{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T14:03:53Z","timestamp":1764079433826,"version":"3.41.2"},"reference-count":48,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2019,2,3]],"date-time":"2019-02-03T00:00:00Z","timestamp":1549152000000},"content-version":"vor","delay-in-days":33,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71473201"],"award-info":[{"award-number":["71473201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>As one of the most widely used media types, images play an important role in the era of the Internet. And hence how to enhance the security of images has become a hot topic in the field of information security. However, due to some intrinsic characteristics of images, image security is still a challenging task. For the purpose of coping with this issue, in this paper, we propose a novel algorithm that combines a hyperchaotic system, dynamic filtering, and bit cuboid operations, namely, DFBC, for image encryption. Specifically, the proposed DFBC consists of four steps: firstly, a 7D Lorenz hyperchaotic system is utilized to generate a pseudorandom sequence; secondly, variable 1D filters are derived from the pseudorandom sequence, and dynamic filtering is conducted on each pixel of an image; thirdly, a diffusion scheme is performed and then the image is transformed to a bit cuboid; and, finally, various types of permutation (rearranging, symmetry, rotation, zigzag, and global bit permutation) are performed on the bit cuboid. The experiments on several testing images demonstrate that the DFBC achieves state\u2010of\u2010the\u2010art results in terms of several evaluation criteria, showing that the DFBC is promising for image encryption.<\/jats:p>","DOI":"10.1155\/2019\/7485621","type":"journal-article","created":{"date-parts":[[2019,2,3]],"date-time":"2019-02-03T23:35:42Z","timestamp":1549236942000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations"],"prefix":"10.1155","volume":"2019","author":[{"given":"Xinsheng","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhilong","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Jiang","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1546-8015","authenticated-orcid":false,"given":"Taiyong","family":"Li","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2019,2,3]]},"reference":[{"volume-title":"Applied Cryptography: Protocols, Algorithms and Source Code in C","year":"2007","author":"Schneier B.","key":"e_1_2_9_1_2"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9010251"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.12.011"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.10.023"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.055"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4056-x"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.02.021"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.03.010"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1063\/1.2959102"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4390-z"},{"key":"e_1_2_9_12_2","article-title":"Multi-image encryption scheme based on quantum 3d arnold transform and scaled zhongtang chaotic system","volume":"17","author":"Nanrun Z.","year":"2018","journal-title":"Quantum Information Processing"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(93)90009-P"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(85)90011-9"},{"key":"e_1_2_9_15_2","article-title":"Cryptanalysis of a hyper-chaotic image encryption algorithm and its improved version","volume":"60","author":"Wang J.","year":"2011","journal-title":"Acta Physica Sinica"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1146.2011.01004"},{"key":"e_1_2_9_17_2","article-title":"Cryptanalysis and improvement of a class of hyperchaos based image encryption algorithms","volume":"61","author":"Zhu C.-X.","year":"2012","journal-title":"Acta Physica Sinica"},{"key":"e_1_2_9_18_2","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/25\/10\/100503"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-1958-y"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-017-3436-y"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2018.04.030"},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-018-3810-7"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.041"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3858-4"},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.10.012"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.02.036"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.05.008"},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4391-y"},{"key":"e_1_2_9_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2017.10.010"},{"key":"e_1_2_9_30_2","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.26.1.013021"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2018.2881166"},{"key":"e_1_2_9_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.12.007"},{"key":"e_1_2_9_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2017.09.099"},{"key":"e_1_2_9_34_2","doi-asserted-by":"publisher","DOI":"10.3390\/e20040282"},{"key":"e_1_2_9_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-1902-1"},{"key":"e_1_2_9_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4605-1"},{"key":"e_1_2_9_37_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001416570019"},{"key":"e_1_2_9_38_2","doi-asserted-by":"publisher","DOI":"10.1140\/epjp\/i2018-12138-3"},{"key":"e_1_2_9_39_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418500578"},{"key":"e_1_2_9_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.09.055"},{"key":"e_1_2_9_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-010-9749-8"},{"key":"e_1_2_9_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2017.12.041"},{"key":"e_1_2_9_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4349-y"},{"key":"e_1_2_9_44_2","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/22\/1\/010504"},{"key":"e_1_2_9_45_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0217984918501245"},{"key":"e_1_2_9_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.007"},{"key":"e_1_2_9_47_2","doi-asserted-by":"publisher","DOI":"10.1201\/9781420057133"},{"key":"e_1_2_9_48_2","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","volume":"2","author":"Wu Y.","year":"2011","journal-title":"Cyber Journals: Multidisciplinary Journals in Science and Technology"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/7485621.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/7485621.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2019\/7485621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T14:20:48Z","timestamp":1723040448000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2019\/7485621"}},"subtitle":[],"editor":[{"given":"Amir","family":"Anees","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1155\/2019\/7485621"],"URL":"https:\/\/doi.org\/10.1155\/2019\/7485621","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"2018-11-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-09","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7485621"}}