A Novel Method for Image Encryption Based on Chaos and Transcendental Numbers
In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box and the ciphering keys. The Chaotic Pi Ciphering (CPC) is a robust symmetric cryptosystem of the substitution-permutation-network type, that c...
Saved in:
Published in: | IEEE access Vol. 7; pp. 163729 - 163739 |
---|---|
Main Authors: | , , , , |
Format: | Journal Article |
Language: | English |
Published: |
Piscataway
IEEE
2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box and the ciphering keys. The Chaotic Pi Ciphering (CPC) is a robust symmetric cryptosystem of the substitution-permutation-network type, that ciphers images in ten rounds. The objective of CPC is to avoid some general weakness points in cryptosystems, such as the vulnerability to certain types of attacks or the encryption with data loss. The number of rounds can be increased up to 14, with an even further increment of the ciphering security. An 8×8 substitution box is constructed using chaos, and its value of the Differential Power Analysis is lower than the corresponding to the Advanced Encryption Standard (AES). It makes CPC more resistant to differential and linear attacks than AES. CPC has approximately 2 512 keys, presenting a high resistance to brute-force attacks. Chaos is produced by a nonlinear differential equation, and the Walsh function is applied to measure the nonlinearity of the box. The transcendental number pi and a positive integer are employed to generate the schedule keys, and the key length is equal to the image size. The randomness of the encrypted images is evaluated with four tests: entropy, correlation, Discrete Fourier Transform, and a goodness-of-fit test using the chi square distribution χ 2 . CPC was tested using well-known images from the related literature, and its performance was compared to the corresponding to AES. The results show a good entropy and a high randomness, indicating a high-quality ciphering. |
---|---|
AbstractList | In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box and the ciphering keys. The Chaotic Pi Ciphering (CPC) is a robust symmetric cryptosystem of the substitution-permutation-network type, that ciphers images in ten rounds. The objective of CPC is to avoid some general weakness points in cryptosystems, such as the vulnerability to certain types of attacks or the encryption with data loss. The number of rounds can be increased up to 14, with an even further increment of the ciphering security. An 8×8 substitution box is constructed using chaos, and its value of the Differential Power Analysis is lower than the corresponding to the Advanced Encryption Standard (AES). It makes CPC more resistant to differential and linear attacks than AES. CPC has approximately 2 512 keys, presenting a high resistance to brute-force attacks. Chaos is produced by a nonlinear differential equation, and the Walsh function is applied to measure the nonlinearity of the box. The transcendental number pi and a positive integer are employed to generate the schedule keys, and the key length is equal to the image size. The randomness of the encrypted images is evaluated with four tests: entropy, correlation, Discrete Fourier Transform, and a goodness-of-fit test using the chi square distribution χ 2 . CPC was tested using well-known images from the related literature, and its performance was compared to the corresponding to AES. The results show a good entropy and a high randomness, indicating a high-quality ciphering. In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box and the ciphering keys. The Chaotic Pi Ciphering (CPC) is a robust symmetric cryptosystem of the substitution-permutation-network type, that ciphers images in ten rounds. The objective of CPC is to avoid some general weakness points in cryptosystems, such as the vulnerability to certain types of attacks or the encryption with data loss. The number of rounds can be increased up to 14, with an even further increment of the ciphering security. An 8×8 substitution box is constructed using chaos, and its value of the Differential Power Analysis is lower than the corresponding to the Advanced Encryption Standard (AES). It makes CPC more resistant to differential and linear attacks than AES. CPC has approximately 2512 keys, presenting a high resistance to brute-force attacks. Chaos is produced by a nonlinear differential equation, and the Walsh function is applied to measure the nonlinearity of the box. The transcendental number pi and a positive integer are employed to generate the schedule keys, and the key length is equal to the image size. The randomness of the encrypted images is evaluated with four tests: entropy, correlation, Discrete Fourier Transform, and a goodness-of-fit test using the chi square distribution χ2. CPC was tested using well-known images from the related literature, and its performance was compared to the corresponding to AES. The results show a good entropy and a high randomness, indicating a high-quality ciphering. |
Author | Carapia, Rolando Flores Silva Garcia, Victor Manuel Vega-Alvarado, Eduardo Gonzalez Ramirez, Marlon David Rodriguez Escobar, Eduardo |
Author_xml | – sequence: 1 givenname: Victor Manuel orcidid: 0000-0003-1312-5294 surname: Silva Garcia fullname: Silva Garcia, Victor Manuel organization: Instituto Politécnico Nacional-CIDETEC Ciudad de México, Mexico City, México – sequence: 2 givenname: Marlon David orcidid: 0000-0002-3711-7910 surname: Gonzalez Ramirez fullname: Gonzalez Ramirez, Marlon David email: dgonzalezr@ipn.mx organization: Instituto Politécnico Nacional-CIDETEC Ciudad de México, Mexico City, México – sequence: 3 givenname: Rolando Flores orcidid: 0000-0002-8557-9941 surname: Carapia fullname: Carapia, Rolando Flores organization: Instituto Politécnico Nacional-CIDETEC Ciudad de México, Mexico City, México – sequence: 4 givenname: Eduardo orcidid: 0000-0001-9464-7996 surname: Vega-Alvarado fullname: Vega-Alvarado, Eduardo organization: Instituto Politécnico Nacional-CIDETEC Ciudad de México, Mexico City, México – sequence: 5 givenname: Eduardo orcidid: 0000-0002-8193-8150 surname: Rodriguez Escobar fullname: Rodriguez Escobar, Eduardo organization: Instituto Politécnico Nacional-CIDETEC Ciudad de México, Mexico City, México |
BookMark | eNpNUU1rGzEUFCWFpkl-QS6Cnu3q--PoLm5ryMchvgut9DZZY0uutC7k30fuhtB3eY9hZt7AfEUXKSdA6JaSJaXEfl913frpackItUtmJSOcfEKXjCq74JKri__uL-im1h1pYxok9SW6X-GH_Bf2-B6mlxzxkAveHPwz4HUK5fU4jTnhH75CxO3oXnyu2KeIt8WnGiBFSJPf44fToYdSr9Hnwe8r3LzvK7T9ud52vxd3j7823epuEQQx0wKMUbKHPg56GDwJQVoirVZEKOEBvFHcSCqDkdxqS6joSaObEAhEpT2_QpvZNma_c8cyHnx5ddmP7h-Qy7PzZRrDHpximinGLDVRil4EH3yvQfAgxRB1iM3r2-x1LPnPCerkdvlUUkvvmJBSsZZNNxafWaHkWgsMH18pcecW3NyCO7fg3ltoqttZNQLAh8IYe3bmb_nGg5Y |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_1109_ACCESS_2021_3108789 crossref_primary_10_3390_electronics10040413 crossref_primary_10_1109_ACCESS_2022_3203173 crossref_primary_10_1109_ACCESS_2021_3082770 crossref_primary_10_1109_ACCESS_2020_3042475 crossref_primary_10_3390_asi5030057 |
Cites_doi | 10.1016/j.sigpro.2017.07.034 10.1016/j.sigpro.2017.09.020 10.1002/j.1538-7305.1948.tb01338.x 10.1109/TIFS.2010.2099114 10.1016/j.sigpro.2017.06.028 10.1016/j.ins.2014.11.018 10.1016/j.cnsns.2010.01.041 10.1016/j.optcom.2011.02.039 10.1364/OL.38.001425 10.1016/j.adhoc.2018.10.027 10.1007/s11042-013-1392-1 10.1109/TIT.2012.2210752 10.1007/s11277-015-2667-9 10.1007/978-3-642-12035-0_33 10.1109/MSP.2010.193 10.1007/978-981-10-6898-0_17 10.1201/9781315282497 10.1201/9780429492563 10.1007/s11098-016-0667-6 10.1016/j.optcom.2012.07.052 10.1016/j.cnsns.2011.12.015 10.1007/978-3-319-16859-3_33 10.1016/j.optlastec.2013.05.023 10.1016/j.sigpro.2019.02.016 10.1364/AOP.6.000120 10.1016/j.ins.2018.12.048 10.1088/2040-8978/16/2/025402 10.1080/10511970.2017.1315474 10.1016/j.optlaseng.2015.03.022 10.1007/s11042-013-1699-y 10.1016/j.optlastec.2019.02.009 10.1201/9780429501906 10.6028/NIST.SP.800-67r2 10.1017/CBO9780511780448.011 10.1109/TIFS.2013.2291625 10.1093/acprof:oso/9780198507239.001.0001 10.1007/s11042-018-7081-3 10.1007/s11071-018-4159-4 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2019.2952030 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library Online CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals url: http://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: ESBDL name: IEEE Xplore Open Access Journals url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 163739 |
ExternalDocumentID | oai_doaj_org_article_6272622918d54b4cacab7e43c54fd7cd 10_1109_ACCESS_2019_2952030 8892455 |
Genre | orig-research |
GrantInformation_xml | – fundername: Instituto Politécnico Nacional funderid: 10.13039/501100003069 – fundername: Consejo Nacional de Ciencia y Tecnología funderid: 10.13039/501100007350 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABVLG ACGFS ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IFIPE IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RIG RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-e8865bebdf7ffa0cc59059760464aeea8638515c853979014b05be8cc0ed67a3 |
IEDL.DBID | RIE |
ISSN | 2169-3536 |
IngestDate | Tue Oct 22 15:12:14 EDT 2024 Thu Oct 10 19:53:21 EDT 2024 Fri Aug 23 03:24:11 EDT 2024 Wed Jun 26 19:28:28 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-e8865bebdf7ffa0cc59059760464aeea8638515c853979014b05be8cc0ed67a3 |
ORCID | 0000-0002-8557-9941 0000-0001-9464-7996 0000-0002-3711-7910 0000-0002-8193-8150 0000-0003-1312-5294 |
OpenAccessLink | https://ieeexplore.ieee.org/document/8892455 |
PQID | 2455625907 |
PQPubID | 4845423 |
PageCount | 11 |
ParticipantIDs | proquest_journals_2455625907 crossref_primary_10_1109_ACCESS_2019_2952030 ieee_primary_8892455 doaj_primary_oai_doaj_org_article_6272622918d54b4cacab7e43c54fd7cd |
PublicationCentury | 2000 |
PublicationDate | 20190000 2019-00-00 20190101 2019-01-01 |
PublicationDateYYYYMMDD | 2019-01-01 |
PublicationDate_xml | – year: 2019 text: 20190000 |
PublicationDecade | 2010 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2019 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref14 ref52 ref11 ref10 ref17 edwards (ref37) 2016 ref19 biham (ref33) 2012 ref18 matsui (ref32) 1993 gallian (ref35) 2012 ref51 ref50 lakshmi (ref42) 2017 ref48 ref47 loza (ref20) 2012 ref41 reisman (ref45) 2019 rukhin (ref15) 2013 ref43 ref49 ref8 çavu?o?lu (ref16) 2018; 92 gonzales (ref38) 2017 ref9 ref4 ref3 ref6 ref5 ref40 ref34 ref36 garcía (ref31) 2007 (ref28) 1999; 25 ref2 ref1 ref24 ref23 ref26 ref25 ref22 ref21 mohamed (ref39) 2018; 20 ref27 ref29 fremgen (ref44) 2011 (ref30) 2001 nix (ref46) 2019 khelifi (ref7) 2018; 143 |
References_xml | – year: 2016 ident: ref37 publication-title: Diffferential Equations and Boundary Value Problems contributor: fullname: edwards – ident: ref6 doi: 10.1016/j.sigpro.2017.07.034 – volume: 143 start-page: 336 year: 2018 ident: ref7 article-title: On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain publication-title: Signal Process doi: 10.1016/j.sigpro.2017.09.020 contributor: fullname: khelifi – ident: ref40 doi: 10.1002/j.1538-7305.1948.tb01338.x – year: 2012 ident: ref35 publication-title: Contemporary Abstract Algebra contributor: fullname: gallian – ident: ref19 doi: 10.1109/TIFS.2010.2099114 – ident: ref8 doi: 10.1016/j.sigpro.2017.06.028 – ident: ref12 doi: 10.1016/j.ins.2014.11.018 – year: 2007 ident: ref31 article-title: Criptoanálisis para la modificación de los estándares DES y Triple DES contributor: fullname: garcía – ident: ref11 doi: 10.1016/j.cnsns.2010.01.041 – ident: ref41 doi: 10.1016/j.optcom.2011.02.039 – ident: ref48 doi: 10.1364/OL.38.001425 – volume: 25 start-page: 1 year: 1999 ident: ref28 article-title: 46-3. Data encryption standard DES publication-title: Nat Inst Standards Technol – ident: ref47 doi: 10.1016/j.adhoc.2018.10.027 – ident: ref24 doi: 10.1007/s11042-013-1392-1 – ident: ref23 doi: 10.1109/TIT.2012.2210752 – year: 2012 ident: ref33 publication-title: Differential Cryptanalysis of the Data Encryption Standard contributor: fullname: biham – year: 2012 ident: ref20 article-title: NOM-151-SCFI-2002: Uso de la criptografía para la conservación de la información contributor: fullname: loza – ident: ref17 doi: 10.1007/s11277-015-2667-9 – ident: ref22 doi: 10.1007/978-3-642-12035-0_33 – ident: ref3 doi: 10.1109/MSP.2010.193 – start-page: 205 year: 2017 ident: ref42 article-title: A quasigroup based synchronous stream cipher for lightweight applications publication-title: Proc Int Symp Secur Comput Commun doi: 10.1007/978-981-10-6898-0_17 contributor: fullname: lakshmi – start-page: 386 year: 1993 ident: ref32 article-title: Linear cryptanalysis method for DES cipher publication-title: Proc Workshop Theory Appl Cryptograph Techn contributor: fullname: matsui – ident: ref34 doi: 10.1201/9781315282497 – ident: ref25 doi: 10.1201/9780429492563 – volume: 20 start-page: 1206 year: 2018 ident: ref39 article-title: An improved AES S-box based on fibonacci numbers and prime factor publication-title: Int J Netw Secur contributor: fullname: mohamed – ident: ref36 doi: 10.1007/s11098-016-0667-6 – ident: ref21 doi: 10.1016/j.optcom.2012.07.052 – ident: ref51 doi: 10.1016/j.cnsns.2011.12.015 – year: 2013 ident: ref15 article-title: A statistical test suite for random and pseudorandom number generators for cryptographic applications contributor: fullname: rukhin – year: 2017 ident: ref38 publication-title: Digital Image Processing contributor: fullname: gonzales – year: 2001 ident: ref30 publication-title: Advanced encryption standard (AES) National Institute of Standards and Technology – ident: ref43 doi: 10.1007/978-3-319-16859-3_33 – year: 2019 ident: ref46 article-title: Cryptographic unit for public key infrastructure (PKI) operations contributor: fullname: nix – ident: ref50 doi: 10.1016/j.optlastec.2013.05.023 – ident: ref13 doi: 10.1016/j.sigpro.2019.02.016 – ident: ref49 doi: 10.1364/AOP.6.000120 – ident: ref2 doi: 10.1016/j.ins.2018.12.048 – ident: ref4 doi: 10.1088/2040-8978/16/2/025402 – ident: ref9 doi: 10.1080/10511970.2017.1315474 – ident: ref52 doi: 10.1016/j.optlaseng.2015.03.022 – ident: ref5 doi: 10.1007/s11042-013-1699-y – ident: ref1 doi: 10.1016/j.optlastec.2019.02.009 – ident: ref10 doi: 10.1201/9780429501906 – year: 2011 ident: ref44 publication-title: Probability and Statistics for Engineers and Scientists contributor: fullname: fremgen – year: 2019 ident: ref45 article-title: Air traffic management blockchain infrastructure for security, authentication, and privacy contributor: fullname: reisman – ident: ref29 doi: 10.6028/NIST.SP.800-67r2 – ident: ref26 doi: 10.1017/CBO9780511780448.011 – ident: ref18 doi: 10.1109/TIFS.2013.2291625 – ident: ref27 doi: 10.1093/acprof:oso/9780198507239.001.0001 – ident: ref14 doi: 10.1007/s11042-018-7081-3 – volume: 92 start-page: 1745 year: 2018 ident: ref16 article-title: A novel hybrid encryption algorithm based on chaos and S-AES algorithm publication-title: Nonlinear Dyn doi: 10.1007/s11071-018-4159-4 contributor: fullname: çavu?o?lu |
SSID | ssj0000816957 |
Score | 2.2436213 |
Snippet | In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Publisher |
StartPage | 163729 |
SubjectTerms | Algorithms Chaos Chi-square test Computer systems Cryptography Data loss discrete Fourier transform Discrete Fourier transforms Encryption Fourier transforms Goodness of fit High resistance image encryption Nonlinear differential equations Nonlinearity Permutations Randomness Schedules Statistical tests Substitutes transcendental numbers Walsh function |
SummonAdditionalLinks | – databaseName: Directory of Open Access Journals dbid: DOA link: http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV05T8MwGLWgEwwIKIhAQR4YCc3hc2xDKxjahQ5slk8xQIpIi8S_x3bSqhIDC5uVREn8vvg7bOc9AG6tlYWzDqW6JCoNf1KlvOQuzZktdRlI9FWUTnim8xf2MAk0OVupr7AnrKUHboEbkoIWpCh4zgxGCmmppaIWlRojZ6g20ftmZKeYij6Y5YRj2tEM5RkfjqrK9yjs5eL3BcdF3Pe8E4oiY38nsfLLL8dgMz0GR12WCEft252APVufgsMd7sA-mI3gfPll3-AsakBDn3zCp3fvHeCk1p_f0RPAsY9RBvpG9SqXDZS1gTE46Sh86_NuOI-KIM0ZWEwni-ox7bQRUo0ytkotYwQrq4yjzslMa8x9okRJWKmU3gDMjyufqmgfjTkNS6XKo26Z1pk1hMryHPTqZW0vAMyRB9iE-VAjkTSlb0iiFGbWWZ4pl4C7DUrio2XAELFyyLhoQRUBVNGBmoBxQHJ7aaCvjge8UUVnVPGXURPQD3bY3oQxXyZinIDBxi6iG2qNCCdCEZfRy_949BU4CN1pZ1kGoLf6XNtrsN-Y9U38xH4AFozShA priority: 102 providerName: Directory of Open Access Journals |
Title | A Novel Method for Image Encryption Based on Chaos and Transcendental Numbers |
URI | https://ieeexplore.ieee.org/document/8892455 https://www.proquest.com/docview/2455625907 https://doaj.org/article/6272622918d54b4cacab7e43c54fd7cd |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LThsxFL0isCkL2kIRARp5wTIDk5nx2F4mIaiVSjaw6M7y41pdwATlUal_j69nEkVqN91Z8_T4jH0fts8BuEE0RcBQZa6sbUY7qTJVqpCNJJauJBJ9m6QTnsT8p7yfEU3OcLcXBhHT4jO8pWKay_cLt6FU2Z2UMVrgvAc9oWS7V2uXTyEBCcVFRyw0ytXdeDqN30Crt9RtoXiRVjrvGZ_E0d-Jqvw1Eifz8vDx_yr2CU46N5KNW9w_wwE2p3C8Ry54Bo9jNl_8xhf2mESiWfRO2ffXOHywWeOWf9JQwSbRiHkWC9NfZrFipvEsWS-XlHGjY87mSTJk9QWeH2bP029ZJ56QuSqX6wylrLlF64MIweTOcRU9KVHTVKaJCMnY8aIv46K5VoLmUm2EBaVzOfpamPIcDptFgxfARpUoak8JU28q48tYMLW1XGJAldvQh-G2UfVbS5GhU2iRK91ioAkD3WHQhwk1_O5S4rdOB2KL6q676LqI7ywKNZKeV7ZyxhkrsCodr4IXzvfhjFDYPaQDoA_XWxh11xdXmk5QlJeLy3_fdQUfqIJtYuUaDtfLDX6F3spvBilEH8DR7Gly_2OQ_rh3wfjRzA |
link.rule.ids | 315,782,786,798,866,2106,4028,27642,27932,27933,27934,54767,54942 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LbhMxFL2i6QJY8CqIQAEvWHbayYw9tpdJmqoVSTbNgp3lx7VYwAQ1TaX-PdeOG1WCDTtrnh6fse_D9jkAXxFtEzHyyredq9JOqkq3OlYjha1vE4m-y9IJ13L5XZ3PEk3OyX4vDCLmxWd4mop5Lj-s_Talys6UomhBiAM4pKiGNwM4nF1Pzuf7nEoSkdBCFnKhUa3PxtMpfUdawaVPGy2avNr5kQHKPP1FWOWv0TibmIuX_1e5V_CiuJJsvMP-NTzB_g08f0QweASLMVuu7_AnW2ShaEYeKrv6RUMIm_X-5j4PF2xChiwwKkx_2PWG2T6wbMF8Vscl55wts2zI5i2sLmar6WVVBBQqz2t1W6FSnXDoQpQx2tp7ocmbkl2azrSEkqLOR_6MJ5OtZZpPdQQNKu9rDJ207TsY9Ose3wMbcdl0ISVNg-U2tFSwnXNCYURduziEk4dGNb93NBkmhxe1NjsMTMLAFAyGMEkNv780cVznA9SipnQZ0zX0zqbRIxUEd9xbb51E3nrBY5A-DOEoobB_SAFgCMcPMJrSHzcmnUiRXi0__PuuL_D0crWYm_nV8ttHeJYqu0u0HMPg9maLn-BgE7afyx_3B5fO064 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Method+for+Image+Encryption+Based+on+Chaos+and+Transcendental+Numbers&rft.jtitle=IEEE+access&rft.au=Silva+Garcia%2C+Victor+Manuel&rft.au=Gonzalez+Ramirez%2C+Marlon+David&rft.au=Carapia%2C+Rolando+Flores&rft.au=Vega-Alvarado%2C+Eduardo&rft.date=2019&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=7&rft.spage=163729&rft.epage=163739&rft_id=info:doi/10.1109%2FACCESS.2019.2952030&rft.externalDocID=8892455 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |