{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T17:42:32Z","timestamp":1776966152883,"version":"3.51.4"},"reference-count":48,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.058478","type":"journal-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T02:30:47Z","timestamp":1733970647000},"page":"4435-4463","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":9,"title":["Secure Image Communication Using Galois Field, Hyper 3D Logistic Map, and B92 Quantum Protocol"],"prefix":"10.32604","volume":"81","author":[{"given":"De Rosal Ignatius","family":"Moses Setiadi","sequence":"first","affiliation":[]},{"given":"Nova","family":"Rijati","sequence":"additional","affiliation":[]},{"given":"Ahmad Rofiqul","family":"Muslikh","sequence":"additional","affiliation":[]},{"given":"Bonifacius","family":"Vicky Indriyono","sequence":"additional","affiliation":[]},{"given":"Aceng","family":"Sambas","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"109","DOI":"10.62411\/faith.2024-14","article-title":"Pilot study on enhanced detection of cues over malicious sites using data balancing on the random forest ensemble","volume":"1","author":"Okpor","year":"Sep. 2024","journal-title":"J. Futur. Artif. Intell. Technol."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"75","DOI":"10.62411\/faith.2024-15","article-title":"Phishing website detection using bidirectional gated recurrent unit model and feature selection","volume":"2","author":"Setiadi","year":"2024","journal-title":"J. Futur. Artif. Intell. Technol."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"174","DOI":"10.62411\/faith.2024-33","article-title":"A hybrid approach for efficient DDoS detection in network traffic using CBLOF-based feature engineering and XGBoost","volume":"1","author":"Dhahir","year":"Sep. 2024","journal-title":"J. Futur. Artif. Intell. Technol."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"257","DOI":"10.62411\/jcta.9851","article-title":"Machine learning and cryptanalysis: An in-depth exploration of current practices and future potential","volume":"1","author":"Singh","year":"Feb. 2024","journal-title":"J. Comput. Theor. Appl."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"188","DOI":"10.33633\/jcta.v1i2.9547","article-title":"Hybrid quantum key distribution protocol with chaotic system for securing data transmission","volume":"1","author":"Setiadi","year":"Dec. 2023","journal-title":"J. Comput. Theor. Appl."},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/s11128-020-02663-z","article-title":"Simple analysis of security of the BB84 quantum key distribution protocol","volume":"19","author":"Su","year":"Jun. 2020, Art. no. 169","journal-title":"Quantum Inf. Process"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","article-title":"Quantum cryptography using any two non-orthogonal states","volume":"68","author":"Bennett","year":"May 1992","journal-title":"Phys. Rev. Lett."},{"key":"ref8","series-title":"Proc. of the 2023 Int. Conf. on Image, Algorithms and Artificial Intelligence (ICIAAI 2023)","first-page":"548","article-title":"Comparative analysis of quantum key distribution protocols: BB84 and B92 in the context of hybrid quantum-classical networks","author":"Zheng","year":"2023"},{"key":"ref9","article-title":"Continuous variable B92 quantum key distribution protocol using single photon added and subtracted coherent states","volume":"19","author":"Srikara","year":"Oct. 2020","journal-title":"Quantum Inf. Process"},{"key":"ref10","first-page":"2033","article-title":"Asymmetric key cryptosystem for image encryption by elliptic curve over galois field","volume":"76","author":"Mazyad Hazzazi","year":"2023","journal-title":"Comput. Mater. Contin."},{"key":"ref11","article-title":"Proposing a novel dynamic AES for image encryption using a chaotic map key management approach","volume":"246","author":"Shariatzadeh","year":"Nov. 2021","journal-title":"Optik"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.optlaseng.2019.05.027","article-title":"Color pathological image encryption algorithm using arithmetic over Galois field and coupled hyper chaotic system","volume":"122","author":"Liu","year":"Nov. 2019","journal-title":"Opt. Lasers Eng."},{"key":"ref13","author":"Cormen","year":"2009","journal-title":"Introduction to Algorithms"},{"key":"ref14","series-title":"Proc. Int. Conf. Inform. Technol. Comput. Electr. Eng.","first-page":"336","article-title":"A comparative study of image cryptographic method","author":"Setiadi","year":"Sep. 2018"},{"key":"ref15","first-page":"6818","article-title":"Medical image cryptosystem using dynamic josephus sequence and chaotic-hash scrambling","volume":"34","author":"Setiadi","year":"Oct. 2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"Alvarez","year":"Aug. 2006","journal-title":"Int. J. Bifurc. Chaos."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.ijleo.2018.12.178","article-title":"An image encryption algorithm based on modified logistic chaotic map","volume":"181","author":"Han","year":"Mar. 2019","journal-title":"Optik"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","article-title":"Image encryption using 2D logistic-adjusted-sine map","volume":"339","author":"Hua","year":"Apr. 2016","journal-title":"Inf. Sci."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","article-title":"Deterministic nonperiodic flow","volume":"20","author":"Lorenz","year":"Mar. 1963","journal-title":"J. Atmos. Sci."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/0375-9601(76)90101-8","article-title":"An equation for continuous chaos","volume":"57","author":"R\u00f6ssler","year":"Jul. 1976","journal-title":"Phys. Lett. A"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1142\/S0218127499001024","article-title":"Yet another chaotic attractor","volume":"9","author":"Chen","year":"Jul. 1999","journal-title":"Int. J. Bifurc. Chaos."},{"key":"ref22","article-title":"Image encryption scheme based on blind signature and an improved Lorenz system","volume":"205","author":"Ye","year":"Nov. 2022","journal-title":"Expert. Syst. Appl."},{"key":"ref23","first-page":"323","article-title":"Hopf bifurcation analysis and ultimate bound estimation of a new 4-D quadratic autonomous hyper-chaotic system","volume":"291","author":"Zarei","year":"Dec. 2016","journal-title":"Appl. Math. Comput."},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.3390\/electronics10091066","article-title":"New image encryption algorithm using hyperchaotic system and fibonacci q-matrix","volume":"10","author":"Hosny","year":"2021","journal-title":"Electronics"},{"key":"ref25","article-title":"Image encryption algorithm based on 2D hyperchaotic map","volume":"142","author":"Gao","year":"Oct. 2021","journal-title":"Opt. Laser Technol."},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.119076","article-title":"2D hyperchaotic system based on Schaffer function for image encryption","volume":"213","author":"Erkan","year":"Mar. 2023","journal-title":"Expert Syst. Appl."},{"key":"ref27","article-title":"Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption","volume":"246","author":"Feng","year":"Jul. 2024","journal-title":"Expert Syst. Appl."},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlaseng.2020.106040","article-title":"A new color image encryption scheme based on 2DNLCML system and genetic operations","volume":"128","author":"Zhang","year":"May 2020","journal-title":"Opt. Lasers Eng."},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.3390\/computation11090178","article-title":"An image encryption scheme combining 2D cascaded logistic map and permutation-substitution operations","volume":"11","author":"Setiadi","year":"Sep. 2023, Art. No. 178","journal-title":"Computation"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"61","DOI":"10.33633\/jcta.v1i2.9388","article-title":"Image encryption using half-inverted cascading chaos cipheration","volume":"1","author":"Setiadi","year":"Oct. 2023","journal-title":"J. Comput. Theor. Appl."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1007\/s11071-011-0306-x","article-title":"Generating tri-chaos attractors with three positive Lyapunov exponents in new four order system via linear coupling","volume":"69","author":"Li","year":"Aug. 2012","journal-title":"Nonlinear Dyn."},{"key":"ref32","first-page":"238","article-title":"An image encryption scheme based on a seven-dimensional hyperchaotic system and Pascal\u2019s matrix","volume":"35","author":"Neamah","year":"Mar. 2023","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref33","first-page":"589","article-title":"Free-space quantum key distribution","volume":"44","author":"Carrasco-Casado","year":"2016","journal-title":"Opt. Pura. Apl."},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1016\/j.ffa.2024.102466","article-title":"Probabilistic Galois theory in function fields","volume":"98","author":"Entin","year":"2024","journal-title":"Finite Fields Their Appl."},{"key":"ref35","doi-asserted-by":"crossref","first-page":"49945","DOI":"10.1109\/ACCESS.2019.2910563","article-title":"Galois field-based image encryption for remote transmission of tumor ultrasound images","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13319-017-0135-x","article-title":"A novel image encryption based on algebraic S-box and Arnold transform","volume":"8","author":"Farwa","year":"Sep. 2017","journal-title":"3D Res."},{"key":"ref37","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1016\/j.apm.2024.04.023","article-title":"An image encryption method based on improved Lorenz chaotic system and Galois field","volume":"131","author":"Zhang","year":"2024","journal-title":"Appl. Math. Model."},{"key":"ref38","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/978-3-031-60935-0_48","author":"Jangra","year":"2024","journal-title":"The Future of Artificial Intelligence and Robotics"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"669","DOI":"10.3390\/iot2040034","article-title":"Designing a block cipher in galois extension fields for IoT security","volume":"2","author":"George","year":"Nov. 2021","journal-title":"IoT"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"115143","DOI":"10.1109\/ACCESS.2022.3218886","article-title":"Improved pixel and bit confusion-diffusion based on mixed chaos and hash operation for image encryption","volume":"10","author":"Andono","year":"2022","journal-title":"IEEE Access"},{"key":"ref41","unstructured":"USC Viterbi School of Engineering, \u201cSIPI Image Database\u201d. Accessed: Mar. 27, 2019. [Online]. Available: http:\/\/sipi.usc.edu\/database\/"},{"key":"ref42","article-title":"Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher","volume":"10","author":"Lone","year":"Oct. 2022","journal-title":"Mathematics"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"22463","DOI":"10.1007\/s11071-024-10191-z","article-title":"Efficient and secure image encryption algorithm using 2D LIM map and Latin square matrix","volume":"112","author":"Huang","year":"Aug. 2024","journal-title":"Nonlinear Dyn."},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2020.115829","article-title":"A novel method for lossless image compression and encryption based on LWT, SPIHT and cellular automata","volume":"84","author":"Zhang","year":"2020","journal-title":"Signal Process. Image Commun."},{"key":"ref45","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","article-title":"A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map","volume":"143","author":"Cao","year":"Feb. 2018","journal-title":"Signal Process"},{"key":"ref46","first-page":"139","article-title":"A novel approach for image encryption with chaos-RNA","volume":"77","author":"Hong","year":"2023","journal-title":"Comput. Mater. Contin."},{"key":"ref47","doi-asserted-by":"crossref","DOI":"10.3390\/math11102396","article-title":"Color image encryption algorithm based on a chaotic model using the modular discrete derivative and Langton\u2019s ant","volume":"11","author":"Moya-Albor","year":"May 2023","journal-title":"Mathematics"},{"key":"ref48","first-page":"781","article-title":"A new S-box design system for data encryption using artificial bee colony algorithm","volume":"77","author":"Ghadi","year":"2023","journal-title":"Comput. Mater. Contin."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59059\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:12:11Z","timestamp":1741327931000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59059"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":48,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.058478","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-09-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}