{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T07:17:03Z","timestamp":1772263023922,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T00:00:00Z","timestamp":1597017600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T00:00:00Z","timestamp":1597017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61672124"],"award-info":[{"award-number":["61672124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund","award":["MMJJ20170203"],"award-info":[{"award-number":["MMJJ20170203"]}]},{"name":"Liaoning Province Science and Technology Innovation Leading Talents Program Project","award":["XLYC1802013"],"award-info":[{"award-number":["XLYC1802013"]}]},{"name":"Key R&D Projects of Liaoning Province","award":["2019020105-JH2\/103"],"award-info":[{"award-number":["2019020105-JH2\/103"]}]},{"name":"Jinan City \u201920 universities\u2019 Funding Projects Introducing Innovation Team Program","award":["2019GXRC031"],"award-info":[{"award-number":["2019GXRC031"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s00371-020-01936-z","type":"journal-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T14:06:49Z","timestamp":1597068409000},"page":"1757-1768","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":62,"title":["A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9020-8590","authenticated-orcid":false,"given":"Mohamed Zakariya","family":"Talhaoui","sequence":"first","affiliation":[]},{"given":"Xingyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Abdallah","family":"Talhaoui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,10]]},"reference":[{"key":"1936_CR1","unstructured":"Rijmen, V., Daemen, J.: Advanced encryption standard. In: Proceedings of Federal Information Processing Standards Publications. National Institute of Standards and Technology, pp. 19\u201322 (2001)"},{"issue":"3","key":"1936_CR2","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D Coppersmith","year":"1994","unstructured":"Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243\u2013250 (1994)","journal-title":"IBM J. Res. Dev."},{"issue":"2","key":"1936_CR3","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"1936_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-020-00948-1","author":"MZ Talhaoui","year":"2020","unstructured":"Talhaoui, M.Z., Wang, X., Midoun, M.A.: Fast image encryption algorithm with high security level using the b\u00fclban chaotic map. J. Real-Time Image Process. (2020). https:\/\/doi.org\/10.1007\/s11554-020-00948-1","journal-title":"J. Real-Time Image Process."},{"key":"1936_CR5","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.image.2019.08.014","volume":"79","author":"JA Artiles","year":"2019","unstructured":"Artiles, J.A., Chaves, D.P., Pimentel, C.: Image encryption using block cipher and chaotic sequences. Sig. Process. Image Commun. 79, 24\u201331 (2019)","journal-title":"Sig. Process. Image Commun."},{"key":"1936_CR6","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.image.2015.10.004","volume":"41","author":"S El Assad","year":"2016","unstructured":"El Assad, S., Farajallah, M.: A new chaos-based image encryption system. Sig. Process. Image Commun. 41, 144\u2013157 (2016)","journal-title":"Sig. Process. Image Commun."},{"key":"1936_CR7","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li, Y., Wang, C., Chen, H.: A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt. Lasers Eng. 90, 238\u2013246 (2017)","journal-title":"Opt. Lasers Eng."},{"key":"1936_CR8","doi-asserted-by":"publisher","first-page":"115670","DOI":"10.1016\/j.image.2019.115670","volume":"80","author":"K Xuejing","year":"2020","unstructured":"Xuejing, K., Zihui, G.: A new color image encryption scheme based on dna encoding and spatiotemporal chaotic system. Sig. Process. Image Commun. 80, 115670 (2020)","journal-title":"Sig. Process. Image Commun."},{"key":"1936_CR9","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai, X., Chen, Y., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197\u2013213 (2017)","journal-title":"Opt. Lasers Eng."},{"issue":"12","key":"1936_CR10","doi-asserted-by":"publisher","first-page":"4653","DOI":"10.1016\/j.cnsns.2012.05.033","volume":"17","author":"A Akhshani","year":"2012","unstructured":"Akhshani, A., Akhavan, A., Lim, S.-C., Hassan, Z.: An image encryption scheme based on quantum logistic map. Commun. Nonlinear Sci. Numer. Simul. 17(12), 4653\u20134661 (2012)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"4","key":"1936_CR11","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1007\/s11128-015-0926-z","volume":"14","author":"NR Zhou","year":"2015","unstructured":"Zhou, N.R., Hua, T.X., Gong, L.H., Pei, D.J., Liao, Q.H.: Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf. Process. 14(4), 1193\u20131213 (2015)","journal-title":"Quantum Inf. Process."},{"key":"1936_CR12","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.ins.2016.01.078","volume":"345","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Tian, J., Lei, H., Zhou, Y.-H., Shi, W.-M.: Novel quantum image encryption using one-dimensional quantum cellular automata. Inf. Sci. 345, 257\u2013270 (2016)","journal-title":"Inf. Sci."},{"issue":"22","key":"1936_CR13","doi-asserted-by":"publisher","first-page":"3817","DOI":"10.1364\/OL.35.003817","volume":"35","author":"W Chen","year":"2010","unstructured":"Chen, W., Chen, X., Sheppard, C.J.: Optical image encryption based on diffractive imaging. Opt. Lett. 35(22), 3817\u20133819 (2010)","journal-title":"Opt. Lett."},{"key":"1936_CR14","doi-asserted-by":"publisher","first-page":"115662","DOI":"10.1016\/j.image.2019.115662","volume":"80","author":"Z Shao","year":"2020","unstructured":"Shao, Z., Liu, X., Yao, Q., Qi, N., Shang, Y., Zhang, J.: Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Sig. Process. Image Commun. 80, 115662 (2020)","journal-title":"Sig. Process. Image Commun."},{"issue":"8","key":"1936_CR15","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1016\/j.image.2014.04.001","volume":"29","author":"R Boriga","year":"2014","unstructured":"Boriga, R., D\u0103sc\u0103lescu, A.C., Priescu, I.: A new hyperchaotic map and its application in an image encryption scheme. Sig. Process. Image Commun. 29(8), 887\u2013901 (2014)","journal-title":"Sig. Process. Image Commun."},{"issue":"2","key":"1936_CR16","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1109\/TII.2019.2923553","volume":"16","author":"Z Hua","year":"2019","unstructured":"Hua, Z., Zhou, Y., Bao, B.: Two-dimensional sine chaotification system with hardware implementation. IEEE Trans. Ind. Inf. 16(2), 887\u2013897 (2019)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"1936_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.2979596","author":"Z Hua","year":"2020","unstructured":"Hua, Z., Zhang, Y., Zhou, Y.: Two-dimensional modular chaotification system for improving chaos complexity. IEEE Trans. Signal Process. (2020). https:\/\/doi.org\/10.1109\/TSP.2020.2979596","journal-title":"IEEE Trans. Signal Process."},{"issue":"22","key":"1936_CR18","doi-asserted-by":"publisher","first-page":"1950263","DOI":"10.1142\/S0217984919502634","volume":"33","author":"X Wang","year":"2019","unstructured":"Wang, X., Zhao, H., Hou, Y., Luo, C., Zhang, Y., Wang, C.: Chaotic image encryption algorithm based on pseudo-random bit sequence and dna plane. Mod. Phys. Lett. B 33(22), 1950263 (2019)","journal-title":"Mod. Phys. Lett. B"},{"key":"1936_CR19","doi-asserted-by":"publisher","first-page":"8660","DOI":"10.1109\/ACCESS.2018.2890116","volume":"7","author":"Z Hua","year":"2019","unstructured":"Hua, Z., Xu, B., Jin, F., Huang, H.: Image encryption using josephus problem and filtering diffusion. IEEE Access 7, 8660\u20138674 (2019)","journal-title":"IEEE Access"},{"key":"1936_CR20","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1155\/2014\/409586","volume":"2014","author":"R Boriga","year":"2014","unstructured":"Boriga, R., D\u0103sc\u0103lescu, A.C., Diaconu, A.-V.: A new one-dimensional chaotic map and its use in a novel real-time image encryption scheme. Adv. Multimed. 2014, 6 (2014)","journal-title":"Adv. Multimed."},{"issue":"14","key":"1936_CR21","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1016\/j.ijleo.2012.06.020","volume":"124","author":"B Wang","year":"2013","unstructured":"Wang, B., Wei, X., Zhang, Q.: Cryptanalysis of an image cryptosystem based on logistic map. Opt.-Int. J. Light Electron Opt. 124(14), 1773\u20131776 (2013)","journal-title":"Opt.-Int. J. Light Electron Opt."},{"issue":"2","key":"1936_CR22","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1007\/s11071-014-1533-8","volume":"78","author":"C Li","year":"2014","unstructured":"Li, C., Xie, T., Liu, Q., Cheng, G.: Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn. 78(2), 1545\u20131551 (2014)","journal-title":"Nonlinear Dyn."},{"issue":"7","key":"1936_CR23","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/81.933333","volume":"48","author":"D He","year":"2001","unstructured":"He, D., He, C., Jiang, L.-G., Zhu, H.-W., Hu, G.-R.: Chaotic characteristics of a one-dimensional iterative map with infinite collapses. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 48(7), 900\u2013906 (2001)","journal-title":"IEEE Trans. Circuits Syst. I Fundam. Theory Appl."},{"key":"1936_CR24","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ins.2020.02.008","volume":"520","author":"A Mansouri","year":"2020","unstructured":"Mansouri, A., Wang, X.: A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 520, 46\u201362 (2020)","journal-title":"Inf. Sci."},{"key":"1936_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-020-01822-8","author":"MZ Talhaoui","year":"2020","unstructured":"Talhaoui, M.Z., Wang, X., Midoun, M.A.: A new one-dimensional cosine polynomial chaotic map and its use in image encryption. Vis. Comput. (2020). https:\/\/doi.org\/10.1007\/s00371-020-01822-8","journal-title":"Vis. Comput."},{"issue":"3","key":"1936_CR26","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","volume":"16","author":"A Wolf","year":"1985","unstructured":"Wolf, A., Swift, J.B., Swinney, H.L., Vastano, J.A.: Determining lyapunov exponents from a time series. Phys. D 16(3), 285\u2013317 (1985)","journal-title":"Phys. D"},{"issue":"6","key":"1936_CR27","doi-asserted-by":"publisher","first-page":"2297","DOI":"10.1073\/pnas.88.6.2297","volume":"88","author":"SM Pincus","year":"1991","unstructured":"Pincus, S.M.: Approximate entropy as a measure of system complexity. Proc. Natl. Acad. Sci. 88(6), 2297\u20132301 (1991)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"1","key":"1936_CR28","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1063\/1.166092","volume":"5","author":"S Pincus","year":"1995","unstructured":"Pincus, S.: Approximate entropy (apen) as a complexity measure. Chaos Interdiscipl. J. Nonlinear Sci. 5(1), 110\u2013117 (1995)","journal-title":"Chaos Interdiscipl. J. Nonlinear Sci."},{"issue":"4","key":"1936_CR29","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems*. Bell Syst. Technol. J. 28(4), 656\u2013715 (1949). https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst. Technol. J."},{"key":"1936_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7602-8","author":"J Tang","year":"2019","unstructured":"Tang, J., Yu, Z., Liu, L.: A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption. Multimed. Tools Appl. (2019). https:\/\/doi.org\/10.1007\/s11042-019-7602-8","journal-title":"Multimed. Tools Appl."},{"issue":"16","key":"1936_CR31","doi-asserted-by":"publisher","first-page":"21445","DOI":"10.1007\/s11042-017-5594-9","volume":"77","author":"L Liu","year":"2018","unstructured":"Liu, L., Miao, S.: A new simple one-dimensional chaotic map and its application for image encryption. Multimed. Tools Appl. 77(16), 21445\u201321462 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"1936_CR32","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua, Z., Zhou, Y., Huang, H.: Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403\u2013419 (2019)","journal-title":"Inf. Sci."},{"key":"1936_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4723-y","author":"X Wang","year":"2019","unstructured":"Wang, X., Feng, L., Li, R., Zhang, F.: A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn. (2019). https:\/\/doi.org\/10.1007\/s11071-018-4723-y","journal-title":"Nonlinear Dyn."},{"key":"1936_CR34","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua, Z., Jin, F., Xu, B., Huang, H.: 2D Logistic-sine-coupling map for image encryption. Signal Process. 149, 148\u2013161 (2018)","journal-title":"Signal Process."},{"key":"1936_CR35","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323\u2013342 (2013). https:\/\/doi.org\/10.1016\/j.ins.2012.07.049","journal-title":"Inf. Sci."},{"issue":"1","key":"1936_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.matcom.2004.09.001","volume":"68","author":"JCH Castro","year":"2005","unstructured":"Castro, J.C.H., Sierra, J.M., Seznec, A., Izquierdo, A., Ribagorda, A.: The strict avalanche criterion randomness test. Math. Comput. Simul. 68(1), 1\u20137 (2005). https:\/\/doi.org\/10.1016\/j.matcom.2004.09.001","journal-title":"Math. Comput. Simul."},{"issue":"08","key":"1936_CR37","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(08), 2129\u20132151 (2006)","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"01","key":"1936_CR38","first-page":"121","volume":"01","author":"W Stallings","year":"2012","unstructured":"Stallings, W.: Cryptography and network security: principles and practice. Int. J. Eng. Comput. Sci. 01(01), 121\u2013136 (2012)","journal-title":"Int. J. Eng. Comput. Sci."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-020-01936-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-020-01936-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-020-01936-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T23:49:21Z","timestamp":1628552961000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-020-01936-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,10]]},"references-count":38,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["1936"],"URL":"https:\/\/doi.org\/10.1007\/s00371-020-01936-z","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,10]]},"assertion":[{"value":"10 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}