{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:21:48Z","timestamp":1777130508707,"version":"3.51.4"},"reference-count":49,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2019,3,5]],"date-time":"2019-03-05T00:00:00Z","timestamp":1551744000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12,18]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The paper presents an approach to encrypt the color images using bit-level permutation and alternate logistic map. The proposed method initially segregates the color image into red, green, and blue channels, transposes the segregated channels from the pixel-plane to bit-plane, and scrambles the bit-plane matrix using Arnold cat map (ACM). Finally, the red, blue, and green channels of the scrambled image are confused and diffused by applying alternate logistic map that uses a four-dimensional Lorenz system to generate a pseudorandom number sequence for the three channels. The parameters of ACM are generated with the help of Logistic-Sine map and Logistic-Tent map. The intensity values of scrambled pixels are altered by Tent-Sine map. One-dimensional and two-dimensional logistic maps are used for alternate logistic map implementation. The performance and security parameters histogram, correlation distribution, correlation coefficient, entropy, number of pixel change rate, and unified averaged changed intensity are computed to show the potential of the proposed encryption technique.<\/jats:p>","DOI":"10.1515\/jisys-2018-0365","type":"journal-article","created":{"date-parts":[[2019,3,5]],"date-time":"2019-03-05T04:10:57Z","timestamp":1551759057000},"page":"1246-1260","source":"Crossref","is-referenced-by-count":29,"title":["A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate Logistic Maps"],"prefix":"10.1515","volume":"29","author":[{"given":"Ankita","family":"Bisht","sequence":"first","affiliation":[{"name":"Department of Computer Science , Banasthali Vidyapith Banasthali , Newai , India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7071-8323","authenticated-orcid":false,"given":"Mohit","family":"Dua","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering , NIT Kurukshetra , Haryana , India"}]},{"given":"Shelza","family":"Dua","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering , NIT Kurukshetra , Haryana , India"}]},{"given":"Priyanka","family":"Jaroli","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering , NIT Kurukshetra , Haryana , India"}]}],"member":"374","published-online":{"date-parts":[[2019,3,5]]},"reference":[{"key":"2025120523341683991_j_jisys-2018-0365_ref_001","doi-asserted-by":"crossref","unstructured":"A. Akgul, H. Calgan, I. Koyuncu, I. Pehlivan and A. Istanbullu, Chaos-based engineering applications with a 3D chaotic system without equilibrium points, Nonlinear Dyn. 84 (2016), 481\u2013495.","DOI":"10.1007\/s11071-015-2501-7"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_002","doi-asserted-by":"crossref","unstructured":"A. Akgul, I. Moroz, I. Pehlivan and S. Vaidyanathan, A new four-scroll chaotic attractor and its engineering applications, Optik 127 (2016), 5491\u20135499.","DOI":"10.1016\/j.ijleo.2016.02.066"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_003","doi-asserted-by":"crossref","unstructured":"S. Aljawarneh and M. B. Yassein, A resource-efficient encryption algorithm for multimedia big data, Multimed. Tools Appl. 76 (2017), 22703\u201322724.","DOI":"10.1007\/s11042-016-4333-y"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_004","doi-asserted-by":"crossref","unstructured":"A. Bisht, M. Dua and S. Dua, A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform, J. Amb. Intel. Hum. Comp. (2018), 1\u201313.","DOI":"10.1007\/s12652-018-1072-0"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_005","doi-asserted-by":"crossref","unstructured":"G. Chen, Y. Chen and X. Liao, An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps, Chaos Soliton. Fract. 31 (2007), 571\u2013579.","DOI":"10.1016\/j.chaos.2005.10.022"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_006","doi-asserted-by":"crossref","unstructured":"J. X. Chen, Z. L. Zhu, C. Fu, H. Yu and L. B. Zhang, A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism, Commun. Nonlinear Sci. Numer. Simul. 20 (2015), 846\u2013860.","DOI":"10.1016\/j.cnsns.2014.06.032"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_007","doi-asserted-by":"crossref","unstructured":"A. V. Diaconu, Circular inter\u2013intra pixels bit-level permutation and chaos-based image encryption, Inf. Sci. 355 (2016), 314\u2013327.","DOI":"10.1016\/j.ins.2015.10.027"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_008","doi-asserted-by":"crossref","unstructured":"A. V. Diaconu, V. Ionescu, G. Iana and J. M. Lopez-Guede, A new bit-level permutation image encryption algorithm, in: Communications (COMM), 2016 International Conference on (IEEE), pp. 411\u2013416, June 2016.","DOI":"10.1109\/ICComm.2016.7528310"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_009","doi-asserted-by":"crossref","unstructured":"C. Fu, B. B. Lin, Y. S. Miao, X. Liu and J. J. Chen, A novel chaos-based bit-level permutation scheme for digital image encryption, Opt. Commun. 284 (2011), 5415\u20135423.","DOI":"10.1016\/j.optcom.2011.08.013"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_010","doi-asserted-by":"crossref","unstructured":"A. Gambhir and R. Arya, Performance analysis and implementation of DES algorithm and RSA algorithm with image and audio steganography techniques, in:Computing, Communication and Signal Processing, pp. 1021\u20131028, Springer, Singapore, 2019.","DOI":"10.1007\/978-981-13-1513-8_103"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_011","doi-asserted-by":"crossref","unstructured":"T. Gao and Z. Chen, A new image encryption algorithm based on hyper-chaos, Phys. Lett. A 372 (2008), 394\u2013400.","DOI":"10.1016\/j.physleta.2007.07.040"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_012","doi-asserted-by":"crossref","unstructured":"Q. Guo, Z. Liu and S. Liu, Color image encryption by using Arnold and discrete fractional random transforms in IHS space, Opt. Laser. Eng. 48 (2010), 1174\u20131181.","DOI":"10.1016\/j.optlaseng.2010.07.005"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_013","doi-asserted-by":"crossref","unstructured":"Z. Han, W. X. Feng, L. Z. Hui, L. Da Hai and L. Y. Chou, A new image encryption algorithm based on chaos system, in: Robotics, intelligent systems and signal processing, 2003. Proceedings. 2003 IEEE international conference on (IEEE), Vol. 2, pp. 778\u2013782, October 2003.","DOI":"10.1109\/RISSP.2003.1285684"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_014","doi-asserted-by":"crossref","unstructured":"F. Han, X. Liao, B. Yang and Y. Zhang, A hybrid scheme for self-adaptive double color-image encryption, Multimed. Tools Appl. 77 (2017), 1\u201320.","DOI":"10.1007\/s11042-017-5029-7"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_015","doi-asserted-by":"crossref","unstructured":"Z. Hua and Y. Zhou, Image encryption using 2D Logistic-adjusted-Sine map, Inf. Sci. 339 (2016), 237\u2013253.","DOI":"10.1016\/j.ins.2016.01.017"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_016","unstructured":"M. Jayashree, I. Poonguzhali and S. S. Agnes, An efficient high throughput implementation of idea encryption algorithm using VLSI, Aust. J. Basic Appl. Sci. 10 (2016), 337\u2013344."},{"key":"2025120523341683991_j_jisys-2018-0365_ref_017","doi-asserted-by":"crossref","unstructured":"A. Kanso and M. Ghebleh, A novel image encryption algorithm based on a 3D chaotic map, Commun. Nonlinear Sci. Numer. Simul. 17 (2012), 2943\u20132959.","DOI":"10.1016\/j.cnsns.2011.11.030"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_018","doi-asserted-by":"crossref","unstructured":"D. Lambi\u0107, A novel method of S-box design based on discrete chaotic map, Nonlinear Dyn. 87 (2017), 2407\u20132413.","DOI":"10.1007\/s11071-016-3199-x"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_019","doi-asserted-by":"crossref","unstructured":"C. Li, T. Xie, Q. Liu and G. Cheng, Cryptanalyzing image encryption using chaotic logistic map, Nonlinear Dyn. 78 (2014), 1545\u20131551.","DOI":"10.1007\/s11071-014-1533-8"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_020","doi-asserted-by":"crossref","unstructured":"Z. Lin, G. Wang, X. Wang, S. Yu and J. L\u00fc, Security performance analysis of a chaotic stream cipher, Nonlinear Dyn. 94 (2018), 1\u201315.","DOI":"10.1007\/s11071-018-4406-8"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_021","doi-asserted-by":"crossref","unstructured":"H. Liu and X. Wang, Color image encryption using spatial bit-level permutation and high-dimension chaotic system, Opt. Commun. 284 (2011), 3895\u20133903.","DOI":"10.1016\/j.optcom.2011.04.001"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_022","doi-asserted-by":"crossref","unstructured":"H. Liu and A. Kadir, Asymmetric color image encryption scheme using 2D discrete-time map, Signal Process. 113 (2015), 104\u2013112.","DOI":"10.1016\/j.sigpro.2015.01.016"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_023","unstructured":"B. Muite and G. Tabia, Chaos based cryptography, Tartu University, Tartu, Estonia, 2016."},{"key":"2025120523341683991_j_jisys-2018-0365_ref_024","doi-asserted-by":"crossref","unstructured":"M. A. Murillo-Escobar, C. Cruz-Hern\u00e1ndez, F. Abundiz-P\u00e9rez, R. M. L\u00f3pez-Guti\u00e9rrez and O. A. Del Campo, A RGB image encryption algorithm based on total plain image characteristics and chaos, Signal Process. 109 (2015), 119\u2013131.","DOI":"10.1016\/j.sigpro.2014.10.033"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_025","doi-asserted-by":"crossref","unstructured":"A. Nag, J. P. Singh, S. Khan, S. Biswas, D. Sarkar and P. P. Sarkar, Image encryption using affine transform and XOR operation. in: Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011 International Conference on (IEEE), pp. 309\u2013312, July 2011.","DOI":"10.1109\/ICSCCN.2011.6024565"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_026","doi-asserted-by":"crossref","unstructured":"C. Pak and L. Huang, A new color image encryption using combination of the 1D chaotic map, Signal Process. 138 (2017), 129\u2013137.","DOI":"10.1016\/j.sigpro.2017.03.011"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_027","doi-asserted-by":"crossref","unstructured":"N. K. Pareek, V. Patidar and K. K. Sud, Cryptography using multiple one-dimensional chaotic maps, Commun. Nonlinear Sci. Numer. Simul. 10 (2005), 715\u2013723.","DOI":"10.1016\/j.cnsns.2004.03.006"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_028","doi-asserted-by":"crossref","unstructured":"V. Patidar, N. K. Pareek and K. K. Sud, A new substitution\u2013diffusion based image cipher using chaotic standard and logistic maps, Commun. Nonlinear Sci. Numer. Simul. 14 (2009), 3056\u20133075.","DOI":"10.1016\/j.cnsns.2008.11.005"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_029","doi-asserted-by":"crossref","unstructured":"V. Patidar, N. K. Pareek, G. Purohit and K. K. Sud, Modified substitution\u2013diffusion image cipher using chaotic standard and logistic maps, Commun. Nonlinear Sci. Numer. Simul. 15 (2010), 2755\u20132765.","DOI":"10.1016\/j.cnsns.2009.11.010"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_030","doi-asserted-by":"crossref","unstructured":"N. Prasad, V. M. Ravi and L. Chandrasekhar, Image encryption with an encrypted QR, random phase encoding, and logistic map, in: 2018 IEEE International Conference on Computer Communication and Informatics (ICCCI), pp. 1\u20134,  January 2018.","DOI":"10.1109\/ICCCI.2018.8441219"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_031","doi-asserted-by":"crossref","unstructured":"R. M. Rad, A. Attar and R. E. Atani, A new fast and simple image encryption algorithm using scan patterns and XOR, IJSIP 6 (2013), 275\u2013290.","DOI":"10.14257\/ijsip.2013.6.5.25"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_032","doi-asserted-by":"crossref","unstructured":"M. I. S. Reddy and A. S. Kumar, Secured data transmission using wavelet based steganography and cryptography by using AES algorithm, Procedia Comput. Sci. 85 (2016), 62\u201369.","DOI":"10.1016\/j.procs.2016.05.177"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_033","doi-asserted-by":"crossref","unstructured":"P. R. Sankpal and P. A. Vijaya, Image encryption using chaotic maps: a survey, in: Signal and Image Processing (ICSIP), 2014 Fifth International Conference on (IEEE), pp. 102\u2013107, January 2014.","DOI":"10.1109\/ICSIP.2014.80"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_034","doi-asserted-by":"crossref","unstructured":"S. M. Seyedzadeh and S. Mirzakuchaki, A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map, Signal Process. 92 (2012), 1202\u20131215.","DOI":"10.1016\/j.sigpro.2011.11.004"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_035","doi-asserted-by":"crossref","unstructured":"P. K. Singh, R. S. Singh and K. N. Rai, An image encryption algorithm based on XOR operation with approximation component in wavelet transform, in: Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2015 Fifth National Conference on (IEEE), pp. 1\u20134, December 2015.","DOI":"10.1109\/NCVPRIPG.2015.7490013"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_036","doi-asserted-by":"crossref","unstructured":"L. Sui, H. Lu, Z. Wang and Q. Sun, Double-image encryption using discrete fractional random transform and logistic maps, Opt. Laser. Eng. 56 (2014), 1\u201312.","DOI":"10.1016\/j.optlaseng.2013.12.001"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_037","doi-asserted-by":"crossref","unstructured":"S. Suri and R. Vijay, A synchronous intertwining logistic map-DNA approach for color image encryption, J. Amb. Intel. Hum. Comp. (2018), 1\u201314.","DOI":"10.1007\/s12652-018-0825-0"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_038","doi-asserted-by":"crossref","unstructured":"C. J. Tay, C. Quan, W. Chen and Y. Fu, Color image encryption based on interference and virtual optics, Opt. Laser Technol. 42 (2010), 409\u2013415.","DOI":"10.1016\/j.optlastec.2009.08.016"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_039","doi-asserted-by":"crossref","unstructured":"L. Teng, X. Wang and J. Meng, A chaotic color image encryption using integrated bit-level permutation, Multimed. Tools Appl. 77 (2018), 6883\u20136896.","DOI":"10.1007\/s11042-017-4605-1"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_040","doi-asserted-by":"crossref","unstructured":"X. J. Tong, M. Zhang, Z. Wang, Y. Liu, H. Xu and J. Ma, A fast encryption algorithm of color image based on four-dimensional chaotic system, J. Vis. Commun. Image R. 33 (2015), 219\u2013234.","DOI":"10.1016\/j.jvcir.2015.09.014"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_041","doi-asserted-by":"crossref","unstructured":"A. Tsuneda, Design of binary sequences with tunable exponential autocorrelations and run statistics based on one-dimensional chaotic maps, IEEE Trans. Circuits Syst.-I 52 (2005), 454\u2013462.","DOI":"10.1109\/TCSI.2004.841597"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_042","doi-asserted-by":"crossref","unstructured":"X. Wang, Y. Zhao, H. Zhang and K. Guo, A novel color image encryption scheme using alternate chaotic mapping structure, Opt. Laser. Eng. 82 (2016), 79\u201386.","DOI":"10.1016\/j.optlaseng.2015.12.006"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_043","doi-asserted-by":"crossref","unstructured":"J. Wei, X. Liao, K. W. Wong and T. Zhou, Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps, Commun. Nonlinear Sci. Numer. Simul. 12 (2007), 814\u2013822.","DOI":"10.1016\/j.cnsns.2005.06.001"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_044","doi-asserted-by":"crossref","unstructured":"Y. Xing, Q. H. Wang, Z. L. Xiong and H. Deng, Encrypting three-dimensional information system based on integral imaging and multiple chaotic maps, Opt. Eng. 55 (2016), 023107.","DOI":"10.1117\/1.OE.55.2.023107"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_045","doi-asserted-by":"crossref","unstructured":"F. Yu, L. Gao, K. Gu, B. Yin, Q. Wan and Z. Zhou, A fully qualified four-wing four-dimensional autonomous chaotic system and its synchronization, Optik 131 (2017), 79\u201388.","DOI":"10.1016\/j.ijleo.2016.11.067"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_046","doi-asserted-by":"crossref","unstructured":"Y. Q. Zhang and X. Y. Wang, A new image encryption algorithm based on non-adjacent coupled map lattices, Appl. Soft Comput. 26 (2015), 10\u201320.","DOI":"10.1016\/j.asoc.2014.09.039"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_047","doi-asserted-by":"crossref","unstructured":"Y. Zhou, L. Bao and C. P. Chen, Image encryption using a new parametric switching chaotic system, Signal Process. 93 (2013), 3039\u20133052.","DOI":"10.1016\/j.sigpro.2013.04.021"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_048","doi-asserted-by":"crossref","unstructured":"Y. Zhou, L. Bao and C. P. Chen, A new 1D chaotic system for image encryption, Signal Process. 97 (2014), 172\u2013182.","DOI":"10.1016\/j.sigpro.2013.10.034"},{"key":"2025120523341683991_j_jisys-2018-0365_ref_049","doi-asserted-by":"crossref","unstructured":"Z. L. Zhu, W. Zhang, K. W. Wong and H. Yu, A chaos-based symmetric image encryption scheme using a bit-level permutation, Inf. Sci. 181 (2011), 1171\u20131186.","DOI":"10.1016\/j.ins.2010.11.009"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/jisys\/29\/1\/article-p1246.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0365\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0365\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:35:39Z","timestamp":1764977739000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0365\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,5]]},"references-count":49,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,9,20]]},"published-print":{"date-parts":[[2019,12,18]]}},"alternative-id":["10.1515\/jisys-2018-0365"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2018-0365","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"value":"2191-026X","type":"electronic"},{"value":"0334-1860","type":"print"}],"subject":[],"published":{"date-parts":[[2019,3,5]]}}}