{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:26:15Z","timestamp":1764174375813},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T00:00:00Z","timestamp":1493251200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s00521-017-2970-3","type":"journal-article","created":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T09:59:22Z","timestamp":1493287162000},"page":"3847-3857","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":60,"title":["A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation"],"prefix":"10.1007","volume":"30","author":[{"given":"Jawad","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Muazzam Ali","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Fawad","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Jan Sher","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,27]]},"reference":[{"issue":"3","key":"2970_CR1","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1109\/TMM.2008.917355","volume":"10","author":"G Jakimoski","year":"2008","unstructured":"Jakimoski G, Subbalakshmi K (2008) Cryptanalysis of some multimedia encryption schemes. IEEE Trans Multimed 10(3):330\u2013338","journal-title":"IEEE Trans Multimed"},{"key":"2970_CR2","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"2970_CR3","unstructured":"Elashry IE (2010) Digital image encryption. MS thesis, Department of computer science and engineering, Faculty of electronic engineering, Menofia University"},{"key":"2970_CR4","unstructured":"Ahmed J, Hwang SO A fast encryption\/decryption scheme for biometric images using multiple chaotic maps. In: IMTIC\u201915\u2013international multi-topic conference. p 104"},{"key":"2970_CR5","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.physa.2014.01.051","volume":"402","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) Spatiotemporal chaos in mixed linear\u2013nonlinear coupled logistic map lattice. Physica A: Statistical Mechanics and Its Applications 402:104\u2013118","journal-title":"Physica A: Statistical Mechanics and Its Applications"},{"key":"2970_CR6","unstructured":"Zeng W, Yu H, Lin C (2006) Multimedia security technologies for digital rights management. Academic Press"},{"issue":"3","key":"2970_CR7","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1007\/s11071-014-1331-3","volume":"77","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687\u2013698","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"2970_CR8","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"XY Wang","year":"2010","unstructured":"Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615\u2013621","journal-title":"Nonlinear Dyn"},{"key":"2970_CR9","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.asoc.2014.09.039","volume":"26","author":"YQ Zhang","year":"2015","unstructured":"Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10\u201320","journal-title":"Appl Soft Comput"},{"key":"2970_CR10","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.optlaseng.2016.02.002","volume":"82","author":"YQ Zhang","year":"2016","unstructured":"Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the mlncml system using dna sequences. Opt Lasers Eng 82:95\u2013103","journal-title":"Opt Lasers Eng"},{"key":"2970_CR11","volume-title":"Applied Cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier B (1996) Applied Cryptography. Wiley, USA"},{"key":"2970_CR12","first-page":"25","volume":"23","author":"J Ahmad","year":"2010","unstructured":"Ahmad J (2010) Efficiency analysis and security evaluation of image encryption schemes. computing 23:25","journal-title":"computing"},{"issue":"1","key":"2970_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13319-016-0084-9","volume":"7","author":"AU Rehman","year":"2016","unstructured":"Rehman AU, Khan JS, Ahmad J, Hwang SO (2016) A new image encryption scheme based on dynamic s-boxes and chaotic maps. 3D Research 7(1):1\u20138","journal-title":"3D Research"},{"key":"2970_CR14","unstructured":"Chen Y, Chang L (2001) A secure and robust digital watermarking technique by the block cipher rc6 and secure hash algorithm. In: Proceedings of the 2001 international conference on image processing, 2001. IEEE, vol 2, pp 518\u2013521"},{"issue":"10","key":"2970_CR15","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320\u20133327","journal-title":"Computers & Mathematics with Applications"},{"issue":"5","key":"2970_CR16","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X, et al. (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"issue":"16","key":"2970_CR17","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16):3895\u20133903","journal-title":"Opt Commun"},{"key":"2970_CR18","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"2970_CR19","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101\u20131108","journal-title":"Signal Process"},{"issue":"2","key":"2970_CR20","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1016\/j.cnsns.2007.10.011","volume":"14","author":"XY Wang","year":"2009","unstructured":"Wang XY, Yu Q (2009) A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Commun Nonlinear Sci Numer Simul 14(2):574\u2013581","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"11","key":"2970_CR21","doi-asserted-by":"crossref","first-page":"3075","DOI":"10.1016\/j.cnsns.2013.04.008","volume":"18","author":"X Wang","year":"2013","unstructured":"Wang X, Luan D (2013) A novel image encryption algorithm using chaos and reversible cellular automata. Commun Nonlinear Sci Numer Simul 18(11):3075\u20133085","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"9","key":"2970_CR22","doi-asserted-by":"crossref","first-page":"2479","DOI":"10.1016\/j.cnsns.2009.10.001","volume":"15","author":"XY Wang","year":"2010","unstructured":"Wang XY, Chen F, Wang T (2010) A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun Nonlinear Sci Numer Simul 15(9):2479\u20132485","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"2970_CR23","doi-asserted-by":"crossref","unstructured":"Spanos G, Maples T (1995) Performance study of a selective encryption scheme for the security of networked, real-time video. In: icccn, p. 0002, Published by the IEEE computer society.","DOI":"10.1109\/ICCCN.1995.540095"},{"issue":"4","key":"2970_CR24","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"issue":"5","key":"2970_CR25","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/MCOM.2004.1299355","volume":"42","author":"T Lookabaugh","year":"2004","unstructured":"Lookabaugh T, Sicker D (2004) Selective encryption for consumer applications. IEEE Commun Mag 42 (5):124\u2013129","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"2970_CR26","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1007\/s11277-015-2667-9","volume":"84","author":"J Ahmad","year":"2015","unstructured":"Ahmad J, Hwang SO, Ali A (2015) An experimental comparison of chaotic and non-chaotic image encryption schemes. Wirel Pers Commun 84(2):901\u2013918","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"2970_CR27","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1007\/s11071-015-2281-0","volume":"82","author":"J Ahmad","year":"2015","unstructured":"Ahmad J, Hwang SO (2015) Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dyn 82(4):1839\u20131850","journal-title":"Nonlinear Dyn"},{"key":"2970_CR28","unstructured":"Ahmad J, Hwang SO (2015) A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications:1\u201326"},{"key":"2970_CR29","unstructured":"Khan J, Ahmad J, Hwang SO (2015) An efficient image encryption scheme based on: Henon map, skew tent map and s-box 2015 6th international conference on modeling, simulation, and applied optimization (ICMSAO). IEEE, pp 1\u20136"},{"key":"2970_CR30","unstructured":"Bin Younas M, Ahmad J (2014) Comparative analysis of chaotic and non-chaotic image encryption schemes 2014 international conference on emerging technologies (ICET). IEEE, pp 81\u201386"},{"issue":"5","key":"2970_CR31","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1007\/s00521-014-1800-0","volume":"26","author":"M Khan","year":"2015","unstructured":"Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput & Applic 26 (5):1137\u20131148","journal-title":"Neural Comput & Applic"},{"key":"2970_CR32","doi-asserted-by":"crossref","first-page":"033002","DOI":"10.1117\/1.3167847","volume":"18","author":"I Elashry","year":"2009","unstructured":"Elashry I, Allah O, Abbas A, El-Rabaie S, El-Samie F (2009) Homomorphic image encryption. J Electron Imaging 18:033002","journal-title":"J Electron Imaging"},{"issue":"1","key":"2970_CR33","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11071-012-0440-0","volume":"70","author":"I Hussain","year":"2012","unstructured":"Hussain I, Shah T, Gondal MA (2012) Image encryption algorithm based on pgl (2, gf (28)) s-boxes and td-ercs chaotic sequence. Nonlinear Dyn 70(1):181\u2013187","journal-title":"Nonlinear Dyn"},{"key":"2970_CR34","unstructured":"Elkamchouchi H, Makar M (2005) Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers NRSC 2005 Proceedings of the 22nd national radio science conference, 2005. IEEE, pp 277\u2013284"},{"issue":"1","key":"2970_CR35","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67(1):557\u2013566","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"2970_CR36","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1007\/s11071-011-9984-7","volume":"67","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L (2012) An image blocks encryption algorithm based on spatiotemporal chaos. Nonlinear Dyn 67(1):365\u2013371","journal-title":"Nonlinear Dyn"},{"key":"2970_CR37","doi-asserted-by":"crossref","unstructured":"Gray R (2010) Entropy and information theory, Springer Verlag","DOI":"10.1007\/978-1-4419-7970-4_3"},{"issue":"4","key":"2970_CR38","first-page":"245","volume":"3","author":"H Ahmed","year":"2017","unstructured":"Ahmed H, Kalash H, Allah O (2017) Implementation of RC5 block cipher algorithm for image cryptosystems. Int J Inf Technol 3(4):245\u2013250","journal-title":"Int J Inf Technol"},{"key":"2970_CR39","unstructured":"Ahmed F, Siyal M, Abbas V (2010) A perceptually scalable and jpeg compression tolerant image encryption scheme 2010 4th pacific-rim symposium on image and video technology (PSIVT). IEEE, pp 232\u2013238"},{"issue":"4","key":"2970_CR40","doi-asserted-by":"crossref","first-page":"2771","DOI":"10.1007\/s11277-014-1667-5","volume":"77","author":"F Ahmed","year":"2014","unstructured":"Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A noisy channel tolerant image encryption scheme. Wirel Pers Commun 77(4):2771\u20132791","journal-title":"Wirel Pers Commun"},{"issue":"9","key":"2970_CR41","doi-asserted-by":"crossref","first-page":"3106","DOI":"10.1016\/j.cnsns.2014.02.011","volume":"19","author":"A Anees","year":"2014","unstructured":"Anees A, Siddiqui AM, Ahmed F (2014) Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul 19(9):3106\u20133118","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"2970_CR42","unstructured":"Ahmad J, Khan MA, Hwang SO, Khan JS (2016) A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Comput & Applic:1\u201315"},{"key":"2970_CR43","unstructured":"Khan JS, ur Rehman A, Ahmad J, Habib Z (2015) A new chaos-based secure image encryption scheme using multiple substitution boxes 2015 conference on information assurance and cyber security (CIACS). IEEE, pp 16\u201321"},{"key":"2970_CR44","unstructured":"Jolfaei A, Mirghadri A (2010) Survey: image encryption using salsa20. Int J Comput Sci Issues 7(5)"},{"key":"2970_CR45","unstructured":"Khan MA, Ahmad J, Javaid Q, Saqib NA (2016) An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. J Mod Opt:1\u201310"},{"issue":"1","key":"2970_CR46","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/s11071-016-3028-2","volume":"87","author":"JS Khan","year":"2017","unstructured":"Khan JS, Ahmad J, Khan MA (2017) Td-ercs map-based confusion and diffusion of autocorrelated data. Nonlinear Dyn 87(1):93\u2013107","journal-title":"Nonlinear Dyn"},{"key":"2970_CR47","unstructured":"Mohamed A, Zaibi G, Kachouri A (2011) Implementation of rc5 and rc6 block ciphers on digital images 2011 8th international multi-conference on systems, signals and devices (SSD). IEEE, pp 1\u20136"},{"issue":"8B","key":"2970_CR48","first-page":"125","volume":"6","author":"Z Liehuang","year":"2006","unstructured":"Liehuang Z, Wenzhuo L, Lejian L, Hong L (2006) A novel image scrambling algorithm for digital watermarking based on chaotic sequences. Int J Comput Sci Netw Secur 6(8B):125\u2013 130","journal-title":"Int J Comput Sci Netw Secur"},{"issue":"3","key":"2970_CR49","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1007\/s11071-013-1086-2","volume":"75","author":"X Wang","year":"2014","unstructured":"Wang X, Wang Q (2014) A novel image encryption algorithm based on dynamic s-boxes constructed by chaos. Nonlinear Dyn 75(3):567\u2013576","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"2970_CR50","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1007\/s11071-012-0409-z","volume":"69","author":"G Ye","year":"2012","unstructured":"Ye G, Wong KW (2012) An efficient chaotic image encryption algorithm based on a generalized arnold map. Nonlinear dyn 69(4):2079\u20132087","journal-title":"Nonlinear dyn"},{"key":"2970_CR51","doi-asserted-by":"crossref","unstructured":"Mao Y, Chen G (2005) Chaos-based image encryption. Handbook of Geometric Computing:231\u2013265","DOI":"10.1007\/3-540-28247-5_8"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-017-2970-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-017-2970-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-017-2970-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,22]],"date-time":"2019-09-22T03:59:29Z","timestamp":1569124769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-017-2970-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,27]]},"references-count":51,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["2970"],"URL":"https:\/\/doi.org\/10.1007\/s00521-017-2970-3","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,27]]}}}