{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T21:02:58Z","timestamp":1722978178897},"reference-count":34,"publisher":"International Academy Publishing (IAP)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.17706\/jsw.13.8.421-436","type":"journal-article","created":{"date-parts":[[2018,8,24]],"date-time":"2018-08-24T08:50:28Z","timestamp":1535100628000},"page":"421-436","source":"Crossref","is-referenced-by-count":1,"title":["Image Encryption Scheme Based on Amplitude Modulation of Chaotic Signals"],"prefix":"10.17706","volume":"13","author":[{"name":"Department of Physics and Key Laboratory of Low-dimensional Quantum Structures and Quantum Control of Ministry of Education, Hunan Normal University, Changsha, 410081, China.","sequence":"first","affiliation":[]},{"given":"Chunlai","family":"Li","sequence":"first","affiliation":[]},{"given":"Wenhua","family":"Hai","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2018,8]]},"reference":[{"key":"ref0","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","article-title":"A novel image encryption scheme based on improved hyperchaotic sequences","volume":"285","author":"Zhu","year":"2012","unstructured":"[1] Zhu C. (2012). A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun, 285, 29-37.","journal-title":"Opt Commun"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1142\/s0129183114500697","article-title":"An image encryption algorithm based on 3D cellular automata and chaotic maps","author":"Del","year":"2015","unstructured":"[2] Del, R. A. M., & S\u00e1nchez, G. R. (2015). An image encryption algorithm based on 3D cellular automata and chaotic maps. Int J Mod Phys C.","journal-title":"Int J Mod Phys C"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","author":"Alvarez","year":"2006","unstructured":"[3] Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifur Chaos.","journal-title":"Int J Bifur Chaos"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2014.05.022","article-title":"A symmetrical image encryption scheme in wavelet and time domain","author":"Luo","year":"2015","unstructured":"[4] Luo, Y., Du, M., & Liu, J. (2015). A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul.","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"ref4","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","article-title":"A new 1D chaotic system for image encryption","volume":"97","author":"Zhou","year":"2014","unstructured":"[5] Zhou, Y., Bao, L., & Chen, C. L. P. (2014). A new 1D chaotic system for image encryption. Signal Process, 97, 172-182.","journal-title":"Signal Process"},{"key":"ref5","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.optlaseng.2014.12.025","article-title":"Novel image encryption algorithm based on cycle shift and chaotic system","volume":"68","author":"Wang","year":"2015","unstructured":"[6] Wang, X. Y., Gu, S. X., & Zhang, Y. Q. (2015). Novel image encryption algorithm based on cycle shift and chaotic system, Opt Laser Eng, 68, 126-134.","journal-title":"Opt Lasers Eng","ISSN":"http:\/\/id.crossref.org\/issn\/0143-8166","issn-type":"print"},{"key":"ref6","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.optlastec.2013.05.023","article-title":"A review of optical image encryption techniques","volume":"57","author":"Liu","year":"2014","unstructured":"[7] Liu, S., Guo, C., & Sheridan, J. T. (2014). A review of optical image encryption techniques. Opt Laser Technol, 57, 327-342.","journal-title":"Opt Laser Technol"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1063\/1.4886355","article-title":"Synchronization and an application of a novel fractional order King Cobra chaotic system","author":"Muthukumar","year":"2014","unstructured":"[8] Muthukumar, P., Balasubramaniam, P., & Ratnavelu, K. (2014). Synchronization and an application of a novel fractional order King Cobra chaotic system. Chaos.","journal-title":"Chaos"},{"key":"ref8","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11071-015-1979-3","article-title":"A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems","volume":"81","author":"Yao","year":"2015","unstructured":"[9] Yao, W., Zhang, X., Zheng, Z., & Qiu, W. (2015). A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems. Nonlinear Dyn, 81, 151-168.","journal-title":"Nonlinear Dyn"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X","article-title":"Symmetric ciphers based on two-dimensional chaotic maps","author":"Fridrich","year":"1998","unstructured":"[10] Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifur Chaos.","journal-title":"Int J Bifur Chaos"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2012.08.010","article-title":"A symmetric color image encryption algorithm using the intrinsic features of bit distributions","author":"Zhang","year":"2013","unstructured":"[11] Zhang, W., Wong, K., Yu, H., & Zhu, Z. (2013).A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simul.","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2013.06.031","article-title":"An image encryption scheme based on rotation matrix bit-level permutation and block diffusion","author":"Zhang","year":"2014","unstructured":"[12] Zhang, Y., & Xiao, D. (2014). An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul.","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"ref12","first-page":"1051","article-title":"Design and Arm-embedded implementation of a chaotic map-based real-time secure video communication system.","volume":"99","author":"Lin","year":"2014","unstructured":"[13] Lin, Z. S., Yu, S. M., L\u00fc, J. H., Cai, S. T., & Chen, G. R. (2014). Design and Arm-embedded implementation of a chaotic map-based real-time secure video communication system. IEEE Trans. Circuits Syst. Video Technol, 99, 1051-8215.","journal-title":"IEEE Trans Circ Syst Video Tech","ISSN":"http:\/\/id.crossref.org\/issn\/1051-8215","issn-type":"print"},{"key":"ref13","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.optlastec.2013.08.013","article-title":"Multiple-image encryption based on optical wavelet transform and multichannel fractional Fourier transform","volume":"57","author":"Kong","year":"2014","unstructured":"[14] Kong, D., & Shen, X. (2014). Multiple-image encryption based on optical wavelet transform and multichannel fractional Fourier transform. Opt Laser Technol, 57, 343-349.","journal-title":"Opt Laser Technol"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.08.068","article-title":"Fractional fourier-domain random encoding and pixel scrambling technique for double image encryption","author":"Zhong","year":"2012","unstructured":"[15] Zhong, Z., Chang, J., Shan, M. G., & Hao, B. G. (2012). Fractional fourier-domain random encoding and pixel scrambling technique for double image encryption. Opt Commun.","journal-title":"Opt Commun"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1063\/1.2728112","article-title":"Selective image encryption using a spatiotemporal chaotic system","author":"Xiang","year":"2007","unstructured":"[16] Xiang, T., Wong, K., & Liao, X. (2007). Selective image encryption using a spatiotemporal chaotic system. Chaos.","journal-title":"Chaos"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127410026563","article-title":"Cryptanalysis of Fridrich's chaotic image encryption","author":"Solak","year":"2010","unstructured":"[17] Solak, E., Cokal, C., Yildiz, O., & Biyikoglu T. (2010). Cryptanalysis of Fridrich's chaotic image encryption. Int J Bifur Chaos.","journal-title":"Int J Bifur Chaos"},{"key":"ref17","doi-asserted-by":"publisher","first-page":"033117","DOI":"10.1063\/1.2756297","article-title":"On the security of a spatiotemporal chaotic cryptosystem.","volume":"17","author":"Rhouma","year":"2017","unstructured":"[18] Rhouma, R., & Safya, B. (2017). On the security of a spatiotemporal chaotic cryptosystem. Chaos, 17, 033117.","journal-title":"Chaos","ISSN":"http:\/\/id.crossref.org\/issn\/1054-1500","issn-type":"print"},{"key":"ref18","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1016\/j.physleta.2009.02.030","article-title":"Cryptanalysis of a chaos-based image encryption algorithm","volume":"373","author":"Cokal","year":"2009","unstructured":"[19] Cokal, C., & Solak, E. (2009). Cryptanalysis of a chaos-based image encryption algorithm. Phys Lett A, 373, 1357-1360.","journal-title":"Phys Lett A"},{"key":"ref19","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1007\/s11071-013-0750-x","article-title":"Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack","volume":"72","author":"Zhang","year":"2013","unstructured":"[20] Zhang, Y., & Xiao, D. (2013). Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack. Nonlinear Dyn, 72, 751-756.","journal-title":"Nonlinear Dyn"},{"key":"ref20","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.1007\/s11071-014-1757-7","article-title":"Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system","volume":"79","author":"Zhu","year":"2014","unstructured":"[21] Zhu, C., Xu, S., & Hu, Y., et al. (2014). Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn, 79, 1511-1518.","journal-title":"Nonlinear Dyn"},{"key":"ref21","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","unstructured":"[22] Shannon, C. E. (1948). A mathematical theory of communication. Bell Syst Tech J., 27, 379-423.","journal-title":"Bell Syst Tech J"},{"key":"ref22","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-540-24635-0_12","article-title":"DNA-based cryptography","volume":"2950","author":"Gehani","year":"2003","unstructured":"[23] Gehani, A., Labean, T., & Reif, J. (2003). DNA-based cryptography. Lecture Notes in Computer Science, 2950, 233-249.","journal-title":"Lecture Notes in Computer Science"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.108.040504","article-title":"Quantum one-time pad in the presence of an eavesdropper","author":"Brand\u00e3o","year":"2012","unstructured":"[24] Brand\u00e3o, F., & Oppenheim, J. (2012).Quantum one-time pad in the presence of an eavesdropper. Phys Rev Lett, 108, 040504.","journal-title":"Phys Rev Lett 108 040504"},{"key":"ref24","doi-asserted-by":"publisher","first-page":"4029","DOI":"10.1016\/j.cnsns.2012.03.020","article-title":"One-time pad as a nonlinear dynamical system","volume":"17","author":"Nagaraj","year":"2012","unstructured":"[25] Nagaraj, N. (2012). One-time pad as a nonlinear dynamical system. Commun Nonlinear Sci Numer Simul, 17, 4029-4036.","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"ref25","doi-asserted-by":"publisher","first-page":"1931","DOI":"10.1142\/S0218127409023834","article-title":"A modified generalized Lorenz-type system and its canonical form","volume":"19","author":"Yang","year":"2009","unstructured":"[26] Yang, Q., Zhang, K., & Chen, G. (2009). A modified generalized Lorenz-type system and its canonical form. Int J Bifur Chaos, 19, 1931-1949.","journal-title":"Int J Bifur Chaos"},{"key":"ref26","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1142\/S0218127499001024","article-title":"Yet another chaotic attractor","volume":"9","author":"Chen","year":"1999","unstructured":"[27] Chen, G., & Ueta, T. (1999). Yet another chaotic attractor. Int J Bifur Chaos, 9, 1465-1466.","journal-title":"Int J Bifur Chaos"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1063\/1.3689438","article-title":"A class of Lorenz-like systems","author":"Lainscsek","year":"2012","unstructured":"[28] Lainscsek, C. (2012). A class of Lorenz-like systems. Chaos, 22, 013126.","journal-title":"Chaos 22 013126"},{"key":"ref28","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1142\/S0218127402004620","article-title":"A new chaotic attractor coined","volume":"12","author":"L\u00fc","year":"2002","unstructured":"[29] L\u00fc, J., & Chen, G. (2002). A new chaotic attractor coined. Int J Bifur Chaos, 12, 659-661.","journal-title":"Int J Bifur Chaos"},{"key":"ref29","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.physleta.2011.10.040","article-title":"Dynamical behaviors of a chaotic system with no equilibria","volume":"376","author":"Wei","year":"2011","unstructured":"[30] Wei, Z. (2011).Dynamical behaviors of a chaotic system with no equilibria. Phys Lett A, 376, 102-108.","journal-title":"Phys Lett A"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"66","DOI":"10.15388\/NA.18.1.14032","article-title":"A novel chaotic system and its topological horseshoe.","volume":"18","author":"Li","year":"2013","unstructured":"[31] Li, C., Wu, L., Li, H. M., & Tong, Y. N. (2013). A novel chaotic system and its topological horseshoe. Nonlinear Anal Model Control, 18, 66-77.","journal-title":"Nonlinear Anal Model Control"},{"key":"ref31","doi-asserted-by":"publisher","first-page":"031005","DOI":"10.1115\/1.4007910","article-title":"Adaptive sliding mode control for synchronization of a fractional-order chaotic system.","volume":"8","author":"Li","year":"2013","unstructured":"[32] Li, C., Su, K., & Wu, L. (2013). Adaptive sliding mode control for synchronization of a fractional-order chaotic system. J Comput Nonlinear Dynam, 8, 031005.","journal-title":"J Comput Nonlinear Dyn","ISSN":"http:\/\/id.crossref.org\/issn\/1555-1423","issn-type":"print"},{"issue":"10","key":"ref32","doi-asserted-by":"publisher","first-page":"2440","DOI":"10.1080\/00207721.2014.998741","article-title":"Synchronization of a fractional-order chaotic system using finite time input-to-state stability","volume":"47","author":"Li","year":"2016","unstructured":"[33] Li, C., & Zhang, J. (2016). Synchronization of a fractional-order chaotic system using finite time input-to-state stability. Int J Syst Sci., 47(10), 2440-2448.","journal-title":"Int J Syst Sci"},{"key":"ref33","volume-title":"La Cryptographie Militaire","author":"Kerckhoffs","year":"1978","unstructured":"[34] Kerckhoffs, A. (1978). La Cryptographie Militaire. University Microfilms."}],"container-title":["Journal of Software"],"original-title":[],"link":[{"URL":"http:\/\/www.jsoftware.us\/vol13\/345-JSW15338.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T22:11:08Z","timestamp":1571782268000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jsoftware.us\/index.php?m=content&c=index&a=show&catid=197&id=2886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":34,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,8]]}},"URL":"https:\/\/doi.org\/10.17706\/jsw.13.8.421-436","relation":{},"ISSN":["1796-217X"],"issn-type":[{"type":"electronic","value":"1796-217X"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}