{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:40:53Z","timestamp":1771468853860,"version":"3.50.1"},"reference-count":51,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876200"],"award-info":[{"award-number":["61876200"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"MOE Layout Foundation of Humanities and Social Sciences","award":["20YJAZH102"],"award-info":[{"award-number":["20YJAZH102"]}]},{"name":"Foundation of Guangxi Key Laboratory of Cryptography and Information Security","award":["GCIS201908"],"award-info":[{"award-number":["GCIS201908"]}]},{"name":"Scientific and Technological Research Program of Chongqing Municipal Education Commission","award":["KJZD-K201901504"],"award-info":[{"award-number":["KJZD-K201901504"]}]},{"name":"Scientific and Technological Research Program of Chongqing Municipal Education Commission","award":["KJQN201901537"],"award-info":[{"award-number":["KJQN201901537"]}]},{"name":"Doctoral Talent Training Project of Chongqing University of Posts and Telecommunications","award":["BYJS202008"],"award-info":[{"award-number":["BYJS202008"]}]},{"name":"MOE Layout Foundation of Humanities and Social Sciences","award":["19YJCZH047"],"award-info":[{"award-number":["19YJCZH047"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Bifurcation Chaos"],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:p>Chaotic maps have been widely used in image encryption due to their complexity, pseudorandomness and high sensitivity to initial values. In this paper, an image encryption algorithm based on a 4D chaotic map and steganography is proposed. The algorithm consists of two rounds of encryption and one operation of embedding hash. In the first round of encryption, the hash value of plaintext image is used to control the generation of chaotic sequences, which makes the encryption algorithm highly relevant to the content of the image. Then, the hash value is embedded into the intermediate image according to the idea of steganography. In the second round of encryption, the image is encrypted under the control of another set of chaotic sequences to hide the hash value and further enhance the security of the algorithm. Different from other algorithms, our algorithm does not need to additionally transmit the hash value to the decryptor through a special channel. It has good availability and adaptability. Experimental results and security analysis demonstrate that the algorithm has high security performance and can resist various attacks.<\/jats:p>","DOI":"10.1142\/s0218127422500043","type":"journal-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T11:35:28Z","timestamp":1643024128000},"source":"Crossref","is-referenced-by-count":14,"title":["A Sensitive Image Encryption Algorithm Based on a Higher-Dimensional Chaotic Map and Steganography"],"prefix":"10.1142","volume":"32","author":[{"given":"Jinyuan","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5247-043X","authenticated-orcid":false,"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China"},{"name":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin 541004, P. R. China"}]},{"given":"Qi","family":"Han","sequence":"additional","affiliation":[{"name":"School of Intelligent Technology and Engineering, Chongqing University of Science and Technology, Chongqing 401331, P. R. China"}]},{"given":"Jerry","family":"Gao","sequence":"additional","affiliation":[{"name":"Computer Engineering Department, San Jose State University, San Jose, CA 95192, USA"}]}],"member":"219","published-online":{"date-parts":[[2022,1,24]]},"reference":[{"key":"S0218127422500043BIB001","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.06.013"},{"key":"S0218127422500043BIB002","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2009.02.033"},{"key":"S0218127422500043BIB003","doi-asserted-by":"publisher","DOI":"10.3182\/20090622-3-UK-3004.00034"},{"key":"S0218127422500043BIB004","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.11.010"},{"key":"S0218127422500043BIB005","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.10.004"},{"key":"S0218127422500043BIB006","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906292"},{"key":"S0218127422500043BIB007","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.005"},{"key":"S0218127422500043BIB008","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.06.035"},{"key":"S0218127422500043BIB009","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"S0218127422500043BIB010","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.08.110"},{"key":"S0218127422500043BIB011","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2018.12.178"},{"key":"S0218127422500043BIB012","doi-asserted-by":"publisher","DOI":"10.18280\/ts.360505"},{"key":"S0218127422500043BIB013","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.048"},{"key":"S0218127422500043BIB014","doi-asserted-by":"publisher","DOI":"10.3390\/e20070535"},{"key":"S0218127422500043BIB015","doi-asserted-by":"publisher","DOI":"10.1109\/SCEE.2018.8684083"},{"key":"S0218127422500043BIB016","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7129-4"},{"key":"S0218127422500043BIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.028"},{"key":"S0218127422500043BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2018.2873472"},{"key":"S0218127422500043BIB019","first-page":"102361","volume":"48","author":"Li C.","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"S0218127422500043BIB020","author":"Li C.","year":"2021","journal-title":"IEEE Trans. Comput."},{"key":"S0218127422500043BIB021","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.04.001"},{"key":"S0218127422500043BIB022","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922376"},{"key":"S0218127422500043BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-021-06576-z"},{"key":"S0218127422500043BIB024","author":"Liu S.","year":"2021","journal-title":"IEEE MultiMedia"},{"key":"S0218127422500043BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6214-z"},{"key":"S0218127422500043BIB026","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-020-05625-3"},{"key":"S0218127422500043BIB027","doi-asserted-by":"publisher","DOI":"10.1007\/s00542-019-04395-2"},{"key":"S0218127422500043BIB028","first-page":"102470","volume":"52","author":"Patro K.","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"S0218127422500043BIB029","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2020.153539"},{"key":"S0218127422500043BIB030","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6346-1"},{"key":"S0218127422500043BIB031","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2951749"},{"key":"S0218127422500043BIB032","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.10.031"},{"key":"S0218127422500043BIB033","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-019-1389-z"},{"key":"S0218127422500043BIB034","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2014.06.003"},{"key":"S0218127422500043BIB035","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4605-1"},{"key":"S0218127422500043BIB036","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929244"},{"key":"S0218127422500043BIB037","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.070"},{"key":"S0218127422500043BIB039","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2488-0"},{"key":"S0218127422500043BIB040","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2017.06.015"},{"key":"S0218127422500043BIB041","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.02.009"},{"key":"S0218127422500043BIB042","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127419501244"},{"key":"S0218127422500043BIB043","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.041"},{"key":"S0218127422500043BIB044","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1002\/sec.1458","volume":"9","author":"Ye G.","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"S0218127422500043BIB045","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127420502338"},{"key":"S0218127422500043BIB046","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-04683-4"},{"key":"S0218127422500043BIB047","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.09.039"},{"key":"S0218127422500043BIB048","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.055"},{"key":"S0218127422500043BIB049","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.08.079"},{"key":"S0218127422500043BIB050","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-017-3436-y"},{"key":"S0218127422500043BIB051","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2021.02.009"},{"key":"S0218127422500043BIB052","first-page":"1","author":"Zuras D.","year":"2008","journal-title":"IEEE Std 754-2008"}],"container-title":["International Journal of Bifurcation and Chaos"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218127422500043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T05:17:58Z","timestamp":1700111878000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218127422500043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":51,"journal-issue":{"issue":"01","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10.1142\/S0218127422500043"],"URL":"https:\/\/doi.org\/10.1142\/s0218127422500043","relation":{},"ISSN":["0218-1274","1793-6551"],"issn-type":[{"value":"0218-1274","type":"print"},{"value":"1793-6551","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1]]},"article-number":"2250004"}}