{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T11:40:47Z","timestamp":1690544447763},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T00:00:00Z","timestamp":1681689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T00:00:00Z","timestamp":1681689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s00034-023-02354-x","type":"journal-article","created":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T19:02:01Z","timestamp":1681758121000},"page":"5358-5384","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of area, energy and security optimized reversible architectures for digital image cryptography"],"prefix":"10.1007","volume":"42","author":[{"given":"K.","family":"Saranya","sequence":"first","affiliation":[]},{"given":"K. N.","family":"Vijeyakumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,17]]},"reference":[{"issue":"4","key":"2354_CR1","doi-asserted-by":"publisher","first-page":"1920","DOI":"10.1109\/TIP.2011.2176953","volume":"21","author":"F Aul\u00ed-Llin\u00e0s","year":"2012","unstructured":"F. Aul\u00ed-Llin\u00e0s, M.W. Marcellin, Scanning order strategies for bitplane image coding. IEEE Trans. Image Process. 21(4), 1920\u20131933 (2012)","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"2354_CR2","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1147\/rd.176.0525","volume":"17","author":"CH Bennett","year":"1973","unstructured":"C.H. Bennett, IBM J. Res. Dev. 17(6), 525 (1973)","journal-title":"IBM J. Res. Dev."},{"key":"2354_CR3","doi-asserted-by":"publisher","first-page":"103100","DOI":"10.1016\/j.micpro.2020.103100","volume":"76","author":"SS Devi","year":"2020","unstructured":"S.S. Devi, V. Bhanumathi, Design of reversible logic based full adder in current-mode logic circuits. Microprocess. Microsyst. 76, 103100 (2020)","journal-title":"Microprocess. Microsyst."},{"issue":"2","key":"2354_CR4","doi-asserted-by":"publisher","first-page":"3609","DOI":"10.32604\/cmc.2022.020426","volume":"70","author":"SS Devi","year":"2022","unstructured":"S.S. Devi, V. Bhanumathi, Reversible logic based MOS current mode logic implementation in digital circuits. CMC-Comput. Mater. Continua 70(2), 3609\u20133624 (2022)","journal-title":"CMC-Comput. Mater. Continua"},{"issue":"6","key":"2354_CR5","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/BF01886518","volume":"16","author":"RP Feynman","year":"1986","unstructured":"R.P. Feynman, Found. Phys. 16(6), 507 (1986)","journal-title":"Found. Phys."},{"key":"2354_CR6","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.micpro.2019.05.015","volume":"69","author":"S Karunamurthi","year":"2019","unstructured":"S. Karunamurthi, V.K. Natarajan, VLSI implementation of reversible logic gates cryptography with LFSR key. Microprocess. Microsyst. 69, 68\u201378 (2019)","journal-title":"Microprocess. Microsyst."},{"key":"2354_CR7","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.compeleceng.2016.07.005","volume":"58","author":"I Koyuncu","year":"2017","unstructured":"I. Koyuncu, A.T. \u00d6zcerit, The design and realization of a new high speed FPGA-based chaotic true random number generator. Comput. Electr. Eng. 58, 203\u2013214 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"2354_CR8","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/TCSI.2016.2611561","volume":"64","author":"B Koziel","year":"2017","unstructured":"B. Koziel, R. Azarderakhsh, M.M. Kermani, D. Jao, Post-quantum cryptography on FPGA based on isogenies on elliptic curves. IEEE Trans. Circuits Syst. I Regul. Pap. 64, 86\u201399 (2017)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"2354_CR9","doi-asserted-by":"publisher","first-page":"1594","DOI":"10.1109\/TC.2018.2815605","volume":"67","author":"B Koziel","year":"2018","unstructured":"B. Koziel, R. Azarderakhsh, M.M. Kermani, A high-performance and scalable hardware architecture for isogeny-based cryptography. IEEE Trans. Comput. 67, 1594\u20131609 (2018)","journal-title":"IEEE Trans. Comput."},{"key":"2354_CR10","first-page":"81","volume":"15","author":"S Kuchhal","year":"2015","unstructured":"S. Kuchhal, R. Verma, Security design of DES using reversible logic. Int. J. Comput. Sci. Netw. Secur. 15, 81 (2015)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"3","key":"2354_CR11","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1147\/rd.53.0183","volume":"5","author":"R Landauer","year":"1961","unstructured":"R. Landauer, IBM J. Res. Dev. 5(3), 183 (1961)","journal-title":"IBM J. Res. Dev."},{"key":"2354_CR12","doi-asserted-by":"publisher","first-page":"27941","DOI":"10.1007\/s11042-020-09279-6","volume":"79","author":"A Malik","year":"2020","unstructured":"A. Malik, S. Gupta, S. Dhal, Analysis of traditional and modern image encryption algorithms under realistic ambience. Multimed. Tools Appl. 79, 27941\u201327993 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"2354_CR13","doi-asserted-by":"publisher","first-page":"25799","DOI":"10.1007\/s11042-018-5817-8","volume":"77","author":"S Mozaffari","year":"2018","unstructured":"S. Mozaffari, Parallel image encryption with bit plane decomposition and genetic algorithm. Multimed. Tools Appl. 77, 25799\u201325819 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"2354_CR14","doi-asserted-by":"crossref","unstructured":"K.A.K. Patro, B. Acharya, A secure block operation based bit-plane image encryption using chaotic maps, in First International Conference on Power, Control and Computing Technologies, 411\u2013416 (2020).","DOI":"10.1109\/ICPC2T48082.2020.9071483"},{"issue":"14","key":"2354_CR15","doi-asserted-by":"publisher","first-page":"22275","DOI":"10.1007\/s11042-021-10719-0","volume":"80","author":"V Rathore","year":"2021","unstructured":"V. Rathore, A.K. Pal, An image encryption scheme in bit plane content using Henon map based generated edge map. Multimed. Tools Appl. 80(14), 22275\u201322300 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"2354_CR16","doi-asserted-by":"publisher","first-page":"3836","DOI":"10.1007\/s00034-021-01649-1","volume":"40","author":"K Saranya","year":"2021","unstructured":"K. Saranya, K.N.A. Vijeyakumar, Low Area FPGA implementation of reversible gate encryption with heterogeneous key generation. Circuits Systems Signal Process. 40, 3836\u20133865 (2021)","journal-title":"Circuits Systems Signal Process."},{"issue":"3","key":"2354_CR17","first-page":"30","volume":"104","author":"S Somaraj","year":"2014","unstructured":"S. Somaraj, M.A. Hussain, Securing medical images by image encryption using key image\u2019. Int. J. Comput. Appl. 104(3), 30\u201334 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"2354_CR18","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","volume":"100","author":"Y Zhou","year":"2014","unstructured":"Y. Zhou, W. Cao, C.P. Chen, Image encryption using binary bitplane\u2019. Signal Process. 100, 197\u2013207 (2014)","journal-title":"Signal Process."},{"key":"2354_CR19","doi-asserted-by":"crossref","unstructured":"Y. Zhou, K. Panetta & S. Agaian, Image encryption using binary key-images, in 2009 IEEE International Conference on Systems, Man and Cybernetics, pp. 4569\u20134574(2009)","DOI":"10.1109\/ICSMC.2009.5346780"},{"issue":"12","key":"2354_CR20","doi-asserted-by":"publisher","first-page":"120503","DOI":"10.7498\/aps.61.120503","volume":"61","author":"C Zhu","year":"2012","unstructured":"C. Zhu, K. Sun, Cryptanalysis and improvement of a class of hyper chaos based image encryption algorithms. Acta Physica Sinica 61(12), 120503 (2012)","journal-title":"Acta Physica Sinica"},{"key":"2354_CR21","first-page":"115","volume":"32","author":"H Zodpe","year":"2018","unstructured":"H. Zodpe, A. Sapkal, An efficient AES implementation using FPGA with enhanced security features. J. King Saud Univ. Eng. Sci. 32, 115\u2013122 (2018)","journal-title":"J. King Saud Univ. Eng. Sci."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02354-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-023-02354-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02354-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T11:11:32Z","timestamp":1690542692000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-023-02354-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,17]]},"references-count":21,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["2354"],"URL":"https:\/\/doi.org\/10.1007\/s00034-023-02354-x","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,17]]},"assertion":[{"value":"27 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}