{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T02:38:16Z","timestamp":1767494296543,"version":"build-2065373602"},"reference-count":52,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2018M631914"],"award-info":[{"award-number":["2018M631914"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Heilongjiang Postdoctoral Fund","award":["LBH-Z17042"],"award-info":[{"award-number":["LBH-Z17042"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Hyperchaotic systems are widely applied in the cryptography domain on account of their more complex dynamical behavior. In view of this, the greatest contribution of this paper is that a two-dimensional Sine coupling Logistic modulated Sine (2D-SCLMS) system is proposed based on Logistic map and Sine map. By a series of analyses, including Lyapunov index (LE), 0\u20131 test, two complexity analysis methods, and two entropy analysis methods, it is concluded that the new 2D-SCLMS map is hyperchaotic with a wider range of chaos and more complex randomness. The new system combined with two-dimensional Logistic-Sine Coupling Mapping (2D-LSCM) is further applied to an image encryption application. SHA-384 is used to generate the initial values and parameters of the two chaotic systems. Symmetric keys are generated during this operation, which can be applied to the proposed image encryption and decryption algorithms. The encryption process and the decryption process of the new image encryption approaches mainly include pixel scrambling, exclusive NOR (Xnor), and diffusion operations. Multiple experiments illustrate that this scheme has higher security and lower time complexity.<\/jats:p>","DOI":"10.3390\/sym13122290","type":"journal-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T02:56:14Z","timestamp":1638413774000},"page":"2290","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Applicable Image Security Based on New Hyperchaotic System"],"prefix":"10.3390","volume":"13","author":[{"given":"Jingya","family":"Wang","sequence":"first","affiliation":[{"name":"School of Science, Harbin University of Science and Technology, Harbin 150080, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0111-8559","authenticated-orcid":false,"given":"Xianhua","family":"Song","sequence":"additional","affiliation":[{"name":"School of Science, Harbin University of Science and Technology, Harbin 150080, China"},{"name":"School of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"}]},{"given":"Huiqiang","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5068-2033","authenticated-orcid":false,"given":"Ahmed A.","family":"Abd El-Latif","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511, Egypt"}]}],"member":"1968","published-online":{"date-parts":[[2021,12,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","article-title":"Image encryption using a synchronous permutation-diffusion technique","volume":"90","author":"Enayatifar","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1016\/j.procs.2018.01.153","article-title":"A new image encryption scheme based on confusion-diffusion using an enhanced skew tent map","volume":"127","author":"Essaid","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","article-title":"Symmetric ciphers based on two-dimensional chaotic maps","volume":"8","author":"Fridrich","year":"1998","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"36","DOI":"10.37661\/1816-0301-2020-17-4-36-47","article-title":"Digital model of a pseudo-random number generator based on a continuous chaotic system","volume":"17","author":"Drybin","year":"2021","journal-title":"Informatica"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2150007","DOI":"10.1142\/S0218127421500073","article-title":"Scaling of attractors of a multiscroll memristive chaotic system and its generalized synchronization with sliding mode control","volume":"31","author":"Li","year":"2021","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"111214","DOI":"10.1016\/j.chaos.2021.111214","article-title":"Nonlinear analysis and minimum l2-norm control in memcapacitor-based hyperchaotic system via online particle swarm optimization","volume":"151","author":"Setoudeh","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"8695","DOI":"10.1007\/s11042-015-2786-z","article-title":"Chaotic watermark for blind forgery detection in images","volume":"75","author":"Benrhouma","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3231","DOI":"10.1007\/s11042-013-1784-2","article-title":"Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery","volume":"74","author":"Yan","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/j.optlastec.2013.04.018","article-title":"A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption","volume":"54","author":"Yan","year":"2013","journal-title":"Opt. Laser Technol."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Belazi, A., El-Latif, A., Rhouma, R., and Belghith, S. (2015, January 24\u201328). Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. Proceedings of the 2015 International Wireless Communications and Mobile Computing Conference, Security Symposium, Dubrovnik, Croatia.","DOI":"10.1109\/IWCMC.2015.7289152"},{"key":"ref_11","first-page":"105942","article-title":"Controlled alternate quantum walks based privacy preserving healthcare images in internet of things","volume":"124","year":"2019","journal-title":"Opt. Laser Technol."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"013014","DOI":"10.1117\/1.JEI.21.1.013014","article-title":"Image encryption using the two-dimensional logistic chaotic map","volume":"21","author":"Yue","year":"2012","journal-title":"J. Electron. Imaging"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","article-title":"Image encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theory","volume":"507","author":"Wang","year":"2020","journal-title":"Inf. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1930","DOI":"10.1038\/s41598-020-58636-w","article-title":"Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications","volume":"10","author":"Amin","year":"2020","journal-title":"Sci. Rep."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"137731","DOI":"10.1109\/ACCESS.2020.3010794","article-title":"A new chaotic map with dynamic analysis and encryption application in internet of health things","volume":"8","author":"Tsafack","year":"2020","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"8937","DOI":"10.1007\/s11042-016-3499-7","article-title":"Efficient and robust encryption and watermarking technique based on a new chaotic map approach","volume":"76","author":"AlShaikh","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","article-title":"A novel image encryption algorithm based on a 3D chaotic map","volume":"17","author":"Kanso","year":"2012","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_18","first-page":"102361","article-title":"When an attacker meets a cipher-image in 2018: A year in review","volume":"48","author":"Li","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","article-title":"Color image encryption based on one-time keys and robust chaotic maps","volume":"59","author":"Liu","year":"2010","journal-title":"Comput. Math. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Li, L., Abd-El-Atty, B., Abd El-Latif, A.A., and Ghoneim, A. (2017, January 3\u20136). Quantum color image encryption based on multiple discrete chaotic systems. Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS), Prague, Czech Republic.","DOI":"10.15439\/2017F163"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"137116","DOI":"10.1109\/ACCESS.2020.3011724","article-title":"A 3-D multi-stable system with a peanut-shaped equilibrium curve: Circuit design, FPGA realization, and an application to image encryption","volume":"8","author":"Sambas","year":"2020","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2456","DOI":"10.1016\/j.cnsns.2009.09.023","article-title":"Image encryption using chaotic coupled map lattices with time-varying delays","volume":"15","author":"Yang","year":"2010","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"013012","DOI":"10.1117\/1.3360179","article-title":"Efficient modified RC5 based on chaos adapted to image encryption","volume":"19","author":"Amin","year":"2010","journal-title":"J. Electron. Imaging"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","article-title":"A fast image encryption scheme based on chaotic standard map","volume":"372","author":"Wong","year":"2010","journal-title":"Phys. Lett. A"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1016\/j.chaos.2007.01.034","article-title":"Parallel image encryption algorithm based on discretized chaotic map","volume":"38","author":"Zhou","year":"2008","journal-title":"Chaos Solitons Fractals"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","article-title":"A new hybrid digital chaotic system with applications in image encryption","volume":"160","author":"Alawida","year":"2019","journal-title":"Signal Process."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","article-title":"2D Sine Logistic modulation map for image encryption","volume":"297","author":"Hua","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"14081","DOI":"10.1109\/ACCESS.2019.2893538","article-title":"2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption","volume":"7","author":"Zhu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"59313","DOI":"10.1109\/ACCESS.2021.3070350","article-title":"2D-SCMCI Hyperchaotic Map for Image Encryption Algorithm","volume":"9","author":"Sun","year":"2021","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"118188","DOI":"10.1109\/ACCESS.2019.2937126","article-title":"Dynamical analysis of a novel complex chaotic system and application in image diffusion","volume":"7","author":"Yang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Gottwald, G.A., and Melbourne, I. (2016). The 0\u20131 Test for Chaos: A review. Chaos Detection and Predictability, Springer.","DOI":"10.1007\/978-3-662-48410-4_7"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.physd.2005.09.011","article-title":"Testing for chaos in deterministic systems with noise","volume":"212","author":"Gottwald","year":"2008","journal-title":"Phys. D Nonlinear Phenom."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.optlaseng.2019.04.011","article-title":"A fast image encryption algorithm based on compressive sensing and hyperchaotic map","volume":"121","author":"Xu","year":"2019","journal-title":"Opt. Lasers Eng."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JPHOT.2020.3044222","article-title":"A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits","volume":"13","author":"Shengtao","year":"2020","journal-title":"IEEE Photonics J."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"116246","DOI":"10.1016\/j.image.2021.116246","article-title":"Image encryption based on compressed sensing and DNA encoding","volume":"95","author":"Wang","year":"2021","journal-title":"Signal Process.\u2014Image Commun."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1103\/PhysRevLett.70.2714","article-title":"Structure of the parameter space of the h\u00e9non map","volume":"70","author":"Jason","year":"1993","journal-title":"Phys. Rev. Lett."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1038\/261459a0","article-title":"Simple mathematical models with very complicated dynamics","volume":"261","author":"May","year":"1976","journal-title":"Nature"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"52277","DOI":"10.1109\/ACCESS.2021.3069591","article-title":"Dynamic Substitution and Confusion-Diffusion-Based Noise-Resistive Image Encryption Using Multiple Chaotic Maps","volume":"9","author":"Rehman","year":"2021","journal-title":"IEEE Access"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"033112","DOI":"10.1063\/1.2959102","article-title":"On the security of a new image encryption scheme based on chaotic map lattices","volume":"18","author":"Arroyo","year":"2008","journal-title":"Chaos Interdiscip. J. Nonlinear Sci."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1424","DOI":"10.1109\/78.757236","article-title":"A general efficient method for chaotic signal estimation","volume":"47","author":"Xiaofu","year":"1999","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","article-title":"An image encryption scheme based on a new hybrid chaotic map and optimized substitution box","volume":"99","author":"Farah","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","article-title":"A novel image encryption scheme based on substitution-permutation network and chaos","volume":"128","author":"Belazi","year":"2016","journal-title":"Signal Process."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst. Tech. J."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"75834","DOI":"10.1109\/ACCESS.2018.2883690","article-title":"Cryptanalysis of a chaotic image encryption algorithm based on information entropy","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/TNSM.2020.2969863","article-title":"Secure data encryption based on quantum walks for 5G Internet of Things scenario","volume":"17","author":"Mazurczyk","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"Alvarez","year":"2006","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"62785","DOI":"10.1109\/ACCESS.2020.2983716","article-title":"A plaintext-related dynamical image encryption algorithm based on permutation-combination-diffusion architecture","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"108220","DOI":"10.1016\/j.sigpro.2021.108220","article-title":"Adaptive embedding: A novel meaningful image encryption scheme based on parallel compressive sensing and slant transform","volume":"188","author":"Jiang","year":"2021","journal-title":"Signal Process."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Nestor, T., De Dieu, N.J., Jacques, K., Yves, E.J., Iliyasu, A.M., El-Latif, A., and Ahmed, A. (2020). A multidimensional hyperjerk oscillator: Dynamics analysis, analogue and embedded systems implementation, and its application as a cryptosystem. Sensors, 20.","DOI":"10.3390\/s20010083"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1007\/s11071-020-05526-5","article-title":"Image encryption based on hyper-chaotic multi-attractors","volume":"100","author":"Zhao","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","article-title":"Exploiting self-adaptive permutation\u2013diffusion and DNA random encoding for secure and efficient image encryption","volume":"142","author":"Chen","year":"2018","journal-title":"Signal Process."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1007\/s11071-018-4391-y","article-title":"An efficient pixel-level chaotic image encryption algorithm","volume":"94","author":"Ye","year":"2018","journal-title":"Nonlinear Dyn."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/12\/2290\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:38:33Z","timestamp":1760168313000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/12\/2290"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,1]]},"references-count":52,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["sym13122290"],"URL":"https:\/\/doi.org\/10.3390\/sym13122290","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2021,12,1]]}}}