{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T01:53:02Z","timestamp":1770515582463,"version":"3.49.0"},"reference-count":51,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2022,7,10]],"date-time":"2022-07-10T00:00:00Z","timestamp":1657411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Hainan Province Basic and Applied Basic Research Program (Natural Science Field) High-level Talent Project","award":["2019RC044"],"award-info":[{"award-number":["2019RC044"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Image encryption based on a chaos system can effectively protect the privacy of digital images. It is said that a 3D chaotic system has a larger parameter range, better unpredictability and more complex behavior compared to low-dimension chaotic systems. Motivated by this fact, we propose a new image cryptosystem that makes use of a 3D chaotic system. There are three main steps in our scheme. In the first step, the chaotic system uses the hash value of the plaintext image to generate three sequences. In step two, one of the sequences is used to dynamically select confusion and diffusion methods, where confusion and diffusion have three algorithms, respectively, and will produce 32n (n &gt; 100) combinations for encryption. In step three, the image is divided into hundreds of overlapping subblocks, along with the other two sequences, and each block is encrypted in the confusion and diffusion process. Information entropy, NPCR, UACI results and various security analysis results show that the algorithm has a better security performance than existing, similar algorithms, and can better resist clipping, noise, statistical analysis and other attacks.<\/jats:p>","DOI":"10.3390\/e24070958","type":"journal-article","created":{"date-parts":[[2022,7,10]],"date-time":"2022-07-10T21:19:28Z","timestamp":1657487968000},"page":"958","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Image Security Based on Three-Dimensional Chaotic System and Random Dynamic Selection"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8643-3082","authenticated-orcid":false,"given":"Bo","family":"Ran","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Hainan University, Haikou 570100, China"}]},{"given":"Tianshuo","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Hainan University, Haikou 570100, China"}]},{"given":"Lihong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Hainan University, Haikou 570100, China"}]},{"given":"Sheng","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Hainan University, Haikou 570100, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3777-9479","authenticated-orcid":false,"given":"Xiaoyi","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Hainan University, Haikou 570100, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,7,10]]},"reference":[{"key":"ref_1","unstructured":"Standard, D.E. (1999). Data encryption standard, Federal Information Processing Standards Publication."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1353-4858(10)70006-4","article-title":"Advanced encryption standard (AES)","volume":"2009","author":"Heron","year":"2009","journal-title":"Netw. Secur."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","article-title":"A new color image encryption using combination of the 1D chaotic map","volume":"138","author":"Pak","year":"2017","journal-title":"Signal Processing"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1049\/iet-ipr.2019.0310","article-title":"Image encryption with cross colour field algorithm and improved cascade chaos systems","volume":"14","author":"Jia","year":"2020","journal-title":"IET Image Process"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.optlastec.2019.01.043","article-title":"A novel chaotic image encryption algorithm based on content-sensitive dynamic function switching scheme","volume":"114","author":"Yavuz","year":"2019","journal-title":"Opt. Laser Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1049\/iet-spr.2016.0584","article-title":"Image block encryption algorithm based on chaotic maps","volume":"12","author":"Liu","year":"2018","journal-title":"IET Signal Processing"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.sigpro.2017.04.006","article-title":"Color image encryption based on chaotic systems and elliptic curve ElGamal scheme","volume":"141","author":"Wu","year":"2017","journal-title":"Signal Processing"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","article-title":"Color image encryption based on hybrid hyper-chaotic system and cellular automata","volume":"90","author":"Niyat","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.image.2019.08.014","article-title":"Image encryption using block cipher and chaotic sequences","volume":"79","author":"Artiles","year":"2019","journal-title":"Signal Processing Image Commun."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"240506","DOI":"10.7498\/aps.63.240506","article-title":"A novel four-dimensional multi-wing hyper-chaotic attractor and its application in image encryption","volume":"63","author":"Peng","year":"2014","journal-title":"Acta Phys. Sin."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","article-title":"Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence","volume":"56","author":"Enayatifar","year":"2014","journal-title":"Opt. Lasers Eng."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","article-title":"Exploiting self-adaptive permutation\u2013diffusion and DNA random encoding for secure and efficient image encryption","volume":"142","author":"Chen","year":"2018","journal-title":"Signal Processing"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.neucom.2014.11.095","article-title":"A novel image encryption algorithm based on chaos and Line map","volume":"169","author":"Zhou","year":"2015","journal-title":"Neurocomputing"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"34323","DOI":"10.1007\/s11042-019-08072-4","article-title":"Image encryption based on Henon chaotic system with nonlinear term","volume":"78","author":"Luo","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"7685359","DOI":"10.1155\/2019\/7685359","article-title":"A new two-dimensional mutual coupled logistic map and its application for pseudorandom number generator","volume":"2019","author":"Huang","year":"2019","journal-title":"Math. Probl. Eng."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"4363","DOI":"10.1007\/s11042-015-2479-7","article-title":"Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences","volume":"75","author":"Liu","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2310","DOI":"10.1049\/iet-ipr.2019.1340","article-title":"Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map","volume":"14","author":"Zheng","year":"2020","journal-title":"IET Image Processing"},{"key":"ref_18","first-page":"102566","article-title":"Cryptanalysis of an image block encryption algorithm based on chaotic maps","volume":"54","author":"Ma","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2322","DOI":"10.1109\/TCSI.2018.2888688","article-title":"Dynamic analysis of digital chaotic maps via state-mapping networks","volume":"66","author":"Li","year":"2019","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","article-title":"Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network","volume":"539","author":"Wang","year":"2020","journal-title":"Inf. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"013014","DOI":"10.1117\/1.JEI.21.1.013014","article-title":"Image encryption using the two-dimensional logistic chaotic map","volume":"21","author":"Wu","year":"2012","journal-title":"J. Electron. Imaging"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","article-title":"2D Sine Logistic modulation map for image encryption","volume":"297","author":"Hua","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","article-title":"An image encryption scheme based on chaotic tent map","volume":"87","author":"Li","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_24","unstructured":"Rashmi, P., Supriya, M.C., and Kiran, K. (2021, January 3\u20134). Image Encryption Algorithm based on 2D Hyper Chaotic Map and Trigonometric Functions. Proceedings of the 2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC), Tumkur, India."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","article-title":"Image encryption using 2D Logistic-adjusted-Sine map","volume":"339","author":"Hua","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1109\/TCSI.2016.2573283","article-title":"Parameter identification of chaotic and hyper-chaotic systems using synchronization-based parameter observer","volume":"63","author":"Chen","year":"2016","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2557","DOI":"10.1109\/TIE.2017.2736515","article-title":"Sine-transform-based chaotic system with FPGA implementation","volume":"65","author":"Hua","year":"2017","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","article-title":"On the cryptanalysis of Fridrich\u2019s chaotic image encryption scheme","volume":"132","author":"Xie","year":"2017","journal-title":"Signal Processing"},{"key":"ref_29","first-page":"45","article-title":"Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes","volume":"34","author":"Jeng","year":"2015","journal-title":"Signal Processing: Image Commun."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"106837","DOI":"10.1016\/j.optlastec.2020.106837","article-title":"A chaotic image encryption algorithm based on random dynamic mixing","volume":"138","author":"Wang","year":"2021","journal-title":"Opt. Laser Technol."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2479","DOI":"10.1016\/j.cnsns.2009.10.001","article-title":"A new compound mode of confusion and diffusion for block encryption of image based on chaos","volume":"15","author":"Wang","year":"2010","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"106202","DOI":"10.1016\/j.optlaseng.2020.106202","article-title":"Image encryption based on chaotic sub-block scrambling and chaotic digit selection diffusion","volume":"134","author":"Xian","year":"2020","journal-title":"Opt. Lasers Eng."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","article-title":"Chaos based efficient selective image encryption","volume":"30","author":"Khan","year":"2019","journal-title":"Multidimens. Syst. Signal Processing"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","article-title":"Determining Lyapunov exponents from a time series","volume":"16","author":"Wolf","year":"1985","journal-title":"Phys. D Nonlinear Phenom."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"174102","DOI":"10.1103\/PhysRevLett.88.174102","article-title":"Permutation entropy: A natural complexity measure for time series","volume":"88","author":"Bandt","year":"2002","journal-title":"Phys. Rev. Lett."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"020506","DOI":"10.7498\/aps.62.020506","article-title":"Cascade chaos and its dynamic characteristics","volume":"62","author":"Wang","year":"2013","journal-title":"Acta Phys. Sin."},{"key":"ref_37","unstructured":"He, D., He, C., and Jiang, L.G. (2000, January 24\u201327). A chaotic map with infinite collapses. Proceedings of the Intelligent Systems and Technologies for the New Millennium (Cat. No. 00CH37119), Kuala Lumpur, Malaysia."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Khaitan, S., Sagar, S., and Agarwal, R. (Today Proc., 2021). Chaos based image encryption using 3-Dimension logistic map. Mater, Today Proc., in press.","DOI":"10.1016\/j.matpr.2021.05.251"},{"key":"ref_39","first-page":"102390","article-title":"Designing a fast image encryption scheme using fractal function and 3D Henon map","volume":"49","author":"Ramakrishnan","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","article-title":"Image encryption using a synchronous permutation-diffusion technique","volume":"90","author":"Enayatifar","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1049\/el.2017.4426","article-title":"Efficient image encryption method based on improved Lorenz chaotic system","volume":"54","author":"Kaur","year":"2018","journal-title":"Electron. Lett."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","article-title":"Image encryption using 2D H\u00e9non-Sine map and DNA approach","volume":"153","author":"Wu","year":"2018","journal-title":"Signal Processing"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.ins.2021.07.096","article-title":"An image encryption algorithm based on new chaos and diffusion values of a truth table","volume":"579","author":"Wang","year":"2021","journal-title":"Inform. Sci."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1007\/s11071-015-2579-y","article-title":"Image encryption scheme using chaos and simulated annealing algorithm","volume":"84","author":"Xingyuan","year":"2016","journal-title":"Nonlinear Dyn."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","article-title":"An image encryption scheme based on a new hybrid chaotic map and optimized substitution box","volume":"99","author":"Farah","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"14284","DOI":"10.1109\/ACCESS.2021.3052161","article-title":"New DNA Coded Fuzzy Based(DNAFZ) S-Boxes: Application to Robust Image Encryption Using Hyper Chaotic Maps","volume":"9","author":"Amira","year":"2021","journal-title":"IEEE Access"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"4655","DOI":"10.1007\/s11042-013-1828-7","article-title":"Selective encryption for gray images based on chaos and DNA complementary rules","volume":"74","author":"Liao","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"107316","DOI":"10.1016\/j.optlastec.2021.107316","article-title":"An image encryption algorithm based on hyperchaotic system and DNA coding","volume":"143","author":"Wang","year":"2021","journal-title":"Opt. Laser Technol."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"4048","DOI":"10.1016\/j.optcom.2012.06.004","article-title":"A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive","volume":"285","author":"Teng","year":"2012","journal-title":"Opt. Commun."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","article-title":"An image encryption algorithm based on chaotic system","volume":"148","author":"Chai","year":"2018","journal-title":"Signal Processing"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.ins.2017.02.036","article-title":"Design of image cipher using block-based scrambling and image filtering","volume":"396","author":"Hua","year":"2017","journal-title":"Inf. Sci."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/7\/958\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:47:33Z","timestamp":1760140053000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/7\/958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,10]]},"references-count":51,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2022,7]]}},"alternative-id":["e24070958"],"URL":"https:\/\/doi.org\/10.3390\/e24070958","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,10]]}}}