{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:35:05Z","timestamp":1759991705390,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T00:00:00Z","timestamp":1598400000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T00:00:00Z","timestamp":1598400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s00500-020-05258-z","type":"journal-article","created":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T20:02:46Z","timestamp":1598472166000},"page":"1847-1858","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Hybrid encryption algorithm (HEA) based on chaotic system"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2390-0151","authenticated-orcid":false,"given":"Mimoun","family":"Hamdi","sequence":"first","affiliation":[]},{"given":"Jamel","family":"Miri","sequence":"additional","affiliation":[]},{"given":"Borhane","family":"Moalla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,26]]},"reference":[{"issue":"7","key":"5258_CR200","doi-asserted-by":"publisher","first-page":"168781401878163","DOI":"10.1177\/1687814018781638","volume":"10","author":"P Agarwal","year":"2018","unstructured":"Agarwal P, Singh A, Kilicman A (2018) Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant. Adv Mech Eng 10(7):1687814018781638","journal-title":"Adv Mech Eng"},{"key":"5258_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sigpro.2018.11.010","volume":"157","author":"M Asgari-Chenaghlu","year":"2019","unstructured":"Asgari-Chenaghlu M, Balafar MA, Feizi-Derakhshi MR (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Sign Process 157:1\u201313","journal-title":"Sign Process"},{"key":"5258_CR2","first-page":"188","volume":"47","author":"A Broumandnia","year":"2019","unstructured":"Broumandnia A (2019) Designing digital image encryption using 2D and 3D reversible modular chaotic maps. J Inf Secur Appl 47:188\u2013198","journal-title":"J Inf Secur Appl"},{"key":"5258_CR3","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.chaos.2016.12.018","volume":"95","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu \u00dc, Ka\u00e7ar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-Box. Chaos Solitons Fractal 95:92\u2013101","journal-title":"Chaos Solitons Fractal"},{"key":"5258_CR4","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"key":"5258_CR5","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlastec.2017.09.008","volume":"99","author":"J Chen","year":"2018","unstructured":"Chen J, Zhang Y, Qi L, Fu C, Xu L (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99:238\u2013248","journal-title":"Opt Laser Technol"},{"issue":"2","key":"5258_CR6","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MCOM.2017.1600522CM","volume":"55","author":"C Cheng","year":"2017","unstructured":"Cheng C, Lu R, Petzoldt A, Takagi T (2017) Securing the Internet of Things in a quantum world. IEEE Commun Mag 55(2):116\u2013120","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"5258_CR7","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/0370-1573(79)90023-1","volume":"52","author":"BV Chirikov","year":"1979","unstructured":"Chirikov BV (1979) A universal instability of many-dimensional oscillator systems. Phys Rep 52(5):263\u2013379","journal-title":"Phys Rep"},{"key":"5258_CR8","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.chaos.2018.11.019","volume":"118","author":"RA Elmanfaloty","year":"2019","unstructured":"Elmanfaloty RA, Abou-Bakr E (2019) Random property enhancement of a 1D chaotic PRNG with finite precision implementation. Chaos Solitons Fractal 118:134\u2013144","journal-title":"Chaos Solitons Fractal"},{"issue":"2","key":"5258_CR9","doi-asserted-by":"publisher","first-page":"1650021","DOI":"10.1142\/S0218127416500218","volume":"26","author":"M Farajallah","year":"2016","unstructured":"Farajallah M, El Assad S, Deforges O (2016) Fast and secure chaos-based cryptosystem for images. Int J Bifurc Chaos 26(2):1650021","journal-title":"Int J Bifurc Chaos"},{"issue":"2","key":"5258_CR10","doi-asserted-by":"publisher","first-page":"181","DOI":"10.15388\/Informatica.2013.391","volume":"24","author":"M Francois","year":"2013","unstructured":"Francois M, Grosges T, Barchiesi D, Erra R (2013) A new pseudo-random number generator based on two chaotic maps. Informatica 24(2):181\u2013197","journal-title":"Informatica"},{"issue":"6","key":"5258_CR11","doi-asserted-by":"publisher","first-page":"7305","DOI":"10.1007\/s11042-017-4634-9","volume":"77","author":"M Ghebleh","year":"2018","unstructured":"Ghebleh M, Kanso A, Stevanovi\u0107 D (2018) A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation. Multimed Tools Appl 77(6):7305\u20137326","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"5258_CR12","doi-asserted-by":"publisher","first-page":"7105","DOI":"10.1007\/s11042-016-3377-3","volume":"76","author":"M Hamdi","year":"2016","unstructured":"Hamdi M, Rhouma R, Belghith S (2016) An appropriate system for securing real-time voice communication based on ADPCM coding and chaotic maps. Multimed Tools Appl 76(5):7105\u20137128","journal-title":"Multimed Tools Appl"},{"key":"5258_CR13","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.sigpro.2016.09.011","volume":"131","author":"M Hamdi","year":"2017","unstructured":"Hamdi M, Rhouma R, Belghith S (2017) A selective compression-encryption of images based on SPIHT coding and Chirikov Standard Map. Sign Process 131:514\u2013526","journal-title":"Sign Process"},{"key":"5258_CR14","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018a) 2D Logistic-Sine-coupling map for image encryption. Sign Process 149:148\u2013161","journal-title":"Sign Process"},{"key":"5258_CR15","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua Z, Yi S, Zhou Y (2018b) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Sign Process 144:134\u2013144","journal-title":"Sign Process"},{"key":"5258_CR16","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"issue":"16","key":"5258_CR17","doi-asserted-by":"publisher","first-page":"7045","DOI":"10.1007\/s00500-018-3345-0","volume":"23","author":"H Huang","year":"2019","unstructured":"Huang H, Yang S, Ye R (2019a) Image encryption scheme combining a modified Gerchberg\u2013Saxton algorithm with hyper-chaotic system. Soft Comput 23(16):7045\u20137053","journal-title":"Soft Comput"},{"key":"5258_CR18","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.optlaseng.2018.11.015","volume":"115","author":"L Huang","year":"2019","unstructured":"Huang L, Cai S, Xiong X, Xiao M (2019b) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt Lasers Eng 115:7\u201320","journal-title":"Opt Lasers Eng"},{"key":"5258_CR19","doi-asserted-by":"publisher","unstructured":"IEEE Standard (754-2008) for Floating-Point Arithmetic (2008) IEEE Computer Society. https:\/\/doi.org\/10.1109\/ieeestd2008.4610935","DOI":"10.1109\/ieeestd2008.4610935"},{"issue":"2","key":"5258_CR20","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/81.904880","volume":"48","author":"G Jakimoski","year":"2001","unstructured":"Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circuits Syst I Fundam Theory Appl 48(2):163\u2013169","journal-title":"IEEE Trans Circuits Syst I Fundam Theory Appl"},{"issue":"2","key":"5258_CR21","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","volume":"30","author":"JS Khan","year":"2019","unstructured":"Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidimens Syst Signal Process 30(2):943\u2013961","journal-title":"Multidimens Syst Signal Process"},{"key":"5258_CR22","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/81.974872","volume":"I49","author":"N Masuda","year":"2002","unstructured":"Masuda N, Aihara K (2002) Cryptosystems with discretized chaotic maps. IEEE Trans Circuits Syst I49:28\u201340","journal-title":"IEEE Trans Circuits Syst"},{"issue":"9","key":"5258_CR23","first-page":"548","volume":"5","author":"Q Nasir","year":"2012","unstructured":"Nasir Q, Abdlrudha HH (2012) High security nested PWLCM chaotic map bit-level permutation based image encryption. Int J Commun Netw Syst Sci 5(9):548\u2013556","journal-title":"Int J Commun Netw Syst Sci"},{"issue":"4","key":"5258_CR25","first-page":"441","volume":"33","author":"V Patidar","year":"2009","unstructured":"Patidar V, Sud KK, Pareek NK (2009) A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica 33(4):441\u2013452","journal-title":"Informatica"},{"issue":"4","key":"5258_CR26","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Technol J 28(4):656\u2013715","journal-title":"Bell Syst Technol J"},{"key":"5258_CR27","doi-asserted-by":"crossref","unstructured":"Singh A, Agarwal P, Chand M (2019) Image encryption and analysis using dynamic AES. In: IEEE 5th international conference on optimization and applications (ICOA), pp 1\u20136","DOI":"10.1109\/ICOA.2019.8727711"},{"key":"5258_CR28","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198508397.001.0001","volume-title":"Chaos and time-series analysis","author":"JC Sprott","year":"2003","unstructured":"Sprott JC (2003) Chaos and time-series analysis, vol 69. Oxford University Press, Oxford"},{"issue":"6","key":"5258_CR29","doi-asserted-by":"publisher","first-page":"6883","DOI":"10.1007\/s11042-017-4605-1","volume":"77","author":"L Teng","year":"2018","unstructured":"Teng L, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit-level permutation. Multimed Tools Appl 77(6):6883\u20136896","journal-title":"Multimed Tools Appl"},{"key":"5258_CR30","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/j.ins.2012.09.037","volume":"221","author":"X Wang","year":"2013","unstructured":"Wang X, Zhang W, Guo W, Zhang J (2013) Secure chaotic system with application to chaotic ciphers. Inf Sci 221:555\u2013570","journal-title":"Inf Sci"},{"key":"5258_CR31","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"key":"5258_CR32","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41\u201352","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"5258_CR33","doi-asserted-by":"publisher","first-page":"1850010","DOI":"10.1142\/S0218127418500104","volume":"28","author":"G Ye","year":"2018","unstructured":"Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurc Chaos 28(1):1850010","journal-title":"Int J Bifurc Chaos"},{"key":"5258_CR34","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-Box. Inf Sci 450:361\u2013377","journal-title":"Inf Sci"},{"issue":"6","key":"5258_CR35","doi-asserted-by":"publisher","first-page":"6647","DOI":"10.1007\/s11042-017-4577-1","volume":"77","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77(6):6647\u20136669","journal-title":"Multimed Tools Appl"},{"issue":"02","key":"5258_CR36","doi-asserted-by":"publisher","first-page":"1850020","DOI":"10.1142\/S0218127418500207","volume":"28","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Wang X, Liu L, Liu J (2018) Fractional order spatiotemporal chaos with delay in spatial nonlinear coupling. Int J Bifurc Chaos 28(02):1850020","journal-title":"Int J Bifurc Chaos"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-020-05258-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-020-05258-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-020-05258-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T16:17:44Z","timestamp":1723479464000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-020-05258-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,26]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["5258"],"URL":"https:\/\/doi.org\/10.1007\/s00500-020-05258-z","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2020,8,26]]},"assertion":[{"value":"26 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}