{"id":"https://openalex.org/W4213326178","doi":"https://doi.org/10.3390/sym14020373","title":"Symmetric Image Encryption Algorithm Based on a New Product Trigonometric Chaotic Map","display_name":"Symmetric Image Encryption Algorithm Based on a New Product Trigonometric Chaotic Map","publication_year":2022,"publication_date":"2022-02-13","ids":{"openalex":"https://openalex.org/W4213326178","doi":"https://doi.org/10.3390/sym14020373"},"language":"en","primary_location":{"id":"doi:10.3390/sym14020373","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym14020373","pdf_url":"https://www.mdpi.com/2073-8994/14/2/373/pdf?version=1645011660","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-8994/14/2/373/pdf?version=1645011660","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101475407","display_name":"Qing Lu","orcid":"https://orcid.org/0000-0002-1349-7584"},"institutions":[{"id":"https://openalex.org/I118612203","display_name":"Hunan Police Academy","ror":"https://ror.org/02gh10772","country_code":"CN","type":"education","lineage":["https://openalex.org/I118612203"]},{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing Lu","raw_affiliation_strings":["Hunan Police Academy, Changsha 410138, China","School of Computer Science and Engineering, Central South University, Changsha 410083, China"],"affiliations":[{"raw_affiliation_string":"Hunan Police Academy, Changsha 410138, China","institution_ids":["https://openalex.org/I118612203"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004705317","display_name":"Linlan Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I3130607311","display_name":"Changsha Normal University","ror":"https://ror.org/02sqk3z62","country_code":"CN","type":"education","lineage":["https://openalex.org/I3130607311"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linlan Yu","raw_affiliation_strings":["South Campus, Changsha Normal University, Changsha 410100, China"],"affiliations":[{"raw_affiliation_string":"South Campus, Changsha Normal University, Changsha 410100, China","institution_ids":["https://openalex.org/I3130607311"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081734128","display_name":"Congxu Zhu","orcid":"https://orcid.org/0000-0002-9662-0532"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Congxu Zhu","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha 410083, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081734128"],"corresponding_institution_ids":["https://openalex.org/I139660479"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":4.0834,"has_fulltext":true,"cited_by_count":44,"citation_normalized_percentile":{"value":0.95101944,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"14","issue":"2","first_page":"373","last_page":"373"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10588","display_name":"Mathematical Dynamics and Fractals","score":0.9627000093460083,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7194423079490662},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6359025835990906},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5151900053024292},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.49498075246810913},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.4599648118019104},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.42892494797706604},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4198168218135834},{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.41013482213020325},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3709532618522644},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.34891200065612793},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11531776189804077}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7194423079490662},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6359025835990906},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5151900053024292},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.49498075246810913},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.4599648118019104},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.42892494797706604},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4198168218135834},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.41013482213020325},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3709532618522644},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34891200065612793},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11531776189804077},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/sym14020373","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym14020373","pdf_url":"https://www.mdpi.com/2073-8994/14/2/373/pdf?version=1645011660","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f0bb14c06d1e4eeb8963d06d41f94995","is_oa":true,"landing_page_url":"https://doaj.org/article/f0bb14c06d1e4eeb8963d06d41f94995","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry, Vol 14, Iss 2, p 373 (2022)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2073-8994/14/2/373/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/sym14020373","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/sym14020373","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym14020373","pdf_url":"https://www.mdpi.com/2073-8994/14/2/373/pdf?version=1645011660","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8453333110","display_name":null,"funder_award_id":"62071496","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4213326178.pdf","grobid_xml":"https://content.openalex.org/works/W4213326178.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1980795195","https://openalex.org/W2109394932","https://openalex.org/W2223743107","https://openalex.org/W2609722788","https://openalex.org/W2782934755","https://openalex.org/W2805013403","https://openalex.org/W2905741893","https://openalex.org/W2908587336","https://openalex.org/W2918149988","https://openalex.org/W2945665032","https://openalex.org/W2952469659","https://openalex.org/W2967953071","https://openalex.org/W3003512042","https://openalex.org/W3004257937","https://openalex.org/W3005341457","https://openalex.org/W3008319366","https://openalex.org/W3010113315","https://openalex.org/W3014639127","https://openalex.org/W3021852960","https://openalex.org/W3035209172","https://openalex.org/W3081655872","https://openalex.org/W3092470496","https://openalex.org/W3118737018","https://openalex.org/W3138620072","https://openalex.org/W3155378837","https://openalex.org/W3165156628","https://openalex.org/W3169859030","https://openalex.org/W3176976593","https://openalex.org/W3217599535","https://openalex.org/W4200194781"],"related_works":["https://openalex.org/W1972971222","https://openalex.org/W2363437107","https://openalex.org/W2281112860","https://openalex.org/W4385729164","https://openalex.org/W2048539412","https://openalex.org/W2953986777","https://openalex.org/W2588177395","https://openalex.org/W2570389679","https://openalex.org/W4221094777","https://openalex.org/W1524430769"],"abstract_inverted_index":{"In":[0,71],"the":[1,16,51,66,85,90,94,99,132,146],"present":[2],"work,":[3],"a":[4,20,25,55,73,118],"neotype":[5],"chaotic":[6,17,57,63],"product":[7],"trigonometric":[8],"map":[9,69],"(PTM)":[10],"system":[11,22,53],"is":[12,48,81,87],"proposed.":[13],"We":[14],"demonstrate":[15],"characteristics":[18],"of":[19,27,93,102],"PTM":[21,52,75],"by":[23,131],"using":[24],"series":[26],"complexity":[28],"criteria,":[29],"such":[30],"as":[31],"bifurcation":[32],"diagrams,":[33,41],"Lyapunov":[34],"exponents,":[35],"approximate":[36],"entropy,":[37,39],"permutation":[38],"time-series":[40],"cobweb":[42],"graphs,":[43],"and":[44,60,117,139,155],"NIST":[45],"tests.":[46],"It":[47],"proved":[49],"that":[50,145],"has":[54,151],"wider":[56],"parameter":[58],"interval":[59],"more":[61],"complex":[62],"performance":[64,154],"than":[65],"existing":[67],"sine":[68],"system.":[70],"addition,":[72],"novel":[74],"based":[76],"symmetric":[77],"image":[78,115,124,148],"encryption":[79,100,128,149],"scheme":[80,150],"proposed,":[82],"in":[83],"which":[84,104],"key":[86],"related":[88],"to":[89],"hash":[91],"value":[92,126],"image.":[95],"The":[96],"algorithm":[97],"realizes":[98],"strategy":[101],"one-graph-one-key,":[103],"can":[105],"resist":[106],"plaintext":[107],"attack.":[108],"A":[109],"two-dimensional":[110],"coordinate":[111],"traversal":[112,121],"matrix":[113],"for":[114,123],"scrambling":[116],"one-dimensional":[119],"integer":[120,134],"sequence":[122],"pixel":[125],"transformation":[127],"are":[129],"generated":[130],"pseudo-random":[133],"generator":[135],"(PRING).":[136],"Security":[137],"analysis":[138],"various":[140],"simulation":[141],"test":[142],"results":[143],"show":[144],"proposed":[147],"good":[152],"cryptographic":[153],"high":[156],"time":[157],"efficiency.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
