{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:26:56Z","timestamp":1772908016456,"version":"3.50.1"},"reference-count":84,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The need for information security has become urgent due to the constantly changing nature of the Internet and wireless communications, as well as the daily generation of enormous volumes of multimedia. In this paper, a 3-stage image cryptosystem is developed and proposed. A tan variation of the logistic map is utilized to carry out deoxyribonucleic acid (DNA) encoding in the first stage. For the second encryption stage, the numerical solution of the Lorenz differential equations and a linear descent algorithm are jointly employed to build a robust S-box. The logistic map in its original form is utilized in the third stage. Diffusion is guaranteed through the first and third encryption stages, while confusion is guaranteed through the application of the S-box in the second encryption stage. Carrying out both confusion- and diffusion-inducing stages results in encrypted images that are completely asymmetric to their original (plain) counterparts. An extensive numerical analysis is carried out and discussed, showcasing the robustness and efficacy of the proposed algorithm in terms of resistance to visual, statistical, entropy, differential, known plaint text and brute-force attacks. Average values for the computed metrics are: Information entropy of 7.99, MSE of 9704, PSNR of 8.3 dB, MAE of 80.8, NPCR of 99.6 and UACI of 33. The proposed algorithm is shown to exhibit low computational complexity, encrypting images at an average rate of 1.015 Mbps. Moreover, it possesses a large key space of 2372, and is demonstratd to successfully pass all the tests of the NIST SP 800 suite. In order to demonstrate the superior performance of the proposed algorithm, a comparison with competing image encryption schemes from the literature is also provided.<\/jats:p>","DOI":"10.3390\/sym14122559","type":"journal-article","created":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T03:38:38Z","timestamp":1670211518000},"page":"2559","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":61,"title":["Application of DNA Coding, the Lorenz Differential Equations and a Variation of the Logistic Map in a Multi-Stage Cryptosystem"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3690-9585","authenticated-orcid":false,"given":"Mohamed","family":"Gabr","sequence":"first","affiliation":[{"name":"Computer Science Department, Faculty of Media Engineering and Technology, German University in Cairo, Cairo 11835, Egypt"}]},{"given":"Hana","family":"Younis","sequence":"additional","affiliation":[{"name":"Faculty of Media Engineering and Technology, German University in Cairo, Cairo 11835, Egypt"}]},{"given":"Marwa","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Faculty of Media Engineering and Technology, German University in Cairo, Cairo 11835, Egypt"}]},{"given":"Sara","family":"Alajmy","sequence":"additional","affiliation":[{"name":"Faculty of Media Engineering and Technology, German University in Cairo, Cairo 11835, Egypt"}]},{"given":"Ijaz","family":"Khalid","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Quaid-i-Azam University, Islamabad 45320, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5558-6948","authenticated-orcid":false,"given":"Eman","family":"Azab","sequence":"additional","affiliation":[{"name":"Electronics Department, Faculty of Information Engineering and Technology, German University in Cairo, Cairo 11835, Egypt"}]},{"given":"Rimon","family":"Elias","sequence":"additional","affiliation":[{"name":"Digital Media Engineering and Technology Department, Faculty of Media Engineering and Technology, German University in Cairo, Cairo 11835, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6159-4971","authenticated-orcid":false,"given":"Wassim","family":"Alexan","sequence":"additional","affiliation":[{"name":"Communications Department, Faculty of Information Engineering and Technology, German University in Cairo, Cairo 11835, Egypt"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,4]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"El-Mahdy, A., and Alexan, W. (2017). A comparative study on the performance of LLR-and SNR-based hybrid relaying schemes. Wirel. Commun. Mob. Comput., 2017.","DOI":"10.1155\/2017\/4063792"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Huang, H., and Li, J. (2021, January 29\u201331). Research on Network Communication Model and Network Security Technology through Big Data. Proceedings of the 2021 IEEE International Conference on Data Science and Computer Application (ICDSCA), Dalian, China.","DOI":"10.1109\/ICDSCA53499.2021.9650308"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1007\/s11277-018-5349-6","article-title":"A threshold-free LLR-based scheme to minimize the BER for decode-and-forward relaying","volume":"100","author":"Alexan","year":"2018","journal-title":"Wirel. Pers. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"25497","DOI":"10.1007\/s11042-022-12595-8","article-title":"Image encryption based on a combination of multiple chaotic maps","volume":"81","author":"Elkandoz","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"35004","DOI":"10.1109\/ACCESS.2021.3062403","article-title":"Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication","volume":"9","author":"Almomani","year":"2021","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"29289","DOI":"10.1007\/s11042-020-09437-w","article-title":"Secure 3d data hiding technique based on a mesh traversal algorithm","volume":"79","author":"Farrag","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Alexan, W., Elkhateeb, A., Mamdouh, E., Al-Seba\u2019Ey, F., Amr, Z., and Khalil, H. (2021, January 19\u201322). Utilization of corner filters, aes and lsb steganography for secure message transmission. Proceedings of the 2021 International Conference on Microelectronics (ICM), New Cairo City, Egypt.","DOI":"10.1109\/ICM52667.2021.9664947"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Alexan, W., Mamdouh, E., ElBeltagy, M., Hassan, F., and Edward, P. (2022, January 26\u201328). Image Feature-Based Watermarking. Proceedings of the 2022 International Telecommunications Conference (ITC-Egypt), Alexandria, Egypt.","DOI":"10.1109\/ITC-Egypt55520.2022.9855678"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Alexan, W., Ashraf, A., Mamdouh, E., Mohamed, S., and Moustafa, M. (2021, January 21\u201322). Iomt security: Sha3-512, aes-256, rsa and lsb steganography. Proceedings of the 2021 8th NAFOSTED Conference on Information and Computer Science (NICS), Hanoi, Vietnam.","DOI":"10.1109\/NICS54270.2021.9701567"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Yasser, S., Hesham, A., Hassan, M., and Alexan, W. (2020, January 8\u20139). Aes-secured bit-cycling steganography in sliced 3d images. Proceedings of the 2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE), Aswan, Egypt.","DOI":"10.1109\/ITCE48509.2020.9047801"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1147\/rd.383.0243","article-title":"The Data Encryption Standard (DES) and its strength against attacks","volume":"38","author":"Coppersmith","year":"1994","journal-title":"IBM J. Res. Dev."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Adam, N., Mashaly, M., and Alexan, W. (2019, January 19\u201321). A 3des double\u2013layer based message security scheme. Proceedings of the 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia.","DOI":"10.1109\/CAIS.2019.8769457"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Daemen, J., and Rijmen, V. (2002). The Design of Rijndael, Springer.","DOI":"10.1007\/978-3-662-04722-4"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Moussa, Y., and Alexan, W. (2020, January 24\u201326). Message security through AES and LSB embedding in edge detected pixels of 3D images. Proceedings of the 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES), Giza, Egypt.","DOI":"10.1109\/NILES50944.2020.9257937"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Liu, X., Tong, X., Wang, Z., and Zhang, M. (2021). Efficient high nonlinearity S-box generating algorithm based on third-order nonlinear digital filter. Chaos Solitons Fractals, 150.","DOI":"10.1016\/j.chaos.2021.111109"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Alexan, W., ElBeltagy, M., and Aboshousha, A. (2021, January 21\u201322). Image Encryption Through Lucas Sequence, S-Box and Chaos Theory. Proceedings of the 2021 8th NAFOSTED Conference on Information and Computer Science (NICS), Hanoi, Vietnam.","DOI":"10.1109\/NICS54270.2021.9701533"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"26203","DOI":"10.1007\/s11042-019-07818-4","article-title":"A novel chaotic image encryption technique based on multiple discrete dynamical maps","volume":"78","author":"Khan","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Younas, I., and Khan, M. (2018). A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy, 20.","DOI":"10.3390\/e20120913"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"137116","DOI":"10.1109\/ACCESS.2020.3011724","article-title":"A 3-D Multi-Stable System with a Peanut-Shaped Equilibrium Curve: Circuit Design, FPGA Realization, and an Application to Image Encryption","volume":"8","author":"Sambas","year":"2020","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Chen, J.J., Yan, D.W., Duan, S.K., and Wang, L.D. (2020). Memristor-based hyper-chaotic circuit for image encryption. Chin. Phys. B, 29.","DOI":"10.1088\/1674-1056\/abbbfe"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Wei, D., and Jiang, M. (2021). A fast image encryption algorithm based on parallel compressive sensing and DNA sequence. Optik, 238.","DOI":"10.1016\/j.ijleo.2021.166748"},{"key":"ref_22","first-page":"1","article-title":"Implementation of DNA cryptography based on dynamic DNA sequence table using cloud computing","volume":"7","author":"Vinay","year":"2019","journal-title":"Int. J. Eng. Res. Technol."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"820","DOI":"10.1016\/j.procs.2015.02.151","article-title":"A Novel String Matrix Data Structure for DNA Encoding Algorithm","volume":"46","author":"UbaidurRahman","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/s11432-007-0025-6","article-title":"Symmetric-key cryptosystem with DNA technology","volume":"50","author":"Lu","year":"2007","journal-title":"Sci. China Ser. F Inf. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Iliyasu, M.A., Abisoye, O.A., Bashir, S.A., and Ojeniyi, J.A. (2021, January 23\u201325). A Review of DNA Cryptograhic Approaches. Proceedings of the 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), Abuja, Nigeria.","DOI":"10.1109\/CYBERNIGERIA51635.2021.9428855"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Alexan, W., ElBeltagy, M., and Aboshousha, A. (2022). Rgb image encryption through cellular automata, s-box and the lorenz system. Symmetry, 14.","DOI":"10.3390\/sym14030443"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Hosny, K.M. (2020). Multimedia Security Using Chaotic Maps: Principles and Methodologies, Springer.","DOI":"10.1007\/978-3-030-38700-6"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"21803","DOI":"10.1007\/s11042-017-5590-0","article-title":"A new color image encryption scheme based on logistic map over the finite field ZN","volume":"77","author":"Yang","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"105627","DOI":"10.1109\/ACCESS.2021.3099214","article-title":"Chaotic Image Encryption Algorithm Based on Zigzag Transform with Bidirectional Crossover from Random Position","volume":"9","author":"Gao","year":"2021","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Ahmad, M., Chugh, H., Goel, A., and Singla, P. (2013, January 22\u201324). A chaos based method for efficient cryptographic S-box design. Proceedings of the International Symposium on Security in Computing and Communication, Mysore, India.","DOI":"10.1007\/978-3-642-40576-1_13"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"117829","DOI":"10.1109\/ACCESS.2019.2936447","article-title":"A new chaotic S-box generation method using parameter optimization of one dimensional chaotic maps","volume":"7","author":"Tanyildizi","year":"2019","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Arora, A., and Sharma, R.K. (2021). Known-plaintext attack (KPA) on an image encryption scheme using enhanced skew tent map (ESTM) and its improvement. Optik, 244.","DOI":"10.1016\/j.ijleo.2021.167526"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"150326","DOI":"10.1109\/ACCESS.2020.3016401","article-title":"A Novel Modular Approach Based Substitution-Box Design for Image Encryption","volume":"8","author":"Zahid","year":"2020","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Gabr, M., Alexan, W., Moussa, K., Maged, B., and Mezar, A. (2022, January 26\u201328). Multi-Stage RGB Image Encryption. Proceedings of the 2022 International Telecommunications Conference (ITC-Egypt), Alexandria, Egypt.","DOI":"10.1109\/ITC-Egypt55520.2022.9855767"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"ElBeltagy, M., Alexan, W., Elkhamry, A., Moustafa, M., and Hussein, H.H. (2022, January 26\u201329). Image Encryption Through R\u00f6ssler System, PRNG S-Box and Recam\u00e1n\u2019s Sequence. Proceedings of the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC54503.2022.9720905"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1007\/s10207-022-00588-5","article-title":"Survey on Image Encryption Techniques using Chaotic Maps in Spatial, Transform and Spatiotemporal Domains","volume":"21","author":"Zia","year":"2022","journal-title":"Int. J. Inf. Secur."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1007\/s11042-019-08247-z","article-title":"Color Image Encryption Based on Hybrid Chaotic System and DNA Sequences","volume":"79","author":"Moattar","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.ins.2020.02.024","article-title":"Cryptanalysis of a DNA-based image encryption scheme","volume":"520","author":"Chen","year":"2020","journal-title":"Inf. Sci."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"118253","DOI":"10.1109\/ACCESS.2021.3106028","article-title":"On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle","volume":"9","author":"Iqbal","year":"2021","journal-title":"IEEE Access"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"37873","DOI":"10.1007\/s11042-022-13095-5","article-title":"A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2","volume":"81","author":"Paul","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1038\/261459a0","article-title":"Simple mathematical models with very complicated dynamics","volume":"261","author":"May","year":"1976","journal-title":"Nature"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Anderson, D.R. (2008). Model Based Inference in the Life Sciences: A Primer on Evidence, Springer.","DOI":"10.1007\/978-0-387-74075-1"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","article-title":"Deterministic nonperiodic flow","volume":"20","author":"Lorenz","year":"1963","journal-title":"J. Atmos. Sci."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1007\/s00521-014-1800-0","article-title":"An efficient chaotic image encryption scheme","volume":"26","author":"Khan","year":"2015","journal-title":"Neural Comput. Appl."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Liu, H., Zhao, B., and Huang, L. (2019). Quantum image encryption scheme using Arnold transform and S-box scrambling. Entropy, 21.","DOI":"10.3390\/e21040343"},{"key":"ref_46","unstructured":"Jain, A. (1989). Fundamentals of Digital Image Processing, Prentice Hall. Chapter 8."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","article-title":"Color image encryption based on hybrid hyper-chaotic system and cellular automata","volume":"90","author":"Niyat","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"18317","DOI":"10.1007\/s11042-020-08742-8","article-title":"Multi-channel chaotic encryption algorithm for color image based on DNA coding","volume":"79","author":"Wang","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.chaos.2007.07.083","article-title":"OCML-based colour image encryption","volume":"40","author":"Rhouma","year":"2009","journal-title":"Chaos Solitons Fractals"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.sigpro.2015.01.016","article-title":"Asymmetric color image encryption scheme using 2D discrete-time map","volume":"113","author":"Liu","year":"2015","journal-title":"Signal Process."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","article-title":"Color image DNA encryption using NCA map-based CML and one-time keys","volume":"148","author":"Wu","year":"2018","journal-title":"Signal Process."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","article-title":"A fast color image encryption algorithm based on hyper-chaotic systems","volume":"78","author":"Norouzi","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1007\/s11071-017-3698-4","article-title":"Lossless chaotic color image cryptosystem based on DNA encryption and entropy","volume":"90","author":"Wu","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"3713","DOI":"10.1109\/TSMC.2019.2932616","article-title":"Exponential chaotic model for generating robust chaos","volume":"51","author":"Hua","year":"2019","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Zhang, Y.Q., He, Y., Li, P., and Wang, X.Y. (2020). A new color image encryption scheme based on 2DNLCML system and genetic operations. Opt. Lasers Eng., 128.","DOI":"10.1016\/j.optlaseng.2020.106040"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Jithin, K., and Sankar, S. (2020). Colour image encryption algorithm combining, Arnold map, DNA sequence operation, and a Mandelbrot set. J. Inf. Secur. Appl., 50.","DOI":"10.1016\/j.jisa.2019.102428"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"172275","DOI":"10.1109\/ACCESS.2020.3024994","article-title":"A Color Image Encryption Algorithm Based on One Time Key, Chaos Theory, and Concept of Rotor Machine","volume":"8","author":"Rehman","year":"2020","journal-title":"IEEE Access"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"30993","DOI":"10.1007\/s11042-018-6145-8","article-title":"A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model","volume":"77","author":"Slimane","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"12349","DOI":"10.1007\/s11042-017-4885-5","article-title":"A robust and lossless DNA encryption scheme for color images","volume":"77","author":"Wu","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"2123","DOI":"10.1016\/j.optcom.2009.02.044","article-title":"Multi chaotic systems based pixel shuffle for image encryption","volume":"282","author":"Huang","year":"2009","journal-title":"Opt. Commun."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"Alvarez","year":"2006","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"137635","DOI":"10.1109\/ACCESS.2021.3118377","article-title":"Secure and Fast Image Encryption Algorithm Using Hyper-Chaos-Based Key Generator and Vector Operation","volume":"9","author":"Ge","year":"2021","journal-title":"IEEE Access"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Liu, H., and Jin, C. (2017). A novel color image encryption algorithm based on quantum chaos sequence. 3D Res., 8.","DOI":"10.1007\/s13319-016-0114-7"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1016\/j.ijleo.2018.01.064","article-title":"A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2","volume":"159","author":"Liao","year":"2018","journal-title":"Optik"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"8911","DOI":"10.1007\/s11042-017-4786-7","article-title":"A novel image encryption scheme based on logistic map and dynatomic modular curve","volume":"77","author":"Li","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"12452","DOI":"10.1109\/ACCESS.2020.2965740","article-title":"Color image encryption algorithm based on dynamic chaos and matrix convolution","volume":"8","author":"Hu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1080\/10408340500526766","article-title":"The correlation coefficient: An overview","volume":"36","author":"Asuero","year":"2006","journal-title":"Crit. Rev. Anal. Chem."},{"key":"ref_68","first-page":"265","article-title":"Which Correlation Coefficient Should Be Used for Investigating Relations between Quantitative Variables?","volume":"85","author":"Temizhan","year":"2022","journal-title":"Am. Acad. Sci. Res. J. Eng. Technol. Sci."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","article-title":"An image compression and encryption algorithm based on chaotic system and compressive sensing","volume":"115","author":"Gong","year":"2019","journal-title":"Optics Laser Technol."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Zhang, X., Wang, L., Wang, Y., Niu, Y., and Li, Y. (2020). An image encryption algorithm based on hyperchaotic system and variable-step Josephus problem. Int. J. Opt., 2020.","DOI":"10.1155\/2020\/6102824"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","article-title":"A novel bit-level image encryption algorithm based on chaotic maps","volume":"78","author":"Xu","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"ref_72","unstructured":"Meier, W., and Staffelbach, O. (1989, January 10\u201313). Nonlinearity criteria for cryptographic functions. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Houthalen, Belgium."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D., and Cho, I. (2000, January 10\u201312). Provable security against differential and linear cryptanalysis for the SPN structure. Proceedings of the International Workshop on Fast Software Encryption, New York, NY, USA.","DOI":"10.1007\/3-540-44706-7_19"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","article-title":"Differential cryptanalysis of DES-like cryptosystems","volume":"4","author":"Biham","year":"1991","journal-title":"J. Cryptol."},{"key":"ref_75","unstructured":"Webster, A., and Tavares, S.E. (1985, January 18\u201322). On the design of S-boxes. Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, USA."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Liu, H., Kadir, A., and Xu, C. (2020). Cryptanalysis and constructing S-box based on chaotic map and backtracking. Appl. Math. Comput., 376.","DOI":"10.1016\/j.amc.2020.125153"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Si, Y., Liu, H., and Chen, Y. (2021). Constructing keyed strong S-Box using an enhanced quadratic map. Int. J. Bifurc. Chaos, 31.","DOI":"10.1142\/S0218127421501467"},{"key":"ref_78","first-page":"751","article-title":"A new S-box structure named affine-power-affine","volume":"3","author":"Cui","year":"2007","journal-title":"Int. J. Innov. Comput. Inf. Control."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Tran, M.T., Bui, D.K., and Duong, A.D. (2008, January 13\u201317). Gray S-box for advanced encryption standard. Proceedings of the 2008 International Conference on Computational Intelligence and Security, Washington, DC, USA.","DOI":"10.1109\/CIS.2008.205"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Zahid, A.H., Arshad, M.J., and Ahmad, M. (2019). A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy, 21.","DOI":"10.3390\/e21030245"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13319-017-0135-x","article-title":"A novel image encryption based on algebraic S-box and Arnold transform","volume":"8","author":"Farwa","year":"2017","journal-title":"3D Res."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"2003","DOI":"10.1007\/s11071-018-4471-z","article-title":"Design of a strong S-box based on a matrix approach","volume":"94","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/s11277-018-5698-1","article-title":"A method of generating 8\u00d7 8 substitution boxes based on elliptic curves","volume":"101","author":"Hayat","year":"2018","journal-title":"Wirel. Pers. Commun."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Siddiqui, N., Yousaf, F., Murtaza, F., Ehatisham-ul Haq, M., Ashraf, M.U., Alghamdi, A.M., and Alfakeeh, A.S. (2020). A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field. PLoS ONE, 15.","DOI":"10.1371\/journal.pone.0241890"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/12\/2559\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:33:50Z","timestamp":1760146430000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/12\/2559"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,4]]},"references-count":84,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["sym14122559"],"URL":"https:\/\/doi.org\/10.3390\/sym14122559","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,4]]}}}