{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:22:32Z","timestamp":1773156152105,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T00:00:00Z","timestamp":1661644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T00:00:00Z","timestamp":1661644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["10979"],"award-info":[{"award-number":["10979"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In the paper, a new one-dimensional (1-D) compound Sine chaotic system (CSCS) is first proposed. Then new chaotic maps are generated by the CSCS. And four novel generated maps are used for the illustration about the CSCS. Secondly, the results of performance analysis show that the four maps have large Lyapunov exponents and high complexity. Thirdly, a high-efficiency image encryption scheme is proposed by employing two of the four new produced chaotic maps. In the proposed encryption scheme, the simplest diffusion operation is used. And we use a variety of scrambling operations, such as Zigzag transform, Magic confusion and the row confusion. In addition, to increase key space and in order to improve the ability to resist two kinds of attacks, namely the known plaintext attack and the selected plaintext attack, the control parameters and the initial values of the two new chaotic systems are generated based on the SHA-256 function. Finally, compared to other schemes, simulation tests show that our scheme not only has higher security but also faster encryption speed.\n<\/jats:p>","DOI":"10.1007\/s00371-022-02640-w","type":"journal-article","created":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T03:15:55Z","timestamp":1661656555000},"page":"4955-4983","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["A novel fast image encryption scheme based on a new one-dimensional compound sine chaotic system"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4822-8437","authenticated-orcid":false,"given":"Jianeng","family":"Tang","sequence":"first","affiliation":[]},{"given":"Feng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Ni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,28]]},"reference":[{"issue":"4","key":"2640_CR1","doi-asserted-by":"publisher","first-page":"5962","DOI":"10.1109\/JIOT.2018.2847731","volume":"6","author":"X Liu","year":"2019","unstructured":"Liu, X., Jia, M., Zhang, X., Lu, W.: A novel multichannel Internet of things based on dynamic spectrum sharing in 5G communication. IEEE Internet Things J. 6(4), 5962\u20135970 (2019). https:\/\/doi.org\/10.1109\/JIOT.2018.2847731","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"2640_CR2","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","volume":"36","author":"Y Wu","year":"2018","unstructured":"Wu, Y., Khisti, A., Xiao, C., Caire, G., Wong, K., Gao, X.: A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE J. Sel. Areas Conunun. 36(4), 679\u2013695 (2018). https:\/\/doi.org\/10.1109\/JSAC.2018.2825560","journal-title":"IEEE J. Sel. Areas Conunun."},{"key":"2640_CR3","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak, C., Huang, L.: A new color image encryption using combination of the 1D chaotic map. Signal Process. 138, 129\u2013137 (2017). https:\/\/doi.org\/10.1016\/j.sigpro.2017.03.011","journal-title":"Signal Process."},{"issue":"10","key":"2640_CR4","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu, H., Wang, X.: Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10), 3320\u20133327 (2010). https:\/\/doi.org\/10.1016\/j.camwa.2010.03.017","journal-title":"Comput. Math. Appl."},{"issue":"5","key":"2640_CR5","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu, H., Wang, X., Kadir, A.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5), 1457\u20131466 (2012). https:\/\/doi.org\/10.1016\/j.asoc.2012.01.016","journal-title":"Appl. Soft Comput."},{"key":"2640_CR6","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"X Wang","year":"2015","unstructured":"Wang, X., Zhang, Y., Bao, X.: A novel chaotic image encryption scheme using DNA sequence operations. Opt. Laser. Eng. 73, 53\u201361 (2015). https:\/\/doi.org\/10.1016\/j.optlaseng.2015.03.022","journal-title":"Opt. Laser. Eng."},{"issue":"16\u201317","key":"2640_CR7","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu, H., Wang, X.: Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt. Commun. 284(16\u201317), 3895\u20133903 (2011). https:\/\/doi.org\/10.1016\/j.optcom.2011.04.001","journal-title":"Opt. Commun."},{"issue":"3","key":"2640_CR8","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"X Wang","year":"2010","unstructured":"Wang, X., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615\u2013621 (2010). https:\/\/doi.org\/10.1007\/s11071-010-9749-8","journal-title":"Nonlinear Dyn."},{"key":"2640_CR9","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Laser. Eng. 66, 10\u201318 (2015). https:\/\/doi.org\/10.1016\/j.optlaseng.2014.08.005","journal-title":"Opt. Laser. Eng."},{"key":"2640_CR10","doi-asserted-by":"publisher","unstructured":"Fang, P., Liu, H., Wu, C., Liu, M.: A survey of image encryption algorithms based on chaotic system. Vis. Comput. (2022). https:\/\/doi.org\/10.1007\/s00371-022-02459-5","DOI":"10.1007\/s00371-022-02459-5"},{"key":"2640_CR11","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1007\/s00371-020-01936-z","volume":"37","author":"MZ Talhaoui","year":"2021","unstructured":"Talhaoui, M.Z., Wang, X., Talhaoui, A.: A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme. Vis. Comput. 37, 1757\u20131768 (2021). https:\/\/doi.org\/10.1007\/s00371-020-01936-z","journal-title":"Vis. Comput."},{"key":"2640_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237\u2013253 (2016). https:\/\/doi.org\/10.1016\/j.ins.2016.01.017","journal-title":"Inf. Sci."},{"key":"2640_CR13","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua, Z., Zhou, Y., Huang, H.: Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403\u2013419 (2019). https:\/\/doi.org\/10.1016\/j.ins.2018.12.048","journal-title":"Inf. Sci."},{"key":"2640_CR14","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"Y Xian","year":"2021","unstructured":"Xian, Y., Wang, X.: Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 547, 1154\u20131169 (2021). https:\/\/doi.org\/10.1016\/j.ins.2020.09.055","journal-title":"Inf. Sci."},{"key":"2640_CR15","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1007\/s00371-020-02048-4","volume":"38","author":"X Wang","year":"2022","unstructured":"Wang, X., Liu, P.: Image encryption based on roulette cascaded chaotic system and alienated image library. Vis. Comput. 38, 763\u2013779 (2022). https:\/\/doi.org\/10.1007\/s00371-020-02048-4","journal-title":"Vis. Comput."},{"key":"2640_CR16","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s00371-020-01791-y","volume":"37","author":"A Mansouri","year":"2021","unstructured":"Mansouri, A., Wang, X.: Image encryption using shuffled Arnold map and multiple values manipulations. Vis. Comput. 37, 189\u2013200 (2021). https:\/\/doi.org\/10.1007\/s00371-020-01791-y","journal-title":"Vis. Comput."},{"key":"2640_CR17","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1007\/s00371-021-02085-7","volume":"38","author":"J Xu","year":"2022","unstructured":"Xu, J., Mou, J., Liu, J., Hao, J.: The image compression-encryption algorithm based on the compression sensing and fractional-order chaotic system. Vis. Comput. 38, 1509\u20131526 (2022). https:\/\/doi.org\/10.1007\/s00371-021-02085-7","journal-title":"Vis. Comput."},{"key":"2640_CR18","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang, X., Feng, L., Zhao, H.: Fast image encryption algorithm based on parallel computing system. Inf. Sci. 486, 340\u2013358 (2019). https:\/\/doi.org\/10.1016\/j.ins.2019.02.049","journal-title":"Inf. Sci."},{"key":"2640_CR19","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.ins.2021.04.013","volume":"569","author":"X Wang","year":"2021","unstructured":"Wang, X., Yang, J.: A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf. Sci. 569, 217\u2013240 (2021). https:\/\/doi.org\/10.1016\/j.ins.2021.04.013","journal-title":"Inf. Sci."},{"key":"2640_CR20","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","volume":"539","author":"X Wang","year":"2020","unstructured":"Wang, X., Gao, S.: Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf. Sci. 539, 195\u2013214 (2020). https:\/\/doi.org\/10.1016\/j.ins.2020.06.030","journal-title":"Inf. Sci."},{"key":"2640_CR21","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"X Wang","year":"2020","unstructured":"Wang, X., Gao, S.: Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf. Sci. 507, 16\u201336 (2020). https:\/\/doi.org\/10.1016\/j.ins.2019.08.041","journal-title":"Inf. Sci."},{"issue":"6","key":"2640_CR22","doi-asserted-by":"publisher","first-page":"4028","DOI":"10.1109\/TCSVT.2021.3108767","volume":"32","author":"Y Xian","year":"2022","unstructured":"Xian, Y., Wang, X., Teng, L.: Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans. Circuits Syst. Video Technol. 32(6), 4028\u20134037 (2022). https:\/\/doi.org\/10.1109\/TCSVT.2021.3108767","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2640_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3172116","author":"Y Xian","year":"2022","unstructured":"Xian, Y., Wang, X., Wang, X., Li, Q., Yan, X.: Spiral-transform-based fractal sorting matrix for chaotic image encryption. IEEE Trans. Circuits Syst. I (2022). https:\/\/doi.org\/10.1109\/TCSI.2022.3172116","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"2640_CR24","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.ins.2021.06.032","volume":"574","author":"X Wang","year":"2021","unstructured":"Wang, X., Liu, C., Jiang, D.: A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf. Sci. 574, 505\u2013527 (2021). https:\/\/doi.org\/10.1016\/j.ins.2021.06.032","journal-title":"Inf. Sci."},{"key":"2640_CR25","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process. 143, 122\u2013133 (2018). https:\/\/doi.org\/10.1016\/j.sigpro.2017.08.020","journal-title":"Signal Process."},{"issue":"11","key":"2640_CR26","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"Z Gan","year":"2019","unstructured":"Gan, Z., Chai, X., Han, D., Chen, Y.: A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput. Appl. 31(11), 7111\u20137130 (2019). https:\/\/doi.org\/10.1007\/s00521-018-3541-y","journal-title":"Neural Comput. Appl."},{"key":"2640_CR27","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.optcom.2014.10.021","volume":"338","author":"H Liu","year":"2015","unstructured":"Liu, H., Kadir, A.: Gong, P: A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise. Opt. Commun. 338, 340\u2013347 (2015). https:\/\/doi.org\/10.1016\/j.optcom.2014.10.021","journal-title":"Opt. Commun."},{"key":"2640_CR28","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1016\/j.matcom.2021.02.009","volume":"185","author":"H Zhu","year":"2021","unstructured":"Zhu, H., Dai, L., Liu, Y., Wu, L.: A three-dimensional bit-level image encryption algorithm with Rubik\u2019s cube method. Math. Comput. Simulat. 185, 754\u2013770 (2021). https:\/\/doi.org\/10.1016\/j.matcom.2021.02.009","journal-title":"Math. Comput. Simulat."},{"issue":"6","key":"2640_CR29","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11071-017-3436-y","volume":"89","author":"H Zhu","year":"2017","unstructured":"Zhu, H., Zhang, X., Yu, H., Zhao, C., Zhu, Z.: An image encryption algorithm based on compound homogeneous hyper-chaotic system. Nonlinear Dyn. 89(6), 61\u201379 (2017). https:\/\/doi.org\/10.1007\/s11071-017-3436-y","journal-title":"Nonlinear Dyn."},{"key":"2640_CR30","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","volume":"160","author":"M Alawida","year":"2019","unstructured":"Alawida, M., Samsudin, A., Teh, J.S., Alkhawaldeh, R.S.: A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160, 45\u201358 (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2019.02.016","journal-title":"Signal Process."},{"issue":"2","key":"2640_CR31","first-page":"136","volume":"67","author":"AAA El-Latif","year":"2013","unstructured":"El-Latif, A.A.A., Niu, X.: A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU 67(2), 136\u2013143 (2013)","journal-title":"AEU"},{"issue":"2","key":"2640_CR32","doi-asserted-by":"publisher","first-page":"20506","DOI":"10.7498\/aps.62.020506","volume":"62","author":"G Wang","year":"2013","unstructured":"Wang, G., Yuan, F.: Cascade chaos and its dynamic characteristics. Acta Phys. Sin. 62(2), 20506 (2013). https:\/\/doi.org\/10.7498\/aps.62.020506","journal-title":"Acta Phys. Sin."},{"issue":"9","key":"2640_CR33","doi-asserted-by":"publisher","first-page":"1464","DOI":"10.1109\/TCSI.2016.2573283","volume":"63","author":"Z Chen","year":"2016","unstructured":"Chen, Z., Yuan, X., Yuan, Y., Iu, H., Fernando, T.: Parameter identification of chaotic and hyper-chaotic systems using synchronization-based parameter observer. IEEE Trans. Circuits Syst. I 63(9), 1464\u20131475 (2016). https:\/\/doi.org\/10.1109\/TCSI.2016.2573283","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"2640_CR34","volume-title":"Quantum Chaos: An Introduction","author":"H-J St\u00f6ckmann","year":"2007","unstructured":"St\u00f6ckmann, H.-J.: Quantum Chaos: An Introduction. Cambridge University Press, Cambridge (2007)"},{"key":"2640_CR35","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2021.3114589","author":"S Liu","year":"2021","unstructured":"Liu, S., Li, C., Hu, Q.: Cryptanalyzing two image encryption algorithms based on a first-order time-delay system. IEEE MultiMedia (2021). https:\/\/doi.org\/10.1109\/MMUL.2021.3114589","journal-title":"IEEE MultiMedia"},{"key":"2640_CR36","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","volume":"132","author":"EY Xie","year":"2017","unstructured":"Xie, E.Y., Li, C., Yu, S., L\u00fc, J.: On the cryptanalysis of Fridrich\u2019s chaotic image encryption scheme. Signal Process. 132, 150\u2013154 (2017). https:\/\/doi.org\/10.1016\/j.sigpro.2016.10.002","journal-title":"Signal Process."},{"key":"2640_CR37","doi-asserted-by":"publisher","DOI":"10.1142\/8296","volume-title":"Robust Chaos and Its Applications","author":"E Zeraoulia","year":"2011","unstructured":"Zeraoulia, E., Sprott, J.C.: Robust Chaos and Its Applications. World Scientific, Singapore (2011)"},{"issue":"8","key":"2640_CR38","doi-asserted-by":"publisher","first-page":"2380","DOI":"10.1109\/TCSI.2014.2304655","volume":"61","author":"C Shen","year":"2014","unstructured":"Shen, C., Yu, S., L\u00fc, J., Chen, G.: Designing hyperchaotic systems with any desired number of positive lyapunov exponents via a simple model. IEEE Trans. Circuits Syst. I 61(8), 2380\u20132389 (2014). https:\/\/doi.org\/10.1109\/TCSI.2014.2304655","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"2640_CR39","doi-asserted-by":"publisher","first-page":"H2039","DOI":"10.1152\/ajpheart.2000.278.6.H2039","volume":"278","author":"JS Richman","year":"2000","unstructured":"Richman, J.S., Moorman, J.R.: Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Physiol. Heart Circ. Physiol. 278, H2039\u2013H2049 (2000). https:\/\/doi.org\/10.1152\/ajpheart.2000.278.6.H2039","journal-title":"Am. J. Physiol. Heart Circ. Physiol."},{"key":"2640_CR40","doi-asserted-by":"crossref","unstructured":"Bassham, L.E. III, et al.: SP 800-22 Rev. 1A. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, National Institute of Standards (2010)","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"2640_CR41","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1103\/PhysRevA.28.2591","volume":"278","author":"P Grassberger","year":"1983","unstructured":"Grassberger, P., Procaccia, I.: Estimation of the Kolmogorov entropy from a chaotic signal. Phys. Rev. A 278, 2591\u20132593 (1983). https:\/\/doi.org\/10.1103\/PhysRevA.28.2591","journal-title":"Phys. Rev. A"},{"key":"2640_CR42","doi-asserted-by":"publisher","first-page":"14081","DOI":"10.1109\/ACCESS.2019.2893538","volume":"7","author":"H Zhu","year":"2019","unstructured":"Zhu, H., Zhao, Y., Song, Y.: 2D Logistic\u2013Modulated\u2013Sine\u2013Coupling\u2013Logistic chaotic map for image encryption. IEEE Access 7, 14081\u201314098 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2893538","journal-title":"IEEE Access"},{"key":"2640_CR43","doi-asserted-by":"publisher","first-page":"2297","DOI":"10.1073\/pnas.88.6.2297","volume":"88","author":"SM Pincus","year":"1991","unstructured":"Pincus, S.M.: Approximate entropy as a measure of system complexity. Proc. Natl. Acad. Sci. U.S.A. 88, 2297\u20132301 (1991)","journal-title":"Proc. Natl. Acad. Sci. U.S.A."},{"key":"2640_CR44","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1063\/1.166092","volume":"5","author":"SM Pincus","year":"1995","unstructured":"Pincus, S.M.: Approximate entropy(ApEn) as a complexity measure. Chaos 5, 110\u2013117 (1995). https:\/\/doi.org\/10.1063\/1.166092","journal-title":"Chaos"},{"key":"2640_CR45","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1103\/RevModPhys.57.617","volume":"57","author":"JP Eckmann","year":"1985","unstructured":"Eckmann, J.P., Ruelle, D.: Ergodic theory of chaos and strange attractors. Rev. Modern Phys. 57, 617\u2013654 (1985). https:\/\/doi.org\/10.1103\/RevModPhys.57.617","journal-title":"Rev. Modern Phys."},{"key":"2640_CR46","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.optlastec.2018.01.007","volume":"103","author":"L Gong","year":"2018","unstructured":"Gong, L., Deng, C., Pan, S., Zhou, N.: Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform. Opt. Laser Technol. 103, 48\u201358 (2018). https:\/\/doi.org\/10.1016\/j.optlastec.2018.01.007","journal-title":"Opt. Laser Technol."},{"key":"2640_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105581","volume":"119","author":"X Wang","year":"2019","unstructured":"Wang, X., Zhang, J., Cao, G.: An image encryption algorithm based on Zigzag transform and LL compound chaotic system. Opt. Laser Technol. 119, 105581 (2019). https:\/\/doi.org\/10.1016\/j.optlastec.2019.105581","journal-title":"Opt. Laser Technol."},{"key":"2640_CR48","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"355","author":"A-V Diaconu","year":"2016","unstructured":"Diaconu, A.-V.: Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf. Sci. (Ny) 355, 314\u2013327 (2016). https:\/\/doi.org\/10.1016\/j.sigpro.2017.08.020","journal-title":"Inf. Sci. (Ny)"},{"key":"2640_CR49","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17\u201325 (2016). https:\/\/doi.org\/10.1016\/j.optlaseng.2015.09.007","journal-title":"Opt. Lasers Eng."},{"key":"2640_CR50","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai, X., Chen, Y., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197\u2013213 (2017). https:\/\/doi.org\/10.1016\/j.optlaseng.2016.08.009","journal-title":"Opt. Lasers Eng."},{"key":"2640_CR51","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.neucom.2017.12.048","volume":"283","author":"P Ping","year":"2018","unstructured":"Ping, P., Xu, F., Mao, Y., Wang, Z.: Designing permutation-substitution image encryption networks with Henon map. Neurocomputing 283, 53\u201363 (2018). https:\/\/doi.org\/10.1016\/j.neucom.2017.12.048","journal-title":"Neurocomputing"},{"key":"2640_CR52","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.sigpro.2019.06.013","volume":"164","author":"M Alawida","year":"2019","unstructured":"Alawida, M., Teh, J.S., Samsudin, A., Alshoura, W.H.: An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process. 164, 249\u2013266 (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2019.06.013","journal-title":"Signal Process."},{"issue":"8","key":"2640_CR53","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129\u20132151 (2006). https:\/\/doi.org\/10.1142\/S0218127406015970","journal-title":"Int. J. Bifurcat. Chaos"},{"key":"2640_CR54","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.jvcir.2016.06.005","volume":"40","author":"W Yap","year":"2016","unstructured":"Yap, W., Phan, R.C.-W., Goi, B., Yau, W., Heng, S.: On the effective subkey space of some image encryption algorithms using external key. Vis. Commun. Image R. 40, 51\u201357 (2016). https:\/\/doi.org\/10.1016\/j.jvcir.2016.06.005","journal-title":"Vis. Commun. Image R."},{"key":"2640_CR55","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323\u2013342 (2013). https:\/\/doi.org\/10.1016\/j.ins.2012.07.049","journal-title":"Inf. Sci."},{"key":"2640_CR56","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ins.2020.02.008","volume":"520","author":"A Mansouri","year":"2020","unstructured":"Mansouri, A., Wang, X.Y.: A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 520, 46\u201362 (2020). https:\/\/doi.org\/10.1016\/j.ins.2020.02.008","journal-title":"Inf. Sci."},{"issue":"3","key":"2640_CR57","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1109\/TCSI.2021.3133318","volume":"69","author":"X Wang","year":"2022","unstructured":"Wang, X., Liu, P.: A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans. Circuits Syst. I 69(3), 1291\u20131301 (2022). https:\/\/doi.org\/10.1109\/TCSI.2021.3133318","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"2640_CR58","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Wang, X.: A symmetric image encryption algorithm based on mixed linear nonlinear coupled map lattice. Inf. Sci. 273, 329\u2013351 (2014). https:\/\/doi.org\/10.1016\/j.ins.2014.02.156","journal-title":"Inf. Sci."},{"issue":"11","key":"2640_CR59","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1016\/j.sigpro.2013.04.021","volume":"93","author":"Y Zhou","year":"2013","unstructured":"Zhou, Y., Bao, L., Chen, C.: Image encryption using a new parametric switching chaotic system. Signal Process. 93(11), 3039\u20133052 (2013). https:\/\/doi.org\/10.1016\/j.sigpro.2013.04.021","journal-title":"Signal Process."},{"key":"2640_CR60","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat map. Chaos. Soliton. Fract. 21, 749\u2013761 (2004). https:\/\/doi.org\/10.1016\/j.chaos.2003.12.022","journal-title":"Chaos. Soliton. Fract."},{"key":"2640_CR61","unstructured":"Wu, Y., Noonan, J. P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidisci. J. Sci. Technol. J. Select. Areas Telecommun. (JSAT), pp. 31\u201338(2011)"},{"key":"2640_CR62","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.asoc.2014.09.039","volume":"26","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Wang, X.: A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput. 26, 10\u201320 (2015). https:\/\/doi.org\/10.1016\/j.asoc.2014.09.039","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"2640_CR63","doi-asserted-by":"publisher","first-page":"287","DOI":"10.3390\/e24020287","volume":"24","author":"Y Chen","year":"2022","unstructured":"Chen, Y., Xie, S., Zhang, J.: A hybrid domain image encryption algorithm based on improved Henon map. Entropy 24(2), 287 (2022). https:\/\/doi.org\/10.3390\/e24020287","journal-title":"Entropy"},{"key":"2640_CR64","doi-asserted-by":"publisher","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","volume":"8","author":"Q Liu","year":"2020","unstructured":"Liu, Q., Zhu, C., Deng, X.: An efficient image encryption scheme based on the LSS chaotic map and single S-Box. IEEE Access 8, 25664\u2013256781291 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2970806","journal-title":"IEEE Access"},{"issue":"4","key":"2640_CR65","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101\u20131108 (2012). https:\/\/doi.org\/10.1016\/j.sigpro.2011.10.023","journal-title":"Signal Process."},{"key":"2640_CR66","doi-asserted-by":"publisher","first-page":"2549","DOI":"10.3233\/JIFS-182778","volume":"37","author":"JS Khan","year":"2019","unstructured":"Khan, J.S., Ahmad, J., Ahmed, S.S., Siddiqa, H.A., Abbasi, S.F., Kayhan, S.K.: DNA key based visual chaotic image encryption. J. Intell. Fuzzy Syst. 37, 2549\u20132561 (2019). https:\/\/doi.org\/10.3233\/JIFS-182778","journal-title":"J. Intell. Fuzzy Syst."},{"key":"2640_CR67","doi-asserted-by":"publisher","first-page":"174463","DOI":"10.1109\/ACCESS.2020.3024869","volume":"8","author":"X Wang","year":"2020","unstructured":"Wang, X., Liu, P.: A new image encryption scheme based on a novel one-dimensional chaotic system. IEEE Access 8, 174463\u2013174479 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3024869","journal-title":"IEEE Access"},{"key":"2640_CR68","doi-asserted-by":"publisher","first-page":"147106","DOI":"10.1109\/ACCESS.2019.2946208","volume":"7","author":"S Zhu","year":"2019","unstructured":"Zhu, S., Zhu, C.: Plaintext-related image encryption algorithm based on block structure and five-dimensional chaotic map. IEEE Access 7, 147106\u2013147118 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2946208","journal-title":"IEEE Access"},{"key":"2640_CR69","doi-asserted-by":"publisher","first-page":"210382","DOI":"10.1109\/ACCESS.2020.3039891","volume":"8","author":"L Liu","year":"2020","unstructured":"Liu, L., Jiang, D., Wang, X., Zhang, L., Rong, X.: A dynamic triple-image encryption scheme based on chaos. S-Box and image compressing. IEEE Access. 8, 210382\u2013210399 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3039891","journal-title":"IEEE Access."},{"key":"2640_CR70","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108489","volume":"195","author":"L Zhu","year":"2022","unstructured":"Zhu, L., Jiang, D., Ni, J., Wang, X., Rong, X., Ahmad, M., Chen, Y.: A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing. Signal Process. 195, 108489 (2022). https:\/\/doi.org\/10.1016\/j.sigpro.2022.108489","journal-title":"Signal Process."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-022-02640-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-022-02640-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-022-02640-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T09:16:09Z","timestamp":1695978969000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-022-02640-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,28]]},"references-count":70,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["2640"],"URL":"https:\/\/doi.org\/10.1007\/s00371-022-02640-w","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,28]]},"assertion":[{"value":"20 July 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We would like to submit the enclosed manuscript entitled A novel fast image encryption scheme based on a new one-dimensional compound Sine chaotic system, which we wish to be considered for publication in The Visual Computer. No conflict of interest exits in the submission of this manuscript, and manuscript is approved by all authors for publication. I would like to declare on behalf of my co-authors that the work described was original research that has not been published previously, and not under consideration for publication elsewhere, in whole or in part. All the authors listed have approved the manuscript that is enclosed.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"conflict of interest"}}]}}