{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:46:14Z","timestamp":1763451974238,"version":"3.45.0"},"reference-count":52,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T00:00:00Z","timestamp":1758412800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Recent research on image encryption has predominantly focused on pixel\u2010swapping techniques. However, such approaches often lack sufficient complexity and remain susceptible to known\u2010plaintext and chosen\u2010plaintext attacks. Another critical challenge lies in securely sharing the hash values of plain images in asymmetric cryptographic settings. Addressing these gaps, this study proposes a novel and efficient image encryption scheme integrating elliptic curve cryptography (ECC) with DNA computing. The proposed method operates in three phases. In the first phase, encryption keys and the hash of the plain image are generated and securely shared with the authorized party. The second phase introduces a pixel\u2010switching mechanism based on quadratic residues (QR) and quadratic non\u2010residues (QNR) derived from the \u2010coordinates of elliptic curve points, ensuring high structural complexity. In the final phase, DNA operations are applied for the diffusion process, where randomly chosen rows of the image and a mask image are processed using dynamically selected DNA rules. Row and rule selection are governed by the intertwining logistic map, a chaotic map known for its extreme sensitivity to initial conditions, ensuring unpredictable and non\u2010repetitive encryption behavior. This unpredictability significantly complicates any attempt to reverse\u2010engineer the encryption process. By incorporating the Diffie\u2013Hellman (DH) key exchange into both the confusion and dynamic diffusion stages, the scheme achieves robust security against various cryptanalytic attacks. Experimental results demonstrate that the proposed approach effectively addresses the challenges of secure hash sharing, confusion, and diffusion while offering high efficiency, strong resistance to cryptanalysis, and practical feasibility for real\u2010world image encryption applications.<\/jats:p>","DOI":"10.1002\/spy2.70103","type":"journal-article","created":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T04:31:01Z","timestamp":1758515461000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Advancing Image Cipher: Quadratic Residue on Elliptic Curve With\n                    <scp>DNA<\/scp>\n                    Encryption"],"prefix":"10.1002","volume":"8","author":[{"given":"M. G. Abbas","family":"Malik","sequence":"first","affiliation":[{"name":"Interdisciplinary Sustainable Systems (IS2) Research Group College of Computer and Information Science, Prince Sultan University  Riyadh Saudi Arabia"}]},{"given":"Muhammad","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Basic Sciences &amp; Humanities College of Electrical and Mechanical Engineering, National University of Sciences and Technology  Islamabad Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6051-8413","authenticated-orcid":false,"given":"Zia","family":"Bashir","sequence":"additional","affiliation":[{"name":"Department of Mathematics Quaid\u2010i\u2010Azam University  Islamabad Pakistan"}]}],"member":"311","published-online":{"date-parts":[[2025,9,21]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2018.12.103"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.11.005"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.383.0243"},{"key":"e_1_2_10_5_1","first-page":"1","article-title":"Survey on Image Encryption Schemes, Bio Cryptography and Efficient Encryption Algorithms","volume":"28","author":"Arul Murugan C.","year":"2018","journal-title":"Mobile Networks and Applications"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2392-7"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008354106356"},{"issue":"5","key":"e_1_2_10_9_1","first-page":"1904","article-title":"A Comparative Study of Public Key Cryptosystem Based on ECC and RSA","volume":"3","author":"Kumar A.","year":"2011","journal-title":"International Journal on Computer Science and Engineering (IJCSE)"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17071482"},{"issue":"3","key":"e_1_2_10_11_1","first-page":"216","article-title":"Elliptic Curve Digital Signature Algorithm Using Boolean Permutation Based ECC","volume":"1","author":"Amounas F.","year":"2012","journal-title":"International Journal of Information and Network Security (IJINS)"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09816-0"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.05.013"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.11.008"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.10.034"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2024.06.016"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2025.3545868"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3540097"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/math12243917"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1898998"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2024.09.261"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3558948"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5680357"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09695-8"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3004536"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0611-5"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956389"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.29.2.023025"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2023.170517"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2025.110402"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.09.029"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-023-04226-0"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2022.109033"},{"key":"e_1_2_10_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12762-x"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0402-6"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.5772\/34510"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0273-0979-1987-15544-3"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.04.004"},{"key":"e_1_2_10_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09384-3"},{"key":"e_1_2_10_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22166243"},{"key":"e_1_2_10_41_1","doi-asserted-by":"publisher","DOI":"10.3390\/e24050571"},{"key":"e_1_2_10_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-11912-5"},{"key":"e_1_2_10_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2024.102336"},{"key":"e_1_2_10_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_2_10_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.168956"},{"key":"e_1_2_10_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169624"},{"key":"e_1_2_10_47_1","doi-asserted-by":"publisher","DOI":"10.3390\/e27010084"},{"key":"e_1_2_10_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117709"},{"key":"e_1_2_10_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13461-3"},{"key":"e_1_2_10_50_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"e_1_2_10_51_1","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/22\/8\/080503"},{"key":"e_1_2_10_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.isci.2023.108610"},{"key":"e_1_2_10_53_1","doi-asserted-by":"crossref","unstructured":"A.Rukhin J.Soto J.Nechvatal M.Smid andE.Barker \u201cA Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (No. NISTSP80002) \u201d 2001.","DOI":"10.6028\/NIST.SP.800-22"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.70103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:43:01Z","timestamp":1763451781000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.70103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,21]]},"references-count":52,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/spy2.70103"],"URL":"https:\/\/doi.org\/10.1002\/spy2.70103","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"type":"print","value":"2475-6725"},{"type":"electronic","value":"2475-6725"}],"subject":[],"published":{"date-parts":[[2025,9,21]]},"assertion":[{"value":"2025-05-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-06","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70103"}}