{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:22:39Z","timestamp":1776885759026,"version":"3.51.2"},"reference-count":85,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2017M620374"],"award-info":[{"award-number":["2017M620374"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["XDJK2018B013"],"award-info":[{"award-number":["XDJK2018B013"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3024994","type":"journal-article","created":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T20:17:42Z","timestamp":1600460262000},"page":"172275-172295","source":"Crossref","is-referenced-by-count":41,"title":["A Color Image Encryption Algorithm Based on One Time Key, Chaos Theory, and Concept of Rotor Machine"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3083-6066","authenticated-orcid":false,"given":"Aqeel Ur","family":"Rehman","sequence":"first","affiliation":[]},{"given":"Amnah","family":"Firdous","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8318-2679","authenticated-orcid":false,"given":"Salman","family":"Iqbal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6643-8820","authenticated-orcid":false,"given":"Zahid","family":"Abbas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3735-901X","authenticated-orcid":false,"given":"Malik M. Ali","family":"Shahid","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7024-4153","authenticated-orcid":false,"given":"Huiwei","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8509-6851","authenticated-orcid":false,"given":"Farman","family":"Ullah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6346-1"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2221-x"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2012.10.068"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.08.009"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.041"},{"key":"ref74","first-page":"487","article-title":"Differential cryptanalysis of the full 16-round DES BT","author":"biham","year":"1993","journal-title":"Proc 12th Annu Int CRYPTO"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.055"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1828-7"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3088-1"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/25\/10\/100503"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2013.09.040"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7623-3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2014.10.021"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.03.022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2014.01.051"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2016.7528310"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3233\/IFS-151628"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2017.11.009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.03.017"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2008.07.057"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.11.005"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2010.12.065"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4332-9"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/21\/5\/050506"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.08.018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118991863745"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2009.07.007"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3861-9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.01.016"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110391891775"},{"key":"ref68","author":"cipher","year":"1985","journal-title":"Machine Cryptography and Modern Cryptanalysis"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119991887847"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.11.008"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.03.031"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4786-7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5844-5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.03.010"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2142-x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.03.011"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33389-2_1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.06.007"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2012.07.004"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.04.006"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2691-5"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2008.11.005"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941086"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.11.019"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.11.008"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.05.011"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2012.01.040"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2011.11.030"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2018.01.064"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.09.091"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2018.03.019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.08.017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2479-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.08.008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2016.08.011"},{"key":"ref82","first-page":"2935","article-title":"Memristor-based neural network circuit of full-function Pavlov associative memory with time delay and variable learning rate","volume":"50","author":"sun","year":"2020","journal-title":"IEEE Trans Cybern"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3541-y"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-017-3338-z"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4772-0"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.3390\/e22030274"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5590-0"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3966"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-016-0114-7"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4531-4"},{"key":"ref4","author":"daemen","year":"2012","journal-title":"The Design of Rijndael AES&#x2014 The Advanced Encryption Standard"},{"key":"ref3","first-page":"631","article-title":"Applied cryptography: Protocols, algorithms, and source code in C","author":"schneier","year":"1996","journal-title":"Network"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.11.044"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.09.053"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012912"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2210706"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.12.021"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1173-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2009.10.106"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1214-z"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1177\/1077546314536919"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4585083"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2012.06.011"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4288-z"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2016.12.018"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1177\/1077546313482960"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.01.009"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09200618.pdf?arnumber=9200618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:56:01Z","timestamp":1639770961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9200618\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":85,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3024994","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}