{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T08:16:12Z","timestamp":1770884172346,"version":"3.50.1"},"reference-count":48,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T00:00:00Z","timestamp":1754438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100005047","name":"Natural Science Foundation of Liaoning Province of China","doi-asserted-by":"publisher","award":["2022-MS-123"],"award-info":[{"award-number":["2022-MS-123"]}],"id":[{"id":"10.13039\/501100005047","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005047","name":"Natural Science Foundation of Liaoning Province of China","doi-asserted-by":"publisher","award":["61977014"],"award-info":[{"award-number":["61977014"]}],"id":[{"id":"10.13039\/501100005047","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005047","name":"Natural Science Foundation of Liaoning Province of China","doi-asserted-by":"publisher","award":["61902056"],"award-info":[{"award-number":["61902056"]}],"id":[{"id":"10.13039\/501100005047","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005047","name":"Natural Science Foundation of Liaoning Province of China","doi-asserted-by":"publisher","award":["61603082"],"award-info":[{"award-number":["61603082"]}],"id":[{"id":"10.13039\/501100005047","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Natural Science Foundation of China","award":["2022-MS-123"],"award-info":[{"award-number":["2022-MS-123"]}]},{"name":"National Natural Science Foundation of China","award":["61977014"],"award-info":[{"award-number":["61977014"]}]},{"name":"National Natural Science Foundation of China","award":["61902056"],"award-info":[{"award-number":["61902056"]}]},{"name":"National Natural Science Foundation of China","award":["61603082"],"award-info":[{"award-number":["61603082"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>In recent years, most proposed digital image encryption algorithms have primarily focused on encrypting raw pixel data, often neglecting the integration with image compression techniques. Image compression algorithms, such as JPEG, are widely utilized in internet applications, highlighting the need for encryption methods that are compatible with compression processes. This study introduces an innovative color image encryption algorithm integrated with JPEG compression, designed to enhance the security of images susceptible to attacks or tampering during prolonged transmission. The research addresses critical challenges in achieving an optimal balance between encryption security and compression efficiency. The proposed encryption algorithm is structured around three key compression phases: Discrete Cosine Transform (DCT), quantization, and entropy coding. At each stage, the algorithm incorporates advanced techniques such as block segmentation, block replacement, DC coefficient confusion, non-zero AC coefficient transformation, and RSV (Run\/Size and Value) pair recombination. Extensive simulations and security analyses demonstrate that the proposed algorithm exhibits strong robustness against noise interference and data loss, effectively meeting stringent security performance requirements.<\/jats:p>","DOI":"10.3390\/e27080838","type":"journal-article","created":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T08:33:06Z","timestamp":1754555586000},"page":"838","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Chaos-Based Color Image Encryption with JPEG Compression: Balancing Security and Compression Efficiency"],"prefix":"10.3390","volume":"27","author":[{"given":"Wei","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Software, Northeastern University, Shenyang 110167, China"}]},{"given":"Xue","family":"Zheng","sequence":"additional","affiliation":[{"name":"College of Software, Northeastern University, Shenyang 110167, China"}]},{"given":"Meng","family":"Xing","sequence":"additional","affiliation":[{"name":"College of Software, Northeastern University, Shenyang 110167, China"}]},{"given":"Jingjing","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Software, Northeastern University, Shenyang 110167, China"}]},{"given":"Hai","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Software, Northeastern University, Shenyang 110167, China"}]},{"given":"Zhiliang","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Software, Northeastern University, Shenyang 110167, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,8,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.sigpro.2019.06.010","article-title":"An overview of encryption algorithms in color images","volume":"164","author":"Ghadirli","year":"2019","journal-title":"Signal Process."},{"key":"ref_2","first-page":"102711","article-title":"Chaos and compressive sensing based novel image encryption scheme","volume":"58","author":"Khan","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.optlaseng.2019.04.011","article-title":"A fast image encryption algorithm based on compressive sensing and hyperchaotic map","volume":"121","author":"Xu","year":"2019","journal-title":"Opt. Lasers Eng."},{"key":"ref_4","unstructured":"Fridrich, J. (1997, January 12\u201315). Image encryption based on chaotic maps. Proceedings of the 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, Orlando, FL, USA."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"12537","DOI":"10.1007\/s11071-024-09670-0","article-title":"Image scrambling encryption using chaotic map and genetic algorithm: A hybrid approach for enhanced security","volume":"112","author":"Kumar","year":"2024","journal-title":"Nonlinear Dyn."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"124904","DOI":"10.1016\/j.eswa.2024.124904","article-title":"Developing a secure image encryption technique using a novel S-box constructed through real-coded genetic algorithm\u2019s crossover and mutation operators","volume":"256","author":"Ustun","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Zhu, S., Deng, X., Zhang, W., and Zhu, C. (2023). Image encryption scheme based on newly designed chaotic map and parallel DNA coding. Mathematics, 11.","DOI":"10.3390\/math11010231"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"26927","DOI":"10.1007\/s11042-020-09058-3","article-title":"A modified method for image encryption based on chaotic map and genetic algorithm","volume":"79","author":"Ghazvini","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"115001","DOI":"10.1016\/j.chaos.2024.115001","article-title":"Text visualization encryption based on coordinate substitution and chaotic system","volume":"184","author":"Lu","year":"2024","journal-title":"Chaos Solitons Fractals"},{"key":"ref_10","first-page":"103995","article-title":"Novel image encryption algorithm utilizing hybrid chaotic maps and Elliptic Curve Cryptography with genetic algorithm","volume":"89","author":"Pandey","year":"2025","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"103980","DOI":"10.1016\/j.csi.2025.103980","article-title":"S-box using fractional-order 4D hyperchaotic system and its application to RSA cryptosystem-based color image encryption","volume":"93","author":"Ullah","year":"2025","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1859","DOI":"10.1007\/s11071-021-06663-1","article-title":"Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion","volume":"105","author":"Teng","year":"2021","journal-title":"Nonlinear Dyn."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"126521","DOI":"10.1016\/j.eswa.2025.126521","article-title":"A secure medical image encryption algorithm for IoMT using a Quadratic-Sine chaotic map and pseudo-parallel confusion-diffusion mechanism","volume":"270","author":"Mansouri","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"107722","DOI":"10.1016\/j.future.2025.107722","article-title":"Using binary hash tree-based encryption to secure a deep learning model and generated images for social media applications","volume":"166","author":"Rohhila","year":"2025","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_15","unstructured":"(1994). Information technology\u2014Digital compression and coding of continuous-tone still images\u2014Part 1: Requirements and guidelines (Standard No. ISO\/IEC 10918-1:1994)."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/j.procs.2017.08.026","article-title":"A novel selective encryption scheme for medical images transmission based-on JPEG compression algorithm","volume":"112","author":"Abdmouleh","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_17","unstructured":"Li, Z., Sun, X., Du, C., and Ding, Q. (2013, January 21\u201323). JPEG algorithm analysis and application in image compression encryption of digital chaos. Proceedings of the 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control, Shenyang, China."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.jvcir.2018.11.018","article-title":"Joint image encryption and compression schemes based on 16 \u00d7 16 DCT","volume":"58","author":"Li","year":"2019","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/3570165","article-title":"A DNA based colour image encryption scheme using a convolutional autoencoder","volume":"19","author":"Ahmed","year":"2023","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2528","DOI":"10.1109\/TMM.2022.3148591","article-title":"JPEG image encryption with adaptive DC coefficient prediction and RS pair permutation","volume":"25","author":"Qin","year":"2022","journal-title":"IEEE Trans. Multimed."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"106393","DOI":"10.1016\/j.optlaseng.2020.106393","article-title":"Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence","volume":"137","author":"Wang","year":"2021","journal-title":"Opt. Lasers Eng."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"165737","DOI":"10.1016\/j.ijleo.2020.165737","article-title":"An image encryption approach on the basis of a time delay chaotic system","volume":"225","author":"Wang","year":"2021","journal-title":"Optik"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"106837","DOI":"10.1016\/j.optlastec.2020.106837","article-title":"A chaotic image encryption algorithm based on random dynamic mixing","volume":"138","author":"Wang","year":"2021","journal-title":"Opt. Laser Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1016\/j.ins.2020.11.045","article-title":"Image encryption using q-deformed logistic map","volume":"552","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"166728","DOI":"10.1016\/j.ijleo.2021.166728","article-title":"A color image encryption scheme reducing the correlations between R, G, B components","volume":"237","author":"Yildirim","year":"2021","journal-title":"Optik"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Kurihara, K., Shiota, S., and Kiya, H. (June, January 31). An encryption-then-compression system for jpeg standard. Proceedings of the 2015 Picture Coding Symposium (PCS), Cairns, Australia.","DOI":"10.1109\/PCS.2015.7170059"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2238","DOI":"10.1587\/transfun.E98.A.2238","article-title":"An encryption-then-compression system for jpeg\/motion jpeg standard","volume":"98","author":"Kurihara","year":"2015","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"ref_28","first-page":"8887","article-title":"A survey based on designing an efficient image encryption-then-compression system","volume":"975","author":"Nimbokar","year":"2014","journal-title":"Int. J. Comput. Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.procs.2020.03.218","article-title":"Joint image compression and encryption using a novel column-wise scanning and optimization algorithm","volume":"167","author":"Chaudhary","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Li, P., and Lo, K. (2015, January 13\u201316). Joint image compression and encryption based on alternating transforms with quality control. Proceedings of the 2015 Visual Communications and Image Processing (VCIP), Singapore.","DOI":"10.1109\/VCIP.2015.7457867"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.jvcir.2017.01.021","article-title":"Joint image compression and encryption based on order-8 alternating transforms","volume":"44","author":"Li","year":"2017","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1960","DOI":"10.1109\/TMM.2017.2786860","article-title":"A content-adaptive joint image compression and encryption scheme","volume":"20","author":"Li","year":"2017","journal-title":"IEEE Trans. Multimed."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","article-title":"Reversible data hiding in encrypted JPEG bitstream","volume":"16","author":"Qian","year":"2014","journal-title":"IEEE Trans. Multimed."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"art00014","DOI":"10.2352\/ISSN.2470-1173.2016.11.IMAWM-461","article-title":"Robust and secure image encryption schemes during JPEG compression process","volume":"28","author":"He","year":"2016","journal-title":"Electron. Imaging"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Wang, F., and Bai, S. (2013, January 21\u201323). JPEG image encryption by shuffling DCT coefficients in defined block. Proceedings of the 2013 International Conference on Computational and Information Sciences, Shiyang, China.","DOI":"10.1109\/ICCIS.2013.24"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.cnsns.2014.09.011","article-title":"A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding","volume":"22","author":"Ji","year":"2015","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.jvcir.2019.03.021","article-title":"Huffman-code based retrieval for encrypted JPEG images","volume":"61","author":"Liang","year":"2019","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"3501","DOI":"10.1109\/TCSVT.2018.2882850","article-title":"A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams","volume":"29","author":"He","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1515","DOI":"10.1109\/TIFS.2018.2881677","article-title":"Encryption-then-compression systems using grayscale-based image encryption for JPEG images","volume":"14","author":"Chuman","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1016\/j.jvcir.2014.01.005","article-title":"A content security protection scheme in JPEG compressed domain","volume":"25","author":"Xu","year":"2014","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1109\/TMM.2020.2992940","article-title":"A new image compression algorithm based on non-uniform partition and U-system","volume":"23","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/TIFS.2013.2291625","article-title":"Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation","volume":"9","author":"Zhou","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1117\/12.55896","article-title":"The JPEG Still Picture Compression Algorithm and Its Applications","volume":"30","author":"Leger","year":"1991","journal-title":"SPIE J. Opt. Eng."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"5136","DOI":"10.7498\/aps.56.5136","article-title":"Hyperchaotic Lorenz system","volume":"56","author":"Wang","year":"2007","journal-title":"Acta Phys. Sin."},{"key":"ref_45","unstructured":"Xia, B. (2025, May 07). Digital Image Encryption Algorithm Based on 4D Hyperchaotic System. Available online: https:\/\/www.jiamisoft.com\/blog\/11493-siweishuzituxiangjiamisuanfa.html."},{"key":"ref_46","unstructured":"Weber, A. (2006). The USC-SIPI Image Database, University of Southern California. Available online: http:\/\/sipi.usc.edu\/database\/."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1007\/s11042-011-0775-4","article-title":"Combinational domain encryption for still visual data","volume":"59","author":"Taneja","year":"2012","journal-title":"Multimed. Tools Appl."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"14593","DOI":"10.1007\/s11071-024-09790-7","article-title":"A visual meaningful encryption and hiding algorithm for multiple images","volume":"112","author":"Ye","year":"2024","journal-title":"Nonlinear Dyn."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/27\/8\/838\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:24:57Z","timestamp":1760034297000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/27\/8\/838"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,6]]},"references-count":48,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["e27080838"],"URL":"https:\/\/doi.org\/10.3390\/e27080838","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,6]]}}}