{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:19:00Z","timestamp":1760955540963},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,3,27]],"date-time":"2015-03-27T00:00:00Z","timestamp":1427414400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s00521-015-1888-x","type":"journal-article","created":{"date-parts":[[2015,3,26]],"date-time":"2015-03-26T15:06:19Z","timestamp":1427382379000},"page":"687-697","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Color pathological image encryption scheme with S-boxes generated by complex chaotic system and environmental noise"],"prefix":"10.1007","volume":"27","author":[{"given":"Guoyan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Abdurahman","family":"Kadir","sequence":"additional","affiliation":[]},{"given":"Hongjun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,27]]},"reference":[{"issue":"36","key":"1888_CR1","doi-asserted-by":"crossref","first-page":"3733","DOI":"10.1016\/j.physleta.2010.07.019","volume":"374","author":"F \u00d6zkaynak","year":"2010","unstructured":"\u00d6zkaynak F, \u00d6zer AB (2010) A method for designing strong S-Boxes based on chaotic Lorenz system. Phys Lett A 374(36):3733\u20133738","journal-title":"Phys Lett A"},{"key":"1888_CR2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.optlastec.2014.01.018","volume":"61","author":"I Hussain","year":"2014","unstructured":"Hussain I, Azam NA (2014) Tariq Shah. Stego optical encryption based on chaotic S-box transformation. Opt Laser Technol 61:50\u201356","journal-title":"Opt Laser Technol"},{"issue":"9\u201310","key":"1888_CR3","doi-asserted-by":"crossref","first-page":"2576","DOI":"10.1016\/j.mcm.2013.01.009","volume":"57","author":"I Hussain","year":"2013","unstructured":"Hussain I, Shah T, Gondal MA (2013) Application of image-box and chaotic map for image encryption. Math Comput Model 57(9\u201310):2576\u20132579","journal-title":"Math Comput Model"},{"issue":"2","key":"1888_CR4","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1007\/s11071-013-1214-z","volume":"76","author":"I Hussain","year":"2014","unstructured":"Hussain I, Gondal MA (2014) An extended image encryption using chaotic coupled map and S-box transformation. Nonlinear Dyn 76(2):1355\u20131363","journal-title":"Nonlinear Dyn"},{"issue":"14","key":"1888_CR5","doi-asserted-by":"crossref","first-page":"2133","DOI":"10.1177\/1077546313482960","volume":"20","author":"I Hussain","year":"2014","unstructured":"Hussain I, Shah T, Gondal MA (2014) Image encryption algorithm based on total shuffling scheme and chaotic S-box transformation. J Vib Control 20(14):2133\u20132136","journal-title":"J Vib Control"},{"issue":"1","key":"1888_CR6","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11071-012-0440-0","volume":"70","author":"I Hussain","year":"2012","unstructured":"Hussain I, Shah T, Gondal MA (2012) Image encryption algorithm based on PGL(2, GF(28)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dyn 70(1):181\u2013187","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"1888_CR7","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.cnsns.2013.06.017","volume":"19","author":"A Akhshani","year":"2014","unstructured":"Akhshani A, Akhavan A, Mobaraki A et al (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101\u2013111","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"1888_CR8","volume-title":"Applied cryptography: protocols, algorithms, and source code in C","author":"B Schneier","year":"2007","unstructured":"Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley, New Jersey"},{"issue":"3","key":"1888_CR9","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1016\/j.cnsns.2013.07.016","volume":"19","author":"JSAE Fouda","year":"2014","unstructured":"Fouda JSAE, Effa JY, Sabat SL et al (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19(3):578\u2013588","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"1888_CR10","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"issue":"1\u20132","key":"1888_CR11","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s11071-014-1304-6","volume":"77","author":"MS Farash","year":"2014","unstructured":"Farash MS, Attari MA (2014) An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn 77(1\u20132):399\u2013411","journal-title":"Nonlinear Dyn"},{"key":"1888_CR12","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.amc.2014.05.102","volume":"243","author":"FC Zhang","year":"2014","unstructured":"Zhang FC, Zhang GY (2014) Boundedness solutions of the complex Lorenz chaotic system. Appl Math Comput 243:12\u201323","journal-title":"Appl Math Comput"},{"issue":"3","key":"1888_CR13","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1002\/mma.2793","volume":"37","author":"EE Mahmoud","year":"2014","unstructured":"Mahmoud EE (2014) Complex complete synchronization of two nonidentical hyperchaotic complex nonlinear systems. Math Methods Appl Sci 37(3):321\u2013328","journal-title":"Math Methods Appl Sci"},{"key":"1888_CR14","first-page":"1220","volume":"631","author":"JW Fan","year":"2013","unstructured":"Fan JW, Zhao N, Gao Y et al (2013) Function synchronization of the fractional-order chaotic system. Adv Mater Res 631:1220\u20131225","journal-title":"Adv Mater Res"},{"issue":"1\u20132","key":"1888_CR15","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11071-012-0656-z","volume":"71","author":"C Luo","year":"2013","unstructured":"Luo C, Wang XY (2013) Chaos in the fractional-order complex Lorenz system and its synchronization. Nonlinear Dyn 71(1\u20132):241\u2013257","journal-title":"Nonlinear Dyn"},{"key":"1888_CR16","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.ieri.2014.09.069","volume":"10","author":"PS Menon","year":"2014","unstructured":"Menon PS, Ritwik M (2014) A comprehensive but not complicated survey on quantum computing. IERI Proced 10:144\u2013152","journal-title":"IERI Proced"},{"key":"1888_CR17","first-page":"126","volume-title":"Attacking code-based cryptosystems with information set decoding using special-purpose hardware[M]\/\/post-quantum cryptography","author":"S Heyse","year":"2014","unstructured":"Heyse S, Zimmermann R, Paar C (2014) Attacking code-based cryptosystems with information set decoding using special-purpose hardware[M]\/\/post-quantum cryptography. Springer International Publishing, New York, pp 126\u2013141"},{"key":"1888_CR18","unstructured":"NIST, Guide to the Statistical Tests, http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/rng\/stats_tests.html , 2014"},{"issue":"2","key":"1888_CR19","first-page":"539","volume":"52","author":"H Hermassi","year":"2013","unstructured":"Hermassi H, Rhouma R, Belghith S (2013) Improvement of an image encryption algorithm based on hyper-chaos. Telecommun Syst 52(2):539\u2013549","journal-title":"Telecommun Syst"},{"issue":"18","key":"1888_CR20","doi-asserted-by":"crossref","first-page":"3527","DOI":"10.1016\/j.ijleo.2012.10.068","volume":"124","author":"H Liu","year":"2013","unstructured":"Liu H, Wang X, Kadir A (2013) Color image encryption using Choquet fuzzy integral and hyper chaotic system. Optik Int J Light Elect Opt 124(18):3527\u20133533","journal-title":"Optik Int J Light Elect Opt"},{"issue":"4","key":"1888_CR21","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.aeue.2013.10.002","volume":"68","author":"D Xiao","year":"2014","unstructured":"Xiao D, Zhang YS (2014) Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU Int J Elect Commun 68(4):361\u2013368","journal-title":"AEU Int J Elect Commun"},{"issue":"5","key":"1888_CR22","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202\u20131215","journal-title":"Signal Process"},{"key":"1888_CR23","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.compbiomed.2013.11.010","volume":"45","author":"G Liu","year":"2014","unstructured":"Liu G, Li J, Liu H (2014) Chaos-based color pathological image encryption scheme using one-time keys. Comput Biol Med 45:111\u2013117","journal-title":"Comput Biol Med"},{"key":"1888_CR24","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1016\/j.ins.2014.02.131","volume":"270","author":"M Zanin","year":"2014","unstructured":"Zanin M, Pisarchik AN (2014) Gray code permutation algorithm for high-dimensional data encryption. Inf Sci 270:288\u2013297","journal-title":"Inf Sci"},{"issue":"2","key":"1888_CR25","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","volume":"78","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn 78(2):995\u20131015","journal-title":"Nonlinear Dyn"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-015-1888-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-015-1888-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-015-1888-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T01:29:22Z","timestamp":1717810162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-015-1888-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,27]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["1888"],"URL":"https:\/\/doi.org\/10.1007\/s00521-015-1888-x","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,27]]}}}