{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:09:51Z","timestamp":1774631391288,"version":"3.50.1"},"reference-count":22,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2012,3,7]],"date-time":"2012-03-07T00:00:00Z","timestamp":1331078400000},"content-version":"vor","delay-in-days":66,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Journal of Electrical and Computer Engineering"],"published-print":{"date-parts":[[2012,1]]},"abstract":"<jats:p>In the past few years, several encryption algorithms based on chaotic systems have been proposed\nas means to protect digital images against cryptographic attacks. These encryption algorithms typically\nuse relatively small key spaces and thus offer limited security, especially if they are one\u2010dimensional. \nIn this paper, we proposed a novel image encryption algorithm based on Rubik\u2032s cube principle. The\noriginal image is scrambled using the principle of Rubik\u2032s cube. Then, XOR operator is applied to rows\nand columns of the scrambled image using two secret keys. Finally, the experimental results and security\nanalysis show that the proposed image encryption scheme not only can achieve good encryption and\nperfect hiding ability but also can resist  exhaustive attack, statistical attack, and differential attack.<\/jats:p>","DOI":"10.1155\/2012\/173931","type":"journal-article","created":{"date-parts":[[2012,3,7]],"date-time":"2012-03-07T21:00:34Z","timestamp":1331154034000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":100,"title":["A Secure Image Encryption Algorithm Based on  Rubik\u2032s Cube Principle"],"prefix":"10.1155","volume":"2012","author":[{"given":"Khaled","family":"Loukhaoukha","sequence":"first","affiliation":[]},{"given":"Jean-Yves","family":"Chouinard","sequence":"additional","affiliation":[]},{"given":"Abdellah","family":"Berdai","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2012,3,7]]},"reference":[{"key":"e_1_2_5_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2010.12.005"},{"key":"e_1_2_5_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2010.07.005"},{"key":"e_1_2_5_3_2","first-page":"345","article-title":"Image encryption by using gyrator transform and Arnold transform","volume":"2","author":"Liu Z.","year":"1993","journal-title":"Journal of Electronic Imaging"},{"key":"e_1_2_5_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2068289"},{"key":"e_1_2_5_5_2","doi-asserted-by":"publisher","DOI":"10.1049\/el:19981335"},{"key":"e_1_2_5_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.02.039"},{"key":"e_1_2_5_7_2","doi-asserted-by":"crossref","unstructured":"ZhaoX.-Y.andChenG. Ergodic matrix in image encryption 4875 Proceedings of the 2nd International Conference on Image and Graphics August 2002 394\u2013401.","DOI":"10.1117\/12.477171"},{"key":"e_1_2_5_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.11.009"},{"key":"e_1_2_5_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2009.02.044"},{"key":"e_1_2_5_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"e_1_2_5_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071\u2010010\u20109749\u20108"},{"key":"e_1_2_5_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.12.011"},{"key":"e_1_2_5_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2008.01.003"},{"key":"e_1_2_5_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2007.08.052"},{"key":"e_1_2_5_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2009.03.084"},{"key":"e_1_2_5_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2009.09.023"},{"key":"e_1_2_5_17_2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_2_5_18_2","volume-title":"Chaos in Dynamical Systems","author":"Edward O.","year":"2003"},{"key":"e_1_2_5_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(98)00086-3"},{"key":"e_1_2_5_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0375\u20109601(03)00259\u20107"},{"key":"e_1_2_5_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2005.02.083"},{"key":"e_1_2_5_22_2","doi-asserted-by":"publisher","DOI":"10.4103\/0256\u20104602.64605"}],"container-title":["Journal of Electrical and Computer Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2012\/173931.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2012\/173931.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2012\/173931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T12:14:00Z","timestamp":1718194440000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2012\/173931"}},"subtitle":[],"editor":[{"given":"Fouad","family":"Khelifi","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1155\/2012\/173931"],"URL":"https:\/\/doi.org\/10.1155\/2012\/173931","archive":["Portico"],"relation":{},"ISSN":["2090-0147","2090-0155"],"issn-type":[{"value":"2090-0147","type":"print"},{"value":"2090-0155","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1]]},"assertion":[{"value":"2011-08-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-11-15","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-03-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"173931"}}