A Novel Method for Image Encryption Based on Chaos and Transcendental Numbers

In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box and the ciphering keys. The Chaotic Pi Ciphering (CPC) is a robust symmetric cryptosystem of the substitution-permutation-network type, that c...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access Vol. 7; pp. 163729 - 163739
Main Authors: Silva Garcia, Victor Manuel, Gonzalez Ramirez, Marlon David, Carapia, Rolando Flores, Vega-Alvarado, Eduardo, Rodriguez Escobar, Eduardo
Format: Journal Article
Language:English
Published: Piscataway IEEE 2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box and the ciphering keys. The Chaotic Pi Ciphering (CPC) is a robust symmetric cryptosystem of the substitution-permutation-network type, that ciphers images in ten rounds. The objective of CPC is to avoid some general weakness points in cryptosystems, such as the vulnerability to certain types of attacks or the encryption with data loss. The number of rounds can be increased up to 14, with an even further increment of the ciphering security. An 8×8 substitution box is constructed using chaos, and its value of the Differential Power Analysis is lower than the corresponding to the Advanced Encryption Standard (AES). It makes CPC more resistant to differential and linear attacks than AES. CPC has approximately 2 512 keys, presenting a high resistance to brute-force attacks. Chaos is produced by a nonlinear differential equation, and the Walsh function is applied to measure the nonlinearity of the box. The transcendental number pi and a positive integer are employed to generate the schedule keys, and the key length is equal to the image size. The randomness of the encrypted images is evaluated with four tests: entropy, correlation, Discrete Fourier Transform, and a goodness-of-fit test using the chi square distribution χ 2 . CPC was tested using well-known images from the related literature, and its performance was compared to the corresponding to AES. The results show a good entropy and a high randomness, indicating a high-quality ciphering.
AbstractList In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box and the ciphering keys. The Chaotic Pi Ciphering (CPC) is a robust symmetric cryptosystem of the substitution-permutation-network type, that ciphers images in ten rounds. The objective of CPC is to avoid some general weakness points in cryptosystems, such as the vulnerability to certain types of attacks or the encryption with data loss. The number of rounds can be increased up to 14, with an even further increment of the ciphering security. An 8×8 substitution box is constructed using chaos, and its value of the Differential Power Analysis is lower than the corresponding to the Advanced Encryption Standard (AES). It makes CPC more resistant to differential and linear attacks than AES. CPC has approximately 2 512 keys, presenting a high resistance to brute-force attacks. Chaos is produced by a nonlinear differential equation, and the Walsh function is applied to measure the nonlinearity of the box. The transcendental number pi and a positive integer are employed to generate the schedule keys, and the key length is equal to the image size. The randomness of the encrypted images is evaluated with four tests: entropy, correlation, Discrete Fourier Transform, and a goodness-of-fit test using the chi square distribution χ 2 . CPC was tested using well-known images from the related literature, and its performance was compared to the corresponding to AES. The results show a good entropy and a high randomness, indicating a high-quality ciphering.
In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box and the ciphering keys. The Chaotic Pi Ciphering (CPC) is a robust symmetric cryptosystem of the substitution-permutation-network type, that ciphers images in ten rounds. The objective of CPC is to avoid some general weakness points in cryptosystems, such as the vulnerability to certain types of attacks or the encryption with data loss. The number of rounds can be increased up to 14, with an even further increment of the ciphering security. An 8×8 substitution box is constructed using chaos, and its value of the Differential Power Analysis is lower than the corresponding to the Advanced Encryption Standard (AES). It makes CPC more resistant to differential and linear attacks than AES. CPC has approximately 2512 keys, presenting a high resistance to brute-force attacks. Chaos is produced by a nonlinear differential equation, and the Walsh function is applied to measure the nonlinearity of the box. The transcendental number pi and a positive integer are employed to generate the schedule keys, and the key length is equal to the image size. The randomness of the encrypted images is evaluated with four tests: entropy, correlation, Discrete Fourier Transform, and a goodness-of-fit test using the chi square distribution χ2. CPC was tested using well-known images from the related literature, and its performance was compared to the corresponding to AES. The results show a good entropy and a high randomness, indicating a high-quality ciphering.
Author Carapia, Rolando Flores
Silva Garcia, Victor Manuel
Vega-Alvarado, Eduardo
Gonzalez Ramirez, Marlon David
Rodriguez Escobar, Eduardo
Author_xml – sequence: 1
  givenname: Victor Manuel
  orcidid: 0000-0003-1312-5294
  surname: Silva Garcia
  fullname: Silva Garcia, Victor Manuel
  organization: Instituto Politécnico Nacional-CIDETEC Ciudad de México, Mexico City, México
– sequence: 2
  givenname: Marlon David
  orcidid: 0000-0002-3711-7910
  surname: Gonzalez Ramirez
  fullname: Gonzalez Ramirez, Marlon David
  email: dgonzalezr@ipn.mx
  organization: Instituto Politécnico Nacional-CIDETEC Ciudad de México, Mexico City, México
– sequence: 3
  givenname: Rolando Flores
  orcidid: 0000-0002-8557-9941
  surname: Carapia
  fullname: Carapia, Rolando Flores
  organization: Instituto Politécnico Nacional-CIDETEC Ciudad de México, Mexico City, México
– sequence: 4
  givenname: Eduardo
  orcidid: 0000-0001-9464-7996
  surname: Vega-Alvarado
  fullname: Vega-Alvarado, Eduardo
  organization: Instituto Politécnico Nacional-CIDETEC Ciudad de México, Mexico City, México
– sequence: 5
  givenname: Eduardo
  orcidid: 0000-0002-8193-8150
  surname: Rodriguez Escobar
  fullname: Rodriguez Escobar, Eduardo
  organization: Instituto Politécnico Nacional-CIDETEC Ciudad de México, Mexico City, México
BookMark eNpNUU1rGzEUFCWFpkl-QS6Cnu3q--PoLm5ryMchvgut9DZZY0uutC7k30fuhtB3eY9hZt7AfEUXKSdA6JaSJaXEfl913frpackItUtmJSOcfEKXjCq74JKri__uL-im1h1pYxok9SW6X-GH_Bf2-B6mlxzxkAveHPwz4HUK5fU4jTnhH75CxO3oXnyu2KeIt8WnGiBFSJPf44fToYdSr9Hnwe8r3LzvK7T9ud52vxd3j7823epuEQQx0wKMUbKHPg56GDwJQVoirVZEKOEBvFHcSCqDkdxqS6joSaObEAhEpT2_QpvZNma_c8cyHnx5ddmP7h-Qy7PzZRrDHpximinGLDVRil4EH3yvQfAgxRB1iM3r2-x1LPnPCerkdvlUUkvvmJBSsZZNNxafWaHkWgsMH18pcecW3NyCO7fg3ltoqttZNQLAh8IYe3bmb_nGg5Y
CODEN IAECCG
CitedBy_id crossref_primary_10_1109_ACCESS_2021_3108789
crossref_primary_10_3390_electronics10040413
crossref_primary_10_1109_ACCESS_2022_3203173
crossref_primary_10_1109_ACCESS_2021_3082770
crossref_primary_10_1109_ACCESS_2020_3042475
crossref_primary_10_3390_asi5030057
Cites_doi 10.1016/j.sigpro.2017.07.034
10.1016/j.sigpro.2017.09.020
10.1002/j.1538-7305.1948.tb01338.x
10.1109/TIFS.2010.2099114
10.1016/j.sigpro.2017.06.028
10.1016/j.ins.2014.11.018
10.1016/j.cnsns.2010.01.041
10.1016/j.optcom.2011.02.039
10.1364/OL.38.001425
10.1016/j.adhoc.2018.10.027
10.1007/s11042-013-1392-1
10.1109/TIT.2012.2210752
10.1007/s11277-015-2667-9
10.1007/978-3-642-12035-0_33
10.1109/MSP.2010.193
10.1007/978-981-10-6898-0_17
10.1201/9781315282497
10.1201/9780429492563
10.1007/s11098-016-0667-6
10.1016/j.optcom.2012.07.052
10.1016/j.cnsns.2011.12.015
10.1007/978-3-319-16859-3_33
10.1016/j.optlastec.2013.05.023
10.1016/j.sigpro.2019.02.016
10.1364/AOP.6.000120
10.1016/j.ins.2018.12.048
10.1088/2040-8978/16/2/025402
10.1080/10511970.2017.1315474
10.1016/j.optlaseng.2015.03.022
10.1007/s11042-013-1699-y
10.1016/j.optlastec.2019.02.009
10.1201/9780429501906
10.6028/NIST.SP.800-67r2
10.1017/CBO9780511780448.011
10.1109/TIFS.2013.2291625
10.1093/acprof:oso/9780198507239.001.0001
10.1007/s11042-018-7081-3
10.1007/s11071-018-4159-4
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2019.2952030
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library Online
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Materials Research Database

Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals
  url: http://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: ESBDL
  name: IEEE Xplore Open Access Journals
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 163739
ExternalDocumentID oai_doaj_org_article_6272622918d54b4cacab7e43c54fd7cd
10_1109_ACCESS_2019_2952030
8892455
Genre orig-research
GrantInformation_xml – fundername: Instituto Politécnico Nacional
  funderid: 10.13039/501100003069
– fundername: Consejo Nacional de Ciencia y Tecnología
  funderid: 10.13039/501100007350
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABVLG
ACGFS
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IFIPE
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RIG
RNS
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-e8865bebdf7ffa0cc59059760464aeea8638515c853979014b05be8cc0ed67a3
IEDL.DBID RIE
ISSN 2169-3536
IngestDate Tue Oct 22 15:12:14 EDT 2024
Thu Oct 10 19:53:21 EDT 2024
Fri Aug 23 03:24:11 EDT 2024
Wed Jun 26 19:28:28 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-e8865bebdf7ffa0cc59059760464aeea8638515c853979014b05be8cc0ed67a3
ORCID 0000-0002-8557-9941
0000-0001-9464-7996
0000-0002-3711-7910
0000-0002-8193-8150
0000-0003-1312-5294
OpenAccessLink https://ieeexplore.ieee.org/document/8892455
PQID 2455625907
PQPubID 4845423
PageCount 11
ParticipantIDs proquest_journals_2455625907
crossref_primary_10_1109_ACCESS_2019_2952030
ieee_primary_8892455
doaj_primary_oai_doaj_org_article_6272622918d54b4cacab7e43c54fd7cd
PublicationCentury 2000
PublicationDate 20190000
2019-00-00
20190101
2019-01-01
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – year: 2019
  text: 20190000
PublicationDecade 2010
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref14
ref52
ref11
ref10
ref17
edwards (ref37) 2016
ref19
biham (ref33) 2012
ref18
matsui (ref32) 1993
gallian (ref35) 2012
ref51
ref50
lakshmi (ref42) 2017
ref48
ref47
loza (ref20) 2012
ref41
reisman (ref45) 2019
rukhin (ref15) 2013
ref43
ref49
ref8
çavu?o?lu (ref16) 2018; 92
gonzales (ref38) 2017
ref9
ref4
ref3
ref6
ref5
ref40
ref34
ref36
garcía (ref31) 2007
(ref28) 1999; 25
ref2
ref1
ref24
ref23
ref26
ref25
ref22
ref21
mohamed (ref39) 2018; 20
ref27
ref29
fremgen (ref44) 2011
(ref30) 2001
nix (ref46) 2019
khelifi (ref7) 2018; 143
References_xml – year: 2016
  ident: ref37
  publication-title: Diffferential Equations and Boundary Value Problems
  contributor:
    fullname: edwards
– ident: ref6
  doi: 10.1016/j.sigpro.2017.07.034
– volume: 143
  start-page: 336
  year: 2018
  ident: ref7
  article-title: On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2017.09.020
  contributor:
    fullname: khelifi
– ident: ref40
  doi: 10.1002/j.1538-7305.1948.tb01338.x
– year: 2012
  ident: ref35
  publication-title: Contemporary Abstract Algebra
  contributor:
    fullname: gallian
– ident: ref19
  doi: 10.1109/TIFS.2010.2099114
– ident: ref8
  doi: 10.1016/j.sigpro.2017.06.028
– ident: ref12
  doi: 10.1016/j.ins.2014.11.018
– year: 2007
  ident: ref31
  article-title: Criptoanálisis para la modificación de los estándares DES y Triple DES
  contributor:
    fullname: garcía
– ident: ref11
  doi: 10.1016/j.cnsns.2010.01.041
– ident: ref41
  doi: 10.1016/j.optcom.2011.02.039
– ident: ref48
  doi: 10.1364/OL.38.001425
– volume: 25
  start-page: 1
  year: 1999
  ident: ref28
  article-title: 46-3. Data encryption standard DES
  publication-title: Nat Inst Standards Technol
– ident: ref47
  doi: 10.1016/j.adhoc.2018.10.027
– ident: ref24
  doi: 10.1007/s11042-013-1392-1
– ident: ref23
  doi: 10.1109/TIT.2012.2210752
– year: 2012
  ident: ref33
  publication-title: Differential Cryptanalysis of the Data Encryption Standard
  contributor:
    fullname: biham
– year: 2012
  ident: ref20
  article-title: NOM-151-SCFI-2002: Uso de la criptografía para la conservación de la información
  contributor:
    fullname: loza
– ident: ref17
  doi: 10.1007/s11277-015-2667-9
– ident: ref22
  doi: 10.1007/978-3-642-12035-0_33
– ident: ref3
  doi: 10.1109/MSP.2010.193
– start-page: 205
  year: 2017
  ident: ref42
  article-title: A quasigroup based synchronous stream cipher for lightweight applications
  publication-title: Proc Int Symp Secur Comput Commun
  doi: 10.1007/978-981-10-6898-0_17
  contributor:
    fullname: lakshmi
– start-page: 386
  year: 1993
  ident: ref32
  article-title: Linear cryptanalysis method for DES cipher
  publication-title: Proc Workshop Theory Appl Cryptograph Techn
  contributor:
    fullname: matsui
– ident: ref34
  doi: 10.1201/9781315282497
– ident: ref25
  doi: 10.1201/9780429492563
– volume: 20
  start-page: 1206
  year: 2018
  ident: ref39
  article-title: An improved AES S-box based on fibonacci numbers and prime factor
  publication-title: Int J Netw Secur
  contributor:
    fullname: mohamed
– ident: ref36
  doi: 10.1007/s11098-016-0667-6
– ident: ref21
  doi: 10.1016/j.optcom.2012.07.052
– ident: ref51
  doi: 10.1016/j.cnsns.2011.12.015
– year: 2013
  ident: ref15
  article-title: A statistical test suite for random and pseudorandom number generators for cryptographic applications
  contributor:
    fullname: rukhin
– year: 2017
  ident: ref38
  publication-title: Digital Image Processing
  contributor:
    fullname: gonzales
– year: 2001
  ident: ref30
  publication-title: Advanced encryption standard (AES) National Institute of Standards and Technology
– ident: ref43
  doi: 10.1007/978-3-319-16859-3_33
– year: 2019
  ident: ref46
  article-title: Cryptographic unit for public key infrastructure (PKI) operations
  contributor:
    fullname: nix
– ident: ref50
  doi: 10.1016/j.optlastec.2013.05.023
– ident: ref13
  doi: 10.1016/j.sigpro.2019.02.016
– ident: ref49
  doi: 10.1364/AOP.6.000120
– ident: ref2
  doi: 10.1016/j.ins.2018.12.048
– ident: ref4
  doi: 10.1088/2040-8978/16/2/025402
– ident: ref9
  doi: 10.1080/10511970.2017.1315474
– ident: ref52
  doi: 10.1016/j.optlaseng.2015.03.022
– ident: ref5
  doi: 10.1007/s11042-013-1699-y
– ident: ref1
  doi: 10.1016/j.optlastec.2019.02.009
– ident: ref10
  doi: 10.1201/9780429501906
– year: 2011
  ident: ref44
  publication-title: Probability and Statistics for Engineers and Scientists
  contributor:
    fullname: fremgen
– year: 2019
  ident: ref45
  article-title: Air traffic management blockchain infrastructure for security, authentication, and privacy
  contributor:
    fullname: reisman
– ident: ref29
  doi: 10.6028/NIST.SP.800-67r2
– ident: ref26
  doi: 10.1017/CBO9780511780448.011
– ident: ref18
  doi: 10.1109/TIFS.2013.2291625
– ident: ref27
  doi: 10.1093/acprof:oso/9780198507239.001.0001
– ident: ref14
  doi: 10.1007/s11042-018-7081-3
– volume: 92
  start-page: 1745
  year: 2018
  ident: ref16
  article-title: A novel hybrid encryption algorithm based on chaos and S-AES algorithm
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-018-4159-4
  contributor:
    fullname: çavu?o?lu
SSID ssj0000816957
Score 2.2436213
Snippet In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Publisher
StartPage 163729
SubjectTerms Algorithms
Chaos
Chi-square test
Computer systems
Cryptography
Data loss
discrete Fourier transform
Discrete Fourier transforms
Encryption
Fourier transforms
Goodness of fit
High resistance
image encryption
Nonlinear differential equations
Nonlinearity
Permutations
Randomness
Schedules
Statistical tests
Substitutes
transcendental numbers
Walsh function
SummonAdditionalLinks – databaseName: Directory of Open Access Journals
  dbid: DOA
  link: http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV05T8MwGLWgEwwIKIhAQR4YCc3hc2xDKxjahQ5slk8xQIpIi8S_x3bSqhIDC5uVREn8vvg7bOc9AG6tlYWzDqW6JCoNf1KlvOQuzZktdRlI9FWUTnim8xf2MAk0OVupr7AnrKUHboEbkoIWpCh4zgxGCmmppaIWlRojZ6g20ftmZKeYij6Y5YRj2tEM5RkfjqrK9yjs5eL3BcdF3Pe8E4oiY38nsfLLL8dgMz0GR12WCEft252APVufgsMd7sA-mI3gfPll3-AsakBDn3zCp3fvHeCk1p_f0RPAsY9RBvpG9SqXDZS1gTE46Sh86_NuOI-KIM0ZWEwni-ox7bQRUo0ytkotYwQrq4yjzslMa8x9okRJWKmU3gDMjyufqmgfjTkNS6XKo26Z1pk1hMryHPTqZW0vAMyRB9iE-VAjkTSlb0iiFGbWWZ4pl4C7DUrio2XAELFyyLhoQRUBVNGBmoBxQHJ7aaCvjge8UUVnVPGXURPQD3bY3oQxXyZinIDBxi6iG2qNCCdCEZfRy_949BU4CN1pZ1kGoLf6XNtrsN-Y9U38xH4AFozShA
  priority: 102
  providerName: Directory of Open Access Journals
Title A Novel Method for Image Encryption Based on Chaos and Transcendental Numbers
URI https://ieeexplore.ieee.org/document/8892455
https://www.proquest.com/docview/2455625907
https://doaj.org/article/6272622918d54b4cacab7e43c54fd7cd
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LThsxFL0isCkL2kIRARp5wTIDk5nx2F4mIaiVSjaw6M7y41pdwATlUal_j69nEkVqN91Z8_T4jH0fts8BuEE0RcBQZa6sbUY7qTJVqpCNJJauJBJ9m6QTnsT8p7yfEU3OcLcXBhHT4jO8pWKay_cLt6FU2Z2UMVrgvAc9oWS7V2uXTyEBCcVFRyw0ytXdeDqN30Crt9RtoXiRVjrvGZ_E0d-Jqvw1Eifz8vDx_yr2CU46N5KNW9w_wwE2p3C8Ry54Bo9jNl_8xhf2mESiWfRO2ffXOHywWeOWf9JQwSbRiHkWC9NfZrFipvEsWS-XlHGjY87mSTJk9QWeH2bP029ZJ56QuSqX6wylrLlF64MIweTOcRU9KVHTVKaJCMnY8aIv46K5VoLmUm2EBaVzOfpamPIcDptFgxfARpUoak8JU28q48tYMLW1XGJAldvQh-G2UfVbS5GhU2iRK91ioAkD3WHQhwk1_O5S4rdOB2KL6q676LqI7ywKNZKeV7ZyxhkrsCodr4IXzvfhjFDYPaQDoA_XWxh11xdXmk5QlJeLy3_fdQUfqIJtYuUaDtfLDX6F3spvBilEH8DR7Gly_2OQ_rh3wfjRzA
link.rule.ids 315,782,786,798,866,2106,4028,27642,27932,27933,27934,54767,54942
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LbhMxFL2i6QJY8CqIQAEvWHbayYw9tpdJmqoVSTbNgp3lx7VYwAQ1TaX-PdeOG1WCDTtrnh6fse_D9jkAXxFtEzHyyredq9JOqkq3OlYjha1vE4m-y9IJ13L5XZ3PEk3OyX4vDCLmxWd4mop5Lj-s_Talys6UomhBiAM4pKiGNwM4nF1Pzuf7nEoSkdBCFnKhUa3PxtMpfUdawaVPGy2avNr5kQHKPP1FWOWv0TibmIuX_1e5V_CiuJJsvMP-NTzB_g08f0QweASLMVuu7_AnW2ShaEYeKrv6RUMIm_X-5j4PF2xChiwwKkx_2PWG2T6wbMF8Vscl55wts2zI5i2sLmar6WVVBBQqz2t1W6FSnXDoQpQx2tp7ocmbkl2azrSEkqLOR_6MJ5OtZZpPdQQNKu9rDJ207TsY9Ose3wMbcdl0ISVNg-U2tFSwnXNCYURduziEk4dGNb93NBkmhxe1NjsMTMLAFAyGMEkNv780cVznA9SipnQZ0zX0zqbRIxUEd9xbb51E3nrBY5A-DOEoobB_SAFgCMcPMJrSHzcmnUiRXi0__PuuL_D0crWYm_nV8ttHeJYqu0u0HMPg9maLn-BgE7afyx_3B5fO064
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Method+for+Image+Encryption+Based+on+Chaos+and+Transcendental+Numbers&rft.jtitle=IEEE+access&rft.au=Silva+Garcia%2C+Victor+Manuel&rft.au=Gonzalez+Ramirez%2C+Marlon+David&rft.au=Carapia%2C+Rolando+Flores&rft.au=Vega-Alvarado%2C+Eduardo&rft.date=2019&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=7&rft.spage=163729&rft.epage=163739&rft_id=info:doi/10.1109%2FACCESS.2019.2952030&rft.externalDocID=8892455
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon