Enhancing Image Cryptography Performance with Block Left Rotation Operations
In today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages from potential threats such as intruders, abu...
Saved in:
| Published in: | Applied Computational Intelligence and Soft Computing Vol. 2024; no. 1 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
John Wiley & Sons, Inc
2024
Wiley |
| Subjects: | |
| ISSN: | 1687-9724, 1687-9732 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | In today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages from potential threats such as intruders, abusers, and data hackers becomes imperative. This study introduces an innovative approach aimed at streamlining data protection procedures while concurrently thwarting hacking attempts. At the core of this method lies the utilization of a sophisticated variable content private key designed to facilitate ease of alteration without compromising the integrity of encryption and decryption operations. The pivotal aspect involves leveraging a covert color image to generate this private key, mandating both the sender and receiver to securely retain this image. By employing a selected color image, the private key can seamlessly adapt to match the length of the confidential message. To fortify the level of security, the message is recommended to be segmented into blocks of predetermined sizes, with the sender and receiver jointly establishing these parameters. Subsequently, the bytes within each block are consolidated into a singular vector, which undergoes a left rotation by a predetermined number of bits as specified by the communicating parties. The proposed methodology is empirically validated through the implementation of various color images and text messages. Comparative analyses against existing methods underscore the efficacy and robustness of the proposed approach, substantiating its significant advancements in data protection paradigms. |
|---|---|
| AbstractList | In today's interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages from potential threats such as intruders, abusers, and data hackers becomes imperative. This study introduces an innovative approach aimed at streamlining data protection procedures while concurrently thwarting hacking attempts. At the core of this method lies the utilization of a sophisticated variable content private key designed to facilitate ease of alteration without compromising the integrity of encryption and decryption operations. The pivotal aspect involves leveraging a covert color image to generate this private key, mandating both the sender and receiver to securely retain this image. By employing a selected color image, the private key can seamlessly adapt to match the length of the confidential message. To fortify the level of security, the message is recommended to be segmented into blocks of predetermined sizes, with the sender and receiver jointly establishing these parameters. Subsequently, the bytes within each block are consolidated into a singular vector, which undergoes a left rotation by a predetermined number of bits as specified by the communicating parties. The proposed methodology is empirically validated through the implementation of various color images and text messages. Comparative analyses against existing methods underscore the efficacy and robustness of the proposed approach, substantiating its significant advancements in data protection paradigms. |
| Audience | Academic |
| Author | Al-Batah, Mohammad Subhi Alzyoud, Mazen Al-Shanableh, Najah Alzboon, Mowafaq Salem |
| Author_xml | – sequence: 1 givenname: Mohammad Subhi orcidid: 0000-0002-9341-1727 surname: Al-Batah fullname: Al-Batah, Mohammad Subhi – sequence: 2 givenname: Mowafaq Salem surname: Alzboon fullname: Alzboon, Mowafaq Salem – sequence: 3 givenname: Mazen orcidid: 0000-0003-4729-2103 surname: Alzyoud fullname: Alzyoud, Mazen – sequence: 4 givenname: Najah surname: Al-Shanableh fullname: Al-Shanableh, Najah |
| BookMark | eNptUdtKJDEQDYuCl_XND2jw1dHcL486uOvAgMvie0jn0hN3utOmIzJ_b8bxgotUFVUU5xyKOkdgb0iDB-AUwQuEGLvEENNLwilSWPwAh4hLMVOC4L2PGdMDcDJNsYWQQEiFlIdgeTOszGDj0DWL3nS-mefNWFKXzbjaNH98Din3FeCb51hWzfU62X_N0ofS_E3FlJiG5m70-XWafoL9YNaTP3nrx-D-1839_Ha2vPu9mF8tZ5YSWmaCKiOVJb5FQknpuSdcKhFsTedwLU6hQEy1pqYnwcnArWsDkwi3jByDxU7WJfOgxxx7kzc6mahfFyl32uQS7dprKxyTVjDvpKLchZYZ3FoPCRNcUsWr1tlOa8zp8clPRT-kpzzU6zWBClEsJJWfqM5U0TiEVLKxfZysvpKQCK4g3d518Q2qhvN9tNWtEOv-CwHvCDanaco-aBt3T63EuNYI6q21emutfrO2ks7_I71_4Fv4CwjgpA4 |
| CitedBy_id | crossref_primary_10_56294_dm2025750 crossref_primary_10_56294_dm2025894 crossref_primary_10_2339_politeknik_1567237 crossref_primary_10_56294_mw2024_670 crossref_primary_10_56294_gr202591 crossref_primary_10_56294_gr202563 crossref_primary_10_1155_2024_2330624 crossref_primary_10_56294_dm2025545 crossref_primary_10_56294_dm2025755 crossref_primary_10_56294_dm2025895 |
| Cites_doi | 10.1177/03063127221078314 10.1088/1742-6596/2161/1/012014 10.30534/ijatcse/2019/90862019 10.1109/ICNGN59831.2023.10396670 10.1109/TIFS.2020.3040876 10.30534/ijatcse/2020/124932020 10.1109/ACCESS.2020.3044961 10.29350/jops.2020.25.1.999 10.48084/etasr.2088 10.55227/ijhet.v1i2.15 10.33552/abeb.2020.04.000582 10.30596/jcositte.v1i1.4359 10.1088/1742-6596/2279/1/012006 10.1007/978-3-030-42363-6_18 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2024 John Wiley & Sons, Inc. Copyright © 2024 Mohammad Subhi Al-Batah et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| Copyright_xml | – notice: COPYRIGHT 2024 John Wiley & Sons, Inc. – notice: Copyright © 2024 Mohammad Subhi Al-Batah et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| DBID | AAYXX CITATION 3V. 7SC 7XB 8AL 8FD 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU CWDGH DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U DOA |
| DOI | 10.1155/2024/3641927 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One Community College Middle East & Africa Database ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic Directory of Open Access Journals (Open Access) |
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences Middle East & Africa Database ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | Publicly Available Content Database CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Open Access Full Text url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: PIMPY name: ProQuest Publicly Available Content url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Sciences (General) |
| EISSN | 1687-9732 |
| Editor | Ridha Ejbali |
| Editor_xml | – fullname: Ridha Ejbali |
| ExternalDocumentID | oai_doaj_org_article_c7d58c75ed8946dfb5a2bce035768496 A803769045 10_1155_2024_3641927 |
| GroupedDBID | 0R~ 188 24P 2UF 4.4 5VS 6J9 8FE 8FG 8R4 8R5 AAFWJ AAKPC AAMMB AAYXX ABUWG ACCMX ACIPV ADBBV ADDVE AEFGJ AFFHD AFKRA AFPKN AGXDD AIDQK AIDYY ALMA_UNASSIGNED_HOLDINGS ALUQN ARAPS AZQEC BCNDV BENPR BGLVJ BPHCQ C1A CCPQU CITATION CNMHZ CVCKV CWDGH DWQXO EBS EJD GNUQQ GROUPED_DOAJ H13 HCIFZ IAO ICD IEA IL9 ITC K6V K7- KQ8 OK1 P62 PHGZM PHGZT PIMPY PQGLB PQQKQ PROAC Q2X RHU RNS TR2 TUXDW UZ4 M~E 3V. 7SC 7XB 8AL 8FD 8FK AAJEY AINHJ JQ2 L7M L~C L~D M0N PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c434t-749a89c3eb17988e6e36897fc7fcdd2cdd6407159ba9bae3fd8f6cdbf5812b53 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 3 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001289828500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1687-9724 |
| IngestDate | Fri Oct 03 12:42:48 EDT 2025 Fri Jul 25 20:59:55 EDT 2025 Wed Mar 19 02:06:01 EDT 2025 Sat Mar 08 18:50:59 EST 2025 Sat Nov 29 03:05:38 EST 2025 Tue Nov 18 21:20:42 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c434t-749a89c3eb17988e6e36897fc7fcdd2cdd6407159ba9bae3fd8f6cdbf5812b53 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-4729-2103 0000-0002-9341-1727 |
| OpenAccessLink | https://doaj.org/article/c7d58c75ed8946dfb5a2bce035768496 |
| PQID | 3091427848 |
| PQPubID | 237331 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_c7d58c75ed8946dfb5a2bce035768496 proquest_journals_3091427848 gale_infotracmisc_A803769045 gale_infotracacademiconefile_A803769045 crossref_citationtrail_10_1155_2024_3641927 crossref_primary_10_1155_2024_3641927 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-00-00 |
| PublicationDateYYYYMMDD | 2024-01-01 |
| PublicationDate_xml | – year: 2024 text: 2024-00-00 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | Applied Computational Intelligence and Soft Computing |
| PublicationYear | 2024 |
| Publisher | John Wiley & Sons, Inc Wiley |
| Publisher_xml | – name: John Wiley & Sons, Inc – name: Wiley |
| References | Apoorva (e_1_2_13_26_2) 2013; 2 Jose M. (e_1_2_13_15_2) 2014; 3 e_1_2_13_22_2 e_1_2_13_7_2 e_1_2_13_6_2 Alzyoud M. (e_1_2_13_29_2) 2024; 18 e_1_2_13_5_2 Matrouk K. (e_1_2_13_14_2) 2014; 31 Preet S. S. (e_1_2_13_21_2) 2011; 2 Nesamalar R. (e_1_2_13_9_2) 2022; 9 Agrawal M. (e_1_2_13_23_2) 2012; 4 Zahran B. (e_1_2_13_18_2) 2018; 96 Abdul D. S. (e_1_2_13_27_2) 2009; 8 e_1_2_13_16_2 e_1_2_13_17_2 e_1_2_13_12_2 e_1_2_13_13_2 Stallings W. (e_1_2_13_20_2) 2006 e_1_2_13_31_2 Wani P. (e_1_2_13_8_2) 2022; 2 Shashi Mehrotra S. (e_1_2_13_24_2) 2011; 2 e_1_2_13_30_2 e_1_2_13_10_2 e_1_2_13_11_2 Thakur J. (e_1_2_13_28_2) 2011; 1 e_1_2_13_4_2 Mandal P. C. (e_1_2_13_25_2) 2012; 2 e_1_2_13_3_2 e_1_2_13_2_2 e_1_2_13_1_2 Elminaam D. S. A. (e_1_2_13_19_2) 2008; 8 |
| References_xml | – ident: e_1_2_13_7_2 doi: 10.1177/03063127221078314 – volume-title: Cryptography and Network Security year: 2006 ident: e_1_2_13_20_2 – ident: e_1_2_13_13_2 doi: 10.1088/1742-6596/2161/1/012014 – volume: 1 start-page: 6 year: 2011 ident: e_1_2_13_28_2 article-title: Blowfish symmetric key cryptography algorithm simulation based performance analysis publication-title: IJETAE – ident: e_1_2_13_31_2 doi: 10.30534/ijatcse/2019/90862019 – volume: 2 start-page: 204 year: 2013 ident: e_1_2_13_26_2 article-title: Comparative study of different symmetric key cryptography publication-title: IJAIEM – ident: e_1_2_13_30_2 doi: 10.1109/ICNGN59831.2023.10396670 – volume: 2 year: 2022 ident: e_1_2_13_8_2 article-title: Secret communication using multi-image steganography for military purposes publication-title: International Journal of Advanced Research in Science, Communication and Technology – ident: e_1_2_13_22_2 – ident: e_1_2_13_2_2 doi: 10.1109/TIFS.2020.3040876 – ident: e_1_2_13_10_2 doi: 10.30534/ijatcse/2020/124932020 – volume: 8 start-page: 280 year: 2008 ident: e_1_2_13_19_2 article-title: Performance evaluation of symmetric encryption algorithms publication-title: IJCSNS International Journal of Computer Science and Network Security – volume: 8 start-page: 58 year: 2009 ident: e_1_2_13_27_2 article-title: Performance evaluation of symmetric encryption algorithms publication-title: Communications of the IBIMA – ident: e_1_2_13_4_2 doi: 10.1109/ACCESS.2020.3044961 – ident: e_1_2_13_6_2 doi: 10.29350/jops.2020.25.1.999 – volume: 2 start-page: 292 year: 2011 ident: e_1_2_13_24_2 article-title: Comparative analysis of Encryption algorithm for data communication publication-title: International Journal of Computer Science and Technology – ident: e_1_2_13_17_2 doi: 10.48084/etasr.2088 – volume: 96 year: 2018 ident: e_1_2_13_18_2 article-title: A modified lbp method to extract features from color images publication-title: Journal of Theoretical and Applied Information Technology – volume: 9 year: 2022 ident: e_1_2_13_9_2 article-title: Proficient and safe token with secret and public keys sharing algorithm for preventing cryptographic key leakage in wireless sensor network publication-title: International Journal of Engineering Research in Electronics and Communication Engineering – ident: e_1_2_13_16_2 – volume: 2 start-page: 125 year: 2011 ident: e_1_2_13_21_2 article-title: Comparison of data encryption algorithms publication-title: International Journal of Computer Science and Communication – volume: 3 start-page: 2281 year: 2014 ident: e_1_2_13_15_2 article-title: Hiding image in image using LSB insertion method with improved security and quality publication-title: International Journal of Science and Research – ident: e_1_2_13_3_2 doi: 10.55227/ijhet.v1i2.15 – volume: 18 start-page: 395 year: 2024 ident: e_1_2_13_29_2 article-title: The cryptography of secret messages using block rotation left operation publication-title: Applied Mathematics – ident: e_1_2_13_12_2 doi: 10.33552/abeb.2020.04.000582 – volume: 31 start-page: 1767 year: 2014 ident: e_1_2_13_14_2 article-title: Speech fingerprint to identify isolated word person publication-title: World Applied Sciences Journal – volume: 4 start-page: 877 year: 2012 ident: e_1_2_13_23_2 article-title: A comparative survey on symmetric key encryption techniques publication-title: International Journal on Computer Science and Engineering – ident: e_1_2_13_5_2 doi: 10.30596/jcositte.v1i1.4359 – ident: e_1_2_13_11_2 doi: 10.1088/1742-6596/2279/1/012006 – volume: 2 start-page: 196 year: 2012 ident: e_1_2_13_25_2 article-title: Superiority of blowfish algorithm publication-title: IJARCSSE – ident: e_1_2_13_1_2 doi: 10.1007/978-3-030-42363-6_18 |
| SSID | ssib003004788 ssj0000395709 ssib044730003 |
| Score | 2.4612978 |
| Snippet | In today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the... In today's interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the... |
| SourceID | doaj proquest gale crossref |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database |
| SubjectTerms | Analysis Color imagery Communication Computer hackers Cryptography Data encryption Encryption Image enhancement Investment analysis Mean square errors Messages Methods Privacy Rotation Signal to noise ratio |
| SummonAdditionalLinks | – databaseName: Advanced Technologies & Aerospace Database dbid: P5Z link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NTxUxEG8QPHhBQY1PwfSgUWM2vN1-nwgQCCQEXgwH4qXZ7QcYZd_z7Wrif-9Mtw94B7yYdC_bHrY7M79OZ9rfEPKurMrGV77EDCMrOCBeoUtnirET0UhROhljKjahzs705aWZ5IBbl49VLjAxAbWfOoyR7zBY2LAsBNe7s58FVo3C7GouofGIrCFLApZumIiv9_R3fJ8dnnMkZ89Zx4TUmKRKp0BKCbZmVMUXZ-OFwLAA32ES06RqadVK5P4PQXhal46e_u-MnpH17JHSvUGFNshKaDfJRrb5jn7MxNSfnpPTw_Ya6TnaK3pyAzhED-Z_Zn3mvKaTuysIFKO7dB_Wye_0NMSefpkOGX96PguDynUvyMXR4cXBcZGrMRSOM94XiptaG8cA3JHjLMjApDYqOmjeV_BgThC8o6aGFlj0OkrnmyjAh2gEe0lW22kbXhHKOAuweRVlXUXwF8dN4EFqoWqugmNNOSKfFz_busxUjgUzfti0YxHComhsFs2IvL8dPRsYOh4Yt49yux2DvNrpxXR-ZbOZWqe80E6J4LXh0sdG1FWDJdVwW8aNHJEPKHWL1g-f5Op8iQEmhjxadk-PAbEN-MkjsrU0EqzWLXcvlMJm1OjsnUa8_nf3G_IEpzaEgrbIaj__FbbJY_e7_9bN3yYj-AtaEwga priority: 102 providerName: ProQuest |
| Title | Enhancing Image Cryptography Performance with Block Left Rotation Operations |
| URI | https://www.proquest.com/docview/3091427848 https://doaj.org/article/c7d58c75ed8946dfb5a2bce035768496 |
| Volume | 2024 |
| WOSCitedRecordID | wos001289828500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Open Access Full Text customDbUrl: eissn: 1687-9732 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000395709 issn: 1687-9724 databaseCode: DOA dateStart: 20090101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1687-9732 dateEnd: 99991231 omitProxy: false ssIdentifier: ssib044730003 issn: 1687-9724 databaseCode: M~E dateStart: 20080101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1687-9732 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000395709 issn: 1687-9724 databaseCode: P5Z dateStart: 20090101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1687-9732 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000395709 issn: 1687-9724 databaseCode: K7- dateStart: 20090101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Middle East & Africa Database customDbUrl: eissn: 1687-9732 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000395709 issn: 1687-9724 databaseCode: CWDGH dateStart: 20090101 isFulltext: true titleUrlDefault: https://search.proquest.com/middleeastafrica providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1687-9732 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000395709 issn: 1687-9724 databaseCode: BENPR dateStart: 20090101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Publicly Available Content customDbUrl: eissn: 1687-9732 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000395709 issn: 1687-9724 databaseCode: PIMPY dateStart: 20090101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1687-9732 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000395709 issn: 1687-9724 databaseCode: 24P dateStart: 20090101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB6hwoELojzEQql8AAFCUZPYju1jt9qKinaJqh4KFyvxoyAgXe0GJC78dmYSb-keKi5Ijg_xHJyZzHjGY38D8KIoi9aXvqAMI88EWrxMF85kuZPRVLJwVYxDsQk1n-vzc1NfK_VFZ8JGeOCRcXtOeamdksFrIyofW9mULRW5IkdZmAFsO1fmWjA12GBKP-VmfdJdSgryxR6vKOmpNtagAar_JoM8rDKH9-Fecg_Z_jitbbgVugewnRRwxV4nlOg3D-F41n0mrIzugh19R6PADpa_Fn0CoGb13_sAjLZa2RQXra_sOMSenV6O6Xf2YRFG-a8ewdnh7OzgXZZKI2ROcNFnSphGG8fR0hLgWKgCr7RR0WHzvsSHEnToqrQNtsCj17Fyvo0SF_RW8sew1V124QkwLnjASFIWTRnRecvbIEKlpWqECo63xQTernllXYINp-oV3-wQPkhpibM2cXYCL6-oFyNcxg10U2L7FQ2BXA8vUPQ2id7-S_QTeEVCs6SKOCXXpBsF-GEEamX3dY7m06DTOoGdDUpUIbc5vBa7TSq8shw9KapDIvTT_zHZZ3CXGDDu3uzAVr_8EZ7DHfez_7Ja7sLt6Wxen-4OfzH271WG_cnvGfa1_ITj9dFJ_fEPfI33cw |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELaqggQXoDzUhQI-UAFCUTfxMweE2tKqq12WCu2hNyvxoyAgu2wCqD-K_8hM4rTdQ7n1gJRcYh_iZOYbj8f-PkJepFlausylWGFkCQfES3Rq82RoRcilSK0MoRWbUNOpPjnJj9fIn_4sDG6r7DGxBWo3t7hGvsMgsKEsBNfvFj8SVI3C6movodGZxdif_YaUrX47eg__dzvLDg9m-0dJVBVILGe8SRTPC51bBiCFXF1eeiZ1roKFy7kMbqxtQZQvC7g8C04HaV0ZBMTCEkUiAPFvcKYVutVYJZfcZXiZjJ5z5IKPRc42MGBNrN10kkpw7VxlvN-KLwSuQvAdJrEqq1aCZKslcFXEaMPg4d3_7APeI3fifJvudg6yQdZ8dZ9sRESr6atIu_36AZkcVJ-RfKQ6paPvgLJ0f3m2aCKjNz2-OGBBce2a7sEs4Cud-NDQT_NuPwP9uPCdQ9UPyew6BvWIrFfzym8SyjjzkJqLtMgCzIaHpedeaqEKrrxlZTogb_p_a2zkYUc5kG-mzceEMGgJJlrCgGyf9150_CNX9NtDMznvg6zh7YP58tREEDJWOaGtEt7pnEsXSlFkJQrGYdLJczkgL9HIDGIbvJIt4hENGBiyhJldPYR4lEMWMCBbKz0Bk-xqc2-DJmJibS4M8PG_m5-TW0ezDxMzGU3HT8htHGa36LVF1pvlT_-U3LS_mi_18lnrf5SYazbXvz8MZog |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEF5VBSEuQHmogQJ7oAKErMTepw8I9RURNQoR6qHisrL3URCtExID6k_j3zFjr9vmUG49IDkXew_e-JtvdnZmvyHkVZqlpctcihlGlnBgvESnNk8GVoRcitTKEJpmE2oy0cfH-XSN_OnOwmBZZceJDVG7mcU98j4Dx4ZtIbjuh1gWMd0ffpj_SLCDFGZau3YaLUQO_flvCN-W70f78K23s2x4cLT3MYkdBhLLGa8TxfNC55YBYaFul5eeSZ2rYOFyLoMf5rnA45cFXJ4Fp4O0rgwC_GKJDSOA_W8pCDGxmnAqvlwxncFVYXrOURc-JjwbJ4H5saYAJZVg5rnKeFeWLwTuSPA-k5ihVSsOs-krcJ33aFzi8P5__Gc-IPfiOpzutIazQdZ89ZBsRKZb0jdRjvvtIzI-qL6iKEl1QkdnwL50b3E-r6PSN51eHryguKdNd2F18J2Ofajp51lb50A_zX1raMvH5OgmJvWErFezym8SyjjzELKLtMgCrJIHpedeaqEKrrxlZdoj77rvbGzUZ8c2IaemidOEMIgKE1HRI9sXo-etLsk143YRMhdjUE28uTFbnJhITsYqJ7RVwjudc-lCKYqsxEZyGIzyXPbIawScQc6DV7JFPLoBE0P1MLOjB-CncogOemRrZSRwlV193OHRRK5cmkswPv3345fkDqDUjEeTw2fkLs6y3QvbIuv14qd_Tm7bX_W35eJFY4qUmBtG619qc2-s |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enhancing+Image+Cryptography+Performance+with+Block+Left+Rotation+Operations&rft.jtitle=Applied+computational+intelligence+and+soft+computing&rft.au=Mohammad+Subhi+Al-Batah&rft.au=Mowafaq+Salem+Alzboon&rft.au=Mazen+Alzyoud&rft.au=Najah+Al-Shanableh&rft.date=2024&rft.pub=Wiley&rft.eissn=1687-9732&rft.volume=2024&rft_id=info:doi/10.1155%2F2024%2F3641927&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_c7d58c75ed8946dfb5a2bce035768496 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1687-9724&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1687-9724&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1687-9724&client=summon |