{"id":"https://openalex.org/W2521458040","doi":"https://doi.org/10.1109/tcsi.2016.2598822","title":"An Encryption Scheme Based on Synchronization of Two-Layered Complex Dynamical Networks","display_name":"An Encryption Scheme Based on Synchronization of Two-Layered Complex Dynamical Networks","publication_year":2016,"publication_date":"2016-09-21","ids":{"openalex":"https://openalex.org/W2521458040","doi":"https://doi.org/10.1109/tcsi.2016.2598822","mag":"2521458040"},"language":"en","primary_location":{"id":"doi:10.1109/tcsi.2016.2598822","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsi.2016.2598822","pdf_url":null,"source":{"id":"https://openalex.org/S116977442","display_name":"IEEE Transactions on Circuits and Systems I Regular Papers","issn_l":"1549-8328","issn":["1549-8328","1558-0806"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems I: Regular Papers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100387514","display_name":"Hui Liu","orcid":"https://orcid.org/0009-0006-7165-4257"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hui Liu","raw_affiliation_strings":["Key Laboratory of Image Processing and Intelligent Control of Education Ministry of China, School of Automation, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Image Processing and Intelligent Control of Education Ministry of China, School of Automation, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033120483","display_name":"Haibo Wan","orcid":"https://orcid.org/0000-0002-1795-7429"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibo Wan","raw_affiliation_strings":["Key Laboratory of Image Processing and Intelligent Control of Education Ministry of China, School of Automation, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Image Processing and Intelligent Control of Education Ministry of China, School of Automation, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021923917","display_name":"Chi K. Tse","orcid":"https://orcid.org/0000-0002-0462-3999"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Chi K. Tse","raw_affiliation_strings":["Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, kowloon, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, kowloon, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027725400","display_name":"Jinhu L\u00fc","orcid":"https://orcid.org/0000-0003-0275-8387"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210120485","display_name":"Academy of Mathematics and Systems Science","ror":"https://ror.org/02jkmyk67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210120485"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinhu Lu","raw_affiliation_strings":["Academy of Mathematics and Systems Science,Chinese Academy of Sciences,Beijing,China)"],"affiliations":[{"raw_affiliation_string":"Academy of Mathematics and Systems Science,Chinese Academy of Sciences,Beijing,China)","institution_ids":["https://openalex.org/I4210120485","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100387514"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":5.0101,"has_fulltext":false,"cited_by_count":87,"citation_normalized_percentile":{"value":0.97054727,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"63","issue":"11","first_page":"2010","last_page":"2021"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10244","display_name":"Chaos control and synchronization","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8996157646179199},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.6583892107009888},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.6293798089027405},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.605504035949707},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5709208846092224},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5485036969184875},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.5198362469673157},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48129168152809143},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.443835586309433},{"id":"https://openalex.org/keywords/disk-encryption-theory","display_name":"Disk encryption theory","score":0.4356878995895386},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.344196081161499},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33418402075767517},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3204585909843445},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.30109408497810364},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.30090945959091187},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.263843834400177},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08674892783164978},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.05863240361213684}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8996157646179199},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.6583892107009888},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.6293798089027405},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.605504035949707},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5709208846092224},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5485036969184875},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.5198362469673157},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48129168152809143},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.443835586309433},{"id":"https://openalex.org/C122874069","wikidata":"https://www.wikidata.org/wiki/Q5282312","display_name":"Disk encryption theory","level":5,"score":0.4356878995895386},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.344196081161499},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33418402075767517},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3204585909843445},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.30109408497810364},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.30090945959091187},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.263843834400177},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08674892783164978},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.05863240361213684},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcsi.2016.2598822","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsi.2016.2598822","pdf_url":null,"source":{"id":"https://openalex.org/S116977442","display_name":"IEEE Transactions on Circuits and Systems I Regular Papers","issn_l":"1549-8328","issn":["1549-8328","1558-0806"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems I: Regular Papers","raw_type":"journal-article"},{"id":"pmh:oai:ira.lib.polyu.edu.hk:10397/66514","is_oa":false,"landing_page_url":"http://hdl.handle.net/10397/66514","pdf_url":null,"source":{"id":"https://openalex.org/S4306400205","display_name":"PolyU Institutional Research Archive (Hong Kong Polytechnic University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I14243506","host_organization_name":"Hong Kong Polytechnic University","host_organization_lineage":["https://openalex.org/I14243506"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal/Magazine Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4537342742","display_name":null,"funder_award_id":"11072254","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4913113906","display_name":null,"funder_award_id":"61403154","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5706247658","display_name":null,"funder_award_id":"61532020","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7444543045","display_name":null,"funder_award_id":"2016YFB0800401","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W603902311","https://openalex.org/W1130088951","https://openalex.org/W1631144957","https://openalex.org/W1901975232","https://openalex.org/W1964585252","https://openalex.org/W1970442252","https://openalex.org/W1981938824","https://openalex.org/W1996360405","https://openalex.org/W1998407327","https://openalex.org/W2001032007","https://openalex.org/W2002125190","https://openalex.org/W2003185355","https://openalex.org/W2004177075","https://openalex.org/W2006260478","https://openalex.org/W2008438846","https://openalex.org/W2014486267","https://openalex.org/W2029197379","https://openalex.org/W2032563530","https://openalex.org/W2032747934","https://openalex.org/W2032820503","https://openalex.org/W2037553913","https://openalex.org/W2049879616","https://openalex.org/W2050766178","https://openalex.org/W2063539292","https://openalex.org/W2069306548","https://openalex.org/W2072653011","https://openalex.org/W2075408371","https://openalex.org/W2085025385","https://openalex.org/W2092886131","https://openalex.org/W2094780448","https://openalex.org/W2105145864","https://openalex.org/W2108336503","https://openalex.org/W2109394932","https://openalex.org/W2111979391","https://openalex.org/W2112965025","https://openalex.org/W2117609499","https://openalex.org/W2128995499","https://openalex.org/W2131413806","https://openalex.org/W2143026326","https://openalex.org/W2150649057","https://openalex.org/W2153936398","https://openalex.org/W2157679697","https://openalex.org/W2158640222","https://openalex.org/W2158773692","https://openalex.org/W2160415132","https://openalex.org/W2161171568","https://openalex.org/W2167955841","https://openalex.org/W2170766502","https://openalex.org/W2249740901","https://openalex.org/W2283907552","https://openalex.org/W2486876923","https://openalex.org/W3105798161","https://openalex.org/W4232836212","https://openalex.org/W4249210728"],"related_works":["https://openalex.org/W1993945719","https://openalex.org/W4387429380","https://openalex.org/W2544443712","https://openalex.org/W2027741953","https://openalex.org/W2522187453","https://openalex.org/W1586655770","https://openalex.org/W2382125153","https://openalex.org/W3005779010","https://openalex.org/W1993510399","https://openalex.org/W2385054940"],"abstract_inverted_index":{"A":[0],"novel":[1],"encryption":[2,34,57,82,98],"scheme":[3,92,112],"based":[4],"on":[5,56],"complex":[6,26],"chaotic":[7,18,23,48],"networks":[8,49],"is":[9,63,84,93,113],"proposed":[10,91,111],"in":[11,33,73,95,117],"this":[12],"paper.":[13],"Compared":[14],"with":[15,66],"a":[16,20],"single":[17],"system,":[19],"network":[21],"of":[22,71,100],"systems":[24],"possesses":[25],"dynamic":[27],"characteristics,":[28],"which":[29],"can":[30],"be":[31],"used":[32],"to":[35,44,68,87],"enhance":[36],"security.":[37],"We":[38],"adopt":[39],"the":[40,51,69,74,81,110],"drive-response":[41],"synchronization":[42],"method":[43],"synchronize":[45],"two":[46],"identical":[47],"at":[50],"transmitter":[52],"and":[53,77,105,119],"receiver.":[54],"Analysis":[55],"security":[58],"shows":[59,79],"that":[60,80,109],"key":[61],"space":[62],"enlarged":[64],"exponentially":[65],"respect":[67],"number":[70],"nodes":[72],"drive":[75],"network,":[76],"also":[78],"system":[83],"highly":[85],"sensitive":[86],"parameter":[88],"mismatch.":[89],"The":[90],"competent":[94],"carrying":[96],"out":[97],"tasks":[99],"large":[101],"data.":[102],"Both":[103],"theoretical":[104],"numerical":[106],"results":[107],"demonstrate":[108],"feasible":[114],"for":[115],"implementation":[116],"image":[118],"data":[120],"encryption.":[121]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":16},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":11},{"year":2017,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
