{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:13:24Z","timestamp":1761808404904},"reference-count":27,"publisher":"World Scientific Pub Co Pte Lt","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Image Grap."],"published-print":{"date-parts":[[2021,4]]},"abstract":"<jats:p> This paper proposes an image encryption technique which is fast and secure. The encryption scheme is designed for secure transmission of video surveillance data (keyframes) over insecure network. The image encryption technique employs 1D Sine\u2013Sine system with better chaotic properties than its seed map and faster than higher-dimensional chaotic systems. Further, design of encryption scheme is based on two permutation rounds, which employs pixel swapping operation and diffusion operation which is simple and provides required security against plaintext, differential and various other attacks. Three separate chaotic sequences are generated using 1D Sine\u2013Sine system which enhances the key space of the encryption scheme. Secret keys are updated dynamically with SHA-256 hash value obtained from plain image. Hash values of plain image are efficiently used without loss of any hash value information. This makes the encryption scheme plaintext sensitive and secure against plaintext attacks. Performance and security aspects of encryption scheme is analyzed both quantitatively using predefined security metrics and qualitatively by scrutinizing the internal working of encryption scheme. Computational complexity of encrypting a plain image of size [Formula: see text] is [Formula: see text] and is suitable for encrypting keyframes of video for secure surveillance applications. <\/jats:p>","DOI":"10.1142\/s0219467821500224","type":"journal-article","created":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T07:36:47Z","timestamp":1604129807000},"page":"2150022","source":"Crossref","is-referenced-by-count":11,"title":["A Fast Encryption Scheme Suitable for Video Surveillance Applications Using SHA-256 Hash Function and 1D Sine\u2013Sine Chaotic Map"],"prefix":"10.1142","volume":"21","author":[{"given":"Kirtee","family":"Panwar","sequence":"first","affiliation":[{"name":"USICT, Guru Gobind Singh Indraprastha University, New Delhi, India"}]},{"given":"Ravindra Kumar","family":"Purwar","sequence":"additional","affiliation":[{"name":"USICT, Guru Gobind Singh Indraprastha University, New Delhi, India"}]},{"given":"Garima","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Ambedkar Institute of Advanced Communication Technologies and Research, New Delhi, India"}]}],"member":"219","published-online":{"date-parts":[[2020,12,19]]},"reference":[{"key":"S0219467821500224BIB001","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(98)00086-3"},{"key":"S0219467821500224BIB003","doi-asserted-by":"publisher","DOI":"10.1109\/81.915385"},{"key":"S0219467821500224BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2009.5346839"},{"key":"S0219467821500224BIB005","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418500475"},{"key":"S0219467821500224BIB006","first-page":"1","author":"Wang X.","year":"2019","journal-title":"Multimedia Tools Appl."},{"key":"S0219467821500224BIB007","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418500104"},{"key":"S0219467821500224BIB008","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.11.005"},{"key":"S0219467821500224BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.08.008"},{"key":"S0219467821500224BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1997.638097"},{"key":"S0219467821500224BIB011","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2012.12.012"},{"key":"S0219467821500224BIB012","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.11.009"},{"key":"S0219467821500224BIB013","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812080"},{"key":"S0219467821500224BIB014","first-page":"102361","volume":"48","author":"Li C.","year":"2019","journal-title":"J. Inform. Security Appl."},{"key":"S0219467821500224BIB015","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127411029641"},{"key":"S0219467821500224BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2018.2873472"},{"key":"S0219467821500224BIB017","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883690"},{"key":"S0219467821500224BIB018","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127419501037"},{"issue":"5","key":"S0219467821500224BIB019","first-page":"053037","volume":"27","author":"Panwar K.","year":"2018","journal-title":"J. Electron. Imag."},{"key":"S0219467821500224BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2791944"},{"key":"S0219467821500224BIB021","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2014.07.002"},{"key":"S0219467821500224BIB022","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.03.011"},{"key":"S0219467821500224BIB024","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2682561"},{"key":"S0219467821500224BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4426-4"},{"key":"S0219467821500224BIB026","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762405"},{"key":"S0219467821500224BIB027","author":"Hamza R.","year":"2019","journal-title":"Inform. Sci."},{"issue":"11","key":"S0219467821500224BIB028","doi-asserted-by":"crossref","first-page":"1650193","DOI":"10.1142\/S0218127416501935","volume":"26","author":"Di X.","year":"2016","journal-title":"Int. J. Bifur. Chaos"},{"key":"S0219467821500224BIB029","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2018.04.030"}],"container-title":["International Journal of Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219467821500224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T09:41:22Z","timestamp":1620121282000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219467821500224"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,19]]},"references-count":27,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10.1142\/S0219467821500224"],"URL":"https:\/\/doi.org\/10.1142\/s0219467821500224","relation":{},"ISSN":["0219-4678","1793-6756"],"issn-type":[{"value":"0219-4678","type":"print"},{"value":"1793-6756","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,19]]}}}