{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:50:39Z","timestamp":1744195839145},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/100009122","name":"Ministry of Higher Education and Scientific Research","doi-asserted-by":"publisher","award":["4-13 A1"],"id":[{"id":"10.13039\/100009122","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1016\/j.sigpro.2016.03.021","type":"journal-article","created":{"date-parts":[[2016,4,5]],"date-time":"2016-04-05T22:18:13Z","timestamp":1459894693000},"page":"155-170","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":414,"special_numbering":"C","title":["A novel image encryption scheme based on substitution-permutation network and chaos"],"prefix":"10.1016","volume":"128","author":[{"given":"Akram","family":"Belazi","sequence":"first","affiliation":[]},{"given":"Ahmed A.","family":"Abd El-Latif","sequence":"additional","affiliation":[]},{"given":"Safya","family":"Belghith","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.sigpro.2016.03.021_bib1","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","article-title":"A novel colour image encryption algorithm based on chaos","volume":"92","author":"Wang","year":"2012","journal-title":"Signal Process."},{"issue":"16\u201317","key":"10.1016\/j.sigpro.2016.03.021_bib2","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","article-title":"Color image encryption using spatial bit-level permutation and high-dimension chaotic system","volume":"284","author":"Liu","year":"2011","journal-title":"Opt. Commun."},{"key":"10.1016\/j.sigpro.2016.03.021_bib3","doi-asserted-by":"crossref","first-page":"3527","DOI":"10.1016\/j.ijleo.2012.10.068","article-title":"Color image encryption using Choquet fuzzy integral and hyper chaotic system","volume":"124","author":"Liu","year":"2013","journal-title":"Opt. \u2013 Int. J. Light Electron Opt."},{"key":"10.1016\/j.sigpro.2016.03.021_bib4","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","article-title":"A new 1D chaotic system for image encryption","volume":"97","author":"Zhou","year":"2014","journal-title":"Signal Process."},{"issue":"7","key":"10.1016\/j.sigpro.2016.03.021_bib5","doi-asserted-by":"crossref","first-page":"676","DOI":"10.1016\/j.aeue.2014.02.002","article-title":"Chaos-based color image block encryption scheme using S-box","volume":"68","author":"Liu","year":"2014","journal-title":"AEU \u2013 Int. J. Electron. Commun."},{"key":"10.1016\/j.sigpro.2016.03.021_bib6","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/j.sigpro.2014.06.020","article-title":"Image encryption based on non-affine and balanced cellular automata","volume":"105","author":"Ping","year":"2014","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2016.03.021_bib7","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","article-title":"A novel chaotic block image encryption algorithm based on dynamic random growth technique","volume":"66","author":"Wang","year":"2015","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2016.03.021_bib8","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","article-title":"2D sine logistic modulation map for image encryption","volume":"297","author":"Hua","year":"2015","journal-title":"Inf. Sci."},{"issue":"10","key":"10.1016\/j.sigpro.2016.03.021_bib9","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","article-title":"Color image encryption based on one-time keys and robust chaotic maps","volume":"59","author":"Liu","year":"2010","journal-title":"Comput. Math. Appl."},{"key":"10.1016\/j.sigpro.2016.03.021_bib10","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.sigpro.2014.10.033","article-title":"A RGB image encryption algorithm based on total plain image characteristics and chaos","volume":"109","author":"Murillo-Escobar","year":"2015","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2016.03.021_bib11","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.sigpro.2015.01.003","article-title":"Reusing the permutation matrix dynamically for efficient image cryptographic algorithm","volume":"111","author":"Chen","year":"2015","journal-title":"Signal Process."},{"issue":"8","key":"10.1016\/j.sigpro.2016.03.021_bib12","first-page":"914","article-title":"Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem","volume":"29","author":"Li","year":"2014","journal-title":"Signal Process.: Image Commun."},{"issue":"19","key":"10.1016\/j.sigpro.2016.03.021_bib13","doi-asserted-by":"crossref","first-page":"5560","DOI":"10.1016\/j.ijleo.2014.07.009","article-title":"Comments on \u201cColor image encryption using Choquet fuzzy integral and hyper chaotic system\u201d","volume":"12","author":"Zhang","year":"2014","journal-title":"Opt. \u2013 Int. J. Light Electron Opt."},{"key":"10.1016\/j.sigpro.2016.03.021_bib14","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.dsp.2014.05.011","article-title":"Comments on the security of \u201cDiffusion \u2013 substitution based gray image encryption\u201d scheme","volume":"32","author":"Jolfaei","year":"2014","journal-title":"Digit. Signal Process."},{"key":"10.1016\/j.sigpro.2016.03.021_bib15","first-page":"45","article-title":"Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes","volume":"34","author":"Jeng","year":"2015","journal-title":"Signal Process.: Image Commun."},{"issue":"4","key":"10.1016\/j.sigpro.2016.03.021_bib16","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s11071-014-1263-y","article-title":"Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map","volume":"76","author":"Belazi","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.sigpro.2016.03.021_bib17","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.sigpro.2015.07.008","article-title":"Cracking a hierarchical chaotic image encryption algorithm based on permutation","volume":"118","author":"Li","year":"2016","journal-title":"Signal Process."},{"issue":"1","key":"10.1016\/j.sigpro.2016.03.021_bib18","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11071-012-0646-1","article-title":"An efficient approach for the construction of LFT S-boxes using chaotic logistic map","volume":"71","author":"Hussain","year":"2013","journal-title":"Nonlinear Dyn."},{"issue":"8","key":"10.1016\/j.sigpro.2016.03.021_bib19","doi-asserted-by":"crossref","first-page":"3113","DOI":"10.1016\/j.jfranklin.2015.03.028","article-title":"A discrete-time chaotic oscillator based on the logistic map: a secure communication scheme and a simple experiment using Arduino","volume":"352","author":"Acho","year":"2015","journal-title":"J. Frankl. Inst."},{"key":"10.1016\/j.sigpro.2016.03.021_bib20","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.physa.2014.01.051","article-title":"Spatiotemporal chaos in mixed linear\u2013nonlinear coupled logistic map lattice","volume":"402","author":"Zhang","year":"2014","journal-title":"Phys. A: Stat. Mech. Appl."},{"key":"10.1016\/j.sigpro.2016.03.021_bib21","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.jss.2014.08.066","article-title":"A new chaotic map based image encryption schemes for several image formats","volume":"98","author":"Zhang","year":"2014","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.sigpro.2016.03.021_bib22","unstructured":"\u3008http:\/\/sipi.usc.edu\/database\/\u3009."},{"key":"10.1016\/j.sigpro.2016.03.021_bib23","unstructured":"\u3008http:\/\/www.cs.cmu.edu\/~cil\/v-images.html\u3009."},{"key":"10.1016\/j.sigpro.2016.03.021_bib24","unstructured":"IEEE Task P754, IEEE 754\u20132008, Standard for Floating-Point Arithmetic, 2008."},{"issue":"1","key":"10.1016\/j.sigpro.2016.03.021_bib25","doi-asserted-by":"crossref","DOI":"10.1117\/1.3360179","article-title":"Efficient modified RC5 based on Chaos adapted to image encryption","volume":"19","author":"Amin","year":"2010","journal-title":"J. Electron. Imaging"},{"key":"10.1016\/j.sigpro.2016.03.021_bib26","first-page":"241","article-title":"Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms","volume":"5","author":"El-Fishawy","year":"2007","journal-title":"Int. J. Netw. Secur."},{"issue":"2","key":"10.1016\/j.sigpro.2016.03.021_bib27","first-page":"67","article-title":"Digital image encryption based on multiple chaotic systems, sensing and imaging","volume":"13","author":"Abd El-Latif","year":"2012","journal-title":"Int. J."},{"key":"10.1016\/j.sigpro.2016.03.021_bib28","article-title":"Multimedia content encryption: techniques and applications","author":"Lian","year":"2008","journal-title":"Auerb. Publ."},{"key":"10.1016\/j.sigpro.2016.03.021_bib29","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/j.camwa.2009.12.033","article-title":"Chaos-based secure satellite imagery cryptosystem","volume":"60","author":"Usamaa","year":"2010","journal-title":"Comput. Math. Appl."},{"key":"10.1016\/j.sigpro.2016.03.021_bib30","doi-asserted-by":"crossref","unstructured":"H.M. Elkamchouchi, M.A. Mskar, Measuring encryption quality for bitmap images encrypted with Rijndael and KAMKAR block ciphers, in:Proceedings of the Twenty Second National Radio Science Conference (NRSC), Cairo Egypt, 2005.","DOI":"10.1109\/NRSC.2005.194011"},{"key":"10.1016\/j.sigpro.2016.03.021_bib31","first-page":"193","article-title":"A new method for encrypting images with few details using Rijndael and RC6 block ciphers in the electronic code book mode","volume":"21","author":"Elashry","year":"2012","journal-title":"Inf. Secur. J.: Glob. Perspect."},{"issue":"3","key":"10.1016\/j.sigpro.2016.03.021_bib32","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","article-title":"A chaotic image encryption algorithm based on perceptron model","volume":"62","author":"Wang","year":"2010","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.sigpro.2016.03.021_bib33","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.asoc.2014.09.039","article-title":"A new image encryption algorithm based on non-adjacent coupled map lattices","volume":"26","author":"Zhang","year":"2015","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.sigpro.2016.03.021_bib34","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","article-title":"A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice","volume":"273","author":"Zhang","year":"2014","journal-title":"Inf. Sci."}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168416300147?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168416300147?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T01:32:51Z","timestamp":1572658371000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165168416300147"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":34,"alternative-id":["S0165168416300147"],"URL":"https:\/\/doi.org\/10.1016\/j.sigpro.2016.03.021","relation":{},"ISSN":["0165-1684"],"issn-type":[{"value":"0165-1684","type":"print"}],"subject":[],"published":{"date-parts":[[2016,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A novel image encryption scheme based on substitution-permutation network and chaos","name":"articletitle","label":"Article Title"},{"value":"Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sigpro.2016.03.021","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}