{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T18:19:32Z","timestamp":1774894772893,"version":"3.50.1"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Signal Processing"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1016\/j.dsp.2025.105823","type":"journal-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T17:31:09Z","timestamp":1765560669000},"page":"105823","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Multi-layer image encryption framework using a chaotic system with a dynamic starting point"],"prefix":"10.1016","volume":"170","author":[{"given":"Yavar","family":"Mousavi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5942-5260","authenticated-orcid":false,"given":"Ali","family":"Shokri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4761-9233","authenticated-orcid":false,"given":"Yavar","family":"Khedmati Yengejeh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2598-7820","authenticated-orcid":false,"given":"Hossein","family":"Kheiri","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"11","key":"10.1016\/j.dsp.2025.105823_bib0001","doi-asserted-by":"crossref","first-page":"2585","DOI":"10.3390\/math11112585","article-title":"Chaos-based image encryption: review, application, and challenges","volume":"11","author":"Zhang","year":"2023","journal-title":"Mathematics"},{"key":"10.1016\/j.dsp.2025.105823_bib0002","series-title":"2023 International Conference on Recent Advances in Science and Engineering Technology (ICRASET)","first-page":"1","article-title":"Next-gen image shielding: deep learning\u2019s stealthy image encryption for health-tech IoT","author":"Archana","year":"2023"},{"issue":"5","key":"10.1016\/j.dsp.2025.105823_bib0003","first-page":"123","article-title":"Color image encryption using chaotic algorithm and 2D sin-cos henon map for high security","volume":"11","author":"Indira","year":"2023","journal-title":"Int. J. Recent Innov. Trends Comput. Commun."},{"key":"10.1016\/j.dsp.2025.105823_bib0004","series-title":"2024 Third International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","first-page":"1","article-title":"QCrypt: Advanced quantum-based image encryption for secure satellite data transmission","author":"Ihsan","year":"2024"},{"issue":"2","key":"10.1016\/j.dsp.2025.105823_bib0005","first-page":"45","article-title":"Nonlinear dynamics in cryptographic systems for image encryption: a mathematical modeling approach","volume":"31","author":"Beevi","year":"2024","journal-title":"Commun. Appl. Nonlinear Anal."},{"issue":"2","key":"10.1016\/j.dsp.2025.105823_bib0006","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","article-title":"Deterministic nonperiodic flow","volume":"20","author":"Lorenz","year":"1963","journal-title":"J. Atmos. Sci."},{"issue":"12","key":"10.1016\/j.dsp.2025.105823_bib0007","doi-asserted-by":"crossref","first-page":"10611","DOI":"10.1007\/s11071-024-09632-6","article-title":"Image encryption algorithm based on COA and hyperchaotic Lorenz system","volume":"112","author":"Qin","year":"2024","journal-title":"Nonlinear Dyn."},{"issue":"12","key":"10.1016\/j.dsp.2025.105823_bib0008","doi-asserted-by":"crossref","first-page":"10583","DOI":"10.1007\/s11071-024-09620-w","article-title":"Novel image encryption algorithm using hybrid 3D-ICPCM and Hessenberg decomposition","volume":"112","author":"Verma","year":"2024","journal-title":"Nonlinear Dyn."},{"issue":"5","key":"10.1016\/j.dsp.2025.105823_bib0009","article-title":"Image encryption algorithm based on 2D-linear-infinite-collapse chaotic map and improved Hilbert curve","volume":"34","author":"Tang","year":"2024","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"6","key":"10.1016\/j.dsp.2025.105823_bib0010","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1007\/s10207-022-00588-5","article-title":"Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains","volume":"21","author":"Zia","year":"2022","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/j.dsp.2025.105823_bib0011","series-title":"2023 36th SBC\/SBMicro\/IEEE\/ACM Symposium on Integrated Circuits and Systems Design (SBCCI)","first-page":"1","article-title":"Design of an advanced system-on-chip architecture for chaotic image encryption","author":"Lima","year":"2023"},{"key":"10.1016\/j.dsp.2025.105823_bib0012","series-title":"ITM Web of Conferences","first-page":"03005","article-title":"Image encryption using convolutional neural network","volume":"45","author":"Subhashini","year":"2023"},{"key":"10.1016\/j.dsp.2025.105823_bib0013","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-024-64741-x","article-title":"A new encryption algorithm for image data based on two-way chaotic maps and iterative cellular automata","volume":"14","author":"Alkhonaini","year":"2024","journal-title":"Sci. Rep."},{"issue":"11","key":"10.1016\/j.dsp.2025.105823_bib0014","doi-asserted-by":"crossref","DOI":"10.1142\/S0218127424501384","article-title":"Cryptanalyzing an image encryption scheme using synchronization of memristor chaotic systems","volume":"34","author":"He","year":"2024","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"7","key":"10.1016\/j.dsp.2025.105823_bib0015","doi-asserted-by":"crossref","first-page":"7277","DOI":"10.1007\/s11071-024-10480-7","article-title":"A robust image encryption technique based on an improved fractional order chaotic map","volume":"113","author":"Jackson","year":"2025","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.dsp.2025.105823_bib0016","doi-asserted-by":"crossref","DOI":"10.3389\/fphy.2024.1469418","article-title":"A novel image encryption method based on improved two-dimensional logistic mapping and DNA computing","volume":"12","author":"Chen","year":"2024","journal-title":"Front. Phys."},{"key":"10.1016\/j.dsp.2025.105823_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.115638","article-title":"A novel image encryption algorithm with anti-tampering attack capability","volume":"189","author":"Zou","year":"2024","journal-title":"Chaos, Solitons Fractals"},{"key":"10.1016\/j.dsp.2025.105823_bib0018","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.120811","article-title":"Target-based image encryption via infinite interval chaotic system with ill-conditioned parameter and 3DBDM","volume":"232","author":"Liu","year":"2023","journal-title":"Expert Syst. Appl."},{"issue":"16","key":"10.1016\/j.dsp.2025.105823_bib0019","doi-asserted-by":"crossref","first-page":"1612","DOI":"10.3390\/rs17091612","article-title":"Oriented SAR ship detection based on edge deformable convolution and point set representation","volume":"17","author":"Guan","year":"2025","journal-title":"Remote Sens."},{"issue":"11","key":"10.1016\/j.dsp.2025.105823_bib0020","doi-asserted-by":"crossref","DOI":"10.1142\/S0218127424501384","article-title":"Cryptanalyzing an image encryption scheme using synchronization of memristor chaotic systems","volume":"34","author":"He","year":"2024","journal-title":"Int. J. Bifurc. Chaos"},{"key":"10.1016\/j.dsp.2025.105823_bib0021","first-page":"1","article-title":"A novel iterative self-organizing pixel matrix entanglement classifier for remote sensing imagery","volume":"62","author":"Zhou","year":"2024","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"issue":"7","key":"10.1016\/j.dsp.2025.105823_bib0022","article-title":"Resource-saving and high-robustness image sensing based on binary optical computing","volume":"19","author":"Zhou","year":"2025","journal-title":"Laser Photonics Rev."},{"issue":"19","key":"10.1016\/j.dsp.2025.105823_bib0023","doi-asserted-by":"crossref","first-page":"3608","DOI":"10.3390\/rs16193608","article-title":"Infrared weak target detection in dual images and dual areas","volume":"16","author":"Zhuang","year":"2024","journal-title":"Remote Sens."},{"key":"10.1016\/j.dsp.2025.105823_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.vlsi.2024.102138","article-title":"Color image encryption based on discrete memristor logistic map and DNA encoding","volume":"96","author":"Wang","year":"2024","journal-title":"Integration"},{"key":"10.1016\/j.dsp.2025.105823_bib0025","series-title":"Matrix Computations","author":"Golub","year":"2013"},{"key":"10.1016\/j.dsp.2025.105823_bib0026","series-title":"Iterative Methods for Sparse Linear Systems","author":"Saad","year":"2003"},{"key":"10.1016\/j.dsp.2025.105823_bib0027","series-title":"Numerical Linear Algebra","author":"Trefethen","year":"1997"},{"key":"10.1016\/j.dsp.2025.105823_bib0028","series-title":"Chaos: An Introduction to Dynamical Systems","author":"Alligood","year":"1996"},{"key":"10.1016\/j.dsp.2025.105823_bib0029","series-title":"Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry, and Engineering","author":"Strogatz","year":"2018"},{"issue":"1","key":"10.1016\/j.dsp.2025.105823_bib0030","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/BF02071050","article-title":"Cobwebs, chaos and bifurcations","volume":"37","author":"Hommes","year":"1992","journal-title":"Ann. Oper. Res."},{"key":"10.1016\/j.dsp.2025.105823_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2023.114396","article-title":"Image encryption algorithm based on a new 3D chaotic system using cellular automata","volume":"179","author":"Darani","year":"2024","journal-title":"Chaos, Solitons Fractals"},{"issue":"8","key":"10.1016\/j.dsp.2025.105823_bib0032","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"Alvarez","year":"2006","journal-title":"Int. J. Bifurc. Chaos"},{"key":"10.1016\/j.dsp.2025.105823_bib0033","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","article-title":"Local Shannon entropy measure with statistical tests for image randomness","volume":"222","author":"Wu","year":"2013","journal-title":"Inf. Sci."},{"issue":"2","key":"10.1016\/j.dsp.2025.105823_bib0034","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","volume":"1","author":"Wu","year":"2011","journal-title":"Cyber J."},{"key":"10.1016\/j.dsp.2025.105823_bib0035","series-title":"Statistical Learning and Pattern Analysis for Image and Video Processing","author":"Zheng","year":"2009"},{"issue":"5","key":"10.1016\/j.dsp.2025.105823_bib0036","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1016\/j.jksuci.2019.03.003","article-title":"A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the Chebyshev mappings and one-time pad","volume":"33","author":"Shakiba","year":"2021","journal-title":"J. King Saud Univ. - Comput. Inf. Sci."},{"key":"10.1016\/j.dsp.2025.105823_bib0037","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.optlaseng.2018.11.015","article-title":"On symmetric color image encryption system with permutation-diffusion simultaneous operation","volume":"115","author":"Huang","year":"2019","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.dsp.2025.105823_bib0038","doi-asserted-by":"crossref","first-page":"43777","DOI":"10.1007\/s11042-022-13012-w","article-title":"Chaotic image encryption method based on improved zigzag permutation and DNA rules","volume":"81","author":"Wang","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.dsp.2025.105823_bib0039","doi-asserted-by":"crossref","first-page":"11241","DOI":"10.1007\/s11042-015-2851-7","article-title":"A modified (dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps","volume":"75","author":"Rehman","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.dsp.2025.105823_bib0040","series-title":"2018 14th IEEE International Conference on Signal Processing (ICSP)","first-page":"317","article-title":"A new image encryption algorithm using homogenized Chebyshev\u2013Arnold map","author":"Luo","year":"2018"}],"container-title":["Digital Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200425008395?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200425008395?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T20:24:19Z","timestamp":1768595059000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1051200425008395"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":40,"alternative-id":["S1051200425008395"],"URL":"https:\/\/doi.org\/10.1016\/j.dsp.2025.105823","relation":{},"ISSN":["1051-2004"],"issn-type":[{"value":"1051-2004","type":"print"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Multi-layer image encryption framework using a chaotic system with a dynamic starting point","name":"articletitle","label":"Article Title"},{"value":"Digital Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.dsp.2025.105823","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"105823"}}