{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T23:17:17Z","timestamp":1773011837805,"version":"3.50.1"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3226319","type":"journal-article","created":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T20:46:29Z","timestamp":1669927589000},"page":"126304-126314","source":"Crossref","is-referenced-by-count":11,"title":["CASDC: A Cryptographically Secure Data System Based on Two Private Key Images"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2489-4857","authenticated-orcid":false,"given":"Mua'ad","family":"Abu-Faraj","sequence":"first","affiliation":[{"name":"Department of Computer Information Systems, The University of Jordan, Aqaba, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0295-9691","authenticated-orcid":false,"given":"Abeer","family":"Al-Hyari","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Al-Balqa Applied University, As-Salt, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8775-0581","authenticated-orcid":false,"given":"Ismail","family":"Al-Taharwa","sequence":"additional","affiliation":[{"name":"Department of Computer Information Systems, The University of Jordan, Aqaba, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1267-1026","authenticated-orcid":false,"given":"Bilal","family":"Al-Ahmad","sequence":"additional","affiliation":[{"name":"Department of Computer Information Systems, The University of Jordan, Aqaba, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4734-8605","authenticated-orcid":false,"given":"Ziad","family":"Alqadi","sequence":"additional","affiliation":[{"name":"Department of Computers and Networks Engineering, Al-Balqa Applied University, Amman, Jordan"}]}],"member":"263","reference":[{"key":"ref39","first-page":"45","article-title":"A comparative study of symmetric cryptography mechanism on DES AES and EB64 for information security","volume":"8","author":"logunleko","year":"2020","journal-title":"Int J Sci Res Comput Sci Eng"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCDS53736.2022.9760971"},{"key":"ref33","first-page":"1","article-title":"Comparative analysis of encryption algorithms for data communication","volume":"2","author":"seth","year":"2011","journal-title":"Int J Comput Sci Technol"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2009.5346839"},{"key":"ref30","first-page":"407","article-title":"Image encryption using block-based transformation algorithm","volume":"35","author":"younes","year":"2008","journal-title":"Int J Comput Sci"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0271-4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICITACEE.2018.8576929"},{"key":"ref35","first-page":"344","article-title":"A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish","author":"dibas","year":"2021","journal-title":"Proc of Int Conf on Ind Tech (ICIT)"},{"key":"ref34","first-page":"196","article-title":"Superiority of blowfish algorithm","volume":"2","author":"mandal","year":"2012","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"key":"ref60","first-page":"708","article-title":"Cryptanalysis of a chaotic image encryption method","volume":"2","author":"li","year":"2002","journal-title":"Proc IEEE Int Symp Circuits Syst"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127410026563"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"ref63","article-title":"On the inadequacy of the logistic map for cryptographic applications","author":"arroyo","year":"2008","journal-title":"arXiv 0805 4355"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.07.008"},{"key":"ref27","first-page":"44","article-title":"Evaluation of the RC4 algorithm for data encryption","volume":"3","author":"mousa","year":"2006","journal-title":"Int J Comput Sci Appl"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3390\/e21080815"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/30.883383"},{"key":"ref2","first-page":"98","article-title":"A review on asymmetric cryptography&#x2014;RSA and ElGamal algorithm","volume":"2","author":"shetty","year":"2014","journal-title":"Int J Innov Res Comput Commun Eng"},{"key":"ref1","first-page":"68","article-title":"Comparative study of symmetric and asymmetric cryptography techniques","volume":"1","author":"tripathi","year":"2014","journal-title":"Int J Adv Found Res Comput"},{"key":"ref20","first-page":"11","article-title":"Partial encryption of images for real-time applications","author":"van droogenbroeck","year":"2004","journal-title":"Proc 4th IEEE Signal Process Symp"},{"key":"ref22","author":"stallings","year":"2006","journal-title":"Cryptography and Network Security 4\/E"},{"key":"ref21","first-page":"280","article-title":"Performance evaluation of symmetric encryption algorithms","volume":"8","author":"elminaam","year":"2008","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref24","first-page":"321","article-title":"A study of new trends in blowfish algorithm","volume":"1","author":"singh","year":"2011","journal-title":"Int J Eng Res Appl"},{"key":"ref23","first-page":"125","article-title":"Comparison of data encryption algorithms","volume":"2","author":"singh","year":"2011","journal-title":"Int J Comput Sci Commun"},{"key":"ref26","article-title":"A hybrid cryptosystem based on Vigenere cipher and columnar transposition cipher","author":"kester","year":"2013","journal-title":"arXiv 1307 7786"},{"key":"ref25","first-page":"877","article-title":"A comparative survey on symmetric key encryption techniques","volume":"4","author":"agrawal","year":"2012","journal-title":"Int J Comput Sci Eng"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.26483\/ijarcs.v11i5.6655"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965740"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2015.03.079"},{"key":"ref58","first-page":"73","article-title":"A survey on image encryption schemes","volume":"4","author":"kumari","year":"2017","journal-title":"International Journal of Engineering Research & Innovation"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3926-9"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-015-0062-7"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0652-6"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2011.11.003"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"1995","DOI":"10.1007\/s11071-012-0402-6","article-title":"An intertwining chaotic maps based image encryption scheme","volume":"69","author":"sam","year":"2012","journal-title":"Nonlinear Dyn"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s20092468"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/420\/1\/012111"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2018.01.014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/sym14040664"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3187317"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18280\/ts.390117"},{"key":"ref16","first-page":"648","article-title":"Rounds reduction and blocks controlling to enhance the performance of standard method of data cryptography","volume":"21","author":"abu-faraj","year":"2021","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-017-0148-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT52682.2021.9491727"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.48084\/etasr.2525"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.04.002"},{"key":"ref3","first-page":"3531","article-title":"Improvement of classical cipher algorithm based on a new model of timed-released encryption","volume":"14","author":"alisawi","year":"2019","journal-title":"Int J Appl Eng Res"},{"key":"ref6","first-page":"1215","article-title":"A k-means approach for map-reduce model and social network privacy protection","volume":"7","author":"yin","year":"2016","journal-title":"J Inf Hiding Multimedia Signal Process"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.08.135"},{"key":"ref8","first-page":"872","article-title":"An efficient and secure cipher-text retrieval scheme based on mixed homomorphic encryption and multi-attribute sorting method","volume":"20","author":"teng","year":"2018","journal-title":"Int J Netw Secur"},{"key":"ref7","first-page":"155","article-title":"An improved image encryption algorithm based on chaotic mapping and discrete wavelet transform domain","volume":"22","author":"meng","year":"2020","journal-title":"Int J Netw Secur"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.29322\/IJSRP.8.7.2018.p7978"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.18576\/amis\/130618","article-title":"Key exchange techniques based on secured energy efficiency in mobile cloud computing","volume":"13","author":"karthikeyan","year":"2019","journal-title":"Appl Math Inf Sci"},{"key":"ref46","first-page":"256","article-title":"Symmetric encryption algorithms: Review and evaluation study","volume":"12","author":"alenezi","year":"2020","journal-title":"Int J Commun Netw Inf Secur"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.48084\/etasr.3745"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9774-9_27"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i2.16.11424"},{"key":"ref42","first-page":"100","article-title":"Medical image cryptanalysis using histogram matching bitplane and adjoin mapping algorithms","volume":"2","author":"anuradha","year":"2015","journal-title":"Int J Mag Eng Technol Manage Res"},{"key":"ref41","first-page":"451","article-title":"Improving the efficiency and scalability of standard methods for data cryptography","volume":"21","author":"abu-faraj","year":"2021","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.18280\/ts.390304"},{"key":"ref43","first-page":"306","article-title":"Cryptanalysis of AES-128 and AES-256 block ciphers using Lorenz information measure","volume":"13","author":"karuvandan","year":"2016","journal-title":"Int Arab J Inf Technol"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09968243.pdf?arnumber=9968243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:38:36Z","timestamp":1672083516000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9968243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3226319","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}