{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:44:38Z","timestamp":1765370678877,"version":"3.44.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T00:00:00Z","timestamp":1758585600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T00:00:00Z","timestamp":1758585600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001501","name":"University Grants Commission","doi-asserted-by":"publisher","award":["190520461818"],"award-info":[{"award-number":["190520461818"]}],"id":[{"id":"10.13039\/501100001501","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>One-dimensional (1D) chaotic maps play a pivotal role in diverse fields, including control systems, secure communication, and modeling complex systems, enabling to capture and analyze the intricate behaviors of dynamical processes. However, their limited control parameter ranges constrain their effectiveness in security applications such as cryptography and pseudo-random number generation. Addressing these concerns, the paper proposes a universal <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$e$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>e<\/mml:mi>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>-CM chaotification model, based on Euler\u2019s number, to enhance the chaotic control parameter range of one-dimensional maps to infinity. The efficacy of the <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$e$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>e<\/mml:mi>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>-CM model has been assessed for thirteen 1D chaotic maps including, Chebyshev, Logistic, Sine, Cubic, Coupled Sine, Cubic Logistic, Quadratic, Renyi, Simple Quadratic, Sine-Sinh-Sine, Singer, Squared Sine Logistic, and Tent maps. Various tests have been conducted to evaluate the enhanced <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$e$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>e<\/mml:mi>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>-CM maps, such as Lyapunov exponents, bifurcation diagrams, approximate and sample entropies, time sensitivity analysis, 0\u20131 test, 2D and 3D phase plots, and cobweb plots. The findings indicate that <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$e$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>e<\/mml:mi>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>-CM-based maps exhibit complex chaotic dynamics characterized by elevated positive Lyapunov exponent values, the lack of periodic windows in the bifurcation plot, and higher sample and approximate entropy values. The 2D and 3D phase trajectory plots demonstrate that the points are evenly distributed across the entire phase space, while the cobweb plots illustrate densely packed irregular rectangular trajectories. The 0\u20131 test produces linear <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$M-t$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mi>M<\/mml:mi>\n                    <mml:mo>-<\/mml:mo>\n                    <mml:mi>t<\/mml:mi>\n                  <\/mml:mrow>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula> and Brownian motion resembling chaotic <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$p-q$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mi>p<\/mml:mi>\n                    <mml:mo>-<\/mml:mo>\n                    <mml:mi>q<\/mml:mi>\n                  <\/mml:mrow>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula> plots, alongside indicator value approaching the ideal value of <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$1$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mn>1<\/mml:mn>\n                  <\/mml:mrow>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>. Additionally, the <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$e$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>e<\/mml:mi>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>-CM-based enhanced 1D maps have been employed in designing a pseudo-random bit generator (PRBG). The PRBG has been evaluated in the MATLAB simulator for operational efficiency, bit-generation speed, and performance, alongside a rigorous assessment of its statistical randomness through the NIST tests. The PRBG has proven to be efficient in resource usage, faster in execution, and high-performing, while also successfully passing NIST tests. The PRBG has also been implemented and analyzed on the leading ARM Cortex-M<jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$4$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mn>4<\/mml:mn>\n                  <\/mml:mrow>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>-based LPC <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$4357$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mn>4357<\/mml:mn>\n                  <\/mml:mrow>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula> IoT development board to showcase its practical efficiency in RAM and ROM memory usage, execution time, current, energy, and power consumption. The results indicate that the PRBG demonstrates smaller memory usage, significantly reduced execution time, and minimal power and energy consumption. Thus, the <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$e$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>e<\/mml:mi>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>-CM based enhanced maps and PRBG stand out as an excellent choice for use in IoT environments, where security, efficiency, and performance are paramount.<\/jats:p>","DOI":"10.1186\/s42400-024-00347-0","type":"journal-article","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T03:02:30Z","timestamp":1758596550000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["$$e$$-CM: A novel approach to advancing chaotic dynamics in discrete one-dimensional maps for secure IoT applications"],"prefix":"10.1186","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2488-9054","authenticated-orcid":false,"given":"Mir","family":"Nazish","sequence":"first","affiliation":[]},{"given":"M. Tariq","family":"Banday","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,23]]},"reference":[{"key":"347_CR1","doi-asserted-by":"publisher","first-page":"55405","DOI":"10.1109\/ACCESS.2018.2871557","volume":"6","author":"AA Alzaidi","year":"2018","unstructured":"Alzaidi AA, Ahmad M, Doja MN, Al Solami E, Beg MMS (2018) A new 1D chaotic map and \u03b2-hill climbing for generating substitution-boxes. IEEE Access 6:55405\u201355418. https:\/\/doi.org\/10.1109\/ACCESS.2018.2871557","journal-title":"IEEE Access"},{"issue":"3","key":"347_CR2","doi-asserted-by":"publisher","first-page":"1429","DOI":"10.1007\/s11277-019-06793-1","volume":"110","author":"TS Attaullah","year":"2020","unstructured":"Attaullah TS, Jamal SS (2020) An improved chaotic cryptosystem for image encryption and digital watermarking. Wir Pers Commun 110(3):1429\u20131442. https:\/\/doi.org\/10.1007\/s11277-019-06793-1","journal-title":"Wir Pers Commun"},{"issue":"4","key":"347_CR3","doi-asserted-by":"publisher","first-page":"274","DOI":"10.51537\/chaos.1214569","volume":"4","author":"N Charalampidis","year":"2022","unstructured":"Charalampidis N, Volos C, Moysis L, Stouboulos I (2022) A chaotification model based on modulo operator and secant functions for enhancing chaos. Chaos Theory Appl 4(4):274\u2013284. https:\/\/doi.org\/10.51537\/chaos.1214569","journal-title":"Chaos Theory Appl"},{"key":"347_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.physa.2016.07.008","volume":"463","author":"RE de Carvalho","year":"2016","unstructured":"de Carvalho RE, Leonel ED (2016) Squared sine logistic map. Phys A Stat Mech Its Appl 463:37\u201344. https:\/\/doi.org\/10.1016\/j.physa.2016.07.008","journal-title":"Phys A Stat Mech Its Appl"},{"issue":"11","key":"347_CR5","doi-asserted-by":"publisher","first-page":"2472","DOI":"10.1016\/j.ijleo.2013.12.001","volume":"125","author":"J Chen","year":"2014","unstructured":"Chen J, Zhu Z, Yu H (2014) A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme. Optik 125(11):2472\u20132478. https:\/\/doi.org\/10.1016\/j.ijleo.2013.12.001","journal-title":"Optik"},{"issue":"3","key":"347_CR6","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1080\/00207390802642237","volume":"40","author":"L Debnath","year":"2009","unstructured":"Debnath L (2009) The legacy of Leonhard Euler \u2013 a tricentennial tribute. Int J Math Educ Sci Technol 40(3):353\u2013388. https:\/\/doi.org\/10.1080\/00207390802642237","journal-title":"Int J Math Educ Sci Technol"},{"issue":"4","key":"347_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.4169\/193009809X468689","volume":"82","author":"TP Dence","year":"2009","unstructured":"Dence TP, Dence JB (2009) A survey of euler\u2019s constant. Math Mag 82(4):255\u2013265. https:\/\/doi.org\/10.4169\/193009809X468689","journal-title":"Math Mag"},{"key":"347_CR8","doi-asserted-by":"publisher","unstructured":"Elabady NF, Abdalkader HM, Moussa MI, Sabbeh SF (2014) Image encryption based on new one-dimensional chaotic map. In: 2014 international conference on engineering and technology (ICET), pp 1\u20136, https:\/\/doi.org\/10.1109\/ICEngTechnol.2014.7016811","DOI":"10.1109\/ICEngTechnol.2014.7016811"},{"issue":"3","key":"347_CR9","doi-asserted-by":"publisher","first-page":"2363","DOI":"10.1364\/OE.20.002363","volume":"20","author":"C Fu","year":"2012","unstructured":"Fu C, Chen J, Zou H, Meng W, Zhan Y, Yu Y (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics Express 20(3):2363. https:\/\/doi.org\/10.1364\/OE.20.002363","journal-title":"Optics Express"},{"issue":"8","key":"347_CR10","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1016\/j.compbiomed.2013.05.005","volume":"43","author":"C Fu","year":"2013","unstructured":"Fu C, Meng W, Zhan Y, Zhu Z, Lau FCM, Tse CK, Ma H (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000\u20131010. https:\/\/doi.org\/10.1016\/j.compbiomed.2013.05.005","journal-title":"Comput Biol Med"},{"issue":"11","key":"347_CR11","doi-asserted-by":"publisher","first-page":"2151","DOI":"10.3390\/sym13112151","volume":"13","author":"G Grassi","year":"2021","unstructured":"Grassi G (2021) Chaos in the real world: recent applications to communications, computing, distributed sensing, robotic motion, bio-impedance modelling and encryption systems. Symmetry (Basel) 13(11):2151. https:\/\/doi.org\/10.3390\/sym13112151","journal-title":"Symmetry (Basel)"},{"key":"347_CR12","unstructured":"Griffin J, (2013) The sine map. 3:1\u20139"},{"issue":"1","key":"347_CR13","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s11071-018-4573-7","volume":"95","author":"S Hanis","year":"2019","unstructured":"Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95(1):421\u2013432. https:\/\/doi.org\/10.1007\/s11071-018-4573-7","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"347_CR14","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/j.cpc.2012.11.017","volume":"184","author":"H Hu","year":"2013","unstructured":"Hu H, Liu L, Ding N (2013) Pseudorandom sequence generator based on the Chen chaotic system. Comput Phys Commun 184(3):765\u2013768. https:\/\/doi.org\/10.1016\/j.cpc.2012.11.017","journal-title":"Comput Phys Commun"},{"issue":"2","key":"347_CR15","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1109\/TIE.2018.2833049","volume":"66","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou B, Zhou Y (2019) Sine chaotification model for enhancing chaos and its hardware implementation. IEEE Trans Ind Electron 66(2):1273\u20131284. https:\/\/doi.org\/10.1109\/TIE.2018.2833049","journal-title":"IEEE Trans Ind Electron"},{"key":"347_CR16","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci (Ny) 480:403\u2013419. https:\/\/doi.org\/10.1016\/j.ins.2018.12.048","journal-title":"Inf Sci (Ny)"},{"key":"347_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2023.12.008","volume":"171","author":"X Kong","year":"2024","unstructured":"Kong X, Yu F, Yao W, Cai S, Zhang J, Lin H (2024) Memristor-induced hyperchaos, multiscroll and extreme multistability in fractional-order HNN: Image encryption and FPGA implementation. Neural Netw 171:85\u2013103. https:\/\/doi.org\/10.1016\/j.neunet.2023.12.008","journal-title":"Neural Netw"},{"issue":"1","key":"347_CR18","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1007\/s11042-015-3027-1","volume":"76","author":"R Krishnamoorthi","year":"2017","unstructured":"Krishnamoorthi R, Murali P (2017) A selective image encryption based on square-wave shuffling with orthogonal polynomials transformation suitable for mobile devices. Multimed Tools Appl 76(1):1217\u20131246. https:\/\/doi.org\/10.1007\/s11042-015-3027-1","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"347_CR19","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2017","unstructured":"Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127\u2013133. https:\/\/doi.org\/10.1007\/s11071-016-3030-8","journal-title":"Nonlinear Dyn"},{"issue":"18","key":"347_CR20","doi-asserted-by":"publisher","first-page":"29878","DOI":"10.1109\/JIOT.2024.3409373","volume":"11","author":"H Lin","year":"2024","unstructured":"Lin H, Deng X, Yu F, Sun Y (2024) Grid multibutterfly memristive neural network with three memristive systems: modeling, dynamic analysis, and application in police IoT. IEEE Int Things J 11(18):29878\u201329889. https:\/\/doi.org\/10.1109\/JIOT.2024.3409373","journal-title":"IEEE Int Things J"},{"issue":"9","key":"347_CR21","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/21\/9\/090506","volume":"21","author":"Y Liu","year":"2012","unstructured":"Liu Y, Tong X-J (2012) A new pseudorandom number generator based on a complex number chaotic equation. Chin Phys B 21(9):090506. https:\/\/doi.org\/10.1088\/1674-1056\/21\/9\/090506","journal-title":"Chin Phys B"},{"issue":"11","key":"347_CR22","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1016\/j.ipl.2016.06.011","volume":"116","author":"L Liu","year":"2016","unstructured":"Liu L, Miao S, Cheng M, Gao X (2016a) A pseudorandom bit generator based on new multi-delayed Chebyshev map. Inf Process Lett 116(11):674\u2013681. https:\/\/doi.org\/10.1016\/j.ipl.2016.06.011","journal-title":"Inf Process Lett"},{"issue":"2","key":"347_CR23","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/iet-ifs.2014.0192","volume":"10","author":"L Liu","year":"2016","unstructured":"Liu L, Miao S, Hu H, Deng Y (2016b) Pseudorandom bit generator based on non-stationary logistic maps. IET Inform Secur 10(2):87\u201394. https:\/\/doi.org\/10.1049\/iet-ifs.2014.0192","journal-title":"IET Inform Secur"},{"issue":"16","key":"347_CR24","doi-asserted-by":"publisher","first-page":"24131","DOI":"10.1007\/s11356-021-17668-z","volume":"29","author":"YD Mammedov","year":"2022","unstructured":"Mammedov YD, Olugu EU, Farah GA (2022) Weather forecasting based on data-driven and physics-informed reservoir computing models. Environ Sci Pollut Res 29(16):24131\u201324144. https:\/\/doi.org\/10.1007\/s11356-021-17668-z","journal-title":"Environ Sci Pollut Res"},{"key":"347_CR25","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ins.2020.02.008","volume":"520","author":"A Mansouri","year":"2020","unstructured":"Mansouri A, Wang X (2020) A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf Sci (Ny) 520:46\u201362. https:\/\/doi.org\/10.1016\/j.ins.2020.02.008","journal-title":"Inf Sci (Ny)"},{"issue":"5560","key":"347_CR26","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"RM May","year":"1976","unstructured":"May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459\u2013467. https:\/\/doi.org\/10.1038\/261459a0","journal-title":"Nature"},{"issue":"2","key":"347_CR27","first-page":"58","volume":"2","author":"L Moysis","year":"2020","unstructured":"Moysis L, Tutueva A, Volos C, Butusov D (2020) A chaos based pseudo-random bit generator using multiple digits comparison. Chaos Theory Appl 2(2):58\u201368","journal-title":"Chaos Theory Appl"},{"issue":"15","key":"347_CR28","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.3390\/math9151821","volume":"9","author":"L Moysis","year":"2021","unstructured":"Moysis L, Rajagopal K, Tutueva AV, Volos C, Teka B, Butusov DN (2021) Chaotic path planning for 3d area coverage using a pseudo-random bit generator from a 1D chaotic map. Mathematics 9(15):1821. https:\/\/doi.org\/10.3390\/math9151821","journal-title":"Mathematics"},{"key":"347_CR29","doi-asserted-by":"publisher","first-page":"167300","DOI":"10.1016\/j.ijleo.2021.167300","volume":"242","author":"Joan S Muthu","year":"2021","unstructured":"Muthu Joan S, Murali P (2021) A new chaotic map with large chaotic band for a secured image cryptosystem. Optik 242:167300. https:\/\/doi.org\/10.1016\/j.ijleo.2021.167300","journal-title":"Optik"},{"issue":"5","key":"347_CR30","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/s42979-021-00778-3","volume":"2","author":"JS Muthu","year":"2021","unstructured":"Muthu JS, Murali P (2021) Review of chaos detection techniques performed on chaotic maps and systems in image encryption. SN Comput Sci 2(5):392. https:\/\/doi.org\/10.1007\/s42979-021-00778-3","journal-title":"SN Comput Sci"},{"issue":"1","key":"347_CR31","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s40745-021-00364-7","volume":"11","author":"RB Naik","year":"2024","unstructured":"Naik RB, Singh U (2024) A review on applications of chaotic maps in pseudo-random number generators and encryption. Ann Data Sci 11(1):25\u201350. https:\/\/doi.org\/10.1007\/s40745-021-00364-7","journal-title":"Ann Data Sci"},{"issue":"1","key":"347_CR32","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1140\/epjst\/e2019-800206-9","volume":"228","author":"H Natiq","year":"2019","unstructured":"Natiq H, Banerjee S, Said MRM (2019) Cosine chaotification technique to enhance chaos and complexity of discrete systems. Eur Phys J Spec Top 228(1):185\u2013194. https:\/\/doi.org\/10.1140\/epjst\/e2019-800206-9","journal-title":"Eur Phys J Spec Top"},{"key":"347_CR33","doi-asserted-by":"publisher","unstructured":"Nazish M, Banday MT (2023) Exploring lightweight encryption for image security using one-dimensional chaotic maps. In: 2023 third international conference on smart technologies, communication and robotics (STCR), pp. 1\u20136, https:\/\/doi.org\/10.1109\/STCR59085.2023.10396991","DOI":"10.1109\/STCR59085.2023.10396991"},{"key":"347_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2024.3450547","volume":"27","author":"M Nazish","year":"2024","unstructured":"Nazish M, Banday MT (2024) A novel fibonacci-sequence-based chaotification model for enhancing chaos in one-dimensional maps. IEEE Internet Things J. 27:1. https:\/\/doi.org\/10.1109\/JIOT.2024.3450547","journal-title":"IEEE Internet Things J."},{"key":"347_CR35","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137. https:\/\/doi.org\/10.1016\/j.sigpro.2017.03.011","journal-title":"Signal Process"},{"issue":"7","key":"347_CR36","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/j.cnsns.2004.03.006","volume":"10","author":"NK Pareek","year":"2005","unstructured":"Pareek NK, Patidar V, Sud KK (2005) Cryptography using multiple one-dimensional chaotic maps. Commun Nonlinear Sci Numer Simul 10(7):715\u2013723. https:\/\/doi.org\/10.1016\/j.cnsns.2004.03.006","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"347_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5923\/j.ajsp.20160601.01","volume":"6","author":"N Ramadan","year":"2016","unstructured":"Ramadan N, Eldin H, Ahmed H, Elkhamy SE, Abd El-Samie FE (2016) Chaos-based image encryption using an improved quadratic chaotic map. Am. J. Signal Process. 6(1):1\u201313. https:\/\/doi.org\/10.5923\/j.ajsp.20160601.01","journal-title":"Am. J. Signal Process."},{"key":"347_CR38","doi-asserted-by":"publisher","first-page":"411","DOI":"10.12988\/astp.2015.5342","volume":"9","author":"B Stoyanov","year":"2015","unstructured":"Stoyanov B, Kordov K (2015) Novel secure pseudo-random number generation scheme based on two Tinkerbell maps. Adv Stud Theor Phys 9:411\u2013421. https:\/\/doi.org\/10.12988\/astp.2015.5342","journal-title":"Adv Stud Theor Phys"},{"issue":"7","key":"347_CR39","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1016\/j.cnsns.2012.11.002","volume":"18","author":"X-J Tong","year":"2013","unstructured":"Tong X-J (2013) Design of an image encryption scheme based on a multiple chaotic map. Commun Nonlinear Sci Numer Simul 18(7):1725\u20131733. https:\/\/doi.org\/10.1016\/j.cnsns.2012.11.002","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"4","key":"347_CR40","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1016\/j.sigpro.2008.09.011","volume":"89","author":"X Tong","year":"2009","unstructured":"Tong X, Cui M (2009) Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator. Signal Process 89(4):480\u2013491. https:\/\/doi.org\/10.1016\/j.sigpro.2008.09.011","journal-title":"Signal Process"},{"issue":"2","key":"347_CR41","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1007\/s00521-021-06448-y","volume":"34","author":"M Tubishat","year":"2022","unstructured":"Tubishat M et al (2022) Improved sine cosine algorithm with simulated annealing and singer chaotic map for Hadith classification. Neural Comput Appl 34(2):1385\u20131406. https:\/\/doi.org\/10.1007\/s00521-021-06448-y","journal-title":"Neural Comput Appl"},{"issue":"3","key":"347_CR42","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TFUZZ.2002.1006443","volume":"10","author":"L Udawatta","year":"2002","unstructured":"Udawatta L, Watanabe K, Kiguchi K, Izumi K (2002) Fuzzy-chaos hybrid controller for controlling of nonlinear systems. IEEE Trans Fuzzy Syst 10(3):401\u2013411. https:\/\/doi.org\/10.1109\/TFUZZ.2002.1006443","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"5","key":"347_CR43","doi-asserted-by":"publisher","first-page":"2652","DOI":"10.1016\/j.chaos.2008.09.047","volume":"41","author":"K-W Wong","year":"2009","unstructured":"Wong K-W, Kwok BS-H, Yuen C-H (2009) An efficient diffusion approach for chaos-based image encryption. Chaos Solitons Fractals 41(5):2652\u20132663. https:\/\/doi.org\/10.1016\/j.chaos.2008.09.047","journal-title":"Chaos Solitons Fractals"},{"key":"347_CR44","doi-asserted-by":"publisher","first-page":"113039","DOI":"10.1016\/j.chaos.2022.113039","volume":"167","author":"Z Yang","year":"2023","unstructured":"Yang Z, Liu Y, Wu Y, Qi Y, Ren F, Li S (2023) A high speed pseudo-random bit generator driven by 2D-discrete hyperchaos. Chaos, Solitons Fractals 167:113039. https:\/\/doi.org\/10.1016\/j.chaos.2022.113039","journal-title":"Chaos, Solitons Fractals"},{"issue":"4","key":"347_CR45","doi-asserted-by":"publisher","first-page":"2693","DOI":"10.1007\/s11071-019-05157-5","volume":"97","author":"B Yosefnezhad Irani","year":"2019","unstructured":"Yosefnezhad Irani B, Ayubi P, Amani Jabalkandi F, Yousefi Valandar M, Jafari Barani M (2019) Digital image scrambling based on a new one-dimensional coupled Sine map. Nonlinear Dyn 97(4):2693\u20132721. https:\/\/doi.org\/10.1007\/s11071-019-05157-5","journal-title":"Nonlinear Dyn"},{"key":"347_CR46","doi-asserted-by":"publisher","first-page":"114440","DOI":"10.1016\/j.chaos.2023.114440","volume":"179","author":"F Yu","year":"2024","unstructured":"Yu F et al (2024) Dynamics analysis, synchronization and FPGA implementation of multiscroll Hopfield neural networks with non-polynomial memristor. Chaos, Solitons Fractals 179:114440. https:\/\/doi.org\/10.1016\/j.chaos.2023.114440","journal-title":"Chaos, Solitons Fractals"},{"key":"347_CR47","doi-asserted-by":"publisher","first-page":"106904","DOI":"10.1016\/j.neunet.2024.106904","volume":"182","author":"F Yu","year":"2025","unstructured":"Yu F, Lin Y, Yao W, Cai S, Lin H, Li Y (2025) Multiscroll hopfield neural network with extreme multistability and its application in video encryption for IIoT. Neural Netw 182:106904. https:\/\/doi.org\/10.1016\/j.neunet.2024.106904","journal-title":"Neural Netw"},{"issue":"10","key":"347_CR48","doi-asserted-by":"publisher","first-page":"3368","DOI":"10.1109\/TCSI.2008.924117","volume":"55","author":"J Zhou","year":"2008","unstructured":"Zhou J, Au OC (2008) Comments on \u2018a novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. Trans Circ Syst I Regul Pap 55(10):3368\u20133369. https:\/\/doi.org\/10.1109\/TCSI.2008.924117","journal-title":"Trans Circ Syst I Regul Pap"},{"key":"347_CR49","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182. https:\/\/doi.org\/10.1016\/j.sigpro.2013.10.034","journal-title":"Signal Process"},{"issue":"9","key":"347_CR50","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","volume":"45","author":"Y Zhou","year":"2015","unstructured":"Zhou Y, Hua Z, Chi-Man Pun CL, Chen P (2015) Cascade chaotic system with applications. IEEE Trans Cyber 45(9):2001\u20132012. https:\/\/doi.org\/10.1109\/TCYB.2014.2363168","journal-title":"IEEE Trans Cyber"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00347-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-024-00347-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00347-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T03:02:35Z","timestamp":1758596555000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-024-00347-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,23]]},"references-count":50,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["347"],"URL":"https:\/\/doi.org\/10.1186\/s42400-024-00347-0","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,23]]},"assertion":[{"value":"26 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The Authors declare that they do not have any conflict of interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"71"}}