{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T10:52:25Z","timestamp":1768733545307,"version":"3.49.0"},"reference-count":45,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T00:00:00Z","timestamp":1630540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>To address the problems of the high complexity and low security of the existing image encryption algorithms, this paper proposes a dynamic key chaotic image encryption algorithm with low complexity and high security associated with plaintext. Firstly, the RGB components of the color image are read, and the RGB components are normalized to obtain the key that is closely related to the plaintext, and then the Arnold transform is used to stretch and fold the RGB components of the color image to change the position of the pixel points in space, so as to destroy the correlation between the adjacent pixel points of the image. Next, the generated sequences are independently encrypted with the Arnold-transformed RGB matrix. Finally, the three encrypted images are combined to obtain the final encrypted image. Since the key acquisition of this encryption algorithm is related to the plaintext, it is possible to achieve one key per image, so the key acquisition is dynamic. This encryption algorithm introduces chaotic mapping, so that the key space size is 10180. The key acquisition is closely related to the plaintext, which makes the ciphertext more random and resistant to differential attacks, and ensures that the ciphertext is more secure after encryption. The experiments show that the algorithm can encrypt the image effectively and can resist attack on the encrypted image.<\/jats:p>","DOI":"10.3390\/e23091159","type":"journal-article","created":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T21:13:36Z","timestamp":1630617216000},"page":"1159","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7223-0217","authenticated-orcid":false,"given":"Zeming","family":"Wu","sequence":"first","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ping","family":"Pan","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3479-2726","authenticated-orcid":false,"given":"Chunyang","family":"Sun","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bing","family":"Zhao","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2021,9,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","article-title":"On the derivation of a \u201cChaotic\u201d encryption algorithm","volume":"8","author":"Matthews","year":"1989","journal-title":"Cryptologia"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","article-title":"A new chaos-based fast image encryption algorithm","volume":"11","author":"Wang","year":"2011","journal-title":"Appl. Soft Comput."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"105208","DOI":"10.1088\/1402-4896\/ac0d2e","article-title":"A chaotic image encryption algorithm combining 2D chaotic system and random XOR diffusion","volume":"96","author":"Sun","year":"2021","journal-title":"Phys. Scr."},{"key":"ref_4","first-page":"1129","article-title":"Image encryption algorithm based on chaotic mapping and dynamic S-box","volume":"14","author":"Zhang","year":"2019","journal-title":"J. Chin. Acad. Electron. Sci."},{"key":"ref_5","first-page":"812","article-title":"Triple dislocation algorithm for RGB color images based on chaotic system","volume":"30","author":"Chen","year":"2018","journal-title":"J. Chongqing Univ. Posts Telecommun. Nat. Sci. Ed."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2051653","DOI":"10.1155\/2020\/2051653","article-title":"On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm","volume":"2020","author":"Hu","year":"2020","journal-title":"Complexity"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Xu, X., and Chen, S. (2021). Single Neuronal Dynamical System in Self-Feedbacked Hopfield Networks and Its Application in Image Encryption. Entropy, 23.","DOI":"10.3390\/e23040456"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.neunet.2020.02.008","article-title":"Chaos in fractional-order discrete neural networks with application to image encryption","volume":"125","author":"Chen","year":"2020","journal-title":"Neural Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"7841","DOI":"10.1007\/s11042-018-6496-1","article-title":"Multiple-image encryption algorithm based on DNA encoding and chaotic system","volume":"78","author":"Zhang","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"107073","DOI":"10.1016\/j.optlastec.2021.107073","article-title":"Multiple-image encryption algorithm based on the 3D scrambling model and dynamic DNA coding","volume":"141","author":"Zhang","year":"2021","journal-title":"Opt. Laser Technol."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"21579","DOI":"10.1007\/s11042-020-08880-z","article-title":"A Multidimensional Chaotic Image Encryption Algorithm based on DNA Coding","volume":"79","author":"Liu","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Zhu, J., Ermann, N., Chen, K., and Keyser, U.F. (2021). Image Encoding Using Multi-level DNA Barcodes with Nanopore Readout. Small, 2100711.","DOI":"10.1002\/smll.202100711"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"131672","DOI":"10.1109\/ACCESS.2019.2940996","article-title":"Public Key Image Encryption Based on Compressed Sensing","volume":"7","author":"Xie","year":"2019","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1109\/TIFS.2020.3026467","article-title":"Multi-Level Reversible Data Anonymization via Compressive Sensing and Data Hiding","volume":"16","author":"Yamac","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","first-page":"102560","article-title":"A novel image encryption algorithm using chaotic compressive sensing and nonlinear exponential function","volume":"54","author":"Musanna","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"220646","DOI":"10.1109\/ACCESS.2020.3043240","article-title":"An Image Encryption Algorithm Based on Compressive Sensing and M Sequence","volume":"8","author":"Dou","year":"2020","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Pourasad, Y., Ranjbarzadeh, R., and Mardani, A. (2021). A New Algorithm for Digital Image Encryption Based on Chaos Theory. Entropy, 23.","DOI":"10.3390\/e23030341"},{"key":"ref_18","first-page":"39","article-title":"A multi-process image encryption scheme based on compressed sensing and multidimensional chaotic systems","volume":"68","author":"Shi","year":"2019","journal-title":"J. Phys."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"108144","DOI":"10.1016\/j.sigpro.2021.108144","article-title":"A Substitution Box Generator, its Analysis, and Applications in Image Encryption","volume":"187","author":"Azam","year":"2021","journal-title":"Signal Process."},{"key":"ref_20","unstructured":"Wang, Y., Li, A., Wang, S., Wang, J.Y., and Hu, J.J. (2021). Image encryption algorithm based on the combination of CNN and traditional S-box. Electro-Opt. Control, 28."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"105661","DOI":"10.1016\/j.optlastec.2019.105661","article-title":"Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding","volume":"119","author":"Yang","year":"2019","journal-title":"Opt. Laser Technol."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Sun, C., Wang, E., and Zhao, B. (2021). Image Encryption Scheme with Compressed Sensing Based on a New Six-Dimensional Non-Degenerate Discrete Hyperchaotic System and Plaintext-Related Scrambling. Entropy, 23.","DOI":"10.3390\/e23030291"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"370379","DOI":"10.1016\/j.optlaseng.2017.06.015","article-title":"Image encryption algorithm based on multiple mixed hash functions and cyclic shift","volume":"107","author":"Wang","year":"2018","journal-title":"Opt. Lasers Eng."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"18875","DOI":"10.1007\/s11042-021-10511-0","article-title":"New color image cryptosystem via SHA-512 and hybrid domain","volume":"80","author":"Wang","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"651","DOI":"10.15388\/Informatica.2018.186","article-title":"A Fast Chaos-Based Colour Image Encryption Algorithm Using a Hash Function","volume":"29","author":"Fu","year":"2018","journal-title":"Informatica"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"19788","DOI":"10.1038\/srep19788","article-title":"Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption","volume":"6","author":"Yang","year":"2016","journal-title":"Sci. Rep."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s11128-018-1902-1","article-title":"Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system","volume":"17","author":"Zhou","year":"2018","journal-title":"Quantum Inf. Process."},{"key":"ref_28","unstructured":"Wang, Z., Xu, M., and Zhang, Y. (2021). Review of Quantum Image Processing. Arch. Comput. Methods Eng., 1\u201325."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Butt, K.K., Li, G., Masood, F., and Khan, S. (2020). A Digital Image Confidentiality Scheme Based on Pseudo-Quantum Chaos and Lucas Sequence. Entropy, 22.","DOI":"10.3390\/e22111276"},{"key":"ref_30","first-page":"22","article-title":"Implementation of an encrypted-compressed image wireless transmission scheme based on chaotic fractional-order systems","volume":"71","year":"2020","journal-title":"Chin. J. Phys."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Wang, K., Wu, X., and Gao, T. (2021). Double color images compression\u2013encryption via compressive sensing. Neural Comput. Appl., 1\u201322.","DOI":"10.1007\/s00521-021-05921-y"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Masood, F., Ahmad, J., Shah, S.A., Jamal, S.S., and Hussain, I. (2020). A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map. Entropy, 22.","DOI":"10.3390\/e22030274"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Masood, F., Boulila, W., Ahmad, J., Arshad, A., Sankar, S., Rubaiee, S., and Buchanan, W. (2020). A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos. Remote. Sens., 12.","DOI":"10.3390\/rs12111893"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1631\/FITEE.1900709","article-title":"A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations","volume":"21","author":"Chen","year":"2020","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Ahmad, J., Masood, F., Shah, A., Jamal, S.S., and Hussain, I. (2020). A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping. Symmetry, 12.","DOI":"10.3390\/sym12030350"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"065203","DOI":"10.1088\/1402-4896\/abed7d","article-title":"A color image encryption algorithm based on an improved H\u00e9non map","volume":"96","author":"Gao","year":"2021","journal-title":"Phys. Scr."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"105678","DOI":"10.1109\/ACCESS.2021.3099004","article-title":"Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps","volume":"9","author":"Munir","year":"2021","journal-title":"IEEE Access"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2395","DOI":"10.1007\/s00521-017-3195-1","article-title":"Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys","volume":"31","author":"Alhindawi","year":"2019","journal-title":"Neural Comput. Appl."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"2067","DOI":"10.1007\/s11071-015-2465-7","article-title":"Chaotic image encryption algorithm using wave-line permutation and block diffusion","volume":"83","author":"Ye","year":"2015","journal-title":"Nonlinear Dyn."},{"key":"ref_40","first-page":"397","article-title":"Control study of chaotic Lorena systems","volume":"47","author":"Yu","year":"1998","journal-title":"J. Phys."},{"key":"ref_41","first-page":"91","article-title":"Discrete Arnold transform improvement and its application in image dislocation encryption","volume":"63","author":"Wu","year":"2014","journal-title":"J. Phys."},{"key":"ref_42","first-page":"3424","article-title":"Image encryption scheme based on skew tent chaotic mapping and Arnold transform","volume":"35","author":"Li","year":"2018","journal-title":"Comput. Appl. Res."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"110225","DOI":"10.1016\/j.chaos.2020.110225","article-title":"Simple colour image cryptosystem with very high level of security","volume":"141","author":"Zhou","year":"2020","journal-title":"Chaos Solitons Fractals"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"166728","DOI":"10.1016\/j.ijleo.2021.166728","article-title":"A color image encryption scheme reducing the correlations between R, G, B components","volume":"237","author":"Yildirim","year":"2021","journal-title":"Optik"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Cheng, G., Wang, C., and Chen, H. (2019). A Novel Color Image Encryption Algorithm Based on Hyperchaotic System and Permutation-Diffusion Architecture. Int. J. Bifurc. Chaos, 29.","DOI":"10.1142\/S0218127419501153"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/9\/1159\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:55:20Z","timestamp":1760165720000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/9\/1159"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,2]]},"references-count":45,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2021,9]]}},"alternative-id":["e23091159"],"URL":"https:\/\/doi.org\/10.3390\/e23091159","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,2]]}}}