{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T05:52:15Z","timestamp":1768974735106,"version":"3.49.0"},"reference-count":40,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>In this work, we introduce a new image encryption method designed to overcome key weaknesses found in many existing techniques\u2014like low randomness, poor sensitivity to key changes, and vulnerability to statistical attacks. Our algorithm combines two powerful ideas: first, we use orthogonal Latin square transversals to shuffle pixels in a way that avoids repetition and boosts spatial unpredictability, and second, we apply a chaos\u2010based diffusion process using the Lorenz chaotic system to change pixel values, which makes the encryption highly sensitive to initial conditions and resistant to intrusion attempts. The two primary steps of the encryption process are pixel permutation using organized shuffling and diffusion using chaotic sequences produced by the Lorenz chaotic system. Standard grayscale images (256 \u00d7\u2009256) were used to evaluate the method. Results of keyspace analysis, histogram analysis, correlation analysis, information entropy analysis, NPCR and UACI analysis, and key sensitivity analysis indicate strong and robust security of the algorithm against various kinds of attacks. It only took 0.1689\u2009s to encrypt each image, demonstrating the method's efficiency and security. Our algorithm offers a dependable solution for safe image encryption since it is complicated, resilient, and resistant to statistical and differential assaults when compared with other methods.<\/jats:p>","DOI":"10.1002\/spy2.70128","type":"journal-article","created":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:22:03Z","timestamp":1761628923000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Advanced Image Encryption Algorithm Integrating Orthogonal Latin Square Transversal for Shuffling With Lorenz Chaotic System for Diffusion"],"prefix":"10.1002","volume":"8","author":[{"given":"Balmukund","family":"Jha","sequence":"first","affiliation":[{"name":"Department of Computer Science Central University of South Bihar  Gaya India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8954-4861","authenticated-orcid":false,"given":"Piyush Kumar","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Computer Science Central University of South Bihar  Gaya India"}]},{"given":"Rohitesh","family":"Pradhan","sequence":"additional","affiliation":[{"name":"Department of Mathematics Central University of South Bihar  Gaya India"}]},{"given":"Pankaj","family":"Mishra","sequence":"additional","affiliation":[{"name":"Department of Mathematics Central University of South Bihar  Gaya India"}]},{"given":"Vivek Kumar","family":"Jain","sequence":"additional","affiliation":[{"name":"Department of Mathematics Central University of South Bihar  Gaya India"}]},{"given":"Fahmi","family":"Ansari","sequence":"additional","affiliation":[{"name":"Department of Mathematics Central University of South Bihar  Gaya India"}]}],"member":"311","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2879919"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5670-9"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3325193"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.08.020"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319263"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.09.150"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5534-8"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3050052"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.10.020"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.01.016"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2016.12.018"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.007"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICT.2015.7045687"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2024.06.016"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.114958"},{"key":"e_1_2_10_17_1","first-page":"283","volume-title":"Lectures on Nonlinear Dynamics","author":"Savi M. A.","year":"2023"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063237"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2024.04.023"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.51173\/jt.v5i1.840"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-021-07017-7"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14786-3"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-10191-z"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/e24111574"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/2091053"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2018.06.112"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.08.020"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-021-00803-8"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7186-3"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09580-1"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94430-2"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1515\/dma-2023-0010"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym17081296"},{"key":"e_1_2_10_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124533"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11430-025-1714-8"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography9030058"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.1201\/9780429398490"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/7913061"},{"key":"e_1_2_10_39_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003459040-10"},{"issue":"4","key":"e_1_2_10_40_1","first-page":"325","article-title":"Label Fusion in Multiple Atlas\u2010Based Segmentation Using Fuzzy SVM","volume":"6","author":"Ji D.","year":"2018","journal-title":"Photonics Research"},{"key":"e_1_2_10_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2024.2312108"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.70128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:43:01Z","timestamp":1763451781000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.70128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/spy2.70128"],"URL":"https:\/\/doi.org\/10.1002\/spy2.70128","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"value":"2475-6725","type":"print"},{"value":"2475-6725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-07-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70128"}}