{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T18:55:42Z","timestamp":1722711342943},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1016\/j.jisa.2021.102811","type":"journal-article","created":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T23:39:32Z","timestamp":1625096372000},"page":"102811","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"special_numbering":"C","title":["Bottom-boosting differential evolution based digital image security analysis"],"prefix":"10.1016","volume":"61","author":[{"given":"D.","family":"Ghai","sequence":"first","affiliation":[]},{"given":"S.","family":"Tiwari","sequence":"additional","affiliation":[]},{"given":"N.N.","family":"Das","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2021.102811_b1","article-title":"A chaos based image encryption algorithm using rubik\u2019s cube and prime factorization process (CIERPF)","author":"Vidhya","year":"2020","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"10.1016\/j.jisa.2021.102811_b2","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","article-title":"A fast image encryption algorithm based on chaotic map","volume":"84","author":"Liu","year":"2016","journal-title":"Opt Lasers Eng"},{"issue":"23","key":"10.1016\/j.jisa.2021.102811_b3","doi-asserted-by":"crossref","first-page":"27873","DOI":"10.1364\/OE.21.027873","article-title":"An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism","volume":"21","author":"Chen","year":"2013","journal-title":"Opt Express"},{"issue":"1","key":"10.1016\/j.jisa.2021.102811_b4","doi-asserted-by":"crossref","DOI":"10.1088\/1674-1056\/26\/1\/010501","article-title":"A self-cited pixel summation based image encryption algorithm","volume":"26","author":"Ye","year":"2017","journal-title":"Chin Phys B"},{"issue":"7","key":"10.1016\/j.jisa.2021.102811_b5","doi-asserted-by":"crossref","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","article-title":"A novel image encryption algorithm based on a 3D chaotic map","volume":"17","author":"Kanso","year":"2012","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"10","key":"10.1016\/j.jisa.2021.102811_b6","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1080\/2150704X.2018.1500044","article-title":"Remote sensing image fusion using fuzzy logic and gyrator transform","volume":"9","author":"Singh","year":"2018","journal-title":"Remote Sens Lett"},{"issue":"2","key":"10.1016\/j.jisa.2021.102811_b7","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1049\/trit.2018.1045","article-title":"Convolutional neural network based detection and judgement of environmental obstacle in vehicle operation","volume":"4","author":"Qi","year":"2019","journal-title":"CAAI Trans Intell Technol"},{"key":"10.1016\/j.jisa.2021.102811_b8","first-page":"1","article-title":"Image dehazing using window-based integrated means filter","author":"Singh","year":"2019","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"10.1016\/j.jisa.2021.102811_b9","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1049\/trit.2019.0017","article-title":"Three-stage network for age estimation","volume":"4","author":"Tingting","year":"2019","journal-title":"CAAI Trans Intell Technol"},{"key":"10.1016\/j.jisa.2021.102811_b10","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/j.ins.2020.02.048","article-title":"Color image dehazing using gradient channel prior and guided L0 filter","volume":"521","author":"Kaur","year":"2020","journal-title":"Inform Sci","ISSN":"http:\/\/id.crossref.org\/issn\/0020-0255","issn-type":"print"},{"issue":"5","key":"10.1016\/j.jisa.2021.102811_b11","doi-asserted-by":"crossref","first-page":"1395","DOI":"10.1007\/s11831-018-9294-z","article-title":"A comprehensive review of computational dehazing techniques","volume":"26","author":"Singh","year":"2019","journal-title":"Arch Comput Methods Eng"},{"issue":"20","key":"10.1016\/j.jisa.2021.102811_b12","doi-asserted-by":"crossref","first-page":"27363","DOI":"10.1007\/s11042-018-5924-6","article-title":"Dehazing of outdoor images using notch based integral guided filter","volume":"77","author":"Singh","year":"2018","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"10.1016\/j.jisa.2021.102811_b13","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1049\/trit.2019.0028","article-title":"Deep learning approach for microarray cancer data classification","volume":"5","author":"Basavegowda","year":"2020","journal-title":"CAAI Trans Intell Technol"},{"issue":"12","key":"10.1016\/j.jisa.2021.102811_b14","doi-asserted-by":"crossref","first-page":"4276","DOI":"10.1007\/s10489-019-01504-6","article-title":"Single image dehazing using gradient channel prior","volume":"49","author":"Singh","year":"2019","journal-title":"Appl Intell"},{"key":"10.1016\/j.jisa.2021.102811_b15","first-page":"1","article-title":"Fusion of medical images using deep belief networks","author":"Kaur","year":"2019","journal-title":"Cluster Comput"},{"key":"10.1016\/j.jisa.2021.102811_b16","article-title":"Efficient prediction of drug-drug interaction using deep learning models","author":"Shukla","year":"2020","journal-title":"IET Syst Biol"},{"key":"10.1016\/j.jisa.2021.102811_b17","doi-asserted-by":"crossref","unstructured":"Wade MI, Chouikha M, Gill T, Patterson W, Washington TM, Zeng J. Distributed image encryption based on a homomorphic cryptographic approach. In: 2019 IEEE 10th annual ubiquitous computing, electronics mobile communication conference (UEMCON); 2019. p. 0686\u201396.","DOI":"10.1109\/UEMCON47517.2019.8993025"},{"key":"10.1016\/j.jisa.2021.102811_b18","doi-asserted-by":"crossref","unstructured":"Das R, Manna S, Dutta S. Cumulative image encryption approach based on user defined operation, character repositioning, text key and image key encryption technique and secret sharing scheme. In: 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI); 2017. p. 748\u201353.","DOI":"10.1109\/ICPCSI.2017.8391813"},{"key":"10.1016\/j.jisa.2021.102811_b19","doi-asserted-by":"crossref","unstructured":"Abdmouleh MK, Khalfallah A, Bouhlel MS. A novel selective encryption DWT-based algorithm for medical images. In: 2017 14th international conference on computer graphics, imaging and visualization; 2017. p. 79\u201384.","DOI":"10.1109\/CGiV.2017.10"},{"key":"10.1016\/j.jisa.2021.102811_b20","doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K, Mitra S, Mondal I, Dawn R, Das D, Chatterjee S. A dual layer image encryption using polymerase chain reaction amplification and DNA encryption. In: 2019 international conference on opto-electronics and applied optics (Optronix); 2019. p. 1\u20134.","DOI":"10.1109\/OPTRONIX.2019.8862350"},{"key":"10.1016\/j.jisa.2021.102811_b21","doi-asserted-by":"crossref","unstructured":"Jie F, Ping P, Zeyu G, Yingchi M. A meaningful visually secure image encryption scheme. In: 2019 IEEE fifth international conference on big data computing service and applications (BigDataService); 2019. p. 199\u2013204.","DOI":"10.1109\/BigDataService.2019.00034"},{"key":"10.1016\/j.jisa.2021.102811_b22","doi-asserted-by":"crossref","unstructured":"Jarin I, Fattah SA, Shahnaz C. Natural and medical image encryption using self-adaptive permutation and DNA encoding. In: 2018 IEEE international WIE conference on electrical and computer engineering (WIECON-ECE); 2018. p. 99\u2013102.","DOI":"10.1109\/WIECON-ECE.2018.8783074"},{"key":"10.1016\/j.jisa.2021.102811_b23","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlastec.2019.105818","article-title":"Evolutionary-based image encryption using RNA codons truth table","volume":"121","author":"Mahmud","year":"2020","journal-title":"Opt Laser Technol"},{"key":"10.1016\/j.jisa.2021.102811_b24","first-page":"1","article-title":"A Pareto-optimal evolutionary approach of image encryption using coupled map lattice and DNA","author":"Suri","year":"2019","journal-title":"Neural Comput Appl"},{"key":"10.1016\/j.jisa.2021.102811_b25","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.optlaseng.2018.05.009","article-title":"Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices","volume":"110","author":"Nematzadeh","year":"2018","journal-title":"Opt Lasers Eng"},{"key":"10.1016\/j.jisa.2021.102811_b26","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","article-title":"Chaos-based image encryption using a hybrid genetic algorithm and a dna sequence","volume":"56","author":"Enayatifar","year":"2014","journal-title":"Opt Lasers Eng"},{"key":"10.1016\/j.jisa.2021.102811_b27","series-title":"Artificial intelligence and evolutionary computations in engineering systems","first-page":"705","article-title":"An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm","author":"Shankar","year":"2016"},{"issue":"11","key":"10.1016\/j.jisa.2021.102811_b28","doi-asserted-by":"crossref","DOI":"10.1142\/S0218127418501328","article-title":"Beta chaotic map based image encryption using genetic algorithm","volume":"28","author":"Kaur","year":"2018","journal-title":"Int J Bifurcation Chaos"},{"issue":"7","key":"10.1016\/j.jisa.2021.102811_b29","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1049\/iet-ipr.2017.1016","article-title":"Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain","volume":"12","author":"Kaur","year":"2018","journal-title":"IET Image Process"},{"issue":"11","key":"10.1016\/j.jisa.2021.102811_b30","doi-asserted-by":"crossref","first-page":"7975","DOI":"10.1007\/s00521-018-3642-7","article-title":"Color image encryption approach based on memetic differential evolution","volume":"31","author":"Kaur","year":"2019","journal-title":"Neural Comput Appl"},{"issue":"12","key":"10.1016\/j.jisa.2021.102811_b31","doi-asserted-by":"crossref","first-page":"8127","DOI":"10.1007\/s13369-018-3355-3","article-title":"Adaptive differential evolution-based lorenz chaotic system for image encryption","volume":"43","author":"Kaur","year":"2018","journal-title":"Arab J Sci Eng"},{"key":"10.1016\/j.jisa.2021.102811_b32","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2020.164949","article-title":"Evolutionary-based image encryption using biomolecules operators and non-coupled map lattice","volume":"219","author":"Abbasi","year":"2020","journal-title":"Optik"},{"issue":"19","key":"10.1016\/j.jisa.2021.102811_b33","doi-asserted-by":"crossref","first-page":"25569","DOI":"10.1007\/s11042-018-5807-x","article-title":"Optimizing chaos based image encryption","volume":"77","author":"Noshadian","year":"2018","journal-title":"Multimedia Tools Appl"},{"issue":"6","key":"10.1016\/j.jisa.2021.102811_b34","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1049\/iet-ipr.2019.0587","article-title":"Parallel strength Pareto evolutionary algorithm-II based image encryption","volume":"14","author":"Kaur","year":"2019","journal-title":"IET Image Process"},{"issue":"09","key":"10.1016\/j.jisa.2021.102811_b35","doi-asserted-by":"crossref","DOI":"10.1142\/S0217984918501154","article-title":"Fourier\u2013Mellin moment-based intertwining map for image encryption","volume":"32","author":"Kaur","year":"2018","journal-title":"Modern Phys Lett B"},{"issue":"8","key":"10.1016\/j.jisa.2021.102811_b36","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1080\/13682199.2018.1505327","article-title":"Parallel non-dominated sorting genetic algorithm-II-based image encryption technique","volume":"66","author":"Kaur","year":"2018","journal-title":"J Imaging Sci"},{"key":"10.1016\/j.jisa.2021.102811_b37","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.future.2020.02.029","article-title":"Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map","volume":"107","author":"Kaur","year":"2020","journal-title":"Future Gener Comput Syst"},{"issue":"3","key":"10.1016\/j.jisa.2021.102811_b38","doi-asserted-by":"crossref","first-page":"1309","DOI":"10.1007\/s12652-019-01493-x","article-title":"An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps","volume":"11","author":"Gupta","year":"2020","journal-title":"J Amb Intell Hum Comput"},{"issue":"05","key":"10.1016\/j.jisa.2021.102811_b39","doi-asserted-by":"crossref","DOI":"10.1142\/S0218127418500578","article-title":"A new 7D hyperchaotic system with five positive Lyapunov exponents coined","volume":"28","author":"Yang","year":"2018","journal-title":"Int J Bifurcation Chaos"},{"issue":"1","key":"10.1016\/j.jisa.2021.102811_b40","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1504\/IJHM.2019.098951","article-title":"Analytical analysis of single-stage pressure relief valves","volume":"2","author":"Osterland","year":"2019","journal-title":"Int J Hydromechatron"},{"issue":"5","key":"10.1016\/j.jisa.2021.102811_b41","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TCYB.2017.2692963","article-title":"A new differential evolution algorithm for minimax optimization in robust design","volume":"48","author":"Qiu","year":"2017","journal-title":"IEEE Trans Cybern"},{"issue":"3","key":"10.1016\/j.jisa.2021.102811_b42","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1504\/IJHM.2019.102893","article-title":"Study on the dynamic and static characteristics of gas static thrust bearing with micro-hole restrictors","volume":"2","author":"Wang","year":"2019","journal-title":"Int J Hydromechatron"},{"issue":"1","key":"10.1016\/j.jisa.2021.102811_b43","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1504\/IJHM.2019.098949","article-title":"Engine speed reduction for hydraulic machinery using predictive algorithms","volume":"2","author":"Wiens","year":"2019","journal-title":"Int J Hydromechatron"},{"key":"10.1016\/j.jisa.2021.102811_b44","doi-asserted-by":"crossref","first-page":"2195","DOI":"10.1007\/s00521-017-3181-7","article-title":"Multi-objective particle swarm optimization-based adaptive neuro-fuzzy inference system for benzene monitoring","volume":"31","author":"Pannu","year":"2019","journal-title":"Neural Comput Appl"},{"issue":"5","key":"10.1016\/j.jisa.2021.102811_b45","doi-asserted-by":"crossref","DOI":"10.1002\/clen.201700162","article-title":"Improved particle swarm optimization based adaptive neuro-fuzzy inference system for benzene detection","volume":"46","author":"Pannu","year":"2018","journal-title":"CLEAN\u2013Soil, Air, Water"},{"issue":"05","key":"10.1016\/j.jisa.2021.102811_b46","doi-asserted-by":"crossref","DOI":"10.1142\/S0217984919500222","article-title":"Multi-objective differential evolution based random forest for e-health applications","volume":"33","author":"Kaur","year":"2019","journal-title":"Modern Phys Lett B"},{"key":"10.1016\/j.jisa.2021.102811_b47","article-title":"A light weight secure image encryption scheme based on chaos & DNA computing","author":"Mondal","year":"2016","journal-title":"J King Saud Univ - Comput Inf Sci"},{"issue":"4","key":"10.1016\/j.jisa.2021.102811_b48","doi-asserted-by":"crossref","first-page":"2282","DOI":"10.1016\/j.ijleo.2015.11.064","article-title":"Fast digital image encryption based on compressive sensing using structurally random matrices and arnold transform technique","volume":"127","author":"Rawat","year":"2016","journal-title":"Optik"},{"key":"10.1016\/j.jisa.2021.102811_b49","doi-asserted-by":"crossref","DOI":"10.1049\/iet-ipr.2017.1016","article-title":"Color image encryption technique using differential evolution in nonsubsampled contourlet transform domain","author":"Kaur","year":"2018","journal-title":"IET Image Process"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S221421262100051X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S221421262100051X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T16:26:42Z","timestamp":1683044802000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S221421262100051X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":49,"alternative-id":["S221421262100051X"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2021.102811","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2021,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Bottom-boosting differential evolution based digital image security analysis","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2021.102811","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"102811"}}