{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T04:58:12Z","timestamp":1775969892007,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s00034-023-02427-x","type":"journal-article","created":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T20:24:36Z","timestamp":1687033476000},"page":"6829-6853","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Latin Square and Machine Learning Techniques Combined Algorithm for Image Encryption"],"prefix":"10.1007","volume":"42","author":[{"given":"Sakshi","family":"Patel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2418-5217","authenticated-orcid":false,"given":"V.","family":"Thanikaiselvan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,17]]},"reference":[{"key":"2427_CR1","doi-asserted-by":"publisher","unstructured":"P.A.-N. Agbedemnab, E.Y. Baagyere, M.I. Daabo, A New Image Encryption and Decryption Technique using Genetic Algorithm and Residual Numbers, in 2019 IEEE AFRICON, pp. 1\u20139 (2019). https:\/\/doi.org\/10.1109\/AFRICON46755.2019.9133919","DOI":"10.1109\/AFRICON46755.2019.9133919"},{"key":"2427_CR2","doi-asserted-by":"publisher","first-page":"19853","DOI":"10.1007\/s11042-020-08850-5","volume":"79","author":"TS Ali","year":"2020","unstructured":"T.S. Ali, R. Ali, A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimed. Tools Appl. 79, 19853\u201319873 (2020). https:\/\/doi.org\/10.1007\/s11042-020-08850-5","journal-title":"Multimed. Tools Appl."},{"key":"2427_CR3","doi-asserted-by":"publisher","first-page":"102972","DOI":"10.1016\/j.jisa.2021.102972","volume":"63","author":"H Aparna","year":"2021","unstructured":"H. Aparna, B. Bhumijaa, R. Santhiyadevi, K. Vaishanavi, M. Sathanarayanan, A. Rengarajan, P. Praveenkumar, A.A. Abd El-Latif, Double layered Fridrich structure to conserve medical data privacy using quantum cryptosystem. J. Inf. Secur. Appl. 63, 102972 (2021). https:\/\/doi.org\/10.1016\/j.jisa.2021.102972","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"2427_CR4","doi-asserted-by":"publisher","first-page":"3155","DOI":"10.32604\/iasc.2023.028969","volume":"35","author":"M Balaji","year":"2023","unstructured":"M. Balaji, V.R. Vijaykumar, K. Subramaniam, M. Kannan, V.A. Pillai, Vlsi implementation of optimized 2d SIMM chaotic map for image encryption. Intell. Autom. Soft Comput. 35(3), 3155\u20133168 (2023). https:\/\/doi.org\/10.32604\/iasc.2023.028969","journal-title":"Intell. Autom. Soft Comput."},{"key":"2427_CR5","doi-asserted-by":"publisher","first-page":"35419","DOI":"10.1007\/s11042-019-08168-x","volume":"78","author":"X Chai","year":"2019","unstructured":"X. Chai, J. Zhang, Z. Gan et al., Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed. Tools Appl. 78, 35419\u201335453 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"2427_CR6","doi-asserted-by":"publisher","first-page":"108041","DOI":"10.1016\/j.sigpro.2021.108041","volume":"183","author":"X Chai","year":"2021","unstructured":"X. Chai, X. Zhi, Z. Gan, Y. Zhang, Y. Chen, F. Jiangyu, Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process. 183, 108041 (2021). https:\/\/doi.org\/10.1016\/j.sigpro.2021.108041","journal-title":"Signal Process."},{"key":"2427_CR7","doi-asserted-by":"publisher","first-page":"4370","DOI":"10.1007\/s00034-021-01665-1","volume":"40","author":"VR Folifack Signing","year":"2021","unstructured":"V.R. Folifack Signing, T. Fozin Fonzin, M. Kountchou et al., Chaotic jerk system with hump structure for text and image encryption using DNA coding. Circuits Syst. Signal Process. 40, 4370\u20134406 (2021). https:\/\/doi.org\/10.1007\/s00034-021-01665-1","journal-title":"Circuits Syst. Signal Process."},{"issue":"8","key":"2427_CR8","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.3390\/sym13081447","volume":"13","author":"G Ghosh","year":"2021","unstructured":"G. Ghosh, Kavita, D. Anand, S. Verma, D.B. Rawat, J. Shafi, Z. Marsza\u0142ek, M. Wo\u017aniak, Secure surveillance systems using partial-regeneration-based non-dominated optimization and 5D-chaotic map. Symmetry 13(8), 1447 (2021). https:\/\/doi.org\/10.3390\/sym13081447","journal-title":"Symmetry"},{"key":"2427_CR9","unstructured":"J.H. Holland, Adaptation in Natural and Artificial Systems (University of Michigan Press, Ann Arbor, Michigan, 1975). Re-issued by MIT Press (1992)"},{"key":"2427_CR10","doi-asserted-by":"publisher","first-page":"4090","DOI":"10.1007\/s00034-022-01975-y","volume":"41","author":"HT Hu","year":"2022","unstructured":"H.T. Hu, T.T. Lee, Robust complementary dual image watermarking in subbands derived from the Laplacian pyramid, discrete wavelet transform, and directional filter bank. Circuits Syst. Signal Process. 41, 4090\u20134116 (2022). https:\/\/doi.org\/10.1007\/s00034-022-01975-y","journal-title":"Circuits Syst. Signal Process."},{"key":"2427_CR11","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1007\/s11071-021-06472-6","volume":"104","author":"Z Hua","year":"2021","unstructured":"Z. Hua, Z. Zhu, Y. Chen et al., Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dyn. 104, 4505\u20134522 (2021). https:\/\/doi.org\/10.1007\/s11071-021-06472-6","journal-title":"Nonlinear Dyn."},{"key":"2427_CR12","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/s00034-006-0104-z","volume":"26","author":"HC Huang","year":"2007","unstructured":"H.C. Huang, J.S. Pan, Y.H. Huang et al., Progressive watermarking techniques using genetic algorithms. Circuits Syst. Signal Process. 26, 671\u2013687 (2007). https:\/\/doi.org\/10.1007\/s00034-006-0104-z","journal-title":"Circuits Syst. Signal Process."},{"key":"2427_CR13","unstructured":"https:\/\/ccia.ugr.es\/cvg\/dbimagenes\/g256.php. Accessed 14 Aug 2022"},{"key":"2427_CR14","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1007\/s00034-021-01892-6","volume":"41","author":"N Khan","year":"2022","unstructured":"N. Khan, P. Muthukumar, Transient Chaos, synchronization and digital image enhancement technique based on a novel 5D fractional-order hyperchaotic memristive system. Circuits Syst. Signal Process. 41, 2266\u20132289 (2022). https:\/\/doi.org\/10.1007\/s00034-021-01892-6","journal-title":"Circuits Syst. Signal Process."},{"key":"2427_CR15","doi-asserted-by":"publisher","first-page":"108127","DOI":"10.1016\/j.optlastec.2022.108127","volume":"152","author":"J Li","year":"2022","unstructured":"J. Li, L. Chen, W. Cai, J. Xiao, J. Zhu, H. Yihua, K. Wen, Holographic encryption algorithm based on bit-plane decomposition and hyperchaotic Lorenz system. Opt. Laser Technol. 152, 108127 (2022). https:\/\/doi.org\/10.1016\/j.optlastec.2022.108127","journal-title":"Opt. Laser Technol."},{"key":"2427_CR16","doi-asserted-by":"publisher","first-page":"168880","DOI":"10.1016\/j.ijleo.2022.168880","volume":"260","author":"MA Lone","year":"2022","unstructured":"M.A. Lone, S. Qureshi, RGB image encryption based on symmetric keys using Arnold transform, 3D chaotic map and affine hill cipher. Optik 260, 168880 (2022). https:\/\/doi.org\/10.1016\/j.ijleo.2022.168880","journal-title":"Optik"},{"key":"2427_CR17","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1016\/j.ijleo.2018.06.112","volume":"171","author":"X Ming","year":"2018","unstructured":"X. Ming, Z. Tian, A novel image encryption algorithm based on self-orthogonal Latin squares. Optik 171, 891\u2013903 (2018). https:\/\/doi.org\/10.1016\/j.ijleo.2018.06.112","journal-title":"Optik"},{"key":"2427_CR18","doi-asserted-by":"publisher","first-page":"25799","DOI":"10.1007\/s11042-018-5817-8","volume":"77","author":"S Mozaffari","year":"2018","unstructured":"S. Mozaffari, Parallel image encryption with bitplane decomposition and genetic algorithm. Multimed. Tools Appl. 77, 25799\u201325819 (2018). https:\/\/doi.org\/10.1007\/s11042-018-5817-8","journal-title":"Multimed. Tools Appl."},{"key":"2427_CR19","doi-asserted-by":"publisher","first-page":"25613","DOI":"10.1007\/s11042-020-09237-2","volume":"79","author":"Y Niu","year":"2020","unstructured":"Y. Niu, Z. Zhou, X. Zhang, An image encryption approach based on chaotic maps and genetic operations. Multimed. Tools Appl. 79, 25613\u201325633 (2020). https:\/\/doi.org\/10.1007\/s11042-020-09237-2","journal-title":"Multimed. Tools Appl."},{"key":"2427_CR20","doi-asserted-by":"publisher","first-page":"25635","DOI":"10.1007\/s11042-020-09233-6","volume":"79","author":"S Noshadian","year":"2020","unstructured":"S. Noshadian, A. Ebrahimzade, S.J. Kazemitabar, Breaking a chaotic image encryption algorithm. Multimed. Tools Appl. 79, 25635\u201325655 (2020). https:\/\/doi.org\/10.1007\/s11042-020-09233-6","journal-title":"Multimed. Tools Appl."},{"key":"2427_CR21","doi-asserted-by":"publisher","first-page":"14533","DOI":"10.1007\/s00521-021-06096-2","volume":"33","author":"S Patel","year":"2021","unstructured":"S. Patel, V. Thanikaiselvan, D. Pelusi et al., Colour image encryption based on customized neural network and DNA encoding. Neural Comput. Appl. 33, 14533\u201314550 (2021). https:\/\/doi.org\/10.1007\/s00521-021-06096-2","journal-title":"Neural Comput. Appl."},{"issue":"6","key":"2427_CR22","doi-asserted-by":"publisher","first-page":"803","DOI":"10.3390\/e24060803","volume":"24","author":"S Patel","year":"2022","unstructured":"S. Patel, T. Veeramalai, Image encryption using a spectrally efficient Halton logistics tent (HaLT) map and DNA encoding for secured image communication. Entropy (Basel) 24(6), 803 (2022). https:\/\/doi.org\/10.3390\/e24060803","journal-title":"Entropy (Basel)"},{"key":"2427_CR23","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.procs.2017.12.023","volume":"125","author":"SK Pujari","year":"2018","unstructured":"S.K. Pujari, G. Bhattacharjee, S. Bhoi, A hybridized model for image encryption through genetic algorithm and DNA sequence. Procedia Comput. Sci. 125, 165\u2013171 (2018). https:\/\/doi.org\/10.1016\/j.procs.2017.12.023","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"2427_CR24","doi-asserted-by":"publisher","first-page":"012116","DOI":"10.1088\/1742-6596\/978\/1\/012116","volume":"978","author":"D Rachmawati","year":"2018","unstructured":"D. Rachmawati, J.T. Tarigan, A.B.C. Ginting, A comparative study of message digest 5({MD}5) and {SHA}256 algorithm. J. Phys. Conf. Ser. 978(1), 012116 (2018). https:\/\/doi.org\/10.1088\/1742-6596\/978\/1\/012116","journal-title":"J. Phys. Conf. Ser."},{"key":"2427_CR25","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.compbiomed.2016.03.020","volume":"72","author":"D Ravichandran","year":"2016","unstructured":"D. Ravichandran, P. Praveenkumar, J.B.B. Rayappan, R. Amirtharajan, Chaos based crossover and mutation for securing DICOM image. Comput. Biol. Med. 72, 170\u2013184 (2016). https:\/\/doi.org\/10.1016\/j.compbiomed.2016.03.020","journal-title":"Comput. Biol. Med."},{"key":"2427_CR26","doi-asserted-by":"crossref","unstructured":"A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, A statistical test suite for random and pseudorandom number generators for cryptographic applications. Booz-allen and hamilton inc mclean va (2001)","DOI":"10.6028\/NIST.SP.800-22"},{"issue":"4","key":"2427_CR27","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949). https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst. Tech. J."},{"key":"2427_CR28","doi-asserted-by":"publisher","unstructured":"H. Shen, X. Shan, Z. Tian, A new chaotic image encryption algorithm based on transversals in a Latin square (2022). arXiv preprint arXiv:2202.12559. https:\/\/doi.org\/10.48550\/arXiv.2202.12559","DOI":"10.48550\/arXiv.2202.12559"},{"key":"2427_CR29","doi-asserted-by":"publisher","first-page":"16987","DOI":"10.1007\/s11042-022-12471-5","volume":"81","author":"A Sridevi","year":"2022","unstructured":"A. Sridevi, R. Sivaraman, V. Balasubramaniam et al., On Chaos based duo confusion duo diffusion for colour images. Multimed. Tools Appl. 81, 16987\u201317014 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12471-5","journal-title":"Multimed. Tools Appl."},{"key":"2427_CR30","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stallings","year":"2010","unstructured":"W. Stallings, Cryptography and Network Security: Principles and Practice, 5th edn. (Prentice Hall, 2010)","edition":"5"},{"key":"2427_CR31","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.ins.2022.05.032","volume":"605","author":"L Teng","year":"2022","unstructured":"L. Teng, X. Wang, Y. Xian, Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf. Sci. 605, 71\u201385 (2022). https:\/\/doi.org\/10.1016\/j.ins.2022.05.032","journal-title":"Inf. Sci."},{"key":"2427_CR32","doi-asserted-by":"publisher","unstructured":"H.R. Vanamala, D. Nandur, Genetic Algorithm and Chaotic Maps Based Visually Meaningful Image Encryption, TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON), pp. 892\u2013896 (2019). https:\/\/doi.org\/10.1109\/TENCON.2019.8929469.","DOI":"10.1109\/TENCON.2019.8929469"},{"key":"2427_CR33","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1007\/s11071-021-07017-7","volume":"107","author":"X Wang","year":"2022","unstructured":"X. Wang, Y. Su, M. Xu et al., A new image encryption algorithm based on Latin square matrix. Nonlinear Dyn. 107, 1277\u20131293 (2022). https:\/\/doi.org\/10.1007\/s11071-021-07017-7","journal-title":"Nonlinear Dyn."},{"issue":"2","key":"2427_CR34","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Y. Wu, J.P. Noonan, S. Agaian, NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 1(2), 31\u201338 (2011)","journal-title":"Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT)"},{"key":"2427_CR35","doi-asserted-by":"publisher","first-page":"117709","DOI":"10.1016\/j.eswa.2022.117709","volume":"205","author":"G Ye","year":"2022","unstructured":"G. Ye, W. Huishan, M. Liu, Y. Shi, Image encryption scheme based on blind signature and an improved Lorenz system. Expert Syst. Appl. 205, 117709 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2022.117709","journal-title":"Expert Syst. Appl."},{"key":"2427_CR36","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/2091053","author":"X Zhang","year":"2021","unstructured":"X. Zhang, T. Wu, Y. Wang, L. Jiang, Y. Niu, A novel chaotic image encryption algorithm based on latin square and random shift. Comput. Intell. Neurosci. (2021). https:\/\/doi.org\/10.1155\/2021\/2091053","journal-title":"Comput. Intell. Neurosci."},{"key":"2427_CR37","doi-asserted-by":"publisher","first-page":"105542","DOI":"10.1016\/j.compbiomed.2022.105542","volume":"146","author":"Y Zhang","year":"2022","unstructured":"Y. Zhang, H. Xie, J. Sun, H. Zhang, An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and Otsu threshold segmentation. Comput. Biol. Med. 146, 105542 (2022). https:\/\/doi.org\/10.1016\/j.compbiomed.2022.105542","journal-title":"Comput. Biol. Med."},{"issue":"4","key":"2427_CR38","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MMUL.2021.3080579","volume":"28","author":"F Zhang","year":"2021","unstructured":"F. Zhang, X. Zhang, M. Cao, F. Ma, Z. Li, Characteristic analysis of 2D lag-complex logistic map and its application in image encryption. IEEE Multimed. 28(4), 96\u2013106 (2021). https:\/\/doi.org\/10.1109\/MMUL.2021.3080579","journal-title":"IEEE Multimed."},{"key":"2427_CR39","doi-asserted-by":"publisher","DOI":"10.1002\/047165549X","volume-title":"Theory of Code Division Multiple Access Communication","author":"KS Zigangirov","year":"2004","unstructured":"K.S. Zigangirov, Theory of Code Division Multiple Access Communication (Wiley, 2004)"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02427-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-023-02427-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02427-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T19:05:30Z","timestamp":1696532730000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-023-02427-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":39,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["2427"],"URL":"https:\/\/doi.org\/10.1007\/s00034-023-02427-x","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,17]]},"assertion":[{"value":"30 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}