{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T05:25:23Z","timestamp":1730957123517,"version":"3.28.0"},"reference-count":53,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100020871","name":"Abu Dhabi University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100020871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012025","name":"New York University Abu Dhabi","doi-asserted-by":"publisher","award":["19300786"],"id":[{"id":"10.13039\/100012025","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1016\/j.jisa.2023.103685","type":"journal-article","created":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:40:35Z","timestamp":1703205635000},"page":"103685","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Enhancing logistic chaotic map for improved cryptographic security in random number generation"],"prefix":"10.1016","volume":"80","author":[{"given":"Moatsum","family":"Alawida","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2023.103685_b1","article-title":"A cryptosystem based on a chameleon chaotic system and dynamic DNA coding","volume":"155","author":"Signing","year":"2022","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.jisa.2023.103685_b2","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","article-title":"A new hybrid digital chaotic system with applications in image encryption","volume":"160","author":"Alawida","year":"2019","journal-title":"Signal Process"},{"key":"10.1016\/j.jisa.2023.103685_b3","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.sigpro.2019.06.010","article-title":"An overview of encryption algorithms in color images","volume":"164","author":"Ghadirli","year":"2019","journal-title":"Signal Process"},{"issue":"1","key":"10.1016\/j.jisa.2023.103685_b4","article-title":"Improved one-dimensional piecewise chaotic maps for information security","volume":"17","author":"Aouissaoui","year":"2022","journal-title":"J Commun"},{"key":"10.1016\/j.jisa.2023.103685_b5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2020.07.051","article-title":"Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme","volume":"544","author":"Wang","year":"2021","journal-title":"Inform Sci"},{"key":"10.1016\/j.jisa.2023.103685_b6","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","article-title":"Fractal sorting matrix and its application on chaotic image encryption","volume":"547","author":"Xian","year":"2021","journal-title":"Inform Sci"},{"key":"10.1016\/j.jisa.2023.103685_b7","doi-asserted-by":"crossref","first-page":"113163","DOI":"10.1109\/ACCESS.2020.3002763","article-title":"A new hash function based on chaotic maps and deterministic finite state automata","volume":"8","author":"Alawida","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2023.103685_b8","doi-asserted-by":"crossref","first-page":"17882","DOI":"10.1109\/ACCESS.2021.3049881","article-title":"A novel hash function based on a chaotic sponge and DNA sequence","volume":"9","author":"Alawida","year":"2021","journal-title":"IEEE Access"},{"unstructured":"Fan C, Ding Q. Analysis and resistance of dynamic degradation of digital chaos via functional graphs. Nonlinear Dynam 1\u201317.","key":"10.1016\/j.jisa.2023.103685_b9"},{"unstructured":"Liu L, Xiang H, Li X. A novel perturbation method to reduce the dynamical degradation of digital chaotic maps. Nonlinear Dynam 1\u201317.","key":"10.1016\/j.jisa.2023.103685_b10"},{"key":"10.1016\/j.jisa.2023.103685_b11","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.ins.2020.12.065","article-title":"Counteracting dynamical degradation of a class of digital chaotic systems via unscented kalman filter and perturbation","volume":"556","author":"Luo","year":"2021","journal-title":"Inform Sci"},{"key":"10.1016\/j.jisa.2023.103685_b12","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlaseng.2020.106485","article-title":"A sensitive dynamic mutual encryption system based on a new 1D chaotic map","volume":"139","author":"Midoun","year":"2021","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"10.1016\/j.jisa.2023.103685_b13","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/81.983865","article-title":"Identification of linear systems driven by chaotic signals using nonlinear prediction","volume":"49","author":"Zhu","year":"2002","journal-title":"IEEE Trans Circuits Syst I"},{"key":"10.1016\/j.jisa.2023.103685_b14","doi-asserted-by":"crossref","first-page":"24888","DOI":"10.1109\/ACCESS.2018.2832616","article-title":"Blind system identification using symbolic dynamics","volume":"6","author":"Mukhopadhyay","year":"2018","journal-title":"IEEE Access"},{"issue":"9","key":"10.1016\/j.jisa.2023.103685_b15","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1109\/TCSI.2016.2573283","article-title":"Parameter identification of chaotic and hyper-chaotic systems using synchronization-based parameter observer","volume":"63","author":"Chen","year":"2016","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"issue":"3","key":"10.1016\/j.jisa.2023.103685_b16","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.chaos.2011.12.006","article-title":"Analyzing logistic map pseudorandom number generators for periodicity induced by finite precision floating-point representation","volume":"45","author":"Persohn","year":"2012","journal-title":"Chaos Solitons Fractals"},{"issue":"7","key":"10.1016\/j.jisa.2023.103685_b17","doi-asserted-by":"crossref","first-page":"171","DOI":"10.3182\/20090622-3-UK-3004.00034","article-title":"Some hints for the design of digital chaos-based cryptosystems: lessons learned from cryptanalysis","volume":"42","author":"Arroyo","year":"2009","journal-title":"IFAC Proc Vol"},{"key":"10.1016\/j.jisa.2023.103685_b18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2017.02.031","article-title":"Delay-introducing method to improve the dynamical degradation of a digital chaotic map","volume":"396","author":"Liu","year":"2017","journal-title":"Inform Sci"},{"issue":"41","key":"10.1016\/j.jisa.2023.103685_b19","doi-asserted-by":"crossref","first-page":"30329","DOI":"10.1007\/s11042-020-09595-x","article-title":"An improved digital logistic map and its application in image encryption","volume":"79","author":"Xiang","year":"2020","journal-title":"Multimedia Tools Appl"},{"issue":"4","key":"10.1016\/j.jisa.2023.103685_b20","doi-asserted-by":"crossref","first-page":"1518","DOI":"10.1016\/j.chaos.2005.11.090","article-title":"A fast image encryption system based on chaotic maps with finite precision representation","volume":"32","author":"Kwok","year":"2007","journal-title":"Chaos Solitons Fractals"},{"issue":"9","key":"10.1016\/j.jisa.2023.103685_b21","doi-asserted-by":"crossref","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","article-title":"Cascade chaotic system with applications","volume":"45","author":"Zhou","year":"2014","journal-title":"IEEE Trans Cybern"},{"key":"10.1016\/j.jisa.2023.103685_b22","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","article-title":"A new 1D chaotic system for image encryption","volume":"97","author":"Zhou","year":"2014","journal-title":"Signal Process"},{"issue":"1","key":"10.1016\/j.jisa.2023.103685_b23","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/TCSI.2017.2717943","article-title":"One-dimensional nonlinear model for producing chaos","volume":"65","author":"Hua","year":"2017","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"issue":"1","key":"10.1016\/j.jisa.2023.103685_b24","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s40998-018-0122-0","article-title":"New and efficient method for extending cycle length of digital chaotic systems","volume":"43","author":"Merah","year":"2019","journal-title":"Iranian J Sci Technol Trans Electr Eng"},{"issue":"10","key":"10.1016\/j.jisa.2023.103685_b25","article-title":"A perturbation method to the tent map based on Lyapunov exponent and its application","volume":"24","author":"Lv-Chen","year":"2015","journal-title":"Chin Phys B"},{"issue":"12","key":"10.1016\/j.jisa.2023.103685_b26","doi-asserted-by":"crossref","first-page":"3469","DOI":"10.1109\/TCSI.2014.2336512","article-title":"Discrete wheel-switching chaotic system and applications","volume":"61","author":"Wu","year":"2014","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"issue":"6","key":"10.1016\/j.jisa.2023.103685_b27","doi-asserted-by":"crossref","first-page":"2322","DOI":"10.1109\/TCSI.2018.2888688","article-title":"Dynamic analysis of digital chaotic maps via state-mapping networks","volume":"66","author":"Li","year":"2019","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"issue":"2","key":"10.1016\/j.jisa.2023.103685_b28","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/j.chaos.2006.11.027","article-title":"A method of improving the properties of digital chaotic system","volume":"38","author":"Hu","year":"2008","journal-title":"Chaos Solitons Fractals"},{"issue":"6","key":"10.1016\/j.jisa.2023.103685_b29","doi-asserted-by":"crossref","first-page":"1970","DOI":"10.1016\/j.cnsns.2013.10.031","article-title":"Counteracting the dynamical degradation of digital chaos via hybrid control","volume":"19","author":"Hu","year":"2014","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"12","key":"10.1016\/j.jisa.2023.103685_b30","doi-asserted-by":"crossref","first-page":"3330","DOI":"10.1109\/TCYB.2015.2504180","article-title":"Dynamic parameter-control chaotic system","volume":"46","author":"Hua","year":"2015","journal-title":"IEEE Trans Cybern"},{"key":"10.1016\/j.jisa.2023.103685_b31","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.sigpro.2019.06.013","article-title":"An image encryption scheme based on hybridizing digital chaos and finite state machine","volume":"164","author":"Alawida","year":"2019","journal-title":"Signal Process"},{"issue":"3","key":"10.1016\/j.jisa.2023.103685_b32","doi-asserted-by":"crossref","first-page":"2403","DOI":"10.1007\/s11071-019-05311-z","article-title":"Deterministic chaotic finite-state automata","volume":"98","author":"Alawida","year":"2019","journal-title":"Nonlinear Dynam"},{"key":"10.1016\/j.jisa.2023.103685_b33","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","article-title":"A new color image encryption using combination of the 1D chaotic map","volume":"138","author":"Pak","year":"2017","journal-title":"Signal Process"},{"key":"10.1016\/j.jisa.2023.103685_b34","doi-asserted-by":"crossref","DOI":"10.1016\/j.csfx.2020.100023","article-title":"A self-perturbed pseudo-random sequence generator based on hyperchaos","volume":"4","author":"Zhao","year":"2019","journal-title":"Chaos Solitons Fractals: X","ISSN":"http:\/\/id.crossref.org\/issn\/2590-0544","issn-type":"print"},{"issue":"2","key":"10.1016\/j.jisa.2023.103685_b35","doi-asserted-by":"crossref","first-page":"1627","DOI":"10.1007\/s11071-021-06346-x","article-title":"Design of pseudo-random number generator from turbulence padded chaotic map","volume":"104","author":"Krishnamoorthi","year":"2021","journal-title":"Nonlinear Dynam"},{"key":"10.1016\/j.jisa.2023.103685_b36","first-page":"1","article-title":"A review on applications of chaotic maps in pseudo-random number generators and encryption","author":"Naik","year":"2022","journal-title":"Ann Data Sci"},{"issue":"1","key":"10.1016\/j.jisa.2023.103685_b37","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1007\/s11071-019-04809-w","article-title":"Enhancing unimodal digital chaotic maps through hybridisation","volume":"96","author":"Alawida","year":"2019","journal-title":"Nonlinear Dynam"},{"issue":"3","key":"10.1016\/j.jisa.2023.103685_b38","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","article-title":"Determining Lyapunov exponents from a time series","volume":"16","author":"Wolf","year":"1985","journal-title":"Physica D"},{"key":"10.1016\/j.jisa.2023.103685_b39","series-title":"Proceedings of the 36th IEEE conference on decision and control, vol. 1","first-page":"367","article-title":"Anticontrol of chaos via feedback","author":"Chen","year":"1997"},{"key":"10.1016\/j.jisa.2023.103685_b40","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","article-title":"Cosine-transform-based chaotic system for image encryption","volume":"480","author":"Hua","year":"2019","journal-title":"Inform Sci"},{"issue":"6","key":"10.1016\/j.jisa.2023.103685_b41","doi-asserted-by":"crossref","DOI":"10.1016\/j.jksuci.2023.101595","article-title":"A novel chaos-based permutation for image encryption","volume":"35","author":"Alawida","year":"2023","journal-title":"J King Saud Univ - Comput Inf Sci","ISSN":"http:\/\/id.crossref.org\/issn\/1319-1578","issn-type":"print"},{"key":"10.1016\/j.jisa.2023.103685_b42","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.ijleo.2018.12.178","article-title":"An image encryption algorithm based on modified logistic chaotic map","volume":"181","author":"Han","year":"2019","journal-title":"Optik"},{"issue":"1","key":"10.1016\/j.jisa.2023.103685_b43","first-page":"863","article-title":"Low power pseudo-random number generator based on lemniscate chaotic map","volume":"11","author":"Saber","year":"2021","journal-title":"Int J Electr Comput Eng"},{"key":"10.1016\/j.jisa.2023.103685_b44","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.ins.2021.07.096","article-title":"An image encryption algorithm based on new chaos and diffusion values of a truth table","volume":"579","author":"Wang","year":"2021","journal-title":"Inform Sci","ISSN":"http:\/\/id.crossref.org\/issn\/0020-0255","issn-type":"print"},{"issue":"2","key":"10.1016\/j.jisa.2023.103685_b45","doi-asserted-by":"crossref","first-page":"2871","DOI":"10.1016\/j.asoc.2010.11.020","article-title":"Complexity analysis of the biomedical signal using fuzzy entropy measurement","volume":"11","author":"Xie","year":"2011","journal-title":"Appl Soft Comput"},{"issue":"3","key":"10.1016\/j.jisa.2023.103685_b46","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1016\/j.camwa.2010.05.010","article-title":"A wavelet-based tool for studying non-periodicity","volume":"60","author":"Ben\u00edtez","year":"2010","journal-title":"Comput Math Appl"},{"key":"10.1016\/j.jisa.2023.103685_b47","doi-asserted-by":"crossref","first-page":"150609","DOI":"10.1109\/ACCESS.2019.2947561","article-title":"Digital cosine chaotic map for cryptographic applications","volume":"7","author":"Alawida","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2023.103685_b48","doi-asserted-by":"crossref","first-page":"1627","DOI":"10.1007\/s11071-021-06346-x","article-title":"Design of pseudo-random number generator from turbulence padded chaotic map","volume":"104","author":"Krishnamoorthi","year":"2021","journal-title":"Nonlinear Dynam"},{"issue":"11","key":"10.1016\/j.jisa.2023.103685_b49","doi-asserted-by":"crossref","first-page":"3039","DOI":"10.1016\/j.sigpro.2013.04.021","article-title":"Image encryption using a new parametric switching chaotic system","volume":"93","author":"Zhou","year":"2013","journal-title":"Signal Process"},{"key":"10.1016\/j.jisa.2023.103685_b50","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.sigpro.2018.01.026","article-title":"Integrated chaotic systems for image encryption","volume":"147","author":"Lan","year":"2018","journal-title":"Signal Process"},{"key":"10.1016\/j.jisa.2023.103685_b51","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2019.100083","article-title":"Enhancing the sensitivity of a chaos sensor for internet of things","volume":"7","author":"Natiq","year":"2019","journal-title":"Internet Things"},{"issue":"14","key":"10.1016\/j.jisa.2023.103685_b52","doi-asserted-by":"crossref","DOI":"10.1142\/S0218127418501766","article-title":"Analyzing Devaney chaos of a sine\u2013cosine compound function system","volume":"28","author":"Zhu","year":"2018","journal-title":"Int J Bifurcation Chaos"},{"issue":"05","key":"10.1016\/j.jisa.2023.103685_b53","doi-asserted-by":"crossref","DOI":"10.1142\/S0218127418500591","article-title":"Reducing the dynamical degradation by bi-coupling digital chaotic maps","volume":"28","author":"Liu","year":"2018","journal-title":"Int J Bifurcation Chaos"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002697?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002697?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T17:29:50Z","timestamp":1730914190000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212623002697"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":53,"alternative-id":["S2214212623002697"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103685","relation":{},"ISSN":["2214-2126"],"issn-type":[{"type":"print","value":"2214-2126"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhancing logistic chaotic map for improved cryptographic security in random number generation","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103685","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103685"}}