{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:42:33Z","timestamp":1775666553496,"version":"3.50.1"},"reference-count":42,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T00:00:00Z","timestamp":1693872000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Directorate General of Higher Education, Research and Technology of Indonesia","award":["182\/E5\/PG.02.00.PL\/2023"],"award-info":[{"award-number":["182\/E5\/PG.02.00.PL\/2023"]}]},{"name":"Directorate General of Higher Education, Research and Technology of Indonesia","award":["026\/LL6\/PB\/AL.04\/2023"],"award-info":[{"award-number":["026\/LL6\/PB\/AL.04\/2023"]}]},{"name":"Directorate General of Higher Education, Research and Technology of Indonesia","award":["065\/A38-04\/UDN-09\/VII\/2023"],"award-info":[{"award-number":["065\/A38-04\/UDN-09\/VII\/2023"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computation"],"abstract":"<jats:p>Confusion, diffusion, and encryption keys affect the quality of image encryption. This research proposes combining bit- and pixel-level permutation and substitution methods based on three advanced chaotic logistic map methods. The three chaotic methods are the 2D Logistic-adjusted-Sine map (2D-LASM), the 2D Logistic-sine-coupling map (2D-LSCM), and the 2D Logistic ICMIC cascade map (2D-LICM). The encryption method\u2019s design consists of six stages of encryption, involving permutation operations based on chaotic order, substitution based on modulus and bitXOR, and hash functions. Hash functions are employed to enhance key space and key sensitivity quality. Several testing tools are utilized to assess encryption performance, including histogram and chi-square analysis, information entropy, correlation of adjacent pixels, differential analysis, key sensitivity and key space analysis, data loss and noise attacks, NIST randomness tests, and TestU01. Compared to using a single 2D logistic map, the amalgamation of bit-level and pixel-level encryption and the utilization of three 2D cascade logistic maps has improved encryption security performance. This method successfully passes the NIST, TestU01, and chi-square tests. Furthermore, it outperforms the previous method regarding correlation, information entropy, NPCR, and UACI tests.<\/jats:p>","DOI":"10.3390\/computation11090178","type":"journal-article","created":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T10:14:14Z","timestamp":1693995254000},"page":"178","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6615-4457","authenticated-orcid":false,"given":"De Rosal Ignatius Moses","family":"Setiadi","sequence":"first","affiliation":[{"name":"Faculty of Computer Science, Dian Nuswantoro University, Semarang 50131, Indonesia"}]},{"given":"Nova","family":"Rijati","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, Dian Nuswantoro University, Semarang 50131, Indonesia"}]}],"member":"1968","published-online":{"date-parts":[[2023,9,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.sigpro.2019.06.010","article-title":"An Overview of Encryption Algorithms in Color Images","volume":"164","author":"Ghadirli","year":"2019","journal-title":"Signal Process."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"108908","DOI":"10.1016\/j.sigpro.2022.108908","article-title":"Digital Image Steganography Survey and Investigation (Goal, Assessment, Method, Development, and Dataset)","volume":"206","author":"Setiadi","year":"2023","journal-title":"Signal Process."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Santos, D.F., and Espitia, H.E. (2022). Secure Medical Image Transmission Scheme Using Lorenz\u2019s Attractor Applied in Computer Aided Diagnosis for the Detection of Eye Melanoma. Computation, 10.","DOI":"10.3390\/computation10090158"},{"key":"ref_4","first-page":"6818","article-title":"Medical Image Cryptosystem Using Dynamic Josephus Sequence and Chaotic-Hash Scrambling","volume":"34","author":"Setiadi","year":"2022","journal-title":"J. King Saud Univ.\u2014Comput. Inf. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Alnajim, A.M., Abou-Bakr, E., Alruwisan, S.S., Khan, S., and Elmanfaloty, R.A. (2023). Hybrid Chaotic-Based PRNG for Secure Cryptography Applications. Appl. Sci., 13.","DOI":"10.20944\/preprints202304.0974.v1"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"115143","DOI":"10.1109\/ACCESS.2022.3218886","article-title":"Improved Pixel and Bit Confusion-Diffusion Based on Mixed Chaos and Hash Operation for Image Encryption","volume":"10","author":"Andono","year":"2022","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"69005","DOI":"10.1109\/ACCESS.2023.3285481","article-title":"Combined Interleaved Pattern to Improve Confusion-Diffusion Image Encryption Based on Hyperchaotic System","volume":"11","author":"Winarno","year":"2023","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.future.2020.02.029","article-title":"Color Image Encryption Using Non-Dominated Sorting Genetic Algorithm with Local Chaotic Search Based 5D Chaotic Map","volume":"107","author":"Kaur","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Alexan, W., Chen, Y.-L., Por, L.Y., and Gabr, M. (2023). Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption. Symmetry, 15.","DOI":"10.20944\/preprints202304.0148.v1"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Alexan, W., Alexan, N., and Gabr, M. (2023). Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs. Fractal Fract., 7.","DOI":"10.3390\/fractalfract7040287"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"120596","DOI":"10.1109\/ACCESS.2021.3108789","article-title":"A New Image Encryption Algorithm Based on Single S-Box and Dynamic Encryption Step","volume":"9","author":"Jun","year":"2021","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"157106","DOI":"10.1109\/ACCESS.2021.3128177","article-title":"Construction of S-Boxes Using Different Maps over Elliptic Curves for Image Encryption","volume":"9","author":"Ramzan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Gao, J., Wang, Y., Song, Z., and Wang, S. (2023). Quantum Image Encryption Based on Quantum DNA Codec and Pixel-Level Scrambling. Entropy, 25.","DOI":"10.3390\/e25060865"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Ali, W., Zhu, C., Latif, R., Asim, M., and Tariq, M.U. (2023). Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System. Entropy, 25.","DOI":"10.3390\/e25050787"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"107879","DOI":"10.1016\/j.optlastec.2022.107879","article-title":"Image Encryption Scheme Based on Discrete Cosine Stockwell Transform and DNA-Level Modulus Diffusion","volume":"149","author":"Huang","year":"2022","journal-title":"Opt. Laser Technol."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Bufalo, M., Bufalo, D., and Orlando, G. (2023). Some Properties of the Computation of the Modular Inverse with Applications in Cryptography. Computation, 11.","DOI":"10.3390\/computation11040070"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Zhao, J., Wang, S., and Zhang, L. (2023). Block Image Encryption Algorithm Based on Novel Chaos and DNA Encoding. Information, 14.","DOI":"10.3390\/info14030150"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Moya-Albor, E., Romero-Arellano, A., Brieva, J., and Gomez-Coronel, S.L. (2023). Color Image Encryption Algorithm Based on a Chaotic Model Using the Modular Discrete Derivative and Langton\u2019s Ant. Mathematics, 11.","DOI":"10.3390\/math11102396"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Abu-Faraj, M., Al-Hyari, A., Obimbo, C., Aldebei, K., Altaharwa, I., Alqadi, Z., and Almanaseer, O. (2023). Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps. Cryptography, 7.","DOI":"10.3390\/cryptography7020020"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"22825","DOI":"10.1007\/s11042-020-09033-y","article-title":"Color Image Encryption Based on Programmable Complemented Maximum Length Cellular Automata and Generalized 3-D Chaotic Cat Map","volume":"79","author":"Choi","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Vaidyanathan, S., Kammogne, A.S.T., Tlelo-Cuautle, E., Talonang, C.N., Abd-El-Atty, B., Abd El-Latif, A.A., Kengne, E.M., Mawamba, V.F., Sambas, A., and Darwin, P. (2023). A Novel 3-D Jerk System, Its Bifurcation Analysis, Electronic Circuit Design and a Cryptographic Application. Electronics, 12.","DOI":"10.3390\/electronics12132818"},{"key":"ref_22","first-page":"102566","article-title":"Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps","volume":"54","author":"Ma","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Mfungo, D.E., Fu, X., Xian, Y., and Wang, X. (2023). A Novel Image Encryption Scheme Using Chaotic Maps and Fuzzy Numbers for Secure Transmission of Information. Appl. Sci., 13.","DOI":"10.3390\/app13127113"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Ciylan, F., Ciylan, B., and Atak, M. (2023). FPGA-Based Chaotic Image Encryption Using Systolic Arrays. Electronics, 12.","DOI":"10.3390\/electronics12122729"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"112781","DOI":"10.1016\/j.chaos.2022.112781","article-title":"Design and Realization of Discrete Memristive Hyperchaotic Map with Application in Image Encryption","volume":"165","author":"Lai","year":"2022","journal-title":"Chaos Solitons Fractals"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Lai, Q., Wan, Z., Zhang, H., and Chen, G. (2022). Design and Analysis of Multiscroll Memristive Hopfield Neural Network with Adjustable Memductance and Application to Image Encryption. IEEE Trans. Neural Netw. Learn. Syst., 1\u201314.","DOI":"10.1109\/TNNLS.2022.3146570"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","article-title":"Image Encryption Using 2D Logistic-Adjusted-Sine Map","volume":"339","author":"Hua","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"169430","DOI":"10.1016\/j.ijleo.2022.169430","article-title":"A New RGB Color Image Encryption Scheme Based on Cross-Channel Pixel and Bit Scrambling Using Chaos","volume":"265","year":"2022","journal-title":"Optik"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","article-title":"A Novel Bit-Level Image Encryption Algorithm Based on 2D-LICM Hyperchaotic Map","volume":"143","author":"Cao","year":"2018","journal-title":"Signal Process."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","article-title":"A Novel Bit-Level Image Encryption Algorithm Based on Chaotic Maps","volume":"78","author":"Xu","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.ijleo.2019.03.065","article-title":"A Novel Bit Level Multiphase Algorithm for Image Encryption Based on PWLCM Chaotic Map","volume":"184","author":"Hasheminejad","year":"2019","journal-title":"Optik"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"106782","DOI":"10.1016\/j.optlaseng.2021.106782","article-title":"A New Combination Chaotic System and Its Application in a New Bit-Level Image Encryption Scheme","volume":"149","author":"Zhou","year":"2022","journal-title":"Opt. Lasers Eng."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"6883","DOI":"10.1007\/s11042-017-4605-1","article-title":"A Chaotic Color Image Encryption Using Integrated Bit-Level Permutation","volume":"77","author":"Teng","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_34","first-page":"111","article-title":"Secure Multi\u2013Level Permutation Operation Based Multiple Colour Image Encryption","volume":"40","author":"Patro","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"111629","DOI":"10.1016\/j.chaos.2021.111629","article-title":"Pixel-Level and Bit-Level Image Encryption Method Based on Logistic-Chebyshev Dynamic Coupled Map Lattices","volume":"155","author":"Wang","year":"2022","journal-title":"Chaos Solitons Fractals"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"106162","DOI":"10.1016\/j.asoc.2020.106162","article-title":"A Novel Image Encryption Scheme Using Both Pixel Level and Bit Level Permutation with Chaotic Map","volume":"90","author":"Shahna","year":"2020","journal-title":"Appl. Soft Comput. J."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1268776.1268777","article-title":"TestU01","volume":"33","author":"Simard","year":"2007","journal-title":"ACM Trans. Math. Softw."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.vlsi.2023.01.008","article-title":"Real-Time Medical Image Encryption for H-IoT Applications Using Improved Sequences from Chaotic Maps","volume":"90","year":"2023","journal-title":"Integration"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.vlsi.2023.01.001","article-title":"A Chaotic PRNG Tested with the Heuristic Differential Evolution","volume":"90","year":"2023","journal-title":"Integration"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"113039","DOI":"10.1016\/j.chaos.2022.113039","article-title":"A High Speed Pseudo-Random Bit Generator Driven by 2D-Discrete Hyperchaos","volume":"167","author":"Yang","year":"2023","journal-title":"Chaos Solitons Fractals"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.sigpro.2017.04.006","article-title":"Color Image Encryption Based on Chaotic Systems and Elliptic Curve ElGamal Scheme","volume":"141","author":"Wu","year":"2017","journal-title":"Signal Process."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"21579","DOI":"10.1007\/s11042-020-08880-z","article-title":"A Multidimensional Chaotic Image Encryption Algorithm Based on DNA Coding","volume":"79","author":"Liu","year":"2020","journal-title":"Multimed. Tools Appl."}],"container-title":["Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-3197\/11\/9\/178\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:47:04Z","timestamp":1760129224000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-3197\/11\/9\/178"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,5]]},"references-count":42,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["computation11090178"],"URL":"https:\/\/doi.org\/10.3390\/computation11090178","relation":{},"ISSN":["2079-3197"],"issn-type":[{"value":"2079-3197","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,5]]}}}