{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T20:45:56Z","timestamp":1775681156545,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFB1800901"],"award-info":[{"award-number":["2018YFB1800901"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFB1800905"],"award-info":[{"award-number":["2018YFB1800905"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62075097"],"award-info":[{"award-number":["62075097"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62075038"],"award-info":[{"award-number":["62075038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61975084"],"award-info":[{"award-number":["61975084"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61935005"],"award-info":[{"award-number":["61935005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61835005"],"award-info":[{"award-number":["61835005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61822507"],"award-info":[{"award-number":["61822507"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62005125"],"award-info":[{"award-number":["62005125"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61775098"],"award-info":[{"award-number":["61775098"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61875248"],"award-info":[{"award-number":["61875248"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61727817"],"award-info":[{"award-number":["61727817"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2001601"],"award-info":[{"award-number":["U2001601"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62035018"],"award-info":[{"award-number":["62035018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61720106015"],"award-info":[{"award-number":["61720106015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61935011"],"award-info":[{"award-number":["61935011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s00371-023-03128-x","type":"journal-article","created":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T07:02:48Z","timestamp":1697785368000},"page":"5659-5679","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Satellite image encryption based on RNA and 7D complex chaotic system"],"prefix":"10.1007","volume":"40","author":[{"given":"Lijiang","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2736-118X","authenticated-orcid":false,"given":"Lilong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Fenping","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Tingting","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,20]]},"reference":[{"key":"3128_CR1","doi-asserted-by":"publisher","DOI":"10.3390\/sym12020189","author":"CH Yang","year":"2020","unstructured":"Yang, C.H., Chien, Y.S.: FPGA implementation and design of a hybrid chaos-aes color image encryption algorithm. Symmetry-Basel (2020). https:\/\/doi.org\/10.3390\/sym12020189","journal-title":"Symmetry-Basel"},{"key":"3128_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s10470-021-01959-z","author":"M Nabil","year":"2020","unstructured":"Nabil, M., Khalaf, M.A.A., Hassan, M.S.: Design and implementation of pipelined AES encryption system using FPGA. Int. J. Recent Technol. Eng. (2020). https:\/\/doi.org\/10.1007\/s10470-021-01959-z","journal-title":"Int. J. Recent Technol. Eng."},{"key":"3128_CR3","doi-asserted-by":"publisher","unstructured":"Ayg\u00fcn, E.: AES encryption and a cryptosystem obtained with soft set II. Cumhuriyet Sci. J. (2019). https:\/\/doi.org\/10.17776\/csj.416395","DOI":"10.17776\/csj.416395"},{"issue":"4","key":"3128_CR4","doi-asserted-by":"publisher","first-page":"5085","DOI":"10.3233\/JIFS-179994","volume":"39","author":"YH Wu","year":"2020","unstructured":"Wu, Y.H., Dai, X.Q.: Encryption of accounting data using DES algorithm in computing environment. J. Intell. Fuzzy. Syst. 39(4), 5085\u20135095 (2020). https:\/\/doi.org\/10.3233\/JIFS-179994","journal-title":"J. Intell. Fuzzy. Syst."},{"key":"3128_CR5","doi-asserted-by":"publisher","unstructured":"Daehak, K.: On the development of DES encryption based on Excel Macro. J. Korean Data Inf. Sci. Soc. (2014). https:\/\/doi.org\/10.7465\/jkdi.2014.25.6.1419","DOI":"10.7465\/jkdi.2014.25.6.1419"},{"key":"3128_CR6","doi-asserted-by":"publisher","unstructured":"Du, S.M., Ye, G.D.: IWT and RSA based asymmetric image encryption algorithm. Alex. Eng. J. (2023). https:\/\/doi.org\/10.1016\/J.AEJ.2022.10.066","DOI":"10.1016\/J.AEJ.2022.10.066"},{"key":"3128_CR7","doi-asserted-by":"publisher","unstructured":"Zhang, S.: A brief introduction to RSA encryption. Adv. Comput. Signals Syst. (2021). https:\/\/doi.org\/10.23977\/ACSS.2021.050115","DOI":"10.23977\/ACSS.2021.050115"},{"key":"3128_CR8","doi-asserted-by":"publisher","unstructured":"Fang, P.F., Liu, H., Wu, C.M., Liu, M.: A survey of image encryption algorithms based on chaotic system.\u00a0Vis Comput. 39(5), (2022). https:\/\/doi.org\/10.1007\/S00371-022-02459-5","DOI":"10.1007\/S00371-022-02459-5"},{"key":"3128_CR9","doi-asserted-by":"publisher","unstructured":"Xu, J., Mou, J., Liu, J., Hao, J.: The image compression-encryption algorithm based on the compression sensing and fractional-order chaotic system. Vis Comput. 38(5), (2021). https:\/\/doi.org\/10.1007\/S00371-021-02085-7","DOI":"10.1007\/S00371-021-02085-7"},{"key":"3128_CR10","doi-asserted-by":"publisher","unstructured":"Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos. 8(6), 1259\u20131284 (1998). https:\/\/doi.org\/10.1142\/S021812749800098","DOI":"10.1142\/S021812749800098"},{"key":"3128_CR11","doi-asserted-by":"publisher","unstructured":"Bensikaddour, E., Bentoutou, Y., Taleb, N.: Embedded implementation of multispectral satellite image encryption using a chaos-based block cipher. J. King Saud Univ. Sci. 32(1), 50\u201356 (2020). https:\/\/doi.org\/10.1016\/j.jksuci.2018.05.002.","DOI":"10.1016\/j.jksuci.2018.05.002"},{"key":"3128_CR12","doi-asserted-by":"publisher","unstructured":"Murali, P., Niranjana, G., Paul, A.J., Muthu, J.S.: Domain-flexible selective image encryption based on genetic operations and chaotic maps. Vis Comput. 39(3), (2022). https:\/\/doi.org\/10.1007\/S00371-021-02384-Z","DOI":"10.1007\/S00371-021-02384-Z"},{"key":"3128_CR13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S Lian","year":"2005","unstructured":"Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals 26, 117\u2013129 (2005). https:\/\/doi.org\/10.1016\/j.chaos.2004.11.096","journal-title":"Chaos Solitons Fractals"},{"issue":"2","key":"3128_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s00500-023-08747-z","volume":"10","author":"M Madani","year":"2017","unstructured":"Madani, M., Bentoutou, Y., Taleb, N.: An improved image encryption algorithm based on cyclic rotations and multiple chaotic sequences: application to satellite images. J. Electr. Electron. Eng. 10(2), 29\u201334 (2017). https:\/\/doi.org\/10.1007\/s00500-023-08747-z","journal-title":"J. Electr. Electron. Eng."},{"key":"3128_CR15","doi-asserted-by":"publisher","unstructured":"Gopalakrishnan, T., Ramakrishnan, S.: Image encryption using hyper-chaotic map for permutation and diffusion by multiple hyper-chaotic maps. Wirel. Pers. Commun. 109, 437\u2013454 (2019). https:\/\/doi.org\/10.1007\/s11277-019-06573-x","DOI":"10.1007\/s11277-019-06573-x"},{"issue":"3","key":"3128_CR16","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1080\/19393555.2021.1982082","volume":"32","author":"M Naim","year":"2023","unstructured":"Naim, M., Ali Pacha, A.: New chaotic satellite image encryption by using some or all the rounds of the AES algorithm. Inf. Secur. J. Glob. Perspect. 32(3), 187\u2013211 (2023). https:\/\/doi.org\/10.1080\/19393555.2021.1982082","journal-title":"Inf. Secur. J. Glob. Perspect."},{"key":"3128_CR17","doi-asserted-by":"publisher","unstructured":"Yang, Q., Zhu, D., Yang, L.: A new 7D hyperchaotic system with five positive lyapunov exponents coined. Int. J. Bifurc. Chaos 28(5), 1850057. https:\/\/doi.org\/10.1142\/S0218127418500578","DOI":"10.1142\/S0218127418500578"},{"key":"3128_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05346-5","author":"M Naim","year":"2023","unstructured":"Naim, M., Ali Pacha, A.: A new chaotic satellite image encryption algorithm based on a 2D filter and Fisher\u2013Yates shuffling. J. Supercomput. (2023). https:\/\/doi.org\/10.1007\/s11227-023-05346-5","journal-title":"J. Supercomput."},{"key":"3128_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-022-02736-3","author":"MA Tahiri","year":"2022","unstructured":"Tahiri, M.A., Karmouni, H., Bencherqui, A., et al.: New color image encryption using hybrid optimization algorithm and Krawtchouk fractional transformations. Vis. Comput. (2022). https:\/\/doi.org\/10.1007\/s00371-022-02736-3","journal-title":"Vis. Comput."},{"key":"3128_CR20","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/s00371-021-02382-1","volume":"39","author":"KM Hosny","year":"2023","unstructured":"Hosny, K.M., Kamal, S.T., Darwish, M.M.: A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Vis. Comput. 39, 1027\u20131044 (2023). https:\/\/doi.org\/10.1007\/s00371-021-02382-1","journal-title":"Vis. Comput."},{"issue":"5187","key":"3128_CR21","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"LM Adleman","year":"1994","unstructured":"Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Science 266(5187), 1021\u20131024 (1994). https:\/\/doi.org\/10.1126\/science.7973651","journal-title":"Science"},{"key":"3128_CR22","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir, A., Hamdullaa, A., Guo, W.-Q.: Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125, 1671\u20131675 (2014). https:\/\/doi.org\/10.1016\/j.ijleo.2013.09.040","journal-title":"Optik"},{"key":"3128_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/917147","volume":"2014","author":"J Zhang","year":"2014","unstructured":"Zhang, J., Fang, D., Ren, H.: Image encryption algorithm based on DNA encoding and chaotic maps. Math. Probl. Eng. 2014, 1\u201310 (2014). https:\/\/doi.org\/10.1155\/2014\/917147","journal-title":"Math. Probl. Eng."},{"key":"3128_CR24","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s00371-021-02311-2","volume":"39","author":"X Wang","year":"2023","unstructured":"Wang, X., Su, Y., Liu, L., Zhang, H., Di, S.: Color image encryption algorithm based on Fisher\u2013Yates scrambling and DNA subsequence operation. Vis. Comput. 39, 43\u201358 (2023). https:\/\/doi.org\/10.1007\/s00371-021-02311-2","journal-title":"Vis. Comput."},{"key":"3128_CR25","doi-asserted-by":"publisher","first-page":"23337","DOI":"10.1007\/s11042-020-10209-9","volume":"80","author":"X Wang","year":"2021","unstructured":"Wang, X., Liu, L.: Application of chaotic Josephus scrambling and RNA computing in image encryption. Multimedia Tools Appl. 80, 23337\u201323358 (2021). https:\/\/doi.org\/10.1007\/s11042-020-10209-9","journal-title":"Multimedia Tools Appl."},{"key":"3128_CR26","doi-asserted-by":"publisher","first-page":"8660","DOI":"10.1109\/ACCESS.2018.2890116","volume":"7","author":"Z Hua","year":"2019","unstructured":"Hua, Z., Xu, B., Jin, F., Huang, H.: Image encryption using josephus problem and filtering diffusion. IEEE Access 7, 8660\u20138674 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2018.2890116","journal-title":"IEEE Access"},{"key":"3128_CR27","doi-asserted-by":"publisher","first-page":"361","DOI":"10.3390\/ijms24010361","volume":"24","author":"K Sakamoto","year":"2023","unstructured":"Sakamoto, K.: Genetic code expansion: another solution to codon assignments. Int. J. Mol. Sci. 24, 361 (2023). https:\/\/doi.org\/10.3390\/ijms24010361","journal-title":"Int. J. Mol. Sci."},{"key":"3128_CR28","doi-asserted-by":"publisher","first-page":"2859","DOI":"10.1007\/s11071-020-05601-x","volume":"100","author":"X Ma","year":"2020","unstructured":"Ma, X., Mou, J., Liu, J., Ma, C., Yang, F., Zhao, X.: A novel simple chaotic circuit based on memristor\u2013memcapacitor. Nonlinear Dyn. 100, 2859\u20132876 (2020). https:\/\/doi.org\/10.1007\/s11071-020-05601-x","journal-title":"Nonlinear Dyn."},{"key":"3128_CR29","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2022.844966","volume":"10","author":"R Chu","year":"2022","unstructured":"Chu, R., Zhang, S., Gao, X.: A novel 3D image encryption based on the chaotic system and RNA crossover and mutation. Front. Phys. 10, 844966 (2022). https:\/\/doi.org\/10.3389\/fphy.2022.844966","journal-title":"Front. Phys."},{"key":"3128_CR30","doi-asserted-by":"publisher","first-page":"27089","DOI":"10.1007\/s11042-021-11460-4","volume":"81","author":"RR Suman","year":"2022","unstructured":"Suman, R.R., Mondal, B., Mandal, T.: A secure encryption scheme using a Composite Logistic Sine Map (CLSM) and SHA-256. Multimedia Tools Appl. 81, 27089\u201327110 (2022). https:\/\/doi.org\/10.1007\/s11042-021-11460-4","journal-title":"Multimedia Tools Appl."},{"key":"3128_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169357","volume":"263","author":"Y Lu","year":"2022","unstructured":"Lu, Y., Gong, M., Huang, Z., Zhang, J., Chai, X., Zhou, C.: Exploiting compressed sensing (CS) and RNA operations for effective content-adaptive image compression and encryption. Optik 263, 169357 (2022). https:\/\/doi.org\/10.1016\/j.ijleo.2022.169357","journal-title":"Optik"},{"key":"3128_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2020.106366","author":"M Sun","year":"2023","unstructured":"Sun, M., Cui, W., Tao, Y., Shi, T.: Chaotic color image encryption algorithm based on RNA operations and heart shape chunking. IAENG Int. J. Comput. Sci. (2023). https:\/\/doi.org\/10.1016\/j.optlastec.2020.106366","journal-title":"IAENG Int. J. Comput. Sci."},{"key":"3128_CR33","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1007\/s11071-020-06164-7","volume":"103","author":"PK Naskar","year":"2021","unstructured":"Naskar, P.K., Bhattacharyya, S., Chaudhuri, A.: An audio encryption based on distinct key blocks along with PWLCM and ECA. Nonlinear Dyn. 103, 2019\u20132042 (2021). https:\/\/doi.org\/10.1007\/s11071-020-06164-7","journal-title":"Nonlinear Dyn."},{"key":"3128_CR34","doi-asserted-by":"publisher","DOI":"10.3389\/fenrg.2022.980863","volume":"10","author":"L Kou","year":"2022","unstructured":"Kou, L., Huang, Z., Jiang, C., Zhang, F., Ke, W., Wan, J., Liu, H., Li, H., Lu, J.: Data encryption based on 7D complex chaotic system with cubic memristor for smart grid. Front. Energy Res. 10, 980863 (2022). https:\/\/doi.org\/10.3389\/fenrg.2022.980863","journal-title":"Front. Energy Res."},{"key":"3128_CR35","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","volume":"16","author":"A Wolf","year":"1985","unstructured":"Wolf, A., Swift, J.B., Swinney, H.L., Vastano, J.A.: Determining Lyapunov exponents from a time series. Physica D 16, 285\u2013317 (1985). https:\/\/doi.org\/10.1016\/0167-2789(85)90011-9","journal-title":"Physica D"},{"issue":"3","key":"3128_CR36","doi-asserted-by":"publisher","first-page":"287","DOI":"10.3390\/e21030287","volume":"21","author":"L Liu","year":"2019","unstructured":"Liu, L., Du, C., Zhang, X., Li, J., Shi, S.: Dynamics and entropy analysis for a new 4-D hyperchaotic system with coexisting hidden attractors. Entropy 21(3), 287 (2019). https:\/\/doi.org\/10.3390\/e21030287","journal-title":"Entropy"},{"key":"3128_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15677-3","author":"M Tahbaz","year":"2023","unstructured":"Tahbaz, M., Shirgahi, H., Yamaghani, M.R.: Evolutionary-based image encryption using Magic Square Chaotic algorithm and RNA codons truth table. Multimedia Tools Appl. (2023). https:\/\/doi.org\/10.1007\/s11042-023-15677-3","journal-title":"Multimedia Tools Appl."},{"key":"3128_CR38","doi-asserted-by":"publisher","first-page":"1408","DOI":"10.1126\/science.aad8711","volume":"352","author":"WV Gilbert","year":"2016","unstructured":"Gilbert, W.V., Bell, T.A., Schaening, C.: Messenger RNA modifications: form, distribution, and function. Science 352, 1408\u20131412 (2016). https:\/\/doi.org\/10.1126\/science.aad8711","journal-title":"Science"},{"issue":"27","key":"3128_CR39","doi-asserted-by":"publisher","first-page":"28603","DOI":"10.1364\/OE.20.028603","volume":"20","author":"RM Nguimdo","year":"2012","unstructured":"Nguimdo, R.M., Verschaffelt, G., Danckaert, J., Leijtens, X., Bolk, J., Van der Sande, G.: Fast random bits generation based on a single chaotic semiconductor ring laser. Opt. Express 20(27), 28603 (2012). https:\/\/doi.org\/10.1364\/OE.20.028603","journal-title":"Opt. Express"},{"key":"3128_CR40","doi-asserted-by":"publisher","first-page":"27785","DOI":"10.1007\/s11042-021-10970-5","volume":"80","author":"A Kumar","year":"2021","unstructured":"Kumar, A., Dua, M.: Novel pseudo random key & cosine transformed chaotic maps based satellite image encryption. Multimedia Tools Appl. 80, 27785\u201327805 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10970-5","journal-title":"Multimedia Tools Appl."},{"key":"3128_CR41","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237\u2013253 (2016). https:\/\/doi.org\/10.1016\/j.ins.2016.01.017","journal-title":"Inf. Sci."},{"key":"3128_CR42","doi-asserted-by":"publisher","first-page":"231","DOI":"10.3390\/math11010231","volume":"11","author":"S Zhu","year":"2023","unstructured":"Zhu, S., Deng, X., Zhang, W., Zhu, C.: Image encryption scheme based on new designed chaotic map and parallel DNA coding. Mathematics 11, 231 (2023). https:\/\/doi.org\/10.3390\/math11010231","journal-title":"Mathematics"},{"key":"3128_CR43","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.ins.2020.07.058","volume":"547","author":"Y Zhang","year":"2023","unstructured":"Zhang, Y.: A new unified image encryption algorithm based on a lifting transformation and chaos. Inf. Sci. 547, 307\u2013327 (2023). https:\/\/doi.org\/10.1016\/j.ins.2020.07.058","journal-title":"Inf. Sci."},{"key":"3128_CR44","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1007\/s40998-022-00503-7","volume":"46","author":"M Adeel","year":"2022","unstructured":"Adeel, M., Song, Y.: Secure encryption of color images with chaotic systems and particle swarm optimization. Iran J. Sci. Technol. Trans. Electr. Eng. 46, 847\u2013872 (2022). https:\/\/doi.org\/10.1007\/s40998-022-00503-7","journal-title":"Iran J. Sci. Technol. Trans. Electr. Eng."},{"key":"3128_CR45","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s11042-021-11384-z","volume":"81","author":"KM Hosny","year":"2022","unstructured":"Hosny, K.M., Kamal, S.T., Darwish, M.M.: A color image encryption technique using block scrambling and chaos. Multimedia Tools Appl. 81, 505\u2013525 (2022). https:\/\/doi.org\/10.1007\/s11042-021-11384-z","journal-title":"Multimedia Tools Appl."},{"key":"3128_CR46","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1007\/s12652-021-03675-y","volume":"13","author":"KM Hosny","year":"2022","unstructured":"Hosny, K.M., Kamal, S.T., Darwish, M.M.: Novel encryption for color images using fractional-order hyperchaotic system. J. Ambient Intell. Hum. Comput. 13, 973\u2013988 (2022). https:\/\/doi.org\/10.1007\/s12652-021-03675-y","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"3128_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115670","volume":"80","author":"X Kang","year":"2020","unstructured":"Kang, X., Gao, Z.: A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system. Signal Process. Image Commun. 80, 115670 (2020). https:\/\/doi.org\/10.1016\/j.image.2019.115670","journal-title":"Signal Process. Image Commun."},{"issue":"7","key":"3128_CR48","doi-asserted-by":"publisher","first-page":"2077","DOI":"10.1016\/j.asr.2021.01.018","volume":"67","author":"M Naim","year":"2021","unstructured":"Naim, M., Ali Pacha, A., Serief, C.: A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus problem. Adv. Space Res. 67(7), 2077\u20132103 (2021). https:\/\/doi.org\/10.1016\/j.asr.2021.01.018","journal-title":"Adv. Space Res."},{"key":"3128_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107753","volume":"148","author":"S Wang","year":"2021","unstructured":"Wang, S., Peng, Q., Du, B.: Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Opt. Laser Technol. 148, 107753 (2021). https:\/\/doi.org\/10.1016\/j.optlastec.2021.107753","journal-title":"Opt. Laser Technol."},{"key":"3128_CR50","doi-asserted-by":"publisher","first-page":"13841","DOI":"10.1007\/s11042-020-10437-z","volume":"80","author":"Q Zhang","year":"2021","unstructured":"Zhang, Q., Han, J.: A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding. Multimedia Tools Appl. 80, 13841\u201313864 (2021). https:\/\/doi.org\/10.1007\/s11042-020-10437-z","journal-title":"Multimedia Tools Appl."},{"key":"3128_CR51","doi-asserted-by":"publisher","first-page":"013021","DOI":"10.1117\/1.JEI.26.1.013021","volume":"26","author":"K Zhan","year":"2017","unstructured":"Zhan, K., Wei, D., Shi, J., Yu, J.: Cross-utilizing hyperchaotic and DNA sequences for image encryption. J. Electron. Imag. 26, 013021\u2013013021 (2017). https:\/\/doi.org\/10.1117\/1.JEI.26.1.013021","journal-title":"J. Electron. Imag."},{"key":"3128_CR52","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.3390\/sym13122317","volume":"13","author":"Q Lu","year":"2021","unstructured":"Lu, Q., Yu, L., Zhu, C.: A new conservative hyperchaotic system-based image symmetric encryption scheme with DNA coding. Symmetry 13, 2317 (2021). https:\/\/doi.org\/10.3390\/sym13122317","journal-title":"Symmetry"},{"key":"3128_CR53","doi-asserted-by":"publisher","first-page":"10949","DOI":"10.1007\/s11042-020-10218-8","volume":"80","author":"X Yan","year":"2021","unstructured":"Yan, X., Wang, X., Xian, Y.: Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimedia Tools Appl. 80, 10949\u201310983 (2021). https:\/\/doi.org\/10.1007\/s11042-020-10218-8","journal-title":"Multimedia Tools Appl."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-023-03128-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-023-03128-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-023-03128-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T13:30:43Z","timestamp":1721827843000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-023-03128-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":53,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3128"],"URL":"https:\/\/doi.org\/10.1007\/s00371-023-03128-x","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,20]]},"assertion":[{"value":"26 September 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}