{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T22:27:47Z","timestamp":1773181667823,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T00:00:00Z","timestamp":1583971200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T00:00:00Z","timestamp":1583971200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672124"],"award-info":[{"award-number":["61672124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund","award":["MMJJ20170203"],"award-info":[{"award-number":["MMJJ20170203"]}]},{"name":"Liaoning Province Science and Technology Innovation Leading Talents Program Project","award":["XLYC1802013"],"award-info":[{"award-number":["XLYC1802013"]}]},{"name":"Key R&D Projects of Liaoning Province","award":["2019020105-JH2\/103"],"award-info":[{"award-number":["2019020105-JH2\/103"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s00371-020-01822-8","type":"journal-article","created":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T22:02:37Z","timestamp":1584050557000},"page":"541-551","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":74,"title":["A new one-dimensional cosine polynomial chaotic map and its use in image encryption"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9020-8590","authenticated-orcid":false,"given":"Mohamed Zakariya","family":"Talhaoui","sequence":"first","affiliation":[]},{"given":"Xingyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mohamed Amine","family":"Midoun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,12]]},"reference":[{"issue":"08","key":"1822_CR1","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"Li Alvarez","year":"2006","unstructured":"Alvarez, Li, Shujun, G.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(08), 2129\u20132151 (2006)","journal-title":"Int. J. Bifurc. Chaos"},{"key":"1822_CR2","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1155\/2014\/409586","volume":"2014","author":"R Boriga","year":"2014","unstructured":"Boriga, R., D\u0103sc\u0103lescu, A.C., Diaconu, A.V.: A new one-dimensional chaotic map and its use in a novel real-time image encryption scheme. Adv. Multimed. 2014, 6 (2014)","journal-title":"Adv. Multimed."},{"issue":"3","key":"1822_CR3","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s00371-012-0732-x","volume":"29","author":"L Cao","year":"2013","unstructured":"Cao, L., Men, C., Ji, R.: Nonlinear scrambling-based reversible watermarking for 2d-vector maps. Vis. Comput. 29(3), 231\u2013237 (2013)","journal-title":"Vis. Comput."},{"issue":"1","key":"1822_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.matcom.2004.09.001","volume":"68","author":"JCH Castro","year":"2005","unstructured":"Castro, J.C.H., Sierra, J.M., Seznec, A., Izquierdo, A., Ribagorda, A.: The strict avalanche criterion randomness test. Math. Comput. Simul. 68(1), 1\u20137 (2005). https:\/\/doi.org\/10.1016\/j.matcom.2004.09.001","journal-title":"Math. Comput. Simul."},{"issue":"29","key":"1822_CR5","doi-asserted-by":"crossref","first-page":"6211","DOI":"10.1364\/AO.44.006211","volume":"44","author":"HT Chang","year":"2005","unstructured":"Chang, H.T., Tsan, C.L.: Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain. Appl. Opt. 44(29), 6211\u20139 (2005)","journal-title":"Appl. Opt."},{"issue":"4","key":"1822_CR6","doi-asserted-by":"crossref","first-page":"2399","DOI":"10.1007\/s11071-018-4332-9","volume":"93","author":"J Chen","year":"2018","unstructured":"Chen, J., Han, F., Qian, W., Yao, Y.D., Zhu, Zl: Cryptanalysis and improvement in an image encryption scheme using combination of the 1d chaotic map. Nonlinear Dyn. 93(4), 2399\u20132413 (2018)","journal-title":"Nonlinear Dyn."},{"key":"1822_CR7","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"J Chen","year":"2018","unstructured":"Chen, J., Zhu, Z.L., Zhang, L.B., Zhang, Y., Yang, B.Q.: Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process. 142, 340\u2013353 (2018)","journal-title":"Signal Process."},{"issue":"4","key":"1822_CR8","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/S0375-9601(02)00522-4","volume":"299","author":"S Chen","year":"2002","unstructured":"Chen, S., L\u00fc, J.: Parameters identification and synchronization of chaotic systems based upon adaptive control. Phys. Lett. A 299(4), 353\u2013358 (2002)","journal-title":"Phys. Lett. A"},{"issue":"1","key":"1822_CR9","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1049\/cje.2017.10.004","volume":"27","author":"H Ding","year":"2018","unstructured":"Ding, H., Zichen, L.I., Yang, Y., You, F., Liu, F.: High quality data hiding in halftone image based on block conjugate. Chin. J. Electron. 27(1), 150\u2013158 (2018)","journal-title":"Chin. J. Electron."},{"key":"1822_CR10","first-page":"1","volume":"36","author":"F Ernawan","year":"2018","unstructured":"Ernawan, F., Kabir, M.N.: A block-based RDWT-SVD image watermarking method using human visual system characteristics. Vis Comput 36, 1\u201319 (2018)","journal-title":"Vis Comput"},{"key":"1822_CR11","doi-asserted-by":"crossref","unstructured":"Feng, W., He, Y., Li, H., Li, C.: Cryptanalysis and improvement of the image encryption scheme based on 2d logistic-adjusted-sine map. IEEE Access (2019)","DOI":"10.1109\/ACCESS.2019.2893760"},{"issue":"99","key":"1822_CR12","first-page":"1","volume":"PP","author":"XQ Fu","year":"2018","unstructured":"Fu, X.Q., Liu, B.C., Xie, Y.Y., Wei, L., Yong, L.: Image encryption-then-transmission using dna encryption algorithm and the double chaos. IEEE Photon. J. PP(99), 1\u20131 (2018)","journal-title":"IEEE Photon. J."},{"issue":"7","key":"1822_CR13","doi-asserted-by":"crossref","first-page":"2192","DOI":"10.1007\/s10773-017-3365-z","volume":"56","author":"Y Hu","year":"2017","unstructured":"Hu, Y., Xie, X., Liu, X., Zhou, N.: Quantum multi-image encryption based on iteration arnold transform with parameters and image correlation decomposition. Int. J. Theor. Phys. 56(7), 2192\u20132205 (2017)","journal-title":"Int. J. Theor. Phys."},{"key":"1822_CR14","doi-asserted-by":"crossref","first-page":"8660","DOI":"10.1109\/ACCESS.2018.2890116","volume":"7","author":"Z Hua","year":"2019","unstructured":"Hua, Z., Xu, B., Jin, F., Huang, H.: Image encryption using Josephus problem and filtering diffusion. IEEE Access 7, 8660\u20138674 (2019)","journal-title":"IEEE Access"},{"key":"1822_CR15","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua, Z., Zhou, Y.: Image encryption using 2d logistic-adjusted-Sine map. Inf. Sci. 339, 237\u2013253 (2016)","journal-title":"Inf. Sci."},{"key":"1822_CR16","doi-asserted-by":"crossref","unstructured":"Hua, Z., Zhou, Y.: Exponential chaotic model for generating robust chaos. In: IEEE transactions on systems, man, and cybernetics: systems (2019)","DOI":"10.1109\/TSMC.2019.2932616"},{"key":"1822_CR17","doi-asserted-by":"crossref","unstructured":"Hua, Z., Zhou, Y., Bao, B. C.: Two-dimensional sine chaotification system with hardware implementation. IEEE Trans. Ind. Inf. (2019)","DOI":"10.1109\/TII.2019.2923553"},{"key":"1822_CR18","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua, Z., Zhou, Y., Huang, H.: Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403\u2013419 (2019)","journal-title":"Inf. Sci."},{"issue":"7","key":"1822_CR19","doi-asserted-by":"crossref","first-page":"535","DOI":"10.3390\/e20070535","volume":"20","author":"L Huang","year":"2018","unstructured":"Huang, L., Cai, S., Xiao, M., Xiong, X.: A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion. Entropy 20(7), 535 (2018)","journal-title":"Entropy"},{"key":"1822_CR20","unstructured":"IEEE standard for binary floating-point arithmetic. Institute of Electrical and Electronics Engineers, New York (1985)"},{"issue":"9","key":"1822_CR21","doi-asserted-by":"crossref","first-page":"1850115","DOI":"10.1142\/S0217984918501154","volume":"32","author":"M Kaur","year":"2018","unstructured":"Kaur, M., Kumar, V.: Fourier-mellin moment-based intertwining map for image encryption. Mod. Phys. Lett. B 32(9), 1850115 (2018)","journal-title":"Mod. Phys. Lett. B"},{"issue":"8","key":"1822_CR22","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1109\/78.403367","volume":"43","author":"S Kay","year":"1995","unstructured":"Kay, S., Nagesha, V.: Methods for chaotic signal estimation. IEEE Trans. Signal Process. 43(8), 2013\u20132016 (1995)","journal-title":"IEEE Trans. Signal Process."},{"issue":"2","key":"1822_CR23","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1007\/s11071-014-1533-8","volume":"78","author":"C Li","year":"2014","unstructured":"Li, C., Xie, T., Liu, Q., Cheng, G.: Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn. 78(2), 1545\u20131551 (2014)","journal-title":"Nonlinear Dyn."},{"issue":"9","key":"1822_CR24","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1007\/s00371-018-1574-y","volume":"35","author":"Gd Li","year":"2019","unstructured":"Li, Gd, et al.: Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform. Vis. Comput. 35(9), 1267\u20131277 (2019)","journal-title":"Vis. Comput."},{"issue":"5","key":"1822_CR25","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1049\/iet-ipr.2016.0040","volume":"11","author":"H Liu","year":"2017","unstructured":"Liu, H., Kadir, A., Sun, X.: Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Process. 11(5), 324\u2013332 (2017)","journal-title":"IET Image Process."},{"issue":"16","key":"1822_CR26","doi-asserted-by":"crossref","first-page":"21445","DOI":"10.1007\/s11042-017-5594-9","volume":"77","author":"L Liu","year":"2018","unstructured":"Liu, L., Miao, S.: A new simple one-dimensional chaotic map and its application for image encryption. Multimed. Tools Appl. 77(16), 21445\u201321462 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"1822_CR27","first-page":"137","volume":"27","author":"X Liu","year":"2018","unstructured":"Liu, X., Xiao, H., Panchi, L.I., Zhao, Y.: Design and implementation of color image encryption based on qubit rotation about axis. Chin. J. Electron. 27(4), 137\u2013145 (2018)","journal-title":"Chin. J. Electron."},{"key":"1822_CR28","first-page":"188","volume":"433","author":"ZL Liu","year":"2018","unstructured":"Liu, Z.L., Pun, C.M.: Reversible data-hiding in encrypted images by redundant space transfer. Inf. Sci. 433, 188\u2013203 (2018)","journal-title":"Inf. Sci."},{"issue":"3","key":"1822_CR29","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s10898-010-9570-4","volume":"49","author":"Q Luong","year":"2011","unstructured":"Luong, Q.: A blind image watermarking using multiresolution visibility map. J. Glob. Optim. 49(3), 435\u2013448 (2011)","journal-title":"J. Glob. Optim."},{"issue":"99","key":"1822_CR30","first-page":"1","volume":"PP","author":"K Muhammad","year":"2018","unstructured":"Muhammad, K., Hamza, R., Ahmad, J., Lloret, J., Wang, H.H.G., Baik, S.W.: Secure surveillance framework for iot systems using probabilistic image encryption. IEEE Trans. Ind. Inf. PP(99), 1\u20131 (2018)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"1822_CR31","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak, C., Huang, L.: A new color image encryption using combination of the 1d chaotic map. Signal Process. 138, 129\u2013137 (2017)","journal-title":"Signal Process."},{"issue":"1","key":"1822_CR32","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1063\/1.166092","volume":"5","author":"S Pincus","year":"1995","unstructured":"Pincus, S.: Approximate entropy (apen) as a complexity measure. Chaos Interdiscip. J. Nonlinear Sci. 5(1), 110\u2013117 (1995)","journal-title":"Chaos Interdiscip. J. Nonlinear Sci."},{"issue":"6","key":"1822_CR33","doi-asserted-by":"crossref","first-page":"2297","DOI":"10.1073\/pnas.88.6.2297","volume":"88","author":"SM Pincus","year":"1991","unstructured":"Pincus, S.M.: Approximate entropy as a measure of system complexity. Proc. Natl. Acad. Sci. 88(6), 2297\u20132301 (1991)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"7","key":"1822_CR34","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.patcog.2003.12.013","volume":"37","author":"JS Seo","year":"2004","unstructured":"Seo, J.S., Yoo, C.D.: Localized image watermarking based on feature points of scale-space representation. Pattern Recognit. 37(7), 1365\u20131375 (2004)","journal-title":"Pattern Recognit."},{"issue":"4","key":"1822_CR35","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949). https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst. Tech. J."},{"issue":"01","key":"1822_CR36","first-page":"121","volume":"01","author":"W Stallings","year":"2012","unstructured":"Stallings, W.: Cryptography and network security: principles and practice. Int. J. Eng. Comput. Sci. 01(01), 121\u2013136 (2012)","journal-title":"Int. J. Eng. Comput. Sci."},{"key":"1822_CR37","doi-asserted-by":"crossref","unstructured":"Tang, J., Yu, Z., Liu, L.: A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption. In: Multimedia Tools and Applications, pp. 1\u201324 (2019)","DOI":"10.1007\/s11042-019-7602-8"},{"issue":"2","key":"1822_CR38","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1140\/epjp\/i2018-11872-8","volume":"133","author":"S Vaidyanathan","year":"2018","unstructured":"Vaidyanathan, S., Akgul, A., Ka\u00e7ar, S., \u00c7avu\u015fo\u011flu, U.: A new 4-d chaotic hyperjerk system, its synchronization, circuit design and applications in rng, image encryption and chaos-based steganography. Eur. Phys. J. Plus 133(2), 46 (2018)","journal-title":"Eur. Phys. J. Plus"},{"issue":"14","key":"1822_CR39","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1016\/j.ijleo.2012.06.020","volume":"124","author":"B Wang","year":"2013","unstructured":"Wang, B., Wei, X., Zhang, Q.: Cryptanalysis of an image cryptosystem based on logistic map. Opt. Int. J. Light Electron. Opt. 124(14), 1773\u20131776 (2013)","journal-title":"Opt. Int. J. Light Electron. Opt."},{"key":"1822_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optcom.2017.08.054","volume":"407","author":"C Wang","year":"2018","unstructured":"Wang, C., Wang, H., Ji, Y.: Multi-bit wavelength coding phase-shift-keying optical steganography based on amplified spontaneous emission noise. Opt. Commun. 407, 1\u20138 (2018)","journal-title":"Opt. Commun."},{"key":"1822_CR41","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1016\/j.optlastec.2018.07.052","volume":"108","author":"M Wang","year":"2018","unstructured":"Wang, M., Wang, X., Zhang, Y., Gao, Z.: A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt. Laser Technol. 108, 558\u2013573 (2018)","journal-title":"Opt. Laser Technol."},{"key":"1822_CR42","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1016\/j.optlaseng.2019.05.013","volume":"121","author":"M Wang","year":"2019","unstructured":"Wang, M., Wang, X., Zhang, Y., Zhou, S., Zhao, T., Yao, N.: A novel chaotic system and its application in a color image cryptosystem. Opt. Lasers Eng. 121, 479\u2013494 (2019)","journal-title":"Opt. Lasers Eng."},{"key":"1822_CR43","doi-asserted-by":"crossref","unstructured":"Wang, X., Feng, L., Li, R., Zhang, F.: A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn 1\u201328 (2019)","DOI":"10.1007\/s11071-018-4723-y"},{"key":"1822_CR44","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"X Wang","year":"2020","unstructured":"Wang, X., Gao, S.: Image encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theory. Inf. Sci. 507, 16\u201336 (2020)","journal-title":"Inf. Sci."},{"issue":"5","key":"1822_CR45","doi-asserted-by":"crossref","first-page":"6191","DOI":"10.1007\/s11042-018-6326-5","volume":"78","author":"X Wang","year":"2019","unstructured":"Wang, X., Qin, X., Liu, C.: Color image encryption algorithm based on customized globally coupled map lattices. Multimed. Tools Appl. 78(5), 6191\u20136209 (2019)","journal-title":"Multimed. Tools Appl."},{"issue":"99","key":"1822_CR46","first-page":"1","volume":"PP","author":"X Wang","year":"2017","unstructured":"Wang, X., Zhou, G., Dai, C., Chen, J.: Optical image encryption with divergent illumination and asymmetric keys. IEEE Photon. J. PP(99), 1\u20131 (2017)","journal-title":"IEEE Photon. J."},{"issue":"4","key":"1822_CR47","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","volume":"41","author":"Y Wang","year":"2009","unstructured":"Wang, Y., Wong, K.W., Liao, X., Xiang, T., Chen, G.: A chaos-based image encryption algorithm with variable control parameters. Chaos Solitons Fract. 41(4), 1773\u20131783 (2009)","journal-title":"Chaos Solitons Fract."},{"issue":"1","key":"1822_CR48","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s11071-016-3049-x","volume":"87","author":"W Wen","year":"2017","unstructured":"Wen, W., Zhang, Y., Su, M., Zhang, R., Chen, Jx, Li, M.: Differential attack on a hyper-chaos-based image cryptosystem with a classic bi-modular architecture. Nonlinear Dyn. 87(1), 383\u2013390 (2017)","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"1822_CR49","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","volume":"16","author":"A Wolf","year":"1985","unstructured":"Wolf, A., Swift, J.B., Swinney, H.L., Vastano, J.A.: Determining lyapunov exponents from a time series. Phys. D Nonlinear Phenom. 16(3), 285\u2013317 (1985)","journal-title":"Phys. D Nonlinear Phenom."},{"key":"1822_CR50","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323\u2013342 (2013). https:\/\/doi.org\/10.1016\/j.ins.2012.07.049","journal-title":"Inf. Sci."},{"issue":"5","key":"1822_CR51","doi-asserted-by":"crossref","first-page":"1424","DOI":"10.1109\/78.757236","volume":"47","author":"W Xiaofu","year":"1999","unstructured":"Xiaofu, W., Songgeng, S.: A general efficient method for chaotic signal estimation. IEEE Trans. Signal Process. 47(5), 1424\u20131428 (1999)","journal-title":"IEEE Trans. Signal Process."},{"issue":"12","key":"1822_CR52","doi-asserted-by":"crossref","first-page":"1653","DOI":"10.1007\/s00371-014-1045-z","volume":"31","author":"J Xu","year":"2015","unstructured":"Xu, J., Mao, X., Jin, X., Jaffer, A., Lu, S., Li, L., Toyoura, M.: Hidden message in a deformation-based texture. Vis. Comput. 31(12), 1653\u20131669 (2015)","journal-title":"Vis. Comput."},{"issue":"99","key":"1822_CR53","first-page":"1","volume":"PP","author":"Z Yang","year":"2018","unstructured":"Yang, Z., Guo, X., Chen, Z., Huang, Y., Zhang, Y.J.: RNN-STEGA: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. PP(99), 1\u20131 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1822_CR54","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.optlastec.2017.07.005","volume":"97","author":"S Yao","year":"2017","unstructured":"Yao, S., Chen, L., Chang, G., He, B.: A new optical encryption system for image transformation. Opt. Laser Technol. 97, 234\u2013241 (2017)","journal-title":"Opt. Laser Technol."},{"key":"1822_CR55","first-page":"6","volume":"92","author":"X Zhang","year":"2017","unstructured":"Zhang, X., Wang, X.: Multiple-image encryption algorithm based on mixed image element and chaos. Comput. Electr. Eng. 92, 6\u201316 (2017)","journal-title":"Comput. Electr. Eng."},{"issue":"5","key":"1822_CR56","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/JIOT.2017.2781737","volume":"5","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., He, Q., Xiang, Y., Zhang, L.Y., Liu, B., Chen, J., Xie, Y.: Low-cost and confidentiality-preserving data acquisition for internet of multimedia things. IEEE Int. Things J. 5(5), 3442\u20133451 (2017)","journal-title":"IEEE Int. Things J."},{"issue":"4","key":"1822_CR57","doi-asserted-by":"crossref","first-page":"1831","DOI":"10.1007\/s11071-015-2280-1","volume":"82","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Li, Y., Wen, W., Wu, Y., Chen, Jx: Deciphering an image cipher based on 3-cell chaotic map and biological operations. Nonlinear Dyn. 82(4), 1831\u20131837 (2015)","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"1822_CR58","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10773-017-3534-0","volume":"57","author":"RG Zhou","year":"2018","unstructured":"Zhou, R.G., Luo, J., Liu, X.A., Zhu, C., Wei, L., Zhang, X.: A novel quantum image steganography scheme based on LSB. Int. J. Theor. Phys. 57(1), 1\u201316 (2018)","journal-title":"Int. J. Theor. Phys."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-020-01822-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00371-020-01822-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-020-01822-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T17:16:15Z","timestamp":1666113375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00371-020-01822-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,12]]},"references-count":58,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["1822"],"URL":"https:\/\/doi.org\/10.1007\/s00371-020-01822-8","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,12]]},"assertion":[{"value":"12 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}