{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:39:15Z","timestamp":1777703955424,"version":"3.51.4"},"reference-count":21,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2018,5,19]],"date-time":"2018-05-19T00:00:00Z","timestamp":1526688000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,8,26]]},"abstract":"<jats:p>The augmented growing of visual cryptography in multimedia image transmission or data transmission over unsecured networks leads in safekeeping for confidential information. Generally two techniques are employed to afford secure transmission namely data hiding and cryptography. Cryptography is the main objective of recent research work in which the way of achieving secure transmission over the network be contingent on the interest of data encryption. This encryption process encrypts the constituent of data such as manuscript, image, audial, and audiovisual to make the data unconceivable or incomprehensible during transmission. A novel secret key generation based on Improved Bat Optimized Piecewise Linear Chaotic Map is proposed for image encryption. Our proposed secret key is intended for image encryption owing to the progression of mixing, permutation, double diffusion and confusion with the size of 128 bit to perform secure transmission. The success of our proposed method is revealed by the tentative results and comparison with the existing techniques in terms of sensitivity analysis, Information Entropy, correlation coefficient and, Encryption speed.<\/jats:p>","DOI":"10.3233\/jifs-169696","type":"journal-article","created":{"date-parts":[[2018,5,22]],"date-time":"2018-05-22T10:54:47Z","timestamp":1526986487000},"page":"1567-1578","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure image encryption based on improved bat optimized piecewise linear chaotic map through integrated permutation-confusion and double diffusion"],"prefix":"10.1177","volume":"35","author":[{"given":"Rupesh Kumar","family":"Sinha","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, B.I.T. Mesra, Ranchi, India"}]},{"given":"S.S.","family":"Sahu","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, B.I.T. Mesra, Ranchi, India"}]}],"member":"179","published-online":{"date-parts":[[2018,5,19]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1492-0"},{"issue":"2","key":"e_1_3_1_3_2","first-page":"252","article-title":"Chaotic image encryption system using phase-magnitude transformation and pixel substitution","volume":"52","author":"Etemadi B.S.","year":"2013","unstructured":"EtemadiB.S. and EshghiM., Chaotic image encryption system using phase-magnitude transformation and pixel substitution, Telecommunication Systems52(2) (2013), 252\u2013537.","journal-title":"Telecommunication Systems"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.04.021"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.09.007"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.03.031"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2012.05.033"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2008.09.028"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2012.05.023"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2008-2"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.09.063"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2014.04.012"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.10.034"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-014-0768-0"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2007.11.011"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2015.12.002"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1292-9"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.07.040"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2014.08.005"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2465-7"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/30.883383"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","unstructured":"PareekK.N. PatidarV. and SudK.K. Diffusion\u2013substitution based gray image encryption scheme 23(3) (2013) 894\u2013901.","DOI":"10.1016\/j.dsp.2013.01.005"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169696","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169696","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:40:04Z","timestamp":1777455604000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169696"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,19]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,8,26]]}},"alternative-id":["10.3233\/JIFS-169696"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169696","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,19]]}}}