{"id":"https://openalex.org/W7123628309","doi":"https://doi.org/10.1186/s42400-025-00541-8","title":"A newly image encryption scheme based on 3-D coupled map lattice and Baker map","display_name":"A newly image encryption scheme based on 3-D coupled map lattice and Baker map","publication_year":2026,"publication_date":"2026-01-14","ids":{"openalex":"https://openalex.org/W7123628309","doi":"https://doi.org/10.1186/s42400-025-00541-8"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00541-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00541-8","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00541-8.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00541-8.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100355531","display_name":"Zhuo Liu","orcid":"https://orcid.org/0000-0002-7591-7775"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]},{"id":"https://openalex.org/I4210087731","display_name":"Guizhou Education University","ror":"https://ror.org/002x6f380","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210087731"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuo Liu","raw_affiliation_strings":["School of Mathematics and Big Data, Guizhou Education University, No. 115 Gaoxin Road, Wudang District, Guiyang, 550018, Guizhou, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Big Data, Guizhou Education University, No. 115 Gaoxin Road, Wudang District, Guiyang, 550018, Guizhou, China","institution_ids":["https://openalex.org/I178232147","https://openalex.org/I4210087731"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122983801","display_name":"Yong Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yong Wang","raw_affiliation_strings":["College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, No. 2 Chongwen Road, Nan\u2019an District, Chongqing, 400065, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, No. 2 Chongwen Road, Nan\u2019an District, Chongqing, 400065, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122958973","display_name":"Jinyuan Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]},{"id":"https://openalex.org/I168337820","display_name":"Chongqing University of Science and Technology","ror":"https://ror.org/03n3v6d52","country_code":"CN","type":"education","lineage":["https://openalex.org/I168337820"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinyuan Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Chongqing University of Science and Technology, No. 20 Daxuecheng East Road, Shapingba District, Chongqing, 400065, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Chongqing University of Science and Technology, No. 20 Daxuecheng East Road, Shapingba District, Chongqing, 400065, China","institution_ids":["https://openalex.org/I168337820","https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001658942","display_name":"Feng Jun","orcid":"https://orcid.org/0000-0002-7626-7540"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Feng","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, No. 1037 Luoyu Road, Hongshan District, Wuhan, 430074, Hu Bei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, No. 1037 Luoyu Road, Hongshan District, Wuhan, 430074, Hu Bei, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121758839","display_name":"Leo Yu Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Leo Yu Zhang","raw_affiliation_strings":["School of Information and Communication Technology, Griffith University, 170 Kessels Road, Nathan Qld, Gold Coast, QLD, 4111, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Technology, Griffith University, 170 Kessels Road, Nathan Qld, Gold Coast, QLD, 4111, Australia","institution_ids":["https://openalex.org/I11701301"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5122983801"],"corresponding_institution_ids":["https://openalex.org/I10535382"],"apc_list":null,"apc_paid":null,"fwci":32.3596,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.98183165,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.003800000064074993,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.0013000000035390258,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.795799970626831},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7882000207901001},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5978000164031982},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5965999960899353},{"id":"https://openalex.org/keywords/coupled-map-lattice","display_name":"Coupled map lattice","score":0.5525000095367432},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.503600001335144},{"id":"https://openalex.org/keywords/chaotic-map","display_name":"Chaotic map","score":0.4643000066280365},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.41999998688697815}],"concepts":[{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.795799970626831},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7882000207901001},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5978000164031982},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5965999960899353},{"id":"https://openalex.org/C39630112","wikidata":"https://www.wikidata.org/wiki/Q5178018","display_name":"Coupled map lattice","level":5,"score":0.5525000095367432},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5418999791145325},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.536300003528595},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.503600001335144},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.48399999737739563},{"id":"https://openalex.org/C2983793180","wikidata":"https://www.wikidata.org/wiki/Q166314","display_name":"Chaotic map","level":3,"score":0.4643000066280365},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.41999998688697815},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.37709999084472656},{"id":"https://openalex.org/C2781140086","wikidata":"https://www.wikidata.org/wiki/Q557945","display_name":"Confusion","level":2,"score":0.37630000710487366},{"id":"https://openalex.org/C2781204021","wikidata":"https://www.wikidata.org/wiki/Q6497091","display_name":"Lattice (music)","level":2,"score":0.3650999963283539},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.3601999878883362},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.32839998602867126},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3158000111579895},{"id":"https://openalex.org/C142616399","wikidata":"https://www.wikidata.org/wiki/Q5148604","display_name":"Color image","level":4,"score":0.29170000553131104},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.2840999960899353},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26330000162124634},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.26010000705718994},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.2533999979496002}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00541-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00541-8","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00541-8.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e7d3ec0c18a140508e8570541dd48d8a","is_oa":true,"landing_page_url":"https://doaj.org/article/e7d3ec0c18a140508e8570541dd48d8a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-20 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00541-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00541-8","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00541-8.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1027828781","display_name":null,"funder_award_id":"QianKeHeJiChu-ZK[2022]YiBan331","funder_id":"https://openalex.org/F4320336617","funder_display_name":"Science and Technology Program of Guizhou Province"},{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1871489870","display_name":null,"funder_award_id":"62272077","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7608752429","display_name":null,"funder_award_id":"Talent","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321926","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065"},{"id":"https://openalex.org/F4320323970","display_name":"Ministry of Industry and Information Technology of the People's Republic of China","ror":"https://ror.org/0385nmy68"},{"id":"https://openalex.org/F4320336617","display_name":"Science and Technology Program of Guizhou Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7123628309.pdf","grobid_xml":"https://content.openalex.org/works/W7123628309.grobid-xml"},"referenced_works_count":45,"referenced_works":["https://openalex.org/W1976813621","https://openalex.org/W1982747216","https://openalex.org/W2176627963","https://openalex.org/W2790533449","https://openalex.org/W2803633784","https://openalex.org/W2909459674","https://openalex.org/W2921034462","https://openalex.org/W2995916271","https://openalex.org/W3049680823","https://openalex.org/W3120930667","https://openalex.org/W3153874840","https://openalex.org/W3156154654","https://openalex.org/W3158925544","https://openalex.org/W3160603889","https://openalex.org/W3170092993","https://openalex.org/W3211136635","https://openalex.org/W3216886001","https://openalex.org/W4205557962","https://openalex.org/W4205949069","https://openalex.org/W4206197292","https://openalex.org/W4221094777","https://openalex.org/W4224457755","https://openalex.org/W4282037600","https://openalex.org/W4293046632","https://openalex.org/W4376506457","https://openalex.org/W4377030789","https://openalex.org/W4385729164","https://openalex.org/W4390819739","https://openalex.org/W4392381163","https://openalex.org/W4393381637","https://openalex.org/W4396943755","https://openalex.org/W4399249343","https://openalex.org/W4402013417","https://openalex.org/W4402907406","https://openalex.org/W4403648585","https://openalex.org/W4403656371","https://openalex.org/W4404654199","https://openalex.org/W4406239397","https://openalex.org/W4408189996","https://openalex.org/W4410153295","https://openalex.org/W4411376427","https://openalex.org/W4411787207","https://openalex.org/W4413340063","https://openalex.org/W6884306940","https://openalex.org/W7092286619"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Recently,":[1],"image":[2,102,185,236,294],"encryption":[3,103,186,266,295],"is":[4,40,94,188,198,213],"becoming":[5],"increasingly":[6],"important,":[7],"many":[8],"chaotic":[9,35,78,126,137,162,204,288,293],"models":[10],"have":[11,164],"been":[12],"prevalently":[13],"used":[14,42],"to":[15,118,217,282],"design":[16],"kinds":[17],"of":[18,64,86,109,112,143,150,232,252],"cryptographic":[19,46,175,277],"schemes":[20],"in":[21,54,274],"chaos":[22],"cryptography.":[23],"Among":[24],"those":[25,44,161,179,202],"models,":[26],"coupled":[27],"map":[28],"lattice":[29],"(CML),":[30],"as":[31],"a":[32,182,233],"classics":[33],"spatiotemporal":[34],"model":[36,60],"with":[37,105],"good":[38],"performance,":[39,267],"popularly":[41,272],"for":[43,99,171,248],"chaos-based":[45,101,174],"schemes.":[47,296],"However,":[48],"there":[49],"exist":[50],"no":[51],"scientific":[52],"studies":[53],"the":[55,62,76,83,136,151,173,207,218,250,275,284],"three":[56],"dimensional":[57,130,133],"(3D)":[58],"CML":[59,87,90,114,153,209],"from":[61,147],"view":[63],"theoretical":[65,285],"and":[66,81,131,157,192,224,229,268,290],"application":[67,84],"perspectives":[68],"besides":[69],"our":[70,97,195,253,262],"previous":[71],"research.":[72],"To":[73,255],"further":[74],"improve":[75],"complicated":[77,125],"dynamic":[79],"behavior":[80,127],"extend":[82],"scenarios":[85],"into":[88,96,239],"a3D":[89],"one,":[91],"therefore":[92],"it":[93,122,269],"introduced":[95],"paper":[98],"constructing":[100],"scheme":[104,187,263],"higher":[106],"security.":[107],"First":[108],"all,":[110],"properties":[111],"3D":[113,152,208],"are":[115,139,168,237],"comprehensively":[116],"analyzed":[117],"fully":[119],"verify":[120],"that":[121],"possesses":[123],"more":[124],"than":[128],"one":[129,240],"two":[132],"CML.":[134],"Subsequently,":[135],"sequences":[138,163,205],"produced":[140],"by":[141],"means":[142],"intercepting":[144],"32":[145],"bit":[146,244],"each":[148],"node":[149],"model,":[154,210],"both":[155],"NIST":[156],"TestU01":[158],"testing":[159],"certificate":[160],"high":[165],"randomness,":[166],"which":[167],"pretty":[169],"suitable":[170],"designing":[172],"scheme.":[176,254],"Based":[177],"on":[178,201,287],"above-mentioned":[180,203],"analyses,":[181],"new":[183,292],"color":[184,235],"proposed":[189],"via":[190,206],"diffusion":[191,197,223],"confusion.":[193],"In":[194],"scheme,":[196],"performed":[199],"based":[200],"while":[211],"confusion":[212,225],"carried":[214],"out":[215],"according":[216],"Baker":[219],"map.":[220],"Specially,":[221],"before":[222],"operations,":[226],"red,":[227],"green":[228],"blue":[230],"channel":[231],"plain":[234],"combined":[238],"pixel":[241],"including":[242],"24":[243],"(0":[245],"or":[246],"1)":[247],"improving":[249],"efficiency":[251],"sum":[256],"up,":[257],"all":[258],"corresponding":[259],"simulations":[260],"show":[261],"has":[264],"excellent":[265],"would":[270],"be":[271],"applied":[273],"real-life":[276],"domains.":[278],"Our":[279],"research":[280,286],"contributes":[281],"enriching":[283],"cryptography":[289],"provides":[291]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2026-01-14T00:00:00"}
