<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462021000300545</article-id>
<article-id pub-id-type="doi">10.13053/cys-25-3-3098</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Improved Color Image Encryption using Modified Modulus Substitution Cipher, Dual Random Key and Chaos Method]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Setiadi]]></surname>
<given-names><![CDATA[De Rosal Ignatius Moses]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Salam]]></surname>
<given-names><![CDATA[Abu]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rachmawanto]]></surname>
<given-names><![CDATA[Eko Hari]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sari]]></surname>
<given-names><![CDATA[Christy Atika]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Dian Nuswantoro University Department of Informatics Engineering ]]></institution>
<addr-line><![CDATA[Semarang ]]></addr-line>
<country>Indonesia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2021</year>
</pub-date>
<volume>25</volume>
<numero>3</numero>
<fpage>545</fpage>
<lpage>556</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462021000300545&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462021000300545&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462021000300545&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: This study proposes the hybrid substitution cryptography method followed by chaotic methods to improve the security of digital image transactions on the internet. The substitution method used is a hybrid of the modification of the Vigenčreand Beaufort cipher algorithm. To do a hybrid, two random keys are used. The first random key is a matrix with 8-bits integer values, while the second random key is a matrix that contains binary values. The modulus operation is used in the main process of substitution methods. In this study, 24-bits true-color image was used as a dataset for the testing experiment. Measurement of encryption quality is measured by Entropy, MSE, PSNR, SSIM, UACI, and NPCR, whereas tic toc functions for measuring the computational time needed. To ensure the decryption process runs perfectly, measuring instruments such as SSIM, MSE, and PSNR are used to compare the decrypted image with the original image, the tic toc function is also used to measure computing performance. Based on the results of testing the quality of image encryption proved to have excellent results where the entropy value is close to 8, the ideal NPCR and UACI values, as well as excellent visual values based on MSE, PSNR and SSIM measurements. The image can also be decrypted perfectly with relatively fast computing time in the encryption and decryption process.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Image encryption]]></kwd>
<kwd lng="en"><![CDATA[substitution cipher]]></kwd>
<kwd lng="en"><![CDATA[modulus operation]]></kwd>
<kwd lng="en"><![CDATA[random key]]></kwd>
<kwd lng="en"><![CDATA[hybrid cryptography]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Setyono]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[De Rosal-Ignatius]]></surname>
<given-names><![CDATA[M.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Muljono]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dual encryption techniques for secure image transmission]]></article-title>
<source><![CDATA[Journal of Telecommunication, Electronic and Computer Engineering]]></source>
<year>2018</year>
<volume>10</volume>
<numero>3-2</numero>
<issue>3-2</issue>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Diab]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2018</year>
<volume>6</volume>
<page-range>42227-44</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Setiadi]]></surname>
<given-names><![CDATA[D.R.I.M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Improved payload capacity in LSB Image Steganography uses dilated hybrid edge detection]]></article-title>
<source><![CDATA[Journal of King Saud University - Computer and Information Sciences]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ravichandran]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Praveenkumar]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Rayappan]]></surname>
<given-names><![CDATA[J.B.B.]]></given-names>
</name>
<name>
<surname><![CDATA[Amirtharajan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[DNA Chaos blend to secure medical privacy]]></article-title>
<source><![CDATA[IEEE Trans. Nanobioscience]]></source>
<year>2017</year>
<volume>16</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>850-8</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Irawan]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[De Rosal-Ignatius]]></surname>
<given-names><![CDATA[M.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rachmawanto]]></surname>
<given-names><![CDATA[E.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Sari]]></surname>
<given-names><![CDATA[C.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Doheir]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hybrid encryption using confused and stream cipher to improved medical images security]]></article-title>
<source><![CDATA[J. Phys. Conf. Ser.]]></source>
<year>2019</year>
<volume>1201</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>012022</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rathidevi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yaminipriya]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Sudha]]></surname>
<given-names><![CDATA[S.V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Trends of cryptography stepping from ancient to moder]]></source>
<year>2017</year>
<conf-name><![CDATA[ IEEE International Conference on Innovations in Green Energy and Healthcare Technologies]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-9</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Combination of sharing matrix and image encryption for lossless (k,n)-secret image sharing]]></article-title>
<source><![CDATA[IEEE Trans. Image Process.]]></source>
<year>2017</year>
<volume>26</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>5618-31</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jolfaei]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[X.W.]]></given-names>
</name>
<name>
<surname><![CDATA[Muthukkumarasamy]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On the security of permutation-only image encryption schemes]]></article-title>
<source><![CDATA[IEEE Trans. Inf. Forensics Secur.]]></source>
<year>2016</year>
<volume>11</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>235-46</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cryptanalyzing an image-scrambling encryption algorithm of pixel bits]]></article-title>
<source><![CDATA[IEEE Multimed.]]></source>
<year>2017</year>
<volume>24</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>64-71</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An image encryption algorithm based on josephus traversing and mixed chaotic map]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2018</year>
<volume>6</volume>
<page-range>23733-46</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Venkata-Vidya-Deepthi]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Homer-Benny]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Sreenu]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Id]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Various ciphers in classical cryptography]]></article-title>
<source><![CDATA[Journal Phys. Conf. Ser.]]></source>
<year>2019</year>
<volume>1228</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mishra]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Pandey]]></surname>
<given-names><![CDATA[R.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparing classical encryption with modern techniques]]></article-title>
<source><![CDATA[Journal Phys. Sci. Eng. Technol.]]></source>
<year>2010</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>49-54</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Qunding]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital image encryption based on advanced encryption standard (AES) algorithm]]></source>
<year>2016</year>
<conf-name><![CDATA[ 5th International Conference on Instrumentation and Measurement, Computer, Communication, and Control]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1218-21</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pathak]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kamble]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Chaursia]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[An efficient data encryption standard image encryption technique with RGB random uncertainty]]></source>
<year>2014</year>
<conf-name><![CDATA[ International Conference on Reliability, Optimization and Information Technology]]></conf-name>
<conf-loc> </conf-loc>
<page-range>413-21</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A color image encryption with heterogeneous bit-permutation and correlated chaos]]></article-title>
<source><![CDATA[Opt. Commun.]]></source>
<year>2015</year>
<volume>342</volume>
<page-range>51-60</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ghadirli]]></surname>
<given-names><![CDATA[H.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Nodehi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Enayatifar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An overview of encryption algorithms in color images]]></article-title>
<source><![CDATA[Signal Processing]]></source>
<year>2019</year>
<volume>164</volume>
<page-range>163-85</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Setiadi]]></surname>
<given-names><![CDATA[D.R.I.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rachmawanto]]></surname>
<given-names><![CDATA[E.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Sari]]></surname>
<given-names><![CDATA[C.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Susanto]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Doheir]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A comparative study of image cryptographic method]]></source>
<year>2018</year>
<conf-name><![CDATA[ International Conference on Information Technology Computer, and Electrical Engineering (ICITACEE)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>336-41</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rekhate]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Tale]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sambhus]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Joshi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Secure and efficient message passing in distributed systems using one-time pad]]></source>
<year>2017</year>
<conf-name><![CDATA[ International Conference on Computing. Analytics and Security Trends]]></conf-name>
<conf-loc> </conf-loc>
<page-range>393-7</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alallayah]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Amin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Abd El-Wahed]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Alhamami]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Attack and construction of simulator for some of cipher systems using neuro-identifier]]></article-title>
<source><![CDATA[Int. Arab J. Inf. Technol.]]></source>
<year>2010</year>
<volume>7</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>365-72</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mushtaq Sher-Ali]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Hassan-Sarhan]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Enhancing security of vigenčrecipher by stream cipher]]></article-title>
<source><![CDATA[Int. J. Comput. Appl.]]></source>
<year>2014</year>
<volume>100</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>975-8887</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ge]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Image encryption based on singular value decomposition and Arnold transform in fractional domain]]></article-title>
<source><![CDATA[Opt. Commun.]]></source>
<year>2013</year>
<volume>291</volume>
<page-range>98-103</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alawida]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Samsudin]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sen-Teh]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Alkhawaldeh]]></surname>
<given-names><![CDATA[R.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new hybrid digital chaotic system with applications in image encryption]]></article-title>
<source><![CDATA[Signal Processing]]></source>
<year>2019</year>
<volume>160</volume>
<page-range>45-58</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="">
<collab>Ming Hsieh Department of Electrical Engineering USC Viterbi School of Engineering</collab>
<source><![CDATA[SIPI Image Database]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[X.Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[B.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Xie]]></surname>
<given-names><![CDATA[Y.Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Image encryption-then-transmission using DNA encryption algorithm and the double chaos]]></article-title>
<source><![CDATA[IEEE Photonics J.]]></source>
<year>2018</year>
<volume>10</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1-15</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abd El-Latif]]></surname>
<given-names><![CDATA[A.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Abd-El-Atty]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Talha]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Robust encryption of quantum medical images]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2017</year>
<volume>6</volume>
<page-range>1073-81</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mokhtar]]></surname>
<given-names><![CDATA[M.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gobran]]></surname>
<given-names><![CDATA[S.N.]]></given-names>
</name>
<name>
<surname><![CDATA[El-Badawy]]></surname>
<given-names><![CDATA[E. S.A.M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Colored image encryption algorithm using DNA code and Chaos theory]]></source>
<year>2015</year>
<conf-name><![CDATA[ 5th International Conference on Computer and Communication Engineering: Emerging Technologies via Comp-Unication Convergence]]></conf-name>
<conf-loc> </conf-loc>
<page-range>12-5</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Kadir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gong]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise]]></article-title>
<source><![CDATA[Opt. Commun.]]></source>
<year>2015</year>
<volume>338</volume>
<page-range>340-7</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mohammad-Seyedzadeh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mirzakuchaki]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map]]></article-title>
<source><![CDATA[Signal Processing]]></source>
<year>2012</year>
<volume>92</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1202-15</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hussain]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Gondal]]></surname>
<given-names><![CDATA[M.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Image encryption algorithm based on PGL(2,GF(2 8)) S-boxes and TD-ERCS chaotic sequence]]></article-title>
<source><![CDATA[Nonlinear Dyn.]]></source>
<year>2012</year>
<volume>70</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>181-7</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
