{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T20:00:30Z","timestamp":1778616030000,"version":"3.51.4"},"reference-count":70,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008809","name":"University of Hail","doi-asserted-by":"publisher","award":["RG-20091"],"award-info":[{"award-number":["RG-20091"]}],"id":[{"id":"10.13039\/501100008809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>In the Internet of Things (IoT), a lot of constrained devices are interconnected. The data collected from those devices can be the target of cyberattacks. In this paper, a lightweight cryptosystem that can be efficiently implemented in highly constrained IOT devices is proposed. The algorithm is mainly based on Advanced Encryption Standard (AES) and a new chaotic S-box. Since its adoption by the IEEE 802.15.4 protocol, AES in embedded platforms have been increasingly used. The main cryptographic properties of the generated S-box have been validated. The randomness of the generated S-box has been confirmed by the NIST tests. Experimental results and security analysis demonstrated that the cryptosystem can, on the one hand, reach good encryption results and respects the limitation of the sensor\u2019s resources, on the other hand. So the proposed solution could be reliably applied in image encryption and secure communication between networked smart objects.<\/jats:p>","DOI":"10.3390\/sym13010129","type":"journal-article","created":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T21:50:54Z","timestamp":1610574654000},"page":"129","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":73,"title":["Implementing a Symmetric Lightweight Cryptosystem in Highly Constrained IoT Devices by Using a Chaotic S-Box"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6819-3695","authenticated-orcid":false,"given":"Badr M.","family":"Alshammari","sequence":"first","affiliation":[{"name":"College of Engineering, University of Ha\u2019il, Ha\u2019il 81481, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8759-0151","authenticated-orcid":false,"given":"Ramzi","family":"Guesmi","sequence":"additional","affiliation":[{"name":"ISLAI B\u00e9ja, University of Jendouba, B\u00e9ja 9000, Tunisia"},{"name":"Laboratory of Electronics and Information Technology, National Engineering School of Sfax, Sfax University, Sfax 3038, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8221-2610","authenticated-orcid":false,"given":"Tawfik","family":"Guesmi","sequence":"additional","affiliation":[{"name":"College of Engineering, University of Ha\u2019il, Ha\u2019il 81481, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0581-7178","authenticated-orcid":false,"given":"Haitham","family":"Alsaif","sequence":"additional","affiliation":[{"name":"College of Engineering, University of Ha\u2019il, Ha\u2019il 81481, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1542-5939","authenticated-orcid":false,"given":"Ahmed","family":"Alzamil","sequence":"additional","affiliation":[{"name":"College of Engineering, University of Ha\u2019il, Ha\u2019il 81481, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2021,1,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2967","DOI":"10.1016\/j.comnet.2010.05.011","article-title":"The price of security in wireless sensor networks","volume":"54","author":"Lee","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Fernandez-Anez, V. (2016). Stakeholders approach to smart cities: A survey on smart city definitions. International Conference on Smart Cities, Springer.","DOI":"10.1007\/978-3-319-39595-1_16"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/MCOM.2013.6525606","article-title":"The pursuit of citizens\u2019 privacy: A privacy-aware smart city is possible","volume":"51","author":"Solanas","year":"2013","journal-title":"IEEE Commun. Mag."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"65","DOI":"10.13052\/jcsm2245-1439.414","article-title":"Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks","volume":"4","author":"Abomhara","year":"2015","journal-title":"J. Cyber Secur. Mobil."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"McKay, K., Bassham, L., S\u00f6nmez Turan, M., and Mouha, N. (2016). Report on Lightweight Cryptography, National Institute of Standards and Technology. Technical Report.","DOI":"10.6028\/NIST.IR.8114"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J., Seurin, Y., and Vikkelsoe, C. (2007). PRESENT: An ultra-lightweight block cipher. International Workshop on Cryptographic Hardware and Embedded Systems, Springer.","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Pieprzyk, J. (2010). Topics in Cryptology-CT-RSA 2010: The 10th Cryptographers\u2019 Track at the RSA Conference 2010, San Francisco, CA, USA, March 1\u20135, 2010. Proceedings, Springer Science & Business Media.","DOI":"10.1007\/978-3-642-11925-5"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Blondeau, C., and Nyberg, K. (2014). Links between truncated differential and multidimensional linear properties of block ciphers and underlying attack complexities. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/978-3-642-55220-5_10"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., and Iwata, T. (2007). The 128-bit blockcipher CLEFIA. International Workshop on Fast Software Encryption, Springer.","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Tsunoo, Y., Tsujihara, E., Shigeri, M., Saito, T., Suzaki, T., and Kubo, H. (2008). Impossible differential cryptanalysis of CLEFIA. International Workshop on Fast Software Encryption, Springer.","DOI":"10.1007\/978-3-540-71039-4_25"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Guo, J., Peyrin, T., Poschmann, A., and Robshaw, M. (2011). The LED block cipher. International Workshop on Cryptographic Hardware and Embedded Systems, Springer.","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Dinur, I., Dunkelman, O., Keller, N., and Shamir, A. (2013). Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full AES 2. International Conference on the Theory and Application of Cryptology and Information Security, Springer.","DOI":"10.1007\/978-3-642-42033-7_18"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., and Shirai, T. (2011). Piccolo: An ultra-lightweight blockcipher. International Workshop on Cryptographic Hardware and Embedded Systems, Springer.","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Minier, M. (2013). On the security of Piccolo lightweight block cipher against related-key impossible differentials. International Conference on Cryptology in India, Springer.","DOI":"10.1007\/978-3-319-03515-4_21"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Borghoff, J., Canteaut, A., G\u00fcneysu, T., Kavun, E.B., Knezevic, M., Knudsen, L.R., Leander, G., Nikov, V., Paar, C., and Rechberger, C. (2012). PRINCE\u2013a low-latency block cipher for pervasive computing applications. International Conference on the Theory and Application of Cryptology and Information Security, Springer.","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Banik, S., Bogdanov, A., Isobe, T., Shibutani, K., Hiwatari, H., Akishita, T., and Regazzoni, F. (2015). Midori: A block cipher for low energy. International Conference on the Theory and Application of Cryptology and Information Security, Springer.","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"ref_17","first-page":"1189","article-title":"Invariant Subspace Attack Against Full Midori64","volume":"2015","author":"Guo","year":"2015","journal-title":"IACR Cryptol. EPrint Arch."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Lin, L., and Wu, W. (2017). Meet-in-the-middle attacks on reduced-round Midori64. IACR Trans. Symmetric Cryptol., 215\u2013239.","DOI":"10.46586\/tosc.v2017.i1.215-239"},{"key":"ref_19","unstructured":"Kim, S., and Verbauwhede, I. (2002). AES Implementation on 8-bit Microcontroller, Department of Electrical Engineering, University of California."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1138127.1138130","article-title":"Survey and benchmark of block ciphers for wireless sensor networks","volume":"2","author":"Law","year":"2006","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.entcs.2006.11.010","article-title":"Rijndael for sensor networks: Is speed the main issue?","volume":"171","author":"Vitaletti","year":"2007","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"ref_22","unstructured":"Duh, D.R., Lin, T.C., Tung, C.H., and Chan, S.J. (2006, January 5\u20137). An implementation of AES algorithm with the multiple spaces random key pre-distribution scheme on MOTE-KIT 5040. Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC\u201906), Taichung, Taiwan."},{"key":"ref_23","first-page":"3588","article-title":"Secure data in wireless sensor network via AES (Advanced encryption standard)","volume":"3","author":"Khambre","year":"2012","journal-title":"IJCSIT"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11071-012-0440-0","article-title":"Image encryption algorithm based on PGL (2, GF (2 8)) S-boxes and TD-ERCS chaotic sequence","volume":"70","author":"Hussain","year":"2012","journal-title":"Nonlinear Dyn."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1007\/s11071-011-9984-7","article-title":"An image blocks encryption algorithm based on spatiotemporal chaos","volume":"67","author":"Wang","year":"2012","journal-title":"Nonlinear Dyn."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s11071-012-0658-x","article-title":"An image encryption scheme based on time-delay and hyperchaotic system","volume":"71","author":"Ye","year":"2013","journal-title":"Nonlinear Dyn."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/s11071-013-1068-4","article-title":"Chaos-based image encryption with total shuffling and bidirectional diffusion","volume":"75","author":"Zhang","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1007\/s11071-013-1086-2","article-title":"A novel image encryption algorithm based on dynamic S-boxes constructed by chaos","volume":"75","author":"Wang","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1007\/s11071-020-05503-y","article-title":"A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design","volume":"100","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","article-title":"An image encryption scheme based on a new hybrid chaotic map and optimized substitution box","volume":"99","author":"Farah","year":"2019","journal-title":"Nonlinear Dyn."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2115","DOI":"10.1007\/s11071-018-4478-5","article-title":"Chaotic S-box: Six-dimensional fractional Lorenz\u2013Duffing chaotic system and O-shaped path scrambling","volume":"94","author":"Ye","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2003","DOI":"10.1007\/s11071-018-4471-z","article-title":"Design of a strong S-box based on a matrix approach","volume":"94","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"ref_33","unstructured":"Crossbow, T. (2021, January 12). Telosb Data Sheet. Available online: https:\/\/scholar.google.com.hk\/scholar?hl=zh-CN&as_sdt=0%2C5&q=Crossbow%2C+T.+Telosb+data+sheet%2C+2010.&btnG=."},{"key":"ref_34","unstructured":"IEEE Computer Society LAN\/MAN Standards Committee (2021, January 12). IEEE Standard for Information Technology Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks Specific Requirements. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). Available online: https:\/\/ci.nii.ac.jp\/naid\/10030068811\/."},{"key":"ref_35","unstructured":"Garcia-Morchon, O., Kumar, S., Keoh, S., Hummen, R., and Struik, R. (2013). Security Considerations in the IP-based Internet of Things draft-garciacore-security-06. Internet Eng. Task Force, Available online: https:\/\/tools.ietf.org\/html\/draft-garcia-core-security-06."},{"key":"ref_36","first-page":"1","article-title":"The internet of things: How the next evolution of the internet is changing everything","volume":"1","author":"Evans","year":"2011","journal-title":"CISCO White Pap."},{"key":"ref_37","unstructured":"Clearfield, C. (2021, January 12). Why the FTC Can\u2019t Regulate the Internet Of Things. Forbes Magazine, 18 September 2013. Available online: http:\/\/www.forbes.com\/sites\/chrisclearfield\/2013\/09\/18\/whythe-ftc-cant-regulate-the-internet-of-things\/."},{"key":"ref_38","unstructured":"Banafa, A. (2017). IoT and Blockchain Convergence: Benefits and Challenges. IEEE Internet Things Newsl., Available online: https:\/\/iot.ieee.org\/newsletter\/january-2017\/iot-and-blockchain-convergence-benefits-and-challenges.html."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"173273","DOI":"10.1109\/ACCESS.2019.2956385","article-title":"Construction of cryptographic S-Boxes based on mobius transformation and chaotic tent-sine system","volume":"7","author":"Jamal","year":"2019","journal-title":"IEEE Access"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"107025","DOI":"10.1109\/ACCESS.2019.2932423","article-title":"Constructing Boolean Functions Using Blended Representations","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Bassham, L., Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., and Banks, D. (2010). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, National Institute of Standards and Technology. Technical Report.","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Zhang, G., Ding, W., and Li, L. (2020). Image encryption algorithm based on tent delay-sine cascade with logistic map. Symmetry, 12.","DOI":"10.3390\/sym12030355"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","article-title":"A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2","volume":"83","author":"Guesmi","year":"2016","journal-title":"Nonlinear Dyn."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"4753","DOI":"10.1007\/s11042-015-2501-0","article-title":"Hash key-based image encryption using crossover operator and chaos","volume":"75","author":"Guesmi","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"13792","DOI":"10.1109\/ACCESS.2020.2966264","article-title":"Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"60160","DOI":"10.1109\/ACCESS.2017.2762405","article-title":"Hash based encryption for keyframes of diagnostic hysteroscopy","volume":"6","author":"Hamza","year":"2017","journal-title":"IEEE Access"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Zhou, S., He, P., and Kasabov, N. (2020). A Dynamic DNA Color Image Encryption Method Based on SHA-512. Entropy, 22.","DOI":"10.3390\/e22101091"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/BF01199438","article-title":"Sur une courbe, qui remplit toute une aire plane","volume":"36","author":"Peano","year":"1890","journal-title":"Math. Ann."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Hilbert, D. (1935). \u00dcber die stetige Abbildung einer Linie auf ein Fl\u00e4chenst\u00fcck. Dritter Band: Analysis\u00b7 Grundlagen der Mathematik\u00b7 Physik Verschiedenes, Springer.","DOI":"10.1007\/978-3-662-38452-7"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1016\/j.patcog.2003.08.011","article-title":"Image and video encryption using SCAN patterns","volume":"37","author":"Maniccam","year":"2004","journal-title":"Pattern Recognit."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"46","DOI":"10.14429\/dsj.62.1441","article-title":"Image encryption with space-filling curves","volume":"62","author":"Suresh","year":"2012","journal-title":"Def. Sci. J."},{"key":"ref_52","first-page":"1468","article-title":"Image encryption based on pixel shuffling and random key stream","volume":"3","author":"Sivakumar","year":"2014","journal-title":"Int. J. Comput. Inf. Technol."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"106162","DOI":"10.1016\/j.asoc.2020.106162","article-title":"A novel image encryption scheme using both pixel level and bit level permutation with chaotic map","volume":"90","author":"Shahna","year":"2020","journal-title":"Appl. Soft Comput."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.chaos.2013.11.001","article-title":"A novel method of S-box design based on chaotic map and composition method","volume":"58","year":"2014","journal-title":"Chaos Solitons Fractals"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Guesmi, R., Farah, M.A.B., Kachouri, A., and Samet, M. (2015, January 16\u201319). Chaos-based designing of a highly nonlinear S-box using Boolean functions. Proceedings of the 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), Mahdia, Tunisia.","DOI":"10.1109\/SSD.2015.7348106"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Guesmi, R., Farah, M.A.B., Kachouri, A., and Samet, M. (2014, January 10\u201313). A novel design of Chaos based S-Boxes using genetic algorithm techniques. Proceedings of the 2014 IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA), Doha, Qatar.","DOI":"10.1109\/AICCSA.2014.7073265"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"2407","DOI":"10.1007\/s11071-016-3199-x","article-title":"A novel method of S-box design based on discrete chaotic map","volume":"87","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_58","first-page":"181","article-title":"S-box design method based on improved one-dimensional discrete chaotic map","volume":"2","year":"2018","journal-title":"J. Inf. Telecommun."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1007\/s11071-016-3099-0","article-title":"A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system","volume":"87","author":"Zengin","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/j.chaos.2004.04.023","article-title":"A novel method for designing S-boxes based on chaotic maps","volume":"23","author":"Tang","year":"2005","journal-title":"Chaos Solitons Fractals"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"170","DOI":"10.4218\/etrij.08.0207.0188","article-title":"Efficient and Simple Method for Designing Chaotic S-Boxes","volume":"30","author":"Asim","year":"2008","journal-title":"ETRI J."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"3733","DOI":"10.1016\/j.physleta.2010.07.019","article-title":"A method for designing strong S-Boxes based on chaotic Lorenz system","volume":"374","year":"2010","journal-title":"Phys. Lett. A"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/81.904880","article-title":"Chaos and cryptography: Block encryption ciphers based on chaotic maps","volume":"48","author":"Jakimoski","year":"2001","journal-title":"IEEE Trans. Circuits Syst. I Fundam. Theory Appl."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1504\/IJSNET.2011.042767","article-title":"Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node","volume":"10","author":"Zhang","year":"2011","journal-title":"Int. J. Sens. Netw."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., and Brewer, E. (2005). TinyOS: An operating system for sensor networks. Ambient intelligence, Springer.","DOI":"10.1007\/3-540-27139-2_7"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Yasser, I., Mohamed, M.A., Samra, A.S., and Khalifa, F. (2020). A Chaotic-Based Encryption\/Decryption Framework for Secure Multimedia Communications. Entropy, 22.","DOI":"10.3390\/e22111253"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Zhu, S., and Zhu, C. (2020). Secure Image Encryption Algorithm Based on Hyperchaos and Dynamic DNA Coding. Entropy, 22.","DOI":"10.3390\/e22070772"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Li, Z., Peng, C., Tan, W., and Li, L. (2020). A Novel Chaos-Based Color Image Encryption Scheme Using Bit-Level Permutation. Symmetry, 12.","DOI":"10.3390\/sym12091497"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Wang, B., Xie, Y., Zhou, S., Zheng, X., and Zhou, C. (2018). Correcting errors in image encryption based on DNA coding. Molecules, 23.","DOI":"10.3390\/molecules23081878"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"9597619","DOI":"10.1155\/2020\/9597619","article-title":"A new image encryption scheme based on hybrid chaotic maps","volume":"2020","author":"Yasser","year":"2020","journal-title":"Complexity"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/1\/129\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:10:46Z","timestamp":1760159446000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/1\/129"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,13]]},"references-count":70,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,1]]}},"alternative-id":["sym13010129"],"URL":"https:\/\/doi.org\/10.3390\/sym13010129","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,13]]}}}