{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:34:37Z","timestamp":1776785677657,"version":"3.51.2"},"reference-count":28,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1016\/j.jisa.2019.01.010","type":"journal-article","created":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T06:02:53Z","timestamp":1549864973000},"page":"117-130","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":58,"special_numbering":"C","title":["A secure image encryption scheme based on cellular automata and chaotic skew tent map"],"prefix":"10.1016","volume":"45","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-6863-9183","authenticated-orcid":false,"given":"Bhaskar","family":"Mondal","sequence":"first","affiliation":[]},{"given":"Shrey","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Prabhakar","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"15","key":"10.1016\/j.jisa.2019.01.010_bib0001","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","article-title":"A fast image encryption scheme based on chaotic standard map","volume":"372","author":"Wong","year":"2008","journal-title":"Phys Lett A"},{"issue":"11","key":"10.1016\/j.jisa.2019.01.010_bib0002","doi-asserted-by":"crossref","first-page":"2472","DOI":"10.1016\/j.ijleo.2013.12.001","article-title":"A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme","volume":"125","author":"Chen","year":"2014","journal-title":"Optik"},{"issue":"18","key":"10.1016\/j.jisa.2019.01.010_bib0003","first-page":"23","article-title":"An improved cryptography scheme for secure image communication","volume":"67","author":"Mondal","year":"2013","journal-title":"Int J Comput Appl"},{"issue":"23","key":"10.1016\/j.jisa.2019.01.010_bib0004","doi-asserted-by":"crossref","first-page":"5415","DOI":"10.1016\/j.optcom.2011.08.013","article-title":"A novel chaos-based bit-level permutation scheme for digital image encryption","volume":"284","author":"Fu","year":"2011","journal-title":"Opt Commun"},{"issue":"4","key":"10.1016\/j.jisa.2019.01.010_bib0005","first-page":"499","article-title":"A light weight secure image encryption scheme based on chaos & dna computing","volume":"29","author":"Mondal","year":"2017","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"2","key":"10.1016\/j.jisa.2019.01.010_bib0006","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/TIFS.2015.2489178","article-title":"On the security of permutation-only image encryption schemes","volume":"11","author":"Jolfaei","year":"2016","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2019.01.010_bib0007","doi-asserted-by":"crossref","DOI":"10.1007\/s11042-018-6534-z","article-title":"Secured and compound 3-d chaos image encryption using hybrid mutation and crossover operator","author":"Premkumar","year":"2018","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"10.1016\/j.jisa.2019.01.010_bib0008","doi-asserted-by":"crossref","first-page":"25799","DOI":"10.1007\/s11042-018-5817-8","article-title":"Parallel image encryption with bitplane decomposition and genetic algorithm","volume":"77","author":"Mozaffari","year":"2018","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"10.1016\/j.jisa.2019.01.010_bib0009","doi-asserted-by":"crossref","first-page":"31177","DOI":"10.1007\/s11042-018-6214-z","article-title":"A chaotic permutation and diffusion based image encryption algorithm for secure communications","volume":"77","author":"Mondal","year":"2018","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2019.01.010_bib0010","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","article-title":"A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation","volume":"90","author":"Li","year":"2017","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"10.1016\/j.jisa.2019.01.010_bib0011","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1016\/j.cnsns.2007.10.011","article-title":"A block encryption algorithm based on dynamic sequences of multiple chaotic systems","volume":"14","author":"Wang","year":"2009","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"4","key":"10.1016\/j.jisa.2019.01.010_bib0012","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1007\/s11071-010-9821-4","article-title":"Chaotic encryption algorithm based on alternant of stream cipher and block cipher","volume":"63","author":"Wang","year":"2010","journal-title":"Nonlinear Dyn"},{"issue":"1\u20132","key":"10.1016\/j.jisa.2019.01.010_bib0013","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s11071-012-0707-5","article-title":"A new algorithm of the combination of image compression and encryption technology based on cross chaotic map","volume":"72","author":"Tong","year":"2013","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"10.1016\/j.jisa.2019.01.010_bib0014","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1007\/s11071-013-1086-2","article-title":"A novel image encryption algorithm based on dynamic s-boxes constructed by chaos","volume":"75","author":"Wang","year":"2014","journal-title":"Nonlinear Dyn"},{"key":"10.1016\/j.jisa.2019.01.010_bib0015","series-title":"Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering","first-page":"261","article-title":"A comparative study on cryptographic image scrambling","author":"Mondal","year":"2017"},{"issue":"4","key":"10.1016\/j.jisa.2019.01.010_bib0016","doi-asserted-by":"crossref","first-page":"2383","DOI":"10.1007\/s11071-012-0626-5","article-title":"Breaking a novel colour image encryption algorithm based on chaos","volume":"70","author":"Li","year":"2012","journal-title":"Nonlinear Dyn"},{"key":"10.1016\/j.jisa.2019.01.010_bib0017","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.sigpro.2015.11.017","article-title":"Chaotic image encryption using pseudo-random masks and pixel mapping","volume":"125","author":"Li","year":"2016","journal-title":"Sig Process"},{"issue":"12","key":"10.1016\/j.jisa.2019.01.010_bib0018","doi-asserted-by":"crossref","first-page":"1836","DOI":"10.1016\/j.optlaseng.2012.06.002","article-title":"An image encryption based on elementary cellular automata","volume":"50","author":"Jin","year":"2012","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"10.1016\/j.jisa.2019.01.010_bib0019","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/BF01223745","article-title":"Algebraic properties of cellular automata","volume":"93","author":"Martin","year":"1984","journal-title":"Commun Math Phys"},{"issue":"1\u20133","key":"10.1016\/j.jisa.2019.01.010_bib0020","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.tcs.2004.11.021","article-title":"Theory of cellular automata: a survey","volume":"334","author":"Kari","year":"2005","journal-title":"Theor Comput Sci"},{"key":"10.1016\/j.jisa.2019.01.010_bib0021","series-title":"Computation in Cellular Automata: A Selected Review","first-page":"95","author":"Mitchell","year":"2005"},{"key":"10.1016\/j.jisa.2019.01.010_bib0022","first-page":"16","article-title":"Cellular Automata and its applications in bioinformatics: A review","volume":"2","author":"Sree","year":"2014","journal-title":"Global Perspect Artif Intell"},{"issue":"5","key":"10.1016\/j.jisa.2019.01.010_bib0023","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","article-title":"Correlation-immunity of nonlinear combining functions for cryptographic applications (corresp.)","volume":"30","author":"Siegenthaler","year":"1984","journal-title":"IEEE Trans Inf Theory"},{"key":"10.1016\/j.jisa.2019.01.010_sbref0023","series-title":"Image correlation for shape, motion and deformation measurements: basic concepts, theory and applications","author":"Sutton","year":"2009"},{"key":"10.1016\/j.jisa.2019.01.010_bib0025","series-title":"Proceedings of the twenty-second national radio science conference, 2005. NRSC","first-page":"277","article-title":"Measuring encryption quality for bitmap images encrypted with Rijndael and Kamkar block ciphers","author":"Elkamchouchi","year":"2005"},{"issue":"2","key":"10.1016\/j.jisa.2019.01.010_sbref0025","article-title":"NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology","volume":"1","author":"Wu","year":"2011","journal-title":"J Sel Areas Telecommun"},{"key":"10.1016\/j.jisa.2019.01.010_sbref0026","series-title":"Entropic security and the encryption of high entropy messages","author":"Dodis","year":"2004"},{"key":"10.1016\/j.jisa.2019.01.010_sbref0027","doi-asserted-by":"crossref","first-page":"656715","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst Tech J"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S2214212617303423?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S2214212617303423?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T17:41:43Z","timestamp":1551462103000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212617303423"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":28,"alternative-id":["S2214212617303423"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.jisa.2019.01.010","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A secure image encryption scheme based on cellular automata and chaotic skew tent map","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.jisa.2019.01.010","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}