{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:59:01Z","timestamp":1757541541714,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031709050"},{"type":"electronic","value":"9783031709067"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-70906-7_26","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:02:51Z","timestamp":1729155771000},"page":"308-320","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight Encryption Scheme for\u00a0Bio-metric 3-Plane Image Encryption Based on\u00a0$$\\mathscr {L}$$-System Fractal and\u00a02-D Chaotic ACM"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-5564-3128","authenticated-orcid":false,"given":"Vrushali","family":"Khaladkar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2925-4218","authenticated-orcid":false,"given":"Manish","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2017","unstructured":"Li, C., Luo, G., Qin, K., Li, C.: An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 87, 127\u2013133 (2017)","journal-title":"Nonlinear Dyn."},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"AlZain, M.A., Faragallah, O.S.: Efficient chaotic tent map-based image cryptosystem. Int. J. Comput. Appl. 167(7) (2017)","DOI":"10.5120\/ijca2017914237"},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat, A.Y., Moattar, M.H., Torshiz, M.N.: Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 90, 225\u2013237 (2017)","journal-title":"Opt. Lasers Eng."},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"18759","DOI":"10.1109\/ACCESS.2018.2817600","volume":"6","author":"C Zhu","year":"2018","unstructured":"Zhu, C., Sun, K.: Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps. IEEE Access 6, 18759\u201318770 (2018)","journal-title":"IEEE Access"},{"issue":"12","key":"26_CR5","doi-asserted-by":"publisher","first-page":"18941","DOI":"10.1007\/s11042-020-10325-6","volume":"80","author":"M Kumar","year":"2021","unstructured":"Kumar, M., Gupta, P.: A new medical image encryption algorithm based on the 1D logistic map associated with pseudo-random numbers. Multimedia Tools Appl. 80(12), 18941\u201318967 (2021)","journal-title":"Multimedia Tools Appl."},{"key":"26_CR6","unstructured":"Wang, H., Tao, X., Huang, J.S.: An improved chessboard covering algorithm with generalized fractal strategy (2019)"},{"issue":"1","key":"26_CR7","doi-asserted-by":"publisher","first-page":"17","DOI":"10.3390\/jimaging4010017","volume":"4","author":"S Agarwal","year":"2018","unstructured":"Agarwal, S.: Secure image transmission using fractal and 2D-chaotic map. J. Imaging 4(1), 17 (2018)","journal-title":"J. Imaging"},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"112519","DOI":"10.1016\/j.chaos.2022.112519","volume":"163","author":"W Cao","year":"2022","unstructured":"Cao, W., Cai, H., Hua, Z.: n-Dimensional Chaotic Map with application in secure communication. Chaos, Solitons Fractals 163, 112519 (2022)","journal-title":"Chaos, Solitons Fractals"},{"key":"26_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38700-6","volume-title":"Multimedia Security Using Chaotic Maps: Principles and Methodologies","author":"KM Hosny","year":"2020","unstructured":"Hosny, K.M.: Multimedia Security Using Chaotic Maps: Principles and Methodologies, vol. 884. Springer, Heidelberg (2020)"},{"key":"26_CR10","doi-asserted-by":"publisher","first-page":"24289","DOI":"10.1007\/s11042-018-5725-y","volume":"77","author":"JC Dagadu","year":"2018","unstructured":"Dagadu, J.C., Li, J.: Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimedia Tools Appl. 77, 24289\u201324312 (2018)","journal-title":"Multimedia Tools Appl."},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Es-Sabry, M., et al.: Securing images using high dimensional chaotic maps and DNA encoding techniques. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3315658"},{"key":"26_CR12","first-page":"102919","volume":"61","author":"S Roy","year":"2021","unstructured":"Roy, S., Shrivastava, M., Rawat, U., Pandey, C.V., Nayak, S.K.: IESCA: An efficient image encryption scheme using 2-D cellular automata. J. Inf. Secur. Appl. 61, 102919 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"26_CR13","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1016\/j.apm.2022.10.015","volume":"115","author":"SS Mohanrasu","year":"2023","unstructured":"Mohanrasu, S.S., Udhayakumar, K., Priyanka, T.M.C., Gowrisankar, A., Banerjee, S., Rakkiyappan, R.: Event-triggered impulsive controller design for synchronization of delayed chaotic neural networks and its fractal reconstruction: an application to image encryption. Appl. Math. Model. 115, 490\u2013512 (2023)","journal-title":"Appl. Math. Model."},{"issue":"3","key":"26_CR14","doi-asserted-by":"publisher","first-page":"221","DOI":"10.3390\/fractalfract7030221","volume":"7","author":"H Chang","year":"2023","unstructured":"Chang, H., Wang, E., Liu, J.: Research on image encryption based on fractional seed chaos generator and fractal theory. Fractal Fractional 7(3), 221 (2023)","journal-title":"Fractal Fractional"},{"issue":"8","key":"26_CR15","doi-asserted-by":"publisher","first-page":"085216","DOI":"10.1088\/1402-4896\/ace28b","volume":"98","author":"Z Gan","year":"2023","unstructured":"Gan, Z., et al.: Visually meaningful image encryption scheme using multi-parameter fractal theory and block synchronous sorting diffusion. Phys. Scr. 98(8), 085216 (2023)","journal-title":"Phys. Scr."},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Turan, M., G\u00f6k\u00e7ay, E., Tora, H.: An unrestricted Arnold\u2019s cat map transformation. Multimedia Tools Appl. 1\u201315 (2024)","DOI":"10.1007\/s11042-024-18411-9"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Riza, F., Martiano, M., Siregar, F.A.: Implementation of the Arnold catmap on a combination of symmetric and asymmetric cryptography. Sinkron: jurnal dan penelitian teknik informatika, 9(1), 165-173 (2024)","DOI":"10.33395\/sinkron.v9i1.13175"},{"issue":"3","key":"26_CR18","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.11591\/ijeecs.v33.i3.pp1536-1545","volume":"33","author":"A Arham","year":"2024","unstructured":"Arham, A., Lestari, N.: Arnold\u2019s cat map secure multiple-layer reversible watermarking. Indonesian J. Electr. Eng. Comput. Sci. 33(3), 1536\u20131545 (2024)","journal-title":"Indonesian J. Electr. Eng. Comput. Sci."},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Kumar, M., Khaladkar, V.P.: Secure communication using an adaptable multilevel RGB image encryption algorithm for wireless sensor networks. e-Prime-Adv. Electr. Eng. Electron. Energy, 100446 (2024)","DOI":"10.1016\/j.prime.2024.100446"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Soni, R., Thukral, M.K., Kanwar, N.: A relative investigation of one-dimensional chaotic maps intended for light-weight cryptography in smart grid. e-Prime-Adv. Electr. Eng. Electron. Energy, 7, 100421 (2024)","DOI":"10.1016\/j.prime.2024.100421"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Jain, K., Titus, B., Krishnan, P., Sudevan, S., Prabu, P., Alluhaidan, A.S.: A lightweight multi-chaos-based image encryption scheme for IoT networks. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3377665"},{"issue":"1","key":"26_CR22","doi-asserted-by":"publisher","first-page":"5678","DOI":"10.1038\/s41598-024-56364-z","volume":"14","author":"S Inam","year":"2024","unstructured":"Inam, S., Kanwal, S., Firdous, R., Hajjej, F.: Blockchain based medical image encryption using Arnold\u2019s cat map in a cloud environment. Sci. Rep. 14(1), 5678 (2024)","journal-title":"Sci. Rep."},{"key":"26_CR23","doi-asserted-by":"publisher","first-page":"107457","DOI":"10.1016\/j.sigpro.2020.107457","volume":"171","author":"W Cao","year":"2020","unstructured":"Cao, W., Mao, Y., Zhou, Y.: Designing a 2D infinite collapse map for image encryption. Sig. Process. 171, 107457 (2020)","journal-title":"Sig. Process."},{"issue":"6","key":"26_CR24","doi-asserted-by":"publisher","first-page":"463","DOI":"10.3390\/e20060463","volume":"20","author":"S Li","year":"2018","unstructured":"Li, S., Ding, W., Yin, B., Zhang, T., Ma, Y.: A novel delay linear coupling logistics map model for color image encryption. Entropy 20(6), 463 (2018)","journal-title":"Entropy"},{"key":"26_CR25","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua, Z., Zhou, Y., Pun, C.M., Chen, C.P.: $$2$$D sine logistic modulation map for image encryption. Inf. Sci. 297, 80\u201394 (2015)","journal-title":"Inf. Sci."},{"issue":"6","key":"26_CR26","doi-asserted-by":"publisher","first-page":"3877","DOI":"10.3390\/e17063877","volume":"17","author":"XY Wang","year":"2015","unstructured":"Wang, X.Y., Zhang, Y.Q., Bao, X.M.: A colour image encryption scheme using permutation-substitution based on chaos. Entropy 17(6), 3877\u20133897 (2015)","journal-title":"Entropy"},{"key":"26_CR27","doi-asserted-by":"publisher","first-page":"168290","DOI":"10.1016\/j.ijleo.2021.168290","volume":"249","author":"A Yahi","year":"2022","unstructured":"Yahi, A., Bekkouche, T., Daachi, M.E.H., Diffellah, N.: A color image encryption scheme based on 1D cubic map. Optik 249, 168290 (2022)","journal-title":"Optik"},{"key":"26_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6615512","volume":"2021","author":"A Alanezi","year":"2021","unstructured":"Alanezi, A., et al.: Securing digital images through simple permutation-substitution mechanism in cloud-based smart city environment. Secur. Commun. Netw. 2021, 1\u201317 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"26_CR29","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-031-59100-6_23","volume-title":"ASCIS 2023","author":"V Khaladkar","year":"2023","unstructured":"Khaladkar, V., Kumar, M.: Dual security RGB image encryption algorithm for lightweight cryptography. In: Rajagopal, S., Popat, K., Meva, D., Bajeja, S. (eds.) ASCIS 2023. LNCS, vol. 2039, pp. 331\u2013344. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-59100-6_23"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70906-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:17:32Z","timestamp":1729156652000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70906-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9783031709050","9783031709067"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70906-7_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Velizy","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 May 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}