{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T11:57:15Z","timestamp":1770724635605,"version":"3.49.0"},"reference-count":46,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2017,10,23]],"date-time":"2017-10-23T00:00:00Z","timestamp":1508716800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2017,12]]},"abstract":"<jats:p>\n                    Internet is used as the main source of communication throughout the world. However due to public nature of internet data are always exposed to different types of attacks. To address this issue many researchers are working in this area and proposing data encryption techniques. Recently a new substitution box has been proposed for image encryption using many interesting properties like gingerbread-man chaotic map and\n                    <jats:italic>S<\/jats:italic>\n                    <jats:sub>8<\/jats:sub>\n                    permutation. But there are certain weaknesses in aforesaid technique which does not provide sufficient security. To resolve the security issue an enhanced version of existing technique is proposed in this paper. Lorenz chaotic map based confusion and diffusion processes in existing technique are employed. Lorenz map is used to remove strong correlation among the plain text image pixels. In diffusion stage a random matrix is generated through lorenz chaotic map and XORed with shuffled image. It the end, existing gingerbread-man chaotic map based S-box is applied to extract the final cipher text image. The proposed enhanced scheme is analysed by statistical analysis, key space analysis, information entropy analysis and differential analysis. In order to ensure the robustness and higher security of proposed scheme, results via Number of Pixel Rate Change (NPRC) and Unified Average Change Intensity (UACI) tests are also validated.\n                  <\/jats:p>","DOI":"10.3233\/jifs-17656","type":"journal-article","created":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T12:01:20Z","timestamp":1508846480000},"page":"3753-3765","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":42,"title":["A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and\n                    <i>S<\/i>\n                    <sub>8<\/sub>\n                    permutation"],"prefix":"10.1177","volume":"33","author":[{"given":"Fadia Ali","family":"Khan","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Riphah International University, Islamabad, Pakistan"}]},{"given":"Jameel","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Riphah International University, Islamabad, Pakistan"}]},{"given":"Jan Sher","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics, University of Gaziantep, Gaziantep, Turkey"}]},{"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Glasgow Caledonian University, School of Engineering and Built Environment, Glasgow, UK"}]},{"given":"Muazzam A.","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computing, SEECS, National University of Sciences and Technology, Islamabad"}]}],"member":"179","published-online":{"date-parts":[[2017,10,23]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.02.002"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.09.039"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-011-9984-7"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2014.12.025"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2013.04.008"},{"key":"e_1_3_1_7_2","first-page":"104","article-title":"A fast encryption\/decryption scheme for biometric images using multiple chaotic maps","author":"Ahmed J.","unstructured":"AhmedJ. and HwangS.O., A fast encryption\/decryption scheme for biometric images using multiple chaotic maps, IMTIC\u201915\u2014International Multi-Topic Conference, p. 104.","journal-title":"IMTIC\u201915\u2014International Multi-Topic Conference"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.156"},{"key":"e_1_3_1_9_2","first-page":"1","article-title":"An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box","author":"Khan M.A.","year":"2016","unstructured":"KhanM.A., AhmadJ., JavaidQ. and SaqibN.A., An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box, Journal of Modern Optics (2016), 1\u201310.","journal-title":"Journal of Modern Optics"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.11.018"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.01.020"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEE2.2017.7935827"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.03.022"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2014.08.005"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1086-2"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1331-3"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2012.12.009"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.10.098"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-010-9821-4"},{"key":"e_1_3_1_20_2","first-page":"1","article-title":"A novel image encryption scheme based on orthogonal matrix, skew tent map, and xor operation","author":"Ahmad J.","year":"2017","unstructured":"AhmadJ., KhanM.A., AhmedF. and KhanJ.S., A novel image encryption scheme based on orthogonal matrix, skew tent map, and xor operation, Neural Computing and Applications (2017), 1\u201311.","journal-title":"Neural Computing and Applications"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.10.034"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118991863745"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.01.081"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.07.040"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2008.07.057"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2008.09.011"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2009.03.084"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2010.01.041"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-010-9749-8"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.03.017"},{"issue":"16","key":"e_1_3_1_32_2","first-page":"3895","article-title":"\u2014\u2014, Color image encryption using spatial bit-level permutation and high-dimension chaotic system","volume":"284","year":"2011","unstructured":"\u2014\u2014, Color image encryption using spatial bit-level permutation and high-dimension chaotic system, Optics Communications284(16) (2011), 3895\u20133903.","journal-title":"Optics Communications"},{"key":"e_1_3_1_33_2","doi-asserted-by":"crossref","unstructured":"SathishkumarG. and SriraamD.N. et al. Image encryption based on diffusion and multiple chaotic maps arXiv preprint arXiv:1103.3792 2011.","DOI":"10.5121\/ijnsa.2011.3214"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.08.079"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2014.02.011"},{"key":"e_1_3_1_36_2","first-page":"1","article-title":"Chaos-based diffusion for highly autocorrelated data in encryption algorithms","author":"Ahmad J.","year":"2015","unstructured":"AhmadJ. and HwangS.O., Chaos-based diffusion for highly autocorrelated data in encryption algorithms, Nonlinear Dynamics (2015), 1\u201312.","journal-title":"Nonlinear Dynamics"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-016-0084-9"},{"key":"e_1_3_1_38_2","first-page":"1","article-title":"A novel construction of substitution box for image encryption applications with gingerbreadman chaotic map and s8 permutation","author":"Khan M.","unstructured":"KhanM. and AsgharZ., A novel construction of substitution box for image encryption applications with gingerbreadman chaotic map and s8 permutation, Neural Computing and Applications, 1\u20137.","journal-title":"Neural Computing and Applications"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.11.009"},{"issue":"4","key":"e_1_3_1_40_2","first-page":"18","article-title":"Efficiency analysis and security evaluation of image encryption schemes","volume":"12","author":"Ahmad J.","year":"2012","unstructured":"AhmadJ. and AhmedF., Efficiency analysis and security evaluation of image encryption schemes, International Journal of Video & Image Processing and Network Security12(4) (2012), 18\u201331.","journal-title":"International Journal of Video & Image Processing and Network Security"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.10.023"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.10.010"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2007.10.011"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICET.2014.7021021"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/CIACS.2015.7395561"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2014.01.051"},{"key":"e_1_3_1_47_2","first-page":"1","article-title":"A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices","author":"Ahmad J.","year":"2016","unstructured":"AhmadJ., KhanM.A., HwangS.O. and KhanJ.S., A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices, Neural Computing and Applications (2016), 1\u201315.","journal-title":"Neural Computing and Applications"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-17656","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-17656","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-17656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T04:20:23Z","timestamp":1770524423000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-17656"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,23]]},"references-count":46,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["10.3233\/JIFS-17656"],"URL":"https:\/\/doi.org\/10.3233\/jifs-17656","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,23]]}}}