{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T16:30:39Z","timestamp":1767976239300,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T00:00:00Z","timestamp":1641859200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T00:00:00Z","timestamp":1641859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s00500-021-06567-7","type":"journal-article","created":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T00:03:06Z","timestamp":1641859386000},"page":"5823-5832","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Image encryption algorithm based on genetic operations and chaotic DNA encoding"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3533-7960","authenticated-orcid":false,"given":"Younes","family":"Qobbi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdeltif","family":"Jarjar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed","family":"Essaid","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdelhamid","family":"Benazzi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,1,11]]},"reference":[{"key":"6567_CR2","unstructured":"Boubaker O, Jafary S (2019) Recent advances in chaotic systems and synchronization"},{"key":"6567_CR3","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","volume":"90","author":"R Enayatifar","year":"2017","unstructured":"Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146\u2013154","journal-title":"Opt Lasers Eng"},{"key":"6567_CR4","doi-asserted-by":"crossref","unstructured":"Farah MB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn, 1\u201324","DOI":"10.1007\/s11071-019-05413-8"},{"issue":"06","key":"6567_CR5","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(06):1259\u20131284","journal-title":"Int J Bifurcation Chaos"},{"issue":"3","key":"6567_CR6","first-page":"1","volume":"10","author":"XQ Fu","year":"2018","unstructured":"Fu XQ, Liu BC, Xie YY, Li W, Liu Y (2018) Image encryption-then-transmission using DNA encryption algorithm and the double chaos. IEEE Photonics J 10(3):1\u201315","journal-title":"IEEE Photonics J"},{"issue":"11","key":"6567_CR7","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"ZH Gan","year":"2019","unstructured":"Gan ZH, Chai XL, Han DJ, Chen YR (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput Appl 31(11):7111\u20137130","journal-title":"Neural Comput Appl"},{"issue":"37","key":"6567_CR8","doi-asserted-by":"publisher","first-page":"26927","DOI":"10.1007\/s11042-020-09058-3","volume":"79","author":"M Ghazvini","year":"2020","unstructured":"Ghazvini M, Mirzadi M, Parvar N (2020) A modified method for image encryption based on chaotic map and genetic algorithm. Multimedia Tools Appl 79(37):26927\u201326950","journal-title":"Multimedia Tools Appl"},{"key":"6567_CR1","unstructured":"http:\/\/sipi.usc.edu\/database\/database.php?volume=misc"},{"key":"6567_CR9","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018) 2D Logistic-Sine-coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"key":"6567_CR10","first-page":"102428","volume":"50","author":"KC Jithin","year":"2020","unstructured":"Jithin KC, Sankar S (2020) Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set. J Inf Security Appl 50:102428","journal-title":"J Inf Security Appl"},{"issue":"2","key":"6567_CR11","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","volume":"30","author":"JS Khan","year":"2019","unstructured":"Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidimension Syst Signal Process 30(2):943\u2013961","journal-title":"Multidimension Syst Signal Process"},{"issue":"1","key":"6567_CR12","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2017","unstructured":"Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127\u2013133","journal-title":"Nonlinear Dyn"},{"issue":"10","key":"6567_CR13","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320\u20133327","journal-title":"Comput Math Appl"},{"issue":"5","key":"6567_CR14","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240\u20131248","journal-title":"Comput Electr Eng"},{"key":"6567_CR15","doi-asserted-by":"publisher","first-page":"105818","DOI":"10.1016\/j.optlastec.2019.105818","volume":"121","author":"M Mahmud","year":"2020","unstructured":"Mahmud M, Lee M, Choi JY (2020) Evolutionary-based image encryption using RNA codons truth table. Optics Laser Technol 121:105818","journal-title":"Optics Laser Technol"},{"issue":"2","key":"6567_CR16","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/e22020158","volume":"22","author":"HG Mohamed","year":"2020","unstructured":"Mohamed HG, ElKamchouchi DH, Moussa KH (2020) A novel color image encryption algorithm based on hyperchaotic maps and mitochondrial DNA sequences. Entropy 22(2):158","journal-title":"Entropy"},{"issue":"35","key":"6567_CR17","doi-asserted-by":"publisher","first-page":"25613","DOI":"10.1007\/s11042-020-09237-2","volume":"79","author":"Y Niu","year":"2020","unstructured":"Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations. Multimedia Tools Appl 79(35):25613\u201325633","journal-title":"Multimedia Tools Appl"},{"key":"6567_CR18","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225\u2013237","journal-title":"Opt Lasers Eng"},{"issue":"35","key":"6567_CR19","doi-asserted-by":"publisher","first-page":"25635","DOI":"10.1007\/s11042-020-09233-6","volume":"79","author":"S Noshadian","year":"2020","unstructured":"Noshadian S, Ebrahimzade A, Kazemitabar SJ (2020) Breaking a chaotic image encryption algorithm. Multimedia Tools Appl 79(35):25635\u201325655","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"6567_CR29","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1007\/s11071-014-1517-8","volume":"78","author":"F \u00d6zkaynak","year":"2014","unstructured":"\u00d6zkaynak F, Yavuz S (2014) Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn 78(2):1311\u20131320","journal-title":"Nonlinear Dyn"},{"key":"6567_CR20","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.optlastec.2017.10.024","volume":"101","author":"R Parvaz","year":"2018","unstructured":"Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101:30\u201341","journal-title":"Opt Laser Technol"},{"key":"6567_CR21","unstructured":"Schaefer G, Stich M (2004) UCID\u2014an uncompressed color image database. In: storage and retrieval methods and applications for multimedia 2004, Proceedings of SPIE, 5307; pp. 472\u201380"},{"key":"6567_CR22","doi-asserted-by":"crossref","unstructured":"Thanki RM, Kothari AM (2019) Image enhancement in the spatial domain. In Digital Image Processing Using SCILAB (pp. 19\u201350). Springer, Cham","DOI":"10.1007\/978-3-319-89533-8_2"},{"issue":"1","key":"6567_CR23","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11071-017-3874-6","volume":"91","author":"A Ullah","year":"2018","unstructured":"Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91(1):359\u2013370","journal-title":"Nonlinear Dyn"},{"key":"6567_CR24","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"key":"6567_CR25","unstructured":"Wang J, Li X (2015) A chaotic system with one line equilibria and image encryption with avalanche effects. In Proceedings of the 2015 International Conference on Electronics, Electrical Engineering and Information Science-EEEIS"},{"issue":"2","key":"6567_CR26","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.physleta.2011.10.040","volume":"376","author":"Z Wei","year":"2011","unstructured":"Wei Z (2011) Dynamical behaviors of a chaotic system with no equilibria. Phys Lett A 376(2):102\u2013108","journal-title":"Phys Lett A"},{"key":"6567_CR27","doi-asserted-by":"publisher","first-page":"106040","DOI":"10.1016\/j.optlaseng.2020.106040","volume":"128","author":"YQ Zhang","year":"2020","unstructured":"Zhang YQ, He Y, Li P, Wang XY (2020) A new color image encryption scheme based on 2DNLCML system and genetic operations. Optics and Lasers in Engineering 128:106040","journal-title":"Optics and Lasers in Engineering"},{"issue":"11","key":"6567_CR28","doi-asserted-by":"publisher","first-page":"2310","DOI":"10.1049\/iet-ipr.2019.1340","volume":"14","author":"J Zheng","year":"2020","unstructured":"Zheng J, Liu L (2020) Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map. IET Image Proc 14(11):2310\u20132320","journal-title":"IET Image Proc"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-06567-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-021-06567-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-06567-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T12:05:37Z","timestamp":1652961937000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-021-06567-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,11]]},"references-count":29,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["6567"],"URL":"https:\/\/doi.org\/10.1007\/s00500-021-06567-7","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,11]]},"assertion":[{"value":"11 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}