{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T11:27:00Z","timestamp":1775215620906,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"National Science and Technology Council in Taiwan","award":["NSTC-111-2622-8-027-009"],"award-info":[{"award-number":["NSTC-111-2622-8-027-009"]}]},{"name":"National Science and Technology Council in Taiwan","award":["NSTC-112-2221-E-027-088-MY2"],"award-info":[{"award-number":["NSTC-112-2221-E-027-088-MY2"]}]},{"name":"Ministry of Education of Taiwan","award":["1112303249"],"award-info":[{"award-number":["1112303249"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3326848","type":"journal-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T18:17:14Z","timestamp":1698085034000},"page":"119284-119312","source":"Crossref","is-referenced-by-count":71,"title":["<i>R<\/i>\n                  <sup>3<\/sup>\u2014Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0003-3690-9585","authenticated-orcid":false,"given":"Mohamed","family":"Gabr","sequence":"first","affiliation":[{"name":"Computer Science Department, Faculty of Media Engineering and Technology, German University in Cairo (GUC), Cairo, Egypt"}]},{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0009-0002-5842-5952","authenticated-orcid":false,"given":"Yousef","family":"Korayem","sequence":"additional","affiliation":[{"name":"Computer Science Department, Faculty of Media Engineering and Technology, German University in Cairo (GUC), Cairo, Egypt"}]},{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0001-7717-9393","authenticated-orcid":false,"given":"Yen-Lin","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taipei University of Technology, Taipei, Taiwan"}]},{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0001-5865-1533","authenticated-orcid":false,"given":"Por Lip","family":"Yee","sequence":"additional","affiliation":[{"name":"Department of Computer System and Technology, Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0003-0793-3308","authenticated-orcid":false,"given":"Chin Soon","family":"Ku","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Universiti Tunku Abdul Rahman, Kampar, Malaysia"}]},{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0001-6159-4971","authenticated-orcid":false,"given":"Wassim","family":"Alexan","sequence":"additional","affiliation":[{"name":"Communications Department, Faculty of Information Engineering and Technology, German University in Cairo (GUC), Cairo, Egypt"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3282160"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3319335"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3390\/e21030245"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03675-y"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12282-8"},{"key":"ref53","first-page":"523","article-title":"On the design of S-boxes","author":"webster","year":"1985","journal-title":"Proc Conf Theory Appl Cryptograph Techn"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108745"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07818-4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11178-3"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/sym15051081"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3301460"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-Egypt58155.2023.10206278"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/fractalfract7040287"},{"key":"ref51","first-page":"273","article-title":"Provable security against differential and linear cryptanalysis for the SPN structure","author":"hong","year":"2000","journal-title":"Fast Software Encryption Third International Workshop Proceedings"},{"key":"ref50","first-page":"549","article-title":"Nonlinearity criteria for cryptographic functions","author":"meier","year":"1989","journal-title":"Proc Workshop Theory Appl Cryptograph Techn"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5590-0"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2018.01.064"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.09.007"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.01.039"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965740"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08342-1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08742-8"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4786-7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6102824"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3143804"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.04.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.11.016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.23919\/SPA.2019.8936718"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12093"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-018-0358-7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3099214"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6496-1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2005.06.078"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/sym14030443"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1515\/ijnsns-2011-0001"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3024994"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-14000-w"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.aml.2011.05.025"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.10.016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ITCE48509.2020.9047801"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81961-3_13"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/sym14122559"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08850-5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08273-x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography6020028"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/acde1e"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2020.153268"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-Egypt58155.2023.10206337"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/e17042117"},{"key":"ref21","first-page":"57","article-title":"Image encryption using double layer chaos with dynamic iteration and rotation pattern","volume":"15","author":"budiman","year":"2022","journal-title":"Int J Intell Eng Syst"},{"key":"ref28","first-page":"277","article-title":"Application of S-boxes based on the chaotic Hindmarsh-rose system for image encryption","volume":"11","author":"savadkouhi","year":"2023","journal-title":"J Math Modelling"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/e25050787"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2023.128482"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10292629.pdf?arnumber=10292629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T20:06:54Z","timestamp":1701115614000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/10292629\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":56,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/access.2023.3326848","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}