{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:14:59Z","timestamp":1744078499665,"version":"3.37.3"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2970981","type":"journal-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T20:42:07Z","timestamp":1580503327000},"page":"25650-25663","source":"Crossref","is-referenced-by-count":58,"title":["An Image Encryption Scheme Based on DNA Computing and Multiple Chaotic Systems"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4303-672X","authenticated-orcid":false,"given":"Muhammad","family":"Samiullah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8780-0240","authenticated-orcid":false,"given":"Waqar","family":"Aslam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9216-2063","authenticated-orcid":false,"given":"Hira","family":"Nazir","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2208-5853","authenticated-orcid":false,"given":"M. Ikramullah","family":"Lali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0442-7998","authenticated-orcid":false,"given":"Basit","family":"Shahzad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1267-5510","authenticated-orcid":false,"given":"Muhammad Rafiq","family":"Mufti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9054-8798","authenticated-orcid":false,"given":"Humaira","family":"Afzal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.03.010"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49301-4_25"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ECCTD.2013.6662328"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922376"},{"key":"ref32","first-page":"524","article-title":"Diversity-based boosting algorithm","volume":"7","author":"alzubi","year":"2016","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref31","first-page":"93","article-title":"A novel implementation of an extended \n$8\\times8$\n playfair cipher using interweaving on DNA-encoded data","volume":"4","author":"hamad","year":"2014","journal-title":"Int J Elect Comput Eng"},{"article-title":"DNA sequencing and sorting: Identifying genetic variations","year":"2015","author":"sharp","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1004\/1\/012023"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/974\/1\/012028"},{"key":"ref35","first-page":"1","article-title":"Intrusion detection","volume":"1","author":"thomas","year":"2014","journal-title":"IET Publishibg"},{"key":"ref34","first-page":"552","article-title":"Secure channel coding schemes based on algebraic-geometric codes over hermitian curves","volume":"22","author":"alzubi","year":"2016","journal-title":"J Univ Comput Sci"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.03.006"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2018.2817550"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.05.118"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.02.036"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.05.002"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127419501153"},{"key":"ref27","first-page":"1122","article-title":"+ A novel chaotic map encryption methodology for image cryptography and secret communication with steganography","volume":"8","author":"alzubi","year":"2019","journal-title":"Int J Recent Technol Eng"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.028"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2017.10.023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2259819"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3779-5_6"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2268-2_16"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6496-1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14257\/ijbsbt.2014.6.5.22"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2307\/3980235"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5120\/8588-2339"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-015-0059-2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2017.2754496"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5844-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.09.029"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2489178"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.12.003"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0040"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054319"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.08.009"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2901870"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.08.008"},{"key":"ref56","first-page":"1","article-title":"Approach","volume":"3","author":"mohanaiah","year":"2013","journal-title":"J Int Research Publication"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-17656"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3028-2"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2016.12.03"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906292"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.03.021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812080"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883690"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2016.1251855"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2573-x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.26.1.013021"},{"key":"ref15","first-page":"23","article-title":"An efficient colour image encryption scheme based on 1-D chaotic maps","volume":"46","author":"patro","year":"2019","journal-title":"J Inf Secur Appl"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2017.11.005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2018.2827165"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3126-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102361"},{"key":"ref4","first-page":"3182","article-title":"Review on DNA based encryption algorithm for text and image data","volume":"3","author":"rusia","year":"2014","journal-title":"Int J Eng Res Technol"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/21092"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/sym10110660"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418500475"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01177-2_56"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.01.005"},{"article-title":"ECRYPT II yearly report on algorithms and keysizes","year":"2012","author":"babbage","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-018-0589-x"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i3.10572"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817600"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1016\/j.procs.2017.09.151","article-title":"Highly improved DNA based steganography","volume":"115","author":"malathi","year":"2017","journal-title":"Procedia Comput Sci"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4885-5"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.ijleo.2017.09.099","article-title":"An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos","volume":"153","author":"liao","year":"2018","journal-title":"Optik-Int J Light Electron Opt"},{"key":"ref41","first-page":"2036","article-title":"A novel DNA based encryption algorithm for multimedia information","volume":"5","author":"maniyath","year":"2016","journal-title":"COMPUSOFT"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-22r1a"},{"journal-title":"NCBI Human Genome Resources","year":"2019","key":"ref43"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08977515.pdf?arnumber=8977515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:51:20Z","timestamp":1639770680000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8977515\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2970981","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}