{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T18:53:36Z","timestamp":1772996016815,"version":"3.50.1"},"reference-count":62,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"vor","delay-in-days":49,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Computers &amp; Digital Techniques"],"published-print":{"date-parts":[[2026,1]]},"abstract":"<jats:p>\n                    With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3\u2010stage hyperchaos\u2010based augmented image encryption technique (3SHAIET) that utilizes a three\u2010stage process with chaotic systems of increasing dimensionality (e.g., six\u2010dimensional [6D], 8D, and 9D) to enhance security against cryptographic attacks. At each stage, the image is converted into a 1D bit\u2010stream array, encrypted using dynamically generated S\u2010boxes, and XORed with keys derived from the chaotic systems, ensuring high sensitivity to initial conditions and strong diffusion and confusion properties. To achieve real\u2010time performance, the algorithm is realized on a field\u2010programmable gate array (FPGA), leveraging hardware acceleration for the lowest possible latency encryption. The FPGA realization is shown to provide a 165 times improvement in encryption rate over its corresponding software implementation. Experimental results demonstrate the algorithm\u2019s robustness, with an extremely large key space of 2\n                    <jats:sup>5475<\/jats:sup>\n                    and resistance to statistical (PSNR of 8.11\u2009dB, MAE of 81.74, and entropy of 7.999) and differential attacks (NPCR of 99.6216% and UACI of 32.0534%). Additionally, the resulting encrypted images\u2019 bit\u2010streams successfully pass all National Institute of Standards and Technology (NIST) randomness tests, further validating the algorithm\u2019s security. These results make the proposed 3SHAIET algorithm a highly efficient and secure solution for modern multimedia systems. The objective of 3SHAIET is to jointly maximize cryptographic strength (via multistage hyperchaotic keys and dynamic S\u2010boxes) and real\u2010time efficiency (via FPGA realization) for secure multimedia transmission and storage.\n                  <\/jats:p>","DOI":"10.1049\/cdt2\/6416727","type":"journal-article","created":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T05:35:06Z","timestamp":1771565706000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm"],"prefix":"10.1049","volume":"2026","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6159-4971","authenticated-orcid":false,"given":"Wassim","family":"Alexan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7322-701X","authenticated-orcid":false,"given":"Noura H.","family":"Elshabasy","sequence":"additional","affiliation":[]},{"given":"Eyad","family":"Mamdouh","sequence":"additional","affiliation":[]},{"given":"Remas","family":"Osama","sequence":"additional","affiliation":[]},{"given":"Mohamed A.","family":"Abd El Ghany","sequence":"additional","affiliation":[]},{"given":"Dina","family":"El-Damak","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2026,2,19]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3319335"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3454512"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3407838"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13163343"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.23919\/SPA59660.2023.10274462"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3287858"},{"key":"e_1_2_11_7_2","doi-asserted-by":"crossref","unstructured":"AlexanW. AshrafA. MamdouhE. MohamedS. andMoustafaM. Iomt security: Sha3-512 aes-256 rsa and lsb Steganography 2021 8th NAFOSTED Conference on Information and Computer Science (NICS) 2021 IEEE 177\u2013181.","DOI":"10.1109\/NICS54270.2021.9701567"},{"key":"e_1_2_11_8_2","doi-asserted-by":"crossref","unstructured":"ParikhP. PatelN. PatelD. ModiP. andKaurH. Ciphering the Modern World: A Comprehensive Analysis of des aes rsa and dhke 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom) 2024 IEEE 838\u2013842.","DOI":"10.23919\/INDIACom61295.2024.10498330"},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.3390\/fractalfract7040287"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2023.102620"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09790-7"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3433499"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121090"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3444732"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051219"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3446733"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.3390\/math11112585"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.5890\/JVTSD.2024.09.006"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3432008"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.13242"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-022-02750-5"},{"key":"e_1_2_11_22_2","doi-asserted-by":"crossref","unstructured":"JarinI. FattahS. A. andShahnazC. Natural and Medical Image Encryption Using Self-Adaptive Permutation and DNA Encoding 2018 IEEE International WIE Conference on Electrical and Computer Engineering (WIECONECE) 2018 99\u2013102.","DOI":"10.1109\/WIECON-ECE.2018.8783074"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1179\/1743131X11Y.0000000042"},{"key":"e_1_2_11_24_2","first-page":"885","article-title":"Multi-Image Encryption Algorithm Based on Image Hash, Bit-Planedecomposition and Dynamic DNA Coding","volume":"15","author":"Zhang Q.","year":"2020","journal-title":"The Institution of Engineering and Technology"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10526-7"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3282160"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10091066"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/CISP-BMEI56279.2022.9979933"},{"key":"e_1_2_11_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909554"},{"key":"e_1_2_11_30_2","doi-asserted-by":"crossref","unstructured":"HusseinK. A.andKareemT. B. Proposed Parallel Algorithms to Encryption Image Based on Hybrid Enhancement rc5 and rsa 2019 International Engineering Conference (IEC) 2019 101\u2013106.","DOI":"10.1109\/IEC47844.2019.8950593"},{"key":"e_1_2_11_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12595-8"},{"key":"e_1_2_11_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07818-4"},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.3390\/e20120913"},{"key":"e_1_2_11_34_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218348X24400395"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3326848"},{"key":"e_1_2_11_36_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym14030443"},{"key":"e_1_2_11_37_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJMIC.2020.114191"},{"key":"e_1_2_11_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2020.105362"},{"key":"e_1_2_11_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3285481"},{"key":"e_1_2_11_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.113396"},{"key":"e_1_2_11_41_2","doi-asserted-by":"publisher","DOI":"10.1108\/CW-03-2020-0042"},{"key":"e_1_2_11_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13132-0"},{"key":"e_1_2_11_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3301460"},{"key":"e_1_2_11_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3363018"},{"key":"e_1_2_11_45_2","unstructured":"AMD AMD virtex TM FPGAs 2025 [Accessed 04-01-2025]https:\/\/www.amd.com\/en\/products\/adaptive-socs-and-fpgas\/fpga\/virtex-7.html."},{"key":"e_1_2_11_46_2","unstructured":"Virtex-7 t and XT FPGAs data sheet: DC and AC switching characteristics 2021 [Accessed 04\u2013012025]https:\/\/docs.amd.com\/v\/u\/en-US\/ds183_Virtex_7_Data_Sheet."},{"key":"e_1_2_11_47_2","unstructured":"7 series FPGAs data sheet: Overview 2020 [Accessed 23-01-2025].https:\/\/docs.amd.com\/v\/u\/en-US\/ds180_7Series_Overview."},{"key":"e_1_2_11_48_2","unstructured":"Signal and Image Processing Institute The USC-SIPI Image Database accessed: 2024-03-04http:\/\/sipi.usc.edu\/database\/."},{"key":"e_1_2_11_49_2","article-title":"Mar20: A Benchmark for Military Aircraft Recognition in Remote Sensing Images","author":"Yu W.","year":"2022","journal-title":"National Remote Sensing Bulletin"},{"key":"e_1_2_11_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2018.2817550"},{"key":"e_1_2_11_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2901870"},{"key":"e_1_2_11_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3242311"},{"key":"e_1_2_11_53_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym14122559"},{"key":"e_1_2_11_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3106028"},{"key":"e_1_2_11_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3194590"},{"key":"e_1_2_11_56_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"e_1_2_11_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2022.3233129"},{"key":"e_1_2_11_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3217482"},{"key":"e_1_2_11_59_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106040"},{"key":"e_1_2_11_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973679"},{"key":"e_1_2_11_61_2","doi-asserted-by":"crossref","unstructured":"SolimanS. M. MagdyB. andAbd El GhanyM. A. Efficient Implementation of the AES Algorithm for Security Applications 2016 29th IEEE International System-on-Chip Conference (SOCC) 2016 IEEE 206\u2013210.","DOI":"10.1109\/SOCC.2016.7905466"},{"key":"e_1_2_11_62_2","doi-asserted-by":"publisher","DOI":"10.3390\/fractalfract7100734"}],"container-title":["IET Computers &amp; Digital Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/cdt2\/6416727","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/cdt2\/6416727","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/cdt2\/6416727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T15:50:58Z","timestamp":1772985058000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/cdt2\/6416727"}},"subtitle":[],"editor":[{"given":"Jim","family":"Harkin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":62,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["10.1049\/cdt2\/6416727"],"URL":"https:\/\/doi.org\/10.1049\/cdt2\/6416727","archive":["Portico"],"relation":{},"ISSN":["1751-8601","1751-861X"],"issn-type":[{"value":"1751-8601","type":"print"},{"value":"1751-861X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"2025-07-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-01-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-02-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6416727"}}