{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T03:06:48Z","timestamp":1776827208245,"version":"3.51.2"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T00:00:00Z","timestamp":1712707200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T00:00:00Z","timestamp":1712707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-02766-9","type":"journal-article","created":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T14:02:56Z","timestamp":1712757776000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Dynamic Analysis and Circuit Design of a New 3D Highly Chaotic System and its Application to Pseudo Random Number Generator (PRNG) and Image Encryption"],"prefix":"10.1007","volume":"5","author":[{"given":"Aceng","family":"Sambas","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Benkouider","sequence":"additional","affiliation":[]},{"given":"Sezgin","family":"Ka\u00e7ar","sequence":"additional","affiliation":[]},{"given":"Nurdo\u011fan","family":"Ceylan","sequence":"additional","affiliation":[]},{"given":"Sundarapandian","family":"Vaidyanathan","sequence":"additional","affiliation":[]},{"given":"Ibrahim Mohammed","family":"Sulaiman","sequence":"additional","affiliation":[]},{"given":"Mohamad Afendee","family":"Mohamed","sequence":"additional","affiliation":[]},{"given":"Ahmad Faisal Mohamad","family":"Ayob","sequence":"additional","affiliation":[]},{"given":"Sishu Shankar","family":"Muni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"key":"2766_CR1","doi-asserted-by":"publisher","first-page":"68057","DOI":"10.1109\/ACCESS.2022.3181424","volume":"10","author":"A Sambas","year":"2022","unstructured":"Sambas A, Vaidyanathan S, Zhang X, Koyuncu I, Bonny T, Tuna M, Alcin M, Zhang S, Sulaiman IM, Awwal AM, Kumam P. A novel 3D chaotic system with line equilibrium: Multistability, integral sliding mode control, electronic circuit, FPGA implementation and its image encryption. IEEE Access. 2022;10:68057\u201374.","journal-title":"IEEE Access"},{"key":"2766_CR2","doi-asserted-by":"crossref","unstructured":"Guo, S., Fu, Y., Yu, L.: An encrypted multitone modulation method for physical layer security based on chaotic cryptography. Physical Communication 47 (2021). Article ID 101389","DOI":"10.1016\/j.phycom.2021.101389"},{"issue":"3","key":"2766_CR3","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1007\/s11071-018-4249-3","volume":"93","author":"JP Singh","year":"2018","unstructured":"Singh JP, Roy BK. A more chaotic and easily hardware implementable new 3-d chaotic system in comparison with 50 reported systems. Nonlinear Dyn. 2018;93(3):1121\u201348.","journal-title":"Nonlinear Dyn"},{"key":"2766_CR4","doi-asserted-by":"crossref","unstructured":"Yang Q, Qiao X (2019) Constructing a new 3D chaotic system with any num- ber of equilibria. Int J Bifurcation Chaos 29(5). Article ID 1950060","DOI":"10.1142\/S0218127419500603"},{"key":"2766_CR5","doi-asserted-by":"crossref","unstructured":"Signing VRF, kengne J, Kana LK (2018) Dynamic analysis and multista- bility of a novel four-wing chaotic system with smooth piecewise quadratic nonlinearity. Chaos, Solitons and Fractals 113, 263\u2013274","DOI":"10.1016\/j.chaos.2018.06.008"},{"issue":"1","key":"2766_CR6","first-page":"123","volume":"32","author":"S Vaidyanathan","year":"2022","unstructured":"Vaidyanathan S, Benkouider K, Sambas A. A new multistable jerk chaotic system, its bifurcation analysis, backstepping control-based syn- chronization design and circuit simulation. Arch Control Sci. 2022;32(1):123\u201352.","journal-title":"Arch Control Sci"},{"issue":"6","key":"2766_CR7","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1140\/epjst\/e2020-900166-7","volume":"229","author":"SN Chowdhury","year":"2020","unstructured":"Chowdhury SN, Ghosh D. Hidden attractors: A new chaotic system without equilibria. Euro Phys J Spec Topics. 2020;229(6):1299\u2013308.","journal-title":"Euro Phys J Spec Topics"},{"key":"2766_CR8","doi-asserted-by":"crossref","unstructured":"Ren S, Panahi S, Rajagopal K, Akgul A, Pham V, Jafari S (2018) A new chaotic flow with hidden attractor: The first hyperjerk system with no equilibrium. Zeitschrift fu\u00a8r Naturforschung A 73(3): 239\u2013249","DOI":"10.1515\/zna-2017-0409"},{"key":"2766_CR9","doi-asserted-by":"crossref","unstructured":"Dong C (2022) Dynamics, periodic orbit analysis, and circuit implementation of a new chaotic system with hidden attractor. Fractal Fractional 6(4) (2022). Article ID 190","DOI":"10.3390\/fractalfract6040190"},{"issue":"3","key":"2766_CR10","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.14419\/ijet.v7i3.9846","volume":"7","author":"A Sambas","year":"2018","unstructured":"Sambas A, Mmat M, Vaidyanathan S, Mohamed M, Sanjaya W. A new 4-d chaotic system with hidden attractor and its circuit imple- mentation. Int J Eng Technol. 2018;7(3):1245\u201350.","journal-title":"Int J Eng Technol"},{"key":"2766_CR11","doi-asserted-by":"crossref","unstructured":"Yu F, Zhang Z, Shen H, Huang Y, Cai S, Du S (2022) Fpga imple- mentation and image encryption appli-cation of a new prng based on a memristive hopfield neural network with a special activation gradient. Chin Phys B 31(2). Article ID 020505","DOI":"10.1088\/1674-1056\/ac3cb2"},{"key":"2766_CR12","doi-asserted-by":"crossref","unstructured":"AbdElHaleem SH, Abd-El-Hafiz SK, Radwan AG (2022) A generalized framework for elliptic curves based PRNG and its utilization in image encryption. Sci Rep 12(1). Article ID 13278","DOI":"10.1038\/s41598-022-17045-x"},{"key":"2766_CR13","doi-asserted-by":"crossref","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Venegas-Andraca SE (2020) Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Physica A 547 (2020). Article ID 123869","DOI":"10.1016\/j.physa.2019.123869"},{"key":"2766_CR14","doi-asserted-by":"crossref","unstructured":"Gafsi M, Abbassi N, Hajjaji MA, Malek J, Mtibaa A (2020) Improved chaos-based cryptosystem for medical image encryption and decryption. Scientific Programming 2020. Article ID 6612390","DOI":"10.1155\/2020\/6612390"},{"issue":"4","key":"2766_CR15","first-page":"499","volume":"29","author":"B Mondal","year":"2017","unstructured":"Mondal B, Mandal T. A light weight secure image encryption scheme based on chaos and dna computing. J King Saud Univ- Comput Inform Sci. 2017;29(4):499\u2013504.","journal-title":"J King Saud Univ- Comput Inform Sci"},{"key":"2766_CR16","doi-asserted-by":"publisher","DOI":"10.1201\/9781351011419","volume-title":"Advances of DNA computing in cryptogra- phy","author":"S Namasudra","year":"2018","unstructured":"Namasudra S, Deka GC. Advances of DNA computing in cryptogra- phy. New York, USA: CRC Press; 2018."},{"issue":"4","key":"2766_CR17","first-page":"74","volume":"9","author":"H Zhu","year":"2023","unstructured":"Zhu H, Zhang X, Xing H, Feng L. Lightweight terminal cross-domain authentication protocol in edge computing environment. Chinese J Netw Inform Secur. 2023;9(4):74\u201389.","journal-title":"Chinese J Netw Inform Secur"},{"issue":"1","key":"2766_CR18","first-page":"124","volume":"9","author":"ASK Kumar","year":"2020","unstructured":"Kumar ASK, Razak TA. A secure crypto-based data outsourcing model for monitoring the smart environment in cloud. Int J Sci Technol Res. 2020;9(1):124\u201331.","journal-title":"Int J Sci Technol Res"},{"key":"2766_CR19","doi-asserted-by":"publisher","unstructured":"Das S, Singh MP, Namasudra S (2023) A lightweight authentication and key agreement protocol for Iot-based smart healthcare system. (2023). DOI:https:\/\/doi.org\/10.1109\/WCONF58270.2023.10235225","DOI":"10.1109\/WCONF58270.2023.10235225"},{"key":"2766_CR20","doi-asserted-by":"crossref","unstructured":"Singh A, Kumar A, Namasudra S (2024) DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography. Front Comput Sci 18(1) (2024). Article ID 181801","DOI":"10.1007\/s11704-022-2193-3"},{"key":"2766_CR21","doi-asserted-by":"publisher","unstructured":"Namasudra, S., Nath, S., Majumder, A.: Profile Based Access Control Model in Cloud Computing Environment. (2014). DOI:https:\/\/doi.org\/10.1109\/ICGCCEE.2014.6921420","DOI":"10.1109\/ICGCCEE.2014.6921420"},{"key":"2766_CR22","doi-asserted-by":"publisher","first-page":"21193","DOI":"10.1109\/ACCESS.2022.3153331","volume":"10","author":"A Hameed","year":"2022","unstructured":"Hameed A, Violos J, Leivadeas A. A deep learning approach for IoT traffic multi-classification in a smart-city scenario. IEEE Access. 2022;10:21193\u2013210.","journal-title":"IEEE Access"},{"key":"2766_CR23","doi-asserted-by":"publisher","unstructured":"Das S, Namasudra S (2022) A lightweight and anonymous mutual authentica- tion scheme for medical big data in distributed smart healthcare systems. IEEE\/ACM Trans Comput Biol Bioinform 1\u201312 (2022). DOI:https:\/\/doi.org\/10.1109\/TCBB.2022.3230053","DOI":"10.1109\/TCBB.2022.3230053"},{"key":"2766_CR24","doi-asserted-by":"crossref","unstructured":"Castro, F., Impedovo, D., Pirlo, G.: A medical image encryption scheme for secure fingerprint-based authenticated transmission. Applied Sciences 13(10) (2023). Article ID 6099","DOI":"10.3390\/app13106099"},{"key":"2766_CR25","doi-asserted-by":"crossref","unstructured":"Patel S, Vaish A (2023) Block based visually secure image encryption algorithm using 2d-compressive sensing and nonlinearity. Optik 272. Article ID 170341","DOI":"10.1016\/j.ijleo.2022.170341"},{"key":"2766_CR26","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1016\/j.ins.2022.06.011","volume":"607","author":"L Zhu","year":"2022","unstructured":"Zhu L, Jiang D, Ni J, Wang X, Rong X, Ahmad M. A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf Sci. 2022;607:1001\u201322.","journal-title":"Inf Sci"},{"issue":"3","key":"2766_CR27","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","volume":"16","author":"A Wolf","year":"1985","unstructured":"Wolf A, Swift JB, Swinney HL, Vastano JA. Determining lyapunov exponents from a time series. Physica D. 1985;16(3):285\u2013317.","journal-title":"Physica D"},{"issue":"5","key":"2766_CR28","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/S0960-0779(02)00479-4","volume":"16","author":"F Grond","year":"2003","unstructured":"Grond F, Diebner HH, Sahle S, Mathias A, Fischer S, Rossler OE. A robust, locally interpretable algorithm for lyapunov exponents. Chaos, Solitons Fractals. 2003;16(5):841\u201352.","journal-title":"Chaos, Solitons Fractals"},{"key":"2766_CR29","doi-asserted-by":"crossref","unstructured":"Silva-Juarez A, Tlelo-Cuautle E, de la Fraga LG, Li R Optimization of the Kaplan-Yorke dimension in fractional-order chaotic oscillators by metaheuristics. Applied Mathematics and Computation 394 (2021). Article ID 125831","DOI":"10.1016\/j.amc.2020.125831"},{"issue":"5","key":"2766_CR30","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1016\/0960-0779(93)90007-N","volume":"3","author":"Z-M Chen","year":"1993","unstructured":"Chen Z-M. A note on Kaplan-Yorke-type estimates on the fractal dimension of chaotic attractors. Chaos, Solitons Fractals. 1993;3(5):575\u201382.","journal-title":"Chaos, Solitons Fractals"},{"key":"2766_CR31","doi-asserted-by":"crossref","unstructured":"Dong C (2022) Dynamic analysis of a novel 3d chaotic system with hidden and coexisting attractors: Offset boosting, synchronization, and circuit realization. Fractal Fractional 6(10). Article ID 547","DOI":"10.3390\/fractalfract6100547"},{"key":"2766_CR32","doi-asserted-by":"crossref","unstructured":"Qiu H, Xu X, Jiang Z, Sun K, Cao C (2023) Dynamical behaviors, circuit design, and synchronization of a novel symmetric chaotic system with coexisting attractors. Scientific Reports 13(1) (2023). Article ID 1893","DOI":"10.1038\/s41598-023-28509-z"},{"key":"2766_CR33","doi-asserted-by":"crossref","unstructured":"Liu, T., Yan, H., Banerjee, S., Mou, J.: A fractional-order chaotic system with hidden attractor and self-excited attractor and its DSP implementation. Chaos, Solitons and Fractals 145 (2021). Article ID 110791","DOI":"10.1016\/j.chaos.2021.110791"},{"key":"#cr-split#-2766_CR34.1","doi-asserted-by":"crossref","unstructured":"Zhou W, Wang G, Shen Y, Yuan F, Yu S (2018) Hidden coexisting attrac- tors in a chaotic system without equilibrium point. International Journal of Bifurcation and Chaos 28","DOI":"10.1142\/S0218127418300331"},{"key":"#cr-split#-2766_CR34.2","unstructured":"(10) (2018). Article ID 1830033"},{"key":"2766_CR35","doi-asserted-by":"crossref","unstructured":"Rahman Z-A, Jasim BH (2022) Hidden dynamics investigation, fast adaptive synchronization, and chaos-based secure communication scheme of a new 3d fractional-order chaotic system. Inventions 7(4) (2022). Article ID 108","DOI":"10.3390\/inventions7040108"},{"issue":"5","key":"2766_CR36","first-page":"929","volume":"231","author":"S Kacar","year":"2022","unstructured":"Kacar S. A new data-hiding algorithm for multi-channel biomedical signals based on variable-order fractional chaotic neural networks with frequency effect. Euro Physical Journal. 2022;231(5):929\u201343.","journal-title":"Euro Physical Journal"},{"issue":"10","key":"2766_CR37","first-page":"1969","volume":"231","author":"S Kacar","year":"2022","unstructured":"Kacar S. Digital circuit implementation and PRNG-based data secu- rity application of variable-order fractional Hopfield neural network under electromagnetic radiation using Gr\u00b4\u2019 unwald-Letnikov method. Euro Phys J. 2022;231(10):1969\u201381.","journal-title":"Euro Phys J"},{"issue":"1","key":"2766_CR38","doi-asserted-by":"publisher","first-page":"4","DOI":"10.51537\/chaos.976593","volume":"4","author":"B Aricioglu","year":"2022","unstructured":"Aricioglu B, Kacar S. Circuit implementation and PRNG applications of time delayed Lorenz system. Chaos Theory Appl. 2022;4(1):4\u20139.","journal-title":"Chaos Theory Appl"},{"key":"2766_CR39","doi-asserted-by":"publisher","first-page":"152150","DOI":"10.1109\/ACCESS.2021.3126655","volume":"9","author":"K Benkouider","year":"2021","unstructured":"Benkouider K, Bouden T, Sambas A, Mohamed MA, Sulaiman IM, Mamat M, Ibrahim MAH. Dynamics, control and secure transmission electronic circuit implementation of a new 3d chaotic system in comparison with 50 reported systems. IEEE Access. 2021;9:152150\u201368.","journal-title":"IEEE Access"},{"key":"2766_CR40","doi-asserted-by":"publisher","first-page":"74734","DOI":"10.1109\/ACCESS.2019.2921309","volume":"7","author":"X Zhang","year":"2019","unstructured":"Zhang X, Wang L, Zhou Z, Niu Y. A chaos-based image encryption technique utilizing Hilbert curves and H-fractals. IEEE Access. 2019;7:74734\u201346.","journal-title":"IEEE Access"},{"key":"2766_CR41","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2018.12.002","volume":"115","author":"H Li","year":"2019","unstructured":"Li H, Wang Y, Zuo Z. Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms. Opt Lasers Eng. 2019;115:197\u2013207.","journal-title":"Opt Lasers Eng"},{"key":"2766_CR42","doi-asserted-by":"crossref","unstructured":"Wang X, Akgul A, Kacar S, Pham V-T (2017) Multimedia security application of a ten-term chaotic system without equilibrium. Complexity 2017 (2017). Article ID 8412093","DOI":"10.1155\/2017\/8412093"},{"key":"2766_CR43","doi-asserted-by":"crossref","unstructured":"Li Z, Peng C, Tan W, Li L (2021) An effective chaos-based image encryp- tion scheme using imitating jigsaw method. Complexity 2021. Article ID 8824915","DOI":"10.1155\/2021\/8824915"},{"issue":"11","key":"2766_CR44","doi-asserted-by":"publisher","first-page":"14867","DOI":"10.1007\/s11042-018-6827-2","volume":"78","author":"F Musanna","year":"2019","unstructured":"Musanna F, Kumar S. A novel fractional order chaos-based image encryption using fisher yates algorithm and 3-D cat map. Multimedia Tools and Applications. 2019;78(11):14867\u201395.","journal-title":"Multimedia Tools and Applications"},{"key":"2766_CR45","doi-asserted-by":"crossref","unstructured":"Liu H, Xu Y, Ma C (2020) Chaos-based image hybrid encryption algorithm using key stretching and hash feedback. Optik 216. Article ID 164925","DOI":"10.1016\/j.ijleo.2020.164925"},{"issue":"5","key":"2766_CR46","first-page":"998","volume":"23","author":"G Kaur","year":"2020","unstructured":"Kaur G, Agarwal R, Patidar V. Chaos based multiple order optical transform for 2D image encryption. Eng Sci Technol Int J. 2020;23(5):998\u20131014.","journal-title":"Eng Sci Technol Int J"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02766-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-02766-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02766-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T14:05:10Z","timestamp":1712757910000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-02766-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,10]]},"references-count":47,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["2766"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-02766-9","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,10]]},"assertion":[{"value":"4 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"420"}}