{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:10Z","timestamp":1740149050986,"version":"3.37.3"},"reference-count":36,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T00:00:00Z","timestamp":1606348800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2018A030307024","2018A0303100016","2020A1515010561","2018KQNCX244","2018GKTSCX043","2019KTSCX168"],"award-info":[{"award-number":["2018A030307024","2018A0303100016","2020A1515010561","2018KQNCX244","2018GKTSCX043","2019KTSCX168"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research Platform and Research Project of Universities in Guangdong Province","award":["2018A030307024","2018A0303100016","2020A1515010561","2018KQNCX244","2018GKTSCX043","2019KTSCX168"],"award-info":[{"award-number":["2018A030307024","2018A0303100016","2020A1515010561","2018KQNCX244","2018GKTSCX043","2019KTSCX168"]}]},{"name":"Characteristic Innovation Project from the Educational Department of Guangdong Province","award":["2018A030307024","2018A0303100016","2020A1515010561","2018KQNCX244","2018GKTSCX043","2019KTSCX168"],"award-info":[{"award-number":["2018A030307024","2018A0303100016","2020A1515010561","2018KQNCX244","2018GKTSCX043","2019KTSCX168"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,11,26]]},"abstract":"<jats:p>In this paper, we propose a novel 3-image bit-level encryption algorithm based on 3D nonequilateral Arnold transformation and hyperchaotic system. Firstly, the three plain images with <jats:inline-formula>\n                     <a:math xmlns:a=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\">\n                        <a:mi>N<\/a:mi>\n                        <a:mo>\u00d7<\/a:mo>\n                        <a:mi>M<\/a:mi>\n                     <\/a:math>\n                  <\/jats:inline-formula> are decomposed into 8-bit planes and then they overlap into a 3D bit matrix with size <jats:inline-formula>\n                     <c:math xmlns:c=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M2\">\n                        <c:mi>N<\/c:mi>\n                        <c:mo>\u00d7<\/c:mo>\n                        <c:mi>M<\/c:mi>\n                        <c:mo>\u00d7<\/c:mo>\n                        <c:mn>24<\/c:mn>\n                     <\/c:math>\n                  <\/jats:inline-formula>. Then, the 3D bit matrix is scrambled by 3D nonequilateral Arnold transformation and the scrambled 3D bit matrix is integrated and transformed into three 2D pixel-level images. Finally, the hyperchaotic system is used to diffuse the three 2D pixel-level images; then three diffused images are rearranged to be one color image, resulting in the encrypted image. Numerical simulations and analyses of the proposed encryption scheme are given to validate the feasibility and safety of the method. The statistical analyses like histogram, correlation, and entropy confirm that the proposed method can effectively resist statistical attacks and security key analysis shows that the key space is large enough to render the brute-force attack ineffective in proposed method. The differential analysis confirms that the proposed method is effective against differential attacks and the results of the experiment confirmed that the method can resist occlusion attack.<\/jats:p>","DOI":"10.1155\/2020\/8841302","type":"journal-article","created":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T02:20:05Z","timestamp":1606443605000},"page":"1-13","source":"Crossref","is-referenced-by-count":3,"title":["3-Image Bit-Level Encryption Algorithm Based on 3D Nonequilateral Arnold Transformation and Hyperchaotic System"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5540-2523","authenticated-orcid":true,"given":"Huiqing","family":"Huang","sequence":"first","affiliation":[{"name":"School of Mathematics, Jiaying University, Meizhou 514015, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8066-1404","authenticated-orcid":true,"given":"Dongsheng","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Shenzhen Institute of Information Technology, Shenzhen 518172, Guangdong, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118991863745"},{"key":"2","first-page":"49","article-title":"A new chaotic key-based design for image encryption and decryption","volume":"4","author":"J. Yen","year":"2000","journal-title":"IEEE International Symposium On Circuits & Systems"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2005.02.083"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.02.039"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.03.022"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1080\/00387010.2015.1089447"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0552"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183117500693"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9010251"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-2104-6"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3345-0"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.01.026"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.3390\/e21030319"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0224382"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2958319"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/iscas.2002.1011451"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.04.023"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0639-0"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2013.07.009"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2812080"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107286"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127499001024"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1142\/s0129183106008625"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.07.040"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1103\/physreve.64.056235"},{"issue":"7","key":"26","first-page":"1290","article-title":"2-Dimension non equilateral image scrambling transformation","volume":"35","author":"L. Shao","year":"2007","journal-title":"Acta Electronica Sinica"},{"issue":"13","key":"27","first-page":"3133","article-title":"2-D Arnold transformation and non-equilateral image scrambling transformation","volume":"30","author":"Y. Li","year":"2009","journal-title":"Computer Engineering and Design"},{"issue":"10","key":"28","first-page":"1831","article-title":"3-Dimensional non-equilateral Arnold transformation and its application in image scrambling","volume":"22","author":"C. Wu","year":"2010","journal-title":"Journal Of Computer-Aided Design & Computer Graphics"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4390-z"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106139"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-1957-9"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.11.004"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.12.008"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.156"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.09.039"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.03.021"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8841302.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8841302.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8841302.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T02:20:11Z","timestamp":1606443611000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8841302\/"}},"subtitle":[],"editor":[{"given":"Sen","family":"Bai","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,11,26]]},"references-count":36,"alternative-id":["8841302","8841302"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8841302","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,11,26]]}}}