{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T09:24:44Z","timestamp":1769246684381,"version":"3.49.0"},"reference-count":62,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,12,23]],"date-time":"2020-12-23T00:00:00Z","timestamp":1608681600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61471158"],"award-info":[{"award-number":["61471158"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2020,12,23]]},"abstract":"<jats:p>Low-dimensional chaotic mappings are simple functions that have low computation cost and are easy to realize, but applying them in a cryptographic algorithm will lead to security vulnerabilities. To overcome this shortcoming, this paper proposes the coupled chaotic system, which coupled the piecewise and Henon mapping. Simulation results indicate that the novel mapping has better complexity and initial sensitivity and larger key space compared with the original mapping. Then, a new color image encryption algorithm is proposed based on the new chaotic mapping. The algorithm has two processes: diffusion and confusion. In this scheme, the key is more than <jats:inline-formula>\n                     <a:math xmlns:a=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\">\n                        <a:msup>\n                           <a:mrow>\n                              <a:mn>2<\/a:mn>\n                           <\/a:mrow>\n                           <a:mrow>\n                              <a:mn>216<\/a:mn>\n                           <\/a:mrow>\n                        <\/a:msup>\n                     <\/a:math>\n                  <\/jats:inline-formula>, and SSIM and PSNR are 0.009675 and 8.6767, respectively. The secret key is applied in the shuffling and diffusion. Security analysis indicates that the proposed scheme can resist cryptanalytic attacks. It has superior performance and has high security.<\/jats:p>","DOI":"10.1155\/2020\/3837209","type":"journal-article","created":{"date-parts":[[2020,12,23]],"date-time":"2020-12-23T23:56:03Z","timestamp":1608767763000},"page":"1-20","source":"Crossref","is-referenced-by-count":16,"title":["A Color Image Encryption Scheme Based on a Novel 3D Chaotic Mapping"],"prefix":"10.1155","volume":"2020","author":[{"given":"Chunyuan","family":"Liu","sequence":"first","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China"},{"name":"Computer and Information Engineering College, Heilongjiang University of Science and Technology, Harbin 150027, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5520-6001","authenticated-orcid":true,"given":"Qun","family":"Ding","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enavi.2017.05.007"},{"key":"2","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","article-title":"Color image encryption based on hybrid hyper-chaotic system and cellular automata","volume":"90","author":"A. Y. Niyat","year":"2017","journal-title":"Optics and Lasers in Engineering"},{"key":"3","first-page":"6","article-title":"An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations","volume":"52","author":"X. Chai","year":"2017","journal-title":"Signal Process: Image Communication"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.004"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.03.021"},{"key":"6","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","article-title":"A visually secure image encryption scheme based on compressive sensing","volume":"134","author":"X. Chai","year":"2016","journal-title":"Signal Processing"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-018-0589-x"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.08.009"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/tnb.2017.2780881"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.06.013"},{"key":"11","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1007\/s11071-019-04809-w","article-title":"Enhancing unimodal digital chaotic maps through hybridisation","volume":"96","author":"M. Alawida","year":"2019","journal-title":"Nonlinear Dynamics"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2011.05.001"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.03.010"},{"key":"14","article-title":"Medical image encryption using high-speed scrambling and pixel adaptive diffusion","volume":"144","author":"Y. Z. Z. Hua","year":"2018","journal-title":"Signal Processing"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2870-z"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-0756-1"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.07.011"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/8692046"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2008.09.011"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.10.009"},{"issue":"9","key":"21","doi-asserted-by":"crossref","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","article-title":"Cascade chaotic system with applications","volume":"45","author":"Y. Zhou","year":"2012","journal-title":"IEEE Transactions on Cybernetics"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.01.026"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1142\/s021812741750033x"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.04.021"},{"issue":"12","key":"25","doi-asserted-by":"crossref","first-page":"3469","DOI":"10.1109\/TCSI.2014.2336512","article-title":"Discrete wheel-switching chaotic system and applications","volume":"61","author":"W. Yue","year":"2014","journal-title":"IEEE Transaction on Circuits and Systems\u2013I: Regular Papers"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2016.03.020"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.10.034"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.03.011"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2017.10.024"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2978503"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2009.11.010"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.12.011"},{"key":"33","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","article-title":"Image encryption based on three-dimensional bitmatrix permutation","volume":"118","author":"W. Yue","year":"2016","journal-title":"Signal Processing"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.88.174102"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-1957-9"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-1979-3"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1080\/10586458.1998.10504377"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/s0167-2789(99)00147-5"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1103\/physreve.62.6275"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/s0375-9601(01)00612-0"},{"key":"41","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780198507239.001.0001","volume-title":"Chaos and Nonlinear Dynamics: An Introduction for Scientists and Engineers","author":"R. C. Hilborn","year":"2000"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/0021-9045(91)90105-j"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2048-7"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1259-7"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-1893-8"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2008.11.005"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0119660"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.08.017"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.07.083"},{"issue":"6","key":"51","first-page":"13","article-title":"A novel image encryption scheme based on self-synchronous chaotic stream cipher and wavelet transform","volume":"20","author":"F. Chunlei","year":"2018","journal-title":"Entropy"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2017.07.041"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxs009"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1711"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2015.10.001"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-014-1800-0"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1492-0"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.08.079"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2281-0"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127416500218"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04637-4"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0040"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/3837209.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/3837209.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/3837209.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,23]],"date-time":"2020-12-23T23:56:08Z","timestamp":1608767768000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/complexity\/2020\/3837209\/"}},"subtitle":[],"editor":[{"given":"Cornelio","family":"Posadas-Castillo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,23]]},"references-count":62,"alternative-id":["3837209","3837209"],"URL":"https:\/\/doi.org\/10.1155\/2020\/3837209","relation":{},"ISSN":["1099-0526","1076-2787"],"issn-type":[{"value":"1099-0526","type":"electronic"},{"value":"1076-2787","type":"print"}],"subject":[],"published":{"date-parts":[[2020,12,23]]}}}