{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T17:42:31Z","timestamp":1776966151577,"version":"3.51.4"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"21-22","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72293574"],"award-info":[{"award-number":["72293574"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2022JJ30677"],"award-info":[{"award-number":["2022JJ30677"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2022YFC3303303"],"award-info":[{"award-number":["2022YFC3303303"]}]},{"DOI":"10.13039\/501100012476","name":"Fundamental Research Funds for Central Universities of the Central South University","doi-asserted-by":"publisher","award":["2022ZZTS0609"],"award-info":[{"award-number":["2022ZZTS0609"]}],"id":[{"id":"10.13039\/501100012476","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s00500-024-10319-8","type":"journal-article","created":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T08:44:01Z","timestamp":1731919441000},"page":"12879-12896","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Provably secure color image encryption algorithm based on FO 4D-HCS and ACM"],"prefix":"10.1007","volume":"28","author":[{"given":"Saeed","family":"Ullah","sequence":"first","affiliation":[]},{"given":"Xinge","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Adil","family":"Waheed","sequence":"additional","affiliation":[]},{"given":"Shuailei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,18]]},"reference":[{"key":"10319_CR1","doi-asserted-by":"crossref","unstructured":"Abduljaleel IQ, Abdullah SM (2022) Color image encryption using S-box based on SHA-256 and chaos theory. In: 2022 international conference on data science and intelligent computing. IEEE, pp 123\u2013128","DOI":"10.1109\/ICDSIC56987.2022.10075813"},{"key":"10319_CR2","doi-asserted-by":"crossref","first-page":"26257","DOI":"10.1109\/ACCESS.2022.3151174","volume":"10","author":"ZA Abduljabbar","year":"2022","unstructured":"Abduljabbar ZA, Abduljaleel IQ, Ma J, Al Sibahee MA, Nyangaresi VO, Honi DG, Jiao X (2022) Provably secure and fast color image encryption algorithm based on s-boxes and hyperchaotic map. IEEE Access 10:26257\u201326270","journal-title":"IEEE Access"},{"key":"10319_CR3","doi-asserted-by":"publisher","unstructured":"Akraam M, Rashid T, Zafar S (2023) A novel and secure image encryption scheme based on two-dimensional logistic and Arnold cat map. Cluster Comput. https:\/\/doi.org\/10.1007\/s10586-023-04084-w","DOI":"10.1007\/s10586-023-04084-w"},{"issue":"3","key":"10319_CR4","doi-asserted-by":"crossref","first-page":"443","DOI":"10.3390\/sym14030443","volume":"14","author":"W Alexan","year":"2022","unstructured":"Alexan W, ElBeltagy M, Aboshousha A (2022) RGB image encryption through cellular automata, s-box and the Lorenz system. Symmetry 14(3):443","journal-title":"Symmetry"},{"key":"10319_CR5","doi-asserted-by":"crossref","first-page":"11541","DOI":"10.1109\/ACCESS.2023.3242311","volume":"11","author":"W Alexan","year":"2023","unstructured":"Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A (2023) Color image encryption through chaos and KAA map. IEEE Access 11:11541\u201311554","journal-title":"IEEE Access"},{"key":"10319_CR6","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/j.matcom.2020.05.016","volume":"177","author":"A Alghafis","year":"2020","unstructured":"Alghafis A, Firdousi F, Khan M, Batool SI, Amin M (2020) An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Math Comput Simul 177:441\u2013466","journal-title":"Math Comput Simul"},{"issue":"27\u201328","key":"10319_CR7","doi-asserted-by":"crossref","first-page":"19853","DOI":"10.1007\/s11042-020-08850-5","volume":"79","author":"TS Ali","year":"2020","unstructured":"Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimed Tools Appl 79(27\u201328):19853\u201319873","journal-title":"Multimed Tools Appl"},{"key":"10319_CR8","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.1007\/s11517-020-02178-w","volume":"58","author":"SA Banu","year":"2020","unstructured":"Banu SA, Amirtharajan R (2020) A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach. Med Biol Eng Comput 58:1445\u20131458","journal-title":"Med Biol Eng Comput"},{"key":"10319_CR9","doi-asserted-by":"crossref","first-page":"66409","DOI":"10.1109\/ACCESS.2022.3183990","volume":"10","author":"HAMA Basha","year":"2022","unstructured":"Basha HAMA, Mohra ASS, Diab TOM, El Sobky WI (2022) Efficient image encryption based on new substitution box using DNA coding and bent function. IEEE Access 10:66409\u201366429","journal-title":"IEEE Access"},{"key":"10319_CR10","doi-asserted-by":"crossref","first-page":"30993","DOI":"10.1007\/s11042-018-6145-8","volume":"77","author":"N Ben Slimane","year":"2018","unstructured":"Ben Slimane N, Aouf N, Bouallegue K, Machhout M (2018) A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model. Multimed Tools Appl 77:30993\u201331019","journal-title":"Multimed Tools Appl"},{"key":"10319_CR11","doi-asserted-by":"crossref","unstructured":"Chen H (2019) Component fusion image encryption method based on composite chaotic model. In: 2019 4th international conference on mechanical, control and computer engineering. IEEE, pp 493\u20134934","DOI":"10.1109\/ICMCCE48743.2019.00116"},{"key":"10319_CR12","doi-asserted-by":"crossref","first-page":"12","DOI":"10.23919\/JCC.2020.05.002","volume":"17","author":"C Chen","year":"2020","unstructured":"Chen C, Sun K, Xu Q (2020) A color image encryption algorithm based on 2D-CIMM chaotic map. China Commun 17:12\u201320","journal-title":"China Commun"},{"issue":"9","key":"10319_CR13","doi-asserted-by":"crossref","first-page":"1950115","DOI":"10.1142\/S0218127419501153","volume":"29","author":"G Cheng","year":"2019","unstructured":"Cheng G, Wang C, Chen H (2019) A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Int J Bifurc Chaos 29(9):1950115","journal-title":"Int J Bifurc Chaos"},{"key":"10319_CR14","doi-asserted-by":"crossref","first-page":"11111","DOI":"10.1007\/s00500-023-08493-2","volume":"27","author":"R Chinram","year":"2023","unstructured":"Chinram R, Bano M, Habib U, Singavananda P (2023) Highly secured and quickest image encryption algorithm based on trigonometric chaotic map and S-box. Soft Comput 27:11111\u201311123","journal-title":"Soft Comput"},{"issue":"11","key":"10319_CR15","volume":"98","author":"P Das","year":"2023","unstructured":"Das P, Mandal S (2023) A physical memristor-based chaotic system and its application in colour image encryption scheme. Phys Scr 98(11):115252","journal-title":"Phys Scr"},{"issue":"8","key":"10319_CR16","doi-asserted-by":"crossref","first-page":"4521","DOI":"10.1007\/s00500-023-07818-5","volume":"27","author":"AA Elsadany","year":"2023","unstructured":"Elsadany AA, Elsonbaty A, Hagras EA (2023) Image encryption and watermarking in ACO-OFDM-VLC system employing novel memristive hyperchaotic map. Soft Comput 27(8):4521\u20134542","journal-title":"Soft Comput"},{"issue":"12","key":"10319_CR17","doi-asserted-by":"crossref","first-page":"2959","DOI":"10.1109\/26.477498","volume":"43","author":"AM Eskicioglu","year":"1995","unstructured":"Eskicioglu AM, Fisher PS (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959\u20132965","journal-title":"IEEE Trans Commun"},{"issue":"6","key":"10319_CR18","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(6):1259\u20131284","journal-title":"Int J Bifurc Chaos"},{"key":"10319_CR19","doi-asserted-by":"crossref","first-page":"27017","DOI":"10.1007\/s11042-018-5902-z","volume":"77","author":"A Girdhar","year":"2018","unstructured":"Girdhar A, Kumar V (2018) A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences. Multimed Tools Appl 77:27017\u201327039","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"10319_CR20","first-page":"807","volume":"4","author":"P Gupta","year":"2014","unstructured":"Gupta P, Singh S, Mangal I (2014) Image encryption based on Arnold cat map and S-box. Int J Adv Res Comput Sci Softw Eng 4(8):807\u2013812","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"key":"10319_CR21","doi-asserted-by":"crossref","first-page":"1309","DOI":"10.1007\/s12652-019-01493-x","volume":"11","author":"A Gupta","year":"2020","unstructured":"Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-iii based 4-D chaotic maps: Image encryption. J Ambient Intell Humaniz Comput 11:1309\u20131324","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"10319_CR22","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.ijleo.2018.12.178","volume":"181","author":"C Han","year":"2019","unstructured":"Han C (2019) An image encryption algorithm based on modified logistic chaotic map. Optik 181:779\u2013785","journal-title":"Optik"},{"key":"10319_CR23","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018) 2D logistic-sine-coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"key":"10319_CR24","doi-asserted-by":"crossref","first-page":"8660","DOI":"10.1109\/ACCESS.2018.2890116","volume":"7","author":"Z Hua","year":"2019","unstructured":"Hua Z, Xu B, Jin F, Huang H (2019) Image encryption using Josephus problem and filtering diffusion. IEEE Access 7:8660\u20138674","journal-title":"IEEE Access"},{"key":"10319_CR25","first-page":"1","volume":"2020","author":"L Huang","year":"2020","unstructured":"Huang L, Wang S, Xiang J, Sun Y (2020) Chaotic color image encryption scheme using deoxyribonucleic acid (DNA) coding calculations and arithmetic over the galois field. Math Probl Eng 2020:1\u201322","journal-title":"Math Probl Eng"},{"issue":"21","key":"10319_CR26","doi-asserted-by":"crossref","first-page":"3436","DOI":"10.3390\/electronics11213436","volume":"11","author":"P Huang","year":"2022","unstructured":"Huang P, Li D, Wang Y, Zhao H, Deng W (2022) A novel color image encryption algorithm using coupled map lattice with polymorphic mapping. Electronics 11(21):3436","journal-title":"Electronics"},{"key":"10319_CR27","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.matcom.2023.01.024","volume":"208","author":"K Iskakova","year":"2023","unstructured":"Iskakova K, Alam MM, Ahmad S, Saifullah S, Akg\u00fcl A, Y\u0131lmaz G (2023) Dynamical study of a novel 4D hyperchaotic system: An integer and fractional order analysis. Math Comput Simul 208:219\u2013245","journal-title":"Math Comput Simul"},{"issue":"6","key":"10319_CR28","doi-asserted-by":"crossref","first-page":"2689","DOI":"10.1007\/s00500-021-06423-8","volume":"26","author":"M Kaur","year":"2022","unstructured":"Kaur M, Singh D, Kumar V (2022) Improved seven-dimensional (i7D) hyperchaotic map-based image encryption technique. Soft Comput 26(6):2689\u20132698","journal-title":"Soft Comput"},{"issue":"2","key":"10319_CR29","doi-asserted-by":"crossref","first-page":"1967","DOI":"10.32604\/csse.2023.040345","volume":"47","author":"DS Khafaga","year":"2023","unstructured":"Khafaga DS, Alhammad SM, Magdi A, ElKomy O, Lashin NA, Hosny KM (2023) Securing transmitted color images using zero watermarking and advanced encryption standard on Raspberry Pi. Comput Syst Sci Eng 47(2):1967\u20131986","journal-title":"Comput Syst Sci Eng"},{"key":"10319_CR30","doi-asserted-by":"crossref","first-page":"5483","DOI":"10.1109\/ACCESS.2022.3230096","volume":"11","author":"I Khalid","year":"2022","unstructured":"Khalid I, Shah T, Eldin SM, Shah D, Asif M, Saddique I (2022) An integrated image encryption scheme based on elliptic curve. IEEE Access 11:5483\u20135501","journal-title":"IEEE Access"},{"key":"10319_CR31","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","volume":"30","author":"JS Khan","year":"2019","unstructured":"Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidimens Syst Signal Process 30:943\u2013961","journal-title":"Multidimens Syst Signal Process"},{"issue":"12","key":"10319_CR32","volume":"14","author":"M Khan","year":"2019","unstructured":"Khan M, Masood F, Alghafis A, Amin M, Batool Naqvi SI (2019) A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PLoS One 14(12):e0225031","journal-title":"PLoS One"},{"key":"10319_CR33","doi-asserted-by":"publisher","unstructured":"Li X, Sun B, Bi X, Yan H, Wang L (2023) A novel color image encryption algorithm based on cross-plane scrambling and diffusion. Mobile Netw Appl. https:\/\/doi.org\/10.1007\/s11036-023-02147-1","DOI":"10.1007\/s11036-023-02147-1"},{"issue":"11","key":"10319_CR34","volume":"98","author":"W Liang","year":"2023","unstructured":"Liang W, Zhang L, Yang Z, Yu T, Li J, Li X (2023) Image encryption algorithm based on hyperchaotic system and dynamic DNA encoding. Phys Scr 98(11):115215","journal-title":"Phys Scr"},{"issue":"4","key":"10319_CR35","doi-asserted-by":"crossref","first-page":"3887","DOI":"10.3934\/mbe.2021194","volume":"18","author":"M Liu","year":"2021","unstructured":"Liu M, Ye G (2021) A new DNA coding and hyperchaotic system based asymmetric image encryption algorithm. Math Biosci Eng 18(4):3887\u20133906","journal-title":"Math Biosci Eng"},{"key":"10319_CR36","doi-asserted-by":"crossref","first-page":"22023","DOI":"10.1007\/s11042-019-7453-3","volume":"78","author":"Y Luo","year":"2019","unstructured":"Luo Y, Yu J, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed Tools Appl 78:22023\u201322043","journal-title":"Multimed Tools Appl"},{"key":"10319_CR37","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1016\/j.matcom.2020.07.007","volume":"178","author":"DS Malik","year":"2020","unstructured":"Malik DS, Shah T (2020) Color multiple image encryption scheme based on 3D-chaotic maps. Math Comput Simul 178:646\u2013666","journal-title":"Math Comput Simul"},{"issue":"21","key":"10319_CR38","doi-asserted-by":"crossref","first-page":"30931","DOI":"10.1007\/s11042-022-12844-w","volume":"81","author":"F Masood","year":"2022","unstructured":"Masood F, Boulila W, Alsaeedi A, Khan JS, Ahmad J, Khan MA, Rehman SU (2022) A novel image encryption scheme based on Arnold cat map, Newton\u2013Leipnik system and logistic Gaussian map. Multimed Tools Appl 81(21):30931\u201330959","journal-title":"Multimed Tools Appl"},{"key":"10319_CR39","doi-asserted-by":"crossref","unstructured":"Mehdi SA, Kadhim AA (2019) Image encryption algorithm based on a new five dimensional hyperchaotic system and sudoku matrix. In: 2019 international engineering conference. IEEE, pp 188\u2013193","DOI":"10.1109\/IEC47844.2019.8950560"},{"issue":"8","key":"10319_CR40","doi-asserted-by":"crossref","first-page":"815","DOI":"10.3390\/e21080815","volume":"21","author":"MA Murillo-Escobar","year":"2019","unstructured":"Murillo-Escobar MA, Meranza-Castill\u00f3n MO, L\u00f3pez-Guti\u00e9rrez RM, Cruz-Hern\u00e1ndez C (2019) Suggested integral analysis for chaos-based image cryptosystems. Entropy 21(8):815","journal-title":"Entropy"},{"key":"10319_CR41","doi-asserted-by":"crossref","first-page":"25613","DOI":"10.1007\/s11042-020-09237-2","volume":"79","author":"Y Niu","year":"2020","unstructured":"Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations. Multimed Tools Appl 79:25613\u201325633","journal-title":"Multimed Tools Appl"},{"key":"10319_CR42","doi-asserted-by":"crossref","first-page":"4593","DOI":"10.1007\/s00542-019-04395-2","volume":"25","author":"KAK Patro","year":"2019","unstructured":"Patro KAK, Acharya B, Nath V (2019) Secure multilevel permutation-diffusion based image encryption using chaotic and hyper-chaotic maps. Microsyst Technol 25:4593\u20134607","journal-title":"Microsyst Technol"},{"key":"10319_CR43","first-page":"188","volume":"10","author":"SN Prajwalasimha","year":"2020","unstructured":"Prajwalasimha SN, Basavaraj L (2020) Performance analysis of transformation and Bogdonov chaotic substitution based image cryptosystem. Int J Electr Comput Eng 10:188\u2013195","journal-title":"Int J Electr Comput Eng"},{"issue":"2","key":"10319_CR44","first-page":"1744","volume":"13","author":"HR Shakir","year":"2023","unstructured":"Shakir HR, Mehdi SA, Hattab AA (2023) A new four-dimensional hyper-chaotic system for image encryption. Int J Electr Comput Eng 13(2):1744\u20131756","journal-title":"Int J Electr Comput Eng"},{"issue":"3","key":"10319_CR45","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423","journal-title":"Bell Syst Tech J"},{"key":"10319_CR46","first-page":"2088","volume":"9","author":"S Sharma","year":"2019","unstructured":"Sharma S, Kumar T, Dhaundiyal R, Mishra AK, Duklan N, Maithani A (2019) Improved method for image security based on chaotic-shuffle and chaotic-diffusion algorithms. Int J Electr Comput Eng 9:2088\u20138708","journal-title":"Int J Electr Comput Eng"},{"key":"10319_CR47","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/s11554-020-00948-1","volume":"18","author":"MZ Talhaoui","year":"2021","unstructured":"Talhaoui MZ, Wang X, Midoun MA (2021) Fast image encryption algorithm with high security level using the B\u00fclban chaotic map. J Real-Time Image Process 18:85\u201398","journal-title":"J Real-Time Image Process"},{"key":"10319_CR48","doi-asserted-by":"crossref","first-page":"23507","DOI":"10.1007\/s11042-020-09134-8","volume":"79","author":"S Tariq","year":"2020","unstructured":"Tariq S, Khan M, Alghafis A, Amin M (2020) A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation. Multimed Tools Appl 79:23507\u201323529","journal-title":"Multimed Tools Appl"},{"key":"10319_CR49","doi-asserted-by":"crossref","first-page":"1859","DOI":"10.1007\/s11071-021-06663-1","volume":"105","author":"L Teng","year":"2021","unstructured":"Teng L, Wang X, Yang F, Xian Y (2021) Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dyn 105:1859\u20131876","journal-title":"Nonlinear Dyn"},{"key":"10319_CR50","doi-asserted-by":"crossref","DOI":"10.1016\/j.vlsi.2023.102099","volume":"94","author":"S Ullah","year":"2024","unstructured":"Ullah S, Liu X, Waheed A, Zhang S (2024) An efficient construction of S-box based on the fractional-order Rabinovich\u2013Fabrikant chaotic system. Integration-VLSI J 94:102099","journal-title":"Integration-VLSI J"},{"issue":"3","key":"10319_CR51","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1504\/IJSPM.2018.093113","volume":"13","author":"S Vaidyanathan","year":"2018","unstructured":"Vaidyanathan S, Azar AT, Rajagopal K, Sambas A, Kacar S, Cavusoglu U (2018) A new hyperchaotic temperature fluctuations model, its circuit simulation, FPGA implementation and an application to image encryption. Int J Simul Process Model 13(3):281\u2013296","journal-title":"Int J Simul Process Model"},{"issue":"3","key":"10319_CR52","doi-asserted-by":"crossref","DOI":"10.1088\/1402-4896\/abd50f","volume":"96","author":"Y Wang","year":"2021","unstructured":"Wang Y, Yang F (2021) A fractional-order CNN hyperchaotic system for image encryption algorithm. Phys Scr 96(3):035209","journal-title":"Phys Scr"},{"key":"10319_CR53","doi-asserted-by":"crossref","first-page":"6243","DOI":"10.1007\/s11042-017-4534-z","volume":"77","author":"XY Wang","year":"2018","unstructured":"Wang XY, Li P, Zhang YQ, Liu LY, Zhang H, Wang X (2018) A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed Tools Appl 77:6243\u20136265","journal-title":"Multimed Tools Appl"},{"issue":"15","key":"10319_CR54","doi-asserted-by":"crossref","first-page":"14513","DOI":"10.1007\/s11071-023-08538-z","volume":"111","author":"X Wang","year":"2023","unstructured":"Wang X, Xu X, Sun K, Jiang Z, Li M, Wen J (2023) A color image encryption and hiding algorithm based on hyperchaotic system and discrete cosine transform. Nonlinear Dyn 111(15):14513\u201314536","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"10319_CR55","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. J Sel Areas Telecommun 1(2):31\u201338","journal-title":"J Sel Areas Telecommun"},{"issue":"10","key":"10319_CR56","doi-asserted-by":"crossref","first-page":"1474","DOI":"10.3390\/e24101474","volume":"24","author":"Y Wu","year":"2022","unstructured":"Wu Y, Zeng J, Dong W, Li X, Qin D, Ding Q (2022) A novel color image encryption scheme based on hyperchaos and hopfield chaotic neural network. Entropy 24(10):1474","journal-title":"Entropy"},{"key":"10319_CR57","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"Y Xian","year":"2021","unstructured":"Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154\u20131169","journal-title":"Inf Sci"},{"key":"10319_CR58","doi-asserted-by":"crossref","unstructured":"Xu HL, Jiang H (2019) An image encryption Schema based on hybrid optimized chaotic system. In: 2019 3rd international conference on electronic information technology and computer engineering. IEEE, pp 784\u2013788","DOI":"10.1109\/EITCE47263.2019.9095007"},{"key":"10319_CR59","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1007\/s11042-020-09779-5","volume":"80","author":"YG Yang","year":"2021","unstructured":"Yang YG, Guan BW, Zhou YH, Shi WM (2021) Double image compression-encryption algorithm based on fractional order hyper chaotic system and DNA approach. Multimed Tools Appl 80:691\u2013710","journal-title":"Multimed Tools Appl"},{"key":"10319_CR60","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.image.2017.01.002","volume":"52","author":"HM Yuan","year":"2017","unstructured":"Yuan HM, Liu Y, Lin T, Hu T, Gong LH (2017) A new parallel image cryptosystem based on 5D hyper-chaotic system. Signal Process Image Commun 52:87\u201396","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"10319_CR61","volume":"128","author":"YQ Zhang","year":"2020","unstructured":"Zhang YQ, He Y, Li P, Wang XY (2020) A new color image encryption scheme based on 2DNLCML system and genetic operations. Opt Lasers Eng 128(3):106040","journal-title":"Opt Lasers Eng"},{"key":"10319_CR62","unstructured":"Zhang Q, Li T, Guo R (2023a) An image tamper-proof encryption scheme based on blockchain and Lorenz hyperchaotic S-box. Int J Netw Secur 25(2):252\u2013266"},{"key":"10319_CR63","doi-asserted-by":"crossref","unstructured":"Zhang D, Chen L, Li T (2023b) Hyper-chaotic color image encryption based on 3D orthogonal Latin cubes and RNA diffusion. Multimed Tools Appl 83(2):1\u201324","DOI":"10.1007\/s11042-023-15284-2"},{"key":"10319_CR64","volume":"174","author":"C Zou","year":"2023","unstructured":"Zou C, Wang L (2023) A visual DNA compilation of R\u00f6ssler system and its application in color image encryption. Chaos Solitons Fractals 174:113886","journal-title":"Chaos Solitons Fractals"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-024-10319-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-024-10319-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-024-10319-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T07:31:26Z","timestamp":1733902286000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-024-10319-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":64,"journal-issue":{"issue":"21-22","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["10319"],"URL":"https:\/\/doi.org\/10.1007\/s00500-024-10319-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]},"assertion":[{"value":"26 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This paper does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}