Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion
A two-dimensional cross-mode hyperchaotic map based on logistic and sine maps (2D-CLSS) is presented. The hyperchaotic map consists of a logistic map and two sine maps with cross structure. The chaotic behavior of the system is analyzed using bifurcation diagrams, Lyapunov exponential spectra, phase...
Gespeichert in:
| Veröffentlicht in: | Information sciences Jg. 605; S. 71 - 85 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Elsevier Inc
01.08.2022
|
| Schlagworte: | |
| ISSN: | 0020-0255, 1872-6291 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | A two-dimensional cross-mode hyperchaotic map based on logistic and sine maps (2D-CLSS) is presented. The hyperchaotic map consists of a logistic map and two sine maps with cross structure. The chaotic behavior of the system is analyzed using bifurcation diagrams, Lyapunov exponential spectra, phase diagrams, etc. The outcomes demonstrate that the system has promising ergodicity and a wide range of hyperchaotic phenomena. Using the proposed 2D-CLSS, an image cryptography algorithm is developed. This image encryption system employs a strategy that simultaneously combines permutation and diffusion to alter the location and the value of the pixels. Experiments and security simulations indicate that the scheme is effective in encrypting images with excellent security against various attacks (differential, noise and data loss, etc.). |
|---|---|
| AbstractList | A two-dimensional cross-mode hyperchaotic map based on logistic and sine maps (2D-CLSS) is presented. The hyperchaotic map consists of a logistic map and two sine maps with cross structure. The chaotic behavior of the system is analyzed using bifurcation diagrams, Lyapunov exponential spectra, phase diagrams, etc. The outcomes demonstrate that the system has promising ergodicity and a wide range of hyperchaotic phenomena. Using the proposed 2D-CLSS, an image cryptography algorithm is developed. This image encryption system employs a strategy that simultaneously combines permutation and diffusion to alter the location and the value of the pixels. Experiments and security simulations indicate that the scheme is effective in encrypting images with excellent security against various attacks (differential, noise and data loss, etc.). |
| Author | Wang, Xingyuan Teng, Lin Xian, Yongjin |
| Author_xml | – sequence: 1 givenname: Lin surname: Teng fullname: Teng, Lin email: tenglin@mail.dlut.edu.com organization: School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China – sequence: 2 givenname: Xingyuan surname: Wang fullname: Wang, Xingyuan email: Wangxy@dlmu.edu.cn organization: School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China – sequence: 3 givenname: Yongjin surname: Xian fullname: Xian, Yongjin organization: School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China |
| BookMark | eNp9kMtqwzAQRUVJoUnaD-hOP2B3JEdSTFclfQUCXaRdC1mPRKktG8kp5O_r4K66yGrgMufCPTM0CW2wCN0TyAkQ_nDIfUg5BUpzYDkU9ApNyVLQjNOSTNAUgEIGlLEbNEvpAAALwfkUfa8btbPYBh1PXe_bgFW9a6Pv9w2uVLIGnyNMn7PVZrvF-1Nno96rtvcaN6rDx-TDDiffHOteBdseEx4-mmOvxrJgsPHODW9tuEXXTtXJ3v3dOfp6fflcvWebj7f16mmTaUpFnzENwlFmuDDCaW5AFEsBzkGpoAKrKihKYvSiGrKKKc4rWjLCWaE5CKFdMUdk7NWxTSlaJ7voGxVPkoA825IHOdiSZ1sSmBxsDYz4x2g_buij8vVF8nEk7TDpx9sok_aDT2t8tLqXpvUX6F_S7oip |
| CitedBy_id | crossref_primary_10_1109_JPHOT_2024_3443345 crossref_primary_10_1088_1402_4896_ad8d47 crossref_primary_10_1016_j_eswa_2024_123215 crossref_primary_10_1007_s00034_023_02427_x crossref_primary_10_1142_S0218127425500166 crossref_primary_10_1109_ACCESS_2023_3282370 crossref_primary_10_1088_1402_4896_ada324 crossref_primary_10_1007_s11760_023_02971_8 crossref_primary_10_1088_1402_4896_ad9428 crossref_primary_10_3390_e27060606 crossref_primary_10_1007_s11071_024_10053_8 crossref_primary_10_1007_s11071_023_08397_8 crossref_primary_10_1016_j_apm_2024_04_023 crossref_primary_10_1007_s11431_023_2584_y crossref_primary_10_1016_j_eswa_2025_129272 crossref_primary_10_1109_JIOT_2025_3579516 crossref_primary_10_1016_j_heliyon_2024_e31618 crossref_primary_10_1007_s11071_024_10331_5 crossref_primary_10_1007_s10489_025_06414_4 crossref_primary_10_1016_j_chaos_2024_115638 crossref_primary_10_1016_j_eswa_2024_125468 crossref_primary_10_1088_1402_4896_adb529 crossref_primary_10_1016_j_optlaseng_2025_109084 crossref_primary_10_3390_sym15081499 crossref_primary_10_1007_s11071_024_10856_9 crossref_primary_10_1007_s11071_024_09893_1 crossref_primary_10_1007_s11760_023_02925_0 crossref_primary_10_1016_j_ins_2023_02_057 crossref_primary_10_1117_1_JEI_34_2_023041 crossref_primary_10_3390_math11020457 crossref_primary_10_1109_ACCESS_2023_3257349 crossref_primary_10_3390_app13127113 crossref_primary_10_1088_1402_4896_ad14d1 crossref_primary_10_1007_s11042_023_16303_y crossref_primary_10_1049_ipr2_12858 crossref_primary_10_1088_1402_4896_ad32b6 crossref_primary_10_1109_TCSI_2023_3283877 crossref_primary_10_1049_ipr2_12974 crossref_primary_10_1016_j_isci_2024_110768 crossref_primary_10_1088_1402_4896_ad24a6 crossref_primary_10_1007_s11071_024_10284_9 crossref_primary_10_1007_s40747_024_01723_6 crossref_primary_10_1016_j_eswa_2024_125897 crossref_primary_10_1007_s11071_023_08538_z crossref_primary_10_1007_s11071_024_10220_x crossref_primary_10_1016_j_eswa_2025_128800 crossref_primary_10_1016_j_optlastec_2023_109655 crossref_primary_10_1007_s00500_023_09580_0 crossref_primary_10_1016_j_apacoust_2025_110705 crossref_primary_10_1109_ACCESS_2023_3311038 crossref_primary_10_3390_math12050638 crossref_primary_10_1109_TCE_2025_3547429 crossref_primary_10_3390_electronics12163455 crossref_primary_10_1007_s12596_024_02396_7 crossref_primary_10_1007_s00371_023_02876_0 crossref_primary_10_1007_s11042_024_20532_0 crossref_primary_10_1007_s11071_024_10415_2 crossref_primary_10_1016_j_compeleceng_2024_109850 crossref_primary_10_1007_s11042_023_17963_6 crossref_primary_10_1007_s11042_023_17236_2 crossref_primary_10_1088_1674_1056_ad2a69 crossref_primary_10_1016_j_jisa_2022_103391 crossref_primary_10_1016_j_eswa_2024_124287 crossref_primary_10_2174_0126662558298517240918034745 crossref_primary_10_1016_j_apm_2025_116278 crossref_primary_10_1007_s11554_024_01506_9 crossref_primary_10_3390_app13064034 crossref_primary_10_1016_j_sigpro_2024_109445 crossref_primary_10_3390_e26030254 crossref_primary_10_1088_1402_4896_addef7 crossref_primary_10_1007_s11042_024_19985_0 crossref_primary_10_1007_s11071_024_09646_0 crossref_primary_10_1007_s11042_024_18962_x crossref_primary_10_1016_j_compeleceng_2025_110569 crossref_primary_10_1109_TII_2023_3281659 crossref_primary_10_1080_09500340_2025_2486417 crossref_primary_10_1038_s41598_025_10485_1 crossref_primary_10_1007_s11071_023_08900_1 crossref_primary_10_1016_j_eswa_2024_123583 crossref_primary_10_1109_TCSVT_2024_3394951 crossref_primary_10_1007_s11071_025_11001_w crossref_primary_10_3390_math13091497 crossref_primary_10_1007_s10586_023_04126_3 crossref_primary_10_1007_s11071_023_09006_4 crossref_primary_10_1016_j_vlsi_2025_102416 crossref_primary_10_1109_ACCESS_2024_3357396 crossref_primary_10_1038_s41598_024_80969_z crossref_primary_10_32604_cmc_2023_036090 crossref_primary_10_1007_s00340_025_08412_3 crossref_primary_10_3389_fphy_2024_1494056 crossref_primary_10_1007_s12559_022_10040_4 crossref_primary_10_1007_s11071_023_08859_z crossref_primary_10_1016_j_eswa_2025_126883 crossref_primary_10_1016_j_eswa_2023_122052 crossref_primary_10_1109_TCSVT_2024_3375868 crossref_primary_10_1117_1_JEI_33_4_043026 crossref_primary_10_1016_j_jisa_2024_103791 crossref_primary_10_1109_JSEN_2023_3341428 crossref_primary_10_1007_s11042_023_17727_2 crossref_primary_10_1007_s11042_024_20537_9 crossref_primary_10_1109_TCSVT_2025_3543824 crossref_primary_10_26634_jele_15_2_21734 crossref_primary_10_1016_j_ins_2024_120332 crossref_primary_10_1007_s11042_023_17418_y crossref_primary_10_1109_TCSII_2023_3337145 crossref_primary_10_1016_j_jksuci_2023_101595 crossref_primary_10_1038_s41598_025_14784_5 crossref_primary_10_1007_s11071_024_10191_z crossref_primary_10_1007_s44352_025_00013_2 crossref_primary_10_1016_j_matcom_2025_03_019 crossref_primary_10_3390_e27080874 crossref_primary_10_1007_s11042_023_17034_w crossref_primary_10_1063_5_0229908 crossref_primary_10_1007_s12596_024_01655_x crossref_primary_10_1109_JIOT_2024_3432494 crossref_primary_10_1007_s11071_022_07949_8 crossref_primary_10_1016_j_optcom_2025_132023 crossref_primary_10_1016_j_jisa_2024_103785 crossref_primary_10_1007_s11071_024_10283_w crossref_primary_10_1016_j_eswa_2024_125854 crossref_primary_10_1016_j_eswa_2025_128448 crossref_primary_10_1007_s11227_023_05415_9 crossref_primary_10_1016_j_ins_2022_11_104 crossref_primary_10_1007_s11042_023_15286_0 crossref_primary_10_1007_s11071_022_08185_w crossref_primary_10_1109_TIE_2024_3429660 crossref_primary_10_1007_s10586_024_04746_3 crossref_primary_10_1109_JIOT_2025_3555524 crossref_primary_10_1088_1402_4896_ad3bf4 crossref_primary_10_1109_TIE_2023_3299016 crossref_primary_10_1007_s11071_024_10334_2 crossref_primary_10_1007_s11042_023_17969_0 crossref_primary_10_1007_s11042_024_19472_6 crossref_primary_10_3390_e24070900 crossref_primary_10_1016_j_jisa_2025_104085 crossref_primary_10_1016_j_eswa_2023_121452 crossref_primary_10_1016_j_eswa_2025_127475 crossref_primary_10_1016_j_chaos_2023_113449 crossref_primary_10_1016_j_chaos_2024_114959 crossref_primary_10_1109_TII_2024_3395631 crossref_primary_10_1016_j_eswa_2024_125328 crossref_primary_10_1007_s12524_024_01984_1 crossref_primary_10_1016_j_chaos_2023_113160 crossref_primary_10_1016_j_compag_2025_110594 crossref_primary_10_1109_ACCESS_2024_3510778 crossref_primary_10_1016_j_chaos_2024_115521 crossref_primary_10_1016_j_jfranklin_2025_107794 crossref_primary_10_1016_j_neunet_2025_107799 crossref_primary_10_1007_s11071_024_10841_2 crossref_primary_10_1007_s11071_025_10979_7 crossref_primary_10_1016_j_chaos_2024_114958 |
| Cites_doi | 10.1016/j.ins.2020.09.032 10.1016/j.sigpro.2017.03.033 10.1007/s11042-016-3862-8 10.1109/TMM.2018.2817065 10.1016/j.ins.2020.09.055 10.1155/2012/205391 10.1007/s11554-019-00917-3 10.1016/j.ins.2019.02.049 10.1142/S0218127420500601 10.1007/s00521-018-3541-y 10.1016/j.optlaseng.2019.105837 10.1109/TKDE.2018.2837745 10.1016/j.optlaseng.2015.12.004 10.1109/TKDE.2013.45 10.23919/JCC.2020.05.002 10.1007/s11071-021-06472-6 10.1016/j.optlaseng.2018.11.017 10.1109/MMUL.2021.3080579 10.1016/j.ins.2020.06.030 10.1007/s00521-018-3801-x 10.1016/j.optlaseng.2019.105995 10.1016/j.sigpro.2018.06.008 10.1109/TCSVT.2019.2947482 10.1007/s11042-021-10660-2 10.1016/j.ins.2014.03.128 10.1016/j.ins.2020.10.048 10.1016/j.optlaseng.2020.106040 10.12785/amis/080617 10.1016/j.sigpro.2018.10.011 10.1016/j.dsp.2019.07.013 10.1007/s11042-018-6015-4 10.1016/j.optlastec.2019.03.005 10.1007/s11071-020-05735-y 10.1016/j.sigpro.2018.03.010 10.1142/S0218127421501522 10.1016/j.optlaseng.2019.04.011 10.1109/TIFS.2015.2485163 10.1016/j.ins.2018.08.028 |
| ContentType | Journal Article |
| Copyright | 2022 Elsevier Inc. |
| Copyright_xml | – notice: 2022 Elsevier Inc. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.ins.2022.05.032 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Library & Information Science |
| EISSN | 1872-6291 |
| EndPage | 85 |
| ExternalDocumentID | 10_1016_j_ins_2022_05_032 S0020025522004522 |
| GroupedDBID | --K --M --Z -~X .DC .~1 0R~ 1B1 1OL 1RT 1~. 1~5 29I 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9JO AAAKF AAAKG AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AARIN AAXUO AAYFN ABAOU ABBOA ABEFU ABFNM ABJNI ABMAC ABTAH ABUCO ABXDB ABYKQ ACAZW ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADGUI ADJOM ADMUD ADTZH AEBSH AECPX AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIGVJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD APLSM ARUGR ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HAMUX HLZ HVGLF HZ~ H~9 IHE J1W JJJVA KOM LG9 LY1 M41 MHUIS MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SDS SES SEW SPC SPCBC SSB SSD SST SSV SSW SSZ T5K TN5 TWZ UHS WH7 WUQ XPP YYP ZMT ZY4 ~02 ~G- 77I 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO ADVLN AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c227t-5c07f25d67d7fc6d073870ff09a0b0eab0391dc4b0ffb5a66b2951653c6077cf3 |
| ISICitedReferencesCount | 153 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000814478300004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0020-0255 |
| IngestDate | Sat Nov 29 07:30:48 EST 2025 Tue Nov 18 21:12:24 EST 2025 Fri Feb 23 02:40:09 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Image encryption 2D hyperchaotic map Simultaneous permutation and diffusion Security analysis |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c227t-5c07f25d67d7fc6d073870ff09a0b0eab0391dc4b0ffb5a66b2951653c6077cf3 |
| PageCount | 15 |
| ParticipantIDs | crossref_primary_10_1016_j_ins_2022_05_032 crossref_citationtrail_10_1016_j_ins_2022_05_032 elsevier_sciencedirect_doi_10_1016_j_ins_2022_05_032 |
| PublicationCentury | 2000 |
| PublicationDate | August 2022 2022-08-00 |
| PublicationDateYYYYMMDD | 2022-08-01 |
| PublicationDate_xml | – month: 08 year: 2022 text: August 2022 |
| PublicationDecade | 2020 |
| PublicationTitle | Information sciences |
| PublicationYear | 2022 |
| Publisher | Elsevier Inc |
| Publisher_xml | – name: Elsevier Inc |
| References | Wu, Liao, Yang (b0160) 2018; 153 Hua, Zhu, Yi, Zhang, Huang (b0085) 2021; 546 Elhoseny, Shankar, Lakshmanaprabu, Maseleno, Arunkumar (b0045) 2020; 32 Talhaoui, Wang (b0105) 2021; 550 Tang, Zhang, Li, Zhang (b0120) 2016; 11 Abo-Hammour, Abu Arqub, Alsmadi, Momani, Alsaedi (b0010) 2014; 8 Farajallah, El Assad, Deforges (b0055) 2018; 77 Xu, Sun, Wang (b0175) 2020; 30 Enayatifar, Guimaraes, Siarry (b0050) 2019; 115 Abo-Hammour, Alsmadi, Momani, Abu (b0015) 2013; 17 Chen, Sun, Xu (b0035) 2020; 17 Xu, Sun, Cao, Zhu (b0180) 2019; 121 Abu Arqub, Abo-Hammour, Momani, Shawagfeh (b0025) 2012 Wang, Feng, Zhao (b0150) 2019; 486 Tang, Chen, Zhang, Zhang (b0110) 2019; 31 Pak, Kim, Pang, Song, Kim, Yun, Kim (b0095) 2021; 80 Zhang, He, Li, Wang (b0200) 2020; 128 Thakur, Singh, Ghrera (b0130) 2021; 33 Zhang, Zhang, Cao, Ma, Li (b0195) 2021 Zhou, Xu, Luo, Fan, Li (b0205) 2019; 93 Abd El-Latif, Abd-El-Atty, Venegas-Andraca (b0005) 2019; 116 Wang, Wang, Xu (b0145) 2020; 128 Tang, Zhang, Zhang (b0125) 2014; 26 Wang, Wang, Xia, Zhang (b0140) 2019; 470 Tang, Song, Zhang, Sun (b0115) 2016; 80 Tong, Liu, Liu, Zhang, Wang (b0135) 2021; 31 Gan, Chai, Han, Chen (b0060) 2019; 31 Hua, Zhu, Chen, Li (b0080) 2021; 104 Qin, Ji, Zhang, Dong, Wang (b0100) 2017; 138 Xian, Wang (b0165) 2021; 547 Zear, Singh, Kumar (b0190) 2018; 77 Chen, Chen, Ma, Wang (b0040) 2020; 100 Hayat, Azam (b0065) 2019; 155 Luo, Qin, Xiang, Tan, Liu, Xiang (b0090) 2020; 17 Xian, Wang, Teng (b0170) 2021 Wang, Gao (b0155) 2020; 539 Yu, Li, Yu, Huang (b0185) 2020; 30 Hua, Jin, Xu, Huang (b0075) 2018; 149 Chai, Wu, Gan, Zhang, Chen, Nixon (b0030) 2020; 124 He, Huang, Tang, Huang (b0070) 2018; 20 Abu Arqub, Abo-Hammour (b0020) 2014; 279 Farajallah (10.1016/j.ins.2022.05.032_b0055) 2018; 77 Zhou (10.1016/j.ins.2022.05.032_b0205) 2019; 93 Abo-Hammour (10.1016/j.ins.2022.05.032_b0015) 2013; 17 Tang (10.1016/j.ins.2022.05.032_b0110) 2019; 31 Chen (10.1016/j.ins.2022.05.032_b0040) 2020; 100 Hua (10.1016/j.ins.2022.05.032_b0085) 2021; 546 Xian (10.1016/j.ins.2022.05.032_b0170) 2021 Zear (10.1016/j.ins.2022.05.032_b0190) 2018; 77 Wu (10.1016/j.ins.2022.05.032_b0160) 2018; 153 Hua (10.1016/j.ins.2022.05.032_b0075) 2018; 149 Wang (10.1016/j.ins.2022.05.032_b0155) 2020; 539 Enayatifar (10.1016/j.ins.2022.05.032_b0050) 2019; 115 Hayat (10.1016/j.ins.2022.05.032_b0065) 2019; 155 Zhang (10.1016/j.ins.2022.05.032_b0195) 2021 Chen (10.1016/j.ins.2022.05.032_b0035) 2020; 17 Pak (10.1016/j.ins.2022.05.032_b0095) 2021; 80 Wang (10.1016/j.ins.2022.05.032_b0140) 2019; 470 Chai (10.1016/j.ins.2022.05.032_b0030) 2020; 124 Talhaoui (10.1016/j.ins.2022.05.032_b0105) 2021; 550 Elhoseny (10.1016/j.ins.2022.05.032_b0045) 2020; 32 Zhang (10.1016/j.ins.2022.05.032_b0200) 2020; 128 Xu (10.1016/j.ins.2022.05.032_b0180) 2019; 121 Gan (10.1016/j.ins.2022.05.032_b0060) 2019; 31 He (10.1016/j.ins.2022.05.032_b0070) 2018; 20 Tong (10.1016/j.ins.2022.05.032_b0135) 2021; 31 Abu Arqub (10.1016/j.ins.2022.05.032_b0025) 2012 Xian (10.1016/j.ins.2022.05.032_b0165) 2021; 547 Wang (10.1016/j.ins.2022.05.032_b0150) 2019; 486 Hua (10.1016/j.ins.2022.05.032_b0080) 2021; 104 Luo (10.1016/j.ins.2022.05.032_b0090) 2020; 17 Thakur (10.1016/j.ins.2022.05.032_b0130) 2021; 33 Qin (10.1016/j.ins.2022.05.032_b0100) 2017; 138 Xu (10.1016/j.ins.2022.05.032_b0175) 2020; 30 Abo-Hammour (10.1016/j.ins.2022.05.032_b0010) 2014; 8 Wang (10.1016/j.ins.2022.05.032_b0145) 2020; 128 Abd El-Latif (10.1016/j.ins.2022.05.032_b0005) 2019; 116 Yu (10.1016/j.ins.2022.05.032_b0185) 2020; 30 Abu Arqub (10.1016/j.ins.2022.05.032_b0020) 2014; 279 Tang (10.1016/j.ins.2022.05.032_b0120) 2016; 11 Tang (10.1016/j.ins.2022.05.032_b0115) 2016; 80 Tang (10.1016/j.ins.2022.05.032_b0125) 2014; 26 |
| References_xml | – volume: 20 start-page: 2645 year: 2018 end-page: 2658 ident: b0070 article-title: JPEG image encryption with improved format compatibility and file size preservation publication-title: IEEE Trans. Multimedia – volume: 31 start-page: 2150152 year: 2021 ident: b0135 article-title: A novel lightweight block encryption algorithm based on combined chaotic S-box publication-title: Int. J. Bifurcation Chaos – year: 2021 ident: b0195 article-title: Characteristic analysis of 2D lag-complex logistic map and its application in image encryption publication-title: IEEE Multimedia – volume: 124 year: 2020 ident: b0030 article-title: An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding publication-title: Opt. Lasers Eng. – volume: 116 start-page: 92 year: 2019 end-page: 102 ident: b0005 article-title: A novel image steganography technique based on quantum substitution boxes publication-title: Opt. Laser Technol. – volume: 486 start-page: 340 year: 2019 end-page: 358 ident: b0150 article-title: Fast image encryption algorithm based on parallel computing system publication-title: Inf. Sci. – volume: 153 start-page: 11 year: 2018 end-page: 23 ident: b0160 article-title: Image encryption using 2D Henon-Sine map and DNA approach publication-title: Signal Process. – volume: 77 start-page: 4863 year: 2018 end-page: 4882 ident: b0190 article-title: A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine publication-title: Multimedia Tools Appl. – volume: 30 start-page: 4467 year: 2020 end-page: 4480 ident: b0185 article-title: Multimodal transformer with multi-view visual representation for image captioning publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 104 start-page: 4505 year: 2021 end-page: 4522 ident: b0080 article-title: Color image encryption using orthogonal Latin squares and a new 2D chaotic system publication-title: Nonlinear Dyn. – volume: 77 start-page: 28225 year: 2018 end-page: 28248 ident: b0055 article-title: Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion publication-title: Multimedia Tools Appl. – volume: 546 start-page: 1063 year: 2021 end-page: 1083 ident: b0085 article-title: Cross-plane colour image encryption using a two-dimensional logistic tent modular map publication-title: Inf. Sci. – volume: 93 start-page: 115 year: 2019 end-page: 127 ident: b0205 article-title: Cryptanalyzing an image encryption based on a modified Henon map using hybrid chaotic shift transform publication-title: Digital Signal Process. – volume: 8 start-page: 2809 year: 2014 end-page: 2821 ident: b0010 article-title: An optimization algorithm for solving systems of singular boundary value problems publication-title: Appl. Math. Inf. Sci. – volume: 138 start-page: 280 year: 2017 end-page: 293 ident: b0100 article-title: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy publication-title: Signal Process. – volume: 30 start-page: 2050060 year: 2020 ident: b0175 article-title: An image encryption algorithm based on random walk and hyperchaotic systems publication-title: Int. J. Bifurcation Chaos – volume: 100 start-page: 3959 year: 2020 end-page: 3978 ident: b0040 article-title: Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table publication-title: Nonlinear Dyn. – volume: 279 start-page: 396 year: 2014 end-page: 415 ident: b0020 article-title: Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm publication-title: Inf. Sci. – volume: 121 start-page: 203 year: 2019 end-page: 214 ident: b0180 article-title: A fast image encryption algorithm based on compressive sensing and hyperchaotic map publication-title: Opt. Lasers Eng. – volume: 80 start-page: 25367 year: 2021 end-page: 25387 ident: b0095 article-title: A new color image encryption using 2D improved logistic coupling map publication-title: Multimedia Tools Appl. – volume: 17 start-page: 12 year: 2020 end-page: 20 ident: b0035 article-title: A color image encryption algorithm based on 2D-CIMM chaotic map publication-title: China Commun. – volume: 17 start-page: 657 year: 2013 end-page: 675 ident: b0015 article-title: A genetic algorithm approach for prediction of linear dynamical systems publication-title: Math. Prob. Eng. – volume: 31 start-page: 549 year: 2019 end-page: 560 ident: b0110 article-title: Robust image hashing with tensor decomposition publication-title: IEEE Trans. Knowl. Data Eng. – volume: 128 year: 2020 ident: b0200 article-title: A new color image encryption scheme based on 2DNLCML system and genetic operations publication-title: Opt. Lasers Eng. – volume: 470 start-page: 109 year: 2019 end-page: 120 ident: b0140 article-title: Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm publication-title: Inf. Sci. – volume: 149 start-page: 148 year: 2018 end-page: 161 ident: b0075 article-title: 2D Logistic-Sine-coupling map for image encryption publication-title: Signal Process. – volume: 80 start-page: 1 year: 2016 end-page: 11 ident: b0115 article-title: Multiple-image encryption with bit-plane decomposition and chaotic maps publication-title: Opt. Lasers Eng. – volume: 17 start-page: 125 year: 2020 end-page: 135 ident: b0090 article-title: Coverless real-time image information hiding based on image block matching and dense convolutional network publication-title: J. Real-Time Image Proc. – volume: 550 start-page: 13 year: 2021 end-page: 26 ident: b0105 article-title: A new fractional one dimensional chaotic map and its application in high-speed image encryption publication-title: Inf. Sci. – volume: 547 start-page: 1154 year: 2021 end-page: 1169 ident: b0165 article-title: Fractal sorting matrix and its application on chaotic image encryption publication-title: Inf. Sci. – volume: 155 start-page: 391 year: 2019 end-page: 402 ident: b0065 article-title: A novel image encryption scheme based on an elliptic curve publication-title: Signal Process. – volume: 31 start-page: 7111 year: 2019 end-page: 7130 ident: b0060 article-title: A chaotic image encryption algorithm based on 3-D bit-plane permutation publication-title: Neural Comput. Appl. – volume: 128 year: 2020 ident: b0145 article-title: An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm publication-title: Opt. Lasers Eng. – volume: 539 start-page: 195 year: 2020 end-page: 214 ident: b0155 article-title: Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network publication-title: Inf. Sci. – volume: 11 start-page: 200 year: 2016 end-page: 214 ident: b0120 article-title: Robust image hashing with ring partition and invariant vector distance publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 26 start-page: 711 year: 2014 end-page: 724 ident: b0125 article-title: Robust perceptual image hashing based on ring partition and NMF publication-title: IEEE Trans. Knowl. Data Eng. – volume: 115 start-page: 131 year: 2019 end-page: 140 ident: b0050 article-title: Index-based permutation-diffusion in multiple-image encryption using DNA sequence publication-title: Opt. Lasers Eng. – year: 2021 ident: b0170 article-title: Double parameters fractal sorting matrix and its application in image encryption publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 32 start-page: 10979 year: 2020 end-page: 10993 ident: b0045 article-title: Hybrid optimization with cryptography encryption for me1dical image security in Internet of Things publication-title: Neural Comput. Appl. – year: 2012 ident: b0025 article-title: Solving singular two-point boundary value problems using continuous genetic algorithm publication-title: Abstract Appl. Anal. – volume: 33 year: 2021 ident: b0130 article-title: NSCT domain-based secure multiple-watermarking technique through lightweight encryption for medical images publication-title: Concurr. Comput.-Practice Exp. – volume: 546 start-page: 1063 year: 2021 ident: 10.1016/j.ins.2022.05.032_b0085 article-title: Cross-plane colour image encryption using a two-dimensional logistic tent modular map publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.09.032 – volume: 138 start-page: 280 year: 2017 ident: 10.1016/j.ins.2022.05.032_b0100 article-title: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy publication-title: Signal Process. doi: 10.1016/j.sigpro.2017.03.033 – volume: 77 start-page: 4863 issue: 4 year: 2018 ident: 10.1016/j.ins.2022.05.032_b0190 article-title: A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-016-3862-8 – volume: 20 start-page: 2645 issue: 10 year: 2018 ident: 10.1016/j.ins.2022.05.032_b0070 article-title: JPEG image encryption with improved format compatibility and file size preservation publication-title: IEEE Trans. Multimedia doi: 10.1109/TMM.2018.2817065 – volume: 547 start-page: 1154 year: 2021 ident: 10.1016/j.ins.2022.05.032_b0165 article-title: Fractal sorting matrix and its application on chaotic image encryption publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.09.055 – year: 2012 ident: 10.1016/j.ins.2022.05.032_b0025 article-title: Solving singular two-point boundary value problems using continuous genetic algorithm publication-title: Abstract Appl. Anal. doi: 10.1155/2012/205391 – volume: 17 start-page: 125 issue: 1 year: 2020 ident: 10.1016/j.ins.2022.05.032_b0090 article-title: Coverless real-time image information hiding based on image block matching and dense convolutional network publication-title: J. Real-Time Image Proc. doi: 10.1007/s11554-019-00917-3 – volume: 486 start-page: 340 year: 2019 ident: 10.1016/j.ins.2022.05.032_b0150 article-title: Fast image encryption algorithm based on parallel computing system publication-title: Inf. Sci. doi: 10.1016/j.ins.2019.02.049 – volume: 30 start-page: 2050060 issue: 4 year: 2020 ident: 10.1016/j.ins.2022.05.032_b0175 article-title: An image encryption algorithm based on random walk and hyperchaotic systems publication-title: Int. J. Bifurcation Chaos doi: 10.1142/S0218127420500601 – volume: 31 start-page: 7111 issue: 11 year: 2019 ident: 10.1016/j.ins.2022.05.032_b0060 article-title: A chaotic image encryption algorithm based on 3-D bit-plane permutation publication-title: Neural Comput. Appl. doi: 10.1007/s00521-018-3541-y – volume: 124 year: 2020 ident: 10.1016/j.ins.2022.05.032_b0030 article-title: An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.105837 – volume: 31 start-page: 549 issue: 3 year: 2019 ident: 10.1016/j.ins.2022.05.032_b0110 article-title: Robust image hashing with tensor decomposition publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/TKDE.2018.2837745 – volume: 80 start-page: 1 year: 2016 ident: 10.1016/j.ins.2022.05.032_b0115 article-title: Multiple-image encryption with bit-plane decomposition and chaotic maps publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2015.12.004 – volume: 26 start-page: 711 issue: 3 year: 2014 ident: 10.1016/j.ins.2022.05.032_b0125 article-title: Robust perceptual image hashing based on ring partition and NMF publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/TKDE.2013.45 – volume: 17 start-page: 12 issue: 5 year: 2020 ident: 10.1016/j.ins.2022.05.032_b0035 article-title: A color image encryption algorithm based on 2D-CIMM chaotic map publication-title: China Commun. doi: 10.23919/JCC.2020.05.002 – volume: 104 start-page: 4505 issue: 4 year: 2021 ident: 10.1016/j.ins.2022.05.032_b0080 article-title: Color image encryption using orthogonal Latin squares and a new 2D chaotic system publication-title: Nonlinear Dyn. doi: 10.1007/s11071-021-06472-6 – volume: 115 start-page: 131 year: 2019 ident: 10.1016/j.ins.2022.05.032_b0050 article-title: Index-based permutation-diffusion in multiple-image encryption using DNA sequence publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2018.11.017 – year: 2021 ident: 10.1016/j.ins.2022.05.032_b0195 article-title: Characteristic analysis of 2D lag-complex logistic map and its application in image encryption publication-title: IEEE Multimedia doi: 10.1109/MMUL.2021.3080579 – volume: 33 issue: 2 year: 2021 ident: 10.1016/j.ins.2022.05.032_b0130 article-title: NSCT domain-based secure multiple-watermarking technique through lightweight encryption for medical images publication-title: Concurr. Comput.-Practice Exp. – volume: 539 start-page: 195 year: 2020 ident: 10.1016/j.ins.2022.05.032_b0155 article-title: Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.06.030 – volume: 32 start-page: 10979 issue: 15 year: 2020 ident: 10.1016/j.ins.2022.05.032_b0045 article-title: Hybrid optimization with cryptography encryption for me1dical image security in Internet of Things publication-title: Neural Comput. Appl. doi: 10.1007/s00521-018-3801-x – volume: 128 year: 2020 ident: 10.1016/j.ins.2022.05.032_b0145 article-title: An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.105995 – volume: 153 start-page: 11 year: 2018 ident: 10.1016/j.ins.2022.05.032_b0160 article-title: Image encryption using 2D Henon-Sine map and DNA approach publication-title: Signal Process. doi: 10.1016/j.sigpro.2018.06.008 – year: 2021 ident: 10.1016/j.ins.2022.05.032_b0170 article-title: Double parameters fractal sorting matrix and its application in image encryption publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 30 start-page: 4467 issue: 12 year: 2020 ident: 10.1016/j.ins.2022.05.032_b0185 article-title: Multimodal transformer with multi-view visual representation for image captioning publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2019.2947482 – volume: 80 start-page: 25367 issue: 17 year: 2021 ident: 10.1016/j.ins.2022.05.032_b0095 article-title: A new color image encryption using 2D improved logistic coupling map publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-021-10660-2 – volume: 279 start-page: 396 year: 2014 ident: 10.1016/j.ins.2022.05.032_b0020 article-title: Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm publication-title: Inf. Sci. doi: 10.1016/j.ins.2014.03.128 – volume: 550 start-page: 13 year: 2021 ident: 10.1016/j.ins.2022.05.032_b0105 article-title: A new fractional one dimensional chaotic map and its application in high-speed image encryption publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.10.048 – volume: 128 year: 2020 ident: 10.1016/j.ins.2022.05.032_b0200 article-title: A new color image encryption scheme based on 2DNLCML system and genetic operations publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2020.106040 – volume: 8 start-page: 2809 issue: 6 year: 2014 ident: 10.1016/j.ins.2022.05.032_b0010 article-title: An optimization algorithm for solving systems of singular boundary value problems publication-title: Appl. Math. Inf. Sci. doi: 10.12785/amis/080617 – volume: 155 start-page: 391 year: 2019 ident: 10.1016/j.ins.2022.05.032_b0065 article-title: A novel image encryption scheme based on an elliptic curve publication-title: Signal Process. doi: 10.1016/j.sigpro.2018.10.011 – volume: 93 start-page: 115 year: 2019 ident: 10.1016/j.ins.2022.05.032_b0205 article-title: Cryptanalyzing an image encryption based on a modified Henon map using hybrid chaotic shift transform publication-title: Digital Signal Process. doi: 10.1016/j.dsp.2019.07.013 – volume: 77 start-page: 28225 issue: 21 year: 2018 ident: 10.1016/j.ins.2022.05.032_b0055 article-title: Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-018-6015-4 – volume: 116 start-page: 92 year: 2019 ident: 10.1016/j.ins.2022.05.032_b0005 article-title: A novel image steganography technique based on quantum substitution boxes publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2019.03.005 – volume: 17 start-page: 657 year: 2013 ident: 10.1016/j.ins.2022.05.032_b0015 article-title: A genetic algorithm approach for prediction of linear dynamical systems publication-title: Math. Prob. Eng. – volume: 100 start-page: 3959 issue: 4 year: 2020 ident: 10.1016/j.ins.2022.05.032_b0040 article-title: Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table publication-title: Nonlinear Dyn. doi: 10.1007/s11071-020-05735-y – volume: 149 start-page: 148 year: 2018 ident: 10.1016/j.ins.2022.05.032_b0075 article-title: 2D Logistic-Sine-coupling map for image encryption publication-title: Signal Process. doi: 10.1016/j.sigpro.2018.03.010 – volume: 31 start-page: 2150152 issue: 10 year: 2021 ident: 10.1016/j.ins.2022.05.032_b0135 article-title: A novel lightweight block encryption algorithm based on combined chaotic S-box publication-title: Int. J. Bifurcation Chaos doi: 10.1142/S0218127421501522 – volume: 121 start-page: 203 year: 2019 ident: 10.1016/j.ins.2022.05.032_b0180 article-title: A fast image encryption algorithm based on compressive sensing and hyperchaotic map publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.04.011 – volume: 11 start-page: 200 issue: 1 year: 2016 ident: 10.1016/j.ins.2022.05.032_b0120 article-title: Robust image hashing with ring partition and invariant vector distance publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2485163 – volume: 470 start-page: 109 year: 2019 ident: 10.1016/j.ins.2022.05.032_b0140 article-title: Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm publication-title: Inf. Sci. doi: 10.1016/j.ins.2018.08.028 |
| SSID | ssj0004766 |
| Score | 2.669263 |
| Snippet | A two-dimensional cross-mode hyperchaotic map based on logistic and sine maps (2D-CLSS) is presented. The hyperchaotic map consists of a logistic map and two... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 71 |
| SubjectTerms | 2D hyperchaotic map Image encryption Security analysis Simultaneous permutation and diffusion |
| Title | Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion |
| URI | https://dx.doi.org/10.1016/j.ins.2022.05.032 |
| Volume | 605 |
| WOSCitedRecordID | wos000814478300004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-6291 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0004766 issn: 0020-0255 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3LT9swGLc62GEc0AabBgzkw7TDokieE9vJEQHTmCo0iW5kp8h5Qbo2rdoGwX_P59hOAoJpHHaJIstxHt8v38vfA6GPMlFFxyVzCzCAXD_LMjf0GQNTJfGE5IEfNOljv4bi7CyIovDHYDC3uTDXE1FVwc1NOP-vpIYxILZKnX0GudtFYQDOgehwBLLD8Z8IfzpVYTjwRItbzQ7k5HK2KFdXU0eJrExtD0iHHrtHw_Nz5wrsUFUuaaYKt07l3Kkb58GyVJGGsspVhCzMmNYmKlH52VVTlXppCTq2sfBtHqRjxGqrro9yzVGGZQvFC-OnjuBut3UH0ajUHtnfs-pybKYbpwTYszYkrksSIK4yV_qMlhPWY5W684oVuuxRdq49C2OwQVRldUqbIqvGH3qvdPYDkdYGGtoYtnEMS8RqiZiwGJZ4gdapYCGw8vXD05Poe5dLK_T-tn0BuxPexAQ-eI7HdZmefjJ6jTaNYYEPNSDeoEFebaGNXrnJLbRvklTwJ9yjFjbsfRv9aaCDO-jgFjq4gQ5WQ9hAB_ehgwE6uIEO7kMH96CDATq4hc5b9PPryejom2uacbgppWLlspSIgrKMi0wUKc9ANACrLwoSSpKQXCaq1UCW-gmMJUxynlBQ3jnzUk6ESAvvHVqrZlX-HmGvoAGMspySxM-_8CCkYDaDtAsKT4LKuYOI_axxairVq4Ypk_hJcu6gz-0lc12m5W-TfUur2PwQWn-MAXdPX7b7nHvsoVfdf_EBra0Wdb6PXqbXq3K5ODCguwNNup-T |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+encryption+algorithm+based+on+a+2D-CLSS+hyperchaotic+map+using+simultaneous+permutation+and+diffusion&rft.jtitle=Information+sciences&rft.au=Teng%2C+Lin&rft.au=Wang%2C+Xingyuan&rft.au=Xian%2C+Yongjin&rft.date=2022-08-01&rft.issn=0020-0255&rft.volume=605&rft.spage=71&rft.epage=85&rft_id=info:doi/10.1016%2Fj.ins.2022.05.032&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_ins_2022_05_032 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0255&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0255&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0255&client=summon |