{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T22:56:40Z","timestamp":1762642600458,"version":"build-2065373602"},"reference-count":46,"publisher":"MDPI AG","issue":"20","license":[{"start":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T00:00:00Z","timestamp":1634169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61907039","41801365"],"award-info":[{"award-number":["61907039","41801365"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Central Universities, China University of Geosciences, Wuhan","award":["CUGGC05"],"award-info":[{"award-number":["CUGGC05"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The purpose of this paper is to explore a novel image encryption algorithm that is developed by combining the fractional-order Chua\u2019s system and the 1D time-fractional diffusion system of order \u03b1\u2208(0,1]. To this end, we first discuss basic properties of the fractional-order Chua\u2019s system and the 1D time-fractional diffusion system. After these, a new spatiotemporal chaos-based cryptosystem is proposed by designing the chaotic sequence of the fractional-order Chua\u2019s system as the initial condition and the boundary conditions of the studied time-fractional diffusion system. It is shown that the proposed image encryption algorithm can gain excellent encryption performance with the properties of larger secret key space, higher sensitivity to initial-boundary conditions, better random-like sequence and faster encryption speed. Efficiency and reliability of the given encryption algorithm are finally illustrated by a computer experiment with detailed security analysis.<\/jats:p>","DOI":"10.3390\/s21206838","type":"journal-article","created":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T23:02:16Z","timestamp":1634252536000},"page":"6838","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Integrated Time-Fractional Diffusion Processes for Fractional-Order Chaos-Based Image Encryption"],"prefix":"10.3390","volume":"21","author":[{"given":"Fudong","family":"Ge","sequence":"first","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan 430074, China"}]},{"given":"Zufa","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan 430074, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7422-5988","authenticated-orcid":false,"given":"YangQuan","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Engineering (MESA-Lab), University of California, Merced, CA 95343, USA"}]}],"member":"1968","published-online":{"date-parts":[[2021,10,14]]},"reference":[{"key":"ref_1","first-page":"1","article-title":"Novel image encryption based on quantum walks","volume":"5","author":"Yang","year":"2015","journal-title":"Sci. Rep."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"10374","DOI":"10.1038\/srep10374","article-title":"Compressive optical image encryption","volume":"5","author":"Li","year":"2015","journal-title":"Sci. Rep."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","article-title":"On the derivation of a chaotic encryption algorithm","volume":"13","author":"Matthews","year":"1989","journal-title":"Cryptologia"},{"key":"ref_4","unstructured":"Uhl, A., and Pommer, A. (2004). Image and Video Encryption: From Digital Rights Management To Secured Personal Communication, Springer Science & Business Media."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Abd El-Samie, F.E., Ahmed, H.E.H., Elashry, I.F., Shahieen, M.H., Faragallah, O.S., El-Sayed, M., and Alshebeili, S.A. (2013). Image Encryption: A Communication Perspective, CRC Press.","DOI":"10.1201\/b16309"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","article-title":"Cosine-transform-based chaotic system for image encryption","volume":"480","author":"Hua","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1850010","DOI":"10.1142\/S0218127418500104","article-title":"A chaotic image encryption algorithm based on information entropy","volume":"28","author":"Ye","year":"2018","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","article-title":"A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice","volume":"273","author":"Zhang","year":"2014","journal-title":"Inf. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1007\/s11071-018-4390-z","article-title":"A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption","volume":"94","author":"Sahari","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1850132","DOI":"10.1142\/S0218127418501328","article-title":"Beta chaotic map based image encryption using genetic algorithm","volume":"28","author":"Kaur","year":"2018","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2696","DOI":"10.1109\/TNNLS.2015.2512849","article-title":"Impulsive synchronization of reaction\u2013diffusion neural networks with mixed delays and its application to image encryption","volume":"27","author":"Chen","year":"2016","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1850047","DOI":"10.1142\/S0218127418500475","article-title":"A new chaotic image encryption scheme using breadth-first search and dynamic diffusion","volume":"28","author":"Yin","year":"2018","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1950115","DOI":"10.1142\/S0218127419501153","article-title":"A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture","volume":"29","author":"Cheng","year":"2019","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Wu, X., Li, Y., and Kurths, J. (2015). A new color image encryption scheme using CML and a fractional-order chaotic system. PLoS ONE, 10.","DOI":"10.1371\/journal.pone.0119660"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1049\/iet-ipr.2019.0771","article-title":"Novel multiple images encryption algorithm using CML system and DNA encoding","volume":"14","author":"Zhang","year":"2019","journal-title":"IET Image Process."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1007\/s11071-016-2912-0","article-title":"An image encryption scheme combining chaos-memory cellular automata and weighted histogram","volume":"86","author":"Souyah","year":"2016","journal-title":"Nonlinear Dyn."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","article-title":"Color image encryption based on hybrid hyper-chaotic system and cellular automata","volume":"90","author":"Niyat","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"28025","DOI":"10.1007\/s11042-019-07893-7","article-title":"A new RGB image encryption using generalized heat equation associated with generalized Vigenere-type table over symmetric group","volume":"78","author":"Kumar","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"115670","DOI":"10.1016\/j.image.2019.115670","article-title":"A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system","volume":"80","author":"Kang","year":"2020","journal-title":"Signal Process. Image Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JAS.2016.7510127","article-title":"The switching fractional order chaotic system and its application to image encryption","volume":"4","author":"Hou","year":"2016","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Wang, X., Su, Y., Luo, C., and Wang, C. (2020). A novel image encryption algorithm based on fractional order 5D cellular neural network and Fisher-Yates scrambling. PLoS ONE, 15.","DOI":"10.1371\/journal.pone.0236015"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.ins.2020.10.048","article-title":"A new fractional one dimensional chaotic map and its application in high-speed image encryption","volume":"550","author":"Talhaoui","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1222","DOI":"10.1515\/fca-2016-0063","article-title":"Fractional calculus in image processing: A review","volume":"19","author":"Yang","year":"2016","journal-title":"Fract. Calc. Appl. Anal."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.ins.2018.10.023","article-title":"Event-triggered boundary feedback control for networked reaction-subdiffusion processes with input uncertainties","volume":"476","author":"Ge","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1007\/s11071-019-05338-2","article-title":"Observer-based event-triggered control for semilinear time-fractional diffusion systems with distributed feedback","volume":"99","author":"Ge","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.physa.2005.11.015","article-title":"Fractional vector calculus for fractional advection\u2014Dispersion","volume":"367","author":"Meerschaert","year":"2006","journal-title":"Phys. Stat. Mech. Its Appl."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Ge, F., Chen, Y., and Kou, C. (2018). Regional Analysis of Time-Fractional Diffusion Processes, Springer.","DOI":"10.1007\/978-3-319-72896-4"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Hilfer, R. (2000). Applications of Fractional Calculus in Physics, World Scientific.","DOI":"10.1142\/9789812817747"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0370-1573(00)00070-3","article-title":"The random walk\u2019s guide to anomalous diffusion: A fractional dynamics approach","volume":"339","author":"Metzler","year":"2000","journal-title":"Phys. Rep."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.automatica.2016.10.018","article-title":"Regional controllability analysis of fractional diffusion equations with Riemann\u2013Liouville time fractional derivatives","volume":"76","author":"Ge","year":"2017","journal-title":"Automatica"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.isatra.2021.01.023","article-title":"Optimal vaccination and treatment policies for regional approximate controllability of the time-fractional reaction-diffusion SIR epidemic systems","volume":"115","author":"Ge","year":"2021","journal-title":"ISA Trans."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Song, W., Ge, F., and Chen, Y. (2019). Subdiffusive Source Sensing by a Regional Detection Method. Sensors, 19.","DOI":"10.3390\/s19163504"},{"key":"ref_33","unstructured":"Kilbas, A.A., Srivastava, H.M., and Trujillo, J.J. (2006). Theory and Applications of Fractional Differential Equations, Elsevier Science Limited."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1262","DOI":"10.1515\/fca-2016-0065","article-title":"On the regional controllability of the sub-diffusion process with Caputo fractional derivative","volume":"19","author":"Ge","year":"2016","journal-title":"Fract. Calc. Appl. Anal."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"2443","DOI":"10.1142\/S0218127496001594","article-title":"Lorenz Equation and Chua\u2019s Equation","volume":"6","author":"Pivka","year":"1996","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Petr\u00e1\u0161, I. (2011). Fractional-Order Nonlinear Systems: Modeling, Analysis and Simulation, Springer.","DOI":"10.1007\/978-3-642-18101-6"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"3639","DOI":"10.1002\/rnc.4958","article-title":"Regional output feedback stabilization of semilinear time-fractional diffusion systems in a parallelepipedon with control constraints","volume":"30","author":"Ge","year":"2020","journal-title":"Int. J. Robust Nonlinear Control."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.automatica.2016.07.023","article-title":"On the regional gradient observability of time fractional diffusion processes","volume":"74","author":"Ge","year":"2016","journal-title":"Automatica"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.cam.2015.11.037","article-title":"High-order approximation to Caputo derivatives and Caputo-type advection\u2013diffusion equations (III)","volume":"299","author":"Li","year":"2016","journal-title":"J. Comput. Appl. Math."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Stinson, D.R., and Paterson, M. (2018). Cryptography: Theory and Practice, CRC Press.","DOI":"10.1201\/9781315282497"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"13792","DOI":"10.1109\/ACCESS.2020.2966264","article-title":"Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1007\/s11071-012-0409-z","article-title":"An efficient chaotic image encryption algorithm based on a generalized Arnold map","volume":"69","author":"Ye","year":"2012","journal-title":"Nonlinear Dyn."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1007\/s11071-019-05378-8","article-title":"Colour light field image encryption based on DNA sequences and chaotic systems","volume":"99","author":"Wen","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","article-title":"Color image DNA encryption using NCA map-based CML and one-time keys","volume":"148","author":"Wu","year":"2018","journal-title":"Signal Process."},{"key":"ref_45","first-page":"1","article-title":"Color image encryption based on chaotic compressed sensing and two-dimensional fractional Fourier transform","volume":"10","author":"Wang","year":"2020","journal-title":"Sci. Rep."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.sigpro.2019.06.013","article-title":"An image encryption scheme based on hybridizing digital chaos and finite state machine","volume":"164","author":"Alawida","year":"2019","journal-title":"Signal Process."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/20\/6838\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:14:38Z","timestamp":1760166878000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/20\/6838"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,14]]},"references-count":46,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2021,10]]}},"alternative-id":["s21206838"],"URL":"https:\/\/doi.org\/10.3390\/s21206838","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,10,14]]}}}