{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:36:25Z","timestamp":1775914585728,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T00:00:00Z","timestamp":1632960000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T00:00:00Z","timestamp":1632960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s00500-021-06225-y","type":"journal-article","created":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T19:08:25Z","timestamp":1633028905000},"page":"14413-14428","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["GPU-Accelerated implementation of a genetically optimized image encryption algorithm"],"prefix":"10.1007","volume":"25","author":[{"given":"Brijgopal","family":"Bharadwaj","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J.","family":"Saira Banu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Madiajagan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muhammad Rukunuddin","family":"Ghalib","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Oscar","family":"Castillo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3165-3293","authenticated-orcid":false,"given":"Achyut","family":"Shankar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"issue":"10","key":"6225_CR1","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1016\/j.aeue.2012.01.015","volume":"66","author":"AH Abdullah","year":"2012","unstructured":"Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-Int J Electron Commun 66(10):806\u2013816","journal-title":"AEU-Int J Electron Commun"},{"key":"6225_CR2","doi-asserted-by":"publisher","DOI":"10.1201\/9781420011326","volume-title":"Genetic algorithms and genetic programming: modern concepts and practical applications","author":"M Affenzeller","year":"2009","unstructured":"Affenzeller M, Wagner S, Winkler S, Beham A (2009) Genetic algorithms and genetic programming: modern concepts and practical applications. CRC Press, Florida"},{"key":"6225_CR3","first-page":"102384","volume":"49","author":"IT Almalkawi","year":"2019","unstructured":"Almalkawi IT, Halloush R, Alsarhan A, Al-Dubai A, Al-karaki JN (2019) A lightweight and efficient digital image encryption using hybrid chaotic systems for wireless network applications. J Inf Secur Appl 49:102384","journal-title":"J Inf Secur Appl"},{"key":"6225_CR4","first-page":"210","volume":"46","author":"A Altigani","year":"2019","unstructured":"Altigani A, Hasan S, Shamsuddin SM, Barry B (2019) A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite. J Inf Secur Appl 46:210\u2013221","journal-title":"J Inf Secur Appl"},{"key":"6225_CR5","doi-asserted-by":"crossref","unstructured":"Antwerpen DV (2011) Improving SIMD efficiency for parallel Monte Carlo light transport on the GPU. In Proceedings of the ACM SIGGRAPH Symposium on High Performance Graphics (HPG '11). Association for Computing Machinery (ACM), New York, NY, USA, pp 41\u201350.","DOI":"10.1145\/2018323.2018330"},{"key":"6225_CR6","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-38930-1_8","volume-title":"Combatting cybercrime and cyberterrorism","author":"J Armin","year":"2016","unstructured":"Armin J, Thompson B, Kijewski P (2016) Cybercrime economic costs: No measure no solution. Combatting cybercrime and cyberterrorism. Springer, Cham, pp 135\u2013155"},{"key":"6225_CR7","doi-asserted-by":"crossref","unstructured":"Bharadwaj B, and Sairabanu J (2020) Image encryption using a Modified Pseudo-Random Generator. In 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE) pp 1\u20136. IEEE.","DOI":"10.1109\/ic-ETITE47903.2020.094"},{"issue":"2","key":"6225_CR8","first-page":"76","volume":"6","author":"B Bharadwaj","year":"2018","unstructured":"Bharadwaj B, Shukla S, Shalini L (2018) Symmetric key encryption using a simple pseudo-random generator to provide more secure communication. Int J Tech Res Appl 6(2):76\u201381","journal-title":"Int J Tech Res Appl"},{"issue":"1","key":"6225_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.jaccpubpol.2004.12.002","volume":"24","author":"JE Boritz","year":"2005","unstructured":"Boritz JE, No WG (2005) Security in XML-based financial reporting services on the Internet. J Account Public Policy 24(1):11\u201335","journal-title":"J Account Public Policy"},{"key":"6225_CR10","doi-asserted-by":"crossref","unstructured":"Buck I (2007) GPU computing with NVIDIA CUDA. In ACM SIGGRAPH 2007 courses (SIGGRAPH '07). Association for Computing Machinery, New York, NY, USA, 6\u2013es.","DOI":"10.1145\/1281500.1281647"},{"key":"6225_CR11","volume-title":"Codes and ciphers-A history of cryptography","author":"A D\u2019agapeyeff","year":"2016","unstructured":"D\u2019agapeyeff A (2016) Codes and ciphers-A history of cryptography. Read Books Ltd., Redditch"},{"issue":"2","key":"6225_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1363-4127(97)81323-4","volume":"2","author":"D Davies","year":"1997","unstructured":"Davies D (1997) A brief history of cryptography. Inf Secur Tech Rep 2(2):14\u201317","journal-title":"Inf Secur Tech Rep"},{"key":"6225_CR13","unstructured":"Dutta S, Das T, Jash S, Patra D, and Paul P (2014) A cryptography algorithm using the operations of genetic algorithm & pseudo random sequence generating functions. International Journal, 3(5)."},{"key":"6225_CR14","doi-asserted-by":"crossref","unstructured":"Inampudi GR, Shyamala K, and Ramachandram S (2018) Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs. 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, pp 984\u2013988.","DOI":"10.1109\/ICISC.2018.8398949"},{"key":"6225_CR15","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.pmcj.2015.08.001","volume":"24","author":"S Kalra","year":"2015","unstructured":"Kalra S, Sood SK (2015) Secure authentication scheme for IoT and cloud servers. Pervasive Mob Comput 24:210\u2013223","journal-title":"Pervasive Mob Comput"},{"issue":"5","key":"6225_CR16","doi-asserted-by":"publisher","first-page":"2500","DOI":"10.3906\/elk-1710-155","volume":"26","author":"C K\u00f6semen","year":"2018","unstructured":"K\u00f6semen C, Dalkili\u00e7 G, Aydin \u00d6 (2018) Genetic programming-based pseudorandom number generator for wireless identification and sensing platform. Turk J Electr Eng Comput Sci 26(5):2500\u20132511","journal-title":"Turk J Electr Eng Comput Sci"},{"issue":"1","key":"6225_CR17","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10586-016-0536-2","volume":"19","author":"WK Lee","year":"2016","unstructured":"Lee WK, Cheong HS, Phan RCW, Goi BM (2016) Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture. Clust Comput 19(1):335\u2013347","journal-title":"Clust Comput"},{"issue":"1","key":"6225_CR18","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1140\/epjst\/e2012-01637-8","volume":"210","author":"M Manssen","year":"2012","unstructured":"Manssen M, Weigel M, Hartmann AK (2012) Random number generators for massively parallel simulations on GPU. Eur Phys J Special Topics 210(1):53\u201371","journal-title":"Eur Phys J Special Topics"},{"key":"6225_CR19","doi-asserted-by":"crossref","unstructured":"Mishra M, and Mankar VH (2015) Text encryption algorithms based on pseudo random number generator. International Journal of Computer Applications, 111(2).","DOI":"10.5120\/19507-0756"},{"key":"6225_CR20","unstructured":"NVIDIA Corporation (2020) CUDA C++ Programming Guide. NVIDIA Docs. https:\/\/docs.nvidia.com\/cuda\/pdf\/CUDA_C_Programming_Guide.pdf"},{"key":"6225_CR21","doi-asserted-by":"crossref","unstructured":"Ramesh A, and Jain A (2015) Hybrid image encryption using Pseudo random number generators, and transposition and substitution techniques. 2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15), Bangalore, pp. 1\u20136","DOI":"10.1109\/ITACT.2015.7492652"},{"issue":"1","key":"6225_CR22","doi-asserted-by":"publisher","first-page":"tyy004","DOI":"10.1093\/cybsec\/tyy004","volume":"4","author":"M Riek","year":"2018","unstructured":"Riek M, B\u00f6hme R (2018) The costs of consumer-facing cybercrime: An empirical exploration of measurement issues and estimates. J Cybersecur 4(1):tyy004","journal-title":"J Cybersecur"},{"key":"6225_CR23","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.future.2016.12.018","volume":"82","author":"C Riesinger","year":"2018","unstructured":"Riesinger C, Neckel T, Rupp F (2018) Non-standard pseudo random number generators revisited for GPUs. Futur Gener Comput Syst 82:482\u2013492","journal-title":"Futur Gener Comput Syst"},{"key":"6225_CR24","doi-asserted-by":"crossref","unstructured":"Sen A, Ghosh A, and Nath A (2017) Bit level symmetric key cryptography using genetic algorithm. In 2017 7th International Conference on Communication Systems and Network Technologies (CSNT) (pp. 193\u2013199). IEEE.","DOI":"10.1109\/CSNT.2017.8418536"},{"key":"6225_CR25","doi-asserted-by":"crossref","unstructured":"Seshadrinathan M, and Dempski KL (2008) Implementation of advanced encryption standard for encryption and decryption of images and text on a GPU. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, Anchorage, AK, pp 1\u20136.","DOI":"10.1109\/CVPRW.2008.4563094"},{"issue":"4","key":"6225_CR26","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"6225_CR27","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of IoT and cloud computing. Futur Gener Comput Syst 78:964\u2013975","journal-title":"Futur Gener Comput Syst"},{"key":"6225_CR28","doi-asserted-by":"crossref","unstructured":"Vihari PLV, and Mishra M (2012) Chaotic image encryption on GPU. In Proceedings of the CUBE International Information Technology Conference (CUBE '12). Association for Computing Machinery, New York, NY, USA, 753\u2013758.","DOI":"10.1145\/2381716.2381860"},{"key":"6225_CR29","doi-asserted-by":"crossref","unstructured":"Ye R, Li Y, and Li Y (2018) An image encryption scheme based on fractal interpolation. In Proceedings of the 3rd International Conference on Multimedia and Image Processing (ICMIP 2018). Association for Computing Machinery, New York, NY, USA, 52\u201356.","DOI":"10.1145\/3195588.3195596"},{"key":"6225_CR30","unstructured":"Zafar F, Olano M, and Curtis A (2010) GPU random numbers via the tiny encryption algorithm. In Proceedings of the Conference on High Performance Graphics (HPG '10). Eurographics Association, Goslar, DEU, pp 133\u2013141."},{"key":"6225_CR31","volume-title":"Cuda c\/c++ basics","author":"C Zeller","year":"2011","unstructured":"Zeller C (2011) Cuda c\/c++ basics. NVIDIA Coporation, California"},{"key":"6225_CR32","doi-asserted-by":"crossref","unstructured":"Zhang Y, Li X, and Hou W (2017) A fast image encryption scheme based on AES, 2nd International Conference on Image, Vision and Computing (ICIVC), Chengdu, pp 624\u2013628.","DOI":"10.1109\/ICIVC.2017.7984631"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-06225-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-021-06225-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-06225-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T09:47:20Z","timestamp":1744192040000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-021-06225-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,30]]},"references-count":32,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["6225"],"URL":"https:\/\/doi.org\/10.1007\/s00500-021-06225-y","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,30]]},"assertion":[{"value":"30 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}