{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:32:58Z","timestamp":1757313178912,"version":"3.40.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s00500-025-10477-3","type":"journal-article","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T07:28:11Z","timestamp":1740468491000},"page":"2229-2245","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["New Vigenere method with pseudo-random affine functions for color image encryption"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0203-2769","authenticated-orcid":false,"given":"Hamid","family":"El Bourakkadi","sequence":"first","affiliation":[]},{"given":"Abdelhakim","family":"Chemlal","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Tabti","sequence":"additional","affiliation":[]},{"given":"Mourad","family":"Kattass","sequence":"additional","affiliation":[]},{"given":"Abdellatif","family":"Jarjar","sequence":"additional","affiliation":[]},{"given":"Abdelhamid","family":"Benazzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"issue":"2","key":"10477_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3390\/cryptography7020020","volume":"7","author":"M Abu-Faraj","year":"2023","unstructured":"Abu-Faraj M, Al-Hyari A, Obimbo C, Aldebei K, Altaharwa I, Alqadi Z, Almanaseer O (2023) Protecting digital images using keys enhanced by 2D chaotic logistic maps. Cryptography 7(2):20. https:\/\/doi.org\/10.3390\/cryptography7020020","journal-title":"Cryptography"},{"issue":"5","key":"10477_CR2","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.3390\/sym15051081","volume":"15","author":"W Alexan","year":"2023","unstructured":"Alexan W, Chen Y-L, Por LY, Gabr M (2023) Hyperchaotic maps and the single neuron model: a novel framework for chaos-based image encryption. Symmetry 15(5):1081. https:\/\/doi.org\/10.3390\/sym15051081","journal-title":"Symmetry"},{"issue":"15","key":"10477_CR3","doi-asserted-by":"publisher","first-page":"20585","DOI":"10.1007\/s11042-022-12268-6","volume":"81","author":"TS Ali","year":"2022","unstructured":"Ali TS, Ali R (2022) A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box. Multimed Tools Appl 81(15):20585\u201320609. https:\/\/doi.org\/10.1007\/s11042-022-12268-6","journal-title":"Multimed Tools Appl"},{"issue":"13","key":"10477_CR4","doi-asserted-by":"publisher","first-page":"7768","DOI":"10.3390\/app13137768","volume":"13","author":"AM Alnajim","year":"2023","unstructured":"Alnajim AM, Abou-Bakr E, Alruwisan SS, Khan S, Elmanfaloty RA (2023) Hybrid chaotic-based PRNG for secure cryptography applications. Appl Sci 13(13):7768. https:\/\/doi.org\/10.3390\/app13137768","journal-title":"Appl Sci"},{"key":"10477_CR5","doi-asserted-by":"publisher","first-page":"115143","DOI":"10.1109\/ACCESS.2022.3218886","volume":"10","author":"PN Andono","year":"2022","unstructured":"Andono PN, Setiadi DRIM (2022) Improved pixel and bit confusion-diffusion based on mixed chaos and hash operation for image encryption. IEEE Access 10:115143\u2013115156. https:\/\/doi.org\/10.1109\/ACCESS.2022.3218886","journal-title":"IEEE Access"},{"issue":"3","key":"10477_CR6","doi-asserted-by":"publisher","first-page":"296","DOI":"10.18178\/ijmlc.2019.9.3.801","volume":"9","author":"TM Aung","year":"2019","unstructured":"Aung TM, Naing HH, Hla NN (2019) A complex transformation of monoalphabetic cipher to polyalphabetic cipher: (Vigen\u00e8re-Affine Cipher). Int J Mach Learn Comput 9(3):296\u2013303. https:\/\/doi.org\/10.18178\/ijmlc.2019.9.3.801","journal-title":"Int J Mach Learn Comput"},{"issue":"1","key":"10477_CR7","doi-asserted-by":"publisher","first-page":"112","DOI":"10.3390\/e22010112","volume":"22","author":"KK Butt","year":"2020","unstructured":"Butt KK, Li G, Khan S, Manzoor S (2020) Fast and efficient image encryption algorithm based on modular addition and SPD. Entropy 22(1):112. https:\/\/doi.org\/10.3390\/e22010112","journal-title":"Entropy"},{"key":"10477_CR8","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"J Chen","year":"2018","unstructured":"Chen J, Zhu Z, Zhang L, Zhang Y, Yang B (2018) Exploiting self-adaptive permutation\u2013diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353. https:\/\/doi.org\/10.1016\/j.sigpro.2017.07.034","journal-title":"Signal Process"},{"issue":"2","key":"10477_CR9","doi-asserted-by":"publisher","first-page":"287","DOI":"10.3390\/e24020287","volume":"24","author":"Y Chen","year":"2022","unstructured":"Chen Y, Xie S, Zhang J (2022) A hybrid domain image encryption algorithm based on improved Henon map. Entropy 24(2):287. https:\/\/doi.org\/10.3390\/e24020287","journal-title":"Entropy"},{"issue":"6","key":"10477_CR10","doi-asserted-by":"publisher","first-page":"1325","DOI":"10.3390\/electronics12061325","volume":"12","author":"C Chen","year":"2023","unstructured":"Chen C, Zhu D, Wang X, Zeng L (2023) One-dimensional quadratic chaotic system and splicing model for image encryption. Electronics 12(6):1325. https:\/\/doi.org\/10.3390\/electronics12061325","journal-title":"Electronics"},{"key":"10477_CR11","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ijleo.2019.03.065","volume":"184","author":"A Hasheminejad","year":"2019","unstructured":"Hasheminejad A, Rostami MJ (2019) A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Optik 184:205\u2013213. https:\/\/doi.org\/10.1016\/j.ijleo.2019.03.065","journal-title":"Optik"},{"key":"10477_CR12","doi-asserted-by":"publisher","first-page":"120596","DOI":"10.1109\/ACCESS.2021.3108789","volume":"9","author":"WJ Jun","year":"2021","unstructured":"Jun WJ, Fun TS (2021) A new image encryption algorithm based on single S-box and dynamic encryption step. IEEE Access 9:120596\u2013120612. https:\/\/doi.org\/10.1109\/ACCESS.2021.3108789","journal-title":"IEEE Access"},{"issue":"5","key":"10477_CR13","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir A, Hamdulla A, Guo W-Q (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125(5):1671\u20131675. https:\/\/doi.org\/10.1016\/j.ijleo.2013.09.040","journal-title":"Optik"},{"key":"10477_CR14","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.future.2020.02.029","volume":"107","author":"M Kaur","year":"2020","unstructured":"Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Futur Gener Comput Syst 107:333\u2013350. https:\/\/doi.org\/10.1016\/j.future.2020.02.029","journal-title":"Futur Gener Comput Syst"},{"key":"10477_CR15","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4034","author":"S Khan","year":"2021","unstructured":"Khan S, Lansheng H, Qian Y, Lu H, Meng Jiao S (2021) Security of multimedia communication with game trick based fast, efficient, and robust color-\/gray-scale image encryption algorithm. Trans Emerg Telecommun Technol. https:\/\/doi.org\/10.1002\/ett.4034","journal-title":"Trans Emerg Telecommun Technol"},{"key":"10477_CR16","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.sigpro.2015.07.008","volume":"118","author":"C Li","year":"2016","unstructured":"Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203\u2013210. https:\/\/doi.org\/10.1016\/j.sigpro.2015.07.008","journal-title":"Signal Process"},{"issue":"1","key":"10477_CR17","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/s10916-023-02003-5","volume":"47","author":"Z Liu","year":"2023","unstructured":"Liu Z, Xue R (2023) Medical image encryption using biometric image texture fusion. J Med Syst 47(1):112. https:\/\/doi.org\/10.1007\/s10916-023-02003-5","journal-title":"J Med Syst"},{"key":"10477_CR18","doi-asserted-by":"publisher","first-page":"6937","DOI":"10.1109\/ACCESS.2018.2889896","volume":"7","author":"X Liu","year":"2019","unstructured":"Liu X, Xiao D, Xiang Y (2019) Quantum image encryption using intra and inter bit permutation based on logistic map. IEEE Access 7:6937\u20136946. https:\/\/doi.org\/10.1109\/ACCESS.2018.2889896","journal-title":"IEEE Access"},{"issue":"15","key":"10477_CR19","doi-asserted-by":"publisher","first-page":"22023","DOI":"10.1007\/s11042-019-7453-3","volume":"78","author":"Y Luo","year":"2019","unstructured":"Luo Y, Yu J, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed Tools Appl 78(15):22023\u201322043. https:\/\/doi.org\/10.1007\/s11042-019-7453-3","journal-title":"Multimed Tools Appl"},{"key":"10477_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102566","volume":"54","author":"Y Ma","year":"2020","unstructured":"Ma Y, Li C, Ou B (2020) Cryptanalysis of an image block encryption algorithm based on chaotic maps. J Inform Secur Appl 54:102566. https:\/\/doi.org\/10.1016\/j.jisa.2020.102566","journal-title":"J Inform Secur Appl"},{"issue":"10","key":"10477_CR21","doi-asserted-by":"publisher","first-page":"2396","DOI":"10.3390\/math11102396","volume":"11","author":"E Moya-Albor","year":"2023","unstructured":"Moya-Albor E, Romero-Arellano A, Brieva J, Gomez-Coronel SL (2023) Color image encryption algorithm based on a chaotic model using the modular discrete derivative and Langton\u2019s ant. Mathematics 11(10):2396. https:\/\/doi.org\/10.3390\/math11102396","journal-title":"Mathematics"},{"issue":"23","key":"10477_CR22","doi-asserted-by":"publisher","first-page":"33527","DOI":"10.1007\/s11042-019-08112-z","volume":"78","author":"R Qumsieh","year":"2019","unstructured":"Qumsieh R, Farajallah M, Hamamreh R (2019) Joint block and stream cipher based on a modified skew tent map. Multimed Tools Appl 78(23):33527\u201333547. https:\/\/doi.org\/10.1007\/s11042-019-08112-z","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"10477_CR23","doi-asserted-by":"publisher","first-page":"656","DOI":"10.3390\/e21070656","volume":"21","author":"P Ramasamy","year":"2019","unstructured":"Ramasamy P, Ranganathan V, Kadry S, Dama\u0161evi\u010dius R, Bla\u017eauskas T (2019) An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic\u2014tent map. Entropy 21(7):656. https:\/\/doi.org\/10.3390\/e21070656","journal-title":"Entropy"},{"key":"10477_CR24","doi-asserted-by":"publisher","first-page":"157106","DOI":"10.1109\/ACCESS.2021.3128177","volume":"9","author":"M Ramzan","year":"2021","unstructured":"Ramzan M, Shah T, Hazzazi MM, Aljaedi A, Alharbi AR (2021) Construction of S-boxes using different maps over elliptic curves for image encryption. IEEE Access 9:157106\u2013157123. https:\/\/doi.org\/10.1109\/ACCESS.2021.3128177","journal-title":"IEEE Access"},{"issue":"6","key":"10477_CR25","doi-asserted-by":"publisher","first-page":"16563","DOI":"10.1007\/s11042-023-15992-9","volume":"83","author":"S Sabir","year":"2023","unstructured":"Sabir S, Guleria V (2023) Multi-layer permutation-substitution operations based novel lossless multiple color image encryption. Multimed Tools Appl 83(6):16563\u201316604. https:\/\/doi.org\/10.1007\/s11042-023-15992-9","journal-title":"Multimed Tools Appl"},{"issue":"13","key":"10477_CR26","doi-asserted-by":"publisher","first-page":"2818","DOI":"10.3390\/electronics12132818","volume":"12","author":"S Vaidyanathan","year":"2023","unstructured":"Vaidyanathan S, Kammogne AST, Tlelo-Cuautle E, Talonang CN, Abd-El-Atty B, Abd El-Latif AA, Kengne EM, Mawamba VF, Sambas A, Darwin P, Ovilla-Martinez B (2023) A novel 3-D jerk system, its bifurcation analysis, electronic circuit design and a cryptographic application. Electronics 12(13):2818. https:\/\/doi.org\/10.3390\/electronics12132818","journal-title":"Electronics"},{"key":"10477_CR27","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","volume":"342","author":"X Wang","year":"2015","unstructured":"Wang X, Zhang H (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51\u201360. https:\/\/doi.org\/10.1016\/j.optcom.2014.12.043","journal-title":"Opt Commun"},{"issue":"10","key":"10477_CR28","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.3390\/e25101399","volume":"25","author":"Y Wang","year":"2023","unstructured":"Wang Y, Leng X, Zhang C, Du B (2023) Adaptive fast image encryption algorithm based on three-dimensional chaotic system. Entropy 25(10):1399. https:\/\/doi.org\/10.3390\/e25101399","journal-title":"Entropy"},{"key":"10477_CR29","unstructured":"Weber A (2018) The USC-SIPI image database. USC Viterbi. https:\/\/sipi.usc.edu\/database\/database.php?volume=misc"},{"key":"10477_CR30","doi-asserted-by":"publisher","first-page":"69005","DOI":"10.1109\/ACCESS.2023.3285481","volume":"11","author":"E Winarno","year":"2023","unstructured":"Winarno E, Nugroho K, Adi PW, Setiadi DRIM (2023) Combined interleaved pattern to improve confusion-diffusion image encryption based on hyperchaotic system. IEEE Access 11:69005\u201369021. https:\/\/doi.org\/10.1109\/ACCESS.2023.3285481","journal-title":"IEEE Access"},{"issue":"10","key":"10477_CR31","doi-asserted-by":"publisher","first-page":"12349","DOI":"10.1007\/s11042-017-4885-5","volume":"77","author":"X Wu","year":"2018","unstructured":"Wu X, Kurths J, Kan H (2018a) A robust and lossless DNA encryption scheme for color images. Multimed Tools Appl 77(10):12349\u201312376. https:\/\/doi.org\/10.1007\/s11042-017-4885-5","journal-title":"Multimed Tools Appl"},{"key":"10477_CR32","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"X Wu","year":"2018","unstructured":"Wu X, Wang K, Wang X, Kan H, Kurths J (2018b) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272\u2013287. https:\/\/doi.org\/10.1016\/j.sigpro.2018.02.028","journal-title":"Signal Process"},{"key":"10477_CR33","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325. https:\/\/doi.org\/10.1016\/j.optlaseng.2015.09.007","journal-title":"Opt Lasers Eng"},{"key":"10477_CR34","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"A Yaghouti Niyat","year":"2017","unstructured":"Yaghouti Niyat A, Moattar MH, Niazi Torshiz M (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225\u2013237. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.10.019","journal-title":"Opt Lasers Eng"},{"key":"10477_CR35","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.neucom.2017.04.016","volume":"251","author":"G Ye","year":"2017","unstructured":"Ye G, Huang X (2017) An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing 251:45\u201353. https:\/\/doi.org\/10.1016\/j.neucom.2017.04.016","journal-title":"Neurocomputing"},{"issue":"5","key":"10477_CR36","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ac66a1","volume":"97","author":"X Zhang","year":"2022","unstructured":"Zhang X, Tian J (2022) Multiple-image encryption algorithm based on genetic central dogma. Phys Scr 97(5):055213. https:\/\/doi.org\/10.1088\/1402-4896\/ac66a1","journal-title":"Phys Scr"},{"issue":"14","key":"10477_CR37","doi-asserted-by":"publisher","first-page":"15641","DOI":"10.1007\/s11042-016-3861-9","volume":"76","author":"X Zhang","year":"2017","unstructured":"Zhang X, Nie W, Ma Y, Tian Q (2017) Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box. Multimed Tools Appl 76(14):15641\u201315659. https:\/\/doi.org\/10.1007\/s11042-016-3861-9","journal-title":"Multimed Tools Appl"},{"key":"10477_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2023\/6758406","volume":"2023","author":"D Zhang","year":"2023","unstructured":"Zhang D, Ren L, Shafiq M, Gu Z (2023) A privacy protection framework for medical image security without key dependency based on visual cryptography and trusted computing. Comput Intell Neurosci 2023:1\u201311. https:\/\/doi.org\/10.1155\/2023\/6758406","journal-title":"Comput Intell Neurosci"},{"issue":"3","key":"10477_CR39","doi-asserted-by":"publisher","first-page":"150","DOI":"10.3390\/info14030150","volume":"14","author":"J Zhao","year":"2023","unstructured":"Zhao J, Wang S, Zhang L (2023) Block image encryption algorithm based on novel chaos and DNA encoding. Information 14(3):150. https:\/\/doi.org\/10.3390\/info14030150","journal-title":"Information"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10477-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-025-10477-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10477-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T06:36:11Z","timestamp":1742193371000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-025-10477-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["10477"],"URL":"https:\/\/doi.org\/10.1007\/s00500-025-10477-3","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2025,2]]},"assertion":[{"value":"8 November 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}