{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:57Z","timestamp":1776926337732,"version":"3.51.2"},"reference-count":40,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066331","type":"journal-article","created":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:26Z","timestamp":1750220306000},"page":"4851-4868","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["Hyper-Chaos and CNN-Based Image Encryption Scheme for Wireless Communication Transmission"],"prefix":"10.32604","volume":"84","author":[{"given":"Gang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Guosheng","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Chenyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"101271","DOI":"10.1016\/j.measen.2024.101271","article-title":"IoT-based trusted wireless communication framework by machine learning approach","volume":"34","author":"Chakaravarthi","year":"2024","journal-title":"Meas Sens"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1635","DOI":"10.1109\/COMST.2024.3369250","article-title":"Frequency selective surface toward 6G communication systems: a contemporary survey","volume":"26","author":"Chen","year":"2024","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"124316","DOI":"10.1016\/j.eswa.2024.124316","article-title":"A novel chaotic map application in image encryption algorithm","volume":"252","author":"Li","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"131","DOI":"10.3390\/electronics13010131","article-title":"High-performance encryption algorithms for dynamic images transmission","volume":"13","author":"Yang","year":"2024","journal-title":"Electronics"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"2585","DOI":"10.3390\/math11112585","article-title":"Chaos-based image encryption: review, application, and challenges","volume":"11","author":"Zhang","year":"2023","journal-title":"Mathematics"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","article-title":"A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map","volume":"143","author":"Cao","year":"2018","journal-title":"Signal Process"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"109196","DOI":"10.1016\/j.compeleceng.2024.109196","article-title":"NTK-3D chaotic map and a non-associative LA-field sequences for image encryption","volume":"116","author":"Sanam","year":"2024","journal-title":"Comput Electr Eng"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"106874","DOI":"10.1016\/j.jfranklin.2024.106874","article-title":"2D and 3D compatible chaotic image encryption system based on checkers rules and shift register","volume":"361","author":"Cai","year":"2024","journal-title":"J Frankl Inst"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/j.aej.2023.04.060","article-title":"Color image encryption base on a 2D hyperchaotic enhanced Henon map and cross diffusion","volume":"73","author":"Hu","year":"2023","journal-title":"Alex Eng J"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1266","DOI":"10.3390\/e24091266","article-title":"A novel hyperchaotic 2D-SFCF with simple structure and its application in image encryption","volume":"24","author":"Hu","year":"2022","journal-title":"Entropy"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.physrep.2024.09.003","article-title":"Overview of the advances in understanding chaos in low-dimensional dynamical systems subjected to parameter drift Parallel dynamical evolutions and climate change in simple systems","volume":"1092","author":"J\u00e1nosi","year":"2024","journal-title":"Phys Rep"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.cjche.2024.10.010","article-title":"Application of wavelet neural network with chaos theory for enhanced forecasting of pressure drop signals in vapor-liquid-solid fluidized bed evaporator","volume":"78","author":"Xu","year":"2025","journal-title":"Chin J Chem Eng"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"100587","DOI":"10.1016\/j.fsisyn.2025.100587","article-title":"Chaos theory and its applications in forensic anthropology","volume":"10","author":"Smith-Escudero","year":"2025","journal-title":"Forensic Sci Int Synergy"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"100647","DOI":"10.1016\/j.cosrev.2024.100647","article-title":"Chaos game optimization: a comprehensive study of its variants, applications, and future directions","volume":"53","author":"Oueslati","year":"2024","journal-title":"Comput Sci Rev"},{"key":"ref15","first-page":"103685","article-title":"Enhancing logistic chaotic map for improved cryptographic security in random number generation","volume":"80","author":"Alawida","year":"2024","journal-title":"J Inf Secur Appl"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"123977","DOI":"10.1016\/j.eswa.2024.123977","volume":"251","author":"Zhang","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"104153","DOI":"10.1016\/j.dsp.2023.104153","article-title":"A bit-plane encryption algorithm for RGB image based on modulo negabinary code and chaotic system","volume":"141","author":"Xiong","year":"2023","journal-title":"Digit Signal Process"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"102620","DOI":"10.1016\/j.asej.2023.102620","article-title":"An optimized chaotic S-box for real-time image encryption scheme based on 4-dimensional memristive hyperchaotic map","volume":"15","author":"Vijayakumar","year":"2024","journal-title":"Ain Shams Eng J"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.matcom.2022.07.030","article-title":"A cluster of 1D quadratic chaotic map and its applications in image encryption","volume":"204","author":"Liu","year":"2023","journal-title":"Math Comput Simul"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"231","DOI":"10.3390\/math11010231","article-title":"Image encryption scheme based on newly designed chaotic map and parallel DNA coding","volume":"11","author":"Zhu","year":"2023","journal-title":"Mathematics"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"106782","DOI":"10.1016\/j.optlaseng.2021.106782","article-title":"A new combination chaotic system and its application in a new Bit-level image encryption scheme","volume":"149","author":"Zhou","year":"2022","journal-title":"Opt Lasers Eng"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"065214","DOI":"10.1088\/1402-4896\/ad418d","article-title":"Local bit-level image encryption algorithm based on one dimensional zero excluded chaotic map","volume":"99","author":"Feng","year":"2024","journal-title":"Phys Scr"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"4543","DOI":"10.1007\/s11071-021-06488-y","article-title":"An adjustable visual image cryptosystem based on 6D hyperchaotic system and compressive sensing","volume":"104","author":"Wang","year":"2021","journal-title":"Nonlinear Dyn"},{"key":"ref24","first-page":"1977","article-title":"Color image compression and encryption algorithm based on 2D compressed sensing and hyperchaotic system","volume":"78","author":"Dong","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"025228","DOI":"10.1088\/1402-4896\/ad9d8b","article-title":"A LE-controlled 4D non-degenerate hyperchaotic system and STP-CS model based efficient image encryption algorithm","volume":"100","author":"Long","year":"2025","journal-title":"Phys Scr"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"114793","DOI":"10.1016\/j.chaos.2024.114793","article-title":"A fractional-order hyperchaotic system that is period in integer-order case and its application in a novel high-quality color image encryption algorithm","volume":"182","author":"Yan","year":"2024","journal-title":"Chaos Solitons Fractals"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"114945","DOI":"10.1016\/j.chaos.2024.114945","article-title":"Asymptotic shape synchronization in three-dimensional chaotic systems and its application in color image encryption","volume":"184","author":"Huang","year":"2024","journal-title":"Chaos Solitons Fractals"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"107057","DOI":"10.1016\/j.rinp.2023.107057","article-title":"Research and application of big data encryption technology based on quantum lightweight image encryption","volume":"54","author":"Ma","year":"2023","journal-title":"Results Phys"},{"key":"ref29","first-page":"139","article-title":"A novel approach for image encryption with chaos-RNA","volume":"77","author":"Hong","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"35113","DOI":"10.1109\/JIOT.2024.3432494","article-title":"OSMRD-IE: octal-based shuffling and multilayer rotational diffusing image encryption using 2-D hybrid Michalewicz-Ackley map","volume":"11","author":"Erkan","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1016\/j.apm.2024.04.023","article-title":"An image encryption method based on improved Lorenz chaotic system and Galois field","volume":"131","author":"Zhang","year":"2024","journal-title":"Appl Math Model"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.apm.2024.04.012","article-title":"Optical image encryption and authentication scheme with computational ghost imaging","volume":"131","author":"Guo","year":"2024","journal-title":"Appl Math Model"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"107282","DOI":"10.1016\/j.rinp.2023.107282","article-title":"Computational ghost imaging encryption using RSA algorithm and discrete wavelet transform","volume":"56","author":"Huang","year":"2024","journal-title":"Results Phys"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"128714","DOI":"10.1016\/j.neucom.2024.128714","article-title":"Deep learning-based image encryption techniques: fundamentals, current trends, challenges and future directions","volume":"612","author":"Singh","year":"2025","journal-title":"Neurocomputing"},{"key":"ref35","first-page":"1645","article-title":"Digital image encryption algorithm based on double chaotic map and LSTM","volume":"77","author":"Feng","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"111318","DOI":"10.1016\/j.chaos.2021.111318","article-title":"Double image encryption algorithm based on neural network and chaos","volume":"152","author":"Man","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"4915","DOI":"10.1109\/TNNLS.2021.3062754","article-title":"DeepKeyGen: a deep learning-based stream cipher generator for medical image encryption and decryption","volume":"33","author":"Ding","year":"2022","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"103134","DOI":"10.1016\/j.micpro.2020.103134","article-title":"An efficient image encryption using deep neural network and chaotic map","volume":"77","author":"Maniyath","year":"2020","journal-title":"Microprocess Microsyst"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.patrec.2021.11.025","article-title":"Image encryption based on logistic chaotic systems and deep autoencoder","volume":"153","author":"Sang","year":"2022","journal-title":"Pattern Recognit Lett"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1162887","DOI":"10.3389\/fphy.2023.1162887","article-title":"An image encryption algorithm based on a 3D chaotic Hopfield neural network and random row-column permutation","volume":"11","author":"Yao","year":"2023","journal-title":"Front Phys"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_66331\/TSP_CMC_66331.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:25Z","timestamp":1776923125000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63188"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":40,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066331","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-30","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}