{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T13:35:57Z","timestamp":1744724157279,"version":"3.37.3"},"reference-count":80,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100007831","name":"University of Tabriz","doi-asserted-by":"publisher","award":["S\/819"],"id":[{"id":"10.13039\/501100007831","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1016\/j.sigpro.2018.11.010","type":"journal-article","created":{"date-parts":[[2018,11,14]],"date-time":"2018-11-14T11:55:08Z","timestamp":1542196508000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":90,"special_numbering":"C","title":["A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation"],"prefix":"10.1016","volume":"157","author":[{"given":"Meysam","family":"Asgari-Chenaghlu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5898-0871","authenticated-orcid":false,"given":"Mohammad-Ali","family":"Balafar","sequence":"additional","affiliation":[]},{"given":"Mohammad-Reza","family":"Feizi-Derakhshi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2011","series-title":"Network Security Essentials: Applications and Standards","author":"Stallings","key":"10.1016\/j.sigpro.2018.11.010_bib0001"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0002","first-page":"1","article-title":"AES proposal: Rijndael","author":"Daemen","year":"1999","journal-title":"Complexity"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0003","first-page":"344","article-title":"Biclique Cryptanalysis of the Full AES","volume":"7073","author":"Bogdanov","year":"2011"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0004","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","article-title":"Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation","volume":"142","author":"Wu","year":"2018","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.11.010_bib0005","doi-asserted-by":"crossref","unstructured":"C. Li, B. Feng, J. L\u00fc, Cryptanalysis of a chaotic image encryption algorithm based on information entropy, arXiv:1803.10024 (2018).","DOI":"10.1109\/ACCESS.2018.2883690"},{"issue":"38","key":"10.1016\/j.sigpro.2018.11.010_bib0006","doi-asserted-by":"crossref","first-page":"5973","DOI":"10.1016\/j.physleta.2008.07.057","article-title":"Cryptanalysis of a new image encryption algorithm based on hyper-chaos","volume":"372","author":"Rhouma","year":"2008","journal-title":"Phys. Lett. A"},{"issue":"7","key":"10.1016\/j.sigpro.2018.11.010_bib0007","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1016\/j.cnsns.2009.07.007","article-title":"Cryptanalysis of a new substitution\u2013diffusion based image cipher","volume":"15","author":"Rhouma","year":"2010","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"15","key":"10.1016\/j.sigpro.2018.11.010_bib0008","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1016\/j.physleta.2009.02.030","article-title":"Cryptanalysis of a chaos-based image encryption algorithm","volume":"373","author":"Cokal","year":"2009","journal-title":"Phys. Lett. A"},{"issue":"5","key":"10.1016\/j.sigpro.2018.11.010_bib0009","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1016\/j.chaos.2007.10.009","article-title":"Analysis and improvement of a chaos-based image encryption algorithm","volume":"40","author":"Xiao","year":"2009","journal-title":"Chaos Solit. Fract."},{"issue":"08","key":"10.1016\/j.sigpro.2018.11.010_bib0010","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"Alvarez","year":"2006","journal-title":"Int. J. Bifurcation Chaos"},{"issue":"2\u20134","key":"10.1016\/j.sigpro.2018.11.010_bib0011","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1016\/j.physa.2005.01.001","article-title":"Security analysis of a chaos-based image encryption algorithm","volume":"351","author":"Lian","year":"2005","journal-title":"Physica A"},{"issue":"2","key":"10.1016\/j.sigpro.2018.11.010_bib0012","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1109\/TCSI.2002.808207","article-title":"Chosen ciphertext attack on chaos communication based on chaotic synchronization","volume":"50","author":"Guojie","year":"2003","journal-title":"IEEE Trans. Circuits Syst. I"},{"issue":"4","key":"10.1016\/j.sigpro.2018.11.010_bib0013","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1007\/s11071-013-0750-x","article-title":"Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack","volume":"72","author":"Zhang","year":"2013","journal-title":"Nonlinear Dyn."},{"issue":"2","key":"10.1016\/j.sigpro.2018.11.010_bib0014","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1016\/j.cnsns.2010.05.017","article-title":"Cryptanalysis of a chaos-based cryptosystem on DSP","volume":"16","author":"Rhouma","year":"2011","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"1\u20132","key":"10.1016\/j.sigpro.2018.11.010_bib0015","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1007\/s11071-013-0832-9","article-title":"Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos","volume":"73","author":"Wang","year":"2013","journal-title":"Nonlinear Dyn."},{"issue":"15","key":"10.1016\/j.sigpro.2018.11.010_bib0016","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1016\/j.physleta.2009.02.030","article-title":"Cryptanalysis of a chaos-based image encryption algorithm","volume":"373","author":"\u00c7okal","year":"2009","journal-title":"Phys. Lett. Sect. A"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0017","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"534","article-title":"Security flaws induced by cbc paddingapplications to ssl, ipsec, wtls...","author":"Vaudenay","year":"2002"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0018","series-title":"Annual International Cryptology Conference","first-page":"230","article-title":"A chosen ciphertext attack on rsa optimal asymmetric encryption padding (oaep) as standardized in pkcs# 1 v2. 0","author":"Manger","year":"2001"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0019","series-title":"ICALIP 2008 - 2008 International Conference on Audio, Language and Image Processing, Proceedings","first-page":"889","article-title":"A new chaotic algorithm for image encryption","author":"Zhang","year":"2008"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0020","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","article-title":"A new 1D chaotic system for image encryption","volume":"97","author":"Zhou","year":"2014","journal-title":"Signal Process."},{"issue":"4","key":"10.1016\/j.sigpro.2018.11.010_bib0021","doi-asserted-by":"crossref","first-page":"2411","DOI":"10.1007\/s11071-011-0155-7","article-title":"Image encryption algorithm using chaotic chebyshev generator","volume":"67","author":"Huang","year":"2012","journal-title":"Nonlinear Dyn."},{"issue":"9","key":"10.1016\/j.sigpro.2018.11.010_bib0022","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","article-title":"Image encryption using chaotic logistic map","volume":"24","author":"Pareek","year":"2006","journal-title":"Image Vis. Comput."},{"issue":"3","key":"10.1016\/j.sigpro.2018.11.010_bib0023","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","article-title":"A symmetric image encryption scheme based on 3D chaotic cat maps","volume":"21","author":"Chen","year":"2004","journal-title":"Chaos Solit. Fract."},{"issue":"2","key":"10.1016\/j.sigpro.2018.11.010_bib0024","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1016\/j.ijleo.2013.07.069","article-title":"Chaotic encryption and decryption of JPEG image","volume":"125","author":"Zhang","year":"2014","journal-title":"Optik (Stuttg)"},{"issue":"15","key":"10.1016\/j.sigpro.2018.11.010_bib0025","doi-asserted-by":"crossref","first-page":"5429","DOI":"10.1007\/s11042-014-1861-1","article-title":"Efficient image encryption with block shuffling and chaotic map","volume":"74","author":"Tang","year":"2015","journal-title":"Multimed. Tools Appl."},{"issue":"7","key":"10.1016\/j.sigpro.2018.11.010_bib0026","doi-asserted-by":"crossref","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","article-title":"A novel image encryption algorithm based on a 3D chaotic map","volume":"17","author":"Kanso","year":"2012","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"11","key":"10.1016\/j.sigpro.2018.11.010_bib0027","first-page":"1091","article-title":"An improved image encryption algorithm based on chaotic system","volume":"4","author":"Liu","year":"2009","journal-title":"J. Comput. (Taipei)"},{"issue":"7","key":"10.1016\/j.sigpro.2018.11.010_bib0028","doi-asserted-by":"crossref","first-page":"3541","DOI":"10.1016\/j.ijleo.2016.01.015","article-title":"Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps","volume":"127","author":"Wang","year":"2016","journal-title":"Optik (Stuttg)"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0029","series-title":"ICCSP 2011 - 2011 International Conference on Communications and Signal Processing","first-page":"266","article-title":"A Triple-Key chaotic image encryption method","author":"Srividya","year":"2011"},{"issue":"2","key":"10.1016\/j.sigpro.2018.11.010_bib0030","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","article-title":"A fast color image encryption algorithm based on hyper-chaotic systems","volume":"78","author":"Norouzi","year":"2014","journal-title":"Nonlinear Dyn."},{"issue":"12","key":"10.1016\/j.sigpro.2018.11.010_bib0031","doi-asserted-by":"crossref","first-page":"3616","DOI":"10.1088\/1009-1963\/16\/12\/011","article-title":"Image encryption using high-dimension chaotic system","volume":"16","author":"Sun","year":"2007","journal-title":"Chin. Phys."},{"issue":"3","key":"10.1016\/j.sigpro.2018.11.010_bib0032","first-page":"323","article-title":"3D Chaotic functions for image encryption","volume":"9","author":"Khade","year":"2012","journal-title":"IJCSI Int. J. Comput. Sci. Issues"},{"issue":"11","key":"10.1016\/j.sigpro.2018.11.010_bib0033","doi-asserted-by":"crossref","first-page":"3039","DOI":"10.1016\/j.sigpro.2013.04.021","article-title":"Image encryption using a new parametric switching chaotic system","volume":"93","author":"Zhou","year":"2013","journal-title":"Signal Process."},{"issue":"20","key":"10.1016\/j.sigpro.2018.11.010_bib0034","doi-asserted-by":"crossref","first-page":"2638","DOI":"10.1016\/j.physd.2008.03.049","article-title":"Image encryption with chaotically coupled chaotic maps","volume":"237","author":"Pisarchik","year":"2008","journal-title":"Physica D"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0035","series-title":"2012 Symposium on Broadband Networks and Fast Internet, RELABIRA 2012","first-page":"103","article-title":"New chaotic image encryption technique","author":"Al Haj Hassan","year":"2012"},{"issue":"17","key":"10.1016\/j.sigpro.2018.11.010_bib0036","doi-asserted-by":"crossref","first-page":"10631","DOI":"10.1007\/s11042-014-2115-y","article-title":"A new secure and sensitive image encryption scheme based on new substitution with chaotic function","volume":"75","author":"Parvin","year":"2016","journal-title":"Multimed. Tools Appl."},{"issue":"18","key":"10.1016\/j.sigpro.2018.11.010_bib0037","doi-asserted-by":"crossref","first-page":"11433","DOI":"10.1007\/s11042-015-2861-5","article-title":"A novel block chaotic encryption scheme for remote sensing image","volume":"75","author":"Ye","year":"2016","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"10.1016\/j.sigpro.2018.11.010_bib0038","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1016\/j.optcom.2011.10.098","article-title":"A new image encryption algorithm based on chaos","volume":"285","author":"Wang","year":"2012","journal-title":"Opt. Commun."},{"issue":"8","key":"10.1016\/j.sigpro.2018.11.010_bib0039","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.image.2014.06.012","article-title":"Chaotic image encryption based on circular substitution box and key stream buffer","volume":"29","author":"Zhang","year":"2014","journal-title":"Signal Process. Image Commun."},{"issue":"15","key":"10.1016\/j.sigpro.2018.11.010_bib0040","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","article-title":"A fast image encryption scheme based on chaotic standard map","volume":"372","author":"Wong","year":"2008","journal-title":"Phys. Lett. A"},{"issue":"11","key":"10.1016\/j.sigpro.2018.11.010_bib0041","doi-asserted-by":"crossref","first-page":"3507","DOI":"10.1016\/j.cnsns.2010.01.004","article-title":"A fast image encryption and authentication scheme based on chaotic maps","volume":"15","author":"Yang","year":"2010","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"18","key":"10.1016\/j.sigpro.2018.11.010_bib0042","doi-asserted-by":"crossref","first-page":"3329","DOI":"10.1016\/j.ijleo.2012.11.002","article-title":"An image encryption scheme based on new spatiotemporal chaos","volume":"124","author":"Song","year":"2013","journal-title":"Optik"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0043","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","article-title":"Image encryption based on three-dimensional bit matrix permutation","volume":"118","author":"Zhang","year":"2016","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.11.010_bib0044","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","article-title":"A new color image encryption using combination of the 1D chaotic map","volume":"138","author":"Pak","year":"2017","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.11.010_bib0045","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","article-title":"A novel bit-level image encryption algorithm based on chaotic maps","volume":"78","author":"Xu","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2018.11.010_bib0046","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.image.2015.10.004","article-title":"A new chaos-based image encryption system","volume":"41","author":"El Assad","year":"2016","journal-title":"Signal Process. Image Commun."},{"key":"10.1016\/j.sigpro.2018.11.010_bib0047","series-title":"Proceedings 2012 International Conference on System Science and Engineering, ICSSE 2012","first-page":"69","article-title":"A new chaotic system for image encryption","author":"Bao","year":"2012"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0048","series-title":"CSAE 2012 - Proceedings, 2012 IEEE International Conference on Computer Science and Automation Engineering","first-page":"331","article-title":"A new combined chaotic system for image encryption","volume":"2","author":"Zhang","year":"2012"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0049","first-page":"1","article-title":"Synchronization of chaotic-type delayed neural networks and its application","author":"Kalpana","year":"2018","journal-title":"Nonlinear Dyn."},{"issue":"2","key":"10.1016\/j.sigpro.2018.11.010_bib0050","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/81.904880","article-title":"Chaos and cryptography: block encryption ciphers based on chaotic maps","volume":"48","author":"Jakimoski","year":"2001","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0051","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","article-title":"Image encryption using binary bitplane","volume":"100","author":"Zhou","year":"2014","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.11.010_bib0052","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.sigpro.2017.05.002","article-title":"Image encryption method based on chaotic fuzzy cellular neural networks","volume":"140","author":"Ratnavelu","year":"2017","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.11.010_bib0053","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","article-title":"An image encryption algorithm based on chaotic system and compressive sensing","volume":"148","author":"Chai","year":"2018","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2018.11.010_bib0054","series-title":"Technical Report","article-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","author":"Rukhin","year":"2001"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0055","series-title":"Nonlinear dynamics and chaos","volume":"48","author":"Strogatz","year":"1994"},{"issue":"9","key":"10.1016\/j.sigpro.2018.11.010_bib0056","doi-asserted-by":"crossref","DOI":"10.1063\/1.4922973","article-title":"Defining chaos","volume":"25","author":"Hunt","year":"2015","journal-title":"Chaos"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0057","series-title":"Chaos-based cryptography: Theory, algorithms and applications","volume":"354","author":"Kocarev","year":"2011"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0058","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.chaos.2016.04.007","article-title":"A novel keyed parallel hashing scheme based on a new chaotic system","volume":"87","author":"Asgari Chenaghlu","year":"2016","journal-title":"Chaos Solit. Fract."},{"year":"2004","series-title":"Dynamical systems with applications using MATLAB","author":"Lynch","key":"10.1016\/j.sigpro.2018.11.010_bib0059"},{"issue":"1\u20132","key":"10.1016\/j.sigpro.2018.11.010_bib0060","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/0167-2789(93)90009-P","article-title":"A practical method for calculating largest lyapunov exponents from small data sets","volume":"65","author":"Rosenstein","year":"1993","journal-title":"Physica D"},{"issue":"12","key":"10.1016\/j.sigpro.2018.11.010_bib0061","doi-asserted-by":"crossref","first-page":"3330","DOI":"10.1109\/TCYB.2015.2504180","article-title":"Dynamic parameter-control chaotic system","volume":"46","author":"Hua","year":"2016","journal-title":"IEEE Trans. Cybern"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0062","doi-asserted-by":"crossref","unstructured":"Y. Wu, J.P. Noonan, S. Agaian, Shannon entropy based randomness measurement and test for image encryption, arXiv:1103.5520 (2011).","DOI":"10.1109\/ICSMC.2011.6084076"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0063","series-title":"USC-SIPI Report","article-title":"The USC-SIPI Image Database Version 5","author":"Weber","year":"1997"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0064","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.cnsns.2017.12.017","article-title":"An efficient and secure chaotic cipher algorithm for image content preservation","volume":"60","author":"Amina","year":"2018","journal-title":"Commun. Nonlinear Sci. Numer. Simul"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0065","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.compeleceng.2015.11.008","article-title":"A chaos-based image encryption algorithm with simple logical functions","volume":"54","author":"Yavuz","year":"2016","journal-title":"Comput. Electr. Eng"},{"issue":"02","key":"10.1016\/j.sigpro.2018.11.010_bib0066","doi-asserted-by":"crossref","first-page":"1650021","DOI":"10.1142\/S0218127416500218","article-title":"Fast and secure chaos-based cryptosystem for images","volume":"26","author":"Farajallah","year":"2016","journal-title":"Int. J. Bifurcation Chaos"},{"year":"2015","series-title":"Chaos-based Crypto and Joint Crypto-Compression Systems for Images and Videos","author":"Farajallah","key":"10.1016\/j.sigpro.2018.11.010_bib0067"},{"issue":"6","key":"10.1016\/j.sigpro.2018.11.010_bib0068","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","article-title":"A chaos-based symmetric image encryption scheme using a bit-level permutation","volume":"181","author":"liang Zhu","year":"2011","journal-title":"Inf. Sci. (NY)"},{"issue":"10","key":"10.1016\/j.sigpro.2018.11.010_bib0069","doi-asserted-by":"crossref","first-page":"3653","DOI":"10.1016\/j.cnsns.2014.03.016","article-title":"A chaotic image encryption scheme owning temp-value feedback","volume":"19","author":"Zhang","year":"2014","journal-title":"Commun. Nonlinear Sci. Numer. Simul"},{"issue":"4","key":"10.1016\/j.sigpro.2018.11.010_bib0070","first-page":"38","article-title":"The blowfish encryption algorithm","volume":"19","author":"Schneier","year":"1994","journal-title":"Dr. Dobb\u2019s J. Softw. Tools Profess. Programm"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0071","article-title":"Twofish: a 128-bit block cipher","volume":"15","author":"Schneier","year":"1998","journal-title":"NIST AES Proposal"},{"issue":"3","key":"10.1016\/j.sigpro.2018.11.010_bib0072","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","article-title":"A symmetric image encryption scheme based on 3d chaotic cat maps","volume":"21","author":"Chen","year":"2004","journal-title":"Chaos Solit. Fract"},{"key":"10.1016\/j.sigpro.2018.11.010_bib0073","series-title":"Mobile Multimedia\/Image Processing, Security, and Applications 2010","first-page":"77080P","article-title":"Image encryption using the sudoku matrix","volume":"7708","author":"Wu","year":"2010"},{"issue":"1","key":"10.1016\/j.sigpro.2018.11.010_bib0074","doi-asserted-by":"crossref","first-page":"013014","DOI":"10.1117\/1.JEI.21.1.013014","article-title":"Image encryption using the two-dimensional logistic chaotic map","volume":"21","author":"Wu","year":"2012","journal-title":"J. Electron. Imaging"},{"issue":"2","key":"10.1016\/j.sigpro.2018.11.010_bib0075","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.jestch.2014.04.001","article-title":"A parallel block-based encryption schema for digital images using reversible cellular automata","volume":"17","author":"Mohamed","year":"2014","journal-title":"Eng. Sci. Technol. Int. J"},{"issue":"9","key":"10.1016\/j.sigpro.2018.11.010_bib0076","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","article-title":"A novel image encryption algorithm based on self-adaptive wave transmission","volume":"90","author":"Liao","year":"2010","journal-title":"Signal Process"},{"issue":"1","key":"10.1016\/j.sigpro.2018.11.010_bib0077","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","article-title":"A new chaos-based fast image encryption algorithm","volume":"11","author":"Wang","year":"2011","journal-title":"Appl. Soft Comput"},{"issue":"8","key":"10.1016\/j.sigpro.2018.11.010_bib0078","doi-asserted-by":"crossref","first-page":"2066","DOI":"10.1016\/j.cnsns.2012.12.012","article-title":"An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion","volume":"18","author":"Zhang","year":"2013","journal-title":"Commun. Nonlinear Sci. Numer. Simul"},{"issue":"12","key":"10.1016\/j.sigpro.2018.11.010_bib0079","doi-asserted-by":"crossref","first-page":"4653","DOI":"10.1016\/j.cnsns.2012.05.033","article-title":"An image encryption scheme based on quantum logistic map","volume":"17","author":"Akhshani","year":"2012","journal-title":"Commun. Nonlinear Sci. Numer. Simul"},{"issue":"15","key":"10.1016\/j.sigpro.2018.11.010_bib0080","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","article-title":"A fast image encryption scheme based on chaotic standard map","volume":"372","author":"Wong","year":"2008","journal-title":"Phys. Lett. A"}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168418303700?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168418303700?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T10:37:14Z","timestamp":1565260634000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165168418303700"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":80,"alternative-id":["S0165168418303700"],"URL":"https:\/\/doi.org\/10.1016\/j.sigpro.2018.11.010","relation":{},"ISSN":["0165-1684"],"issn-type":[{"type":"print","value":"0165-1684"}],"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation","name":"articletitle","label":"Article Title"},{"value":"Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sigpro.2018.11.010","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}