<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.667740</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Electrical Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Elektrik Mühendisliği</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Performance Comparison of ACM and GRP Methods for Image Permutation</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-9624-7400</contrib-id>
                                                                <name>
                                    <surname>Oğraş</surname>
                                    <given-names>Hidayet</given-names>
                                </name>
                                                                    <aff>BATMAN ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-5249-7245</contrib-id>
                                                                <name>
                                    <surname>Fidan</surname>
                                    <given-names>Şehmus</given-names>
                                </name>
                                                                    <aff>BATMAN ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20200730">
                    <day>07</day>
                    <month>30</month>
                    <year>2020</year>
                </pub-date>
                                        <volume>8</volume>
                                        <issue>3</issue>
                                        <fpage>235</fpage>
                                        <lpage>241</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20191230">
                        <day>12</day>
                        <month>30</month>
                        <year>2019</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20200603">
                        <day>06</day>
                        <month>03</month>
                        <year>2020</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Permutation and substitution processes of an image are most widely used in image encryption algorithms as they are thought to increase system security in cryptography. Permutation is the first process that all pixel positions in an image are shuffled in specific order or randomly in order to break strong correlation between pixels. Secondly, substitution is used to change pixel values by mixing a secret key in the permutated image. In an ordinary image, adjacent pixels have close values so they have strong correlation and this correlation needs to be broken effectively before encryption. The degree to which this process is performed, directly affects the overall system security. In this paper, performance evaluations for Group (GRP) and Arnold’s Cat Map (ACM) method are analyzed through some numerical results and their performances are compared to figure out which one is better. Experimental results consist of numerical and visual results determined in Matlab R2015a.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Image</kwd>
                                                    <kwd>  GRP</kwd>
                                                    <kwd>  Arnold’s Cat Map</kwd>
                                                    <kwd>  Confusion</kwd>
                                                    <kwd>  Logistic Map</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">1.	Patidar, V., Pareek, N. K., Purohit, G., &amp; Sud, K. K. (2011). A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics communications, 284(19), 4331-4339.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">2.	Enayatifar, R., Abdullah, A. H., Isnin, I. F., Altameem, A., &amp; Lee, M. (2017). Image encryption using a synchronous permutation-diffusion technique. Optics and Lasers in Engineering, 90, 146-154.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">3.	Huang, L., Cai, S., Xiong, X., &amp; Xiao, M. (2019). On symmetric color image encryption system with permutation-diffusion simultaneous operation. Optics and Lasers in Engineering, 115, 7-20.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">4.	Belazi, A., El-Latif, A. A. A., &amp; Belghith, S. (2016). A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing, 128, 155-170.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">5.	Patro, K. A. K., &amp; Acharya, B. (2019). An efficient colour image encryption scheme based on 1-D chaotic maps. Journal of Information Security and Applications, 46, 23-41.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">6.	Huang, H., He, X., Xiang, Y., Wen, W., &amp; Zhang, Y. (2018). A compression-diffusion-permutation strategy for securing image. Signal Processing, 150, 183-190.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">7.	Oğraş, H., &amp; Türk, M. (2017). A Robust Chaos-Based Image Cryptosystem with an Improved Key Generator and Plain Image Sensitivity Mechanism. J. Inf. Secur, 8, 23-41.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">8.	Patro, K. A. K., &amp; Acharya, B. (2018). Secure multi–level permutation operation based multiple colour image encryption. Journal of information security and applications, 40, 111-133.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">9.	Ping, P., Xu, F., Mao, Y., &amp; Wang, Z. (2018). Designing permutation–substitution image encryption networks with Henon map. Neurocomputing, 283, 53-63.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">10.	Oğraş, H., &amp; Türk, M. (2016). A Secure Chaos-based Image Cryptosystem with an Improved Sine Key Generator. American Journal of Signal Processing, 6(3), 67-76.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">11.	Chen, F., Wong, K. W., Liao, X., &amp; Xiang, T. (2014). Period distribution of generalized discrete Arnold cat map. Theoretical Computer Science, 552, 13-25.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">12.	Abbas, N. A. (2016). Image encryption based on independent component analysis and arnold’s cat map. Egyptian informatics journal, 17(1), 139-146.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">13.	Chai, X., Fu, X., Gan, Z., Lu, Y., &amp; Chen, Y. (2019). A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Processing, 155, 44-62.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">4.	Dhall, S., Pal, S. K., &amp; Sharma, K. (2018). A chaos-based probabilistic block cipher for image encryption. Journal of King Saud University-Computer and Information Sciences.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">15.	Nazari, S., Moin, M. S., &amp; Kanan, H. R. (2016). A face template protection approach using chaos and GRP permutation. Security and Communication Networks, 9(18), 4957-4972.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">16.	Hua, Z., &amp; Zhou, Y. (2016). Image encryption using 2D Logistic-adjusted-Sine map. Information Sciences, 339, 237-253.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">17.	Xiangdong, L. I. U., Junxing, Z., Jinhai, Z., &amp; Xiqin, H. (2008). Image scrambling algorithm based on chaos theory and sorting transformation. IJCSNS International Journal of Computer Science and Network Security, 8(1), 64-68.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
