{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T16:39:57Z","timestamp":1775147997203,"version":"3.50.1"},"reference-count":16,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12,18]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>This article introduces a simple and effective new algorithm for image encryption using a chaotic system which is based on the magic squares. This novel 3D chaotic system is invoked to generate a random key to encrypt any color image. A number of chaotic keys equal to the size of the image are generated by this chaotic system and arranged into a matrix then divided into non-overlapped submatrices. The image to be encrypted is also divided into sub-images, and each sub-image is multiplied by a magic matrix to produce another set of matrices. The XOR operation is then used on the resultant two sets of matrices to produce the encrypted image. The strength of the encryption method is tested in two folds. The first fold is the security analysis which includes key space analysis and sensitivity analysis. In the second fold, statistical analysis was performed, which includes the correlation coefficients, information entropy, the histogram, and analysis of differential attacks. Finally, the time of encryption and decryption was computed and show very good results.<\/jats:p>","DOI":"10.1515\/jisys-2018-0404","type":"journal-article","created":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T06:07:03Z","timestamp":1549001223000},"page":"1202-1215","source":"Crossref","is-referenced-by-count":15,"title":["A New Algorithm Based on Magic Square and a Novel Chaotic System for Image Encryption"],"prefix":"10.1515","volume":"29","author":[{"given":"Rageed Hussein","family":"AL-Hashemy","sequence":"first","affiliation":[{"name":"Computer Science Department , College of Education, University of Almustansirya , Baghdad , Iraq"}]},{"given":"Sadiq A.","family":"Mehdi","sequence":"additional","affiliation":[{"name":"Computer Science Department , College of Education, University of Almustansirya , Baghdad , Iraq"}]}],"member":"374","published-online":{"date-parts":[[2019,2,1]]},"reference":[{"key":"2025120523341679514_j_jisys-2018-0404_ref_001","doi-asserted-by":"crossref","unstructured":"D. G. Amalarethinam and J. S. Geetha, Image encryption and decryption in public key cryptography based on MR, in: 2015 International Conference on Computing and Communications Technologies (ICCCT), pp. 133\u2013138, IEEE, Chennai, India, February 2015.","DOI":"10.1109\/ICCCT2.2015.7292733"},{"key":"2025120523341679514_j_jisys-2018-0404_ref_002","unstructured":"H. Broer and F. Takens, Dynamical systems and chaos, vol. 172, Springer Science and Business Media, New York, Dordrecht, Heidelbeg, London, 2010."},{"key":"2025120523341679514_j_jisys-2018-0404_ref_003","doi-asserted-by":"crossref","unstructured":"E. Brown, Magic squares, finite planes, and points of inflection on elliptic curves, Coll. Math. J. 32 (2001), 260\u2013267.","DOI":"10.1080\/07468342.2001.11921887"},{"key":"2025120523341679514_j_jisys-2018-0404_ref_004","unstructured":"A. W. Grogono, A mini-history of magic squares [online], 2004. http:\/\/www.grogono.com\/magic\/history.php."},{"key":"2025120523341679514_j_jisys-2018-0404_ref_005","doi-asserted-by":"crossref","unstructured":"Z. H. Guan, F. Huang and W. Guan, Chaos-based image encryption algorithm, Phys. Lett. A 346 (2005), 153\u2013157.","DOI":"10.1016\/j.physleta.2005.08.006"},{"key":"2025120523341679514_j_jisys-2018-0404_ref_006","unstructured":"A. A. Hattab and S. A. Mehdi, A novel steganography method based on 4 dominations standard chaotic map in spatial domain, J. Theor. Appl. Inform. Technol. 96 (2018), 16."},{"key":"2025120523341679514_j_jisys-2018-0404_ref_007","doi-asserted-by":"crossref","unstructured":"B. L. Kaul and R. Singh, Generalization of magic square (numerical logic) 3 \u00d7 3 and its multiples (3 \u00d7 3) \u00d7 (3 \u00d7 3), Int. J. Intell. Syst. Appl. 1 (2013), 90\u201397.","DOI":"10.5815\/ijisa.2013.01.09"},{"key":"2025120523341679514_j_jisys-2018-0404_ref_008","doi-asserted-by":"crossref","unstructured":"Q. A. Kester, Image encryption based on the RGB pixel transposition and shuffling, Int. J. Comput. Network Inform. Sec. 5 (2013), 43\u201350.","DOI":"10.5815\/ijcnis.2013.07.05"},{"key":"2025120523341679514_j_jisys-2018-0404_ref_009","doi-asserted-by":"crossref","unstructured":"J. Lu, G. Chen, X. Yu and H. Leung, Design and analysis of multiscroll chaotic attractors from saturated function series, IEEE Trans. Circuits Syst. I: Regular Papers 51 (2004), 2476\u20132490.","DOI":"10.1109\/TCSI.2004.838151"},{"key":"2025120523341679514_j_jisys-2018-0404_ref_010","unstructured":"S. A. Mehdi and R. S. Kareem, Using fourth-order Runge-Kutta method to solve L\u00fc chaotic system, Am. J. Eng. Res. 6 (2017), 72\u201377."},{"key":"2025120523341679514_j_jisys-2018-0404_ref_011","unstructured":"S. A. Mehdi and H. A. Qasim, Analysis of a new hyper chaotic system with six cross-product nonlinearities terms, Am. J. Eng. Res. 6 (2017), 248\u2013252."},{"key":"2025120523341679514_j_jisys-2018-0404_ref_012","doi-asserted-by":"crossref","unstructured":"K. Sakthidasan and B. V. S. Krishna, A new chaotic algorithm for image encryption and decryption of digital color images, Int. J. Inform. Educ. Technol. 1 (2011), 137\u2013141.","DOI":"10.7763\/IJIET.2011.V1.23"},{"key":"2025120523341679514_j_jisys-2018-0404_ref_013","doi-asserted-by":"crossref","unstructured":"X. Wang and D. Luan, A novel image encryption algorithm using chaos and reversible cellular automata, Commun. Nonlinear Sci. Numer. Simul. 18 (2013), 3075\u20133085.","DOI":"10.1016\/j.cnsns.2013.04.008"},{"key":"2025120523341679514_j_jisys-2018-0404_ref_014","unstructured":"X. Wang, J. Li and J. Fang, Si\u2019lnikov chaos of a 3-D quadratic autonomous system with a four-wing chaotic attractor, in: Control Conference (CCC), 2011 30th Chinese, pp. 561\u2013565, IEEE, July 2011."},{"key":"2025120523341679514_j_jisys-2018-0404_ref_015","unstructured":"F. You, H. Dehlinger and J. M. Wang, Generative art: aesthetic events from experiments with lines and squares, Lingnan Art Publishing House, Guangzhou, China, 2010."},{"key":"2025120523341679514_j_jisys-2018-0404_ref_016","doi-asserted-by":"crossref","unstructured":"Y. Zhang, P. Xu and L. Xiang, Research of image encryption algorithm based on chaotic magic square, in: Advances in Electronic Commerce, Web Application and Communication, pp. 103\u2013109, Springer, Berlin, Heidelberg, 2012.","DOI":"10.1007\/978-3-642-28658-2_16"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/jisys\/29\/1\/article-p1202.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0404\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0404\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:35:25Z","timestamp":1764977725000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0404\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,1]]},"references-count":16,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,9,20]]},"published-print":{"date-parts":[[2019,12,18]]}},"alternative-id":["10.1515\/jisys-2018-0404"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2018-0404","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"value":"2191-026X","type":"electronic"},{"value":"0334-1860","type":"print"}],"subject":[],"published":{"date-parts":[[2019,2,1]]}}}