{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T11:05:31Z","timestamp":1770030331359,"version":"3.49.0"},"reference-count":28,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2021,8,11]]},"abstract":"<jats:p>The day-to-day progress in communication plays a vital role in transmitting millions and trillions of data through the unsecured network channels. It creates a way where the user\u2019s data becomes the victim of various security threats. Among those users\u2019 data, images act as primary data, and its encryption security methodologies are fascinating. The conventional encryption techniques don\u2019t work well against the various other hidden security threats but require substantial computational time and cost with poor permutation performance. Hence to deal with this, an auto-encoder induced DNA (Deoxyribonucleic acid) sequence via chaotic image encryption framework is designed in our proposed work. It integrates the properties of DNA encoding and the chaotic maps to handle the data losses effectively and resist several attacks such as statistical attacks, chosen-plaintext attacks, etc. Moreover, an auto-encoder is used to control the data noises, thereby ensuring a better encryption performance. Here, the auto-encoder is activated to generate a permuted image with less time complexity and noise. A secret key is then initialized with the aid of SHA-256. Finally, image encryption and decryption are achieved, followed by the successful transmission of data over a digital network. The performance of the proposed work is analyzed with varied metrics to strengthen its efficiency over the prior techniques.<\/jats:p>","DOI":"10.3233\/jifs-201224","type":"journal-article","created":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T13:53:57Z","timestamp":1623765237000},"page":"181-198","source":"Crossref","is-referenced-by-count":3,"title":["A novel auto-encoder induced chaos based image encryption framework aiding DNA computing sequence"],"prefix":"10.1177","volume":"41","author":[{"given":"P.","family":"Alli","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Velammal College of Engineering and Technology, Madurai, India"}]},{"given":"J.","family":"Dinesh Peter","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-201224_ref1","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","article-title":"A new hybrid digital chaotic system with applications in image encryption","volume":"160","author":"Alawida","year":"2019","journal-title":"Signal Processing"},{"issue":"1","key":"10.3233\/JIFS-201224_ref2","doi-asserted-by":"crossref","first-page":"69","DOI":"10.9790\/2834-09146973","article-title":"Digital image encryption based on RSA algorithm","volume":"9","author":"El-Deen","year":"2014","journal-title":"J Electron Commun Eng"},{"key":"10.3233\/JIFS-201224_ref3","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","article-title":"Image encryption using binary bitplane","volume":"100","author":"Zhou","year":"2014","journal-title":"Signal Processing"},{"key":"10.3233\/JIFS-201224_ref5","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.optlaseng.2018.11.017","article-title":"Index-based permutation-diffusion in multiple-image encryption using DNA sequence","volume":"115","author":"Enayatifar","year":"2019","journal-title":"Optics and Lasers in Engineering"},{"key":"10.3233\/JIFS-201224_ref7","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","article-title":"A novel chaos-based image encryption algorithm using DNA sequence operations","volume":"88","author":"Chai","year":"2017","journal-title":"Optics and Lasers in Engineering"},{"key":"10.3233\/JIFS-201224_ref8","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","article-title":"A new 1D chaotic system for image encryption","volume":"97","author":"Zhou","year":"2014","journal-title":"Signal processing"},{"key":"10.3233\/JIFS-201224_ref10","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","article-title":"Image encryption based on three-dimensional bit matrix permutation","volume":"118","author":"Zhang","year":"2016","journal-title":"Signal Processing"},{"issue":"3","key":"10.3233\/JIFS-201224_ref11","first-page":"347","article-title":"A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic","volume":"19","author":"Jin","year":"2017","journal-title":"IJ Network Security"},{"issue":"10","key":"10.3233\/JIFS-201224_ref12","first-page":"1363","article-title":"Arnold\u2019s cat map algorithm in digital image encryption","volume":"5","author":"Hariyanto","year":"2016","journal-title":"Int J Sci Res"},{"key":"10.3233\/JIFS-201224_ref13","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.optlaseng.2014.11.017","article-title":"An efficient image encryption scheme using graycode based permutation approach","volume":"67","author":"Chen","year":"2015","journal-title":"Optics and Lasers inEngineering"},{"issue":"2016","key":"10.3233\/JIFS-201224_ref14","first-page":"17","article-title":"A novel bit-level image encryption algorithm based onchaotic maps","volume":"78","author":"Xu","journal-title":"Optics and Lasers in Engineering"},{"issue":"1-2","key":"10.3233\/JIFS-201224_ref15","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s11071-013-1070-x","article-title":"A novel image encryption scheme based on Brownian motion and PWLCM chaotic system","volume":"75","author":"Wang","year":"2014","journal-title":"Nonlinear dynamics"},{"issue":"3","key":"10.3233\/JIFS-201224_ref16","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11071-013-1074-6","article-title":"A block image encryption algorithm based on wave transmission and chaotic systems","volume":"75","author":"Ye","year":"2014","journal-title":"Nonlinear Dynamics"},{"issue":"2","key":"10.3233\/JIFS-201224_ref17","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","article-title":"Chaos based efficient selective image encryption","volume":"30","author":"Khan","year":"2019","journal-title":"Multidimensional Systems and Signal Processing"},{"key":"10.3233\/JIFS-201224_ref18","doi-asserted-by":"crossref","first-page":"99470","DOI":"10.1109\/ACCESS.2019.2927415","article-title":"A Novel Chaos-Based Symmetric Image Encryption Using Bit-Pair Level Process","volume":"7","author":"Ge","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-201224_ref19","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.optlaseng.2018.11.010","article-title":"A color image encryption algorithm based on Hopfield chaotic neural network","volume":"115","author":"Wang","year":"2019","journal-title":"Optics and Lasers in Engineering"},{"key":"10.3233\/JIFS-201224_ref20","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","article-title":"Fast image encryption algorithm based on parallel computing system","volume":"486","author":"Wang","year":"2019","journal-title":"Information Sciences"},{"key":"10.3233\/JIFS-201224_ref21","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1016\/j.ijleo.2018.10.025","article-title":"A fast multiple-image encryption algorithm based on hybrid chaotic systems for gray scale images","volume":"179","author":"Zarebnia","year":"2019","journal-title":"Optik"},{"key":"10.3233\/JIFS-201224_ref22","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","article-title":"An image compression and encryption algorithm based on chaotic system and compressive sensing","volume":"115","author":"Gong","year":"2019","journal-title":"Optics & Laser Technology"},{"issue":"3","key":"10.3233\/JIFS-201224_ref23","doi-asserted-by":"crossref","first-page":"246","DOI":"10.3390\/e21030246","article-title":"Breaking an image encryption algorithm based on dna encoding and spatiotemporal chaos","volume":"21","author":"Wen","year":"2019","journal-title":"Entropy"},{"issue":"5","key":"10.3233\/JIFS-201224_ref24","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","article-title":"A RGB image encryption algorithm based on DNA encoding and chaos map","volume":"38","author":"Liu","year":"2012","journal-title":"Computers & Electrical Engineering"},{"key":"10.3233\/JIFS-201224_ref25","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","article-title":"A novel chaotic image encryption scheme using DNA sequence operations","volume":"73","author":"Wang","year":"2015","journal-title":"Optics and Lasers in Engineering"},{"issue":"1\u20132","key":"10.3233\/JIFS-201224_ref26","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11071-012-0646-1","article-title":"An efficient approach for the construction of LFTS-boxes using chaotic logistic map","volume":"71","author":"Hussain","year":"2013","journal-title":"Nonlinear Dyn"},{"key":"10.3233\/JIFS-201224_ref28","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","article-title":"A novel bit-level image encryption algorithm based on chaotic maps","volume":"78","author":"Xu","year":"2016","journal-title":"Optics and Lasers in Engineering"},{"key":"10.3233\/JIFS-201224_ref29","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","article-title":"A new hybrid digital chaotic system with applications in image encryption","volume":"160","author":"Alawida","year":"2019","journal-title":"Signal Processing"},{"issue":"1","key":"10.3233\/JIFS-201224_ref30","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/s11045-020-00739-8","article-title":"Multiobjective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption","volume":"32","author":"Kaur","year":"2021","journal-title":"Multidimensional Systems and Signal Processing"},{"issue":"3","key":"10.3233\/JIFS-201224_ref31","doi-asserted-by":"crossref","first-page":"1309","DOI":"10.1007\/s12652-019-01493-x","article-title":"An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps","volume":"11","author":"Gupta","year":"2020","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"10.3233\/JIFS-201224_ref32","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.future.2020.02.029","article-title":"Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map","volume":"107","author":"Kaur","year":"2020","journal-title":"Future Generation Computer Systems"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-201224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:50:32Z","timestamp":1769993432000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-201224"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,11]]},"references-count":28,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jifs-201224","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,11]]}}}