{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T04:05:51Z","timestamp":1727064351051},"reference-count":77,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant","no",". 41571417, U1604145, 61802111, and 61872125"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1016\/j.sigpro.2018.09.029","type":"journal-article","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T20:14:46Z","timestamp":1537474486000},"page":"44-62","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":452,"special_numbering":"C","title":["A color image cryptosystem based on dynamic DNA encryption and chaos"],"prefix":"10.1016","volume":"155","author":[{"given":"Xiuli","family":"Chai","sequence":"first","affiliation":[]},{"given":"Xianglong","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4066-0826","authenticated-orcid":false,"given":"Yang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yiran","family":"Chen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.sigpro.2018.09.029_bib0001","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s11071-018-4056-x","article-title":"Brief review on application of nonlinear dynamics in image encryption","volume":"92","author":"Ozkaynak","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0002","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.asoc.2014.05.025","article-title":"A block chaotic image encryption scheme based on self-adaptive modelling","volume":"22","author":"Ye","year":"2014","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0003","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.sigpro.2018.04.014","article-title":"A compression-diffusion-permutation strategy for securing image","volume":"150","author":"Huang","year":"2018","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0004","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","article-title":"A new 1D chaotic system for image encryption","volume":"97","author":"Zhou","year":"2014","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0005","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.sigpro.2017.06.010","article-title":"An image encryption scheme based on elliptic curve pseudo random and advanced encryption system","volume":"141","author":"Toughi","year":"2017","journal-title":"Signal Process."},{"issue":"9","key":"10.1016\/j.sigpro.2018.09.029_bib0006","doi-asserted-by":"crossref","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","article-title":"Cascade chaotic system with applications","volume":"45","author":"Zhou","year":"2015","journal-title":"IEEE T. Cybern."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0007","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","article-title":"Image encryption using 2D Logistic-adjusted-Sine map","volume":"339","author":"Hua","year":"2016","journal-title":"Inf. Sci."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0008","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","article-title":"The unified image encryption algorithm based on chaos and cubic S-box","volume":"450","author":"Zhang","year":"2018","journal-title":"Inf. Sci."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0009","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.sigpro.2015.07.008","article-title":"Cracking a hierarchical chaotic image encryption algorithm based on permutation","volume":"118","author":"Li","year":"2016","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0010","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2014.08.010","article-title":"Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains","volume":"66","author":"Chen","year":"2015","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0011","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MMUL.2017.3051512","article-title":"Cryptanalyzing an image-scrambling encryption algorithm of pixel bits","volume":"24","author":"Li","year":"2017","journal-title":"IEEE Multimed."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0012","doi-asserted-by":"crossref","DOI":"10.1109\/MMUL.2018.2873472","article-title":"Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography","author":"Li","year":"2018","journal-title":"IEEE Multimed."},{"issue":"13","key":"10.1016\/j.sigpro.2018.09.029_bib0013","doi-asserted-by":"crossref","DOI":"10.1142\/S0218127415501886","article-title":"Deciphering an image cipher based on mixed transformed logistic maps","volume":"25","author":"Liu","year":"2015","journal-title":"Int. J. Bifur. Chaos"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0014","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","article-title":"Image encryption using DNA complementary rule and chaotic maps","volume":"12","author":"Liu","year":"2012","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0015","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.image.2016.12.007","article-title":"An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations","volume":"52","author":"Chai","year":"2017","journal-title":"Signal Process. Image"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0016","doi-asserted-by":"crossref","DOI":"10.1142\/S0218127417501711","article-title":"Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations","volume":"27","author":"Liu","year":"2017","journal-title":"Int. J. Bifurcation chaos."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0017","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","article-title":"Color image encryption based on hybrid hyper-chaotic system and cellular automata","volume":"90","author":"Niyat","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0018","doi-asserted-by":"crossref","first-page":"5455","DOI":"10.1007\/s11042-015-2515-7","article-title":"A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps","volume":"75","author":"Jain","year":"2016","journal-title":"Multimed Tools Appl."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0019","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s11047-012-9334-9","article-title":"A novel text and image encryption method based on chaos theory and DNA computing","volume":"12","author":"Babaei","year":"2013","journal-title":"Nat Comput."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0020","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.aeue.2013.08.007","article-title":"Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps","volume":"68","author":"Zhang","year":"2014","journal-title":"AEU-Int. J. Electron C."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0021","doi-asserted-by":"crossref","unstructured":"Wang X J, Li P, Zhang Y Q, Liu L Y, Zhang H Z, Wang X K. A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed Tools Appl. 2017, doi:10.1007\/s11042-017-4534-z.","DOI":"10.1007\/s11042-017-4534-z"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0022","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","article-title":"A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2","volume":"83","author":"Guesmi","year":"2016","journal-title":"Nonlinera Dyn."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0023","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","article-title":"An image encryption algorithm based on hyper-chaos and DNA sequence","volume":"72","author":"Huang","year":"2014","journal-title":"Multimed Tools Appl."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0024","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","article-title":"Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence","volume":"56","author":"Enayatifar","year":"2014","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0025","doi-asserted-by":"crossref","first-page":"6229","DOI":"10.1007\/s11042-016-3311-8","article-title":"A novel and effective image encryption algorithm based on chaos and DNA encoding","volume":"76","author":"Wang","year":"2017","journal-title":"Multimed Tools Appl."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0026","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.sigpro.2017.11.005","article-title":"Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map","volume":"144","author":"Wang","year":"2018","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0027","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","article-title":"A new color image encryption using combination of the 1D chaotic map","volume":"138","author":"Pak","year":"2017","journal-title":"Signal Process"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0028","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.optlaseng.2016.02.002","article-title":"An image encryption scheme based on the MLNCML system using DNA sequences","volume":"82","author":"Zhang","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0029","series-title":"Proceedigns of the IEEE International Conference","first-page":"108","article-title":"A colour image encryption based on DNA coding and chaotic sequences","author":"Som","year":"2013"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0030","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","article-title":"A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps","volume":"37","author":"Wu","year":"2015","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0031","doi-asserted-by":"crossref","first-page":"17157","DOI":"10.1007\/s11042-015-2982-x","article-title":"An image encryption scheme based on DNA coding and permutation of hyper-image","volume":"75","author":"Zhang","year":"2016","journal-title":"Multimed Tools Appl."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0032","doi-asserted-by":"crossref","first-page":"6276","DOI":"10.1016\/j.ijleo.2013.05.009","article-title":"A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system","volume":"124","author":"Zhang","year":"2013","journal-title":"Optik"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0033","doi-asserted-by":"crossref","first-page":"13681","DOI":"10.1007\/s11042-016-3769-4","article-title":"An image encryption algorithm based on DNA sequence operations and cellular neural network","volume":"76","author":"Norouzi","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0034","doi-asserted-by":"crossref","first-page":"5455","DOI":"10.1007\/s11042-015-2515-7","article-title":"A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps","volume":"75","author":"Jain","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0035","article-title":"A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations","volume":"26","author":"Zhang","year":"2017","journal-title":"Chin. Phys. B"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0036","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","article-title":"A novel chaotic image encryption scheme using DNA sequence operations","volume":"73","author":"Wang","year":"2015","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0037","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.ins.2014.08.005","article-title":"On the security of symmetric ciphers based on DNA coding","volume":"289","author":"Zhang","year":"2014","journal-title":"Inf Sci."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0038","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1007\/s11071-017-3698-4","article-title":"Lossless chaotic color image cryptosystem based on DNA encryption and entropy","volume":"90","author":"Wu","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0039","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.sigpro.2016.12.008","article-title":"Chaotic image cryptosystem using DNA deletion and DNA insertion","volume":"134","author":"Ting","year":"2017","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0040","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","article-title":"Color image DNA encryption using NCA map-based CML and one-time keys","volume":"148","author":"Wu","year":"2018","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0041","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","article-title":"Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption","volume":"142","author":"Chen","year":"2018","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0042","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","article-title":"A novel chaos-based image encryption algorithm using DNA sequence operations","volume":"88","author":"Chai","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0043","doi-asserted-by":"crossref","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","article-title":"A novel image fusion encryption algorithm based on DNA sequence operation and hyperchaotic system","volume":"124","author":"Zhang","year":"2013","journal-title":"Opt. Int. J. Light Electron. Opt."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0044","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.ijleo.2014.08.129","article-title":"Cryptanalysis of a novel image fusion encryption algorithm based on DNA sequence operation and hyperchaotic system","volume":"126","author":"Zhang","year":"2015","journal-title":"Opt. Int. J. Light Electron. Opt."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0045","series-title":"Proceedings of the Signal Processing and Communications Applications Conference (SIU)","first-page":"1","article-title":"Security analysis of an image encryption algorithm based on chaos and DNA encoding","author":"Ozkaynak","year":"2013"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0046","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.optlastec.2014.01.015","article-title":"Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map","volume":"60","author":"Liu","year":"2014","journal-title":"Opt. Laser Technol."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0047","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","article-title":"A RGB image encryption algorithm based on DNA encoding and chaos map","volume":"38","author":"Liu","year":"2012","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0048","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.optlastec.2017.04.022","article-title":"Cryptanalysis of an image encryption algorithm based on DNA encoding","volume":"95","author":"Akhavan","year":"2017","journal-title":"Opt. Laser Technol."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0049","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.sigpro.2016.01.017","article-title":"A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography","volume":"125","author":"Kumar","year":"2016","journal-title":"Signal Process"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0050","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1016\/j.ijleo.2017.08.050","article-title":"Cryptanalysis of a DNA and chaos based image encryption algorithm","volume":"145","author":"Dou","year":"2017","journal-title":"Optik"},{"issue":"12","key":"10.1016\/j.sigpro.2018.09.029_bib0051","first-page":"36","article-title":"Novel four-wing hyper-chaos system and its application in image encryption","volume":"53","author":"Zhan","year":"2017","journal-title":"Comput. Eng. Appl."},{"year":"2010","series-title":"SP 800-22 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications, Technical report sp800-22","author":"Bassham","key":"10.1016\/j.sigpro.2018.09.029_bib0052"},{"issue":"4356","key":"10.1016\/j.sigpro.2018.09.029_bib0053","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1038\/171737a0","article-title":"A structure for deoxyribose nucleic acid","volume":"171","author":"Watson","year":"1953","journal-title":"Nature"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0054","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"\u00c0lvarez","year":"2006","journal-title":"Int. J. Bifur. Chaos"},{"issue":"4","key":"10.1016\/j.sigpro.2018.09.029_bib0055","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1007\/s11042-014-2372-9","article-title":"A chaos-based image encryption scheme using 2D rectangulartransform and dependent substitution","volume":"75","author":"Zhang","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0056","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.optcom.2014.10.021","article-title":"A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise","volume":"338","author":"Liu","year":"2015","journal-title":"Opt. Commun."},{"issue":"8","key":"10.1016\/j.sigpro.2018.09.029_bib0057","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.image.2014.06.012","article-title":"Chaotic image encryption based on circular substitution box and key stream buffer","volume":"29","author":"Zhang","year":"2014","journal-title":"Signal Process. Image"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0058","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1016\/j.ijleo.2018.01.064","article-title":"A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2","volume":"159","author":"Rehman","year":"2018","journal-title":"Optik"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0059","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","article-title":"A symmetric image encryption algorithm based on mixed linear- nonlinear coupled map lattice","volume":"273","author":"Zhang","year":"2014","journal-title":"Inf. Sci."},{"issue":"10","key":"10.1016\/j.sigpro.2018.09.029_bib0060","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1088\/1674-1056\/25\/10\/100503","article-title":"A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristivehyperchaotic system","volume":"25","author":"Chai","year":"2016","journal-title":"Chin. Phys. B"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0061","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.optlaseng.2016.06.006","article-title":"An asymmetric color image encryption method by using deduced gyrator transform","volume":"89","author":"Yao","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0062","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.sigpro.2017.04.006","article-title":"Color image encryption based on chaotic systems and elliptic curve ElGamal scheme","volume":"141","author":"Wu","year":"2017","journal-title":"Signal Process."},{"issue":"4","key":"10.1016\/j.sigpro.2018.09.029_bib0063","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.aeue.2013.10.002","article-title":"Self adaptive permutation and combined global diffusion for chaotic color image encryption","volume":"68","author":"Zhang","year":"2014","journal-title":"AEU-Int. J. Electron C."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0064","doi-asserted-by":"crossref","first-page":"2123","DOI":"10.1016\/j.optcom.2009.02.044","article-title":"Multi chaotic systems based pixel shuffle for image encryption","volume":"282","author":"Huang","year":"2009","journal-title":"Opt. Commun."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0065","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.sigpro.2015.01.016","article-title":"Asymmetric color image encryption scheme using 2D discrete-timemap","volume":"113","author":"Liu","year":"2015","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0066","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1016\/j.image.2013.09.006","article-title":"Color image encryption using one-time keys and coupled chaotic systems","volume":"29","author":"Dong","year":"2014","journal-title":"Signal Process. Image"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0067","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","author":"Wu","year":"2011","journal-title":"Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0068","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1109\/TNB.2017.2780881","article-title":"DNA chaos blend to secure medical privacy","volume":"16","author":"Ravichandran","year":"2017","journal-title":"IEEE Trans. Nanobiosci."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0069","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.biosystems.2016.03.011","article-title":"Color image encryption scheme using CML and DNA sequence operations","volume":"144","author":"Wang X","year":"2016","journal-title":"BioSystems"},{"key":"10.1016\/j.sigpro.2018.09.029_bib0070","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.ijleo.2016.10.036","article-title":"Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections","volume":"129","author":"Kadir","year":"2017","journal-title":"Opt. Int. J. Light Electron. Opt."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0071","doi-asserted-by":"crossref","first-page":"5703","DOI":"10.1016\/j.ijleo.2015.09.091","article-title":"An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos","volume":"126","author":"Kalpana","year":"2015","journal-title":"Opt. Int. J. Light Electron. Opt."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0072","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1007\/s11042-011-0775-4","article-title":"Combination domain encryption for still visual data","volume":"59","author":"Taneja","year":"2012","journal-title":"Multimed Tool Appl."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0073","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s00530-013-0314-4","article-title":"A novel image encryption based on hash function with only two-round diffusion process","volume":"20","author":"Norouzi","year":"2013","journal-title":"Mutimedia Syst."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0074","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","article-title":"A fast color image encryption algorithm based on hyper-chaotic systems","volume":"78","author":"Norouzi","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0075","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.4304\/jcp.4.11.1091-1100","article-title":"An improved image encryption algorithm based on chaotic system","volume":"4","author":"Liu","year":"2009","journal-title":"J. Comput."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0076","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","article-title":"Image encryption using DNA addition combining with chaotic maps","volume":"52","author":"Zhang","year":"2010","journal-title":"Math. Comput. Model."},{"key":"10.1016\/j.sigpro.2018.09.029_bib0077","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","article-title":"A novel image encryption scheme based on substitution-permutation network and chaos","volume":"128","author":"Belazi","year":"2016","journal-title":"Signal Process."}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016516841830313X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016516841830313X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T07:58:39Z","timestamp":1541491119000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016516841830313X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":77,"alternative-id":["S016516841830313X"],"URL":"https:\/\/doi.org\/10.1016\/j.sigpro.2018.09.029","relation":{},"ISSN":["0165-1684"],"issn-type":[{"type":"print","value":"0165-1684"}],"subject":[],"published":{"date-parts":[[2019,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A color image cryptosystem based on dynamic DNA encryption and chaos","name":"articletitle","label":"Article Title"},{"value":"Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sigpro.2018.09.029","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}