{"id":"https://openalex.org/W4385416114","doi":"https://doi.org/10.3390/sym15081511","title":"A Novel Conservative Chaotic System Involved in Hyperbolic Functions and Its Application to Design an Efficient Colour Image Encryption Scheme","display_name":"A Novel Conservative Chaotic System Involved in Hyperbolic Functions and Its Application to Design an Efficient Colour Image Encryption Scheme","publication_year":2023,"publication_date":"2023-07-31","ids":{"openalex":"https://openalex.org/W4385416114","doi":"https://doi.org/10.3390/sym15081511"},"language":"en","primary_location":{"id":"doi:10.3390/sym15081511","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym15081511","pdf_url":"https://www.mdpi.com/2073-8994/15/8/1511/pdf?version=1690794078","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-8994/15/8/1511/pdf?version=1690794078","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054952676","display_name":"Ammar Ali Neamah","orcid":null},"institutions":[{"id":"https://openalex.org/I47229656","display_name":"University of Kufa","ror":"https://ror.org/02dwrdh81","country_code":"IQ","type":"education","lineage":["https://openalex.org/I47229656"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Ammar Ali Neamah","raw_affiliation_strings":["Faculty of Computer Science and Mathematics, University of Kufa, Najaf 54001, Iraq"],"raw_orcid":"https://orcid.org/0000-0003-4833-781X","affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Mathematics, University of Kufa, Najaf 54001, Iraq","institution_ids":["https://openalex.org/I47229656"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072875386","display_name":"\u0410\u043b\u0438 \u0410. \u0428\u0443\u043a\u0443\u0440","orcid":"https://orcid.org/0000-0003-3513-9216"},"institutions":[{"id":"https://openalex.org/I47229656","display_name":"University of Kufa","ror":"https://ror.org/02dwrdh81","country_code":"IQ","type":"education","lineage":["https://openalex.org/I47229656"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Ali A. Shukur","raw_affiliation_strings":["Faculty of Computer Science and Mathematics, University of Kufa, Najaf 54001, Iraq"],"raw_orcid":"https://orcid.org/0000-0003-3513-9216","affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Mathematics, University of Kufa, Najaf 54001, Iraq","institution_ids":["https://openalex.org/I47229656"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072875386"],"corresponding_institution_ids":["https://openalex.org/I47229656"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":2.4727,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.91105688,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"15","issue":"8","first_page":"1511","last_page":"1511"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10588","display_name":"Mathematical Dynamics and Fractals","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10244","display_name":"Chaos control and synchronization","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8121155500411987},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.7210955619812012},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5666038393974304},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5226154923439026},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5109964609146118},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4847068786621094},{"id":"https://openalex.org/keywords/lyapunov-exponent","display_name":"Lyapunov exponent","score":0.4769105911254883},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4757421016693115},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4609137177467346},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4398011565208435},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2707456350326538}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8121155500411987},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.7210955619812012},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5666038393974304},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5226154923439026},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5109964609146118},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4847068786621094},{"id":"https://openalex.org/C191544260","wikidata":"https://www.wikidata.org/wiki/Q1238630","display_name":"Lyapunov exponent","level":3,"score":0.4769105911254883},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4757421016693115},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4609137177467346},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4398011565208435},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2707456350326538},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/sym15081511","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym15081511","pdf_url":"https://www.mdpi.com/2073-8994/15/8/1511/pdf?version=1690794078","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2014b4dedbbc46e28b6438cabec21a05","is_oa":true,"landing_page_url":"https://doaj.org/article/2014b4dedbbc46e28b6438cabec21a05","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry, Vol 15, Iss 8, p 1511 (2023)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2073-8994/15/8/1511/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/sym15081511","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry; Volume 15; Issue 8; Pages: 1511","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/sym15081511","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym15081511","pdf_url":"https://www.mdpi.com/2073-8994/15/8/1511/pdf?version=1690794078","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385416114.pdf"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W1948596969","https://openalex.org/W1967008192","https://openalex.org/W1985039283","https://openalex.org/W2003647955","https://openalex.org/W2036100679","https://openalex.org/W2069436097","https://openalex.org/W2102892532","https://openalex.org/W2141394518","https://openalex.org/W2143565504","https://openalex.org/W2547085574","https://openalex.org/W2581480812","https://openalex.org/W2762325369","https://openalex.org/W2802038871","https://openalex.org/W2810671916","https://openalex.org/W2811350001","https://openalex.org/W2884884884","https://openalex.org/W2913502935","https://openalex.org/W2915863155","https://openalex.org/W2921713408","https://openalex.org/W2924674406","https://openalex.org/W2943810070","https://openalex.org/W3000233490","https://openalex.org/W3000783262","https://openalex.org/W3003366208","https://openalex.org/W3009544986","https://openalex.org/W3011797753","https://openalex.org/W3012184116","https://openalex.org/W3033181913","https://openalex.org/W3049462057","https://openalex.org/W3088963427","https://openalex.org/W3108005168","https://openalex.org/W3108287416","https://openalex.org/W3159642393","https://openalex.org/W4206330329","https://openalex.org/W4213015433","https://openalex.org/W4224288992","https://openalex.org/W4306835869","https://openalex.org/W4312576696","https://openalex.org/W4319068553","https://openalex.org/W4321204469","https://openalex.org/W4324359158","https://openalex.org/W6640686619","https://openalex.org/W6752863831","https://openalex.org/W6758777725","https://openalex.org/W6786803165","https://openalex.org/W6795258882","https://openalex.org/W6806375528","https://openalex.org/W6850254438"],"related_works":["https://openalex.org/W1979229270","https://openalex.org/W2374600121","https://openalex.org/W2027784897","https://openalex.org/W2361515791","https://openalex.org/W2375956839","https://openalex.org/W2899627504","https://openalex.org/W2376048186","https://openalex.org/W2375981391","https://openalex.org/W45120566","https://openalex.org/W2361408597"],"abstract_inverted_index":{"It":[0],"is":[1,165,175,197],"well":[2],"known":[3],"that,":[4],"compared":[5],"to":[6,28,97,127,199],"low-dimension":[7],"chaotic":[8,11,39,51],"systems,":[9],"three-dimensional":[10,38,45,121],"systems":[12],"have":[13],"a":[14,30,37,43,85,191],"wider":[15],"parameter":[16],"range,":[17],"more":[18],"complicated":[19],"behaviour,":[20],"and":[21,69,84,138,172,196,203],"better":[22],"unpredictability.":[23],"This":[24],"fact":[25],"motivated":[26],"us":[27],"introduce":[29],"novel":[31,44],"image":[32,76,126,164,188],"encryption":[33,77],"method":[34,78],"that":[35,48,185],"employs":[36],"system.":[40],"We":[41],"proposed":[42,61,82,120,187],"conservative":[46],"system":[47,62,83,122],"can":[49],"exhibit":[50],"behaviour":[52],"involving":[53],"hyperbolic":[54],"functions.":[55],"The":[56,141],"dynamical":[57],"behaviours":[58],"of":[59,132,153,169,194],"the":[60,81,99,106,116,119,124,146,151,159,162,186],"are":[63,134],"discovered":[64],"by":[65,149,177],"calculating":[66],"Lyapunov":[67],"exponents":[68],"bifurcation":[70],"diagrams.":[71],"Thereafter,":[72],"we":[73],"designed":[74],"an":[75],"based":[79],"on":[80],"4\u00d74":[86],"self-invertible":[87,100],"matrix.":[88],"A":[89],"modified":[90],"Diffie\u2013Hellman":[91],"key":[92,101],"exchange":[93],"protocol":[94],"was":[95],"utilised":[96],"generate":[98],"matrix":[102],"Km":[103],"employed":[104],"in":[105],"diffusion":[107,139],"stage.":[108],"Our":[109],"approach":[110],"has":[111,190],"three":[112,129],"main":[113],"stages.":[114],"In":[115,158],"first":[117],"stage,":[118,161],"utilises":[123],"original":[125],"create":[128],"sequences,":[130],"two":[131],"which":[133],"chosen":[135],"for":[136],"confusion":[137],"processes.":[140],"next":[142],"stage":[143],"involves":[144],"confusing":[145],"image\u2019s":[147],"pixels":[148,154],"changing":[150],"positions":[152],"using":[155],"these":[156],"sequences.":[157],"third":[160],"confused":[163],"split":[166],"into":[167],"sub-blocks":[168],"size":[170],"4\u00d74,":[171],"each":[173],"block":[174],"encrypted":[176],"multiplying":[178],"it":[179],"with":[180],"Km.":[181],"Simulation":[182],"findings":[183],"demonstrated":[184],"scheme":[189],"high":[192],"level":[193],"security":[195],"resistant":[198],"statistical":[200],"analysis,":[201],"noise,":[202],"other":[204],"attacks.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2023-08-01T00:00:00"}
