{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T07:16:56Z","timestamp":1772263016014,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T00:00:00Z","timestamp":1706486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T00:00:00Z","timestamp":1706486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s00500-023-09333-z","type":"journal-article","created":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T04:02:21Z","timestamp":1706500941000},"page":"2851-2861","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Few-detail image encryption algorithm based on diffusion and confusion using Henon and Baker chaotic maps"],"prefix":"10.1007","volume":"28","author":[{"given":"Ensherah A.","family":"Naeem","sequence":"first","affiliation":[]},{"given":"Anand B.","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"Dhanesh","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8749-9518","authenticated-orcid":false,"given":"Fathi E. Abd","family":"El-Samie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,29]]},"reference":[{"key":"9333_CR1","doi-asserted-by":"publisher","first-page":"27569","DOI":"10.1007\/s11042-019-07852-2","volume":"78","author":"S Anwar","year":"2019","unstructured":"Anwar S, Meghana S (2019) A pixel permutation-based image encryption technique using chaotic map. Multimed Tools Appl 78:27569\u201327590. https:\/\/doi.org\/10.1007\/s11042-019-07852-2","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"9333_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3\u201372","journal-title":"J Cryptol"},{"key":"9333_CR3","doi-asserted-by":"crossref","unstructured":"Biham E, Shamir A (1992) Differential cryptanalysis of the Full 16-Round DES. In: Annual International Cryptology Conference, Springer, Heidelberg. pp. 487\u2013496","DOI":"10.1007\/3-540-48071-4_34"},{"key":"9333_CR4","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.1007\/s11042-019-08190-z","volume":"79","author":"OS Faragallah","year":"2020","unstructured":"Faragallah OS, AlZain MA, El-Sayed HS, Al-Amri JF, El-Shafai W, Afifi A, Naeem EA, Soh B (2020) Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimed Tools Appl 79:2495\u20132519. https:\/\/doi.org\/10.1007\/s11042-019-08190-z","journal-title":"Multimed Tools Appl"},{"key":"9333_CR5","doi-asserted-by":"publisher","first-page":"42491","DOI":"10.1109\/ACCESS.2020.2974226","volume":"8","author":"OS Faragallah","year":"2020","unstructured":"Faragallah OS, Afifi A, El-Shafai W, El-Sayed HS, Naeem EA, Alzain MA, Al-Amri JF, Soh B, Abd El-Samie FE (2020) Investigation of chaotic image encryption in spatial and FrFT domains for cybersecurity applications. IEEE Access 8:42491\u201342503. https:\/\/doi.org\/10.1109\/ACCESS.2020.2974226","journal-title":"IEEE Access"},{"issue":"6","key":"9333_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11082-021-02864-5","volume":"53","author":"OS Faragallah","year":"2021","unstructured":"Faragallah OS, Afifi A, Elashry IF, Naeem EA, El-Hoseny HM, El-sayed HS, Abbas AM (2021) Efficient optical double image cryptosystem using chaotic mapping-based Fresnel transform. Opt Quant Electron 53(6):1\u201326. https:\/\/doi.org\/10.1007\/s11082-021-02864-5","journal-title":"Opt Quant Electron"},{"issue":"6","key":"9333_CR7","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(6):1259\u20131284. https:\/\/doi.org\/10.1142\/S021812749800098X","journal-title":"Int J Bifurcat Chaos"},{"key":"9333_CR8","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.optlastec.2018.01.007","volume":"103","author":"L Gong","year":"2018","unstructured":"Gong L, Deng C, Pan S, Zhou N (2018) Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform. Opt Laser Technol 103:48\u201358","journal-title":"Opt Laser Technol"},{"issue":"17","key":"9333_CR9","doi-asserted-by":"publisher","first-page":"4700","DOI":"10.1016\/j.ijleo.2014.05.023","volume":"125","author":"G Gu","year":"2014","unstructured":"Gu G, Ling J (2014) A fast image encryption method by using chaotic 3D cat maps. Optik 125(17):4700\u20134705","journal-title":"Optik"},{"issue":"4\u20136","key":"9333_CR10","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1080\/19393555.2016.1212954","volume":"25","author":"R Hamza","year":"2016","unstructured":"Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Inform Secur J A Global Perspect 25(4\u20136):162\u2013179. https:\/\/doi.org\/10.1080\/19393555.2016.1212954","journal-title":"Inform Secur J A Global Perspect"},{"key":"9333_CR11","doi-asserted-by":"publisher","unstructured":"Henon M (1976) A two-dimensional mapping with a strange attractor. The theory of chaotic attractors. Springer, New York. pp. 94\u2013102. https:\/\/doi.org\/10.1007\/978-0-387-21830-4_8","DOI":"10.1007\/978-0-387-21830-4_8"},{"issue":"10","key":"9333_CR12","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1080\/09500340.2020.1789233","volume":"67","author":"AB Joshi","year":"2020","unstructured":"Joshi AB, Kumar D, Mishra DC, Guleria V (2020) Colour-image encryption based on 2D discrete wavelet transform and 3D logistic chaotic map. J Mod Opt 67(10):933\u2013949","journal-title":"J Mod Opt"},{"key":"9333_CR13","doi-asserted-by":"publisher","first-page":"106139","DOI":"10.1016\/j.optlaseng.2020.106139","volume":"133","author":"AB Joshi","year":"2020","unstructured":"Joshi AB, Kumar D, Gaffar A, Mishra DC (2020) Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform. Opt Lasers Eng 133:106139\u2013106151","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"9333_CR14","doi-asserted-by":"publisher","first-page":"2150006","DOI":"10.1142\/S0219467821500066","volume":"21","author":"AB Joshi","year":"2021","unstructured":"Joshi AB, Kumar D, Mishra DC (2021) Security of digital images based on 3D Arnold cat map and elliptic curve. Int J Image Graph 21(1):2150006\u20132150026. https:\/\/doi.org\/10.1142\/S0219467821500066","journal-title":"Int J Image Graph"},{"key":"9333_CR15","doi-asserted-by":"publisher","first-page":"103056","DOI":"10.1109\/ACCESS.2021.3097881","volume":"9","author":"D Kumar","year":"2021","unstructured":"Kumar D, Joshi AB, Singh S, Mishra VN, Rosales HG, Zhou L, Dhaka A, Nandal A, Malik H, Singh S (2021) 6D-Chaotic system and 2D fractional discrete cosine transform based encryption of biometric templates. IEEE Access 9:103056\u2013103074. https:\/\/doi.org\/10.1109\/ACCESS.2021.3097881","journal-title":"IEEE Access"},{"key":"9333_CR16","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.sigpro.2015.07.008","volume":"118","author":"C Li","year":"2016","unstructured":"Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203\u2013210. https:\/\/doi.org\/10.1016\/j.sigpro.2015.07.008","journal-title":"Signal Process"},{"issue":"4","key":"9333_CR17","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1016\/j.sigpro.2010.09.014","volume":"91","author":"C Li","year":"2011","unstructured":"Li C, Lo KT (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 91(4):949\u2013954. https:\/\/doi.org\/10.1016\/j.sigpro.2010.09.014","journal-title":"Signal Process"},{"key":"9333_CR18","doi-asserted-by":"publisher","first-page":"16511","DOI":"10.1007\/s11042-016-3925-x","volume":"76","author":"L Liu","year":"2017","unstructured":"Liu L, Miao S (2017) An image encryption algorithm based on Baker map with varying parameter. Multimed Tools Applicat 76:16511\u201316527","journal-title":"Multimed Tools Applicat"},{"key":"9333_CR19","doi-asserted-by":"crossref","unstructured":"Li S, Chen G, Zheng X (2004) Chaos based encryption for digital images and videos. Multimedia security handbook. CRC Press LLC [Chapter4]","DOI":"10.1201\/9781420038262.ch4"},{"key":"9333_CR20","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.1007\/s11071-013-0924-6","volume":"73","author":"C Li","year":"2013","unstructured":"Li C, Liu Y, Xie T, Chen MZQ (2013) Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn 73:2083\u20132089. https:\/\/doi.org\/10.1007\/s11071-013-0924-6","journal-title":"Nonlinear Dyn"},{"key":"9333_CR21","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.03.019","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"9333_CR22","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MMUL.2017.3051512","volume":"24","author":"C Li","year":"2017","unstructured":"Li C, Lin D, Lu J (2017) Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE Multi Media 24(3):64\u201371. https:\/\/doi.org\/10.1109\/MMUL.2017.3051512","journal-title":"IEEE Multi Media"},{"key":"9333_CR23","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238\u2013246. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.10.020","journal-title":"Opt Lasers Eng"},{"key":"9333_CR24","doi-asserted-by":"publisher","unstructured":"Mishra K, Saharan R (2019) A fast image encryption technique using Henon chaotic map. In: Progress in advanced computing and intelligent engineering, Springer, Singapore. pp. 329\u2013339. https:\/\/doi.org\/10.1007\/978-981-13-1708-8_30","DOI":"10.1007\/978-981-13-1708-8_30"},{"key":"9333_CR25","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.jss.2014.07.026","volume":"97","author":"E Naeem","year":"2014","unstructured":"Naeem E, Elnaby MMA, Soliman NF, Abbas AM, Faragallah OS, Semary NAE, Hadhoud MM, Alshibeili SA, El-Samie FEA (2014) Efficient implementation of chaotic image encryption in transform domains. J Syst Softw 97:118\u2013127. https:\/\/doi.org\/10.1016\/j.jss.2014.07.026","journal-title":"J Syst Softw"},{"issue":"24","key":"9333_CR26","doi-asserted-by":"publisher","first-page":"4946","DOI":"10.1016\/j.optcom.2012.07.106","volume":"285","author":"F Ozkaynak","year":"2012","unstructured":"Ozkaynak F, Ozer AB, Yavuz S (2012) Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(24):4946\u20134948. https:\/\/doi.org\/10.1016\/j.optcom.2012.07.106","journal-title":"Opt Commun"},{"key":"9333_CR27","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.neucom.2017.12.048","volume":"283","author":"P Ping","year":"2018","unstructured":"Ping P, Xu F, Mao Y, Wang Z (2018) Designing permutation-substitution image encryption networks with Henon map. Neurocomputing 283:53\u201363. https:\/\/doi.org\/10.1016\/j.neucom.2017.12.048","journal-title":"Neurocomputing"},{"key":"9333_CR28","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s11071-018-4600-8","volume":"95","author":"SF Raza","year":"2019","unstructured":"Raza SF, Satpute V (2019) A novel bit permutation-based image encryption algorithm. Nonlinear Dyn 95:859\u2013873. https:\/\/doi.org\/10.1007\/s11071-018-4600-8","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"9333_CR29","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423","journal-title":"Bell Syst Tech J"},{"issue":"2","key":"9333_CR30","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. J Select Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"J Select Areas Telecommun (JSAT)"},{"key":"9333_CR31","doi-asserted-by":"publisher","unstructured":"Yap WS, Phan RCW (2017) Commentary on \u201cA block chaotic image encryption scheme based on self-adaptive modelling\u201d [Applied Soft Computing 22, (2014) 351\u2013357]. Appl Soft Comput 52:501\u2013504. https:\/\/doi.org\/10.1016\/j.asoc.2016.10.018","DOI":"10.1016\/j.asoc.2016.10.018"},{"key":"9333_CR32","doi-asserted-by":"publisher","first-page":"2079","DOI":"10.1007\/s11071-012-0409-z","volume":"69","author":"G Ye","year":"2012","unstructured":"Ye G, Wong KW (2012) An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn 69:2079\u20132087","journal-title":"Nonlinear Dyn"},{"key":"9333_CR33","doi-asserted-by":"publisher","unstructured":"Ye G, Zhou J (2014) A block chaotic image encryption scheme based on self-adaptive modelling. Appl Soft Comput 22:351\u2013357. https:\/\/doi.org\/10.1016\/j.asoc.2014.05.025","DOI":"10.1016\/j.asoc.2014.05.025"},{"issue":"12","key":"9333_CR34","doi-asserted-by":"publisher","first-page":"3998","DOI":"10.1016\/j.cnsns.2010.01.041","volume":"15","author":"JW Yoon","year":"2010","unstructured":"Yoon JW, Kim H (2010) An image encryption scheme with a pseudorandom permutation-based on chaotic maps. Commun Nonlinear Sci Numer Simul 15(12):3998\u20134006","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"9333_CR35","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29\u201337. https:\/\/doi.org\/10.1016\/j.optcom.2011.08.079","journal-title":"Opt Commun"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09333-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-09333-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09333-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T13:16:48Z","timestamp":1707225408000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-09333-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,29]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["9333"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-09333-z","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1213667\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,29]]},"assertion":[{"value":"23 September 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Humans and animals are not involved in this work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Humans and animals\u2019 rights"}}]}}