{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:18:32Z","timestamp":1773800312330,"version":"3.50.1"},"reference-count":33,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Multimedia data play an important role in our daily lives. The evolution of internet technologies means that multimedia data can easily participate amongst various users for specific purposes, in which multimedia data confidentiality and integrity have serious security issues. Chaos models play an important role in designing robust multimedia data cryptosystems. In this paper, a novel chaotic oscillator is presented. The oscillator has a particular property in which the chaotic dynamics are around pre-located manifolds. Various dynamics of the oscillator are studied. After analyzing the complex dynamics of the oscillator, it is applied to designing a new image cryptosystem, in which the results of the presented cryptosystem are tested from various viewpoints such as randomness, time encryption, correlation, plain image sensitivity, key-space, key sensitivity, histogram, entropy, resistance to classical types of attacks, and data loss analyses. The goal of the paper is proposing an applicable encryption method based on a novel chaotic oscillator with an attractor around a pre-located manifold. All the investigations confirm the reliability of using the presented cryptosystem for various IoT applications from image capture to use it.<\/jats:p>","DOI":"10.3390\/s22010334","type":"journal-article","created":{"date-parts":[[2022,1,9]],"date-time":"2022-01-09T23:08:26Z","timestamp":1641769706000},"page":"334","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold"],"prefix":"10.3390","volume":"22","author":[{"given":"Li","family":"Li","sequence":"first","affiliation":[{"name":"Shenzhen Institute of Information Technology, Shenzhen 518172, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5068-2033","authenticated-orcid":false,"given":"Ahmed A.","family":"Abd El-Latif","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6845-7539","authenticated-orcid":false,"given":"Sajad","family":"Jafari","sequence":"additional","affiliation":[{"name":"Department of Biomedical Engineering, Amirkabir University of Technology, 424 Hafez Ave., Tehran 15875-4413, Iran"},{"name":"Health Technology Research Institute, Amirkabir University of Technology, No. 350, Hafez Ave., Valiasr Square, Tehran 159163-4311, Iran"}]},{"given":"Karthikeyan","family":"Rajagopal","sequence":"additional","affiliation":[{"name":"Center for Nonlinear Systems, Chennai Institute of Technology, Chennai 600069, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2664-9006","authenticated-orcid":false,"given":"Fahimeh","family":"Nazarimehr","sequence":"additional","affiliation":[{"name":"Department of Biomedical Engineering, Amirkabir University of Technology, 424 Hafez Ave., Tehran 15875-4413, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4739-0037","authenticated-orcid":false,"given":"Bassem","family":"Abd-El-Atty","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computers and Information, Luxor University, Luxor 85957, Egypt"}]}],"member":"1968","published-online":{"date-parts":[[2022,1,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/TNSM.2020.2969863","article-title":"Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario","volume":"17","author":"Mazurczyk","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bubukayr, M.A.S., and Almaiah, M.A. (2021, January 14\u201315). Cybersecurity concerns in smart-phones and applications: A survey. Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan.","DOI":"10.1109\/ICIT52682.2021.9491691"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Almaiah, M.A. (2021). Almaiah, M.A. A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technology. Artificial Intelligence and Blockchain for Future Cybersecurity Applications, Springer.","DOI":"10.1007\/978-3-030-74575-2_12"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"AlMedires, M., and AlMaiah, M. (2021, January 14\u201315). Cybersecurity in Industrial Control System (ICS). Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan.","DOI":"10.1109\/ICIT52682.2021.9491741"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"053129","DOI":"10.1063\/5.0008875","article-title":"A simple no-equilibrium chaotic system with only one signum function for generating multidirectional variable hidden attractors and its hardware implementation","volume":"30","author":"Zhang","year":"2020","journal-title":"Chaos Interdiscip. J. Nonlinear Sci."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/0375-9601(76)90101-8","article-title":"An equation for continuous chaos","volume":"57","year":"1976","journal-title":"Phys. Lett. A"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1264","DOI":"10.1016\/j.cnsns.2011.07.017","article-title":"A chaotic system with only one stable equilibrium","volume":"17","author":"Wang","year":"2012","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Petrzela, J. (2018). Strange Attractors Generated by Multiple-Valued Static Memory Cell with Polynomial Approximation of Resonant Tunneling Diodes. Entropy, 20.","DOI":"10.3390\/e20090697"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"283","DOI":"10.3390\/telecom1030019","article-title":"A Novel Chaotic System with a Line Equilibrium: Analysis and Its Applications to Secure Communication and Random Bit Generation","volume":"1","author":"Moysis","year":"2020","journal-title":"Telecom"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1309","DOI":"10.1140\/epjst\/e2020-900197-4","article-title":"Hyperchaotic attractors through coupling of systems without equilibria","volume":"229","author":"Campos","year":"2020","journal-title":"Eur. Phys. J. Spec. Top."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Wang, X., \u00c7avu\u015fo\u011flu, \u00dc., Kacar, S., Akgul, A., Pham, V.T., Jafari, S., Alsaadi, F.E., and Nguyen, X.Q. (2019). S-box based image encryption application using a chaotic system without equilibrium. Appl. Sci., 9.","DOI":"10.3390\/app9040781"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"105494","DOI":"10.1016\/j.cnsns.2020.105494","article-title":"Hidden attractors and multistability in a modified Chua\u2019s circuit","volume":"92","author":"Wang","year":"2021","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"075216","DOI":"10.1088\/1402-4896\/ab92da","article-title":"A novel chaotic hyperjerk circuit with bubbles of bifurcation: Mixed-mode bursting oscillations, multistability, and circuit realization","volume":"95","author":"Leutcho","year":"2020","journal-title":"Phys. Scr."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1995","DOI":"10.1140\/epjst\/e2019-800238-0","article-title":"Extreme multistability in memristive hyper-jerk system and stability mechanism analysis using dimensionality reduction model","volume":"228","author":"Zhang","year":"2019","journal-title":"Eur. Phys. J. Spec. Top."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2030029","DOI":"10.1142\/S0218127420300293","article-title":"Memristor initial-offset boosting in memristive HR neuron model with hidden firing patterns","volume":"30","author":"Bao","year":"2020","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2050142","DOI":"10.1142\/S0218127420501424","article-title":"A New 4D Chaotic System with Coexisting Hidden Chaotic Attractors","volume":"30","author":"Gong","year":"2020","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.1016\/j.ins.2020.09.032","article-title":"Cross-plane colour image encryption using a two-dimensional logistic tent modular map","volume":"546","author":"Hua","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1007\/s11517-021-02328-8","article-title":"An efficient medical image encryption using hybrid DNA computing and chaos in transform domain","volume":"59","author":"Ravichandran","year":"2021","journal-title":"Med. Biol. Eng. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-021-03187-w","article-title":"Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4D hyper-chaotic Henon map","volume":"20","author":"Dai","year":"2021","journal-title":"Quantum Inf. Process."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"106881","DOI":"10.1016\/j.optlaseng.2021.106881","article-title":"New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method","volume":"150","author":"Duan","year":"2022","journal-title":"Opt. Lasers Eng."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Tong, L.J., Zhou, N.R., Huang, Z.J., Xie, X.W., and Liang, Y.R. (2021). Nonlinear Multi-Image Encryption Scheme with the Reality-Preserving Discrete Fractional Angular Transform and DNA Sequences. Secur. Commun. Netw., 2021.","DOI":"10.1155\/2021\/6650515"},{"key":"ref_22","first-page":"6461","article-title":"A new hybrid text encryption approach over mobile ad hoc network","volume":"10","author":"Almaiah","year":"2020","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1016\/j.cjph.2020.08.018","article-title":"Design and implementation of a new memristive chaotic system with application in touchless fingerprint encryption","volume":"67","author":"Lai","year":"2020","journal-title":"Chin. J. Phys."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"109646","DOI":"10.1016\/j.chaos.2020.109646","article-title":"Randomness improvement of chaotic maps for image encryption in a wireless communication scheme using PIC-microcontroller via Zigbee channels","volume":"133","year":"2020","journal-title":"Chaos Solitons Fractals"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42452-019-1685-8","article-title":"A novel encryption method for medical images using 2D Zaslavski map and DNA cryptography","volume":"2","author":"Chirakkarottu","year":"2020","journal-title":"SN Appl. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s40819-020-00934-y","article-title":"Changing dynamics of the first, second and third approximations of the exponential chaotic system and their application in secure communication using synchronization","volume":"7","author":"Khan","year":"2021","journal-title":"Int. J. Appl. Comput. Math."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"El-Latif, A.A.A., Abd-El-Atty, B., Belazi, A., and Iliyasu, A.M. (2021). Efficient Chaos-Based Substitution-Box and Its Application to Image Encryption. Electronics, 10.","DOI":"10.3390\/electronics10121392"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Abd-El-Atty, B., Iliyasu, A.M., Alaskar, H., El-Latif, A., and Ahmed, A. (2020). A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors, 20.","DOI":"10.3390\/s20113108"},{"key":"ref_29","unstructured":"(2021, September 03). True Color Kodak Images. Available online: http:\/\/r0k.us\/graphics\/kodak\/."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Alanezi, A., Abd-El-Atty, B., Kolivand, H., El-Latif, A., Ahmed, A., El-Rahiem, A., Sankar, S., and S Khalifa, H. (2021). Securing digital images through simple permutation-substitution mechanism in cloud-based smart city environment. Secur. Commun. Netw., 2021.","DOI":"10.1155\/2021\/6615512"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","article-title":"Fractal sorting matrix and its application on chaotic image encryption","volume":"547","author":"Xian","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","article-title":"Cosine-transform-based chaotic system for image encryption","volume":"480","author":"Hua","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_33","first-page":"1","article-title":"Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications","volume":"10","author":"Amin","year":"2020","journal-title":"Sci. Rep."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/1\/334\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:59:58Z","timestamp":1760363998000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/1\/334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,3]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,1]]}},"alternative-id":["s22010334"],"URL":"https:\/\/doi.org\/10.3390\/s22010334","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,3]]}}}