
10.33552/abeb.2020.04.000582
10.30596/jcositte.v1i1.4359
10.1088/1742-6596/2279/1/012006
10.1007/978-3-030-42363-6_18
ContentType Journal Article
Copyright COPYRIGHT 2024 John Wiley & Sons, Inc.
Copyright © 2024 Mohammad Subhi Al-Batah et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: COPYRIGHT 2024 John Wiley & Sons, Inc.
– notice: Copyright © 2024 Mohammad Subhi Al-Batah et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID AAYXX
CITATION
3V.
7SC
7XB
8AL
8FD
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
CWDGH
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOA
DOI 10.1155/2024/3641927
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One Community College
Middle East & Africa Database
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
Directory of Open Access Journals (Open Access)
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
Middle East & Africa Database
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList

Publicly Available Content Database
CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Open Access Full Text
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: ProQuest Publicly Available Content
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
EISSN 1687-9732
Editor Ridha Ejbali
Editor_xml – fullname: Ridha Ejbali
ExternalDocumentID oai_doaj_org_article_c7d58c75ed8946dfb5a2bce035768496
A803769045
10_1155_2024_3641927
GroupedDBID 0R~
188
24P
2UF
4.4
5VS
6J9
8FE
8FG
8R4
8R5
AAFWJ
AAKPC
AAMMB
AAYXX
ABUWG
ACCMX
ACIPV
ADBBV
ADDVE
AEFGJ
AFFHD
AFKRA
AFPKN
AGXDD
AIDQK
AIDYY
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ARAPS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
C1A
CCPQU
CITATION
CNMHZ
CVCKV
CWDGH
DWQXO
EBS
EJD
GNUQQ
GROUPED_DOAJ
H13
HCIFZ
IAO
ICD
IEA
IL9
ITC
K6V
K7-
KQ8
OK1
P62
PHGZM
PHGZT
PIMPY
PQGLB
PQQKQ
PROAC
Q2X
RHU
RNS
TR2
TUXDW
UZ4
M~E
3V.
7SC
7XB
8AL
8FD
8FK
AAJEY
AINHJ
JQ2
L7M
L~C
L~D
M0N
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c434t-749a89c3eb17988e6e36897fc7fcdd2cdd6407159ba9bae3fd8f6cdbf5812b53
IEDL.DBID DOA
ISICitedReferencesCount 3
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001289828500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1687-9724
IngestDate Fri Oct 03 12:42:48 EDT 2025
Fri Jul 25 20:59:55 EDT 2025
Wed Mar 19 02:06:01 EDT 2025
Sat Mar 08 18:50:59 EST 2025
Sat Nov 29 03:05:38 EST 2025
Tue Nov 18 21:20:42 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c434t-749a89c3eb17988e6e36897fc7fcdd2cdd6407159ba9bae3fd8f6cdbf5812b53
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-4729-2103
0000-0002-9341-1727
OpenAccessLink https://doaj.org/article/c7d58c75ed8946dfb5a2bce035768496
PQID 3091427848
PQPubID 237331
ParticipantIDs doaj_primary_oai_doaj_org_article_c7d58c75ed8946dfb5a2bce035768496
proquest_journals_3091427848
gale_infotracmisc_A803769045
gale_infotracacademiconefile_A803769045
crossref_citationtrail_10_1155_2024_3641927
crossref_primary_10_1155_2024_3641927
PublicationCentury 2000
PublicationDate 2024-00-00
PublicationDateYYYYMMDD 2024-01-01
PublicationDate_xml – year: 2024
  text: 2024-00-00
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle Applied Computational Intelligence and Soft Computing
PublicationYear 2024
Publisher John Wiley & Sons, Inc
Wiley
Publisher_xml – name: John Wiley & Sons, Inc
– name: Wiley
References Apoorva (e_1_2_13_26_2) 2013; 2
Jose M. (e_1_2_13_15_2) 2014; 3
e_1_2_13_22_2
e_1_2_13_7_2
e_1_2_13_6_2
Alzyoud M. (e_1_2_13_29_2) 2024; 18
e_1_2_13_5_2
Matrouk K. (e_1_2_13_14_2) 2014; 31
Preet S. S. (e_1_2_13_21_2) 2011; 2
Nesamalar R. (e_1_2_13_9_2) 2022; 9
Agrawal M. (e_1_2_13_23_2) 2012; 4
Zahran B. (e_1_2_13_18_2) 2018; 96
Abdul D. S. (e_1_2_13_27_2) 2009; 8
e_1_2_13_16_2
e_1_2_13_17_2
e_1_2_13_12_2
e_1_2_13_13_2
Stallings W. (e_1_2_13_20_2) 2006
e_1_2_13_31_2
Wani P. (e_1_2_13_8_2) 2022; 2
Shashi Mehrotra S. (e_1_2_13_24_2) 2011; 2
e_1_2_13_30_2
e_1_2_13_10_2
e_1_2_13_11_2
Thakur J. (e_1_2_13_28_2) 2011; 1
e_1_2_13_4_2
Mandal P. C. (e_1_2_13_25_2) 2012; 2
e_1_2_13_3_2
e_1_2_13_2_2
e_1_2_13_1_2
Elminaam D. S. A. (e_1_2_13_19_2) 2008; 8
References_xml – ident: e_1_2_13_7_2
  doi: 10.1177/03063127221078314
– volume-title: Cryptography and Network Security
  year: 2006
  ident: e_1_2_13_20_2
– ident: e_1_2_13_13_2
  doi: 10.1088/1742-6596/2161/1/012014
– volume: 1
  start-page: 6
  year: 2011
  ident: e_1_2_13_28_2
  article-title: Blowfish symmetric key cryptography algorithm simulation based performance analysis
  publication-title: IJETAE
– ident: e_1_2_13_31_2
  doi: 10.30534/ijatcse/2019/90862019
– volume: 2
  start-page: 204
  year: 2013
  ident: e_1_2_13_26_2
  article-title: Comparative study of different symmetric key cryptography
  publication-title: IJAIEM
– ident: e_1_2_13_30_2
  doi: 10.1109/ICNGN59831.2023.10396670
– volume: 2
  year: 2022
  ident: e_1_2_13_8_2
  article-title: Secret communication using multi-image steganography for military purposes
  publication-title: International Journal of Advanced Research in Science, Communication and Technology
– ident: e_1_2_13_22_2
– ident: e_1_2_13_2_2
  doi: 10.1109/TIFS.2020.3040876
– ident: e_1_2_13_10_2
  doi: 10.30534/ijatcse/2020/124932020
– volume: 8
  start-page: 280
  year: 2008
  ident: e_1_2_13_19_2
  article-title: Performance evaluation of symmetric encryption algorithms
  publication-title: IJCSNS International Journal of Computer Science and Network Security
– volume: 8
  start-page: 58
  year: 2009
  ident: e_1_2_13_27_2
  article-title: Performance evaluation of symmetric encryption algorithms
  publication-title: Communications of the IBIMA
– ident: e_1_2_13_4_2
  doi: 10.1109/ACCESS.2020.3044961
– ident: e_1_2_13_6_2
  doi: 10.29350/jops.2020.25.1.999
– volume: 2
  start-page: 292
  year: 2011
  ident: e_1_2_13_24_2
  article-title: Comparative analysis of Encryption algorithm for data communication
  publication-title: International Journal of Computer Science and Technology
– ident: e_1_2_13_17_2
  doi: 10.48084/etasr.2088
– volume: 96
  year: 2018
  ident: e_1_2_13_18_2
  article-title: A modified lbp method to extract features from color images
  publication-title: Journal of Theoretical and Applied Information Technology
– volume: 9
  year: 2022
  ident: e_1_2_13_9_2
  article-title: Proficient and safe token with secret and public keys sharing algorithm for preventing cryptographic key leakage in wireless sensor network
  publication-title: International Journal of Engineering Research in Electronics and Communication Engineering
– ident: e_1_2_13_16_2
– volume: 2
  start-page: 125
  year: 2011
  ident: e_1_2_13_21_2
  article-title: Comparison of data encryption algorithms
  publication-title: International Journal of Computer Science and Communication
– volume: 3
  start-page: 2281
  year: 2014
  ident: e_1_2_13_15_2
  article-title: Hiding image in image using LSB insertion method with improved security and quality
  publication-title: International Journal of Science and Research
– ident: e_1_2_13_3_2
  doi: 10.55227/ijhet.v1i2.15
– volume: 18
  start-page: 395
  year: 2024
  ident: e_1_2_13_29_2
  article-title: The cryptography of secret messages using block rotation left operation
  publication-title: Applied Mathematics
– ident: e_1_2_13_12_2
  doi: 10.33552/abeb.2020.04.000582
– volume: 31
  start-page: 1767
  year: 2014
  ident: e_1_2_13_14_2
  article-title: Speech fingerprint to identify isolated word person
  publication-title: World Applied Sciences Journal
– volume: 4
  start-page: 877
  year: 2012
  ident: e_1_2_13_23_2
  article-title: A comparative survey on symmetric key encryption techniques
  publication-title: International Journal on Computer Science and Engineering
– ident: e_1_2_13_5_2
  doi: 10.30596/jcositte.v1i1.4359
– ident: e_1_2_13_11_2
  doi: 10.1088/1742-6596/2279/1/012006
– volume: 2
  start-page: 196
  year: 2012
  ident: e_1_2_13_25_2
  article-title: Superiority of blowfish algorithm
  publication-title: IJARCSSE
– ident: e_1_2_13_1_2
  doi: 10.1007/978-3-030-42363-6_18
SSID ssib003004788
ssj0000395709
ssib044730003
Score 2.4612978
Snippet In today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the...
In today's interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the...
SourceID doaj
proquest
gale
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
SubjectTerms Analysis
Color imagery
Communication
Computer hackers
Cryptography
Data encryption
Encryption
Image enhancement
Investment analysis
Mean square errors
Messages
Methods
Privacy
Rotation
Signal to noise ratio
SummonAdditionalLinks – databaseName: Advanced Technologies & Aerospace Database
  dbid: P5Z
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NTxUxEG8QPHhBQY1PwfSgUWM2vN1-nwgQCCQEXgwH4qXZ7QcYZd_z7Wrif-9Mtw94B7yYdC_bHrY7M79OZ9rfEPKurMrGV77EDCMrOCBeoUtnirET0UhROhljKjahzs705aWZ5IBbl49VLjAxAbWfOoyR7zBY2LAsBNe7s58FVo3C7GouofGIrCFLApZumIiv9_R3fJ8dnnMkZ89Zx4TUmKRKp0BKCbZmVMUXZ-OFwLAA32ES06RqadVK5P4PQXhal46e_u-MnpH17JHSvUGFNshKaDfJRrb5jn7MxNSfnpPTw_Ya6TnaK3pyAzhED-Z_Zn3mvKaTuysIFKO7dB_Wye_0NMSefpkOGX96PguDynUvyMXR4cXBcZGrMRSOM94XiptaG8cA3JHjLMjApDYqOmjeV_BgThC8o6aGFlj0OkrnmyjAh2gEe0lW22kbXhHKOAuweRVlXUXwF8dN4EFqoWqugmNNOSKfFz_busxUjgUzfti0YxHComhsFs2IvL8dPRsYOh4Yt49yux2DvNrpxXR-ZbOZWqe80E6J4LXh0sdG1FWDJdVwW8aNHJEPKHWL1g-f5Op8iQEmhjxadk-PAbEN-MkjsrU0EqzWLXcvlMJm1OjsnUa8_nf3G_IEpzaEgrbIaj__FbbJY_e7_9bN3yYj-AtaEwga
  priority: 102
  providerName: ProQuest
Title Enhancing Image Cryptography Performance with Block Left Rotation Operations
URI https://www.proquest.com/docview/3091427848
https://doaj.org/article/c7d58c75ed8946dfb5a2bce035768496
Volume 2024
WOSCitedRecordID wos001289828500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Open Access Full Text
  customDbUrl:
  eissn: 1687-9732
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000395709
  issn: 1687-9724
  databaseCode: DOA
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1687-9732
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssib044730003
  issn: 1687-9724
  databaseCode: M~E
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 1687-9732
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000395709
  issn: 1687-9724
  databaseCode: P5Z
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1687-9732
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000395709
  issn: 1687-9724
  databaseCode: K7-
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Middle East & Africa Database
  customDbUrl:
  eissn: 1687-9732
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000395709
  issn: 1687-9724
  databaseCode: CWDGH
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/middleeastafrica
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1687-9732
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000395709
  issn: 1687-9724
  databaseCode: BENPR
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Publicly Available Content
  customDbUrl:
  eissn: 1687-9732
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000395709
  issn: 1687-9724
  databaseCode: PIMPY
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1687-9732
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000395709
  issn: 1687-9724
  databaseCode: 24P
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB6hwoELojzEQql8AAFCUZPYju1jt9qKinaJqh4KFyvxoyAgXe0GJC78dmYSb-keKi5Ijg_xHJyZzHjGY38D8KIoi9aXvqAMI88EWrxMF85kuZPRVLJwVYxDsQk1n-vzc1NfK_VFZ8JGeOCRcXtOeamdksFrIyofW9mULRW5IkdZmAFsO1fmWjA12GBKP-VmfdJdSgryxR6vKOmpNtagAar_JoM8rDKH9-Fecg_Z_jitbbgVugewnRRwxV4nlOg3D-F41n0mrIzugh19R6PADpa_Fn0CoGb13_sAjLZa2RQXra_sOMSenV6O6Xf2YRFG-a8ewdnh7OzgXZZKI2ROcNFnSphGG8fR0hLgWKgCr7RR0WHzvsSHEnToqrQNtsCj17Fyvo0SF_RW8sew1V124QkwLnjASFIWTRnRecvbIEKlpWqECo63xQTernllXYINp-oV3-wQPkhpibM2cXYCL6-oFyNcxg10U2L7FQ2BXA8vUPQ2id7-S_QTeEVCs6SKOCXXpBsF-GEEamX3dY7m06DTOoGdDUpUIbc5vBa7TSq8shw9KapDIvTT_zHZZ3CXGDDu3uzAVr_8EZ7DHfez_7Ja7sLt6Wxen-4OfzH271WG_cnvGfa1_ITj9dFJ_fEPfI33cw
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELaqggQXoDzUhQI-UAFCUTfxMweE2tKqq12WCu2hNyvxoyAgu2wCqD-K_8hM4rTdQ7n1gJRcYh_iZOYbj8f-PkJepFlausylWGFkCQfES3Rq82RoRcilSK0MoRWbUNOpPjnJj9fIn_4sDG6r7DGxBWo3t7hGvsMgsKEsBNfvFj8SVI3C6movodGZxdif_YaUrX47eg__dzvLDg9m-0dJVBVILGe8SRTPC51bBiCFXF1eeiZ1roKFy7kMbqxtQZQvC7g8C04HaV0ZBMTCEkUiAPFvcKYVutVYJZfcZXiZjJ5z5IKPRc42MGBNrN10kkpw7VxlvN-KLwSuQvAdJrEqq1aCZKslcFXEaMPg4d3_7APeI3fifJvudg6yQdZ8dZ9sRESr6atIu_36AZkcVJ-RfKQ6paPvgLJ0f3m2aCKjNz2-OGBBce2a7sEs4Cud-NDQT_NuPwP9uPCdQ9UPyew6BvWIrFfzym8SyjjzkJqLtMgCzIaHpedeaqEKrrxlZTogb_p_a2zkYUc5kG-mzceEMGgJJlrCgGyf9150_CNX9NtDMznvg6zh7YP58tREEDJWOaGtEt7pnEsXSlFkJQrGYdLJczkgL9HIDGIbvJIt4hENGBiyhJldPYR4lEMWMCBbKz0Bk-xqc2-DJmJibS4M8PG_m5-TW0ezDxMzGU3HT8htHGa36LVF1pvlT_-U3LS_mi_18lnrf5SYazbXvz8MZog
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEF5VBSEuQHmogQJ7oAKErMTepw8I9RURNQoR6qHisrL3URCtExID6k_j3zFjr9vmUG49IDkXew_e-JtvdnZmvyHkVZqlpctcihlGlnBgvESnNk8GVoRcitTKEJpmE2oy0cfH-XSN_OnOwmBZZceJDVG7mcU98j4Dx4ZtIbjuh1gWMd0ffpj_SLCDFGZau3YaLUQO_flvCN-W70f78K23s2x4cLT3MYkdBhLLGa8TxfNC55YBYaFul5eeSZ2rYOFyLoMf5rnA45cFXJ4Fp4O0rgwC_GKJDSOA_W8pCDGxmnAqvlwxncFVYXrOURc-JjwbJ4H5saYAJZVg5rnKeFeWLwTuSPA-k5ihVSsOs-krcJ33aFzi8P5__Gc-IPfiOpzutIazQdZ89ZBsRKZb0jdRjvvtIzI-qL6iKEl1QkdnwL50b3E-r6PSN51eHryguKdNd2F18J2Ofajp51lb50A_zX1raMvH5OgmJvWErFezym8SyjjzELKLtMgCrJIHpedeaqEKrrxlZdoj77rvbGzUZ8c2IaemidOEMIgKE1HRI9sXo-etLsk143YRMhdjUE28uTFbnJhITsYqJ7RVwjudc-lCKYqsxEZyGIzyXPbIawScQc6DV7JFPLoBE0P1MLOjB-CncogOemRrZSRwlV193OHRRK5cmkswPv3345fkDqDUjEeTw2fkLs6y3QvbIuv14qd_Tm7bX_W35eJFY4qUmBtG619qc2-s
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enhancing+Image+Cryptography+Performance+with+Block+Left+Rotation+Operations&rft.jtitle=Applied+computational+intelligence+and+soft+computing&rft.au=Mohammad+Subhi+Al-Batah&rft.au=Mowafaq+Salem+Alzboon&rft.au=Mazen+Alzyoud&rft.au=Najah+Al-Shanableh&rft.date=2024&rft.pub=Wiley&rft.eissn=1687-9732&rft.volume=2024&rft_id=info:doi/10.1155%2F2024%2F3641927&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_c7d58c75ed8946dfb5a2bce035768496
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1687-9724&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1687-9724&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1687-9724&client=summon