{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:09:48Z","timestamp":1763345388860,"version":"3.45.0"},"reference-count":56,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.068360","type":"journal-article","created":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T09:08:43Z","timestamp":1755162523000},"page":"2157-2177","source":"Crossref","is-referenced-by-count":0,"title":["Sine-Polynomial Chaotic Map (SPCM): A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks"],"prefix":"10.32604","volume":"85","author":[{"given":"David S.","family":"Bhatti","sequence":"first","affiliation":[]},{"given":"Annas W.","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Haeung","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Ki-Il","family":"Kim","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"14","DOI":"10.3390\/asi3010014","article-title":"Applications of wireless sensor networks: an up-to-date survey","volume":"3","author":"Kandris","year":"2020","journal-title":"Appl Syst Innov"},{"key":"ref2","first-page":"2611","article-title":"EECLP: a wireless sensor networks energy efficient cross-layer protocol","volume":"80","author":"Kaddi","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3428","DOI":"10.1038\/s41598-024-53938-9","article-title":"Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions","volume":"14","author":"Bhatti","year":"2024 Feb","journal-title":"Sci Rep"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"155014772094913","DOI":"10.1177\/1550147720949138","article-title":"Evolution of wireless sensor network design from technology centric to user centric: an architectural perspective","volume":"16","author":"Singh","year":"2020","journal-title":"Int J Distrib Sens Netw"},{"key":"ref5","first-page":"1","author":"Verhulst","year":"2016","journal-title":"The foundations of chaos revisited: from poincar\u00e9 to recent advancements. understanding complex systems"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1006\/hmat.2002.2351","article-title":"Writing the history of dynamical systems and chaos: longue dur\u00e9e and revolution, disciplines and cultures","volume":"29","author":"Aubin","year":"2002","journal-title":"Historia Mathematica"},{"journal-title":"The stanford encyclopedia of philosophy","year":"2024 [Internet]. [cited 2025 Jul 24]","author":"Bishop","key":"ref7"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1016\/B978-008045405-4.00148-8","author":"J\u00f8rgensen","year":"2008","journal-title":"Encyclopedia of ecology"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"907","DOI":"10.1007\/s00530-021-00772-y","article-title":"A novel multi-image cryptosystem based on weighted plain images and using combined chaotic maps","volume":"27","author":"Kari","year":"2021","journal-title":"Multimed Syst"},{"key":"ref10","first-page":"123","article-title":"Chaos theory and its applications in our real life","volume":"1","author":"Biswas","year":"2018","journal-title":"Barishal Univ J Part"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1311","DOI":"10.3390\/sym15071311","article-title":"A family of 1D chaotic maps without equilibria","volume":"15","author":"Lawnik","year":"2023","journal-title":"Symmetry"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","article-title":"Cascade chaotic system with applications","volume":"45","author":"Zhou","year":"2015","journal-title":"IEEE Trans Cybern"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1937","DOI":"10.1109\/TSP.2020.2979596","article-title":"Two-dimensional modular chaotification system for improving chaos complexity","volume":"68","author":"Hua","year":"2020","journal-title":"IEEE Trans Signal Process"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1007\/s11071-020-05503-y","article-title":"A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design","volume":"100","author":"Lambi\u0107","year":"2020","journal-title":"Nonlinear Dyn"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1140\/epjp\/s13360-020-00187-0","article-title":"A new algorithm for the construction of substitution box by using chaotic map","volume":"135","author":"Shafique","year":"2020","journal-title":"Eur Phys J Plus"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"6102824","DOI":"10.1155\/2020\/6102824","article-title":"An image encryption algorithm based on hyperchaotic system and variable-step josephus problem","volume":"2020","author":"Zhang","year":"2020","journal-title":"Int J Optics"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"19853","DOI":"10.1007\/s11042-020-08850-5","article-title":"A new chaos based color image encryption algorithm using permutation substitution and Boolean operation","volume":"79","author":"Ali","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"8721","DOI":"10.1007\/s11042-020-10117-y","article-title":"A novel 1D chaotic system for image encryption, authentication and compression in cloud","volume":"80","author":"Li","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"ref19","series-title":"IOP Conference Series: Materials Science and Engineering. Vol. 1076","article-title":"Designing substitution box based on the 1D logistic map chaotic system","author":"Fadhil","year":"2021"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1155\/2022\/1720842","article-title":"Novel one-dimensional chaotic system and its application in image encryption","volume":"2022","author":"Cheng","year":"2022","journal-title":"Complexity"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1504\/IJES.2022.122057","article-title":"An image encrypting algorithm based on 1D and 2D logistic chaotic systems","volume":"15","author":"Zhang","year":"2022","journal-title":"Int J Embed Syst"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"34547","DOI":"10.1007\/s11042-021-11657-7","article-title":"A lightweight image encryption scheme based on chaos and diffusion circuit","volume":"81","author":"Mondal","year":"2022","journal-title":"Multimed Tools Appl"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.matcom.2022.07.030","article-title":"A cluster of 1D quadratic chaotic map and its applications in image encryption","volume":"204","author":"Liu","year":"2023","journal-title":"Math Comput Simul"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1325","DOI":"10.3390\/electronics12061325","article-title":"One-dimensional quadratic chaotic system and splicing model for image encryption","volume":"12","author":"Chen","year":"2023","journal-title":"Electronics"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"11541","DOI":"10.1109\/ACCESS.2023.3242311","article-title":"Color image encryption through chaos and kaa map","volume":"11","author":"Alexan","year":"2023","journal-title":"IEEE Access"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1140\/epjp\/s13360-023-04242-4","article-title":"A new class of discrete modular memristors and application in chaotic systems","volume":"138","author":"Ding","year":"2023","journal-title":"Eur Phys J Plus"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"79265","DOI":"10.1109\/ACCESS.2023.3298111","article-title":"Designing S-box using tent-sine chaotic system while combining the traits of tent and sine map","volume":"11","author":"Malik","year":"2023","journal-title":"IEEE Access"},{"key":"ref28","first-page":"103685","article-title":"Enhancing logistic chaotic map for improved cryptographic security in random number generation","volume":"80","author":"Alawida","year":"2024","journal-title":"J Inf Secur Appl"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"62118","DOI":"10.1109\/ACCESS.2024.3377665","article-title":"A lightweight multi-chaos-based image encryption scheme for IoT Networks","volume":"12","author":"Jain","year":"2024","journal-title":"IEEE Access"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"6","DOI":"10.69882\/adba.chf.2024072","article-title":"A novel chaos-based encryption technique with parallel processing using CUDA for mobile powerful GPU control center","volume":"1","author":"K\u0131ran","year":"2024","journal-title":"Chaos Fract"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/s44196-024-00731-1","article-title":"Blockchain-driven optimized chaotic encryption scheme for medical image transmission in IoT-Edge environment","volume":"18","author":"Archana","year":"2025","journal-title":"Int J Comput Intell Syst"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"113804","DOI":"10.1016\/j.knosys.2025.113804","article-title":"Visually meaningful triple images encryption algorithm based on 2D compressive sensing and multi-region embedding","volume":"324","author":"Hu","year":"2025","journal-title":"Knowl Based Syst"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"1675","DOI":"10.3390\/s18061675","article-title":"Power consumption and calculation requirement analysis of AES for WSN IoT","volume":"18","author":"Hung","year":"2018","journal-title":"Sensors"},{"key":"ref34","series-title":"Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010","first-page":"E84","article-title":"Comparison between RSA hardware and software implementation for WSNs security schemes","author":"Alkalbani","year":"2010 Dec 13\u201314"},{"key":"ref35","doi-asserted-by":"crossref","unstructured":"Wang H, Li Q. Efficient implementation of public key cryptosystems on MICAz and TelosB motes. In: Technical report. USA: College of William and Mary; 2006. WM-CS-2006-07. doi:10.1007\/11935308_37.","DOI":"10.1007\/11935308_37"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"18370","DOI":"10.1109\/JSEN.2025.3558041","article-title":"K-coverage estimation for irregular targets in wireless visual sensor networks deployed in complex region of interest","volume":"25","author":"Liu","year":"2025","journal-title":"IEEE Sens J"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1142\/8285","author":"Avrutin","year":"2019","journal-title":"Continuous and discontinuous piecewise-smooth one-dimensional maps"},{"journal-title":"Lyapunov exponents. Wiley encyclopedia of biomedical engineering","year":"2006","author":"Dingwell","key":"ref38"},{"key":"ref39","series-title":"2008 International Conference on Computational Sciences and its Applications","first-page":"321","article-title":"Matlab toolbox and GUI for analyzing one-dimensional chaotic maps","author":"Tomida","year":"2008 Jun 30\u2013Jul 3"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-662-48410-4_7","author":"Gottwald","year":"2016","journal-title":"Chaos detection and predictability"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"2150011","DOI":"10.1142\/S0218127421500115","article-title":"A simple guide for plotting a proper bifurcation diagram","volume":"31","author":"Jafari","year":"2021","journal-title":"Int J Bifurcat Chaos"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"523","DOI":"10.3402\/tellusa.v52i5.12283","article-title":"Sensitivity analysis of the climate of a chaotic system","volume":"52","author":"Lea","year":"2000","journal-title":"Tellus A Dyn Meteorol Oceanogr"},{"key":"ref43","unstructured":"Bassham LEIII, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Barker EB, et al. SP 800-22 Rev. 1a: a statistical test suite for random and pseudorandom number generators for cryptographic applications. Gaithersburg, MD, USA: National Institute of Standards and Technology (NIST); 2010. NIST Special Publication 800-22 Revision 1a [Internet]. [cited 2025 Jul 24]. Available from: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-22\/rev-1a\/final."},{"key":"ref44","doi-asserted-by":"crossref","first-page":"112770","DOI":"10.1016\/j.chaos.2022.112770","article-title":"AEA-NCS: an audio encryption algorithm based on a nested chaotic system","volume":"165","author":"Wu","year":"2022","journal-title":"Chaos Soliton Fract"},{"key":"ref45","unstructured":"MathWorks. MATLAB Image Processing Toolbox Standard Images (Lena, Cameraman, Peppers) [Internet]. [cited 2025 Jul 3]. Available from: https:\/\/www.mathworks.com\/help\/images\/ref\/."},{"key":"ref46","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","article-title":"A novel bit-level image encryption algorithm based on chaotic maps","volume":"78","author":"Xu","year":"2016","journal-title":"Optics Lasers Eng"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","article-title":"An image compression and encryption algorithm based on chaotic system and compressive sensing","volume":"115","author":"Gong","year":"2019","journal-title":"Opt Laser Technol"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"12452","DOI":"10.1109\/ACCESS.2020.2965740","article-title":"Color image encryption algorithm based on dynamic chaos and matrix convolution","volume":"8","author":"Hu","year":"2020","journal-title":"IEEE Access"},{"key":"ref49","series-title":"Advances in Cryptology\u2014CRYPTO\u201988: Proceedings 8","first-page":"450","article-title":"The strict avalanche criterion: spectral properties of Boolean functions and an extended definition","author":"Forri\u00e9","year":"1990"},{"key":"ref50","series-title":"Conference on the Theory and Application of Cryptographic Techniques","first-page":"523","article-title":"On the design of S-boxes","author":"Webster","year":"1985"},{"key":"ref51","unstructured":"Instruments T. MSP430F161x Mixed Signal Microcontroller. Dallas, TX, USA; 2013 [Internet]. [cited 2025 Jul 24]. Available from: https:\/\/www.ti.com\/lit\/ds\/symlink\/msp430f1611.pdf."},{"key":"ref52","series-title":"Conference Nationale sur les Technologies de l\u2019Information et les Telecommunications","article-title":"Performance evaluation on TelosB mote of a secure data aggregation protocol using ECC","author":"Rafik","year":"2013 Dec 10\u201311"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","author":"Gura","year":"2004","journal-title":"Cryptographic hardware and embedded systems-CHES 2004"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.future.2020.04.002","article-title":"A logistic mapping-based encryption scheme for wireless body area networks","volume":"110","author":"Wang","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"ref55","series-title":"2024 4th International Conference on Technological Advancements in Computational Sciences (ICTACS)","first-page":"1303","article-title":"Hybrid image encryption for IoT applications: integrating cellular automata and henon map to improve security and performance","author":"Yogi","year":"2024 Nov 13\u201315"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"5","DOI":"10.2174\/1872212111666170223165916","article-title":"A secure image encryption scheme using chaos and wavelet transformations","volume":"12","author":"Mondal","year":"2018","journal-title":"Recent Pat Eng"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_68360\/TSP_CMC_68360.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:04:52Z","timestamp":1763345092000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63582"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":56,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.068360","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}