A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1038/s41598-025-14784-5
With the rapid growth in the exchange of digital data, the problem of protecting images has become essential, particularly in sectors such as medicine, surveillance and secure communications. Traditional encryption techniques, such as DES, AES and RSA, are effective for text, but often ineffective for images, due to high redundancy and high correlation between pixels. We suggest a novel image encryption algorithm based on chaotic maps and the variable-step Josephus problem to get over these restrictions and increase the encryption resilience. This algorithm uses Kepler Chaotic Optimisation Algorithm (CKOA) to select the most suitable chaotic maps, guaranteeing optimal diffusion and complex pixel confusion. Key generation is enhanced with MD5 and SHA-256 hash functions, providing increased resistance to collisions and attacks. In addition, Discrete Wavelet Transform (DWT) is integrated to compress images and reduce processing time, while maintaining a high average entropy of 7.999 for encrypted images. Experimental tests demonstrate strong resistance against cryptographic attacks, including 99.6% as pixel change rate and 33.31% as unified average change intensity, ensuring optimum security. Compared with other image-based encryption schemes, our method stands out for its speed and reduced computational complexity, while offering superior security.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1038/s41598-025-14784-5
- OA Status
- gold
- Cited By
- 2
- References
- 74
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4413108228
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4413108228Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1038/s41598-025-14784-5Digital Object Identifier
- Title
-
A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategyWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-08-11Full publication date if available
- Authors
-
Nawal El Ghouate, Mohamed Amine Tahiri, Ahmed Bencherqui, Hanaa Mansouri, Ahmed El Maloufy, Hicham Karmouni, Mhamed Sayyouri, Sameh Askar, Mohamed AbouhawwashList of authors in order
- Landing page
-
https://doi.org/10.1038/s41598-025-14784-5Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1038/s41598-025-14784-5Direct OA link when available
- Concepts
-
Encryption, Computer science, Pixel, Probabilistic encryption, Hash function, Algorithm, Chaotic, Entropy (arrow of time), Theoretical computer science, 40-bit encryption, Cryptography, Data mining, Artificial intelligence, Computer security, Quantum mechanics, PhysicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 2Per-year citation counts (last 5 years)
- References (count)
-
74Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4413108228 |
|---|---|
| doi | https://doi.org/10.1038/s41598-025-14784-5 |
| ids.doi | https://doi.org/10.1038/s41598-025-14784-5 |
| ids.pmid | https://pubmed.ncbi.nlm.nih.gov/40789914 |
| ids.openalex | https://openalex.org/W4413108228 |
| fwci | 9.54681462 |
| type | article |
| title | A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy |
| biblio.issue | 1 |
| biblio.volume | 15 |
| biblio.last_page | 29439 |
| biblio.first_page | 29439 |
| topics[0].id | https://openalex.org/T11017 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998999834060669 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Chaos-based Image/Signal Encryption |
| topics[1].id | https://openalex.org/T10588 |
| topics[1].field.id | https://openalex.org/fields/26 |
| topics[1].field.display_name | Mathematics |
| topics[1].score | 0.9570000171661377 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2610 |
| topics[1].subfield.display_name | Mathematical Physics |
| topics[1].display_name | Mathematical Dynamics and Fractals |
| topics[2].id | https://openalex.org/T10388 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9430000185966492 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1707 |
| topics[2].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[2].display_name | Advanced Steganography and Watermarking Techniques |
| is_xpac | False |
| apc_list.value | 1890 |
| apc_list.currency | EUR |
| apc_list.value_usd | 2190 |
| apc_paid.value | 1890 |
| apc_paid.currency | EUR |
| apc_paid.value_usd | 2190 |
| concepts[0].id | https://openalex.org/C148730421 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8076515197753906 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[0].display_name | Encryption |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.6843580007553101 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C160633673 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6127168536186218 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q355198 |
| concepts[2].display_name | Pixel |
| concepts[3].id | https://openalex.org/C54569210 |
| concepts[3].level | 3 |
| concepts[3].score | 0.5690158009529114 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q7246854 |
| concepts[3].display_name | Probabilistic encryption |
| concepts[4].id | https://openalex.org/C99138194 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5610344409942627 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q183427 |
| concepts[4].display_name | Hash function |
| concepts[5].id | https://openalex.org/C11413529 |
| concepts[5].level | 1 |
| concepts[5].score | 0.4945008456707001 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[5].display_name | Algorithm |
| concepts[6].id | https://openalex.org/C2777052490 |
| concepts[6].level | 2 |
| concepts[6].score | 0.48239433765411377 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q5072826 |
| concepts[6].display_name | Chaotic |
| concepts[7].id | https://openalex.org/C106301342 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4681705832481384 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q4117933 |
| concepts[7].display_name | Entropy (arrow of time) |
| concepts[8].id | https://openalex.org/C80444323 |
| concepts[8].level | 1 |
| concepts[8].score | 0.4546206593513489 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[8].display_name | Theoretical computer science |
| concepts[9].id | https://openalex.org/C158215988 |
| concepts[9].level | 3 |
| concepts[9].score | 0.4455988109111786 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q4637271 |
| concepts[9].display_name | 40-bit encryption |
| concepts[10].id | https://openalex.org/C178489894 |
| concepts[10].level | 2 |
| concepts[10].score | 0.4433525800704956 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[10].display_name | Cryptography |
| concepts[11].id | https://openalex.org/C124101348 |
| concepts[11].level | 1 |
| concepts[11].score | 0.3269384503364563 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[11].display_name | Data mining |
| concepts[12].id | https://openalex.org/C154945302 |
| concepts[12].level | 1 |
| concepts[12].score | 0.2807093858718872 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[12].display_name | Artificial intelligence |
| concepts[13].id | https://openalex.org/C38652104 |
| concepts[13].level | 1 |
| concepts[13].score | 0.21683359146118164 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[13].display_name | Computer security |
| concepts[14].id | https://openalex.org/C62520636 |
| concepts[14].level | 1 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q944 |
| concepts[14].display_name | Quantum mechanics |
| concepts[15].id | https://openalex.org/C121332964 |
| concepts[15].level | 0 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q413 |
| concepts[15].display_name | Physics |
| keywords[0].id | https://openalex.org/keywords/encryption |
| keywords[0].score | 0.8076515197753906 |
| keywords[0].display_name | Encryption |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.6843580007553101 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/pixel |
| keywords[2].score | 0.6127168536186218 |
| keywords[2].display_name | Pixel |
| keywords[3].id | https://openalex.org/keywords/probabilistic-encryption |
| keywords[3].score | 0.5690158009529114 |
| keywords[3].display_name | Probabilistic encryption |
| keywords[4].id | https://openalex.org/keywords/hash-function |
| keywords[4].score | 0.5610344409942627 |
| keywords[4].display_name | Hash function |
| keywords[5].id | https://openalex.org/keywords/algorithm |
| keywords[5].score | 0.4945008456707001 |
| keywords[5].display_name | Algorithm |
| keywords[6].id | https://openalex.org/keywords/chaotic |
| keywords[6].score | 0.48239433765411377 |
| keywords[6].display_name | Chaotic |
| keywords[7].id | https://openalex.org/keywords/entropy |
| keywords[7].score | 0.4681705832481384 |
| keywords[7].display_name | Entropy (arrow of time) |
| keywords[8].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[8].score | 0.4546206593513489 |
| keywords[8].display_name | Theoretical computer science |
| keywords[9].id | https://openalex.org/keywords/40-bit-encryption |
| keywords[9].score | 0.4455988109111786 |
| keywords[9].display_name | 40-bit encryption |
| keywords[10].id | https://openalex.org/keywords/cryptography |
| keywords[10].score | 0.4433525800704956 |
| keywords[10].display_name | Cryptography |
| keywords[11].id | https://openalex.org/keywords/data-mining |
| keywords[11].score | 0.3269384503364563 |
| keywords[11].display_name | Data mining |
| keywords[12].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[12].score | 0.2807093858718872 |
| keywords[12].display_name | Artificial intelligence |
| keywords[13].id | https://openalex.org/keywords/computer-security |
| keywords[13].score | 0.21683359146118164 |
| keywords[13].display_name | Computer security |
| language | en |
| locations[0].id | doi:10.1038/s41598-025-14784-5 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S196734849 |
| locations[0].source.issn | 2045-2322 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2045-2322 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Scientific Reports |
| locations[0].source.host_organization | https://openalex.org/P4310319908 |
| locations[0].source.host_organization_name | Nature Portfolio |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319908, https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Nature Portfolio, Springer Nature |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Scientific Reports |
| locations[0].landing_page_url | https://doi.org/10.1038/s41598-025-14784-5 |
| locations[1].id | pmid:40789914 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306525036 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | PubMed |
| locations[1].source.host_organization | https://openalex.org/I1299303238 |
| locations[1].source.host_organization_name | National Institutes of Health |
| locations[1].source.host_organization_lineage | https://openalex.org/I1299303238 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | publishedVersion |
| locations[1].raw_type | |
| locations[1].license_id | |
| locations[1].is_accepted | True |
| locations[1].is_published | True |
| locations[1].raw_source_name | Scientific reports |
| locations[1].landing_page_url | https://pubmed.ncbi.nlm.nih.gov/40789914 |
| locations[2].id | pmh:oai:doaj.org/article:d3ac1ab8f8c641168a5dda1a339e1bb5 |
| locations[2].is_oa | False |
| locations[2].source.id | https://openalex.org/S4306401280 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[2].source.host_organization | |
| locations[2].source.host_organization_name | |
| locations[2].license | |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | article |
| locations[2].license_id | |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | Scientific Reports, Vol 15, Iss 1, Pp 1-26 (2025) |
| locations[2].landing_page_url | https://doaj.org/article/d3ac1ab8f8c641168a5dda1a339e1bb5 |
| locations[3].id | pmh:oai:pubmedcentral.nih.gov:12340023 |
| locations[3].is_oa | True |
| locations[3].source.id | https://openalex.org/S2764455111 |
| locations[3].source.issn | |
| locations[3].source.type | repository |
| locations[3].source.is_oa | False |
| locations[3].source.issn_l | |
| locations[3].source.is_core | False |
| locations[3].source.is_in_doaj | False |
| locations[3].source.display_name | PubMed Central |
| locations[3].source.host_organization | https://openalex.org/I1299303238 |
| locations[3].source.host_organization_name | National Institutes of Health |
| locations[3].source.host_organization_lineage | https://openalex.org/I1299303238 |
| locations[3].license | other-oa |
| locations[3].pdf_url | |
| locations[3].version | submittedVersion |
| locations[3].raw_type | Text |
| locations[3].license_id | https://openalex.org/licenses/other-oa |
| locations[3].is_accepted | False |
| locations[3].is_published | False |
| locations[3].raw_source_name | Sci Rep |
| locations[3].landing_page_url | https://www.ncbi.nlm.nih.gov/pmc/articles/12340023 |
| indexed_in | crossref, doaj, pubmed |
| authorships[0].author.id | https://openalex.org/A5097633419 |
| authorships[0].author.orcid | https://orcid.org/0009-0006-1991-8630 |
| authorships[0].author.display_name | Nawal El Ghouate |
| authorships[0].countries | MA |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I81605866 |
| authorships[0].affiliations[0].raw_affiliation_string | Laboratory of Engineering, Systems and Applications, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco |
| authorships[0].institutions[0].id | https://openalex.org/I81605866 |
| authorships[0].institutions[0].ror | https://ror.org/04efg9a07 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I81605866 |
| authorships[0].institutions[0].country_code | MA |
| authorships[0].institutions[0].display_name | Sidi Mohamed Ben Abdellah University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Nawal El Ghouate |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Laboratory of Engineering, Systems and Applications, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco |
| authorships[1].author.id | https://openalex.org/A5042468130 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-4799-6629 |
| authorships[1].author.display_name | Mohamed Amine Tahiri |
| authorships[1].countries | MA |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I81605866 |
| authorships[1].affiliations[0].raw_affiliation_string | Laboratory of Engineering, Systems and Applications, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco |
| authorships[1].institutions[0].id | https://openalex.org/I81605866 |
| authorships[1].institutions[0].ror | https://ror.org/04efg9a07 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I81605866 |
| authorships[1].institutions[0].country_code | MA |
| authorships[1].institutions[0].display_name | Sidi Mohamed Ben Abdellah University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Mohamed Amine Tahiri |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Laboratory of Engineering, Systems and Applications, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco |
| authorships[2].author.id | https://openalex.org/A5075300351 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-5682-3258 |
| authorships[2].author.display_name | Ahmed Bencherqui |
| authorships[2].countries | MA |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I81605866 |
| authorships[2].affiliations[0].raw_affiliation_string | Laboratory of Engineering, Systems and Applications, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco |
| authorships[2].institutions[0].id | https://openalex.org/I81605866 |
| authorships[2].institutions[0].ror | https://ror.org/04efg9a07 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I81605866 |
| authorships[2].institutions[0].country_code | MA |
| authorships[2].institutions[0].display_name | Sidi Mohamed Ben Abdellah University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Ahmed Bencherqui |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Laboratory of Engineering, Systems and Applications, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco |
| authorships[3].author.id | https://openalex.org/A5109794486 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Hanaa Mansouri |
| authorships[3].countries | MA |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I81605866 |
| authorships[3].affiliations[0].raw_affiliation_string | Laboratory of Engineering, Systems and Applications, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco |
| authorships[3].institutions[0].id | https://openalex.org/I81605866 |
| authorships[3].institutions[0].ror | https://ror.org/04efg9a07 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I81605866 |
| authorships[3].institutions[0].country_code | MA |
| authorships[3].institutions[0].display_name | Sidi Mohamed Ben Abdellah University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Hanaa Mansouri |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Laboratory of Engineering, Systems and Applications, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco |
| authorships[4].author.id | https://openalex.org/A5014346684 |
| authorships[4].author.orcid | https://orcid.org/0009-0008-3186-0958 |
| authorships[4].author.display_name | Ahmed El Maloufy |
| authorships[4].countries | MA |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I81605866 |
| authorships[4].affiliations[0].raw_affiliation_string | Laboratory of Engineering, Systems and Applications, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco |
| authorships[4].institutions[0].id | https://openalex.org/I81605866 |
| authorships[4].institutions[0].ror | https://ror.org/04efg9a07 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I81605866 |
| authorships[4].institutions[0].country_code | MA |
| authorships[4].institutions[0].display_name | Sidi Mohamed Ben Abdellah University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Ahmed El Maloufy |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Laboratory of Engineering, Systems and Applications, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco |
| authorships[5].author.id | https://openalex.org/A5046704374 |
| authorships[5].author.orcid | https://orcid.org/0000-0001-9225-8380 |
| authorships[5].author.display_name | Hicham Karmouni |
| authorships[5].countries | MA |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I119856527 |
| authorships[5].affiliations[0].raw_affiliation_string | National School of Applied Sciences, Cadi Ayyad University, Marrakech, Morocco |
| authorships[5].institutions[0].id | https://openalex.org/I119856527 |
| authorships[5].institutions[0].ror | https://ror.org/04xf6nm78 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I119856527 |
| authorships[5].institutions[0].country_code | MA |
| authorships[5].institutions[0].display_name | Cadi Ayyad University |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Hicham Karmouni |
| authorships[5].is_corresponding | True |
| authorships[5].raw_affiliation_strings | National School of Applied Sciences, Cadi Ayyad University, Marrakech, Morocco |
| authorships[6].author.id | https://openalex.org/A5006453222 |
| authorships[6].author.orcid | https://orcid.org/0000-0002-1615-419X |
| authorships[6].author.display_name | Mhamed Sayyouri |
| authorships[6].countries | MA |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I81605866 |
| authorships[6].affiliations[0].raw_affiliation_string | Laboratory of Engineering, Systems and Applications, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco |
| authorships[6].institutions[0].id | https://openalex.org/I81605866 |
| authorships[6].institutions[0].ror | https://ror.org/04efg9a07 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I81605866 |
| authorships[6].institutions[0].country_code | MA |
| authorships[6].institutions[0].display_name | Sidi Mohamed Ben Abdellah University |
| authorships[6].author_position | middle |
| authorships[6].raw_author_name | Mhamed Sayyouri |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | Laboratory of Engineering, Systems and Applications, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco |
| authorships[7].author.id | https://openalex.org/A5088545047 |
| authorships[7].author.orcid | https://orcid.org/0000-0002-1167-2430 |
| authorships[7].author.display_name | Sameh Askar |
| authorships[7].countries | SA |
| authorships[7].affiliations[0].institution_ids | https://openalex.org/I28022161 |
| authorships[7].affiliations[0].raw_affiliation_string | Department of Statistics and Operations Research, College of Science, King Saud University, P.O. Box 2455, 11451, Riyadh, Saudi Arabia |
| authorships[7].institutions[0].id | https://openalex.org/I28022161 |
| authorships[7].institutions[0].ror | https://ror.org/02f81g417 |
| authorships[7].institutions[0].type | education |
| authorships[7].institutions[0].lineage | https://openalex.org/I28022161 |
| authorships[7].institutions[0].country_code | SA |
| authorships[7].institutions[0].display_name | King Saud University |
| authorships[7].author_position | middle |
| authorships[7].raw_author_name | Sameh Askar |
| authorships[7].is_corresponding | False |
| authorships[7].raw_affiliation_strings | Department of Statistics and Operations Research, College of Science, King Saud University, P.O. Box 2455, 11451, Riyadh, Saudi Arabia |
| authorships[8].author.id | https://openalex.org/A5068555962 |
| authorships[8].author.orcid | https://orcid.org/0000-0003-2846-4707 |
| authorships[8].author.display_name | Mohamed Abouhawwash |
| authorships[8].countries | SA |
| authorships[8].affiliations[0].institution_ids | https://openalex.org/I134085113 |
| authorships[8].affiliations[0].raw_affiliation_string | Department of Industrial and Systems Engineering, King Fahd University of Petroleum and Minerals, 31261, Dhahran, Saudi Arabia |
| authorships[8].institutions[0].id | https://openalex.org/I134085113 |
| authorships[8].institutions[0].ror | https://ror.org/03yez3163 |
| authorships[8].institutions[0].type | education |
| authorships[8].institutions[0].lineage | https://openalex.org/I134085113 |
| authorships[8].institutions[0].country_code | SA |
| authorships[8].institutions[0].display_name | King Fahd University of Petroleum and Minerals |
| authorships[8].author_position | last |
| authorships[8].raw_author_name | Mohamed Abouhawwash |
| authorships[8].is_corresponding | False |
| authorships[8].raw_affiliation_strings | Department of Industrial and Systems Engineering, King Fahd University of Petroleum and Minerals, 31261, Dhahran, Saudi Arabia |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1038/s41598-025-14784-5 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11017 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998999834060669 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Chaos-based Image/Signal Encryption |
| related_works | https://openalex.org/W2564633714, https://openalex.org/W2144246620, https://openalex.org/W2389178160, https://openalex.org/W2361619969, https://openalex.org/W3014373477, https://openalex.org/W3181603331, https://openalex.org/W4252165774, https://openalex.org/W1517760319, https://openalex.org/W1993945719, https://openalex.org/W4243621294 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 2 |
| locations_count | 4 |
| best_oa_location.id | doi:10.1038/s41598-025-14784-5 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S196734849 |
| best_oa_location.source.issn | 2045-2322 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2045-2322 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Scientific Reports |
| best_oa_location.source.host_organization | https://openalex.org/P4310319908 |
| best_oa_location.source.host_organization_name | Nature Portfolio |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319908, https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Nature Portfolio, Springer Nature |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Scientific Reports |
| best_oa_location.landing_page_url | https://doi.org/10.1038/s41598-025-14784-5 |
| primary_location.id | doi:10.1038/s41598-025-14784-5 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S196734849 |
| primary_location.source.issn | 2045-2322 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2045-2322 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Scientific Reports |
| primary_location.source.host_organization | https://openalex.org/P4310319908 |
| primary_location.source.host_organization_name | Nature Portfolio |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319908, https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Nature Portfolio, Springer Nature |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Scientific Reports |
| primary_location.landing_page_url | https://doi.org/10.1038/s41598-025-14784-5 |
| publication_date | 2025-08-11 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4379527702, https://openalex.org/W4220988867, https://openalex.org/W2746926486, https://openalex.org/W4306835021, https://openalex.org/W4401386210, https://openalex.org/W3185553369, https://openalex.org/W4409943467, https://openalex.org/W4200142148, https://openalex.org/W4396928011, https://openalex.org/W4381516257, https://openalex.org/W4240547816, https://openalex.org/W4293221284, https://openalex.org/W3196586987, https://openalex.org/W3147786308, https://openalex.org/W4213172197, https://openalex.org/W4307040954, https://openalex.org/W4280589721, https://openalex.org/W3119757999, https://openalex.org/W4313419372, https://openalex.org/W4400493258, https://openalex.org/W3093910677, https://openalex.org/W4399740073, https://openalex.org/W4403089501, https://openalex.org/W3211291051, https://openalex.org/W3186555791, https://openalex.org/W3042112328, https://openalex.org/W4409552008, https://openalex.org/W4400363581, https://openalex.org/W4409698409, https://openalex.org/W4380371844, https://openalex.org/W4328103222, https://openalex.org/W4282978043, https://openalex.org/W4401682124, https://openalex.org/W4402258140, https://openalex.org/W4309351532, https://openalex.org/W4387591425, https://openalex.org/W4389702458, https://openalex.org/W4400322667, https://openalex.org/W4297537157, https://openalex.org/W4399518362, https://openalex.org/W4400576724, https://openalex.org/W4400595471, https://openalex.org/W4392380075, https://openalex.org/W4400946722, https://openalex.org/W4312115628, https://openalex.org/W4410217984, https://openalex.org/W4324142979, https://openalex.org/W4408139384, https://openalex.org/W4396636530, https://openalex.org/W4389004810, https://openalex.org/W4406553930, https://openalex.org/W4292737814, https://openalex.org/W4390830964, https://openalex.org/W4386518202, https://openalex.org/W4399571921, https://openalex.org/W4391604851, https://openalex.org/W4396837072, https://openalex.org/W4391924759, https://openalex.org/W2335267492, https://openalex.org/W3099174910, https://openalex.org/W4390534541, https://openalex.org/W3175852046, https://openalex.org/W4323922821, https://openalex.org/W2905741893, https://openalex.org/W4319068553, https://openalex.org/W4399909976, https://openalex.org/W3137867917, https://openalex.org/W4402157719, https://openalex.org/W4213452758, https://openalex.org/W4243494487, https://openalex.org/W4406080953, https://openalex.org/W4312293368, https://openalex.org/W4389076400, https://openalex.org/W4394590253 |
| referenced_works_count | 74 |
| abstract_inverted_index.a | 57, 137 |
| abstract_inverted_index.In | 120 |
| abstract_inverted_index.We | 55 |
| abstract_inverted_index.as | 22, 32, 156, 162 |
| abstract_inverted_index.in | 4, 19 |
| abstract_inverted_index.is | 105, 126 |
| abstract_inverted_index.of | 7, 12, 141 |
| abstract_inverted_index.on | 63 |
| abstract_inverted_index.to | 47, 71, 89, 116, 128 |
| abstract_inverted_index.AES | 34 |
| abstract_inverted_index.Key | 103 |
| abstract_inverted_index.MD5 | 108 |
| abstract_inverted_index.and | 25, 35, 50, 66, 76, 99, 109, 118, 131, 160, 183 |
| abstract_inverted_index.are | 37 |
| abstract_inverted_index.but | 41 |
| abstract_inverted_index.due | 46 |
| abstract_inverted_index.for | 39, 44, 143, 180 |
| abstract_inverted_index.get | 72 |
| abstract_inverted_index.has | 15 |
| abstract_inverted_index.its | 181 |
| abstract_inverted_index.our | 176 |
| abstract_inverted_index.out | 179 |
| abstract_inverted_index.the | 1, 5, 10, 67, 78, 91 |
| abstract_inverted_index.DES, | 33 |
| abstract_inverted_index.RSA, | 36 |
| abstract_inverted_index.This | 81 |
| abstract_inverted_index.With | 0 |
| abstract_inverted_index.hash | 111 |
| abstract_inverted_index.high | 48, 51, 138 |
| abstract_inverted_index.maps | 65 |
| abstract_inverted_index.most | 92 |
| abstract_inverted_index.over | 73 |
| abstract_inverted_index.rate | 159 |
| abstract_inverted_index.such | 21, 31 |
| abstract_inverted_index.uses | 83 |
| abstract_inverted_index.with | 107, 171 |
| abstract_inverted_index.(DWT) | 125 |
| abstract_inverted_index.7.999 | 142 |
| abstract_inverted_index.99.6% | 155 |
| abstract_inverted_index.based | 62 |
| abstract_inverted_index.data, | 9 |
| abstract_inverted_index.image | 59 |
| abstract_inverted_index.maps, | 95 |
| abstract_inverted_index.novel | 58 |
| abstract_inverted_index.often | 42 |
| abstract_inverted_index.other | 172 |
| abstract_inverted_index.pixel | 101, 157 |
| abstract_inverted_index.rapid | 2 |
| abstract_inverted_index.speed | 182 |
| abstract_inverted_index.tests | 147 |
| abstract_inverted_index.text, | 40 |
| abstract_inverted_index.these | 74 |
| abstract_inverted_index.time, | 134 |
| abstract_inverted_index.while | 135, 187 |
| abstract_inverted_index.(CKOA) | 88 |
| abstract_inverted_index.33.31% | 161 |
| abstract_inverted_index.Kepler | 84 |
| abstract_inverted_index.become | 16 |
| abstract_inverted_index.change | 158, 165 |
| abstract_inverted_index.growth | 3 |
| abstract_inverted_index.images | 14, 130 |
| abstract_inverted_index.method | 177 |
| abstract_inverted_index.reduce | 132 |
| abstract_inverted_index.secure | 26 |
| abstract_inverted_index.select | 90 |
| abstract_inverted_index.stands | 178 |
| abstract_inverted_index.strong | 149 |
| abstract_inverted_index.Chaotic | 85 |
| abstract_inverted_index.SHA-256 | 110 |
| abstract_inverted_index.Wavelet | 123 |
| abstract_inverted_index.against | 151 |
| abstract_inverted_index.average | 139, 164 |
| abstract_inverted_index.between | 53 |
| abstract_inverted_index.chaotic | 64, 94 |
| abstract_inverted_index.complex | 100 |
| abstract_inverted_index.digital | 8 |
| abstract_inverted_index.entropy | 140 |
| abstract_inverted_index.images, | 45 |
| abstract_inverted_index.images. | 145 |
| abstract_inverted_index.optimal | 97 |
| abstract_inverted_index.optimum | 168 |
| abstract_inverted_index.pixels. | 54 |
| abstract_inverted_index.problem | 11, 70 |
| abstract_inverted_index.reduced | 184 |
| abstract_inverted_index.sectors | 20 |
| abstract_inverted_index.suggest | 56 |
| abstract_inverted_index.unified | 163 |
| abstract_inverted_index.Compared | 170 |
| abstract_inverted_index.Discrete | 122 |
| abstract_inverted_index.Josephus | 69 |
| abstract_inverted_index.attacks, | 153 |
| abstract_inverted_index.attacks. | 119 |
| abstract_inverted_index.compress | 129 |
| abstract_inverted_index.enhanced | 106 |
| abstract_inverted_index.ensuring | 167 |
| abstract_inverted_index.exchange | 6 |
| abstract_inverted_index.increase | 77 |
| abstract_inverted_index.offering | 188 |
| abstract_inverted_index.schemes, | 175 |
| abstract_inverted_index.suitable | 93 |
| abstract_inverted_index.superior | 189 |
| abstract_inverted_index.Algorithm | 87 |
| abstract_inverted_index.Transform | 124 |
| abstract_inverted_index.addition, | 121 |
| abstract_inverted_index.algorithm | 61, 82 |
| abstract_inverted_index.diffusion | 98 |
| abstract_inverted_index.effective | 38 |
| abstract_inverted_index.encrypted | 144 |
| abstract_inverted_index.including | 154 |
| abstract_inverted_index.increased | 114 |
| abstract_inverted_index.medicine, | 23 |
| abstract_inverted_index.providing | 113 |
| abstract_inverted_index.security. | 169, 190 |
| abstract_inverted_index.collisions | 117 |
| abstract_inverted_index.confusion. | 102 |
| abstract_inverted_index.encryption | 29, 60, 79, 174 |
| abstract_inverted_index.essential, | 17 |
| abstract_inverted_index.functions, | 112 |
| abstract_inverted_index.generation | 104 |
| abstract_inverted_index.integrated | 127 |
| abstract_inverted_index.intensity, | 166 |
| abstract_inverted_index.processing | 133 |
| abstract_inverted_index.protecting | 13 |
| abstract_inverted_index.redundancy | 49 |
| abstract_inverted_index.resistance | 115, 150 |
| abstract_inverted_index.Traditional | 28 |
| abstract_inverted_index.complexity, | 186 |
| abstract_inverted_index.correlation | 52 |
| abstract_inverted_index.demonstrate | 148 |
| abstract_inverted_index.image-based | 173 |
| abstract_inverted_index.ineffective | 43 |
| abstract_inverted_index.maintaining | 136 |
| abstract_inverted_index.resilience. | 80 |
| abstract_inverted_index.techniques, | 30 |
| abstract_inverted_index.Experimental | 146 |
| abstract_inverted_index.Optimisation | 86 |
| abstract_inverted_index.guaranteeing | 96 |
| abstract_inverted_index.particularly | 18 |
| abstract_inverted_index.restrictions | 75 |
| abstract_inverted_index.surveillance | 24 |
| abstract_inverted_index.computational | 185 |
| abstract_inverted_index.cryptographic | 152 |
| abstract_inverted_index.variable-step | 68 |
| abstract_inverted_index.communications. | 27 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 95 |
| corresponding_author_ids | https://openalex.org/A5046704374 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 9 |
| corresponding_institution_ids | https://openalex.org/I119856527 |
| citation_normalized_percentile.value | 0.94954337 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |