Peer Review History

Original SubmissionOctober 8, 2023
Decision Letter - Je Sen Teh, Editor

PONE-D-23-32782Secure image communication based on two-layer dynamic feedback encryption and DWT information hidingPLOS ONE

Dear Dr. Wen,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Dec 30 2023 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.
  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.
  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Je Sen Teh

Academic Editor

PLOS ONE

Journal requirements:

1. When submitting your revision, we need you to address these additional requirements.

Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at 

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and 

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf.

2. Please note that PLOS ONE has specific guidelines on code sharing for submissions in which author-generated code underpins the findings in the manuscript. In these cases, all author-generated code must be made available without restrictions upon publication of the work. Please review our guidelines at https://journals.plos.org/plosone/s/materials-and-software-sharing#loc-sharing-code and ensure that your code is shared in a way that follows best practice and facilitates reproducibility and reuse.

3. In your Data Availability statement, you have not specified where the minimal data set underlying the results described in your manuscript can be found. PLOS defines a study's minimal data set as the underlying data used to reach the conclusions drawn in the manuscript and any additional data required to replicate the reported study findings in their entirety. All PLOS journals require that the minimal data set be made fully available. For more information about our data policy, please see http://journals.plos.org/plosone/s/data-availability.

""Upon re-submitting your revised manuscript, please upload your study’s minimal underlying data set as either Supporting Information files or to a stable, public repository and include the relevant URLs, DOIs, or accession numbers within your revised cover letter. For a list of acceptable repositories, please see http://journals.plos.org/plosone/s/data-availability#loc-recommended-repositories. Any potentially identifying patient information must be fully anonymized.

Important: If there are ethical or legal restrictions to sharing your data publicly, please explain these restrictions in detail. Please see our guidelines for more information on what we consider unacceptable restrictions to publicly sharing data: http://journals.plos.org/plosone/s/data-availability#loc-unacceptable-data-access-restrictions. Note that it is not acceptable for the authors to be the sole named individuals responsible for ensuring data access.

We will update your Data Availability statement to reflect the information you provide in your cover letter.

4. We note that Figure(s) 2, 4, 6, 7, 8 and 9 in your submission contain copyrighted images. All PLOS content is published under the Creative Commons Attribution License (CC BY 4.0), which means that the manuscript, images, and Supporting Information files will be freely available online, and any third party is permitted to access, download, copy, distribute, and use these materials in any way, even commercially, with proper attribution. For more information, see our copyright guidelines: http://journals.plos.org/plosone/s/licenses-and-copyright.

We require you to either (1) present written permission from the copyright holder to publish these figures specifically under the CC BY 4.0 license, or (2) remove the figures from your submission:

a. You may seek permission from the original copyright holder of Figure(s) 2, 4, 6, 7, 8 and 9 to publish the content specifically under the CC BY 4.0 license. 

We recommend that you contact the original copyright holder with the Content Permission Form (http://journals.plos.org/plosone/s/file?id=7c09/content-permission-form.pdf) and the following text:

“I request permission for the open-access journal PLOS ONE to publish XXX under the Creative Commons Attribution License (CCAL) CC BY 4.0 (http://creativecommons.org/licenses/by/4.0/). Please be aware that this license allows unrestricted use and distribution, even commercially, by third parties. Please reply and provide explicit written permission to publish XXX under a CC BY license and complete the attached form.”

Please upload the completed Content Permission Form or other proof of granted permissions as an ""Other"" file with your submission. 

In the figure caption of the copyrighted figure, please include the following text: “Reprinted from [ref] under a CC BY license, with permission from [name of publisher], original copyright [original copyright year].”

b. If you are unable to obtain permission from the original copyright holder to publish these figures under the CC BY 4.0 license or if the copyright holder’s requirements are incompatible with the CC BY 4.0 license, please either i) remove the figure or ii) supply a replacement figure that complies with the CC BY 4.0 license. Please check copyright information on all replacement figures and update the figure caption with source information. If applicable, please specify in the figure caption text when a figure is similar but not identical to the original image and is therefore for illustrative purposes only.

Additional Editor Comments:

The reviewers have highlighted some concerns about the manuscript that need to be addressed before it can be considered for publication.

Here are some general observations. Please check all reviewer comments in detail:

1. There are some inconsistencies and lack of clarity with some of the equations. Authors need to make corrections and provide clarifications.

2. The efficiency of the proposed encryption algorithm needs to be analysed.

3. Justifications for some design decisions (two-layer feedback vs one-layer) should be provided.

4. Comparison with the state-of-the-art must be included.

5. Rewriting abstract/conclusion to better highlight contributions, future work, etc.

Proofreading of the manuscript is also recommended.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #2: Partly

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #2: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: Yes

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: In this manuscript, the authors propose a secure image encryption scheme based on the 2D-SLMM chaotic system and a dynamic feedback mechanism. Overall, the manuscript is well-organized and well-written, and the work presented is both innovative and interesting. However, before accepting this manuscript for publication, the following minor issues need to be addressed:

1. Considering the length of the article, the authors are advised to carefully proofread the manuscript to remove any possible minor errors, such as typos.

2. The authors are advised to adjust the content of their abstract to more attractively present the motivations, methods, results, and conclusions of their work.

3. The manuscript comprises a few lengthy sentences, and the authors should contemplate modifying them to enhance readability.

4. It is recommended that Table 1 be appropriately adjusted to better present relevant content.

5. Similarly, it is recommended that the figures in the manuscript be reviewed and adjusted to better present relevant content.

6. The authors are advised to provide a more detailed explanation of the motivation, reasons, and purpose behind the utilization of the MD5 hash function.

7. In line 333, the variable i is not italicized. Therefore, it is strongly advised that the authors carefully review the entire text to avoid such oversights.

8. While considering security, encryption efficiency is also an important factor that researchers must consider. Therefore, it is recommended that the authors analyze and discuss the encryption efficiency of the proposed scheme.

9. It is recommended that the authors adjust and improve the content of the conclusion section.

10. Is there room for further refinement or improvement of the current work in the future? In other words, what is your future further work related to this manuscript?

11. The authors are advised to carefully proofread and standardize their references in accordance with the template.

Reviewer #2: The authors propose an image encryption method which uses DWT and two dynamic feedback encryptions (plaintext and intermediate ciphertext). The article describes the encryption and decryption process in detail and presents the experimental data well with images and tables.

Here are my comments:

1. Are a and b in equations (1) and (3) the same? If they are the same, why is the description of them inconsistent?

2. The author's description of equation (3) is vague. For example, why are initial values assigned to a and b: 0.5 and 2 respectively? m(x) is in decimal or hexadecimal? What is the significance of such data processing?

3. How efficient is the encryption and decryption?

4. What are the advantages of two-layer dynamic feedback encryption over single-layer? How effective is the algorithm if it uses only plaintext feedback or intermediate ciphertext feedback? Please add this aspect in the experimental section.

5. The experimental data needs to be compared with recent articles, and it is clear that some articles are not appropriate, e.g., Ref.[49] and Ref.[50].

6. Why is there no reference in the Sensitivity analysis section?

7. The original manuscript mentions four innovations, including the use of DWT, in the introduction, but not in the conclusion?

In addition, the manuscript needs to be revised in the following ways:

1. Show the full name of the 2D-SLMM chaotic system as early as possible, not in line 93.

2. Change the abbreviations of Figure and Equation. They should be Fig. and Eq..

3. In Figure 2, Seq1 should be S1, and the others should be the same.

4. Use abbreviation for Figure at line 273.

5. Unify the format of the literature.

6. The source of the pictures used in the experiment should be stated.

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: No

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

Revision 1

Response to Reviewer 1

[General Comment] In this manuscript, the authors propose a secure image encryption scheme based on the 2D-SLMM chaotic system and a dynamic feedback mechanism. Overall, the manuscript is well-organized and well-written, and the work presented is both innovative and interesting. However, before accepting this manuscript for publication, the following minor issues need to be addressed:

Response: Thank you very much for the valuable time you have allocated to review this manuscript. We are honored to receive your suggestions and are very willing to make improvements to this article!

[Comment 1] Considering the length of the article, the authors are advised to carefully proofread the manuscript to remove any possible minor errors, such as typos.

Response: Thank you for your suggestion. We have carefully reviewed the entire article and made necessary proofreading and modifications to eliminate any potential spelling and other minor errors.

[Comment 2] The authors are advised to adjust the content of their abstract to more attractively present the motivations, methods, results, and conclusions of their work.

Response: Thank you for the suggestion. We have adjusted the content of the abstract to more attractively present the motivations, methods, results, and conclusions of our work.

[Comment 3] The manuscript comprises a few lengthy sentences, and the authors should contemplate modifying them to enhance readability.

Response: Thank you for your valuable suggestion. We have carefully reviewed the issue you raised regarding lengthy sentences in the manuscript and have made corresponding modifications to enhance overall readability.

[Comment 4] It is recommended that Table 1 be appropriately adjusted to better present relevant content.

Response: Thank you for your suggestion. Table 1 has been appropriately adjusted to better present the relevant content. The modified table now provides information more clearly, facilitating better understanding for readers.

[Comment 5] Similarly, it is recommended that the figures in the manuscript be reviewed and adjusted to better present relevant content.

Response: Thank you for your suggestion. We have thoroughly reviewed and adjusted the figures in the manuscript to better present the relevant content. Following these corrections, the figures now convey information more clearly, aiding in a better understanding of the paper's content.

[Comment 6] The authors are advised to provide a more detailed explanation of the motivation, reasons, and purpose behind the utilization of the MD5 hash function.

Response: The MD5 function, as a type of hashing algorithm, plays a crucial role in data security. It can transform data of any length into a fixed-length hash value and is widely utilized in data integrity verification, digital signatures, and encryption domains. In our study, the utilization of the MD5 function forms an intermediary ciphertext mechanism, enhancing the encryption performance of the data. This approach not only bolsters data security but also ensures the integrity and validation during data transmission.

[Comment 7] In line 333, the variable i is not italicized. Therefore, it is strongly advised that the authors carefully review the entire text to avoid such oversights.

Response: Thank you for your careful observation. We have conducted a thorough check of the entire manuscript and rectified similar issues, including the non-italicized variable "i" in line 333.

[Comment 8] While considering security, encryption efficiency is also an important factor that researchers must consider. Therefore, it is recommended that the authors analyze and discuss the encryption efficiency of the proposed scheme.

Response: Thank you for the suggestion. We have conducted experiments and included an analysis of the encryption efficiency of the proposed scheme in our discussion.

[Comment 9] It is recommended that the authors adjust and improve the content of the conclusion section.

Response: Thank you for the suggestion. We have adjusted and improved the content of the conclusion section.

[Comment 10] Is there room for further refinement or improvement of the current work in the future? In other words, what is your future further work related to this manuscript?

Response: In the future, we plan to apply the encryption algorithm proposed in this research to practical scenarios. Our focus will be on assessing the performance, security, and scalability of the algorithm in real-world applications, seeking further enhancements and optimizations.

[Comment 11] The authors are advised to carefully proofread and standardize their references in accordance with the template.

Response: Thank you for the suggestion. We have made careful revisions and standardized the references according to the template requirements.

Response to Reviewer 2

[General Comment] The authors propose an image encryption method which uses DWT and two dynamic feedback encryptions (plaintext and intermediate ciphertext). The article describes the encryption and decryption process in detail and presents the experimental data well with images and tables.

Response: Thank you very much for your previous comments that helped us improve this manuscript. We have carefully studied your suggestions and have tried our best to address each of these comments. We hope the manuscript has been improved accordingly.

[Comment 1] Are a and b in equations (1) and (3) the same? If they are the same, why is the description of them inconsistent?

Response: Thank you for your inquiry. The 'a' and 'b' in equations (1) and (3) are not the same. We have updated the descriptions to ensure accuracy and consistency.

[Comment 2] The author's description of equation (3) is vague. For example, why are initial values assigned to a and b: 0.5 and 2 respectively? m(x) is in decimal or hexadecimal? What is the significance of such data processing?

Response: Thank you for your attention. The initial values of 'a' and 'b' are restricted by the parameter range of the chaotic system. 'm(x)' is generated by the MD5 function and represented in hexadecimal. The significance of this data processing lies in its association with plaintext, enhancing resistance against chosen-plaintext attacks. We have revised the description in the manuscript to better articulate these concepts.

[Comment 3] How efficient is the encryption and decryption?

Response: Thank you for your inquiry. We have conducted experiments to assess the efficiency of encryption.

[Comment 4] What are the advantages of two-layer dynamic feedback encryption over single-layer? How effective is the algorithm if it uses only plaintext feedback or intermediate ciphertext feedback? Please add this aspect in the experimental section.

Response: The two-layer dynamic feedback encryption offers advantages such as enhanced encryption performance and stronger resistance against chosen-ciphertext attacks compared to single-layer encryption. Manuscripts have been added for related experiments.

[Comment 5] The experimental data needs to be compared with recent articles, and it is clear that some articles are not appropriate, e.g., Ref.[49] and Ref.[50].

Response: Thank you for your guidance. We have revised the references to ensure the experimental data aligns with recent articles.

[Comment 6] Why is there no reference in the Sensitivity analysis section?

Response: Thank you for your reminder. In the Sensitivity Analysis section, we primarily focused on exploring the inherent characteristics of the data and did not reference other literature. The data presented in this section shows results that are very close to the ideal values.

[Comment 7] The original manuscript mentions four innovations, including the use of DWT, in the introduction, but not in the conclusion?

Response: Thank you for pointing that out. We have made modifications to the conclusion section to ensure it covers the innovations mentioned in the introduction, including the use of DWT.

[Comment 8] In addition, the manuscript needs to be revised in the following ways:

1. Show the full name of the 2D-SLMM chaotic system as early as possible, not in line 93.

2. Change the abbreviations of Figure and Equation. They should be Fig. and Eq..

3. In Figure 2, Seq1 should be S1, and the others should be the same.

4. Use abbreviation for Figure at line 273.

5. Unify the format of the literature.

6. The source of the pictures used in the experiment should be stated.

Response: Thank you for the detailed guidance. We have thoroughly checked and made the following modifications to the manuscript:

1.We have presented the full name of the 2D-SLMM chaotic system at an earlier point, not limited to line 93.

2.The abbreviations for figures and equations have been changed to Fig. and Eq..

3.In Figure 2, 'Seq1' has been updated to 'S1', and the corresponding adjustments have been made for others.

4.The abbreviation for 'Figure' has been used at line 273.

5.We have standardized the format of the references.

6.The sources of the images used in the experiments have been indicated.

Attachments
Attachment
Submitted filename: Response.docx
Decision Letter - Je Sen Teh, Editor

PONE-D-23-32782R1Secure image communication based on two-layer dynamic feedback encryption and DWT information hidingPLOS ONE

Dear Dr. Wen,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

One of the previous reviewers was satisfied with the changes made. However, as another reviewer was not responsive, we engaged a third reviewer to ensure that all modifications from the previous review were incorporated. Unfortunately, some additional concerns were highlighted that needs to be addressed. Please see my comments and the reviewer's comments below.

Please submit your revised manuscript by Mar 02 2024 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.
  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.
  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Je Sen Teh

Academic Editor

PLOS ONE

Additional Editor Comments:

The following concerns need to be addressed:

  • Providing justification for the use of hash functions to generate the secret key. An additional observation is that the cipher is not secure at all against a known-plaintext (or known-plainimage) attack because the secret key is dependent on the plainimage. Knowledge of the plainimage is thus equivalent to knowledge of the key. As the reviewer pointed out, this deviates from common principles of cryptography. Some discussion as to how such a scheme would work in a real world security protocol would be beneficial.
  • Providing clarification about the permutation step.
  • When measuring runtime, an average across multiple runs would be more accurate. Even better, an analysis of the number of primitive operations would be independent of the computing machine and provide a more fair comparison.
  • Comparisons were made with cryptosystems that are not the current state of the art (2020-2021). More recent (2023/2024) cryptosystems should be used as a benchmark.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: All comments have been addressed

Reviewer #3: (No Response)

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #3: Partly

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #3: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #3: No

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #3: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: With the efforts of the authors, the quality of the paper has been significantly improved. Therefore, the paper can be accepted for publication.

Reviewer #3: The authors used MD5 to generate hash values and employed it to create the secret key, utilizing MD5 twice—once for round 1 and again for round 2. Firstly, the secret key should be larger than what they calculated because they will share 128 bits for each round with the receiver. I disagree with this approach as it deviates from the principles of cryptography.

The authors should calculate PSNR because they employed frequency transformation in the encryption algorithm. The permutation step is not clear; it's essential to specify whether it's a bit permutation. If it is, the speed of the permutation operation needs to be addressed, as it might take more time compared to pixel permutations. This aspect needs to be highlighted further.

2D chaotic maps require time, and I believe this is not included in the time calculation. Additionally, one measurement may not be sufficient for it. It would be beneficial to review some latest articles and expand the comparison to demonstrate the superiority of the paper.

*Manuscript suggestions by the reviewer have been redacted. Please identify recently proposed cryptosystems (2023/2024) to be used as benchmarks for the proposed work, especially for performance comparisons.

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #3: Yes: Moatsum Alawida

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

Revision 2

All responses are in "Response. docx".

Attachments
Attachment
Submitted filename: Response.docx
Decision Letter - Je Sen Teh, Editor

Secure image communication based on two-layer dynamic feedback encryption and DWT information hiding

PONE-D-23-32782R2

Dear Dr. Wen,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/, click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Je Sen Teh

Academic Editor

PLOS ONE

Additional Editor Comments (optional):

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: All comments have been addressed

Reviewer #3: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #3: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #3: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #3: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #3: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: I would like to express my sincere thanks to the authors for their revisions based on my review comments. With the efforts of the authors, the quality of the paper has been significantly improved. Therefore, the paper can be accepted for publication.

Reviewer #3: The authors assured me that they would address my first concern in the upcoming paper. Thank you for letting me know. As for this paper, I suggest adding justifications for the mentioned point. Overall, the paper requires only minor revisions.

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #3: No

**********

Open letter on the publication of peer review reports

PLOS recognizes the benefits of transparency in the peer review process. Therefore, we enable the publication of all of the content of peer review and author responses alongside final, published articles. Reviewers remain anonymous, unless they choose to reveal their names.

We encourage other journals to join us in this initiative. We hope that our action inspires the community, including researchers, research funders, and research institutions, to recognize the benefits of published peer review reports for all parts of the research system.

Learn more at ASAPbio .