{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T13:27:00Z","timestamp":1769347620400,"version":"3.49.0"},"reference-count":67,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T00:00:00Z","timestamp":1562112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.<\/jats:p>","DOI":"10.3390\/e21070656","type":"journal-article","created":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T11:14:49Z","timestamp":1562152489000},"page":"656","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":91,"title":["An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic\u2014Tent Map"],"prefix":"10.3390","volume":"21","author":[{"given":"Priya","family":"Ramasamy","sequence":"first","affiliation":[{"name":"Department of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, TamilNadu 641004, India"}]},{"given":"Vidhyapriya","family":"Ranganathan","sequence":"additional","affiliation":[{"name":"Department of Biomedical Engineering, PSG College of Technology, Coimbatore, TamilNadu 641004, India"}]},{"given":"Seifedine","family":"Kadry","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Beirut Arab University, Beirut 11-5020, Lebanon"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9990-1084","authenticated-orcid":false,"given":"Robertas","family":"Dama\u0161evi\u010dius","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Kaunas University of Technology, Kaunas 51386, Lithuania"}]},{"given":"Tomas","family":"Bla\u017eauskas","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Kaunas University of Technology, Kaunas 51386, Lithuania"}]}],"member":"1968","published-online":{"date-parts":[[2019,7,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","article-title":"Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research","volume":"335","author":"Kadhim","year":"2019","journal-title":"Neurocomputing"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.cosrev.2017.11.003","article-title":"Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review","volume":"27","author":"Qasim","year":"2018","journal-title":"Comput. Sci. Rev."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Arul Murugan, C., and KarthigaiKumar, P. (2018). Survey on image encryption schemes, bio cryptography and efficient encryption algorithms. Mob. Netw. Appl., 1\u20136.","DOI":"10.1007\/s11036-018-1058-3"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Kozio\u0142, F., Borowik, G., Wo\u017aniak, M., and Chaczko, Z. (2015, January 14). Toward dynamic signal coding for safe communication technology. Proceedings of the Asia-Pacific Conference on Computer-Aided System Engineering, APCASE, Washington, DC, USA.","DOI":"10.1109\/APCASE.2015.50"},{"key":"ref_5","first-page":"235","article-title":"A Fast Selective Image Encryption Using Discrete Wavelet Transform and Chaotic Systems Synchronization","volume":"45","author":"Khalifa","year":"2016","journal-title":"Inf. Technol. Control."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Askar, S.S., Karawia, A.A., Al-Khedhairi, A., and Al-Ammar, F.S. (2019). An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps. Entropy, 21.","DOI":"10.3390\/e21010044"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ballesteros, D.M., Pe\u00f1a, J., and Renza, D. (2018). A Novel Image Encryption Scheme Based on Collatz Conjecture. Entropy, 20.","DOI":"10.3390\/e20120901"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Fan, C., and Ding, Q. (2018). A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform. Entropy, 20.","DOI":"10.3390\/e20060445"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"6897","DOI":"10.1007\/s11042-017-4606-0","article-title":"Double image compression and encryption scheme using logistic mapped convolution and cellular automata","volume":"77","author":"Hanis","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Huang, L., Cai, S., Xiao, M., and Xiong, X. (2018). A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion. Entropy, 20.","DOI":"10.3390\/e20070535"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"15997","DOI":"10.1007\/s11042-018-6996-z","article-title":"Construction of a new 2D chebyshev-sine map and its application to color image encryption","volume":"78","author":"Liu","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Huang, X., and Ye, G. (2018). An Image Encryption Algorithm Based on Time-Delay and Random Insertion. Entropy, 20.","DOI":"10.3390\/e20120974"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Li, S., Ding, W., Yin, B., Zhang, T., and Ma, Y. (2018). A Novel Delay Linear Coupling Logistics Map Model for Color Image Encryption. Entropy, 20.","DOI":"10.3390\/e20060463"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Li, T., Shi, J., Li, X., Wu, J., and Pan, F. (2019). Image Encryption Based on Pixel-Level Diffusion with Dynamic Filtering and DNA-Level Permutation with 3D Latin Cubes. Entropy, 21.","DOI":"10.3390\/e21030319"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Liu, X., Xiao, D., and Liu, C. (2018). Double Quantum Image Encryption Based on Arnold Transform and Qubit Random Rotation. Entropy, 20.","DOI":"10.3390\/e20110867"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"31177","DOI":"10.1007\/s11042-018-6214-z","article-title":"A chaotic permutation and diffusion based image encryption algorithm for secure communications","volume":"77","author":"Mondal","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2879","DOI":"10.1016\/j.asoc.2012.04.002","article-title":"Stream cipher for binary image encryption using ant colony optimization based key generation","volume":"12","author":"Sreelaja","year":"2012","journal-title":"Appl. Soft Comput. J."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2117","DOI":"10.3390\/e17042117","article-title":"Image Encryption Using Chebyshev Map and Rotation Equation","volume":"17","author":"Stoyanov","year":"2015","journal-title":"Entropy"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Sun, Y., Chen, L., Xu, R., and Kong, R. (2014). An image encryption algorithm utilizing Julia sets and Hilbert curves. PLoS ONE, 9.","DOI":"10.1371\/journal.pone.0084655"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"181","DOI":"10.3390\/e17010181","article-title":"An Image Encryption Scheme Based on Hyper chaotic Rabinovich and Exponential Chaos Maps","volume":"17","author":"Tong","year":"2015","journal-title":"Entropy"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"23733","DOI":"10.1109\/ACCESS.2018.2805847","article-title":"An image encryption algorithm based on Josephus traversing and mixed chaotic map","volume":"6","author":"Wang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"14081","DOI":"10.1109\/ACCESS.2019.2893538","article-title":"2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption","volume":"7","author":"Zhu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2411","DOI":"10.1007\/s11071-011-0155-7","article-title":"Image encryption algorithm using chaotic Chebyshev generator","volume":"67","author":"Huang","year":"2012","journal-title":"Nonlinear Dyn."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.patrec.2009.11.008","article-title":"Image scrambling encryption algorithm of pixel bit based on chaos map","volume":"31","author":"Ye","year":"2010","journal-title":"Pattern Recognit. Lett."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","article-title":"A novel image encryption scheme based on improved hyper-chaotic sequences","volume":"285","author":"Zhu","year":"2012","journal-title":"Opt. Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","article-title":"A chaotic image encryption algorithm based on perceptron model","volume":"62","author":"Wang","year":"2010","journal-title":"Nonlinear Dyn."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","article-title":"An image encryption scheme based on rotationmatrix bit-level permutation and block diffusion","volume":"19","author":"Zhang","year":"2014","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.optlaseng.2012.11.001","article-title":"Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform","volume":"51","author":"Zhang","year":"2013","journal-title":"Opt. Lasers Eng."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","article-title":"An image encryption scheme based on chaotic tent map","volume":"87","author":"Li","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_30","first-page":"6429","article-title":"A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps","volume":"5","author":"Wu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MMUL.2017.3051512","article-title":"Cryptanalyzing an image-scrambling encryption algorithm of pixel bits","volume":"24","author":"Li","year":"2017","journal-title":"IEEE Multimed."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2083","DOI":"10.1007\/s11071-013-0924-6","article-title":"Breaking a novel image encryption scheme based on improved hyperchaotic sequences","volume":"73","author":"Li","year":"2013","journal-title":"Nonlinear Dyn."},{"key":"ref_33","first-page":"781","article-title":"An equivalent key attack on an image cryptosystem","volume":"38","author":"Guo","year":"2010","journal-title":"Acta Electron. Sin."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.asoc.2014.09.039","article-title":"A new image encryption algorithm based on non-adjacent coupled map lattices","volume":"26","author":"Zhang","year":"2015","journal-title":"Appl. Soft. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1995","DOI":"10.1007\/s11071-012-0402-6","article-title":"An intertwining chaotic maps based image encryption scheme","volume":"69","author":"Sam","year":"2012","journal-title":"Nonlinear Dyn."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.dsp.2013.10.020","article-title":"Cryptanalysis of an image encryption algorithm using Chebyshev generator","volume":"25","author":"Wang","year":"2014","journal-title":"Digit. Signal Process."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","article-title":"A novel colour image encryption algorithm based on chaos","volume":"92","author":"Wang","year":"2012","journal-title":"Signal Process."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.1007\/s11071-015-2057-6","article-title":"An efficient image encryption scheme using lookup table-based confusion and diffusion","volume":"81","author":"Chen","year":"2015","journal-title":"Nonlinear Dyn."},{"key":"ref_39","first-page":"621","article-title":"New binary image encryption algorithm based on combination of confusion and diffusion","volume":"6","author":"Liu","year":"2014","journal-title":"J. Chem. Pharm. Res."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1049\/iet-cvi.2015.0344","article-title":"Image encryption scheme based on block-based confusion and multiple levels of diffusion","volume":"10","author":"Murugan","year":"2016","journal-title":"IET Comput. Vis."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s11235-016-0212-0","article-title":"Fusion of confusion and diffusion: A novel image encryption approach","volume":"65","author":"Praveenkumar","year":"2017","journal-title":"Telecommun. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1567","DOI":"10.3233\/JIFS-169696","article-title":"Secure image encryption based on improved bat optimized piecewise linear chaotic map through integrated permutation-confusion and double diffusion","volume":"35","author":"Sinha","year":"2018","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"2343","DOI":"10.1016\/j.optcom.2012.01.029","article-title":"An image encryption scheme using lightweight bit-level confusion and cascade cross circular diffusion","volume":"285","author":"Zhang","year":"2012","journal-title":"Opt. Commun."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11071-016-3051-3","article-title":"A novel pseudorandom number generator based on pseudorandomly enhanced logistic map","volume":"87","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","article-title":"A new 1D chaotic system for image encryption","volume":"97","author":"Zhou","year":"2014","journal-title":"Signal Process."},{"key":"ref_46","unstructured":"Arroyo, D., Alvarez, G., and Fernandez, V. (2008). On the inadequacy of the logistic map for cryptographic applications. arXiv."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.micpro.2018.12.003","article-title":"A Novel Approach to improve multimedia security utilizing 3D Mixed Chaotic map","volume":"65","author":"Naseer","year":"2019","journal-title":"Microprocess. Microsyst."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.neucom.2017.04.016","article-title":"An efficient symmetric image encryption algorithm based on an intertwining logistic map","volume":"251","author":"Ye","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Kumar, M., Kumar, S., Budhiraja, R., Das, M.K., and Singh, S. (2016, January 13). Intertwining logistic map and Cellular Automata based color image encryption model. Proceedings of the International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, India.","DOI":"10.1109\/ICCTICT.2016.7514653"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Li, Y., Li, X., Jin, X., Zhao, G., Ge, S., Tian, Y., and Wang, Z. (2015). An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map. Applications and Techniques in Information Security, Springer.","DOI":"10.1007\/978-3-662-48683-2_1"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","article-title":"Image encryption using chaotic logistic map","volume":"24","author":"Pareek","year":"2006","journal-title":"Image Vis. Comput."},{"key":"ref_52","first-page":"323","article-title":"3D chaotic functions for image encryption","volume":"9","author":"Khade","year":"2012","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","article-title":"Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN","volume":"125","author":"Kadir","year":"2014","journal-title":"Opt.-Int. J. Light Electron Opt."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Xu, X., and Feng, J. (2010, January 16). Research and Implementation of Image Encryption Algorithm Based on Zigzag Transformation and Inner Product Polarization Vector. Proceedings of the 2010 IEEE International Conference on Granular Computing, San Jose, CA, USA.","DOI":"10.1109\/GrC.2010.11"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Ahmad, J., Larijani, H., Emmanuel, R., and Mannion, M. (2018, January 19). Secure Occupancy Monitoring System for IoT Using Lightweight Intertwining Logistic Map. Proceedings of the 2018 10th Computer Science and Electronic Engineering (CEEC), Essex, UK.","DOI":"10.1109\/CEEC.2018.8674208"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"13951","DOI":"10.1007\/s11042-015-2973-y","article-title":"A secure image encryption scheme based on chaotic maps and affine transformation","volume":"75","author":"Ahmad","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_57","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","volume":"1","author":"Wu","year":"2011","journal-title":"J. Sel. Areas Telecommun."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","article-title":"A novel bit-level image encryption algorithm based on chaotic maps","volume":"78","author":"Xu","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","article-title":"A novel chaotic image encryption scheme using DNA sequence operations","volume":"73","author":"Wang","year":"2015","journal-title":"Opt. Lasers Eng."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","article-title":"Color image encryption based on one-time keys and robust chaotic maps","volume":"59","author":"Liu","year":"2010","journal-title":"Comput. Math. Appl."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11071-012-0440-0","article-title":"Image encryption algorithm based on PGL (2, GF (28)) S-boxes and TD-ERCS chaotic sequence","volume":"70","author":"Hussain","year":"2012","journal-title":"Nonlinear Dyn."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","article-title":"A color image encryption with heterogeneous bit-permutation and correlated chaos","volume":"342","author":"Zhang","year":"2015","journal-title":"Opt. Commun."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1049\/iet-ipr.2016.0906","article-title":"Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map","volume":"12","author":"Askar","year":"2018","journal-title":"IET Image Process."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","article-title":"Multiple-image encryption with bit-plane decomposition and chaotic maps","volume":"80","author":"Tang","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1016\/j.compeleceng.2016.12.025","article-title":"Multiple-image encryption algorithm based on mixed image element and chaos","volume":"62","author":"Zhang","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Karawia, A. (2018). Encryption algorithm of multiple-image using mixed image elements and two dimensional chaotic economic map. Entropy, 20.","DOI":"10.3390\/e20100801"},{"key":"ref_67","unstructured":"Lawrence, E.B. (2019, July 02). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application, Available online: https:\/\/www.nist.gov\/publications\/statistical-test-suite-random-and-pseudorandom-number-generators-cryptographic."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/7\/656\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:02:17Z","timestamp":1760187737000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/7\/656"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,3]]},"references-count":67,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2019,7]]}},"alternative-id":["e21070656"],"URL":"https:\/\/doi.org\/10.3390\/e21070656","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,3]]}}}