{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T09:45:57Z","timestamp":1775209557901,"version":"3.50.1"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:00:00Z","timestamp":1768953600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:00:00Z","timestamp":1768953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s00500-025-10986-1","type":"journal-article","created":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T10:36:22Z","timestamp":1768991782000},"page":"1391-1412","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A novel image encryption algorithm using tent and Lorenz chaotic system"],"prefix":"10.1007","volume":"30","author":[{"given":"Balmukund","family":"Jha","sequence":"first","affiliation":[]},{"given":"Piyush Kumar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Vandna Rani","family":"Verma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,21]]},"reference":[{"issue":"1","key":"10986_CR1","first-page":"11","volume":"16","author":"AM Abdullah","year":"2017","unstructured":"Abdullah AM (2017) Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptogr Netw Secur 16(1):11","journal-title":"Cryptogr Netw Secur"},{"key":"10986_CR2","unstructured":"Alvarez G, Li S (2003) Cryptographic requirements for chaotic secure communications. arXiv preprint arXiv:nlin\/0311039"},{"key":"10986_CR3","doi-asserted-by":"crossref","unstructured":"Avasare MG, Kelkar VV (2015) Image encryption using chaos theory. In: 2015 international conference on communication, information & computing technology (ICCICT). IEEE, pp 1\u20136","DOI":"10.1109\/ICCICT.2015.7045687"},{"key":"10986_CR4","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1016\/j.procs.2015.02.105","volume":"46","author":"D Baby","year":"2015","unstructured":"Baby D, Thomas J, Augustine G, George E, Michael NR (2015) A novel DWT based image securing method using steganography. Proc Comput Sci 46:612\u2013618","journal-title":"Proc Comput Sci"},{"key":"10986_CR5","volume-title":"Applied chaos theory: a paradigm for complexity","author":"AB Cambel","year":"1993","unstructured":"Cambel AB (1993) Applied chaos theory: a paradigm for complexity. Elsevier, Amsterdam"},{"key":"10986_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"X Chai","year":"2019","unstructured":"Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl 31:219\u2013237","journal-title":"Neural Comput Appl"},{"issue":"6","key":"10986_CR7","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1631\/FITEE.1900709","volume":"21","author":"LP Chen","year":"2020","unstructured":"Chen LP, Yin H, Yuan LG, Lopes AM, Machado JT, Wu RC (2020) A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations. Front Inf Technol Electron Eng 21(6):866\u2013879","journal-title":"Front Inf Technol Electron Eng"},{"issue":"3","key":"10986_CR8","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D Coppersmith","year":"1994","unstructured":"Coppersmith D (1994) The data encryption standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243\u2013250","journal-title":"IBM J Res Dev"},{"issue":"14","key":"10986_CR9","doi-asserted-by":"publisher","first-page":"12579","DOI":"10.1007\/s11071-024-09679-5","volume":"112","author":"J Du","year":"2024","unstructured":"Du J, Zhao Z, Li S, Lu B, Zhang J (2024) A novel image encryption algorithm based on hyperchaotic system with cross-feedback structure and diffusive DNA coding operations. Nonlinear Dyn 112(14):12579\u201312596","journal-title":"Nonlinear Dyn"},{"key":"10986_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105777","volume":"121","author":"MB Farah","year":"2020","unstructured":"Farah MB, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:105777","journal-title":"Opt Laser Technol"},{"key":"10986_CR11","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","volume":"115","author":"L Gong","year":"2019","unstructured":"Gong L, Qiu K, Deng C, Zhou N (2019) An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt Laser Technol 115:257\u2013267","journal-title":"Opt Laser Technol"},{"key":"10986_CR12","unstructured":"Grabbe JO (2010) The DES algorithm illustrated"},{"key":"10986_CR13","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 83:1123\u20131136","journal-title":"Nonlinear Dyn"},{"key":"10986_CR15","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.vlsi.2021.07.002","volume":"81","author":"MD Gupta","year":"2021","unstructured":"Gupta MD, Chauhan RK (2021) Secure image encryption scheme using 4D-hyperchaotic systems based reconfigurable pseudo-random number generator and S-box. Integration 81:137\u2013159","journal-title":"Integration"},{"key":"10986_CR16","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.1007\/s12652-019-01493-x","volume":"11","author":"A Gupta","year":"2020","unstructured":"Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps: image encryption. J Ambient Intell Humaniz Comput 11:1309\u20131324","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"7","key":"10986_CR17","doi-asserted-by":"publisher","first-page":"10391","DOI":"10.1007\/s11042-020-10116-z","volume":"80","author":"M Gupta","year":"2021","unstructured":"Gupta M, Gupta KK, Shukla PK (2021) Session key based fast, secure and lightweight image encryption algorithm. Multimed Tools Appl 80(7):10391\u201310416","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"10986_CR18","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.3390\/electronics10091066","volume":"10","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Kamal ST, Darwish MM, Papakostas GA (2021) New image encryption algorithm using hyperchaotic system and Fibonacci q-matrix. Electronics 10(9):1066","journal-title":"Electronics"},{"key":"10986_CR19","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s11071-016-3024-6","volume":"87","author":"T Hu","year":"2017","unstructured":"Hu T, Liu Y, Gong LH, Ouyang CJ (2017) An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dyn 87:51\u201366","journal-title":"Nonlinear Dyn"},{"key":"10986_CR20","doi-asserted-by":"publisher","first-page":"8660","DOI":"10.1109\/ACCESS.2018.2890116","volume":"7","author":"Z Hua","year":"2019","unstructured":"Hua Z, Xu B, Jin F, Huang H (2019) Image encryption using Josephus problem and filtering diffusion. IEEE Access 7:8660\u20138674","journal-title":"IEEE Access"},{"key":"10986_CR21","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"issue":"1","key":"10986_CR22","first-page":"43","volume":"18","author":"S Irshad","year":"2018","unstructured":"Irshad S, Soomro TR (2018) Identity theft and social media. Int J Comput Sci Netw Secur 18(1):43\u201355","journal-title":"Int J Comput Sci Netw Secur"},{"key":"10986_CR23","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-981-4585-42-2_17","volume-title":"The 8th international conference on robotic, vision, signal processing and power applications: innovation excellence towards humanistic technology","author":"MA Kader","year":"2014","unstructured":"Kader MA, Ghani F, Ahmad RB (2014) Image transmission over noisy wireless channels using HQAM and median filter. The 8th international conference on robotic, vision, signal processing and power applications: innovation excellence towards humanistic technology. Springer, Singapore, pp 145\u2013152"},{"key":"10986_CR24","doi-asserted-by":"publisher","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855\u201337865","journal-title":"IEEE Access"},{"issue":"2","key":"10986_CR25","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1016\/j.jmaa.2005.11.008","volume":"323","author":"D Li","year":"2006","unstructured":"Li D, Lu JA, Wu X, Chen G (2006) Estimating the ultimate bound and positively invariant set for the Lorenz system and a unified chaotic system. J Math Anal Appl 323(2):844\u2013853","journal-title":"J Math Anal Appl"},{"key":"10986_CR26","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2017","unstructured":"Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87:127\u2013133","journal-title":"Nonlinear Dyn"},{"key":"10986_CR27","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s11071-019-04771-7","volume":"96","author":"M Li","year":"2019","unstructured":"Li M, Lu D, Xiang Y, Zhang Y, Ren H (2019) Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion. Nonlinear Dyn 96:31\u201347","journal-title":"Nonlinear Dyn"},{"key":"10986_CR28","doi-asserted-by":"publisher","first-page":"13792","DOI":"10.1109\/ACCESS.2020.2966264","volume":"8","author":"T Li","year":"2020","unstructured":"Li T, Du B, Liang X (2020) Image encryption algorithm based on logistic and two-dimensional Lorenz. IEEE Access 8:13792\u201313805","journal-title":"IEEE Access"},{"key":"10986_CR31","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"key":"10986_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.105836","volume":"124","author":"Y Luo","year":"2020","unstructured":"Luo Y, Tang S, Liu J, Cao L, Qiu S (2020) Image encryption scheme by combining the hyper-chaotic system with quantum coding. Opt Lasers Eng 124:105836","journal-title":"Opt Lasers Eng"},{"issue":"6","key":"10986_CR34","doi-asserted-by":"publisher","first-page":"8179","DOI":"10.1007\/s11042-022-11917-0","volume":"81","author":"M Lyle","year":"2022","unstructured":"Lyle M, Sarosh P, Parah SA (2022) Adaptive image encryption based on twin chaotic maps. Multimed Tools Appl 81(6):8179\u20138198","journal-title":"Multimed Tools Appl"},{"key":"10986_CR35","first-page":"36","volume":"34","author":"K Mali","year":"2015","unstructured":"Mali K, Chakraborty S, Roy M (2015) A study on statistical analysis and security evaluation parameters in image encryption. Entropy 34:36","journal-title":"Entropy"},{"key":"10986_CR36","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.ins.2019.04.007","volume":"491","author":"P Mani","year":"2019","unstructured":"Mani P, Rajan R, Shanmugam L, Joo YH (2019) Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption. Inf Sci 491:74\u201389","journal-title":"Inf Sci"},{"key":"10986_CR37","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s10676-017-9431-7","volume":"19","author":"AE Marwick","year":"2017","unstructured":"Marwick AE (2017) Scandal or sex crime? Gendered privacy and the celebrity nude photo leaks. Ethics Inf Technol 19:177\u2013191","journal-title":"Ethics Inf Technol"},{"key":"10986_CR38","unstructured":"Milanov E (2009) The RSA algorithm. RSA Lab 1\u201311"},{"key":"10986_CR39","first-page":"117","volume":"45","author":"B Mondal","year":"2019","unstructured":"Mondal B, Singh S, Kumar P (2019) A secure image encryption scheme based on cellular automata and chaotic skew tent map. J Inf Secur Appl 45:117\u2013130","journal-title":"J Inf Secur Appl"},{"key":"10986_CR42","volume":"54","author":"F Musanna","year":"2020","unstructured":"Musanna F, Kumar S (2020) A novel image encryption algorithm using chaotic compressive sensing and nonlinear exponential function. J Inf Secur Appl 54:102560","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"10986_CR43","first-page":"533","volume":"13","author":"N Nandy","year":"2021","unstructured":"Nandy N, Banerjee D, Pradhan C (2021) Color image encryption using DNA based cryptography. Int J Inf Technol 13(2):533\u2013540","journal-title":"Int J Inf Technol"},{"key":"10986_CR44","doi-asserted-by":"publisher","first-page":"2877","DOI":"10.1007\/s11071-020-05625-3","volume":"100","author":"PK Naskar","year":"2020","unstructured":"Naskar PK, Bhattacharyya S, Nandy D, Chaudhuri A (2020) A robust image encryption scheme using chaotic tent map and cellular automata. Nonlinear Dyn 100:2877\u20132898","journal-title":"Nonlinear Dyn"},{"key":"10986_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2019.163505","volume":"202","author":"H Nematzadeh","year":"2020","unstructured":"Nematzadeh H, Enayatifar R, Yadollahi M, Lee M, Jeong G (2020) Binary search tree image encryption with DNA. Optik 202:163505","journal-title":"Optik"},{"key":"10986_CR46","first-page":"111","volume":"40","author":"KAK Patro","year":"2018","unstructured":"Patro KAK, Acharya B (2018) Secure multi\u2013level permutation operation based multiple colour image encryption. J Inf Secur Appl 40:111\u2013133","journal-title":"J Inf Secur Appl"},{"key":"10986_CR47","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1007\/s00542-019-04395-2","volume":"25","author":"KAK Patro","year":"2019","unstructured":"Patro KAK, Acharya B, Nath V (2019) Secure multilevel permutation-diffusion based image encryption using chaotic and hyper-chaotic maps. Microsyst Technol 25:4593\u20134607","journal-title":"Microsyst Technol"},{"issue":"2","key":"10986_CR48","doi-asserted-by":"publisher","first-page":"27","DOI":"10.3390\/data9020027","volume":"9","author":"GA Pimenta Rodrigues","year":"2024","unstructured":"Pimenta Rodrigues GA, Marques Serrano AL, LE Lemos AN, Canedo ED, Mendon\u00e7a FLLD, de Oliveira Albuquerque R, Garc\u00eda Villalba LJ (2024) Understanding data breach from a global perspective: incident visualization and data protection law review. Data 9(2):27","journal-title":"Data"},{"key":"10986_CR49","doi-asserted-by":"publisher","first-page":"18415","DOI":"10.1007\/s11042-018-5663-8","volume":"77","author":"M Qasaimeh","year":"2018","unstructured":"Qasaimeh M, Al-Qassas RS, Tedmori S (2018) Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security. Multimed Tools Appl 77:18415\u201318449","journal-title":"Multimed Tools Appl"},{"key":"10986_CR50","doi-asserted-by":"crossref","unstructured":"Ramya MS, Soman PS, Deepthi LR (2017) A novel approach for image security using reversible watermarking. In: 2017 international conference on advances in computing, communications and informatics (ICACCI), IEEE, pp 338-343","DOI":"10.1109\/ICACCI.2017.8125849"},{"key":"10986_CR51","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/j.procs.2017.10.079","volume":"116","author":"R Riyaldhi","year":"2017","unstructured":"Riyaldhi R, Kurniawan A (2017) Improvement of advanced encryption standard algorithm with shift row and S. box modification mapping in mix column. Proc Comput Sci 116:401\u2013407","journal-title":"Proc Comput Sci"},{"issue":"2","key":"10986_CR52","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.joen.2012.09.016","volume":"39","author":"AA Russell","year":"2013","unstructured":"Russell AA, Chandler NP, Hauman C, Siddiqui AY, Tompkins GR (2013) The butterfly effect: an investigation of sectioned roots. J Endod 39(2):208\u2013210","journal-title":"J Endod"},{"issue":"34","key":"10986_CR53","first-page":"17","volume":"9","author":"P Samhita","year":"2016","unstructured":"Samhita P, Prasad P, Patro KAK, Acharya B (2016) A secure chaos-based image encryption and decryption using crossover and mutation operator. Int J Control Theory Appl 9(34):17\u201328","journal-title":"Int J Control Theory Appl"},{"key":"10986_CR54","doi-asserted-by":"publisher","first-page":"59108","DOI":"10.1109\/ACCESS.2021.3071535","volume":"9","author":"A Shafique","year":"2021","unstructured":"Shafique A, Ahmed J, Rehman MU, Hazzazi MM (2021) Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain. IEEE Access 9:59108\u201359130","journal-title":"IEEE Access"},{"issue":"4","key":"10986_CR55","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"10986_CR56","doi-asserted-by":"publisher","DOI":"10.1201\/9780429398490","volume-title":"Nonlinear dynamics and chaos: with applications to physics, biology, chemistry, and engineering","author":"SH Strogatz","year":"2024","unstructured":"Strogatz SH (2024) Nonlinear dynamics and chaos: with applications to physics, biology, chemistry, and engineering. Chapman and Hall\/CRC, Boca Raton"},{"key":"10986_CR57","doi-asserted-by":"publisher","first-page":"5429","DOI":"10.1007\/s11042-014-1861-1","volume":"74","author":"Z Tang","year":"2015","unstructured":"Tang Z, Zhang X, Lan W (2015) Efficient image encryption with block shuffling and chaotic map. Multimed Tools Appl 74:5429\u20135448","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10986_CR58","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514\u2013522","journal-title":"Appl Soft Comput"},{"key":"10986_CR59","doi-asserted-by":"publisher","first-page":"62272","DOI":"10.1109\/ACCESS.2018.2875676","volume":"6","author":"X Wang","year":"2018","unstructured":"Wang X, Hou Y, Wang S, Li R (2018) A new image encryption algorithm based on CML and DNA sequence. IEEE Access 6:62272\u201362285","journal-title":"IEEE Access"},{"key":"10986_CR60","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"C Wang","year":"2019","unstructured":"Wang C, Wang X, Xia Z, Zhang C (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109\u2013120","journal-title":"Inf Sci"},{"key":"10986_CR61","doi-asserted-by":"publisher","first-page":"18317","DOI":"10.1007\/s11042-020-08742-8","volume":"79","author":"Y Wang","year":"2020","unstructured":"Wang Y, Wu C, Kang S, Wang Q, Mikulovich VI (2020) Multi-channel chaotic encryption algorithm for color image based on DNA coding. Multimed Tools Appl 79:18317\u201318342","journal-title":"Multimed Tools Appl"},{"key":"10986_CR62","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1007\/s11071-021-07017-7","volume":"107","author":"X Wang","year":"2022","unstructured":"Wang X, Su Y, Xu M, Zhang H, Zhang Y (2022) A new image encryption algorithm based on Latin square matrix. Nonlinear Dyn 107:1277\u20131293","journal-title":"Nonlinear Dyn"},{"key":"10986_CR63","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.ins.2019.03.032","volume":"489","author":"S Weng","year":"2019","unstructured":"Weng S, Shi Y, Hong W, Yao Y (2019) Dynamic improved pixel value ordering reversible data hiding. Inf Sci 489:136\u2013154","journal-title":"Inf Sci"},{"key":"10986_CR64","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/1282","author":"M Westerlund","year":"2019","unstructured":"Westerlund M (2019) The emergence of deepfake technology: a review. Technol Innov Manag Rev. https:\/\/doi.org\/10.22215\/timreview\/1282","journal-title":"Technol Innov Manag Rev"},{"key":"10986_CR65","doi-asserted-by":"crossref","unstructured":"Witman PD, Mackelprang S (2022) The 2020 Twitter Hack\u2013So Many Lessons to Be Learned. J Cybersecur Educ Res Pract 2021(2)","DOI":"10.62915\/2472-2707.1089"},{"issue":"2","key":"10986_CR66","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Select Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"Cyber J Multidiscip J Sci Technol J Select Areas Telecommun (JSAT)"},{"issue":"41","key":"10986_CR67","doi-asserted-by":"publisher","first-page":"30329","DOI":"10.1007\/s11042-020-09595-x","volume":"79","author":"H Xiang","year":"2020","unstructured":"Xiang H, Liu L (2020) An improved digital logistic map and its application in image encryption. Multimed Tools Appl 79(41):30329\u201330355","journal-title":"Multimed Tools Appl"},{"key":"10986_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/7913061","volume":"2020","author":"S Xiao","year":"2020","unstructured":"Xiao S, Yu Z, Deng Y (2020) Design and analysis of a novel chaos-based image encryption algorithm via switch control mechanism. Secur Commun Netw 2020:1\u201312","journal-title":"Secur Commun Netw"},{"key":"10986_CR69","doi-asserted-by":"publisher","first-page":"208718","DOI":"10.1109\/ACCESS.2020.3038183","volume":"8","author":"X Yan","year":"2020","unstructured":"Yan X, Wang X, Xian Y (2020) Chaotic image encryption algorithm based on fractional order scrambling wavelet transform and 3D cyclic displacement operation. IEEE Access 8:208718\u2013208736","journal-title":"IEEE Access"},{"key":"10986_CR71","doi-asserted-by":"publisher","first-page":"10949","DOI":"10.1007\/s11042-020-10218-8","volume":"80","author":"X Yan","year":"2021","unstructured":"Yan X, Wang X, Xian Y (2021) Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimed Tools Appl 80:10949\u201310983","journal-title":"Multimed Tools Appl"},{"key":"10986_CR72","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105703","volume":"120","author":"S Yao","year":"2019","unstructured":"Yao S, Chen L, Zhong Y (2019) An encryption system for color image based on compressive sensing. Opt Laser Technol 120:105703","journal-title":"Opt Laser Technol"},{"key":"10986_CR73","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/BF01011583","volume":"31","author":"T Yoshida","year":"1983","unstructured":"Yoshida T, Mori H, Shigematsu H (1983) Analytic study of chaos of the tent map: band structures, power spectra, and critical behaviors. J Stat Phys 31:279\u2013308","journal-title":"J Stat Phys"},{"issue":"2","key":"10986_CR74","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1016\/j.chaos.2009.03.016","volume":"42","author":"Y Yu","year":"2009","unstructured":"Yu Y, Li HX, Wang S, Yu J (2009) Dynamic analysis of a fractional-order Lorenz chaotic system. Chaos Solitons Fract 42(2):1181\u20131189","journal-title":"Chaos Solitons Fract"},{"issue":"1","key":"10986_CR75","doi-asserted-by":"publisher","first-page":"013021","DOI":"10.1117\/1.JEI.26.1.013021","volume":"26","author":"K Zhan","year":"2017","unstructured":"Zhan K, Wei D, Shi J, Yu J (2017) Cross-utilizing hyperchaotic and DNA sequences for image encryption. J Electron Imaging 26(1):013021\u2013013021","journal-title":"J Electron Imaging"},{"key":"10986_CR76","unstructured":"Zhang H (2010) Chaos synchronization and its application to secure communication"},{"issue":"10","key":"10986_CR77","doi-asserted-by":"publisher","first-page":"3653","DOI":"10.1016\/j.cnsns.2014.03.016","volume":"19","author":"LY Zhang","year":"2014","unstructured":"Zhang LY, Hu X, Liu Y, Wong KW, Gan J (2014) A chaotic image encryption scheme owning temp-value feedback. Commun Nonlinear Sci Numer Simul 19(10):3653\u20133659","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"4","key":"10986_CR78","first-page":"1","volume":"10","author":"X Zhang","year":"2018","unstructured":"Zhang X, Zhou Z, Niu Y (2018) An image encryption method based on the Feistel network and dynamic DNA encoding. IEEE PhotonJ 10(4):1\u201314","journal-title":"IEEE PhotonJ"},{"issue":"3","key":"10986_CR79","doi-asserted-by":"publisher","first-page":"361","DOI":"10.3390\/e23030361","volume":"23","author":"D Zhang","year":"2021","unstructured":"Zhang D, Chen L, Li T (2021) Hyper-chaotic color image encryption based on transformed zigzag diffusion and RNA operation. Entropy 23(3):361","journal-title":"Entropy"},{"issue":"1","key":"10986_CR80","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29\u201337","journal-title":"Opt Commun"},{"issue":"8","key":"10986_CR81","doi-asserted-by":"publisher","first-page":"790","DOI":"10.3390\/e21080790","volume":"21","author":"S Zhu","year":"2019","unstructured":"Zhu S, Wang G, Zhu C (2019) A secure and fast image encryption scheme based on double chaotic S-boxes. Entropy 21(8):790","journal-title":"Entropy"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10986-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-025-10986-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10986-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T09:04:21Z","timestamp":1772096661000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-025-10986-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,21]]},"references-count":74,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["10986"],"URL":"https:\/\/doi.org\/10.1007\/s00500-025-10986-1","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,21]]},"assertion":[{"value":"20 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}