{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T07:20:29Z","timestamp":1777706429526,"version":"3.51.4"},"reference-count":31,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2022,8,10]]},"abstract":"<jats:p>Securing image data from prying hackers is crucial in safeguarding the secrecy of data. Over the years, this was done by encrypting the image using an algorithm and a key, where the visible image was converted into a meaningless object. It is a difficult problem to design an image encryption technique based on chaotic systems with predictable cryptographic features. In this paper, the Quaternion, along with the Rossler attractor, was used to generate the key combination. The ciphering was done using the Least Square Approximation Algorithm (LSA). The algorithm was tested on a grayscale image database. The algorithm was initially tested in software using MATLAB R2018b, and was implemented in the Cyclone II EP2C35F672C6 device FPGA. On average, for a cipher image, the Peak Signal to Noise ratio (PSNR) was 9.09303\u200adB and the entropy was 7.9990 bits. For the cipher image, the Number of Pixels Change Rate (NPCR) and Unified Average Change Intensity (UACI) were 99.6039 and 33.4980, respectively. This proved that the algorithm could effectively mitigate the statistical and differential attacks. The key space was 2 (M\u00a0\u00d7N\u00a0\u00d77\u00a0\u00d78), which was sufficiently high and mitigated the brute force attacks. The obtained results confirm that the cipher images resulting from the proposed ciphering scheme possess good cryptographic properties in terms of entropy, PSNR, UACI, NPCR, and keyspace analysis. Furthermore, the strength of the key is evaluated by the NIST test suite.<\/jats:p>","DOI":"10.3233\/jifs-213600","type":"journal-article","created":{"date-parts":[[2022,5,27]],"date-time":"2022-05-27T11:22:01Z","timestamp":1653650521000},"page":"5221-5236","source":"Crossref","is-referenced-by-count":4,"title":["Quaternion keyed Least Square Approximation for image encryption"],"prefix":"10.1177","volume":"43","author":[{"given":"D.","family":"Kalaiarasan","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, Government College of Engineering, Srirangam, Trichy, India"}]},{"given":"A.","family":"Ahilan","sequence":"additional","affiliation":[{"name":"Department of Electronics & Communication Engineering, PSN College of Engineering and Technology, Tirunelveli, India"}]}],"member":"179","reference":[{"issue":"5","key":"10.3233\/JIFS-213600_ref1","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1080\/01611194.2020.1755745","article-title":"Efficient data encryption technique using quaternions for wireless sensor network","volume":"44","author":"Saikia","year":"2020","journal-title":"Cryptologia"},{"issue":"24","key":"10.3233\/JIFS-213600_ref2","doi-asserted-by":"crossref","first-page":"35493","DOI":"10.1007\/s11042-019-08108-9","article-title":"Images encryption algorithm based on the quaternion multiplication and the XOR operation","volume":"78","author":"Boussif","year":"2019","journal-title":"Multimed Tools Appl"},{"key":"10.3233\/JIFS-213600_ref3","doi-asserted-by":"crossref","unstructured":"Saikia M. , An efficient D2D quaternion encryption system for IoT using IEEE 754 standards, Internet of Things (Netherlands) 11 (2020).","DOI":"10.1016\/j.iot.2020.100261"},{"issue":"12","key":"10.3233\/JIFS-213600_ref4","doi-asserted-by":"crossref","first-page":"18317","DOI":"10.1007\/s11042-021-10576-x","article-title":"Derakhshi, A new Grayscale image encryption algorithm composed of logistic mapping, Arnold cat, and image blocking","volume":"80","author":"Zareai","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"10.3233\/JIFS-213600_ref5","doi-asserted-by":"crossref","unstructured":"Liu H. , Zhao B. , Zou J. , Huang L. and Liu Y. , A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map, Secur Commun Networks 2020 (2020).","DOI":"10.1155\/2020\/7151836"},{"key":"10.3233\/JIFS-213600_ref6","doi-asserted-by":"crossref","first-page":"22141","DOI":"10.1109\/ACCESS.2021.3054842","article-title":"An Image Compression and Encryption Algorithm Based on the Fractional-Order Simplest Chaotic Circuit","volume":"9","author":"Hu","year":"2021","journal-title":"IEEE Access"},{"issue":"7","key":"10.3233\/JIFS-213600_ref8","first-page":"870","article-title":"A new approach for palmprint image encryption based on hybrid chaotic maps","volume":"32","author":"Hikal","year":"2020","journal-title":"J King Saud Univ \u2013Comput Inf Sci"},{"issue":"3","key":"10.3233\/JIFS-213600_ref9","first-page":"801","article-title":"Image encryption algorithm based on chaos and dynamic DNA coding","volume":"44","author":"Tian","year":"2014","journal-title":"Jilin Daxue Xuebao (Gongxueban)\/Journal Jilin Univ (Engineering Technol Ed"},{"key":"10.3233\/JIFS-213600_ref10","doi-asserted-by":"crossref","unstructured":"Heucheun Yepdia L.M. Tiedeu A. and Kom G. , A Robust and Fast Image Encryption Scheme Based on a Mixing Technique, Secur Commun Networks 2021 (2021).","DOI":"10.1155\/2021\/6615708"},{"issue":"2","key":"10.3233\/JIFS-213600_ref11","doi-asserted-by":"crossref","first-page":"2043","DOI":"10.1007\/s11071-021-06206-8","article-title":"Image encryption algorithm with circle index table scrambling and partition diffusion","volume":"103","author":"Zhou","year":"2021","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"10.3233\/JIFS-213600_ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-020-78127-2","article-title":"An image encryption scheme based on public key cryptosystem and quantum logistic map","volume":"10","author":"Ye","year":"2020","journal-title":"Sci Rep"},{"issue":"2","key":"10.3233\/JIFS-213600_ref13","doi-asserted-by":"crossref","first-page":"2753","DOI":"10.1007\/s11042-020-09648-1","article-title":"A new image encryption scheme based on hybrid chaotic maps","volume":"80","author":"Pourjabbar Kari","year":"2021","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10.3233\/JIFS-213600_ref14","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/j.jestch.2019.09.001","article-title":"A new algorithm for the colored image encryption via the modified Chua\u2019s circuit","volume":"23","author":"Arpac\u0131","year":"2020","journal-title":"Eng Sci Technol an Int J"},{"key":"10.3233\/JIFS-213600_ref15","doi-asserted-by":"crossref","unstructured":"Li Z. , Peng C. , Tan W. and Li L. , An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method, Complexity 2021 (2021).","DOI":"10.1155\/2021\/8824915"},{"issue":"4","key":"10.3233\/JIFS-213600_ref18","first-page":"499","article-title":"A light weight secure image encryption scheme based on chaos & DNA computing","volume":"29","author":"Mondal","year":"2017","journal-title":"J King Saud Univ \u2013Comput Inf Sci"},{"key":"10.3233\/JIFS-213600_ref20","first-page":"2020","article-title":"Image Encryption Based on High-Dimensional Manifold Computing and Block Dividing Algorithm","volume":"2020","author":"Jia","journal-title":"Int J Opt"},{"key":"10.3233\/JIFS-213600_ref21","first-page":"2020","article-title":"An Image Encryption Algorithm Based on Hyperchaotic System and Variable-Step Josephus Problem","volume":"2020","author":"Zhang","journal-title":"Int J Opt"},{"issue":"4","key":"10.3233\/JIFS-213600_ref22","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1016\/j.jestch.2016.06.013","article-title":"A novel binary image encryption algorithm based on diffuse representation","volume":"19","author":"Houas","year":"2016","journal-title":"Eng Sci Technol an Int J"},{"key":"10.3233\/JIFS-213600_ref23","doi-asserted-by":"crossref","first-page":"155184","DOI":"10.1109\/ACCESS.2020.3019216","article-title":"Robust Image Encryption with Scanning Technology, the El-Gamal Algorithm and Chaos Theory","volume":"8","author":"Yousif","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-213600_ref24","doi-asserted-by":"crossref","first-page":"13792","DOI":"10.1109\/ACCESS.2020.2966264","article-title":"Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"issue":"3 Special Issue","key":"10.3233\/JIFS-213600_ref25","first-page":"109","article-title":"Comparative analysis & implementation of image encryption & decryption for mobile cloud security","volume":"29","author":"Ibraheem","year":"2020","journal-title":"Int J Adv Sci Technol"},{"issue":"1","key":"10.3233\/JIFS-213600_ref26","first-page":"1","article-title":"A new image encryption algorithm based on the OF-LSTMS and chaotic sequences","volume":"11","author":"He","year":"2021","journal-title":"Sci Rep"},{"issue":"2","key":"10.3233\/JIFS-213600_ref28","doi-asserted-by":"crossref","first-page":"1911","DOI":"10.1007\/s11071-021-06688-6","article-title":"The N-level (\u22654) logistic cascade homogenized mapping for image encryption","volume":"105","author":"Bao","year":"2021","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"10.3233\/JIFS-213600_ref29","doi-asserted-by":"crossref","first-page":"4015","DOI":"10.1007\/s13369-021-05358-4","article-title":"Performance Evaluation of Lightweight Encryption Algorithms for IoT-Based Applications","volume":"46","author":"Panahi","year":"2021","journal-title":"Arab J Sci Eng"},{"issue":"4","key":"10.3233\/JIFS-213600_ref30","doi-asserted-by":"crossref","first-page":"3581","DOI":"10.1007\/s13369-020-05196-w","article-title":"Secure CT-Image Encryption for COVID-19 Infections Using HBBS-Based Multiple Key-Streams","volume":"46","author":"Reyad","year":"2021","journal-title":"Arab J Sci Eng"},{"issue":"11","key":"10.3233\/JIFS-213600_ref31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-016-0611-5","article-title":"Secured Medical Images \u2013a Chaotic Pixel Scrambling Approach","volume":"40","author":"Parvees","year":"2016","journal-title":"J Med Syst"},{"key":"10.3233\/JIFS-213600_ref32","doi-asserted-by":"crossref","first-page":"123536","DOI":"10.1109\/ACCESS.2020.3004536","article-title":"A Novel and Efficient 3D Multiple Images Encryption Scheme Based on Chaotic Systems and Swapping Operations","volume":"8","author":"Hanif","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-213600_ref34","doi-asserted-by":"crossref","first-page":"104265","DOI":"10.1016\/j.micpro.2021.104265","article-title":"Security analysis of reversible logic cryptography design with LFSR key on 32-bit microcontroller","volume":"84","author":"Raj","year":"2021","journal-title":"Microprocess Microsyst"},{"issue":"3","key":"10.3233\/JIFS-213600_ref38","doi-asserted-by":"crossref","first-page":"3925","DOI":"10.3233\/JIFS-190137","article-title":"BCH Codes with computational approach and its applications in image encryption","volume":"37","author":"Asif","year":"2019","journal-title":"J Intell Fuzzy Syst"},{"key":"10.3233\/JIFS-213600_ref39","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.vlsi.2021.05.007","article-title":"An efficient image encryption scheme based on double affine substitution box and chaotic system","volume":"81","author":"Khan","year":"2021","journal-title":"Integration"},{"key":"10.3233\/JIFS-213600_ref40","first-page":"2021","article-title":"A Novel Image Encryption Technique Based on Mobius Transformation","volume":"2021","author":"Asif","journal-title":"Comput Intell Neurosci"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-213600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:46:47Z","timestamp":1777456007000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-213600"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,10]]},"references-count":31,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/jifs-213600","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,10]]}}}