{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T10:01:34Z","timestamp":1777975294173,"version":"3.51.4"},"reference-count":50,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.ins.2025.122907","type":"journal-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T10:54:54Z","timestamp":1763636094000},"page":"122907","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Enhancing image encryption through fractional-order chaotic systems: A comparative analysis of six diverse models"],"prefix":"10.1016","volume":"730","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9898-6925","authenticated-orcid":false,"given":"Hidayet","family":"\u00c7elik","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8267-8469","authenticated-orcid":false,"given":"Nurettin","family":"Do\u011fan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2025.122907_b0005","series-title":"Handbook of geometric computing: applications in pattern recognition, computer vision, neuralcomputing and robotics","first-page":"231","article-title":"Chaos-based image encryption","author":"Corrochano","year":"2005"},{"issue":"11","key":"10.1016\/j.ins.2025.122907_b0010","doi-asserted-by":"crossref","first-page":"2585","DOI":"10.3390\/math11112585","article-title":"Chaos-based image encryption: Review, application, and challenges","volume":"11","author":"Zhang","year":"2023","journal-title":"Mathematics"},{"issue":"9","key":"10.1016\/j.ins.2025.122907_b0015","doi-asserted-by":"crossref","first-page":"10947","DOI":"10.1002\/mma.9161","article-title":"Stability analysis of a fractional\u2010order SEIR epidemic model with general incidence rate and time delay","volume":"46","author":"Ilhem","year":"2023","journal-title":"Mathematical Methods in the Applied Sciences"},{"issue":"2","key":"10.1016\/j.ins.2025.122907_b0020","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JAS.2016.7510127","article-title":"The switching fractional order chaotic system and its application to image encryption","volume":"4","author":"Hou","year":"2016","journal-title":"IEEE\/CAA J. Autom. Sin."},{"issue":"16","key":"10.1016\/j.ins.2025.122907_b0025","doi-asserted-by":"crossref","first-page":"21589","DOI":"10.1007\/s11042-017-5585-x","article-title":"The image encryption algorithm based on chaos and DNA computing","volume":"77","author":"Zhang","year":"2018","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"10.1016\/j.ins.2025.122907_b0030","doi-asserted-by":"crossref","first-page":"15737","DOI":"10.1038\/s41598-021-94748-7","article-title":"A new image encryption scheme based on fractional-order hyperchaotic system and multiple image fusion","volume":"11","author":"Gao","year":"2021","journal-title":"Sci. Rep."},{"issue":"20","key":"10.1016\/j.ins.2025.122907_b0035","doi-asserted-by":"crossref","first-page":"2593","DOI":"10.3390\/math9202593","article-title":"A new fractional-order chaotic system with its analysis, synchronization, and circuit realization for secure communication applications","volume":"9","author":"Rahman","year":"2021","journal-title":"Mathematics"},{"key":"10.1016\/j.ins.2025.122907_b0040","doi-asserted-by":"crossref","first-page":"139289","DOI":"10.1109\/ACCESS.2020.3012455","article-title":"A memristive chaotic system with hypermultistability and its application in image encryption","volume":"8","author":"Sun","year":"2020","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.ins.2025.122907_b0045","doi-asserted-by":"crossref","first-page":"1140","DOI":"10.1016\/j.cnsns.2010.05.027","article-title":"Recent history of fractional calculus","volume":"16","author":"Machado","year":"2011","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"10.1016\/j.ins.2025.122907_b0050","series-title":"2014 International Conference on Communication and Signal Processing","article-title":"Colour image encryption based on cross-coupled chaotic map and fractional order chaotic systems","author":"Paral","year":"2014"},{"key":"10.1016\/j.ins.2025.122907_b0055","series-title":"2019 23rd International Conference Electronics","article-title":"A provable secure image encryption schema based on fractional order chaotic systems","author":"Aydin","year":"2019"},{"issue":"2","key":"10.1016\/j.ins.2025.122907_b0060","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1007\/s12652-021-03675-y","article-title":"Novel encryption for color images using fractional-order hyperchaotic system","volume":"13","author":"Hosny","year":"2022","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"10.1016\/j.ins.2025.122907_b0065","series-title":"2022 IEEE 21st International Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","article-title":"A new encryption approach for color image using 3D fractional order chaotic system","author":"Haddad","year":"2022"},{"key":"10.1016\/j.ins.2025.122907_b0070","doi-asserted-by":"crossref","first-page":"85002","DOI":"10.1109\/ACCESS.2023.3301460","article-title":"Image encryption via base-n prngs and parallel base-n s-boxes","volume":"11","author":"Gabr","year":"2023","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.ins.2025.122907_b0075","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3390\/fractalfract7040287","article-title":"Multiple-layer image encryption utilizing fractional-order chen hyperchaotic map and cryptographically secure prngs","volume":"7","author":"Alexan","year":"2023","journal-title":"Fractal and Fractional"},{"key":"10.1016\/j.ins.2025.122907_b0080","doi-asserted-by":"crossref","first-page":"54928","DOI":"10.1109\/ACCESS.2023.3282160","article-title":"Color image cryptosystem based on sine chaotic map, 4d chen hyperchaotic map of fractional-order and hybrid dna coding","volume":"11","author":"Alexan","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.ins.2025.122907_b0085","doi-asserted-by":"crossref","unstructured":"Alexan, W., N. Alexan, and M. Gabr, A 3-layer psn for image encryption utilizing fractional-order chen hyperchaotic map and cryptographically-secure prngs. 2023. https:\/\/doi.org\/10.20944\/preprints202303.0299.v1.","DOI":"10.20944\/preprints202303.0299.v1"},{"key":"10.1016\/j.ins.2025.122907_b0090","doi-asserted-by":"crossref","first-page":"58751","DOI":"10.1109\/ACCESS.2019.2914722","article-title":"Color image compression-encryption algorithm based on fractional-order memristor chaotic circuit","volume":"7","author":"Yang","year":"2019","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.ins.2025.122907_b0095","article-title":"Generating chaotic series via encryption method in fractional\u2010order chua systems","volume":"2021","author":"Gong","year":"2021","journal-title":"Discret. Dyn. Nat. Soc."},{"issue":"7","key":"10.1016\/j.ins.2025.122907_b0100","doi-asserted-by":"crossref","first-page":"1398","DOI":"10.3390\/sym15071398","article-title":"A novel fractional-order memristive chaotic circuit with coexisting double-layout four-scroll attractors and its application in visually meaningful image encryption","volume":"15","author":"Wu","year":"2023","journal-title":"Symmetry"},{"issue":"5","key":"10.1016\/j.ins.2025.122907_b0105","doi-asserted-by":"crossref","DOI":"10.1088\/1674-1056\/21\/5\/050506","article-title":"Image encryption based on a delayed fractional-order chaotic logistic system","volume":"21","author":"Wang","year":"2012","journal-title":"Chin. Phys. B"},{"key":"10.1016\/j.ins.2025.122907_b0110","series-title":"Journal of Physics: Conference Series","article-title":"Image encryption using fractional order linear-nonlinear chaos","author":"Feng","year":"2020"},{"key":"10.1016\/j.ins.2025.122907_b0115","doi-asserted-by":"crossref","first-page":"54175","DOI":"10.1109\/ACCESS.2020.2979827","article-title":"An efficient image encryption scheme based on S-boxes and fractional-order differential logistic map","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.ins.2025.122907_b0120","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2021.116363","article-title":"Double color image encryption based on fractional order discrete improved Henon map and Rubik\u2019s cube transform","volume":"97","author":"Chen","year":"2021","journal-title":"Signal Process. Image Commun."},{"issue":"1","key":"10.1016\/j.ins.2025.122907_b0125","article-title":"A novel image encryption algorithm based on a fractional\u2010order hyperchaotic system and DNA computing","volume":"2017","author":"Li","year":"2017","journal-title":"Complexity"},{"key":"10.1016\/j.ins.2025.122907_b0130","series-title":"2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT)","article-title":"Image encryption and decryption algorithm based on fractional order simplified Lorenz chaotic system and DNA coding","author":"Yang","year":"2022"},{"key":"10.1016\/j.ins.2025.122907_b0135","first-page":"1","article-title":"A novel color image encryption algorithm based on the fractional order laser chaotic system and the DNA mutation principle","author":"Hao","year":"2022","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"10.1016\/j.ins.2025.122907_b0140","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1007\/s11042-023-15783-2","article-title":"Images encryption based on robust multi-mode finite time synchronization of fractional-order hyper-chaotic Rikitake systems","volume":"83","author":"Javan","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.ins.2025.122907_b0145","series-title":"2018 International Conference on Intelligent Circuits and Systems (ICICS","article-title":"A novel scheme of image encryption based on synchronization of fractional order chaotic systems","author":"Shukla","year":"2018"},{"issue":"8","key":"10.1016\/j.ins.2025.122907_b0150","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.3390\/electronics9081280","article-title":"A novel image encryption scheme based on 2D fractional chaotic map, DWT and 4D hyper-chaos","volume":"9","author":"Ding","year":"2020","journal-title":"Electronics"},{"issue":"5","key":"10.1016\/j.ins.2025.122907_b0155","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.1007\/s00371-021-02085-7","article-title":"The image compression\u2013encryption algorithm based on the compression sensing and fractional-order chaotic system","volume":"38","author":"Xu","year":"2022","journal-title":"Vis. Comput."},{"key":"10.1016\/j.ins.2025.122907_b0160","series-title":"Fractional-Order Nonlinear Systems: Modeling, Analysis and Simulation","author":"Petr\u00e1\u0161","year":"2011"},{"key":"10.1016\/j.ins.2025.122907_b0165","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/s11071-006-9094-0","article-title":"Stability analysis of linear fractional differential system with multiple time delays","volume":"48","author":"Deng","year":"2007","journal-title":"Nonlinear Dyn."},{"issue":"2","key":"10.1016\/j.ins.2025.122907_b0170","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1016\/j.cnsns.2011.05.038","article-title":"Chaos in fractional-order Genesio\u2013Tesi system and its synchronization","volume":"17","author":"Faieghi","year":"2012","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"11","key":"10.1016\/j.ins.2025.122907_b0175","doi-asserted-by":"crossref","first-page":"1072","DOI":"10.1109\/TCS.1986.1085869","article-title":"The double scroll family","volume":"33","author":"Chua","year":"1986","journal-title":"IEEE Trans. Circuits Systems I Fund. Theory Appl."},{"issue":"10","key":"10.1016\/j.ins.2025.122907_b0180","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1109\/81.246142","article-title":"Shil'nikov's theorem-a tutorial","volume":"40","author":"Silva","year":"1993","journal-title":"IEEE Trans. Circuits Syst. I: Fund. Theory Appl."},{"issue":"3","key":"10.1016\/j.ins.2025.122907_b0185","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1016\/0005-1098(92)90177-H","article-title":"Harmonic balance methods for the analysis of chaotic dynamics in nonlinear systems","volume":"28","author":"Genesio","year":"1992","journal-title":"Automatica"},{"issue":"8","key":"10.1016\/j.ins.2025.122907_b0190","doi-asserted-by":"crossref","first-page":"1517","DOI":"10.1088\/1009-1963\/14\/8\/007","article-title":"Chaotic dynamics and synchronization of fractional-order Genesio\u2013Tesi systems","volume":"14","author":"Jun-Guo","year":"2005","journal-title":"Chin. Phys."},{"key":"10.1016\/j.ins.2025.122907_b0195","doi-asserted-by":"crossref","unstructured":"L\u00fc, J. and G. Chen, A new chaotic attractor coined. International Journal of Bifurcation and chaos, 2002. 12(03): p. 659-661. A new chaotic attractor coined.","DOI":"10.1142\/S0218127402004620"},{"issue":"3","key":"10.1016\/j.ins.2025.122907_b0200","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1016\/j.chaos.2005.04.037","article-title":"A note on the fractional-order Chen system","volume":"27","author":"Lu","year":"2006","journal-title":"Chaos Solitons Fractals"},{"issue":"3","key":"10.1016\/j.ins.2025.122907_b0205","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/0167-2789(85)90093-4","article-title":"Asymptotic chaos","volume":"14","author":"Arneodo","year":"1985","journal-title":"Phys. D"},{"issue":"4","key":"10.1016\/j.ins.2025.122907_b0210","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1016\/j.chaos.2005.02.023","article-title":"Chaotic dynamics and synchronization of fractional-order Arneodo\u2019s systems","volume":"26","author":"Lu","year":"2005","journal-title":"Chaos Solitons Fractals"},{"issue":"5","key":"10.1016\/j.ins.2025.122907_b0215","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/0375-9601(76)90101-8","article-title":"An equation for continuous chaos","volume":"57","author":"R\u00f6ssler","year":"1976","journal-title":"Phys. Lett. A"},{"key":"10.1016\/j.ins.2025.122907_b0220","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.physa.2004.04.113","article-title":"Chaos and hyperchaos in the fractional-order R\u00f6ssler equations","volume":"341","author":"Li","year":"2004","journal-title":"Phys. A"},{"issue":"2","key":"10.1016\/j.ins.2025.122907_b0225","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/0375-9601(81)90165-1","article-title":"Double strange attractors in rigid body motion with linear feedback control","volume":"86","author":"Leipnik","year":"1981","journal-title":"Phys. Lett. A"},{"issue":"1","key":"10.1016\/j.ins.2025.122907_b0230","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.chaos.2006.06.013","article-title":"Chaos in the Newton\u2013Leipnik system with fractional order","volume":"36","author":"Sheu","year":"2008","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.ins.2025.122907_b0235","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1007\/BF02437847","article-title":"Study for the bifurcation topological structure and the global complicated character of a kind of nonlinear finance system (I)","volume":"22","author":"Jun-hai","year":"2001","journal-title":"Appl. Math. Mech."},{"issue":"5","key":"10.1016\/j.ins.2025.122907_b0240","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1016\/j.chaos.2006.07.051","article-title":"Nonlinear dynamics and chaos in a fractional-order financial system","volume":"36","author":"Chen","year":"2008","journal-title":"Chaos Solitons Fractals"},{"issue":"2","key":"10.1016\/j.ins.2025.122907_b0245","doi-asserted-by":"crossref","first-page":"2081","DOI":"10.1007\/s11042-020-09775-9","article-title":"An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography","volume":"80","author":"Benssalah","year":"2021","journal-title":"Multimed. Tools Appl."},{"issue":"10","key":"10.1016\/j.ins.2025.122907_b0250","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1080\/09500340.2021.1924885","article-title":"A novel image encryption using random matrix affine cipher and the chaotic maps","volume":"68","author":"Lone","year":"2021","journal-title":"J. Mod. Opt."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025525010436?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025525010436?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:18:18Z","timestamp":1766135898000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025525010436"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":50,"alternative-id":["S0020025525010436"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2025.122907","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhancing image encryption through fractional-order chaotic systems: A comparative analysis of six diverse models","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2025.122907","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"122907"}}