{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:48:30Z","timestamp":1763452110624,"version":"3.45.0"},"reference-count":63,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"vor","delay-in-days":2,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>In this paper, an efficient and low\u2010cost cryptographic system for highly secure image encryption is presented. The proposed image encryption structure is implemented based on the key processing (KP) stage, the processing of the input image (PII) stage, and the round function (KPPII\u2010RF). The key processing stage and the processing of the input image stage are used to increase key sensitivity and plain\u2010image sensitivity, respectively. The method is independent of the input image and the bit pattern of the main key, and no information is affected by the main key and the original image. In the proposed method, three parameters, the main key, the counter value, and the previously generated ciphertext, are utilized within the encryption process to produce each subsequent ciphertext. Because this method uses the previous ciphertext to generate the next ciphertext, it increases the confusion of the final result and provides better security against differential attacks. The most important innovations of this work include the simultaneous use of various techniques such as shuffling key bits by the key processing unit, shuffling pixels of the original image by the original image processing unit, utilizing a parameter known as a seed as a unique parameter for an image, and employing an appropriate round function to apply complexity to the data. The performance of the proposed structure is evaluated based on different security analyses. The information entropy values of the encrypted images based on the proposed scheme are higher than 7.995, while correlation values are very close to zero. Furthermore, the number of pixel change rate (NPCR) and unified average change intensity (UACI) for the proposed KPPII\u2010RF image encryption are higher than 99.5% and 33.3, respectively. The KPPII\u2010RF image encryption is verified for randomness through 16 NIST benchmark statistical tests from the NIST SP 800\u201022 suite. The proposed structure provides an acceptable security level for image encryption.<\/jats:p>","DOI":"10.1002\/spy2.70130","type":"journal-article","created":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T04:00:09Z","timestamp":1762228809000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A High Secure Image Encryption Method Based on an Efficient and Low\u2010Cost Cryptographic System"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6025-1543","authenticated-orcid":false,"given":"Bahram","family":"Rashidi","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering Faculty of Engineering, Ayatollah Boroujerdi University  Boroujerd Iran"}]}],"member":"311","published-online":{"date-parts":[[2025,11,3]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107563"},{"issue":"1","key":"e_1_2_7_3_1","first-page":"2","article-title":"Image Encryption Based on Highly Sensitive Chaotic System","volume":"2183","author":"Ali D. S.","year":"2019","journal-title":"AIP Conference Proceedings"},{"key":"e_1_2_7_4_1","first-page":"1","article-title":"An Image Encryption Algorithm Based on a Hidden Attractor Chaos System and the Knuth\u2013Durstenfeld Algorithm","volume":"128","author":"Wang S.","year":"2019","journal-title":"Optics and Lasers in Engineering"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418500104"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/09500340.2021.1924885"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIEI.2019.103623"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2018-0365"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2021089"},{"issue":"3","key":"e_1_2_7_10_1","doi-asserted-by":"crossref","first-page":"70","DOI":"10.15446\/ing.investig.v40n3.81421","article-title":"Entropy\u2010Based Image Encryption Using Orthogonal Variable Spreading Factor (OVSF)","volume":"40","author":"Ballesteros D. M.","year":"2020","journal-title":"Ingenier\u00eda e Investigaci\u00f3n"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111318"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5012496"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720914779"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10695-5"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/e23030341"},{"key":"e_1_2_7_16_1","first-page":"1","article-title":"Provably Secure Biometric Based Authentication and Key Agreement Protocol for Wireless Sensor Networks","volume":"12","author":"Xue X.","year":"2021","journal-title":"Frontiers in Genetics"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2015.0344"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2019.1340"},{"key":"e_1_2_7_19_1","first-page":"1","article-title":"A New Image Encryption Scheme Based on Coupling Map Lattices With Mixed Multi\u2010Chaos","volume":"10","author":"Wang X.","year":"2020","journal-title":"Scientific Reports"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.102005"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.03.019"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.10.012"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09648-1"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9524080"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11125691"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/e24091247"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112628"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10318-5"},{"key":"e_1_2_7_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-021-06761-0"},{"key":"e_1_2_7_30_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2019.0991"},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4076-6"},{"key":"e_1_2_7_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09111-1"},{"key":"e_1_2_7_33_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6352021"},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2019.1595751"},{"key":"e_1_2_7_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071535"},{"key":"e_1_2_7_36_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym15020409"},{"key":"e_1_2_7_37_1","doi-asserted-by":"publisher","DOI":"10.62411\/faith.3048-3719-93"},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3285481"},{"key":"e_1_2_7_39_1","doi-asserted-by":"publisher","DOI":"10.3390\/math12243917"},{"key":"e_1_2_7_40_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1898998"},{"key":"e_1_2_7_41_1","doi-asserted-by":"publisher","DOI":"10.3390\/mi14112090"},{"key":"e_1_2_7_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09816-0"},{"key":"e_1_2_7_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3123571"},{"key":"e_1_2_7_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893760"},{"key":"e_1_2_7_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2023.01.008"},{"key":"e_1_2_7_46_1","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad0944"},{"key":"e_1_2_7_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-024-01937-4"},{"key":"e_1_2_7_48_1","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.12706"},{"key":"e_1_2_7_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2016.02.066"},{"key":"e_1_2_7_50_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cds.2018.5457"},{"key":"e_1_2_7_51_1","first-page":"131","volume-title":"Proceedings of International Workshop on Lightweight Cryptography for Security and Privacy","author":"Maene P.","year":"2015"},{"key":"e_1_2_7_52_1","first-page":"2925","volume-title":"Proceedings of International Workshop on Selected Areas in Cryptography","author":"Sugawara T.","year":"2008"},{"key":"e_1_2_7_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2228144"},{"key":"e_1_2_7_54_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt.2019.0157"},{"key":"e_1_2_7_55_1","first-page":"1","volume-title":"Proceedings of NIST Lightweight Cryptography Workshop","author":"Beaulieu R.","year":"2015"},{"key":"e_1_2_7_56_1","doi-asserted-by":"publisher","DOI":"10.1002\/cta.2645"},{"key":"e_1_2_7_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996366.2996427"},{"key":"e_1_2_7_58_1","doi-asserted-by":"publisher","DOI":"10.1049\/cdt2.12025"},{"key":"e_1_2_7_59_1","doi-asserted-by":"publisher","DOI":"10.1002\/cta.2832"},{"key":"e_1_2_7_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_2_7_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07818-4"},{"key":"e_1_2_7_62_1","first-page":"1","article-title":"Suggested Integral Analysis for Chaos\u2010Based Image Cryptosystems","volume":"21","author":"Angel Murillo\u2010Escobar M.","year":"2019","journal-title":"Entropy"},{"key":"e_1_2_7_63_1","unstructured":"A.Rukhin J.Soto J.Nechvatal et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications Sp 800\u201322 rev.1a 2010 https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800\u201022\/rev\u20101a\/final."},{"key":"e_1_2_7_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.09.007"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.70130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:43:23Z","timestamp":1763451803000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.70130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":63,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/spy2.70130"],"URL":"https:\/\/doi.org\/10.1002\/spy2.70130","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"type":"print","value":"2475-6725"},{"type":"electronic","value":"2475-6725"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"2025-03-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-14","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70130"}}