{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:52:29Z","timestamp":1740149549231,"version":"3.37.3"},"reference-count":19,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2022,6,8]],"date-time":"2022-06-08T00:00:00Z","timestamp":1654646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Deanship of Scientific Research, Qassim University"},{"name":"Natural Sciences and Engineering Research Council of Canada (NSERC)"},{"name":"New Brunswick Innovation Foundation (NBIF)"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"In the last decade, the communication of images through the internet has increased. Due to the growing demands for data transfer through images, protection of data and safe communication is very important. For this purpose, many encryption techniques have been designed and developed. New and secured encryption schemes based on chaos theory have introduced methods for secure as well as fast communication. A modified image encryption process is proposed in this work with chaotic maps and orthogonal matrix in Hill cipher. Image encryption involves three phases. In the first phase, a chaotic Henon map is used for permuting the digital image. In the second phase, a Hill cipher is used whose encryption key is generated by an orthogonal matrix which further is produced from the equation of the plane. In the third phase, a sequence is generated by a chaotic tent map which is later XORed. Chaotic maps play an important role in the encryption process. To deal with the issues of fast and highly secured image processing, the prominent properties of non-periodical movement and non-convergence of chaotic theory play an important role. The proposed scheme is resistant to different attacks on the cipher image. Different tests have been applied to evaluate the proposed technique. The results of the tests such as key space analysis, key sensitivity analysis, and information entropy, histogram correlation of the adjacent pixels, number of pixel change rate (NPCR), peak signal to noise ratio (PSNR), and unified average changing intensity (UCAI) showed that our proposed scheme is an efficient encryption technique. The proposed approach is also compared with some state-of-the-art image encryption techniques. In the view of statistical analysis, we claim that our proposed encryption algorithm is secured.<\/jats:p>","DOI":"10.3390\/s22124359","type":"journal-article","created":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T06:01:44Z","timestamp":1655100104000},"page":"4359","source":"Crossref","is-referenced-by-count":26,"title":["An Effective Color Image Encryption Based on Henon Map, Tent Chaotic Map, and Orthogonal Matrices"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6392-2406","authenticated-orcid":false,"given":"Shamsa","family":"Kanwal","sequence":"first","affiliation":[{"name":"Department of Mathematical Sciences, Faculty of Science and Technology, Fatima Jinnah Women University, The Mall, Rawalpindi 46000, Pakistan"}]},{"given":"Saba","family":"Inam","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences, Faculty of Science and Technology, Fatima Jinnah Women University, The Mall, Rawalpindi 46000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0990-5805","authenticated-orcid":false,"given":"Mohamed Tahar Ben","family":"Othman","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer, Qassim University, Buraydah 51452, Saudi Arabia"}]},{"given":"Ayesha","family":"Waqar","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences, Faculty of Science and Technology, Fatima Jinnah Women University, The Mall, Rawalpindi 46000, Pakistan"}]},{"given":"Muhammad","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Department of Information Technology, University of Haripur, Haripur 22620, Pakistan"},{"name":"Big Data Research Center, Jeju National University, Jeju-si 63243, Korea"}]},{"given":"Fariha","family":"Nawaz","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences, Faculty of Science and Technology, Fatima Jinnah Women University, The Mall, Rawalpindi 46000, Pakistan"}]},{"given":"Zainab","family":"Nawaz","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences, Faculty of Science and Technology, Fatima Jinnah Women University, The Mall, Rawalpindi 46000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5320-1012","authenticated-orcid":false,"given":"Habib","family":"Hamam","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Universit\u00e9 de Moncton, Moncton, NB E1A 3E9, Canada"},{"name":"Spectrum of Knowledge Production & Skills Development, Sfax 3027, Tunisia"},{"name":"Department of Electrical and Electronic Engineering Science, School of Electrical Engineering, University of Johannesburg, Johannesburg 2006, South Africa"},{"name":"International Institute of Technology and Management, Commune d\u2019Akanda, Libreville 1989, Gabon"}]}],"member":"1968","published-online":{"date-parts":[[2022,6,8]]},"reference":[{"key":"ref_1","first-page":"15","article-title":"A Study of Encryption Algorithms AES, DES and RSA for Security","volume":"13","author":"Mahajan","year":"2013","journal-title":"Glob. J. Comput. Sci. Technol."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Mandal, A.K., Parakash, C., and Tiwari, A. (2012, January 1\u20132). Performance Evaluation of Cryptographic Algorithms: DES and AES. Proceedings of the IEEE Students\u2019 Conference on Electrical, Electronics and Computer Science, Bhopal, India.","DOI":"10.1109\/SCEECS.2012.6184991"},{"key":"ref_3","first-page":"636","article-title":"Atmospheric predictability as revealed by naturally occurring analogues","volume":"26","author":"Lorenz","year":"1969","journal-title":"J. Amos. Sci."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/0031-3203(92)90074-S","article-title":"Pictyre data encryption using SCAN patterns","volume":"25","author":"Bourbakis","year":"1992","journal-title":"Pattern Recognit."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","article-title":"Symmetric ciphers based on two dimensional chaotic maps","volume":"8","author":"Jiri","year":"1998","journal-title":"Int. J. Bifurcat Chaos"},{"key":"ref_6","first-page":"318","article-title":"Fast encryption of image data using chaotic Kolmogorov flow","volume":"7","author":"Scharinger","year":"1998","journal-title":"J. Electron. Eng."},{"key":"ref_7","unstructured":"Yen, J.C., and Guo, J.I. (1999, January 22). A new image encryption algorithm and its VLSI architecture. Proceedings of the IEEE Workshop Signal Processing Systems, Taipei, Taiwan."},{"key":"ref_8","unstructured":"Li, S., Zheng, X., Mou, X., and Cai, Y. (2002, January 19). Chaotic encryption scheme for real time digital video. Proceedings of the SPIE on Electronic Imaging, San Jose, CA, USA."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","article-title":"A symmetric image encryption based on 3D chaotic maps","volume":"21","author":"Chen","year":"2004","journal-title":"Chaos Solitons Fractals"},{"key":"ref_10","first-page":"5","article-title":"Hill Cipher Key Generation Algorithm by using Orthogonal Matrix","volume":"3","author":"Fozia","year":"2015","journal-title":"Int. J. Innov. Sci. Mod. Eng."},{"key":"ref_11","unstructured":"(2017, September 19). Usc-Sipi Image Database for Research in Image Processing, Image Analysis, and Machine Vision. Available online: http:\/\/sipi.usc.edu\/database\/."},{"key":"ref_12","first-page":"102470","article-title":"Multiple grayscale image encryption using cross-coupled chaotic maps","volume":"52","author":"Patro","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2759","DOI":"10.1007\/s11071-021-06409-z","article-title":"An efficient dual-layer cross-coupled chaotic map security-based multi-image encryption system","volume":"104","author":"Patro","year":"2021","journal-title":"Nonlinear Dyn."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"5499538","DOI":"10.1155\/2021\/5499538","article-title":"Analytic study of a novel color Image Encryption Method Based on the chaos System and color codes","volume":"2021","author":"Kanwal","year":"2021","journal-title":"Complexity"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"12","DOI":"10.23919\/JCC.2020.05.002","article-title":"A color image encryption algorithm based on 2D-CIMM chaotic map","volume":"17","author":"Chen","year":"2020","journal-title":"China Commun."},{"key":"ref_16","first-page":"10","article-title":"A novel color image encryption scheme using the fractional-order hyperchaotic system and DNA sequence operations","volume":"26","author":"Zhang","year":"2017","journal-title":"Chin. Phys. B"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1437","DOI":"10.1007\/s00542-019-04676-w","article-title":"Various dimensional colour image encryption based on non-overlapping block-level diffusion operation","volume":"26","author":"Patro","year":"2020","journal-title":"Microsyst. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3143","DOI":"10.1049\/iet-ipr.2018.5654","article-title":"Advanced framework for highly secure and cloud-based storage of colour images","volume":"14","author":"Chidambaram","year":"2020","journal-title":"IET Image Process."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"10013","DOI":"10.1007\/s11042-018-6612-2","article-title":"An image encryption algorithm based on substitution technique and chaos mixing","volume":"78","author":"Nkandeu","year":"2019","journal-title":"Multimed. Tools Appl."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/12\/4359\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T19:28:38Z","timestamp":1737142118000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/12\/4359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,8]]},"references-count":19,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2022,6]]}},"alternative-id":["s22124359"],"URL":"https:\/\/doi.org\/10.3390\/s22124359","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,6,8]]}}}