{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T03:52:54Z","timestamp":1774669974021,"version":"3.50.1"},"reference-count":49,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T00:00:00Z","timestamp":1543536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Self Funded","award":["Self funded"],"award-info":[{"award-number":["Self funded"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>In this research article, we propose a new structure namely inverse left almost semigroup (LA-semigroup) by adding confusion in our proposed image encryption scheme along with discrete and continuous chaotic systems in order to complement the diffusion characteristics. The performance analysis was conducted in terms of the correlation analysis, the pixels uniformity analysis, the sensitivity analysis, the information entropy analysis, and pixels difference based measurements. The results show that the proposed algorithm has better information security properties, which can provide strong security and a high performance.<\/jats:p>","DOI":"10.3390\/e20120913","type":"journal-article","created":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T12:13:17Z","timestamp":1543579997000},"page":"913","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":113,"title":["A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System"],"prefix":"10.3390","volume":"20","author":[{"given":"Irfan","family":"Younas","sequence":"first","affiliation":[{"name":"Department of Mathematics, Quaid-i-Azam University, Islamabad 44000, Pakistan"}]},{"given":"Majid","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics and Statistics, Institute of Space Technology Islamabad, Islamabad 44000, Pakistan"},{"name":"Cyber and Information Security Lab, Institute of Space Technology Islamabad, Islamabad 44000, Pakistan"}]}],"member":"1968","published-online":{"date-parts":[[2018,11,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","article-title":"On the cryptanalysis of Fridrich\u2019s chaotic image encryption scheme","volume":"132","author":"Xie","year":"2017","journal-title":"Signal Process."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MMUL.2017.3051512","article-title":"Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits","volume":"24","author":"Li","year":"2017","journal-title":"IEEE MultiMedia"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.chaos.2007.07.083","article-title":"OCML-based colour image encryption","volume":"40","author":"Rhouma","year":"2009","journal-title":"Chaos Soliton. Fractals"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","article-title":"Color image encryption using spatial bit level permutation and high-dimension chaotic system","volume":"284","author":"Liu","year":"2011","journal-title":"Opt. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3527","DOI":"10.1016\/j.ijleo.2012.10.068","article-title":"Color image encryption using Choquet fuzzy integral and hyper chaotic system","volume":"124","author":"Liu","year":"2013","journal-title":"Optik"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","article-title":"Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN","volume":"125","author":"Kadir","year":"2014","journal-title":"Optik"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3584","DOI":"10.1007\/s10773-018-3872-6","article-title":"Information Confidentiality Using Quantum Spinning, Rotation and Finite State Machine","volume":"57","author":"Waseem","year":"2018","journal-title":"Int. J. Theor. Phys."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"24027","DOI":"10.1007\/s11042-016-4090-y","article-title":"A new approach for image encryption and watermarking based on substitution box over the classes of chain rings","volume":"76","author":"Khan","year":"2017","journal-title":"Multimed. Tools Appl. November"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s11071-016-3046-0","article-title":"Efficient cryptosystem approaches: S-boxes and permutation substitution-based encryption","volume":"87","author":"Belazi","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1007\/s00521-016-2511-5","article-title":"A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation","volume":"29","author":"Khan","year":"2018","journal-title":"Neural Comput. Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1007\/s00521-015-1887-y","article-title":"Construction and applications of chaotic S-boxes in image encryption","volume":"27","author":"Khan","year":"2016","journal-title":"Neural Comput. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.1007\/s11760-013-0577-4","article-title":"An efficient construction of substitution box with fractional chaotic system","volume":"9","author":"Khan","year":"2015","journal-title":"Signal Image Video Process."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1007\/s00521-014-1800-0","article-title":"An efficient chaotic image encryption scheme","volume":"26","author":"Khan","year":"2015","journal-title":"Neural Comput. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.3233\/IFS-141434","article-title":"A novel construction of substitution box with Zaslavskii chaotic map and symmetric group","volume":"28","author":"Khan","year":"2015","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2123","DOI":"10.1016\/j.optcom.2009.02.044","article-title":"Multi chaotic systems based pixel shuffle for image encryption","volume":"282","author":"Huang","year":"2009","journal-title":"Opt. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"31177","DOI":"10.1007\/s11042-018-6214-z","article-title":"A chaotic permutation and diffusion based image encryption algorithm for secure communications","volume":"77","author":"Mondal","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","article-title":"Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence","volume":"56","author":"Enayatifar","year":"2014","journal-title":"Opt. Lasers Eng."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"6303","DOI":"10.1007\/s11042-015-2573-x","article-title":"Chaos-based image encryption scheme combining DNA coding and entropy","volume":"75","author":"Zhen","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/s11071-015-2173-3","article-title":"A novel image encryption scheme based on multiple chaotic S-boxes","volume":"82","author":"Khan","year":"2015","journal-title":"Nonlinear Dyn."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"21803","DOI":"10.1007\/s11042-017-5590-0","article-title":"A new color image encryption scheme based on logistic map over the finite field ZN","volume":"77","author":"Yang","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","article-title":"Image encryption using a synchronous permutation-diffusion technique","volume":"90","author":"Enayatifar","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1080\/19393555.2016.1212954","article-title":"A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map","volume":"25","author":"Hamza","year":"2016","journal-title":"Inf. Secur. J. Glob. Perspect."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2333","DOI":"10.1007\/s11071-016-2648-x","article-title":"A joint color image encryption and compression scheme based on hyperchaotic system","volume":"84","author":"Tong","year":"2016","journal-title":"Nonlinear Dyn."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.aeue.2013.10.002","article-title":"Self-adaptive permutation and combined global diffusion for chaotic color image encryption","volume":"68","author":"Zhang","year":"2014","journal-title":"AEU Int. J. Electron. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","article-title":"A novel colour image encryption algorithm based on chaos","volume":"92","author":"Wang","year":"2012","journal-title":"Signal Process."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1016\/j.chaos.2004.09.035","article-title":"An image encryption approach based on chaotic maps","volume":"24","author":"Linhua","year":"2005","journal-title":"Chaos Solitons Fractals"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1016\/j.chaos.2007.01.034","article-title":"Parallel image encryption algorithm based on discretized chaotic map","volume":"38","author":"Zhou","year":"2008","journal-title":"Chaos Solitons Fractals"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","article-title":"A new chaotic algorithm for image encryption","volume":"29","author":"Gao","year":"2006","journal-title":"Chaos Solitons Fractals"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1142\/S021812740401151X","article-title":"A novel fast image encryption scheme based on 3D chaotic bakermaps","volume":"14","author":"Mao","year":"2004","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Etemadi Borujeni, S., and Eshghi, M. (2009). Chaotic image encryption design using tompkins-paige algorithm. Math. Prob. Eng., 2009.","DOI":"10.1155\/2009\/762652"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","article-title":"A novel image encryption method based on total shuffling scheme","volume":"284","author":"Zhang","year":"2011","journal-title":"Opt. Commun."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1007\/s11071-017-3698-4","article-title":"Lossless chaotic color image cryptosystem based on DNA encryption and entropy","volume":"90","author":"Wu","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1016\/j.image.2013.09.006","article-title":"Color image encryption using one-time keys and coupled chaotic systems","volume":"29","author":"Dong","year":"2014","journal-title":"Signal Process. Image Commun."},{"key":"ref_34","first-page":"3335","article-title":"Triple chaotic image scrambling on RGB\u2014A random image encryption approach, Security Comm","volume":"8","author":"Praveenkumar","year":"2015","journal-title":"Networks"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Li, C., Lin, D., L\u00fc, J., and Hao, F. (2018). Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE MultiMedia, 25.","DOI":"10.1109\/MMUL.2018.2873472"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","article-title":"2D Logistic-Sine-coupling map for image encryption","volume":"149","author":"Hua","year":"2018","journal-title":"Signal Process."},{"key":"ref_37","first-page":"1","article-title":"On almost semigroups","volume":"2","author":"Kazim","year":"1972","journal-title":"Alig. Bull. Math."},{"key":"ref_38","first-page":"65","article-title":"On LA-semigroups","volume":"8","author":"Mushtaq","year":"1978","journal-title":"Alig. Bull. Math."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"477","DOI":"10.21136\/CMJ.1984.101972","article-title":"Modular groupoids","volume":"34","author":"Kepka","year":"1984","journal-title":"Czech. Math. J."},{"key":"ref_40","first-page":"101","article-title":"Groupoids satisfying a simple invertive law","volume":"61","author":"Holgate","year":"1992","journal-title":"Math. Stud."},{"key":"ref_41","unstructured":"Proti\u0107, P.V., and Stevanovi\u0107, N. (October, January 28). On Abel-Grassmann\u2019s groupoids (exposition). Proceedings of the Mathematical Conference Pristina, Pristina, Kosovo."},{"key":"ref_42","first-page":"57","article-title":"On locally associative LA-semigroups","volume":"1","author":"Mushtaq","year":"1979","journal-title":"J. Nat. Sci. Math."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/BF02573386","article-title":"Decomposition of a Locally Associative LA-semigroup","volume":"41","author":"Mushtaq","year":"1990","journal-title":"Semigr. Forum"},{"key":"ref_44","first-page":"247","article-title":"On representation theorem for inverse LA-semigroups","volume":"4","author":"Mushtaq","year":"1993","journal-title":"Pak. Acad. Sci."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1142\/S1005386709000030","article-title":"Semilattice decomposition of a locally associative AG**-Groupoid","volume":"16","author":"Mushtaq","year":"2009","journal-title":"Algebra Colloq."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s00233-013-9465-z","article-title":"Completely inverse AG**-groupoids","volume":"87","author":"Dudek","year":"2013","journal-title":"Semigr. Forum"},{"key":"ref_47","unstructured":"Ruskuc, N. (1995). Semigroup Presentations. [Ph.D. Thesis, University of St Andrews]."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s13370-011-0055-5","article-title":"Left almost semigroups characterized by their interval valued fuzzy ideals","volume":"24","author":"Yaqoob","year":"2013","journal-title":"Afr. Matematika"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/s00521-012-0809-5","article-title":"Applications of rough sets to -hyperideals in left almost -semihypergroups","volume":"21","author":"Yaqoob","year":"2012","journal-title":"Neural Comput. Appl."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/20\/12\/913\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:33:35Z","timestamp":1760196815000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/20\/12\/913"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,30]]},"references-count":49,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,12]]}},"alternative-id":["e20120913"],"URL":"https:\/\/doi.org\/10.3390\/e20120913","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,30]]}}}