{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T21:25:03Z","timestamp":1746653103720,"version":"3.37.3"},"reference-count":26,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T00:00:00Z","timestamp":1539820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"To enhance the encryption proficiency and encourage the protected transmission of multiple images, the current work introduces an encryption algorithm for multiple images using the combination of mixed image elements (MIES) and a two-dimensional economic map. Firstly, the original images are grouped into one big image that is split into many pure image elements (PIES); secondly, the logistic map is used to shuffle the PIES; thirdly, it is confused with the sequence produced by the two-dimensional economic map to get MIES; finally, the MIES are gathered into a big encrypted image that is split into many images of the same size as the original images. The proposed algorithm includes a huge number key size space, and this makes the algorithm secure against hackers. Even more, the encryption results obtained by the proposed algorithm outperform existing algorithms in the literature. A comparison between the proposed algorithm and similar algorithms is made. The analysis of the experimental results and the proposed algorithm shows that the proposed algorithm is efficient and secure.<\/jats:p>","DOI":"10.3390\/e20100801","type":"journal-article","created":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T14:55:41Z","timestamp":1539874541000},"page":"801","source":"Crossref","is-referenced-by-count":37,"title":["Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9819-9860","authenticated-orcid":false,"given":"A. A.","family":"Karawia","sequence":"first","affiliation":[{"name":"Department of Mathematics, Faculty of Science, Mansoura University, Mansoura 35516, Egypt"},{"name":"Computer Science Unit, Deanship of Educational Services, Qassim University, P.O. Box 6595, Buraidah 51452, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2018,10,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"341729","DOI":"10.1155\/2015\/341729","article-title":"Image encryption algorithm based on chaotic economic model","volume":"2015","author":"Askar","year":"2015","journal-title":"Math. Probl. Eng."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1049\/iet-ipr.2016.0906","article-title":"Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map","volume":"12","author":"Askar","year":"2018","journal-title":"IET Image Process."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Cao, Y., and Fu, C. (2008, January 20\u201322). An image encryption scheme based on high dimension chaos system. Proceedings of the 2008 International Conference on Intelligent Computation Technology and Automation, Changsha, China.","DOI":"10.1109\/ICICTA.2008.397"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Jeyamala, J., GrpiGranesh, S., and Raman, S. (2010, January 29\u201331). An image encryption scheme based on one time pads-a chaotic approach. Proceedings of the 2010 Second International conference on Computing, Communication and Networking Technologies, Karur, India.","DOI":"10.1109\/ICCCNT.2010.5591643"},{"key":"ref_5","first-page":"1468","article-title":"Image encryption based on pixel shuffling and random key stream","volume":"3","author":"Sivakumar","year":"2014","journal-title":"Int. J. Comput. Inf. Technol."},{"key":"ref_6","first-page":"917147","article-title":"Image encryption algorithm based on DNA encoding and chaotic maps","volume":"2014","author":"Zhang","year":"2014","journal-title":"Math. Probl. Eng."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2474","DOI":"10.1016\/j.ijleo.2015.06.012","article-title":"A new encryption algorithm for color images based on total chaotic shuffling scheme","volume":"126","author":"Vaferi","year":"2015","journal-title":"Opt.-Int. J. Light Electron Opt."},{"key":"ref_8","first-page":"13906","article-title":"Secret sharing approaches for 3D object encryption","volume":"38","author":"Elsheh","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Wang, J., and Ding, Q. (2018). Dynamic rounds chaotic block cipher based on keyword abstract extraction. Entropy, 20.","DOI":"10.3390\/e20090693"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1016\/j.compeleceng.2016.12.025","article-title":"Multiple-image encryption algorithm based on mixed image element and chaos","volume":"62","author":"Zhang","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.optlaseng.2017.10.010","article-title":"Multiple image encryption scheme based on pixel exchange operation and vector decomposition","volume":"101","author":"Xiong","year":"2018","journal-title":"Opt. Lasers Eng."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.optlaseng.2016.12.005","article-title":"Multiple-image encryption algorithm based on mixed image element and permutation","volume":"92","author":"Zhang","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.optcom.2015.09.039","article-title":"Multiple-image encryption based on computational ghost imaging","volume":"359","author":"Wu","year":"2016","journal-title":"Opt. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.optcom.2014.09.046","article-title":"Multiple-image encryption based on optical asymmetric key cryptosystem","volume":"335","author":"Liu","year":"2015","journal-title":"Opt. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.optcom.2015.09.056","article-title":"Multiple-image encryption using spectral cropping and spatial multiplexing","volume":"359","author":"Deng","year":"2016","journal-title":"Opt. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.optlaseng.2017.10.023","article-title":"Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme","volume":"102","author":"Li","year":"2018","journal-title":"Opt. Lasers Eng."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1016\/j.imavis.2007.08.017","article-title":"A blind source separation-based method for multiple images encryption","volume":"26","author":"Lin","year":"2008","journal-title":"Image Vis. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4317","DOI":"10.1016\/j.optcom.2012.07.033","article-title":"Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain","volume":"285","author":"Wang","year":"2012","journal-title":"Opt. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.ijleo.2018.06.029","article-title":"Multiple-image encryption by using robust chaotic map in wavelet transform domain","volume":"171","author":"Li","year":"2018","journal-title":"Opt.-Int. J. Light Electron Opt."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","article-title":"Multiple-image encryption with bit-plane decomposition and chaotic maps","volume":"80","author":"Tang","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"10631","DOI":"10.1007\/s11042-014-2115-y","article-title":"Breaking an image encryption algorithm based on the new substitution stage with chaotic functions","volume":"75","author":"Parvin","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_22","first-page":"111","article-title":"Secure multi\u2013level permutation operation based multiple colour image encryption","volume":"40","author":"Patro","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.orl.2013.12.006","article-title":"Complex dynamic properties of Cournot duopoly games with convex and log-concave demand function","volume":"42","author":"Askar","year":"2014","journal-title":"Oper. Res. Lett."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2646205","DOI":"10.1155\/2016\/2646205","article-title":"A Novel encryption algorithm based on DWT and multichaos mapping","volume":"2016","author":"Wang","year":"2016","journal-title":"J. Sens."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","article-title":"Color image encryption based on one-time keys and robust chaotic maps","volume":"59","author":"Liu","year":"2010","journal-title":"Comput. Math. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","article-title":"A novel image encryption scheme based on substitution-permutation network and chaos","volume":"128","author":"Belazi","year":"2016","journal-title":"Signal Process."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/20\/10\/801\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T04:04:01Z","timestamp":1718251441000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/20\/10\/801"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,18]]},"references-count":26,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2018,10]]}},"alternative-id":["e20100801"],"URL":"https:\/\/doi.org\/10.3390\/e20100801","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2018,10,18]]}}}