{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T17:30:58Z","timestamp":1767720658723,"version":"build-2065373602"},"reference-count":103,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272033, 61572222"],"award-info":[{"award-number":["61272033, 61572222"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Color image encryption has enticed a lot of attention in recent years. Many authors proposed a chaotic system-based encryption algorithms for that purpose. However, due to the shortcomings of the low dimensional chaotic systems, similar rule structure for RGB channels, and the small keyspace, many of those were cryptanalyzed by chosen-plaintext or other well-known attacks. A Security vulnerability exists because of the same method being applied over the RGB channels. This paper aims to introduce a new three-channel three rules (3C3R) image encryption algorithm along with two novel mathematical models for DNA rule generator and bit inversion. A different rule structure was applied in the different RGB-channels. In the R-channel, a novel Block-based Bit Inversion (BBI) is introduced, in the G-channel Von-Neumann (VN) and Rotated Von-Neumann (RVN)- based 2D-cellular structure is applied. In the B-channel, a novel bidirectional State Machine-based DNA rule generator (SM-DNA) is introduced. Simulations and results show that the proposed 3C3R encryption algorithm is robust against all well-known attacks particularly for the known-plaintext attacks, statistical attacks, brute-force attacks, differential attacks, and occlusion attacks, etc. Also, unlike earlier encryption algorithms, the 3C3R has no security vulnerability.<\/jats:p>","DOI":"10.3390\/e21111075","type":"journal-article","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T04:13:08Z","timestamp":1572840788000},"page":"1075","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7027-024X","authenticated-orcid":false,"given":"Sajid","family":"Khan","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China"}]},{"given":"Lansheng","family":"Han","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science Department, Huazhong University of Science and Technology, Wuhan 430074, China"}]},{"given":"Ghulam","family":"Mudassir","sequence":"additional","affiliation":[{"name":"School of Information and Communication Technologies, University of L\u2019Aquila, 67100 L\u2019Aquila, Italy"}]},{"given":"Bachira","family":"Guehguih","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0960-4639","authenticated-orcid":false,"given":"Hidayat","family":"Ullah","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,11,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","article-title":"A fast image encryption scheme based on chaotic standard map","volume":"372","author":"Wong","year":"2008","journal-title":"Phys. Lett. A"},{"key":"ref_2","first-page":"233","article-title":"DNA-based cryptography","volume":"Volume 54","author":"Gehani","year":"2003","journal-title":"Aspects of Molecular Computing"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Lian, S.G. (2008). Multimedia Content Encryption: Techniques and Applications, Auerbach Publication Taylor & Francis Group.","DOI":"10.1201\/9781420065282"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","article-title":"A chaos-based image encryption algorithm with variable control parameters","volume":"41","author":"Wang","year":"2009","journal-title":"Chaos Solitons Fract."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","article-title":"Chaos-based image encryption algorithm","volume":"346","author":"Guan","year":"2005","journal-title":"Phys. Lett. A"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.compeleceng.2015.11.008","article-title":"A chaos-based image encryption algorithm with simple logical functions","volume":"54","author":"Yavuz","year":"2016","journal-title":"Comput. Electr. Eng."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1016\/j.ijleo.2017.08.050","article-title":"Cryptanalysis of a DNA and chaos based image encryption algorithm","volume":"145","author":"Dou","year":"2017","journal-title":"Optik"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlastec.2017.09.008","article-title":"Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression","volume":"99","author":"Chen","year":"2018","journal-title":"Opt. Laser Technol."},{"key":"ref_9","first-page":"45","article-title":"Cryptanalysis and improvement of two hyper chaos based image encryption schemes","volume":"34","author":"Jeng","year":"2015","journal-title":"Signal Process."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.optlastec.2018.01.018","article-title":"Binary image encryption in a joint transform correlator scheme by aid of run length encoding and QR code","volume":"103","author":"Qin","year":"2018","journal-title":"Opt. Laser Technol."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.optlastec.2017.03.041","article-title":"Optical image encryption using Kronecker product and hybrid phase masks","volume":"95","author":"Kumar","year":"2017","journal-title":"Opt. Laser Technol."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.optlaseng.2018.03.011","article-title":"Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform","volume":"107","author":"Chen","year":"2018","journal-title":"Opt. Lasers Eng."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.optlaseng.2017.10.023","article-title":"Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme","volume":"102","author":"Li","year":"2018","journal-title":"Opt. Lasers Eng."},{"key":"ref_14","first-page":"6","article-title":"An image encryption algorithm based on the memristive hyper-chaotic system, cellular automata and DNA sequence operations","volume":"52","author":"Chai","year":"2017","journal-title":"Signal Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","article-title":"Color image DNA encryption using NCA map based CML and one time keys","volume":"148","author":"Wu","year":"2018","journal-title":"Signal Process."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.optlaseng.2016.01.006","article-title":"A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map","volume":"81","author":"Talarposhti","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1296","DOI":"10.1016\/j.neucom.2008.11.005","article-title":"A block cipher based on chaotic neural networks","volume":"72","author":"Lian","year":"2009","journal-title":"Neurocomputing"},{"key":"ref_18","unstructured":"Zhang, X., and Chen, W. (2008, January 7\u20139). A new chaotic algorithm for image encryption. Proceedings of the 2008 International Conference on Audio, Language and Image Processing, Shanghai, China."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1166\/jctn.2010.1372","article-title":"An image fusion encryption algorithm based on DNA sequence and multi-chaotic maps","volume":"7","author":"Xue","year":"2010","journal-title":"J. Comput. Theor. Nanosci."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","article-title":"A new 1D chaotic system for image encryption","volume":"97","author":"Zhou","year":"2014","journal-title":"Signal Process."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Hua, Z., Zhou, Y., and Pun, C.M. (2014, January 5\u20138). Image encryption using 2D Logistic-Sine chaotic map. Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), San Diego, CA, USA.","DOI":"10.1109\/SMC.2014.6974425"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Zamani, S., Javanmard, M., and Jafarzadeh, N. (2014, January 20\u201322). A novel image encryption scheme based on hyper chaotic systems and fuzzy cellular automata. Proceedings of the 2014 22nd Iranian Conference on Electrical Engineering (ICEE), Tehran, Iran.","DOI":"10.1109\/IranianCEE.2014.6999706"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","article-title":"A fast color image encryption algorithm based on hyper-chaotic systems","volume":"78","author":"Norouzi","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"81333","DOI":"10.1109\/ACCESS.2019.2920383","article-title":"A New Hybrid Image Encryption Algorithm Based on 2D-CA, FSM-DNA Rule Generator, and FSBI","volume":"7","author":"Khan","year":"2019","journal-title":"IEEE Access"},{"key":"ref_25","unstructured":"Huang, Q., and Li, G. (2016, January 25\u201326). Research on the Application of Image Encryption Technology Based on 7 Dimensional CNN Hyper Chaos. Proceedings of the 2016 International Conference on Smart City and Systems Engineering (ICSCSE), Hunan, China."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","article-title":"Image encryption using DNA complementary rule and chaotic maps","volume":"12","author":"Liu","year":"2012","journal-title":"Appl. Soft Comput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1750171","DOI":"10.1142\/S0218127417501711","article-title":"Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations","volume":"27","author":"Liu","year":"2017","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","article-title":"Color image encryption based on hybrid hyper chaotic system and cellular automata","volume":"90","author":"Niyat","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1016\/j.ijleo.2018.01.064","article-title":"A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2","volume":"159","author":"Rehman","year":"2018","journal-title":"Optik"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.cnsns.2012.08.010","article-title":"A symmetric color image encryption algorithm using the intrinsic features of bit distributions","volume":"18","author":"Zhang","year":"2013","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1016\/j.ijleo.2017.10.072","article-title":"Cryptanalysis and security improvement for a symmetric color image encryption algorithm","volume":"155","author":"Hoang","year":"2018","journal-title":"Optik"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.neucom.2014.11.095","article-title":"A novel image encryption algorithm based on chaos and Line map","volume":"169","author":"Zhou","year":"2015","journal-title":"Neurocomputing"},{"key":"ref_33","first-page":"1","article-title":"Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map","volume":"84","author":"Chen","year":"2016","journal-title":"Nonlinear Dyn."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","article-title":"Image encryption based on three-dimensional bit matrix permutation","volume":"118","author":"Zhang","year":"2016","journal-title":"Signal Process."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","article-title":"Cryptanalysis and Enhancements of Image Encryption Based on Three-dimensional Bit Matrix Permutation","volume":"142","author":"Wu","year":"2018","journal-title":"Signal Process."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2411","DOI":"10.1007\/s11071-011-0155-7","article-title":"Image encryption algorithm using chaotic Chebyshev generator","volume":"67","author":"Huang","year":"2012","journal-title":"Nonlinear Dyn."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.dsp.2013.10.020","article-title":"Cryptanalysis of an image encryption algorithm using Chebyshev generator","volume":"25","author":"Wang","year":"2014","journal-title":"Digit. Signal Process."},{"key":"ref_38","first-page":"1151","article-title":"An efficient image encryption scheme using lookup table-based confusion and diffusion","volume":"81","author":"Chen","year":"2015","journal-title":"Signal Process."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","article-title":"A new image encryption algorithm based on hyper chaos","volume":"372","author":"Gao","year":"2008","journal-title":"Phys. Lett. A"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1007\/s11071-016-3311-2","article-title":"Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion","volume":"88","author":"Hu","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"5973","DOI":"10.1016\/j.physleta.2008.07.057","article-title":"Cryptanalysis of a new image encryption algorithm based on hyperchaos","volume":"372","author":"Rhouma","year":"2008","journal-title":"Phys. Lett. A"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"7739","DOI":"10.1007\/s11042-015-2691-5","article-title":"Image encryption algorithm based on hyper-chaotic system and dynamic S-box","volume":"75","author":"Liu","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1016\/j.imavis.2007.09.005","article-title":"Image encryption with compound chaotic sequence cipher shifting dynamically","volume":"26","author":"Tong","year":"2008","journal-title":"Image Vis. Comput."},{"key":"ref_44","first-page":"1","article-title":"Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box","volume":"76","author":"Zhang","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1016\/j.imavis.2008.09.004","article-title":"Cryptanalysis of an image encryption scheme based on a compound chaotic sequence","volume":"27","author":"CLi","year":"2009","journal-title":"Image Vis. Comput."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","article-title":"A novel image encryption scheme based on improved hyper chaotic sequences","volume":"285","author":"Zhu","year":"2012","journal-title":"Opt. Commun."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","article-title":"A new color image encryption using combination of the 1d chaotic map","volume":"138","author":"Pak","year":"2017","journal-title":"Signal Process."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"2083","DOI":"10.1007\/s11071-013-0924-6","article-title":"Breaking a novel image encryption scheme based on improved hyper chaotic sequences","volume":"73","author":"Li","year":"2013","journal-title":"Nonlinear Dyn."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.sigpro.2017.11.005","article-title":"Cryptanalysis and Enhancements of Image Encryption Using Combination of the 1D Chaotic Map","volume":"144","author":"Wang","year":"2018","journal-title":"Signal Process."},{"key":"ref_50","unstructured":"Gonzalez, R.C., and Woods, R.E. (2008). Digital Image Processing, Pearson Prentice Hall. [3rd ed.]."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"78367","DOI":"10.1109\/ACCESS.2019.2922376","article-title":"A Color Image Encryption Using Dynamic DNA and 4-D Memristive Hyper-Chaos","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","article-title":"Image encryption using binary bit-plane","volume":"100","author":"Zhou","year":"2014","journal-title":"Signal Process."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","article-title":"Image encryption using a synchronous permutation-diffusion technique","volume":"90","author":"Enayatifar","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Kumar, M., Kumar, S., Budhiraja, R., Das, M.K., and Singh, S. (2016, January 11\u201313). Intertwining logistic map and Cellular Automata based color image encryption model. Proceedings of the 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, India.","DOI":"10.1109\/ICCTICT.2016.7514653"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","article-title":"A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2","volume":"83","author":"Guesmi","year":"2016","journal-title":"Nonlinear Dyn."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"2277","DOI":"10.1007\/s12652-018-0825-0","article-title":"A synchronous intertwining logistic map-DNA approach for color image encryption","volume":"10","author":"Suri","year":"2019","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/j.asoc.2015.09.055","article-title":"A chaos based image encryption and lossless compression algorithm using hash table and chinese remainder theorem","volume":"40","author":"Brindha","year":"2016","journal-title":"Appl. Soft Comput."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.sigpro.2016.12.008","article-title":"Chaotic image crypto-system using DNA deletion and DNA insertion","volume":"134","author":"Hu","year":"2017","journal-title":"Signal Process."},{"key":"ref_59","first-page":"45","article-title":"An efficient symmetric image encryption algorithm based on an intertwining logistic map","volume":"251","author":"Ye","year":"2017","journal-title":"Neuro-Computing"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.sigpro.2015.07.008","article-title":"Cracking a hierarchical chaotic image encryption algorithm based on permutation","volume":"118","author":"Li","year":"2015","journal-title":"Signal Process."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.matcom.2004.09.001","article-title":"The strict avalanche criterion randomness test","volume":"68","author":"Castro","year":"2005","journal-title":"Math. Comput. Simul."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","article-title":"A color image crypto-system based on dynamic DNA encryption and chaos","volume":"155","author":"Chai","year":"2019","journal-title":"Signal Process."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","article-title":"An image encryption scheme based on rotation matrix bit-level permutation and block diffusion","volume":"19","author":"Zhang","year":"2014","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Huang, L., Cai, S., Xiao, M., and Xiong, X. (2018). A Simple Chaotic Map-Based Image Encryption System Using Both plaintext Related Permutation and Diffusion. Entropy, 20.","DOI":"10.3390\/e20070535"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","article-title":"A color image encryption with heterogeneous bit-permutation and correlated chaos","volume":"342","author":"Wang","year":"2015","journal-title":"Opt. Commun."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","article-title":"A chaos-based symmetric image encryption scheme using a bit-level permutation","volume":"181","author":"Zhu","year":"2011","journal-title":"Inf Sci."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"3329","DOI":"10.1016\/j.ijleo.2012.11.002","article-title":"An image encryption scheme based on new spatio-temporal chaos","volume":"124","author":"Song","year":"2013","journal-title":"Optik"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","article-title":"A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice","volume":"273","author":"Zhang","year":"2014","journal-title":"Inf. Sci."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","article-title":"A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system","volume":"85","author":"Wei","year":"2012","journal-title":"J. Syst. Softw."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","article-title":"A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system","volume":"124","author":"Zhang","year":"2013","journal-title":"Optik"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"6276","DOI":"10.1016\/j.ijleo.2013.05.009","article-title":"A novel couple images encryption algorithm based on DNA sub-sequence operation and chaotic system","volume":"124","author":"Zhang","year":"2013","journal-title":"Optik"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","article-title":"Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence","volume":"56","author":"Enayatifar","year":"2014","journal-title":"Opt. Lasers Eng."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"6303","DOI":"10.1007\/s11042-015-2573-x","article-title":"Chaos-based image encryption scheme combining DNA coding and entropy","volume":"75","author":"Zhen","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","article-title":"A novel bit-level image encryption algorithm based on chaotic maps","volume":"78","author":"Xu","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","article-title":"A novel chaotic image encryption scheme using DNA sequence operations","volume":"73","author":"Wang","year":"2015","journal-title":"Opt. Lasers Eng."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Ramasamy, P., Ranganathan, V., Kadry, S., Damasevicius, R., and Blazauskas, T. (2019). An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic-Tent Map. Entropy, 21.","DOI":"10.3390\/e21070656"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"12349","DOI":"10.1007\/s11042-017-4885-5","article-title":"A robust and lossless DNA encryption scheme for color images","volume":"77","author":"Wu","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based crypto-systems","volume":"16","author":"Alvarez","year":"2006","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"2333","DOI":"10.1007\/s11071-016-2648-x","article-title":"A joint color image encryption and compression scheme based on hyper-chaotic system","volume":"84","author":"Tong","year":"2016","journal-title":"Nonlinear Dyn."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.sigpro.2017.06.010","article-title":"An image encryption scheme based on elliptic curve pseudo random and advanced encryption system","volume":"141","author":"Toughi","year":"2017","journal-title":"Signal Process."},{"key":"ref_81","first-page":"6429","article-title":"A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps","volume":"5","author":"Wu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/0167-4048(86)90116-1","article-title":"A chosen-plaintext attack on the microsoft basic protection","volume":"5","year":"1986","journal-title":"Comput. Secur."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","article-title":"Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption","volume":"142","author":"Chen","year":"2018","journal-title":"Signal Process."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","article-title":"A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps","volume":"37","author":"Wu","year":"2015","journal-title":"Appl. Soft Comput. J."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"2363","DOI":"10.1364\/OE.20.002363","article-title":"A chaos-based digital image encryption scheme with an improved diffusion strategy","volume":"20","author":"Fu","year":"2012","journal-title":"Opt. Express"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s11334-019-00323-9","article-title":"A novel multi-dimensional encryption technique to secure the grayscale images and color images in public cloud storage","volume":"15","author":"Boopathy","year":"2019","journal-title":"Innov. Syst. Softw. Eng."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"3527","DOI":"10.1016\/j.ijleo.2012.10.068","article-title":"Color image encryption using Choquet fuzzy integral and hyper chaotic system","volume":"124","author":"Liu","year":"2013","journal-title":"Opt. Int. J. Light Electron. Opt."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","article-title":"Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN","volume":"125","author":"Kadir","year":"2014","journal-title":"Optik"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.chaos.2007.07.083","article-title":"OCML-based colour image encryption","volume":"40","author":"Rhouma","year":"2009","journal-title":"Chaos Solitons Fract."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"13951","DOI":"10.1007\/s11042-015-2973-y","article-title":"A secure image encryption scheme based on chaotic maps and affine transformation","volume":"75","author":"Ahmad","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"6937","DOI":"10.1109\/ACCESS.2018.2889896","article-title":"Quantum Image Encryption Using Intra and Inter Bit Permutation Based on Logistic Map","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1007\/s11042-011-0775-4","article-title":"Combinational domain encryption for still visual data","volume":"59","author":"Taneja","year":"2012","journal-title":"Multimed. Tool Appl."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","article-title":"A novel colour image encryption algorithm based on chaos","volume":"92","author":"Wang","year":"2012","journal-title":"Signal Process."},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","article-title":"Local Shannon entropy measure with statistical tests for image randomness","volume":"222","author":"Wu","year":"2013","journal-title":"Inf. Sci."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"3877","DOI":"10.3390\/e17063877","article-title":"A Colour Image Encryption Scheme Using Permutation-Substitution Based on Chaos","volume":"17","author":"Wang","year":"2015","journal-title":"Entropy"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","article-title":"Color image encryption using spatial bit level permutation and high-dimension chaotic system","volume":"284","author":"Liu","year":"2011","journal-title":"Opt. Commun."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"5703","DOI":"10.1016\/j.ijleo.2015.09.091","article-title":"An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos","volume":"126","author":"Kalpana","year":"2015","journal-title":"Opt. Int. J. Light Electron. Opt."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"26191","DOI":"10.1007\/s11042-018-5844-5","article-title":"An efficient and self-adapting colour image encryption algorithm based on chaos and interactions among multiple layers","volume":"77","author":"Luo","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","article-title":"Image encryption using chaotic logistic map","volume":"24","author":"Pareek","year":"2006","journal-title":"Image Vis. Comput."},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Moafimadani, S.S., Chen, Y., and Tang, C. (2019). A New Algorithm for Medical Color Images Encryption Using Chaotic Systems. Entropy, 21.","DOI":"10.3390\/e21060577"},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1016\/j.optlaseng.2019.05.013","article-title":"A novel chaotic system and its application in a color image cryptosystem","volume":"121","author":"Wang","year":"2019","journal-title":"Opt. Lasers Eng."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Zhang, W., Zhu, Z., and Yu, H. (2019). A Symmetric Image Encryption Algorithm Based on a Coupled Logistic-Bernoulli Map and Cellular Automata Diffusion Strategy. Entropy, 21.","DOI":"10.3390\/e21050504"},{"key":"ref_103","first-page":"23","article-title":"An efficient colour image encryption scheme based on 1-D chaotic maps","volume":"46","author":"Patro","year":"2019","journal-title":"J. Inf. Secur. Appl."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/11\/1075\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:31:25Z","timestamp":1760189485000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/11\/1075"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,2]]},"references-count":103,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2019,11]]}},"alternative-id":["e21111075"],"URL":"https:\/\/doi.org\/10.3390\/e21111075","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2019,11,2]]}}}