{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T15:49:22Z","timestamp":1775922562251,"version":"3.50.1"},"reference-count":51,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.jisa.2026.104436","type":"journal-article","created":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T04:57:18Z","timestamp":1772859438000},"page":"104436","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["EIP: Efficient image protection scheme"],"prefix":"10.1016","volume":"99","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9224-4576","authenticated-orcid":false,"given":"Takreem","family":"Haider","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4700-4255","authenticated-orcid":false,"given":"Kanza Abdul","family":"Sattar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2776-1283","authenticated-orcid":false,"given":"Nikos","family":"Komninos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1373-7701","authenticated-orcid":false,"given":"Umar","family":"Hayat","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.jisa.2026.104436_bib0001","doi-asserted-by":"crossref","first-page":"135","DOI":"10.3390\/e20020135","article-title":"Complexity of simple, switched and skipped chaotic maps in finite precision","volume":"20","author":"Antonelli","year":"2018","journal-title":"Entropy"},{"key":"10.1016\/j.jisa.2026.104436_bib0002","doi-asserted-by":"crossref","unstructured":"SP N.. Recommendations for discrete logarithm-based cryptography2023. https:\/\/doi.org\/10.6028\/NIST.SP.800-186.","DOI":"10.6028\/NIST.SP.800-186"},{"issue":"4","key":"10.1016\/j.jisa.2026.104436_bib0003","doi-asserted-by":"crossref","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","article-title":"An image encryption scheme based on a new hybrid chaotic map and optimized substitution box","volume":"99","author":"Farah","year":"2020","journal-title":"Nonlinear Dyn"},{"key":"10.1016\/j.jisa.2026.104436_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlaseng.2020.106178","article-title":"An effective image encryption algorithm based on compressive sensing and 2D-SLIM","volume":"134","author":"Xu","year":"2020","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"10.1016\/j.jisa.2026.104436_bib0005","doi-asserted-by":"crossref","first-page":"9784","DOI":"10.1038\/s41598-020-66486-9","article-title":"A new image encryption scheme based on coupling map lattices with mixed multi-chaos","volume":"10","author":"Wang","year":"2020","journal-title":"Sci Rep"},{"key":"10.1016\/j.jisa.2026.104436_bib0006","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlaseng.2019.105995","article-title":"An image encryption algorithm based on a hidden attractor chaos system and the Knuth\u2013durstenfeld algorithm","volume":"128","author":"Wang","year":"2020","journal-title":"Opt Lasers Eng"},{"key":"10.1016\/j.jisa.2026.104436_bib0007","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlastec.2020.106837","article-title":"A chaotic image encryption algorithm based on random dynamic mixing","volume":"138","author":"Wang","year":"2021","journal-title":"Opt Laser Technol"},{"key":"10.1016\/j.jisa.2026.104436_bib0008","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2020.07.051","article-title":"Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme","volume":"544","author":"Wang","year":"2021","journal-title":"Inf Sci"},{"key":"10.1016\/j.jisa.2026.104436_bib0009","doi-asserted-by":"crossref","first-page":"10949","DOI":"10.1007\/s11042-020-10218-8","article-title":"Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation","volume":"80","author":"Yan","year":"2021","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10.1016\/j.jisa.2026.104436_bib0010","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1007\/s11071-021-06542-9","article-title":"Image encryption algorithm with matrix semi-tensor product","volume":"105","author":"Zou","year":"2021","journal-title":"Nonlinear Dyn"},{"key":"10.1016\/j.jisa.2026.104436_bib0011","doi-asserted-by":"crossref","first-page":"135880","DOI":"10.1109\/ACCESS.2023.3337443","article-title":"A robust S box design using cyclic groups and image encryption","volume":"11","author":"Ali","year":"2023","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.jisa.2026.104436_bib0012","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1007\/s11071-021-06308-3","article-title":"Design and application of an S-box using complete Latin square","volume":"104","author":"Hua","year":"2021","journal-title":"Nonlinear Dyn"},{"issue":"12","key":"10.1016\/j.jisa.2026.104436_bib0013","doi-asserted-by":"crossref","first-page":"2559","DOI":"10.3390\/sym14122559","article-title":"Application of DNA coding, the lorenz differential equations and a variation of the logistic map in a multi-stage cryptosystem","volume":"14","author":"Gabr","year":"2022","journal-title":"Symmetry"},{"key":"10.1016\/j.jisa.2026.104436_bib0014","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.ins.2022.05.032","article-title":"Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion","volume":"605","author":"Teng","year":"2022","journal-title":"Inf Sci"},{"issue":"19","key":"10.1016\/j.jisa.2026.104436_bib0015","doi-asserted-by":"crossref","first-page":"28769","DOI":"10.1007\/s11042-023-14542-7","article-title":"Haie: a hybrid adaptive image encryption algorithm using Chaos and DNA computing","volume":"82","author":"Mansoor","year":"2023","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2026.104436_bib0016","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2023.109107","article-title":"Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation","volume":"211","author":"Zhou","year":"2023","journal-title":"Signal Process"},{"key":"10.1016\/j.jisa.2026.104436_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118845","article-title":"A novel pixel-split image encryption scheme based on 2D Salomon map","volume":"213","author":"Lai","year":"2023","journal-title":"Expert Syst Appl"},{"issue":"2","key":"10.1016\/j.jisa.2026.104436_bib0018","doi-asserted-by":"crossref","first-page":"457","DOI":"10.3390\/math11020457","article-title":"Dual-domain image encryption in unsecure medium-a secure communication perspective","volume":"11","author":"Mahalingam","year":"2023","journal-title":"Mathematics"},{"key":"10.1016\/j.jisa.2026.104436_bib0019","doi-asserted-by":"crossref","first-page":"2370","DOI":"10.1109\/TIFS.2024.3350330","article-title":"Dynamic searchable symmetric encryption with strong security and robustness","volume":"19","author":"Dou","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"10.1016\/j.jisa.2026.104436_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.heliyon.2023.e23652","article-title":"A medical image encryption scheme based on Mobius transformation and Galois field","volume":"10","author":"Ali","year":"2024","journal-title":"Heliyon"},{"issue":"6","key":"10.1016\/j.jisa.2026.104436_bib0021","doi-asserted-by":"crossref","first-page":"1515","DOI":"10.1109\/TIFS.2018.2881677","article-title":"Encryption-then-compression systems using grayscale-based image encryption for JPEG images","volume":"14","author":"Chuman","year":"2018","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"10.1016\/j.jisa.2026.104436_bib0022","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1007\/s11042-021-11323-y","article-title":"A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence","volume":"81","author":"Adhikari","year":"2022","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2026.104436_bib0023","doi-asserted-by":"crossref","first-page":"19463","DOI":"10.1007\/s11071-024-10003-4","article-title":"A novel S-box generator using frobenius automorphism and its applications in image encryption","volume":"112","author":"Ali","year":"2024","journal-title":"Nonlinear Dyn"},{"issue":"16","key":"10.1016\/j.jisa.2026.104436_bib0024","first-page":"3970","article-title":"Image encryption using logistic-cosine-sine chaos map and elliptic curve cryptography","volume":"99","author":"Jasra","year":"2021","journal-title":"J Theor Appl Inf Technol"},{"issue":"4","key":"10.1016\/j.jisa.2026.104436_bib0025","doi-asserted-by":"crossref","first-page":"587","DOI":"10.3390\/math12040587","article-title":"Dynamic S-Box construction using Mordell elliptic curves over galois field and its applications in image encryption","volume":"12","author":"Alali","year":"2024","journal-title":"Mathematics"},{"issue":"1","key":"10.1016\/j.jisa.2026.104436_bib0026","first-page":"326","article-title":"Complex dynamics, hardware implementation and image encryption application of multiscroll memeristive hopfield neural network with a novel local active memeristor","volume":"70","author":"Yu","year":"2022","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"2","key":"10.1016\/j.jisa.2026.104436_bib0027","doi-asserted-by":"crossref","first-page":"845","DOI":"10.1109\/TNSE.2022.3223930","article-title":"Privacy protection of medical data based on multi-scroll memristive hopfield neural network","volume":"10","author":"Yu","year":"2022","journal-title":"IEEE Trans Network Sci Eng"},{"key":"10.1016\/j.jisa.2026.104436_bib0028","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.vlsi.2023.01.006","article-title":"Dynamics analysis, FPGA realization and image encryption application of a 5D memristive exponential hyperchaotic system","volume":"90","author":"Yu","year":"2023","journal-title":"Integration"},{"key":"10.1016\/j.jisa.2026.104436_bib0029","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.apm.2023.10.004","article-title":"A class of 2n+ 1 dimensional simplest hamiltonian conservative chaotic systems and fast image encryption schemes","volume":"125","author":"Kong","year":"2024","journal-title":"Appl Math Model"},{"key":"10.1016\/j.jisa.2026.104436_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2023.114440","article-title":"Dynamics analysis, synchronization and FPGA implementation of multiscroll hopfield neural networks with non-polynomial memristor","volume":"179","author":"Yu","year":"2024","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.jisa.2026.104436_bib0031","article-title":"Degn\u2013Harrison map: dynamical and network behaviours with applications in image encryption","volume":"192","author":"Vismaya","year":"2025","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.jisa.2026.104436_bib0032","doi-asserted-by":"crossref","first-page":"74656","DOI":"10.1109\/ACCESS.2025.3560686","article-title":"Lightweight image encryption algorithm using 4D-NDS: compound dynamic diffusion and single-round efficiency","volume":"13","author":"Liao","year":"2025","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.jisa.2026.104436_bib0033","doi-asserted-by":"crossref","first-page":"2811","DOI":"10.1007\/s11071-024-10324-4","article-title":"Image encryption based on novel hill cipher variant and 2D-IGSCM hyper-chaotic map","volume":"113","author":"Zheng","year":"2025","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"10.1016\/j.jisa.2026.104436_bib0034","doi-asserted-by":"crossref","DOI":"10.1088\/1402-4896\/ad9d8b","article-title":"A LE-controlled 4D non-degenerate hyperchaotic system and STP-CS model based efficient image encryption algorithm","volume":"100","author":"Long","year":"2025","journal-title":"Phys Scr"},{"issue":"1","key":"10.1016\/j.jisa.2026.104436_bib0035","doi-asserted-by":"crossref","DOI":"10.31893\/multiscience.2025012","article-title":"A new multiple-chaos image encryption algorithm based on block compressive sensing, swin transformer, and wild horse optimization","volume":"7","author":"Kadhim","year":"2025","journal-title":"Multidiscip Sci J"},{"key":"10.1016\/j.jisa.2026.104436_bib0036","doi-asserted-by":"crossref","first-page":"1277","DOI":"10.1007\/s11071-021-07017-7","article-title":"A new image encryption algorithm based on Latin square matrix","volume":"107","author":"Wang","year":"2022","journal-title":"Nonlinear Dyn"},{"key":"10.1016\/j.jisa.2026.104436_bib0037","series-title":"The arithmetic of elliptic curves","volume":"vol. 106","author":"Silverman","year":"2009"},{"key":"10.1016\/j.jisa.2026.104436_bib0038","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.neunet.2023.12.008","article-title":"Memristor-induced hyperchaos, multiscroll and extreme multistability in fractional-order HNN: image encryption and FPGA implementation","volume":"171","author":"Kong","year":"2024","journal-title":"Neural Netw"},{"key":"10.1016\/j.jisa.2026.104436_bib0039","series-title":"Smart intelligent computing and applications: proceedings of the third international conference on smart computing and informatics, volume 1","first-page":"675","article-title":"Image encryption using modified elliptic curve cryptography and hill cipher","author":"Rajvir","year":"2020"},{"issue":"12","key":"10.1016\/j.jisa.2026.104436_bib0040","doi-asserted-by":"crossref","first-page":"5691","DOI":"10.3390\/app11125691","article-title":"A novel asymmetric hyperchaotic image encryption scheme based on elliptic curve cryptography","volume":"11","author":"Liang","year":"2021","journal-title":"Appl Sci"},{"key":"10.1016\/j.jisa.2026.104436_bib0041","doi-asserted-by":"crossref","first-page":"77798","DOI":"10.1109\/ACCESS.2021.3083151","article-title":"A novel scheme of image encryption based on elliptic curves isomorphism and substitution boxes","volume":"9","author":"Khalid","year":"2021","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.jisa.2026.104436_bib0042","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1007\/s13198-021-01330-5","article-title":"Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication","volume":"13","author":"Bhat","year":"2022","journal-title":"Int J Syst Assur Eng Manage"},{"key":"10.1016\/j.jisa.2026.104436_bib0043","series-title":"2018 Second international conference on electronics, communication and aerospace technology (ICECA)","first-page":"643","article-title":"Elliptical curve cryptography for images using fractal based multiple key hill cipher","author":"Kedarisetti","year":"2018"},{"issue":"12","key":"10.1016\/j.jisa.2026.104436_bib0044","article-title":"A novel image encryption scheme based on compressive sensing, elliptic curves and a new jerk oscillator with multistability","volume":"97","author":"Tegue","year":"2022","journal-title":"Phys Scr"},{"issue":"37","key":"10.1016\/j.jisa.2026.104436_bib0045","doi-asserted-by":"crossref","first-page":"26927","DOI":"10.1007\/s11042-020-09058-3","article-title":"A modified method for image encryption based on chaotic map and genetic algorithm","volume":"79","author":"Ghazvini","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2026.104436_bib0046","doi-asserted-by":"crossref","first-page":"18317","DOI":"10.1007\/s11042-020-08742-8","article-title":"Multi-channel chaotic encryption algorithm for color image based on DNA coding","volume":"79","author":"Wang","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2026.104436_bib0047","doi-asserted-by":"crossref","first-page":"12452","DOI":"10.1109\/ACCESS.2020.2965740","article-title":"Color image encryption algorithm based on dynamic chaos and matrix convolution","volume":"8","author":"Hu","year":"2020","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.jisa.2026.104436_bib0048","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","volume":"1","author":"Wu","year":"2011","journal-title":"Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT)"},{"key":"10.1016\/j.jisa.2026.104436_bib0049","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.ins.2023.02.057","article-title":"Towards provably secure asymmetric image encryption schemes","volume":"631","author":"Azam","year":"2023","journal-title":"Inf Sci"},{"issue":"9","key":"10.1016\/j.jisa.2026.104436_bib0050","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.3390\/electronics10091066","article-title":"New image encryption algorithm using hyperchaotic system and fibonacci q-matrix","volume":"10","author":"Hosny","year":"2021","journal-title":"Electronics"},{"issue":"2","key":"10.1016\/j.jisa.2026.104436_bib0051","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","article-title":"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer","volume":"41","author":"Shor","year":"1999","journal-title":"SIAM Rev"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000669?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000669?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T15:27:18Z","timestamp":1775921238000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212626000669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":51,"alternative-id":["S2214212626000669"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104436","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"EIP: Efficient image protection scheme","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104436","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104436"}}