{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:33:31Z","timestamp":1770748411506,"version":"3.50.0"},"reference-count":17,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2015,10,23]],"date-time":"2015-10-23T00:00:00Z","timestamp":1445558400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2015,10,23]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>An efficient image encryption technique based on one-time nonlinear component for block cipher is presented in this paper. Three S-Boxes are generated by complex chaotic system, whose initial values are dependent on both the random noise and the plain image. Each S-box randomly takes turns to encrypt one of the color components in each pixel adhering to the switching sequence, which is also generated by the complex chaotic system. Subsequently, the two-stage diffusion to process images is applied. The cipher image is expanded into two composed of selected four bit-planes and diffuse them at bit-level as first stage diffusion, then reconstruct them as the input of block diffusion, which is served as second stage diffusion. The chaotic coupled map lattice employed in this method generate pseudo-random sequences in block diffusion phase. The experiment results and analysis have proved the novel image encryption method is practical and effective for encryption applications.<\/jats:p>","DOI":"10.3233\/ifs-151628","type":"journal-article","created":{"date-parts":[[2015,11,3]],"date-time":"2015-11-03T11:20:34Z","timestamp":1446549634000},"page":"1493-1500","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":6,"title":["An image encryption technique based on coupled map lattice and one-time S-Boxes based on complex chaotic system"],"prefix":"10.1177","volume":"29","author":[{"given":"Iqtadar","family":"Hussain","sequence":"first","affiliation":[{"name":"Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia"}]},{"given":"Jameel","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, HITEC University, Taxila, Pakistan"}]},{"given":"Azkar","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, HITEC University, Taxila, Pakistan"}]}],"member":"179","published-online":{"date-parts":[[2015,10,23]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2010.07.019"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2014.01.018"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.01.009"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2012.06.011"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.05.017"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0440-0"},{"key":"e_1_3_1_8_2","unstructured":"B. Schneier Applied cryptography: Protocols algorithms and source code in C. John Wiley & Sons 2007"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.10.022"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.02.003"},{"key":"e_1_3_1_11_2","doi-asserted-by":"crossref","first-page":"1220","DOI":"10.4028\/www.scientific.net\/AMR.631-632.1220","article-title":"Function synchronization of the fractional-order chaotic system","volume":"631","author":"Fan JW","year":"2013","unstructured":"FanJWZhaoNGaoY2013Function synchronization of the fractional-order chaotic systemAdvanced Materials Research63112201225","journal-title":"Advanced Materials Research"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127407019962"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0656-z"},{"key":"e_1_3_1_14_2","first-page":"2004","article-title":"High Education Press, Beijing","author":"Liu B","unstructured":"LiuBPengJHigh Education Press, BeijingNonlinear dynamics2004","journal-title":"Nonlinear dynamics"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2014.01.018"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.5560\/zna.2014-0023"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.5560\/zna.2014-0016"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1177\/1077546313482960"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IFS-151628","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/IFS-151628","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IFS-151628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T08:25:05Z","timestamp":1770711905000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/IFS-151628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,23]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,10,23]]}},"alternative-id":["10.3233\/IFS-151628"],"URL":"https:\/\/doi.org\/10.3233\/ifs-151628","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,23]]}}}