{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T05:57:13Z","timestamp":1715061433334},"reference-count":13,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7,1]]},"abstract":"<p>In this paper, the authors propose an image encryption scheme based on the development of a H\u00e9non chaotic map using fractional Fourier transform (FRFT) which is introduced to satisfy the necessity of high secure image. This proposed algorithm combines the main advantages of confusion and diffusion with (FRFT), it use Arnold Cat map for confusion and H\u00e9non chaotic map or one of the proposed H\u00e9non chaotic maps for diffusion. The proposed algorithm is compared with some image encryption algorithms based on Arnold Cat map, Baker chaotic map, H\u00e9non chaotic map and RC6. The authors perform a comparison between them in several experimental tests as statistical analyses, processing time and security analysis. The authors find from these comparison tests that the proposed algorithm demonstrates good result even better than RC6 and other chaotic maps in some cases.<\/p>","DOI":"10.4018\/ijsita.2014070105","type":"journal-article","created":{"date-parts":[[2015,3,23]],"date-time":"2015-03-23T13:51:02Z","timestamp":1427118662000},"page":"62-77","source":"Crossref","is-referenced-by-count":5,"title":["Image Encryption Based on Development of H\u00e9non Chaotic Maps using Fractional Fourier Transform"],"prefix":"10.4018","volume":"5","author":[{"given":"Mona F. M.","family":"Mursi","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Benha University, Qalyubia, Egypt"}]},{"given":"Hossam Eldin H.","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication, Menufiya University, Menufiya, Egypt"}]},{"given":"Fathi E. Abd","family":"El-Samie","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Menufiya University, Menufia, Egypt"}]},{"given":"Ayman H. Abd","family":"El-Aziem","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Shubra Faculty of Engineering, Benha University, Qalyubia, Egypt"}]}],"member":"2432","reference":[{"key":"ijsita.2014070105-0","doi-asserted-by":"publisher","DOI":"10.1109\/ICEE.2007.4287293"},{"key":"ijsita.2014070105-1","unstructured":"Ashutosh, D. S. (2013). Image encryption using discrete fourier transform and fractional fourier transform. IJEAT, 2(4)."},{"key":"ijsita.2014070105-2","first-page":"241","article-title":"Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms.","author":"N.El-Fishawy","year":"2007","journal-title":"International Journal of Network Security"},{"key":"ijsita.2014070105-3","doi-asserted-by":"crossref","unstructured":"Faragallah, O. S., Nigm, E. M., El-Fishawy, N. A., & Abu Zaid, O. M. (2013). A proposed encryption scheme based on H\u00e9non chaotic system (PESH) for image security. IJCA, 61(5).","DOI":"10.5120\/9925-4549"},{"key":"ijsita.2014070105-4","first-page":"1105","article-title":"Image encryption based on chaotic maps.","volume":"Vol. 2","author":"J.Fridrich","year":"1997","journal-title":"Proc. IEEE Int. Conference on Systems, Man and Cybernetics"},{"key":"ijsita.2014070105-5","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"ijsita.2014070105-6","unstructured":"Guo-hui, L., Shi-ping, Z., De-ming, X., & Jian-wen, L. (2001). An intermittent linear feedback method for controlling H\u00e9non-like attractor. Journal of Applied Sciences, 288\u2013290."},{"key":"ijsita.2014070105-7","doi-asserted-by":"publisher","DOI":"10.9790\/0661-0968083"},{"key":"ijsita.2014070105-8","article-title":"A novel algorithm for scrambling digital image based on cat chaotic mapping.","author":"Z.Liehuang","year":"2006","journal-title":"Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06)"},{"key":"ijsita.2014070105-9","article-title":"Review of different image encryption techniques.","author":"V. S.Nemade","year":"2012","journal-title":"Proceedings of the National Conference on Emerging Trends in Computer Technology (NCETCT)"},{"key":"ijsita.2014070105-10","unstructured":"Patel, K. D., & Belani, S. (2011). Image encryption using different techniques: A review. IJETAE, 1(1)."},{"key":"ijsita.2014070105-11","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.99"},{"key":"ijsita.2014070105-12","doi-asserted-by":"crossref","unstructured":"Wei-bin, C., & Xin, Z. (2009). Image encryption algorithm based on H\u00e9non chaotic system. 978-1-4244-3986-7\/09\/\u00a9 IEEE.","DOI":"10.1109\/IASP.2009.5054653"}],"container-title":["International Journal of Strategic Information Technology and Applications"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=125562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:00:45Z","timestamp":1654113645000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijsita.2014070105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,7,1]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijsita.2014070105","relation":{},"ISSN":["1947-3095","1947-3109"],"issn-type":[{"value":"1947-3095","type":"print"},{"value":"1947-3109","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,1]]}}}