{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T10:51:02Z","timestamp":1777805462943,"version":"3.51.4"},"reference-count":50,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T00:00:00Z","timestamp":1663804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation of China","award":["62071088"],"award-info":[{"award-number":["62071088"]}]},{"name":"National Science Foundation of China","award":["2021A0101180005"],"award-info":[{"award-number":["2021A0101180005"]}]},{"name":"National Science Foundation of China","award":["2021ZDZX1083"],"award-info":[{"award-number":["2021ZDZX1083"]}]},{"name":"National Science Foundation of China","award":["2021B2062"],"award-info":[{"award-number":["2021B2062"]}]},{"name":"National Science Foundation of China","award":["YLZY202201"],"award-info":[{"award-number":["YLZY202201"]}]},{"name":"National Science Foundation of China","award":["ZXD202215"],"award-info":[{"award-number":["ZXD202215"]}]},{"name":"National Science Foundation of China","award":["2022ZDZX3082"],"award-info":[{"award-number":["2022ZDZX3082"]}]},{"name":"National Science Foundation of China","award":["20221800500572"],"award-info":[{"award-number":["20221800500572"]}]},{"name":"Science and Technology Projects of Guangdong Province","award":["62071088"],"award-info":[{"award-number":["62071088"]}]},{"name":"Science and Technology Projects of Guangdong Province","award":["2021A0101180005"],"award-info":[{"award-number":["2021A0101180005"]}]},{"name":"Science and Technology Projects of Guangdong Province","award":["2021ZDZX1083"],"award-info":[{"award-number":["2021ZDZX1083"]}]},{"name":"Science and Technology Projects of Guangdong Province","award":["2021B2062"],"award-info":[{"award-number":["2021B2062"]}]},{"name":"Science and Technology Projects of Guangdong Province","award":["YLZY202201"],"award-info":[{"award-number":["YLZY202201"]}]},{"name":"Science and Technology Projects of Guangdong Province","award":["ZXD202215"],"award-info":[{"award-number":["ZXD202215"]}]},{"name":"Science and Technology Projects of Guangdong Province","award":["2022ZDZX3082"],"award-info":[{"award-number":["2022ZDZX3082"]}]},{"name":"Science and Technology Projects of Guangdong Province","award":["20221800500572"],"award-info":[{"award-number":["20221800500572"]}]},{"name":"Special Projects for Key Fields of the Education Department of Guangdong Province","award":["62071088"],"award-info":[{"award-number":["62071088"]}]},{"name":"Special Projects for Key Fields of the Education Department of Guangdong Province","award":["2021A0101180005"],"award-info":[{"award-number":["2021A0101180005"]}]},{"name":"Special Projects for Key Fields of the Education Department of Guangdong Province","award":["2021ZDZX1083"],"award-info":[{"award-number":["2021ZDZX1083"]}]},{"name":"Special Projects for Key Fields of the Education Department of Guangdong Province","award":["2021B2062"],"award-info":[{"award-number":["2021B2062"]}]},{"name":"Special Projects for Key Fields of the Education Department of Guangdong Province","award":["YLZY202201"],"award-info":[{"award-number":["YLZY202201"]}]},{"name":"Special Projects for Key Fields of the Education Department of Guangdong Province","award":["ZXD202215"],"award-info":[{"award-number":["ZXD202215"]}]},{"name":"Special Projects for Key Fields of the Education Department of Guangdong Province","award":["2022ZDZX3082"],"award-info":[{"award-number":["2022ZDZX3082"]}]},{"name":"Special Projects for Key Fields of the Education Department of Guangdong Province","award":["20221800500572"],"award-info":[{"award-number":["20221800500572"]}]},{"name":"Project for Zhongshan Science and Technology","award":["62071088"],"award-info":[{"award-number":["62071088"]}]},{"name":"Project for Zhongshan Science and Technology","award":["2021A0101180005"],"award-info":[{"award-number":["2021A0101180005"]}]},{"name":"Project for Zhongshan Science and Technology","award":["2021ZDZX1083"],"award-info":[{"award-number":["2021ZDZX1083"]}]},{"name":"Project for Zhongshan Science and Technology","award":["2021B2062"],"award-info":[{"award-number":["2021B2062"]}]},{"name":"Project for Zhongshan Science and Technology","award":["YLZY202201"],"award-info":[{"award-number":["YLZY202201"]}]},{"name":"Project for Zhongshan Science and Technology","award":["ZXD202215"],"award-info":[{"award-number":["ZXD202215"]}]},{"name":"Project for Zhongshan Science and Technology","award":["2022ZDZX3082"],"award-info":[{"award-number":["2022ZDZX3082"]}]},{"name":"Project for Zhongshan Science and Technology","award":["20221800500572"],"award-info":[{"award-number":["20221800500572"]}]},{"name":"Construction Project of Professional Quality Engineering in Guangdong Province","award":["62071088"],"award-info":[{"award-number":["62071088"]}]},{"name":"Construction Project of Professional Quality Engineering in Guangdong Province","award":["2021A0101180005"],"award-info":[{"award-number":["2021A0101180005"]}]},{"name":"Construction Project of Professional Quality Engineering in Guangdong Province","award":["2021ZDZX1083"],"award-info":[{"award-number":["2021ZDZX1083"]}]},{"name":"Construction Project of Professional Quality Engineering in Guangdong Province","award":["2021B2062"],"award-info":[{"award-number":["2021B2062"]}]},{"name":"Construction Project of Professional Quality Engineering in Guangdong Province","award":["YLZY202201"],"award-info":[{"award-number":["YLZY202201"]}]},{"name":"Construction Project of Professional Quality Engineering in Guangdong Province","award":["ZXD202215"],"award-info":[{"award-number":["ZXD202215"]}]},{"name":"Construction Project of Professional Quality Engineering in Guangdong Province","award":["2022ZDZX3082"],"award-info":[{"award-number":["2022ZDZX3082"]}]},{"name":"Construction Project of Professional Quality Engineering in Guangdong Province","award":["20221800500572"],"award-info":[{"award-number":["20221800500572"]}]},{"name":"Project of Administration, School and Enterprise of DongGuan Polytechnic","award":["62071088"],"award-info":[{"award-number":["62071088"]}]},{"name":"Project of Administration, School and Enterprise of DongGuan Polytechnic","award":["2021A0101180005"],"award-info":[{"award-number":["2021A0101180005"]}]},{"name":"Project of Administration, School and Enterprise of DongGuan Polytechnic","award":["2021ZDZX1083"],"award-info":[{"award-number":["2021ZDZX1083"]}]},{"name":"Project of Administration, School and Enterprise of DongGuan Polytechnic","award":["2021B2062"],"award-info":[{"award-number":["2021B2062"]}]},{"name":"Project of Administration, School and Enterprise of DongGuan Polytechnic","award":["YLZY202201"],"award-info":[{"award-number":["YLZY202201"]}]},{"name":"Project of Administration, School and Enterprise of DongGuan Polytechnic","award":["ZXD202215"],"award-info":[{"award-number":["ZXD202215"]}]},{"name":"Project of Administration, School and Enterprise of DongGuan Polytechnic","award":["2022ZDZX3082"],"award-info":[{"award-number":["2022ZDZX3082"]}]},{"name":"Project of Administration, School and Enterprise of DongGuan Polytechnic","award":["20221800500572"],"award-info":[{"award-number":["20221800500572"]}]},{"name":"Special Projects in Key Fields of Research Platforms and Projects of Guangdong Universities","award":["62071088"],"award-info":[{"award-number":["62071088"]}]},{"name":"Special Projects in Key Fields of Research Platforms and Projects of Guangdong Universities","award":["2021A0101180005"],"award-info":[{"award-number":["2021A0101180005"]}]},{"name":"Special Projects in Key Fields of Research Platforms and Projects of Guangdong Universities","award":["2021ZDZX1083"],"award-info":[{"award-number":["2021ZDZX1083"]}]},{"name":"Special Projects in Key Fields of Research Platforms and Projects of Guangdong Universities","award":["2021B2062"],"award-info":[{"award-number":["2021B2062"]}]},{"name":"Special Projects in Key Fields of Research Platforms and Projects of Guangdong Universities","award":["YLZY202201"],"award-info":[{"award-number":["YLZY202201"]}]},{"name":"Special Projects in Key Fields of Research Platforms and Projects of Guangdong Universities","award":["ZXD202215"],"award-info":[{"award-number":["ZXD202215"]}]},{"name":"Special Projects in Key Fields of Research Platforms and Projects of Guangdong Universities","award":["2022ZDZX3082"],"award-info":[{"award-number":["2022ZDZX3082"]}]},{"name":"Special Projects in Key Fields of Research Platforms and Projects of Guangdong Universities","award":["20221800500572"],"award-info":[{"award-number":["20221800500572"]}]},{"name":"Dongguan Science and Technology Commissioner Project","award":["62071088"],"award-info":[{"award-number":["62071088"]}]},{"name":"Dongguan Science and Technology Commissioner Project","award":["2021A0101180005"],"award-info":[{"award-number":["2021A0101180005"]}]},{"name":"Dongguan Science and Technology Commissioner Project","award":["2021ZDZX1083"],"award-info":[{"award-number":["2021ZDZX1083"]}]},{"name":"Dongguan Science and Technology Commissioner Project","award":["2021B2062"],"award-info":[{"award-number":["2021B2062"]}]},{"name":"Dongguan Science and Technology Commissioner Project","award":["YLZY202201"],"award-info":[{"award-number":["YLZY202201"]}]},{"name":"Dongguan Science and Technology Commissioner Project","award":["ZXD202215"],"award-info":[{"award-number":["ZXD202215"]}]},{"name":"Dongguan Science and Technology Commissioner Project","award":["2022ZDZX3082"],"award-info":[{"award-number":["2022ZDZX3082"]}]},{"name":"Dongguan Science and Technology Commissioner Project","award":["20221800500572"],"award-info":[{"award-number":["20221800500572"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>In order to further improve the information effectiveness of digital image transmission, an image-encryption algorithm based on 2D-Logistic-adjusted-Sine map (2D-LASM) and Discrete Wavelet Transform (DWT) is proposed. First, a dynamic key with plaintext correlation is generated using Message-Digest Algorithm 5 (MD5), and 2D-LASM chaos is generated based on the key to obtain a chaotic pseudo-random sequence. Secondly, we perform DWT on the plaintext image to map the image from the time domain to the frequency domain and decompose the low-frequency (LF) coefficient and high-frequency (HF) coefficient. Then, the chaotic sequence is used to encrypt the LF coefficient with the structure of \u201cconfusion-permutation\u201d. We perform the permutation operation on HF coefficient, and we reconstruct the image of the processed LF coefficient and HF coefficient to obtain the frequency-domain ciphertext image. Finally, the ciphertext is dynamically diffused using the chaotic sequence to obtain the final ciphertext. Theoretical analysis and simulation experiments show that the algorithm has a large key space and can effectively resist various attacks. Compared with the spatial-domain algorithms, this algorithm has great advantages in terms of computational complexity, security performance, and encryption efficiency. At the same time, it provides better concealment of the encrypted image while ensuring the encryption efficiency compared to existing frequency-domain methods. The successful implementation on the embedded device in the optical network environment verifies the experimental feasibility of this algorithm in the new network application.<\/jats:p>","DOI":"10.3390\/e24101332","type":"journal-article","created":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T05:33:14Z","timestamp":1663824794000},"page":"1332","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1178-4598","authenticated-orcid":false,"given":"Heping","family":"Wen","sequence":"first","affiliation":[{"name":"School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"},{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zefeng","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiehong","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yiming","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuwei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Linchao","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4159-3132","authenticated-orcid":false,"given":"Yiting","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhen","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rui","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Linhao","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenxing","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jieyi","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chongfu","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Huaide","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Dongguan Polytechnic, Dongguan 523808, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"18052","DOI":"10.1109\/ACCESS.2021.3054380","article-title":"Multilayer Dynamic Encryption for Security OFDM-PON Using DNA-reconstructed Chaotic Sequences under Cryptanalysis","volume":"9","author":"Cui","year":"2021","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Masood, F., Ahmad, J., and Shah, S. (2020). A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map. Entropy, 22.","DOI":"10.3390\/e22030274"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Zhu, S., and Zhu, C. (2020). Secure Image Encryption Algorithm Based on Hyperchaos and Dynamic DNA Coding. Entropy, 22.","DOI":"10.3390\/e22070772"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"20481","DOI":"10.1109\/ACCESS.2021.3054952","article-title":"A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication","volume":"9","author":"Wen","year":"2021","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","article-title":"A Chaotic Image Encryption Algorithm Based on 3-D Bit-Plane Permutation","volume":"31","author":"Gan","year":"2019","journal-title":"Neural Comput. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3330","DOI":"10.1109\/TCYB.2015.2504180","article-title":"Dynamic Parameter-Control Chaotic System","volume":"46","author":"Hua","year":"2015","journal-title":"IEEE Trans. Cybern."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Wen, H., Zhang, C., and Huang, L. (2021). Security Analysis of a Color Image Encryption Algorithm Using a Fractional-Order Chaos. Entropy, 23.","DOI":"10.3390\/e23020258"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Khan, P., and Byun, Y. (2020). A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things. Entropy, 22.","DOI":"10.3390\/e22020175"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","article-title":"A Novel Bit-Level Image Encryption Algorithm Based on Chaotic Maps","volume":"78","author":"Xu","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1109\/TII.2019.2923553","article-title":"Two-Dimensional Sine Chaotification System with Hardware Implementation","volume":"2","author":"Hua","year":"2020","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"102355","DOI":"10.1016\/j.yofte.2020.102355","article-title":"Overview on Routing and Resource Allocation Based Machine Learning in Optical Networks","volume":"60","author":"Zhang","year":"2020","journal-title":"Opt. Fiber Technol."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"126911","DOI":"10.1016\/j.optcom.2021.126911","article-title":"Chaotic Key Generation and Application in OFDM-PON Using QAM Constellation Points","volume":"490","author":"Wei","year":"2021","journal-title":"Opt. Commun."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Wu, J., Shi, J., and Li, T. (2020). A Novel Image Encryption Approach Based on a Hyperchaotic System, Pixel-Level Filtering with Variable Kernels, and DNA-Level Diffusion. Entropy, 22.","DOI":"10.3390\/e22010005"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Pourasad, Y., Ranjbarzadeh, R., and Mardani, A. (2021). A New Algorithm for Digital Image Encryption Based on Chaos Theory. Entropy, 23.","DOI":"10.3390\/e23030341"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wen, H., Xu, J., and Liao, Y. (2021). A Security-Enhanced Image Communication Scheme Using Cellular Neural Network. Entropy, 23.","DOI":"10.3390\/e23081000"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"3669","DOI":"10.1364\/OE.416154","article-title":"Compressive Sensing Chaotic Encryption Algorithms for OFDM-PON Data Transmission","volume":"29","author":"Wu","year":"2021","journal-title":"Opt. Express"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"4961","DOI":"10.1007\/s00521-018-3913-3","article-title":"An Efficient Chaos-Based Image Compression and Encryption Scheme Using Block Compressive Sensing and Elementary Cellular Automata","volume":"32","author":"Chai","year":"2018","journal-title":"Neural Comput. Appl."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3713","DOI":"10.1109\/TSMC.2019.2932616","article-title":"Exponential Chaotic Model for Generating Robust Chaos","volume":"51","author":"Hua","year":"2019","journal-title":"IEEE Trans. Syst. Man-Cybern.-Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MMUL.2018.2873472","article-title":"Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography","volume":"25","author":"Li","year":"2018","journal-title":"IEEE Multimed."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1140\/epjp\/i2019-12797-4","article-title":"Cryptanalysis of An Image Encryption Cryptosystem Based on Binary Bit Planes Extraction and Multiple Chaotic Maps","volume":"134","author":"Wen","year":"2019","journal-title":"Eur. Phys. J. Plus"},{"key":"ref_21","first-page":"102566","article-title":"Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps","volume":"54","author":"Ma","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2081","DOI":"10.1049\/iet-ipr.2019.0991","article-title":"Image Multi-Encryption Architecture Based on Hybrid Keystream Sequence Interspersed with Haar Discrete Wavelet Transform","volume":"14","author":"Umoh","year":"2020","journal-title":"IET Image Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"165737","DOI":"10.1016\/j.ijleo.2020.165737","article-title":"An Image Encryption Approach on The Basis of a Time Delay Chaotic System","volume":"225","author":"Wang","year":"2021","journal-title":"Optik"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"136905","DOI":"10.1109\/ACCESS.2021.3118050","article-title":"A Finite Precision Implementation of an Image Encryption Scheme Based on DNA Encoding and Binarized Chaotic Cores","volume":"9","author":"Elmanfaloty","year":"2021","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"103424","DOI":"10.1016\/j.jvcir.2021.103424","article-title":"Security Measurement of a Medical Image Communication Scheme based on Chaos and DNA coding","volume":"83","author":"Chen","year":"2022","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"ElKamchouchi, D., Mohamed, H., and Moussa, K. (2020). A Bijective Image Encryption System Based on Hybrid Chaotic Map Diffusion and DNA Confusion. Entropy, 22.","DOI":"10.3390\/e22020180"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JPHOT.2018.2883994","article-title":"Phase Masking and Time-Frequency Chaotic Encryption for OFDM-PON","volume":"10","author":"Zhang","year":"2018","journal-title":"IEEE Photonics J."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1706","DOI":"10.1109\/JLT.2018.2789435","article-title":"Physical-Enhanced Secure Strategy for OFDMA-PON Using Chaos and Deoxyribonucleic Acid Encoding","volume":"36","author":"Zhang","year":"2018","journal-title":"J. Light. Technol."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Li, T., Shi, J., and Li, X. (2019). Image Encryption Based on Pixel-Level Diffusion with Dynamic Filtering and DNA-Level Permutation with 3D Latin Cubes. Entropy, 21.","DOI":"10.3390\/e21030319"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"103463","DOI":"10.1109\/ACCESS.2019.2929244","article-title":"A Selective Image Encryption Scheme Based on 2D DWT, Henon Map and 4D Qi Hyper-Chaos","volume":"7","author":"Tresor","year":"2019","journal-title":"IEEE Access"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"8065","DOI":"10.1007\/s00521-019-04312-8","article-title":"Exploiting Plaintext-Related Mechanism for Secure Color Image Encryption","volume":"32","author":"Chai","year":"2019","journal-title":"Neural Comput. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1524","DOI":"10.1109\/JLT.2017.2669909","article-title":"Experimental Demonstration of Security-Enhanced OFDMA-PON Using Chaotic Constellation Transformation and Pilot-Aided Secure Key Agreement","volume":"35","author":"Zhang","year":"2017","journal-title":"J. Light. Technol."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Wen, H., Yu, S., and Lu, J. (2019). Breaking an Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos. Entropy, 21.","DOI":"10.3390\/e21030246"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Ramasamy, P., Ranganathan, V., and Kadry, S. (2019). An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic-Tent Map. Entropy, 21.","DOI":"10.3390\/e21070656"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"75119","DOI":"10.1109\/ACCESS.2020.2989172","article-title":"Security Improvement for OFDM-PON Via DNA Extension Code and Chaotic Systems","volume":"8","author":"Wu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","article-title":"Image Encryption Using 2D Logistic-Adjusted-Sine Map","volume":"339","author":"Hua","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Wen, H., Liu, Z., and Lai, H. (2022). Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key. Mathematics, 10.","DOI":"10.3390\/math10173180"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"6159","DOI":"10.1007\/s11042-021-11725-y","article-title":"A Secure Dual-Color Image Watermarking Scheme Based 2D DWT, SVD and Chaotic Map","volume":"81","author":"Wang","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_39","first-page":"1","article-title":"Physically Secured Optical OFDM-PON by Employing Chaotic Pseudorandom RF Subcarriers","volume":"9","author":"Zhang","year":"2017","journal-title":"IEEE Photonics J."},{"key":"ref_40","unstructured":"(2022, September 18). USC-SIPI Image Database. Available online: http:\/\/sipi.usc.edu\/database."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MMUL.2017.3051512","article-title":"Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits","volume":"24","author":"Li","year":"2017","journal-title":"IEEE Multimed."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.sigpro.2014.10.033","article-title":"A RGB Image Encryption Algorithm Based on Total Plain Image Characteristics and Chaos","volume":"109","year":"2015","journal-title":"Signal Process."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"6954","DOI":"10.3390\/e17106954","article-title":"A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos","volume":"17","author":"Song","year":"2015","journal-title":"Entropy"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"18310","DOI":"10.1364\/OE.458732","article-title":"Secure Key Distribution and Synchronization Method in an OFDM-PON Based on Chaos","volume":"30","author":"Liang","year":"2022","journal-title":"Opt. Express"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"9931","DOI":"10.1109\/TIE.2020.3022539","article-title":"Two-Dimensional Memristive Hyperchaotic Maps and Application in Secure Communication","volume":"68","author":"Li","year":"2020","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Askar, S., Karawia, A., and Al-Khedhairi, A. (2019). An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps. Entropy, 21.","DOI":"10.3390\/e21010044"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1140\/epjp\/i2018-12138-3","article-title":"Novel Image Encryption Cryptosystem Based on Binary Bit Planes Extraction and Multiple Chaotic Maps","volume":"133","author":"Arslan","year":"2018","journal-title":"Eur. Phys. J. Plus"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1850047","DOI":"10.1142\/S0218127418500475","article-title":"A New Chaotic Image Encryption Scheme Using Breadth-First Search and Dynamic Diffusion","volume":"28","author":"Yin","year":"2018","journal-title":"Int. J. Bifurc. Chaos Appl. Sci. Eng."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"25339","DOI":"10.1364\/OE.461196","article-title":"Secure OFDM-PON Using Three-Dimensional Selective Probabilistic Shaping and Chaos","volume":"30","author":"Luo","year":"2022","journal-title":"Opt. Express"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"15721","DOI":"10.1038\/s41598-022-20145-3","article-title":"High-quality Restoration Image Encryption Using DCT Frequency-domain Compression Coding and Chaos","volume":"12","author":"Wen","year":"2022","journal-title":"Sci. Rep."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/10\/1332\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:37:08Z","timestamp":1760143028000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/10\/1332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,22]]},"references-count":50,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2022,10]]}},"alternative-id":["e24101332"],"URL":"https:\/\/doi.org\/10.3390\/e24101332","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,22]]}}}