{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T09:32:34Z","timestamp":1773567154054,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T00:00:00Z","timestamp":1561420800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T00:00:00Z","timestamp":1561420800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s00500-019-04151-8","type":"journal-article","created":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T16:25:18Z","timestamp":1561479918000},"page":"3829-3848","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7807-6855","authenticated-orcid":false,"given":"Mohammed","family":"Es-Sabry","sequence":"first","affiliation":[]},{"given":"Nabil","family":"El Akkad","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Merras","sequence":"additional","affiliation":[]},{"given":"Abderrahim","family":"Saaidi","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Satori","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,25]]},"reference":[{"key":"4151_CR1","doi-asserted-by":"publisher","DOI":"10.1063\/1.2959102","author":"D Arroyo","year":"2008","unstructured":"Arroyo D, Rhouma R, Alvarez G, Li S, Fernandez V (2008) On the security of a new image encryption scheme based on chaotic map lattices. Chaos Interdiscip J Nonlinear Sci. \nhttps:\/\/doi.org\/10.1063\/1.2959102","journal-title":"Chaos Interdiscip J Nonlinear Sci"},{"key":"4151_CR2","first-page":"525","volume":"52","author":"SE Borujeni","year":"2011","unstructured":"Borujeni SE, Eshghi M (2011) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. J Telecommun Syst 52:525\u2013537","journal-title":"J Telecommun Syst"},{"key":"4151_CR3","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-319-96292-4_7","volume":"872","author":"M Es-Sabry","year":"2018","unstructured":"Es-Sabry M, El Akkad N, Merras M, Saaidi A, Satori K (2018a) A novel text encryption algorithm based on the two-square Cipher and Caesar Cipher. Int Conf Big Data Cloud Appl 872:78\u201388","journal-title":"Int Conf Big Data Cloud Appl"},{"key":"4151_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/ISACV.2018.8354028","author":"M Es-Sabry","year":"2018","unstructured":"Es-Sabry M, El Akkad N, Merras M, Saaidi A, Satori K (2018b) Grayscale image encryption using shift bits operations. Int Conf Intell Syst Comput Vis. \nhttps:\/\/doi.org\/10.1109\/ISACV.2018.8354028","journal-title":"Int Conf Intell Syst Comput Vis"},{"key":"4151_CR5","unstructured":"Fridrich J (1997) Image encryption based on chaotic maps. In: 1997 IEEE international conference on systems, man, and cybernetics. Computational cybernetics and simulation, vol 2. pp 1105\u20131110"},{"key":"4151_CR6","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"ZY Hua","year":"2015","unstructured":"Hua ZY, Zhou YC, Pun CM, Philip Chen CL (2015) 2D Sine logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"key":"4151_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.optcom.2007.04.024","volume":"277","author":"DC Hwang","year":"2007","unstructured":"Hwang DC, Shin DH, Kim ES (2007) A novel three-dimensional digital watermarking scheme basing on integral imaging. Optics Commun 277:40\u201349","journal-title":"Optics Commun"},{"key":"4151_CR8","first-page":"467","volume":"99","author":"A Lesne","year":"2006","unstructured":"Lesne A (2006) Chaos in biology. Riv Biol 99:467\u2013481","journal-title":"Riv Biol"},{"key":"4151_CR9","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.1016\/j.imavis.2008.12.008","volume":"27","author":"C Li","year":"2009","unstructured":"Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27:1371\u20131381","journal-title":"Image Vis Comput"},{"key":"4151_CR10","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.1109\/78.757236","volume":"47","author":"C Ling","year":"1999","unstructured":"Ling C, Wu X, Sun S (1999) A general efficient method for chaotic signal estimation. IEEE Trans Signal Process 47:1424\u20131428","journal-title":"IEEE Trans Signal Process"},{"key":"4151_CR11","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1142\/S0217979210053707","volume":"24","author":"CX Liu","year":"2010","unstructured":"Liu CX, Lu JJ (2010) A novel fractional order hyperchaotic system and its circuit realization. Int J Mod Phys B 24:1299\u20131307","journal-title":"Int J Mod Phys B"},{"key":"4151_CR12","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11071-012-0432-0","volume":"70","author":"L Lu","year":"2012","unstructured":"Lu L, Luan L, Meng L, Li CR (2012) Study on spatiotemporal chaos tracking synchronization of a class of complex network. Nonlinear Dyn 70:89\u201395","journal-title":"Nonlinear Dyn"},{"key":"4151_CR13","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s00530-013-0314-4","volume":"20","author":"B Norouzi","year":"2013","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on hash function with only two-round diffusion process. Multimed Syst 20:45\u201364","journal-title":"Multimed Syst"},{"key":"4151_CR14","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1016\/j.optlaseng.2009.05.007","volume":"47","author":"YR Piao","year":"2009","unstructured":"Piao YR, Shin DH, Kim ES (2009) Robust image encryption by combined use of integral imaging and pixel scrambling techniques. Opt Lasers Eng 47:1273\u20131281","journal-title":"Opt Lasers Eng"},{"key":"4151_CR15","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.optlaseng.2007.09.001","volume":"46","author":"N Singh","year":"2008","unstructured":"Singh N, Sinha A (2008) Optical image encryption using fractional Fourier transform and chaos. Opt Lasers Eng 46:117\u2013123","journal-title":"Opt Lasers Eng"},{"key":"4151_CR16","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.physleta.2006.10.081","volume":"363","author":"A Skrobek","year":"2007","unstructured":"Skrobek A (2007) Cryptanalysis of chaotic stream cipher. Phys Lett A 363:84\u201390","journal-title":"Phys Lett A"},{"key":"4151_CR17","doi-asserted-by":"publisher","first-page":"2722","DOI":"10.1016\/j.optcom.2009.03.075","volume":"282","author":"X Tong","year":"2009","unstructured":"Tong X, Cui M, Wang Z (2009) A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator. J Opt Commun 282:2722\u20132728","journal-title":"J Opt Commun"},{"key":"4151_CR18","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1007\/s11071-015-1957-9","volume":"80","author":"XG Tong","year":"2015","unstructured":"Tong XG, Wang Z, Zhang M, Liu Y, Xu H, Ma J (2015) An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn 80:1493\u20131508","journal-title":"Nonlinear Dyn"},{"key":"4151_CR19","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1007\/s11071-014-1259-7","volume":"76","author":"XY Wang","year":"2014","unstructured":"Wang XY, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76:1943\u20131950","journal-title":"Nonlinear Dyn"},{"key":"4151_CR20","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.optcom.2005.11.006","volume":"260","author":"X Wang","year":"2006","unstructured":"Wang X, Zhao D, Chen L (2006) Image encryption based on extended fractional Fourier transform and digital holography technique. Opt Commun 260:449\u2013453","journal-title":"Opt Commun"},{"key":"4151_CR21","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1103\/RevModPhys.81.539","volume":"81","author":"HA Weidenmuller","year":"2009","unstructured":"Weidenmuller HA, Mitchell GE (2009) Random matrices and chaos in nuclear physics. Rev Mod Phys 81:539\u2013589","journal-title":"Rev Mod Phys"},{"key":"4151_CR22","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.chaos.2004.02.008","volume":"22","author":"X Wu","year":"2004","unstructured":"Wu X, Hu H, Zhang B (2004) Parameter estimation only from the symbolic sequences generated by chaos system. Chaos Solitons Fractals 22:359\u2013366","journal-title":"Chaos Solitons Fractals"},{"key":"4151_CR23","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1016\/j.chaos.2004.09.035","volume":"24","author":"L Zhang","year":"2005","unstructured":"Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos Solitons Fractals 24:759\u2013765","journal-title":"Chaos Solitons Fractals"},{"key":"4151_CR24","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. J Opt Commun 285:29\u201337","journal-title":"J Opt Commun"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04151-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-04151-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04151-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T23:20:12Z","timestamp":1592954412000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-04151-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,25]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["4151"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-04151-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,25]]},"assertion":[{"value":"25 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}