{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:44:51Z","timestamp":1761767091745,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61403157","KJ2021A0965"],"award-info":[{"award-number":["61403157","KJ2021A0965"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Research Projects in Anhui Universities","award":["61403157","KJ2021A0965"],"award-info":[{"award-number":["61403157","KJ2021A0965"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>This paper proposes a novel image encryption algorithm based on an integer form of chaotic mapping and 2-order bit compass diffusion technique. Chaotic mapping has been widely used in image encryption. If the floating-point number generated by chaotic mapping is applied to image encryption algorithm, it will slow encryption and increase the difficulty of hardware implementation. An innovative pseudo-random integer sequence generator is proposed. In chaotic system, the result of one-iteration is used as the shift value of two binary sequences, the original symmetry relationship is changed, and then XOR operation is performed to generate a new binary sequence. Multiple iterations can generate pseudo-random integer sequences. Here integer sequences have been used in scrambling of pixel positions. Meanwhile, this paper demonstrates that there is an inverse operation in the XOR operation of two binary sequences. A new pixel diffusion technique based on bit compass coding is proposed. The key vector of the algorithm comes from the original image and is hidden by image encryption. The efficiency of our proposed method in encrypting a large number of images is evaluated using security analysis and time complexity. The performance evaluation of algorithm includes key space, histogram differential attacks, gray value distribution(GDV),correlation coefficient, PSNR, entropy, and sensitivity. The comparison between the results of coefficient, entropy, PSNR, GDV, and time complexity further proves the effectiveness of the algorithm.<\/jats:p>","DOI":"10.3390\/sym14071482","type":"journal-article","created":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T03:34:40Z","timestamp":1658374480000},"page":"1482","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Image Encryption Algorithm Using 2-Order Bit Compass Coding and Chaotic Mapping"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1708-957X","authenticated-orcid":false,"given":"Jinlin","family":"Chen","sequence":"first","affiliation":[{"name":"College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China"},{"name":"College of Finance and Mathematics, Huainan Normal University, Huainan 232038, China"}]},{"given":"Yiquan","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China"}]},{"given":"Yeguo","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Finance and Mathematics, Huainan Normal University, Huainan 232038, China"}]},{"given":"Chunzhi","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Finance and Mathematics, Huainan Normal University, Huainan 232038, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,7,20]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"7461","DOI":"10.1007\/s00500-021-06459-w","article-title":"A new color image encryption technique using DNA computing and Chaos-based substitution box","volume":"26","author":"Masood","year":"2022","journal-title":"Soft Comput."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.compeleceng.2017.08.020","article-title":"Medical JPEG image steganography based on preserving inter-block dependencies","volume":"67","author":"Liao","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Usman, M.A., and Usman, M.R. (2018, January 12\u201315). Using image steganography for providing enhanced medical data security. Proceedings of the IEEE Consumer Communications & Networking Conference, Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2018.8319263"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Etoundi, C.M.L., Nkapkop, J.D.D., Tsafack, N., Ngono, J.M., Ele, P., Wozniak, M., Shafi, J., and Ijaz, M.F. (2022). A Novel Compound-Coupled Hyperchaotic Map for Image Encryption. Symmetry, 14.","DOI":"10.3390\/sym14030493"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"24727","DOI":"10.1007\/s11042-018-5670-9","article-title":"Robust color image watermarking using invariant quaternion Legendre-Fourier moments","volume":"77","author":"Hosny","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","article-title":"A new image encryption algorithm for grey and color medical images","volume":"9","author":"Kamal","year":"2021","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","article-title":"Symmetric Ciphers Based on Two-Dimensional Chaotic Maps","volume":"8","author":"Fridrich","year":"1998","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/12.589245","article-title":"Comments on \u201cTheory and applications of cellular automata in cryptography\u201d","volume":"46","author":"Blackburn","year":"1997","journal-title":"IEEE Trans. Comput."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1049\/iet-ipr.2017.1016","article-title":"Color image encryption technique using differential evolution in non-subsampled contourlet transform domain","volume":"12","author":"Kaur","year":"2018","journal-title":"IET Image Process."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"126976","DOI":"10.1016\/j.optcom.2021.126976","article-title":"A visually secure image encryption scheme based on 2D compressive sensing and integer wavelet transform embedding","volume":"492","author":"Huo","year":"2021","journal-title":"Opt. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"106722","DOI":"10.1016\/j.optlaseng.2021.106722","article-title":"Optical image encryption and authentication using phase-only computer-generated hologram","volume":"146","author":"Wang","year":"2021","journal-title":"Opt. Lasers Eng."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","article-title":"An image encryption algorithm based on chaotic system and compressive sensing","volume":"148","author":"Chai","year":"2018","journal-title":"Signal Process."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"107563","DOI":"10.1016\/j.sigpro.2020.107563","article-title":"Image encryption and hiding algorithm based on compressive sensing and random numbers insertion","volume":"172","author":"Ye","year":"2020","journal-title":"Signal Process."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"106489","DOI":"10.1016\/j.optlastec.2020.106489","article-title":"Image encryption based on compressive sensing and chaos systems","volume":"132","author":"Brahim","year":"2020","journal-title":"Opt. Laser Technol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"6785","DOI":"10.1016\/j.aej.2021.12.023","article-title":"Double image encryption algorithm based on compressive sensing and elliptic curve","volume":"61","author":"Ye","year":"2021","journal-title":"Alex. Eng. J."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.ins.2020.03.054","article-title":"Plaintext-related image encryption algorithm based on perceptron-like network","volume":"526","author":"Zhang","year":"2020","journal-title":"Inf. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"28154","DOI":"10.1364\/OE.402958","article-title":"Plaintext attack on joint transform correlation encryption system by convolutional neural network","volume":"28","author":"Chen","year":"2020","journal-title":"Opt. Express"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Zhang, R., Yu, L., Jiang, D., Ding, W., Song, J., He, K., and Ding, Q. (2021). A Novel Plaintext-Related Color Image Encryption Scheme Based on Cellular Neural Network and Chen\u2019s Chaotic System. Symmetry, 13.","DOI":"10.3390\/sym13030393"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2647","DOI":"10.1007\/s11042-020-09828-z","article-title":"A compact image encryption system based on Arnold transformation","volume":"80","author":"Wu","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","article-title":"On the derivation of a chaotic encryption algorithm","volume":"13","author":"Matthews","year":"1989","journal-title":"Cryptologia"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"116363","DOI":"10.1016\/j.image.2021.116363","article-title":"Double color image encryption based on fractional order discrete improved Henon map and Rubik\u2019s cube transform","volume":"97","author":"Chen","year":"2021","journal-title":"Signal Process. Image Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"166307","DOI":"10.1016\/j.ijleo.2021.166307","article-title":"A dynamic block image encryption using variable-length secret key and modified Henon map","volume":"230","author":"Zhao","year":"2021","journal-title":"Optik"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1016\/j.matcom.2021.06.008","article-title":"Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map","volume":"190","author":"Munir","year":"2021","journal-title":"Math. Comput. Simul."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1925","DOI":"10.1007\/s11042-020-09672-1","article-title":"A new efficient medical image cipher based on hybrid chaotic map and DNA code","volume":"80","author":"Guesmi","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"164884","DOI":"10.1016\/j.ijleo.2020.164884","article-title":"A novel image encryption scheme of dynamic Sboxes and random blocks based on spatiotemporal chaotic system","volume":"217","author":"Wang","year":"2020","journal-title":"Optik"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3847","DOI":"10.1007\/s00521-017-2970-3","article-title":"A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation","volume":"30","author":"Ahmad","year":"2018","journal-title":"Neural Comput. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"167526","DOI":"10.1016\/j.ijleo.2021.167526","article-title":"Known-plaintext attack (KPA) on an image encryption scheme using enhanced skew tent map (ESTM) and its improvement","volume":"244","author":"Arora","year":"2021","journal-title":"Optik"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.matcom.2021.06.012","article-title":"A novel image encryption algorithm based on SPWLCM and DNA coding","volume":"190","author":"Zhang","year":"2021","journal-title":"Math. Comput. Simul."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"145995","DOI":"10.1109\/ACCESS.2020.3005925","article-title":"A 3D Image Encryption Algorithm Based on the Chaotic System and the Image Segmentation","volume":"8","author":"Xu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"9355","DOI":"10.1007\/s11042-018-6516-1","article-title":"Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules","volume":"78","author":"Xiao","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","article-title":"Fast image encryption algorithm based on parallel computing system","volume":"486","author":"Wang","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"22023","DOI":"10.1007\/s11042-019-7453-3","article-title":"A novel chaotic image encryption algorithm based on improved baker map and logistic map","volume":"78","author":"Luo","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","article-title":"Image encryption using chaotic logistic map","volume":"24","author":"Pareek","year":"2006","journal-title":"Image Vis. Comput."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Wiggins, S. (1990). Introduction to Applied Nonliner Dynamical Systems and Chaos, Springer. Texts in Applied Mathematics.","DOI":"10.1007\/978-1-4757-4067-7"},{"key":"ref_35","first-page":"53","article-title":"Integrated Applications with Laser Technology","volume":"17","author":"Dospinescu","year":"2013","journal-title":"Inform. Econ."},{"key":"ref_36","unstructured":"Hardy, G.H., and Wright, E.M. (1979). An Introduction to the Theory of Numbers, Oxford Clarendon Press."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.image.2014.06.012","article-title":"Chaotic image encryption based on circular substitution box and key stream buffer","volume":"29","author":"Zhang","year":"2014","journal-title":"Signal Process. Image Commun."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","article-title":"A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice","volume":"273","author":"Zhang","year":"2014","journal-title":"Inf. Sci."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1007\/s13369-013-0713-z","article-title":"Image Encryption Using Random Bit Sequence Based on Chaotic Maps","volume":"39","author":"Khanzadi","year":"2013","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"35493","DOI":"10.1007\/s11042-019-08108-9","article-title":"Images encryption algorithm based on the quaternion multiplication and the XOR operation","volume":"78","author":"Boussif","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","article-title":"A Comprehensive Review on Image Encryption Techniques","volume":"27","author":"Kaur","year":"2018","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"8809","DOI":"10.1007\/s11042-020-09465-6","article-title":"A novel RGB image encryption algorithm based on DNA sequences and chaos","volume":"80","author":"Zhang","year":"2020","journal-title":"Multimed. Tools Appl."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/7\/1482\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:54:23Z","timestamp":1760140463000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/7\/1482"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,20]]},"references-count":42,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2022,7]]}},"alternative-id":["sym14071482"],"URL":"https:\/\/doi.org\/10.3390\/sym14071482","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2022,7,20]]}}}