{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:14:49Z","timestamp":1753884889417,"version":"3.41.2"},"reference-count":31,"publisher":"World Scientific Pub Co Pte Ltd","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Info. Know. Mgmt."],"published-print":{"date-parts":[[2023,4]]},"abstract":"<jats:p> Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption scheme has pros and cons regarding its speed, complexity, and security. This paper proposes a new chaotic map called Power-Chaotic Map (PCM). Characteristics of the proposed PCM, such as chaotic behaviour, randomness, sensitivity, and s-unimodality, are investigated. As an application of the proposed chaotic map, an image encryption scheme is proposed to encrypt greyscale and text images. The proposed three-phase image encryption scheme performs a series of substitution and permutation operations. The Pixel-Level phase utilises the PCM\u2019s generated keystreams to perform the substitution operation of image pixels. The Row-Level phase permutates, via a proposed pseudorandom number generator, pixel locations of each row and then shuffles row locations. Finally, the Column-Level phase performs a substitution operation on pixels of each column. Performance of the proposed PCM-based image encryption scheme is investigated through histogram analysis, statistical correlation analysis, key sensitivity, encryption performance of text images, and permutation and substitution properties. Experimental results indicate that the PCM has a wider range of chaotic behaviour than well-known one-dimensional maps, meets the s-unimodality property, has high sensitivity, and generates keystreams with random-like behaviour. Furthermore, results indicate that the PCM-based image encryption scheme provides high encryption security for text images, high key sensitivity, immunity against brute-force attacks, strong statistical correlation results, strong encryption performance, and low computational complexity. <\/jats:p>","DOI":"10.1142\/s0219649222500885","type":"journal-article","created":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T08:06:42Z","timestamp":1667894802000},"source":"Crossref","is-referenced-by-count":0,"title":["A Proposal of a New Chaotic Map for Application in the Image Encryption Domain"],"prefix":"10.1142","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1652-5990","authenticated-orcid":false,"given":"Fadi","family":"Abu-Amara","sequence":"first","affiliation":[{"name":"Cybersecurity Program, Shenandoah University, 1460 University Dr, Winchester, VA 22601, USA"}]},{"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[{"name":"School of Computing, Edinburgh Napier University, Edinburgh, United Kingdom"}]}],"member":"219","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"issue":"3","key":"S0219649222500885BIB001","doi-asserted-by":"crossref","first-page":"1135","DOI":"10.12928\/telkomnika.v16i3.8545","volume":"16","author":"Abdullah HA","year":"2018","journal-title":"Telkomnika"},{"issue":"13","key":"S0219649222500885BIB002","first-page":"230","volume":"10","author":"Abu-Amara F","year":"2018","journal-title":"Journal of Advanced Research in Dynamical and Control Systems"},{"issue":"4","key":"S0219649222500885BIB003","first-page":"177","volume":"9","author":"Abu-Amara F","year":"2013","journal-title":"WSEAS Transactions on Signal Processing"},{"issue":"1","key":"S0219649222500885BIB004","first-page":"13","volume":"8","author":"Abu-Amara F","year":"2017","journal-title":"International Journal of Electronics Communication and Computer Engineering"},{"key":"S0219649222500885BIB005","first-page":"70","volume-title":"4th International Conference on Networking and Computer Application","author":"Abu-Amara F","year":"2017"},{"issue":"4","key":"S0219649222500885BIB006","doi-asserted-by":"crossref","first-page":"2531","DOI":"10.1016\/j.chaos.2009.03.196","volume":"42","author":"Aguirregabiria JM","year":"2009","journal-title":"Chaos, Solitons and Fractals"},{"key":"S0219649222500885BIB007","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1007\/s11071-015-2281-0","volume":"82","author":"Ahmad J","year":"2015","journal-title":"Nonlinear Dynamics"},{"issue":"3","key":"S0219649222500885BIB008","first-page":"152","volume":"2","author":"Alanazi HO","year":"2010","journal-title":"Journal of Computing"},{"issue":"9","key":"S0219649222500885BIB010","doi-asserted-by":"crossref","first-page":"3106","DOI":"10.1016\/j.cnsns.2014.02.011","volume":"19","author":"Amir A","year":"2014","journal-title":"Communication in Nonlinear Science and Numerical Simulation"},{"key":"S0219649222500885BIB011","doi-asserted-by":"crossref","first-page":"102433","DOI":"10.1109\/ACCESS.2021.3096224","volume":"9","author":"Asl A","year":"2021","journal-title":"IEEE Access"},{"volume-title":"Cryptography","year":"2017","author":"Buchan W","key":"S0219649222500885BIB012"},{"key":"S0219649222500885BIB013","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"Chanil P","year":"2017","journal-title":"Signal Processing"},{"key":"S0219649222500885BIB014","volume-title":"Understanding Cryptography: A Textbook for Students and Practitioners","author":"Christof P","year":"2010","edition":"2010"},{"key":"S0219649222500885BIB015","doi-asserted-by":"crossref","DOI":"10.1201\/9781439863893","volume-title":"The Mathematics of Ciphers: Number Theory and RSA Cryptography","author":"Coutinho SC","year":"1999","edition":"1"},{"key":"S0219649222500885BIB016","doi-asserted-by":"crossref","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","volume":"99","author":"Farah MAB","year":"2020","journal-title":"Nonlinear Dynamics"},{"key":"S0219649222500885BIB018","doi-asserted-by":"crossref","first-page":"26927","DOI":"10.1007\/s11042-020-09058-3","volume":"79","author":"Ghazvini M","year":"2020","journal-title":"Multimedia Tools and Applications"},{"issue":"39","key":"S0219649222500885BIB019","first-page":"1","volume":"127","author":"Girdhar A","year":"2021","journal-title":"Applied Physics B"},{"key":"S0219649222500885BIB020","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511626296","volume-title":"Stability, Instability and Chaos","author":"Glendinning P","year":"1994"},{"key":"S0219649222500885BIB021","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"Guan ZH","year":"2005","journal-title":"Physical Review Letters"},{"issue":"2","key":"S0219649222500885BIB022","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1109\/TII.2019.2923553","volume":"16","author":"Hua Z","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"S0219649222500885BIB023","doi-asserted-by":"crossref","first-page":"5883","DOI":"10.1016\/j.jksuci.2021.03.007","volume":"34","author":"Kaur G","year":"2021","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"17","key":"S0219649222500885BIB024","doi-asserted-by":"crossref","first-page":"2116","DOI":"10.3390\/electronics10172116","volume":"10","author":"Khairullah MK","year":"2021","journal-title":"Electronics"},{"issue":"12","key":"S0219649222500885BIB025","first-page":"1","volume":"14","author":"Khan M","year":"2019","journal-title":"PLoS One"},{"key":"S0219649222500885BIB026","doi-asserted-by":"crossref","first-page":"118624","DOI":"10.1109\/ACCESS.2021.3107608","volume":"9","author":"Lin CH","year":"2021","journal-title":"IEEE Access"},{"issue":"3","key":"S0219649222500885BIB027","doi-asserted-by":"crossref","first-page":"2877","DOI":"10.1007\/s11071-020-05625-3","volume":"100","author":"Naskar PK","year":"2020","journal-title":"Nonlinear Dynamics"},{"issue":"7","key":"S0219649222500885BIB028","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1016\/j.jksuci.2018.09.006","volume":"32","author":"Noha A","year":"2020","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"S0219649222500885BIB029","doi-asserted-by":"crossref","first-page":"140876","DOI":"10.1109\/ACCESS.2020.3012912","volume":"8","author":"Qayyum A","year":"2020","journal-title":"IEEE Access"},{"issue":"15","key":"S0219649222500885BIB031","doi-asserted-by":"crossref","first-page":"5429","DOI":"10.1007\/s11042-014-1861-1","volume":"74","author":"Tang Z","year":"2014","journal-title":"Multimedia Tools and Applications"},{"key":"S0219649222500885BIB034","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-019-56847-4","volume":"10","author":"Wang X","year":"2020","journal-title":"Scientific Reports"},{"key":"S0219649222500885BIB035","first-page":"1","volume":"2014","author":"Xianhan Z","year":"2014","journal-title":"The Scientific World Journal"},{"issue":"10","key":"S0219649222500885BIB036","doi-asserted-by":"crossref","first-page":"1312","DOI":"10.3390\/e23101312","volume":"23","author":"Yang C","year":"2021","journal-title":"Entropy"}],"container-title":["Journal of Information &amp; Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219649222500885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T03:41:28Z","timestamp":1682826088000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219649222500885"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":31,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["10.1142\/S0219649222500885"],"URL":"https:\/\/doi.org\/10.1142\/s0219649222500885","relation":{},"ISSN":["0219-6492","1793-6926"],"issn-type":[{"type":"print","value":"0219-6492"},{"type":"electronic","value":"1793-6926"}],"subject":[],"published":{"date-parts":[[2022,11,7]]},"article-number":"2250088"}}