{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T20:12:39Z","timestamp":1774469559403,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T00:00:00Z","timestamp":1668729600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T00:00:00Z","timestamp":1668729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007102","name":"Zagazig University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007102","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2023,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Multimedia information usage is increasing with new technologies such as the Internet of things (IoT), cloud computing, and big data processing. Video is one of the most widely used types of multimedia. Videos are played and transmitted over different networks in many IoT applications. Consequently, securing videos during transmission over various networks is necessary to prevent unauthorized access to the video's content. The existing securing schemes have limitations in terms of high resource consumption and high processing time, which are not liable to IoT devices with limited resources in terms of processor size, memory, time, and power consumption. This paper proposed a new encryption scheme for securing the colored videos. The video frames are extracted, and then, the frame components (red, green, and blue) are separated and padded by zero. Then, every frame component (channel) is split into blocks of different sizes. Then, the scrambled blocks of a component are obtained by applying a zigzag scan, rotating the blocks, and randomly changing the blocks' arrangements. Finally, a secret key produced from a chaotic logistic map is used to encrypt the scrambled frame component. Security analysis and time complexity are used to evaluate the efficiency of the proposed scheme in encrypting the colored videos. The results reveal that the proposed scheme has high-level security and encryption efficiency. Finally, a comparison between the proposed scheme and existing schemes is performed. The results confirmed that the proposed scheme has additional encryption efficiency.<\/jats:p>","DOI":"10.1007\/s00371-022-02711-y","type":"journal-article","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T06:02:41Z","timestamp":1668751361000},"page":"6041-6072","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Fast colored video encryption using block scrambling and multi-key generation"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8065-8977","authenticated-orcid":false,"given":"Khalid M.","family":"Hosny","sequence":"first","affiliation":[]},{"given":"Mohamed A.","family":"Zaki","sequence":"additional","affiliation":[]},{"given":"Nabil A.","family":"Lashin","sequence":"additional","affiliation":[]},{"given":"Hanaa M.","family":"Hamza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,18]]},"reference":[{"key":"2711_CR1","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/J.COSE.2013.04.004","volume":"38","author":"R Von Solms","year":"2013","unstructured":"Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97\u2013102 (2013). https:\/\/doi.org\/10.1016\/J.COSE.2013.04.004","journal-title":"Comput. Secur."},{"issue":"1","key":"2711_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/J.COSE.2009.06.004","volume":"29","author":"F Liu","year":"2010","unstructured":"Liu, F., Koenig, H.: A survey of video encryption algorithms. Comput. Security. 29(1), 3\u201315 (2010). https:\/\/doi.org\/10.1016\/J.COSE.2009.06.004","journal-title":"Comput. Security."},{"key":"2711_CR3","doi-asserted-by":"publisher","first-page":"103039","DOI":"10.1016\/J.JISA.2021.103039","volume":"64","author":"W El-Shafai","year":"2022","unstructured":"El-Shafai, W., Mesrega, A.K., Ahmed, H.E., Abdelwahab, N., AbdEl-Samie, F.E.: An efficient multimedia compression-encryption scheme using Latin squares for securing internet of things networks. J. Inf. Secur. Appl. 64, 103039 (2022). https:\/\/doi.org\/10.1016\/J.JISA.2021.103039","journal-title":"J. Inf. Secur. Appl."},{"key":"2711_CR4","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/EIT51626.2021.9491868","volume":"2021","author":"X Huang","year":"2021","unstructured":"Huang, X., Arnold, D., Fang, T., Saniie, J.: A chaotic-based encryption\/decryption system for secure video transmission. IEEE Int. Confer. Electro Inf. Technol. 2021, 369\u2013373 (2021). https:\/\/doi.org\/10.1109\/EIT51626.2021.9491868","journal-title":"IEEE Int. Confer. Electro Inf. Technol."},{"key":"2711_CR5","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/J.NEUCOM.2018.09.091","volume":"335","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Liu, S., Wang, Y., Zhao, H., Liu, S.: Video steganography: a review. Neurocomputing 335, 238\u2013250 (2019). https:\/\/doi.org\/10.1016\/J.NEUCOM.2018.09.091","journal-title":"Neurocomputing"},{"key":"2711_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2011.5978601","author":"R Balaji","year":"2011","unstructured":"Balaji, R., Naveen, G.: Secure data transmission using video Steganography. IEEE Int. Confer. Electro Inf. Technol. (2011). https:\/\/doi.org\/10.1109\/EIT.2011.5978601","journal-title":"IEEE Int. Confer. Electro Inf. Technol."},{"key":"2711_CR7","doi-asserted-by":"publisher","first-page":"2014","DOI":"10.1109\/LISAT.2014.6845191","volume":"2014","author":"RJ Mustafa","year":"2014","unstructured":"Mustafa, R.J., Elleithy, K.M.: A highly secure video steganography using Hamming code (7, 4). IEEE Long Isl. Syst. Appl. Technol. Confer. LISAT 2014, 2014 (2014). https:\/\/doi.org\/10.1109\/LISAT.2014.6845191","journal-title":"IEEE Long Isl. Syst. Appl. Technol. Confer. LISAT"},{"key":"2711_CR8","doi-asserted-by":"publisher","unstructured":"Dixit, M., Bhide, N., Khankhoje, S., Ukarande, R.: Video steganography. In: 2015 Int. Conf. Pervasive Comput. Adv. Commun. Technol. Appl. Soc. ICPC 2015 (2015). https:\/\/doi.org\/10.1109\/PERVASIVE.2015.7087159","DOI":"10.1109\/PERVASIVE.2015.7087159"},{"issue":"6","key":"2711_CR9","doi-asserted-by":"publisher","first-page":"2539","DOI":"10.1007\/S00542-017-3689-X\/FIGURES\/8","volume":"24","author":"G Gupta","year":"2018","unstructured":"Gupta, G., Gupta, V.K., Chandra, M.: An efficient video watermarking based security model. Microsyst. Technol. 24(6), 2539\u20132548 (2018). https:\/\/doi.org\/10.1007\/S00542-017-3689-X\/FIGURES\/8","journal-title":"Microsyst. Technol."},{"issue":"9","key":"2711_CR10","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1109\/TCSVT.2017.2712162","volume":"28","author":"M Asikuzzaman","year":"2018","unstructured":"Asikuzzaman, M., Pickering, M.R.: An overview of digital video watermarking. IEEE Trans. Circuits Syst. Video Technol. 28(9), 2131\u20132153 (2018). https:\/\/doi.org\/10.1109\/TCSVT.2017.2712162","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"11","key":"2711_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S42452-019-1305-7\/TABLES\/9","volume":"1","author":"A JarJar","year":"2019","unstructured":"JarJar, A.: Two Feistel rounds in image cryptography acting at the nucleotide level exploiting DNA and RNA property. SN Appl. Sci. 1(11), 1\u201317 (2019). https:\/\/doi.org\/10.1007\/S42452-019-1305-7\/TABLES\/9","journal-title":"SN Appl. Sci."},{"key":"2711_CR12","doi-asserted-by":"crossref","unstructured":"Lian, S.: Multimedia Content Encryption: Techniques and Applications. CRC Press (2008)","DOI":"10.1201\/9781420065282"},{"issue":"33\u201334","key":"2711_CR13","doi-asserted-by":"publisher","first-page":"23995","DOI":"10.1007\/S11042-020-09200-1","volume":"79","author":"X Li","year":"2020","unstructured":"Li, X., Yu, H., Zhang, H., Jin, X., Sun, H., Liu, J.: Video encryption based on hyperchaotic system. Multimed. Tools Appl. 79(33\u201334), 23995\u201324011 (2020). https:\/\/doi.org\/10.1007\/S11042-020-09200-1","journal-title":"Multimed. Tools Appl."},{"key":"2711_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S12652-021-03675-Y","volume":"2022","author":"KM Hosny","year":"2022","unstructured":"Hosny, K.M., Kamal, S.T., Darwish, M.M.: Novel encryption for color images using fractional-order hyperchaotic system. J. Ambient Intell. Hum. Comput. 2022, 1\u201316 (2022). https:\/\/doi.org\/10.1007\/S12652-021-03675-Y","journal-title":"J. Ambient Intell. Hum. Comput."},{"issue":"9","key":"2711_CR15","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.3390\/ELECTRONICS10091066","volume":"10","author":"KM Hosny","year":"2021","unstructured":"Hosny, K.M., Kamal, S.T., Darwish, M.M., Papakostas, G.A.: New image encryption algorithm using hyperchaotic system and fibonacci Q-matrix. Electron 10(9), 1066 (2021). https:\/\/doi.org\/10.3390\/ELECTRONICS10091066","journal-title":"Electron"},{"key":"2711_CR16","doi-asserted-by":"publisher","first-page":"128548","DOI":"10.1109\/ACCESS.2020.3008644","volume":"8","author":"A Alarifi","year":"2020","unstructured":"Alarifi, A., Sankar, S., Altameem, T., Jithin, K.C., Amoon, M., El-Shafai, W.: A novel hybrid cryptosystem for secure streaming of high-efficiency H.265 compressed videos in IoT multimedia applications. IEEE Access 8, 128548\u2013128573 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3008644","journal-title":"IEEE Access"},{"key":"2711_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S00371-021-02382-1","volume":"2022","author":"KM Hosny","year":"2022","unstructured":"Hosny, K.M., Kamal, S.T., Darwish, M.M.: A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Vis. Comput. 2022, 1\u201318 (2022). https:\/\/doi.org\/10.1007\/S00371-021-02382-1","journal-title":"Vis. Comput."},{"key":"2711_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/S00371-021-02066-W\/TABLES\/8","author":"G Kaur","year":"2021","unstructured":"Kaur, G., Agarwal, R., Patidar, V.: Color image encryption scheme based on fractional Hartley transform and chaotic substitution\u2013permutation. Vis. Comput. (2021). https:\/\/doi.org\/10.1007\/S00371-021-02066-W\/TABLES\/8","journal-title":"Vis. Comput."},{"issue":"11","key":"2711_CR19","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.3390\/E22111253","volume":"22","author":"I Yasser","year":"2020","unstructured":"Yasser, I., Mohamed, M.A., Samra, A.S., Khalifa, F.: A chaotic-based encryption\/decryption framework for secure multimedia communications. Entropy 22(11), 1253 (2020). https:\/\/doi.org\/10.3390\/E22111253","journal-title":"Entropy"},{"issue":"8","key":"2711_CR20","doi-asserted-by":"publisher","first-page":"2173","DOI":"10.1007\/S00371-020-01978-3\/FIGURES\/9","volume":"37","author":"V Munagala","year":"2021","unstructured":"Munagala, V., Kodati, S.P.: Enhanced hole entropy-based encoding via whale optimization for highly efficient video coding. Vis. Comput. 37(8), 2173\u20132194 (2021). https:\/\/doi.org\/10.1007\/S00371-020-01978-3\/FIGURES\/9","journal-title":"Vis. Comput."},{"issue":"1","key":"2711_CR21","doi-asserted-by":"publisher","first-page":"177","DOI":"10.32604\/IASC.2022.019348","volume":"31","author":"OS Faragallah","year":"2022","unstructured":"Faragallah, O.S., Sallam, A.I., El-Sayed, H.S.: Visual Protection Using RC5 Selective Encryption in Telemedicine. Intell. Autom. Soft Comput. 31(1), 177\u2013190 (2022). https:\/\/doi.org\/10.32604\/IASC.2022.019348","journal-title":"Intell. Autom. Soft Comput."},{"issue":"2","key":"2711_CR22","doi-asserted-by":"publisher","first-page":"2319","DOI":"10.1007\/S11042-020-09654-3\/TABLES\/6","volume":"80","author":"N Dolati","year":"2021","unstructured":"Dolati, N., Beheshti, A., Azadegan, H.: A selective encryption for H.264\/AVC videos based on scrambling. Multimed. Tools Appl. 80(2), 2319\u20132338 (2021). https:\/\/doi.org\/10.1007\/S11042-020-09654-3\/TABLES\/6","journal-title":"Multimed. Tools Appl."},{"key":"2711_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/S12652-020-02832-Z\/TABLES\/17","author":"OS Faragallah","year":"2021","unstructured":"Faragallah, O.S., et al.: Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. J. Ambient Intell. Humanize. Comput. (2021). https:\/\/doi.org\/10.1007\/S12652-020-02832-Z\/TABLES\/17","journal-title":"J. Ambient Intell. Humanize. Comput."},{"key":"2711_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S11554-022-01220-4","volume":"2022","author":"H Cai","year":"2022","unstructured":"Cai, H., Sun, J., Gao, Z., Zhang, H.: A novel multi-wing chaotic system with FPGA implementation and application in image encryption. J. Real-Time Image Process. 2022, 1\u201316 (2022). https:\/\/doi.org\/10.1007\/S11554-022-01220-4","journal-title":"J. Real-Time Image Process."},{"key":"2711_CR25","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/J.SIGPRO.2018.02.028","volume":"148","author":"X Wu","year":"2018","unstructured":"Wu, X., Wang, K., Wang, X., Kan, H., Kurths, J.: Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process. 148, 272\u2013287 (2018). https:\/\/doi.org\/10.1016\/J.SIGPRO.2018.02.028","journal-title":"Signal Process."},{"key":"2711_CR26","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/J.IMAGE.2016.12.007","volume":"52","author":"X Chai","year":"2017","unstructured":"Chai, X., Gan, Z., Yang, K., Chen, Y., Liu, X.: An image encryption algorithm based on the memristive hyperchaotic system, cellular automata, and DNA sequence operations. Signal Process. Image Commun. 52, 6\u201319 (2017). https:\/\/doi.org\/10.1016\/J.IMAGE.2016.12.007","journal-title":"Signal Process. Image Commun."},{"key":"2711_CR27","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/J.BIOSYSTEMS.2016.03.011","volume":"144","author":"XY Wang","year":"2016","unstructured":"Wang, X.Y., Zhang, H.L., Bao, X.M.: Color image encryption scheme using CML and DNA sequence operations. Biosystems 144, 18\u201326 (2016). https:\/\/doi.org\/10.1016\/J.BIOSYSTEMS.2016.03.011","journal-title":"Biosystems"},{"key":"2711_CR28","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/J.OPTLASENG.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat, A.Y., Moattar, M.H., Torshiz, M.N.: Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 90, 225\u2013237 (2017). https:\/\/doi.org\/10.1016\/J.OPTLASENG.2016.10.019","journal-title":"Opt. Lasers Eng."},{"key":"2711_CR29","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/J.OPTLASTEC.2014.05.012","volume":"64","author":"KM Faraoun","year":"2014","unstructured":"Faraoun, K.M.: Fast encryption of RGB color digital images using a tweakable cellular automaton based schema. Opt. Laser Technol. 64, 145\u2013155 (2014). https:\/\/doi.org\/10.1016\/J.OPTLASTEC.2014.05.012","journal-title":"Opt. Laser Technol."},{"key":"2711_CR30","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/J.OPTCOM.2014.12.043","volume":"342","author":"X Wang","year":"2015","unstructured":"Wang, X., Zhang, H.L.: A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt. Commun. 342, 51\u201360 (2015). https:\/\/doi.org\/10.1016\/J.OPTCOM.2014.12.043","journal-title":"Opt. Commun."},{"key":"2711_CR31","doi-asserted-by":"publisher","unstructured":"Auyporn, W., Vongpradhip, S.: A robust image encryption method based on bit plane decomposition and multiple chaotic maps. Int. J. Signal Process. Syst. (2014) https:\/\/doi.org\/10.12720\/IJSPS.3.1.8-13","DOI":"10.12720\/IJSPS.3.1.8-13"},{"key":"2711_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/S00371-021-02384-Z\/TABLES\/13","author":"P Murali","year":"2022","unstructured":"Murali, P., Niranjana, G., Paul, A.J., Muthu, J.S.: Domain-flexible selective image encryption based on genetic operations and chaotic maps. Vis. Comput. (2022). https:\/\/doi.org\/10.1007\/S00371-021-02384-Z\/TABLES\/13","journal-title":"Vis. Comput."},{"key":"2711_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/J.OPTLASENG.2022.106969","volume":"152","author":"Z Yang","year":"2022","unstructured":"Yang, Z., Cao, Y., Ji, Y., Liu, Z., Chen, H.: Securing color image by using bit-level modified integer nonlinear coupled chaos model in Fresnel diffraction domains. Opt. Lasers Eng. 152, 106969 (2022). https:\/\/doi.org\/10.1016\/J.OPTLASENG.2022.106969","journal-title":"Opt. Lasers Eng."},{"key":"2711_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S00371-022-02459-5","volume":"2022","author":"P Fang","year":"2022","unstructured":"Fang, P., Liu, H., Wu, C., Liu, M.: A survey of image encryption algorithms based on chaotic system. Vis. Comput. 2022, 1\u201329 (2022). https:\/\/doi.org\/10.1007\/S00371-022-02459-5","journal-title":"Vis. Comput."},{"key":"2711_CR35","doi-asserted-by":"publisher","DOI":"10.1140\/EPJP\/I2017-11819-7","author":"D Valli","year":"2017","unstructured":"Valli, D., Ganesan, K.: \u201cChaos based video encryption using maps and Ikeda time delay system,\u201d Eur. Phys. J. Plus (2017). https:\/\/doi.org\/10.1140\/EPJP\/I2017-11819-7","journal-title":"Phys. J. Plus"},{"key":"2711_CR36","doi-asserted-by":"publisher","unstructured":"Ranjith Kumar, R., Ganeshkumar, D., Suresh, A., Manigandan, K.: A new one round video encryption scheme based on 1D chaotic maps. In: 2019 5th Int. Conf. Adv. Comput. Commun. Syst. ICACCS 2019, pp. 439\u2013444 (2019). https:\/\/doi.org\/10.1109\/ICACCS.2019.8728443","DOI":"10.1109\/ICACCS.2019.8728443"},{"key":"2711_CR37","doi-asserted-by":"publisher","first-page":"122660","DOI":"10.1016\/J.PHYSA.2019.122660","volume":"537","author":"XH Song","year":"2020","unstructured":"Song, X.H., Wang, H.Q., Venegas-Andraca, S.E., Abd El-Latif, A.A.: Quantum video encryption based on qubit-planes controlled-XOR operations and improved logistic map. Phys. A Stat. Mech. Appl. 537, 122660 (2020). https:\/\/doi.org\/10.1016\/J.PHYSA.2019.122660","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"2711_CR38","doi-asserted-by":"publisher","DOI":"10.1002\/ETT.4071","author":"G Ye","year":"2021","unstructured":"Ye, G., Pan, C., Dong, Y., Jiao, K., Huang, X.: A novel multi-image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition. Trans. Emerg. Telecommun. Technol. (2021). https:\/\/doi.org\/10.1002\/ETT.4071","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"2711_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/J.OPTLASENG.2021.106881","volume":"150","author":"CF Duan","year":"2022","unstructured":"Duan, C.F., Zhou, J., Gong, L.H., Wu, J.Y., Zhou, N.R.: New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt. Lasers Eng. 150, 106881 (2022). https:\/\/doi.org\/10.1016\/J.OPTLASENG.2021.106881","journal-title":"Opt. Lasers Eng."},{"key":"2711_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/J.PHYSA.2021.126793","volume":"591","author":"LH Gong","year":"2022","unstructured":"Gong, L.H., Luo, H.X., Wu, R.Q., Zhou, N.R.: New 4D chaotic system with hidden attractors and self-excited attractors and its application in image encryption based on RNG. Phys. A Stat. Mech. Appl. 591, 126793 (2022). https:\/\/doi.org\/10.1016\/J.PHYSA.2021.126793","journal-title":"Phys. A Stat. Mech. Appl."},{"issue":"3","key":"2711_CR41","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/S00371-021-02066-W\/TABLES\/8","volume":"38","author":"G Kaur","year":"2022","unstructured":"Kaur, G., Agarwal, R., Patidar, V.: Color image encryption scheme based on fractional Hartley transform and chaotic substitution\u2013permutation. Vis. Comput. 38(3), 1027\u20131050 (2022). https:\/\/doi.org\/10.1007\/S00371-021-02066-W\/TABLES\/8","journal-title":"Vis. Comput."},{"key":"2711_CR42","unstructured":"YUV Sequences: http:\/\/trace.eas.asu.edu\/yuv\/. Accessed 07 Jan 2022"},{"key":"2711_CR43","doi-asserted-by":"publisher","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal, S.T., Hosny, K.M., Elgindy, T.M., Darwish, M.M., Fouda, M.M.: A new image encryption algorithm for grey and color medical images. IEEE Access 9, 37855\u201337865 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3063237","journal-title":"IEEE Access"},{"issue":"1\u20132","key":"2711_CR44","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/S11554-007-0058-5","volume":"3","author":"KM Hosny","year":"2008","unstructured":"Hosny, K.M.: Fast computation of accurate Zernike moments. J. Real-Time Image Process. 3(1\u20132), 97\u2013107 (2008). https:\/\/doi.org\/10.1007\/S11554-007-0058-5","journal-title":"J. Real-Time Image Process."},{"key":"2711_CR45","doi-asserted-by":"publisher","unstructured":"Sethi, J., Bhaumik, J., Chowdhury, A.S.: Chaos-Based Uncompressed Frame Level Video Encryption. Springer (2022). Accessed 15 Jun 2022 [Online]. https:\/\/doi.org\/10.1007\/978-981-16-6890-6_15","DOI":"10.1007\/978-981-16-6890-6_15"},{"issue":"2","key":"2711_CR46","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1049\/iet-ipr.2018.5250","volume":"14","author":"H Elkamchouchi","year":"2019","unstructured":"Elkamchouchi, H., Salama, W.M., Abouelseoud, Y.: New video encryption schemes based on chaotic maps. Wiley Online Libr. 14(2), 397\u2013406 (2019). https:\/\/doi.org\/10.1049\/iet-ipr.2018.5250","journal-title":"Wiley Online Libr."},{"key":"2711_CR47","unstructured":"Kotel, S., Zeghid, M., Baganne, A., Saidani, T., Daradkeh, Y.I., Rached, T.: Fpga-based real-time implementation of aes algorithm for video encryption. Recent Adv. Telecommun Informatics Edu Technol 27\u201336 (2014)"},{"issue":"3","key":"2711_CR48","doi-asserted-by":"publisher","first-page":"332","DOI":"10.3390\/SYM12030332","volume":"12","author":"S Cheng","year":"2020","unstructured":"Cheng, S., Wang, L., Ao, N., Han, Q.: A Selective Video Encryption Scheme Based on Coding Characteristics. Symmetry 12(3), 332 (2020). https:\/\/doi.org\/10.3390\/SYM12030332","journal-title":"Symmetry"},{"issue":"2","key":"2711_CR49","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1049\/IET-IPR.2018.5250","volume":"14","author":"H Elkamchouchi","year":"2020","unstructured":"Elkamchouchi, H., Salama, W.M., Abouelseoud, Y.: New video encryption schemes based on chaotic maps. IET Image Process. 14(2), 397\u2013406 (2020). https:\/\/doi.org\/10.1049\/IET-IPR.2018.5250","journal-title":"IET Image Process."},{"key":"2711_CR50","doi-asserted-by":"publisher","DOI":"10.1007\/S11042-021-11668-4\/TABLES\/14","author":"A Hafsa","year":"2021","unstructured":"Hafsa, A., Fradi, M., Sghaier, A., Malek, J., Machhout, M.: Real-time video security system using chaos- improved advanced encryption standard (IAES). Multimed. Tools Appl. (2021). https:\/\/doi.org\/10.1007\/S11042-021-11668-4\/TABLES\/14","journal-title":"Multimed. Tools Appl."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-022-02711-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-022-02711-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-022-02711-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T12:05:31Z","timestamp":1699531531000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-022-02711-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,18]]},"references-count":50,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["2711"],"URL":"https:\/\/doi.org\/10.1007\/s00371-022-02711-y","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,18]]},"assertion":[{"value":"20 October 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}