{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T12:20:45Z","timestamp":1774182045938,"version":"3.50.1"},"reference-count":49,"publisher":"MDPI AG","issue":"24","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61771354"],"award-info":[{"award-number":["61771354"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Because images are vulnerable to external attacks in the process of network transmission and traditional image encryption algorithms have limitations such as long encryption time, insufficient entropy or poor diffusion of cipher image information when encrypting color images, a fast image encryption algorithm based on logistics-sine-cosine mapping is proposed. The algorithm first generates five sets of encrypted sequences from the logistics-sine-cosine mapping, then uses the order of the encryption sequence to scramble the image pixels and designs a new pixel diffusion network to further improve the key sensitivity and plain-image sensitivity of the encryption algorithm. Finally, in a series of security analysis experiments, the experimental image Lena was tested 100 times, and the average encryption time was 0.479 s. The average value of the information entropy, pixel change rate and uniform average change intensity of the cipher image reached 7.9994, 99.62% and 33.48%, respectively. The experimental results show that the fast image encryption algorithm based on logistics-sine-cosine mapping takes less time to encrypt, and the cipher image has good information entropy and diffusivity. It is a safe and effective fast image encryption algorithm.<\/jats:p>","DOI":"10.3390\/s22249929","type":"journal-article","created":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T09:31:01Z","timestamp":1671442261000},"page":"9929","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Fast Image Encryption Algorithm for Logistics-Sine-Cosine Mapping"],"prefix":"10.3390","volume":"22","author":[{"given":"Pengfei","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science, Yangtze University, Jingzhou 434023, China"}]},{"given":"Yixu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Yangtze University, Jingzhou 434023, China"}]},{"given":"Jiafu","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Yangtze University, Jingzhou 434023, China"}]},{"given":"Xiaoling","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Yangtze University, Jingzhou 434023, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Zhang, Q., and Ding, Q. (2015, January 18\u201320). Digital image encryption based on advanced encryption standard (AES). Proceedings of the 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), Qinhuangdao, China.","DOI":"10.1109\/IMCCC.2015.261"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.sigpro.2014.10.033","article-title":"A RGB image encryption algorithm based on total plain image characteristics and chaos","volume":"109","year":"2015","journal-title":"Signal Process."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.optlastec.2017.10.024","article-title":"A combination chaotic system and application in color image encryption","volume":"101","author":"Parvaz","year":"2018","journal-title":"Opt. Laser Technol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"111693","DOI":"10.1016\/j.chaos.2021.111693","article-title":"A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its\u2019 applications in image encryption","volume":"154","author":"Liu","year":"2022","journal-title":"Chaos Solitons Fractals"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"045204","DOI":"10.1088\/1402-4896\/ac59fa","article-title":"Efficient color image encryption algorithm based on 2D coupled chaos and multi-objective optimized S-box","volume":"97","author":"Yang","year":"2022","journal-title":"Phys. Scr."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s11277-022-09540-1","article-title":"New Encryption Algorithm for Secure Image Transmission Through Open Network","volume":"125","author":"Elkamchouchi","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"21779","DOI":"10.1007\/s11042-022-12472-4","article-title":"A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation","volume":"81","author":"Liu","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_8","first-page":"127291","article-title":"A novel image encryption algorithm based on DNA strand exchange and diffusion","volume":"430","author":"Zou","year":"2022","journal-title":"Appl. Math. Comput."},{"key":"ref_9","first-page":"1645","article-title":"Hyperchaos and MD5 Based Efficient Color Image Cipher","volume":"72","author":"Samiullah","year":"2022","journal-title":"CMC-Comput. Mater. Contin."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"112456","DOI":"10.1016\/j.chaos.2022.112456","article-title":"Image encryption algorithm based on hyperchaotic system and a new DNA sequence operation","volume":"162","author":"Yu","year":"2022","journal-title":"Chaos Solitons Fractals"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Liang, Z., Qin, Q., Zhou, C., and Xu, S. (2022). Color Image Encryption Algorithm Based on Four-Dimensional Multi-stable Hyper Chaotic System and DNA Strand Displacement. J. Electr. Eng. Technol., 1\u201321.","DOI":"10.1007\/s42835-022-01157-5"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"57","DOI":"10.3389\/fphy.2022.844966","article-title":"A Novel 3D Image Encryption Based on the Chaotic System and RNA Crossover and Mutation","volume":"10","author":"Chu","year":"2022","journal-title":"Front. Phys."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"169357","DOI":"10.1016\/j.ijleo.2022.169357","article-title":"Exploiting compressed sensing (CS) and RNA operations for effective content-adaptive image compression and encryption","volume":"263","author":"Lu","year":"2022","journal-title":"Optik"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"168961","DOI":"10.1016\/j.ijleo.2022.168961","article-title":"Using Ribonucleic acid (RNA) and H\u00e9non map in new image encryption scheme","volume":"259","author":"Ghorbani","year":"2022","journal-title":"Optik"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2250186","DOI":"10.1142\/S0218127422501863","article-title":"A Chaotic Image Encryption Scheme Based on Genetic Central Dogma and KMP Method","volume":"32","author":"Sha","year":"2022","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"055213","DOI":"10.1088\/1402-4896\/ac66a1","article-title":"Multiple-image encryption algorithm based on genetic central dogma","volume":"97","author":"Zhang","year":"2022","journal-title":"Phys. Scr."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"15876","DOI":"10.1109\/ACCESS.2022.3149424","article-title":"Secure Real-Time Chaotic Partial Encryption of Entropy-Coded Multimedia Information for Mobile Devices: Smartphones","volume":"10","year":"2022","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2250035","DOI":"10.1142\/S0218127422500353","article-title":"An optical image encryption algorithm based on a fractional-order laser hyperchaotic system","volume":"32","author":"Li","year":"2022","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1109\/LPT.2022.3169011","article-title":"Controllable Optical Vortex Array for Image Encoding","volume":"34","author":"Kumar","year":"2022","journal-title":"IEEE Photonics Technol. Lett."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1038\/s41377-021-00699-z","article-title":"Spatial nonlinear optics for securing information","volume":"11","author":"Chen","year":"2022","journal-title":"Light Sci. Appl."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Cheremkhin, P., Evtikhiev, N., Krasnov, V., Ryabcev, I., Shifrina, A., and Starikov, R. (2021). Lensless Optical Encryption of Multilevel Digital Data Containers Using Spatially Incoherent Illumination. Appl. Sci., 12.","DOI":"10.3390\/app12010406"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/s00340-022-07818-7","article-title":"Optical vortex array for two-dimensional exclusive-OR operation","volume":"128","author":"Kumar","year":"2022","journal-title":"Appl. Phys. B"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.ins.2011.11.026","article-title":"Multi-image encryption by circular random grids","volume":"189","author":"Chen","year":"2012","journal-title":"Inf. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2229","DOI":"10.1016\/j.sigpro.2012.02.015","article-title":"Yet another multiple-image encryption by rotating random grids","volume":"92","author":"Chen","year":"2012","journal-title":"Signal Process."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/TIFS.2014.2305574","article-title":"On the relation of random grid and deterministic visual cryptography","volume":"9","year":"2014","journal-title":"IEEE Trans. Inf. Secur."},{"key":"ref_26","first-page":"670","article-title":"A batch image encryption scheme based on chaining random grids","volume":"20","author":"Lin","year":"2013","journal-title":"Sci. Iran."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1137\/080722023","article-title":"Visual multiple-secret sharing by circle random grids","volume":"3","author":"Shyu","year":"2010","journal-title":"SIAM J. Imaging Sci."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1950115","DOI":"10.1142\/S0218127419501153","article-title":"A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture","volume":"29","author":"Cheng","year":"2019","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"31035","DOI":"10.1007\/s11042-018-7081-3","article-title":"Color image chaos encryption algorithm combining CRC and nine palace map","volume":"78","author":"Xiong","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","article-title":"A color image cryptosystem based on dynamic DNA encryption and chaos","volume":"155","author":"Chai","year":"2018","journal-title":"Signal Process."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"125206","DOI":"10.1088\/1402-4896\/ac95d9","article-title":"Design a new image encryption algorithm based on a 2D-ASCC map","volume":"97","author":"Fei","year":"2022","journal-title":"Phys. Scr."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"26535","DOI":"10.1007\/s11042-022-12139-0","article-title":"A novel design of multiple image encryption using perturbed chaotic map","volume":"81","author":"Hoang","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"16987","DOI":"10.1007\/s11042-022-12471-5","article-title":"On Chaos based duo confusion duo diffusion for colour images","volume":"81","author":"Sridevi","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"29653","DOI":"10.1007\/s11042-022-12779-2","article-title":"A new method in encryption of gray scale images using chaos game representation","volume":"81","author":"Pour","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"67669","DOI":"10.1109\/ACCESS.2022.3185229","article-title":"Color image encryption using 2d sine-cosine coupling map","volume":"10","author":"Zhang","year":"2022","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"110503","DOI":"10.1088\/1674-1056\/ac6861","article-title":"An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree","volume":"31","author":"Su","year":"2022","journal-title":"Chin. Phys. B"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1349","DOI":"10.1007\/s11036-022-01923-9","article-title":"Multiple Digital Image Encryption Algorithm Based on Chaos Algorithm","volume":"27","author":"Zhang","year":"2022","journal-title":"Mob. Netw. Appl."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Li, X., Yu, C., and Guo, J. (2022). Multi-Image Encryption Method via Computational Integral Imaging Algorithm. Entropy, 24.","DOI":"10.3390\/e24070996"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"5743","DOI":"10.1007\/s00521-021-06725-w","article-title":"Protection of image ROI using chaos-based encryption and DCNN-based object detection","volume":"34","author":"Song","year":"2022","journal-title":"Neural Comput. Appl."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1080\/09500340.2022.2110294","article-title":"Scattering-medium-based optical image encryption by chaos and digital optical phase conjugation","volume":"69","author":"Yu","year":"2022","journal-title":"J. Mod. Opt."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"137731","DOI":"10.1109\/ACCESS.2020.3010794","article-title":"A new chaotic map with dynamic analysis and encryption application in internet of health things","volume":"8","author":"Tsafack","year":"2020","journal-title":"IEEE Access"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Hosny, K.M., Kamal, S.T., and Darwish, M.M. (2022). A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Vis. Comput., 1\u201318.","DOI":"10.1007\/s00371-021-02382-1"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Wang, X., Su, Y., Liu, L., Zhang, H., and Di, S. (2021). Color image encryption algorithm based on Fisher-Yates scrambling and DNA subsequence operation. Vis. Comput., 1\u201316.","DOI":"10.1007\/s00371-021-02311-2"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1016\/j.ijleo.2017.08.050","article-title":"Cryptanalysis of a DNA and chaos based image encryption algorithm","volume":"145","author":"Dou","year":"2017","journal-title":"Optik"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s11071-016-3024-6","article-title":"An image encryption scheme combining chaos with cycle operation for DNA sequences","volume":"87","author":"Hu","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"Alvarez","year":"2006","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.matcom.2004.09.001","article-title":"The strict avalanche criterion randomness test","volume":"68","author":"Castro","year":"2005","journal-title":"Math. Comput. Simul."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1007\/s40998-022-00503-7","article-title":"Secure Encryption of Color Images with Chaotic Systems and Particle Swarm Optimization","volume":"46","author":"Adeel","year":"2022","journal-title":"Iran. J. Sci. Technol. Trans. Electr. Eng."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"168956","DOI":"10.1016\/j.ijleo.2022.168956","article-title":"Bit level color image encryption using Logistic-Sine-Tent-Chebyshev (LSTC) map","volume":"259","author":"Basha","year":"2022","journal-title":"Optik"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/24\/9929\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:42:48Z","timestamp":1760146968000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/24\/9929"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":49,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["s22249929"],"URL":"https:\/\/doi.org\/10.3390\/s22249929","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,16]]}}}