{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:23:25Z","timestamp":1760145805993,"version":"build-2065373602"},"reference-count":49,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:00Z","timestamp":1725494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Natural Science Foundation of Liaoning Province of China","award":["2022-MS-123","61977014","61902056","61603082"],"award-info":[{"award-number":["2022-MS-123","61977014","61902056","61603082"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2022-MS-123","61977014","61902056","61603082"],"award-info":[{"award-number":["2022-MS-123","61977014","61902056","61603082"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>The diffusion phenomenon that exhibits intrinsic similarities is pervasive in cryptography and natural systems, evident in liquid diffusion, epidemic spread, animal migration, and encryption techniques. In cryptography, bytes are systematically diffused in a sequential manner to encrypt the value of each byte in the plaintext in a linear fashion. In contrast, within an epidemic spreading model, the diffusion process can be represented within a complex, multilayered network, encompassing layers such as familial and social transmission dynamics. Transmission links establish connections both within and between individual layers. It has had a more rapid spread than linear approaches due to the particularization of non-linear transmission. In this study, the novelty of a cryptography diffusion strategy based on an epidemic model is first proposed, in which pixels and their dynamic adjacency are considered as vertices and edges, respectively, within a complex network framework. Subsequently, the encryption process is governed by the Susceptible\u2013Vaccinated\u2013Infected\u2013Recovered (SVIR) model integrated with chaotic dynamics. Simulation results demonstrate that the proposed algorithm exhibits faster encryption speed while effectively resisting brute force, statistical, and differential attacks. Furthermore, it demonstrates strong robustness against noise interference and data loss.<\/jats:p>","DOI":"10.3390\/e26090760","type":"journal-article","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:34:06Z","timestamp":1725503646000},"page":"760","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A New Diffusion Strategy Using an Epidemic Spreading Model for Encryption"],"prefix":"10.3390","volume":"26","author":[{"given":"Wei","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Software, Northeastern University, Shenyang 110167, China"}]},{"given":"Guangdong","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Software, Northeastern University, Shenyang 110167, China"}]},{"given":"Meng","family":"Xing","sequence":"additional","affiliation":[{"name":"College of Software, Northeastern University, Shenyang 110167, China"}]},{"given":"Jingjing","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Software, Northeastern University, Shenyang 110167, China"}]},{"given":"Hai","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Software, Northeastern University, Shenyang 110167, China"}]},{"given":"Zhiliang","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Software, Northeastern University, Shenyang 110167, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,9,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2494","DOI":"10.1109\/TCSVT.2020.3021908","article-title":"Cryptanalysis of image ciphers with permutation-substitution network and chaos","volume":"31","author":"Chen","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"110344","DOI":"10.1016\/j.chaos.2020.110344","article-title":"Construction of one-way hash functions with increased key space using adaptive chaotic maps","volume":"141","author":"Tutueva","year":"2020","journal-title":"Chaos Solitons Fractals"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.1016\/j.ins.2020.09.032","article-title":"Cross-plane colour image encryption using a two-dimensional logistic tent modular map","volume":"546","author":"Hua","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2489","DOI":"10.1109\/TCSVT.2019.2925522","article-title":"The design of a novel multiple-parameter fractional number-theoretic transform and its application to image encryption","volume":"30","author":"Lima","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"6443","DOI":"10.1109\/TCSVT.2023.3270882","article-title":"Reversible data hiding in encrypted images with secret sharing and hybrid coding","volume":"33","author":"Yu","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","article-title":"An image encryption scheme based on a new hybrid chaotic map and optimized substitution box","volume":"99","author":"Farah","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"22595","DOI":"10.1007\/s11071-023-08985-8","article-title":"Signal-sensing dynamic S-box image encryption with 2D Griewank\u2013sin map","volume":"111","author":"Ding","year":"2023","journal-title":"Nonlinear Dyn."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"196326","DOI":"10.1109\/ACCESS.2020.3034666","article-title":"An effective image encryption method based on space filling curve and plaintext-related Josephus traversal","volume":"8","author":"Niu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"e1606","DOI":"10.7717\/peerj-cs.1606","article-title":"Enhanced payload volume in the least significant bits image steganography using hash function","volume":"9","author":"Ghadi","year":"2023","journal-title":"PeerJ Comput. Sci."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"107879","DOI":"10.1016\/j.optlastec.2022.107879","article-title":"Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion","volume":"149","author":"Huang","year":"2022","journal-title":"Opt. Laser Technol."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Wang, C., Sun, J., and Yu, F. (2023). A chaotic image encryption method based on the artificial fish swarms algorithm and the DNA coding. Mathematics, 11.","DOI":"10.3390\/math11030767"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1957","DOI":"10.1109\/TII.2022.3176054","article-title":"An image security model based on chaos and DNA cryptography for IIoT images","volume":"19","author":"Singh","year":"2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"4388","DOI":"10.1109\/TCSVT.2023.3237136","article-title":"Asynchronous updating Boolean network encryption algorithm","volume":"33","author":"Gao","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","article-title":"Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network","volume":"539","author":"Wang","year":"2020","journal-title":"Inf. Sci."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4103","DOI":"10.1109\/TCSI.2023.3296693","article-title":"An efficient image encryption algorithm based on innovative DES structure and hyperchaotic keys","volume":"70","author":"Li","year":"2023","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.ins.2021.04.013","article-title":"A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient","volume":"569","author":"Wang","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"4689","DOI":"10.1109\/TCSVT.2023.3246520","article-title":"Visualized multiple image selection encryption based on log chaos system and multilayer cellular automata saliency detection","volume":"33","author":"Su","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"110582","DOI":"10.1016\/j.chaos.2020.110582","article-title":"High-sensitivity image encryption algorithm with random cross diffusion based on dynamically random coupled map lattice model","volume":"143","author":"Wang","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1109\/TCSI.2021.3133318","article-title":"A new full chaos coupled mapping lattice and its application in privacy image encryption","volume":"69","author":"Wang","year":"2021","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.sigpro.2018.11.010","article-title":"A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation","volume":"157","author":"Balafar","year":"2019","journal-title":"Signal Process."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"107484","DOI":"10.1016\/j.sigpro.2020.107484","article-title":"A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks","volume":"171","author":"Zhou","year":"2020","journal-title":"Signal Process."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"108041","DOI":"10.1016\/j.sigpro.2021.108041","article-title":"Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption","volume":"183","author":"Chai","year":"2021","journal-title":"Signal Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.physrep.2020.07.005","article-title":"COVID-19 and SARS-CoV-2. Modeling the present, looking at the future","volume":"869","author":"Estrada","year":"2021","journal-title":"Phys. Rep."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/MMUL.2024.3356494","article-title":"Cryptanalyzing an image encryption algorithm underpinned by 2D lag-complex logistic map","volume":"31","author":"Li","year":"2024","journal-title":"IEEE MultiMedia"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MMUL.2021.3080579","article-title":"Characteristic analysis of 2D lag-complex logistic map and its application in image encryption","volume":"28","author":"Zhang","year":"2021","journal-title":"IEEE MultiMedia"},{"key":"ref_26","first-page":"102361","article-title":"When an attacker meets a cipher-image in 2018: A year in review","volume":"48","author":"Li","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1142\/S0218127499001024","article-title":"Yet another chaotic attractor","volume":"9","author":"Chen","year":"1999","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Chen, G., and Yang, J. (2002). Chaos in Circuits and Systems, World Scientific.","DOI":"10.1142\/9789812705303"},{"key":"ref_29","first-page":"204","article-title":"An application of the theory of probabilities to the study of a priori pathometry\u2014Part I","volume":"92","author":"Ross","year":"1916","journal-title":"Contain. Pap. A Math. Phys. Character"},{"key":"ref_30","first-page":"212","article-title":"An application of the theory of probabilities to the study of a priori pathometry\u2014Part II","volume":"93","author":"Ross","year":"1917","journal-title":"Contain. Pap. A Math. Phys. Character"},{"key":"ref_31","first-page":"225","article-title":"An application of the theory of probabilities to the study of a priori pathometry\u2014Part III","volume":"93","author":"Ross","year":"1917","journal-title":"Contain. Pap. A Math. Phys. Character"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"34","DOI":"10.2307\/2341437","article-title":"The interpretation of periodicity in disease prevalence","volume":"92","author":"Soper","year":"1929","journal-title":"J. R. Stat. Soc."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1073\/pnas.28.9.361","article-title":"The epidemic curve","volume":"28","author":"Wilson","year":"1942","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_34","first-page":"104","article-title":"Transmission and control of arbovirus disease","volume":"104","author":"Dietz","year":"1975","journal-title":"Epidemiology"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1137\/030600370","article-title":"A vaccination model for transmission dynamics of influenza","volume":"3","author":"Alexander","year":"2004","journal-title":"SIAM J. Appl. Dyn. Syst."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"4028","DOI":"10.1109\/TCSVT.2021.3108767","article-title":"Double parameters fractal sorting matrix and its application in image encryption","volume":"32","author":"Xian","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_37","unstructured":"USC-SIPI (2022, February 01). The USC-SIPI Image Database. Available online: http:\/\/sipi.usc.edu\/services\/database."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","article-title":"An efficient image encryption scheme based on the LSS chaotic map and single S-box","volume":"8","author":"Lu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"27361","DOI":"10.1109\/ACCESS.2020.2971759","article-title":"A fast chaotic image encryption scheme with simultaneous permutation-diffusion operation","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"107252","DOI":"10.1016\/j.optlastec.2021.107252","article-title":"Image encryption algorithm based on 2D hyperchaotic map","volume":"142","author":"Gao","year":"2021","journal-title":"Opt. Laser Technol."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","article-title":"2D Logistic-Sine-coupling map for image encryption","volume":"149","author":"Hua","year":"2018","journal-title":"Signal Process."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"2506","DOI":"10.1109\/TCSVT.2022.3222559","article-title":"Image encryption via complementary embedding algorithm and new spatiotemporal chaotic system","volume":"33","author":"Liu","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"3973","DOI":"10.1007\/s11760-023-02991-4","article-title":"Development of scalable coding of encrypted images using Modified Absolute Moment Block Truncation Code","volume":"18","author":"Pankiraj","year":"2024","journal-title":"Signal Image Video Process."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"110686","DOI":"10.1016\/j.chaos.2021.110686","article-title":"A novel fractional nonautonomous chaotic circuit model and its application to image encryption","volume":"144","author":"Kamal","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"2511","DOI":"10.1109\/TCSI.2023.3250713","article-title":"Globally coupled private image encryption algorithm based on infinite interval spatiotemporal chaotic system","volume":"70","author":"Liu","year":"2023","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"110970","DOI":"10.1016\/j.chaos.2021.110970","article-title":"Spatiotemporal chaos in multiple coupled mapping lattices with multi-dynamic coupling coefficient and its application in color image encryption","volume":"147","author":"Wang","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"106371","DOI":"10.1016\/j.optlaseng.2020.106371","article-title":"A fast and secure public-key image encryption scheme based on Mordell elliptic curves","volume":"137","author":"Azam","year":"2021","journal-title":"Opt. Lasers Eng."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"110102","DOI":"10.1016\/j.chaos.2020.110102","article-title":"A new one-dimensional chaotic system with applications in image encryption","volume":"139","author":"Wang","year":"2020","journal-title":"Chaos Solitons Fractals"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"3821","DOI":"10.1007\/s11760-023-02610-2","article-title":"Development of scalable coding on encrypted images using BTC for different non-overlapping block size","volume":"17","author":"Pankiraj","year":"2023","journal-title":"Signal Image Video Process."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/26\/9\/760\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:48:51Z","timestamp":1760111331000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/26\/9\/760"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,5]]},"references-count":49,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["e26090760"],"URL":"https:\/\/doi.org\/10.3390\/e26090760","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2024,9,5]]}}}