{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T07:28:39Z","timestamp":1776583719916,"version":"3.51.2"},"reference-count":43,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T00:00:00Z","timestamp":1746835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computation"],"abstract":"<jats:p>The rapid development of communication in the last decade has heightened the necessity to create a secure platform for transferring data, including images, more than in previous years. One of the methods of secure image transmission is the encryption method. In this work, an encryption algorithm for multiple images is introduced. In the first step of the proposed algorithm, a key generation algorithm based on a chaotic system and wavelet transform is introduced, and in the next step, the encryption algorithm is developed by introducing rearrange and shift functions based on a chaotic system. One of the most important tools used in the proposed algorithm is the hybrid chaotic system, which is obtained by fractional derivatives and the Cat map. Different types of tests used to study the behavior of this system demonstrate the efficiency of the proposed hybrid system. In the last step of the proposed method, various statistical and security tests, including histogram analysis, correlation coefficient analysis, data loss and noise attack simulations, have been performed on the proposed algorithm. The results show that the proposed algorithm performs well in secure transmission.<\/jats:p>","DOI":"10.3390\/computation13050115","type":"journal-article","created":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T04:21:23Z","timestamp":1747023683000},"page":"115","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Three-Dimensional and Multiple Image Encryption Algorithm Using a Fractional-Order Chaotic System"],"prefix":"10.3390","volume":"13","author":[{"given":"Ghader","family":"Ghasemi","sequence":"first","affiliation":[{"name":"Department of Mathematics, University of Mohaghegh Ardabili, Ardabil 56199-11367, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1173-374X","authenticated-orcid":false,"given":"Reza","family":"Parvaz","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Mohaghegh Ardabili, Ardabil 56199-11367, Iran"}]},{"given":"Yavar","family":"Khedmati Yengejeh","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Mohaghegh Ardabili, Ardabil 56199-11367, Iran"}]}],"member":"1968","published-online":{"date-parts":[[2025,5,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"112586","DOI":"10.1016\/j.chaos.2022.112586","article-title":"Cross-plane multi-image encryption using chaos and blurred pixels","volume":"164","author":"Wang","year":"2022","journal-title":"Chaos Solitons Fractals"},{"key":"ref_2","first-page":"103408","article-title":"An exquisite multiple image encryption harnessing multi-scroll Lu\u2013Chen and Chua chaotic systems employing domino strategy","volume":"72","author":"Sangavi","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"127494","DOI":"10.1016\/j.optcom.2021.127494","article-title":"Research on multiple-image encryption mechanism based on Radon transform and ghost imaging","volume":"504","author":"Zhang","year":"2022","journal-title":"Opt. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"109107","DOI":"10.1016\/j.sigpro.2023.109107","article-title":"Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation","volume":"211","author":"Zhou","year":"2023","journal-title":"Signal Process."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2311","DOI":"10.1007\/s00500-025-10449-7","article-title":"Secure transmission of medical image using a wavelet interval type-2 TSK fuzzy brain-imitated neural network","volume":"29","author":"Pham","year":"2025","journal-title":"Soft Comput."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Chang, H., Wang, E., and Liu, J. (2023). Research on image encryption based on fractional seed chaos generator and fractal theory. Fractal Fract., 7.","DOI":"10.3390\/fractalfract7030221"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Setiadi, D.R., and Rijati, N. (2023). An image encryption scheme combining 2D cascaded logistic map and permutation-substitution operations. Computation, 11.","DOI":"10.3390\/computation11090178"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"111693","DOI":"10.1016\/j.chaos.2021.111693","article-title":"A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its\u2019 applications in image encryption","volume":"154","author":"Liu","year":"2022","journal-title":"Chaos Solitons Fractals"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"113450","DOI":"10.1016\/j.chaos.2023.113450","article-title":"A highly secure image encryption algorithm based on conservative hyperchaotic system and dynamic biogenetic gene algorithms","volume":"171","author":"Liu","year":"2023","journal-title":"Chaos Solitons Fractals"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"21779","DOI":"10.1007\/s11042-022-12472-4","article-title":"A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation","volume":"81","author":"Liu","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Dutta, H., Akdemir, A.O., and Atangana, A. (2020). Fractional Order Analysis: Theory, Methods and Applications, John Wiley & Sons.","DOI":"10.1002\/9781119654223"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"111402","DOI":"10.1016\/j.chaos.2021.111402","article-title":"Image encryption algorithm by fractional based chaotic system and framelet transform","volume":"152","author":"Zarebnia","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Gomez-Aguilar, J.F., and Atangana, A. (2022). Applications of Fractional Calculus to Modeling in Dynamics AND Chaos, CRC Press.","DOI":"10.1201\/9781003006244"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Anastassiou, G.A. (2022). Abstract Fractional Monotone Approximation, Theory and Applications, Springer Nature.","DOI":"10.1007\/978-3-030-95943-2"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"G\u00f3mez, J.F., Torres, L., and Escobar, R.F. (2019). Fractional Derivatives with Mittag-Leffler Kernel, Springer International Publishing.","DOI":"10.1007\/978-3-030-11662-0"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2250214","DOI":"10.1142\/S0218127422502145","article-title":"A new 4D chaos system with an encryption algorithm for color and grayscale images","volume":"32","author":"Parvaz","year":"2022","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1186\/1687-1847-2013-320","article-title":"Fractional-order Chua\u2019s system: Discretization, bifurcation and chaos","volume":"2013","author":"Agarwal","year":"2013","journal-title":"Adv. Differ. Equations"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"016220","DOI":"10.1103\/PhysRevE.72.016220","article-title":"Properties making a chaotic system a good pseudo random number generator","volume":"72","author":"Falcioni","year":"2005","journal-title":"Phys. Rev. E\u2014Stat. Nonlinear Soft Matter Phys."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2622","DOI":"10.1109\/TCYB.2015.2483621","article-title":"n-dimensional discrete cat map generation using Laplace Expansions","volume":"46","author":"Wu","year":"2015","journal-title":"IEEE Trans. Cybern."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1007\/s11071-012-0539-3","article-title":"Period of the discrete Arnold cat map and general cat map","volume":"70","author":"Bao","year":"2012","journal-title":"Nonlinear Dyn."},{"key":"ref_21","first-page":"1","article-title":"Quantifying chaos in dynamical systems with Lyapunov exponents","volume":"4","year":"1998","journal-title":"Furman Univ. Electron. J. Undergrad. Math."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"90","DOI":"10.51537\/chaos.1214284","article-title":"Bifurcation Analysis and 0\u20131 Chaos Test of a Discrete T System","volume":"5","author":"Rana","year":"2023","journal-title":"Chaos Theory Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1007\/s40430-015-0453-y","article-title":"An overview of 0\u20131 test for chaos","volume":"38","author":"Bernardini","year":"2016","journal-title":"J. Braz. Soc. Mech. Sci. Eng."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"Alvarez","year":"2006","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"115662","DOI":"10.1016\/j.image.2019.115662","article-title":"Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain","volume":"80","author":"Shao","year":"2020","journal-title":"Signal Process. Image Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.optlaseng.2016.12.005","article-title":"Multiple-image encryption algorithm based on mixed image element and permutation","volume":"92","author":"Zhang","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","article-title":"Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram","volume":"77","author":"Yu","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_28","first-page":"1395","article-title":"Multiple image encryption using chaotic map and DNA computing","volume":"4","author":"Patel","year":"2018","journal-title":"Int. J. Sci. Res. Sci. Eng. Technol."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1016\/j.compeleceng.2016.12.025","article-title":"Multiple-image encryption algorithm based on mixed image element and chaos","volume":"62","author":"Zhang","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","article-title":"Multiple-image encryption with bit-plane decomposition and chaotic maps","volume":"80","author":"Tang","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"ref_31","first-page":"102470","article-title":"Multiple grayscale image encryption using cross-coupled chaotic maps","volume":"52","author":"Patro","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"123536","DOI":"10.1109\/ACCESS.2020.3004536","article-title":"A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations","volume":"8","author":"Hanif","year":"2020","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"7841","DOI":"10.1007\/s11042-018-6496-1","article-title":"Multiple-image encryption algorithm based on DNA encoding and chaotic system","volume":"78","author":"Zhang","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"107073","DOI":"10.1016\/j.optlastec.2021.107073","article-title":"Multiple-image encryption algorithm based on the 3D scrambling model and dynamic DNA coding","volume":"141","author":"Zhang","year":"2021","journal-title":"Opt. Laser Technol."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.ins.2020.10.031","article-title":"Multiple images encryption based on 3D scrambling and hyper-chaotic system","volume":"550","author":"Sahasrabuddhe","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.ijleo.2019.03.065","article-title":"A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map","volume":"184","author":"Hasheminejad","year":"2019","journal-title":"Optik"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"107652","DOI":"10.1016\/j.sigpro.2020.107652","article-title":"Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion","volume":"175","author":"Ye","year":"2020","journal-title":"Signal Process."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"16337","DOI":"10.1007\/s11042-023-16162-7","article-title":"Multiple-image encryption algorithm based on 3D-LWT and dynamic stereo S-box","volume":"83","author":"Zhang","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"085008","DOI":"10.1063\/1.4994860","article-title":"Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation","volume":"7","author":"Tian","year":"2017","journal-title":"AIP Adv."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"043047","DOI":"10.1117\/1.JEI.31.4.043047","article-title":"Multiple-image encryption algorithm based on the dice-rotation model and improved chaos","volume":"31","author":"Zhang","year":"2022","journal-title":"J. Electron. Imaging"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1016\/j.matcom.2021.02.009","article-title":"A three-dimensional bit-level image encryption algorithm with Rubik\u2019s cube method","volume":"185","author":"Zhu","year":"2021","journal-title":"Math. Comput. Simul."},{"key":"ref_42","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","volume":"1","author":"Wu","year":"2011","journal-title":"Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT)"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.matcom.2020.06.007","article-title":"Advance image encryption technique utilizing compression, dynamical system and S-boxes","volume":"178","author":"Naseer","year":"2020","journal-title":"Math. Comput. Simul."}],"container-title":["Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-3197\/13\/5\/115\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:30:41Z","timestamp":1760031041000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-3197\/13\/5\/115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,10]]},"references-count":43,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["computation13050115"],"URL":"https:\/\/doi.org\/10.3390\/computation13050115","relation":{},"ISSN":["2079-3197"],"issn-type":[{"value":"2079-3197","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,10]]}}}