{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T18:16:32Z","timestamp":1775672192947,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T00:00:00Z","timestamp":1503619200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s00521-017-3195-1","type":"journal-article","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T18:54:18Z","timestamp":1503600858000},"page":"2395-2405","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys"],"prefix":"10.1007","volume":"31","author":[{"given":"Obaida M.","family":"Al-Hazaimeh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammad F.","family":"Al-Jamal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nouh","family":"Alhindawi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abedalkareem","family":"Omari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,8,25]]},"reference":[{"key":"3195_CR1","first-page":"10","volume-title":"Starting with parabolas: an introduction to chaotic dynamics","author":"B-L Hao","year":"1993","unstructured":"Hao B-L (1993) Starting with parabolas: an introduction to chaotic dynamics. Shanghai Scientific and Technological Education Publishing House, Shanghai, pp 10\u201312"},{"key":"3195_CR2","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1142\/S0218127496000023","volume":"6","author":"R Brown","year":"1996","unstructured":"Brown R, Chua LO (1996) Clarifying chaos: examples and counterexamples. Int J Bifurc Chaos 6:219\u2013249","journal-title":"Int J Bifurc Chaos"},{"key":"3195_CR3","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1063\/1.1772731","volume":"14","author":"H L\u00fc","year":"2004","unstructured":"L\u00fc H, Wang S, Li X, Tang G, Kuang J, Ye W et al (2004) A new spatiotemporally chaotic cryptosystem and its security and performance analyses. Chaos Interdiscip J Nonlinear Sci 14:617\u2013629","journal-title":"Chaos Interdiscip J Nonlinear Sci"},{"key":"3195_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1:6\u201321","journal-title":"IEEE Circuits Syst Mag"},{"key":"3195_CR5","unstructured":"Ephin M, Joy JA, Vasanthi N (2013) Survey of Chaos based Image encryption and decryption techniques. In International journal of computer applications. Proceedings of the 2rd international conference on amrita international conference of women in computing, 2013, pp 1\u20135"},{"key":"3195_CR6","first-page":"65","volume":"7","author":"OM Al-hazaimeh","year":"2014","unstructured":"Al-hazaimeh OM (2014) A novel encryption scheme for digital image-based on one dimensional logistic map. Comput Inf Sci 7:65","journal-title":"Comput Inf Sci"},{"key":"3195_CR7","unstructured":"Al-Hazaimeh OMA (2010) New cryptographic algorithms for enhancing security of voice data, Ph.D., Universiti Utara Malaysia"},{"key":"3195_CR8","first-page":"240","volume":"9","author":"O Al-Hazaimeh","year":"2012","unstructured":"Al-Hazaimeh O (2012) Increase the security level for real-time application using new key management solution. Int J Comput Sci 9:240\u2013246","journal-title":"Int J Comput Sci"},{"key":"3195_CR9","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1142\/S0218127492000562","volume":"2","author":"U Parlitz","year":"1992","unstructured":"Parlitz U, Chua LO, Kocarev L, Halle K, Shang A (1992) Transmission of digital signals by chaotic synchronization. Int J Bifurc Chaos 2:973\u2013977","journal-title":"Int J Bifurc Chaos"},{"key":"3195_CR10","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/S0960-0779(02)00585-4","volume":"18","author":"M Feki","year":"2003","unstructured":"Feki M (2003) An adaptive chaos synchronization scheme applied to secure communication. Chaos Solitons Fract 18:141\u2013148","journal-title":"Chaos Solitons Fract"},{"key":"3195_CR11","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S Behnia","year":"2008","unstructured":"Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fract 35:408\u2013419","journal-title":"Chaos Solitons Fract"},{"key":"3195_CR12","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.chaos.2004.04.023","volume":"23","author":"G Tang","year":"2005","unstructured":"Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fract 23:413\u2013419","journal-title":"Chaos Solitons Fract"},{"key":"3195_CR13","first-page":"49","volume":"9","author":"OMA Al-Hazaimeh","year":"2012","unstructured":"Al-Hazaimeh OMA (2012) Hiding data in images using new random technique. IJCSI Int J Comput Sci Issues 9:49\u201353","journal-title":"IJCSI Int J Comput Sci Issues"},{"key":"3195_CR14","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"Y-Q Zhang","year":"2014","unstructured":"Zhang Y-Q, Wang X-Y (2014) A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"3195_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"key":"3195_CR16","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1016\/S0960-0779(04)00387-X","volume":"23","author":"D Xiao","year":"2005","unstructured":"Xiao D, Liao X, Wong K (2005) An efficient entire chaos-based scheme for deniable authentication. Chaos Solitons Fract 23:1327\u20131331","journal-title":"Chaos Solitons Fract"},{"key":"3195_CR17","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"X Huang","year":"2014","unstructured":"Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72:57\u201370","journal-title":"Multimed Tools Appl"},{"key":"3195_CR18","first-page":"73","volume":"9","author":"C Zhu","year":"2012","unstructured":"Zhu C, Sun K (2012) Chaotic image encryption algorithm by correlating keys with plaintext. China Commun 9:73\u201379","journal-title":"China Commun"},{"key":"3195_CR19","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.1016\/j.optcom.2011.12.023","volume":"285","author":"X Zhang","year":"2012","unstructured":"Zhang X, Zhu G, Ma S (2012) Remote-sensing image encryption in hybrid domains. Opt Commun 285:1736\u20131743","journal-title":"Opt Commun"},{"key":"3195_CR20","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85:290\u2013299","journal-title":"J Syst Softw"},{"key":"3195_CR21","doi-asserted-by":"publisher","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17:2943\u20132959","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3195_CR22","doi-asserted-by":"publisher","first-page":"95","DOI":"10.5121\/ijcnc.2013.5208","volume":"5","author":"OMA Al-Hazaimeh","year":"2013","unstructured":"Al-Hazaimeh OMA (2013) A new approach for complex encrypting and decrypting data. Int J Comput Netw Commun 5:95","journal-title":"Int J Comput Netw Commun"},{"key":"3195_CR23","unstructured":"Soto J (1999) Statistical testing of random number generators. In: Proceedings of the 22nd national information systems security conference, 1999, p 12"},{"key":"3195_CR24","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/584091.584093","volume":"5","author":"CE Shannon","year":"2001","unstructured":"Shannon CE (2001) A mathematical theory of communication. ACM SIGMOBILE Mob Comput Commun Rev 5:3\u201355","journal-title":"ACM SIGMOBILE Mob Comput Commun Rev"},{"key":"3195_CR25","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926\u2013934","journal-title":"Image Vis Comput"},{"key":"3195_CR26","first-page":"57","volume":"15","author":"CE Shannon","year":"1997","unstructured":"Shannon CE (1997) Communication theory of secrecy systems. 1945. MD Comput Comput Med Pract 15:57\u201364","journal-title":"MD Comput Comput Med Pract"},{"key":"3195_CR27","unstructured":"Obaida M, Nouh A, Sofyan H, Ammar A (2004) HANON chaotic map-based new digital image encryption algorithm, MAGNT research report 2014"},{"key":"3195_CR28","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1016\/j.chaos.2008.01.028","volume":"38","author":"F Sun","year":"2008","unstructured":"Sun F, Liu S, Li Z, L\u00fc Z (2008) A novel image encryption scheme based on spatial chaos map. Chaos Solitons Fract 38:631\u2013640","journal-title":"Chaos Solitons Fract"},{"key":"3195_CR29","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/18.32121","volume":"35","author":"AM Fraser","year":"1989","unstructured":"Fraser AM (1989) Information and entropy in strange attractors. IEEE Trans Inf Theory 35:245\u2013262","journal-title":"IEEE Trans Inf Theory"},{"key":"3195_CR30","unstructured":"Kim S-J, Umeno K, Hasegawa A (2004) Corrections of the NIST statistical test suite for randomness, arXiv preprint nlin\/0401040"},{"key":"3195_CR31","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fract 21:749\u2013761","journal-title":"Chaos Solitons Fract"},{"key":"3195_CR32","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8:1259\u20131284","journal-title":"Int J Bifurc Chaos"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-017-3195-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-017-3195-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-017-3195-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T13:15:10Z","timestamp":1564665310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-017-3195-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,25]]},"references-count":32,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["3195"],"URL":"https:\/\/doi.org\/10.1007\/s00521-017-3195-1","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,25]]},"assertion":[{"value":"30 December 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All the authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest (such as honoraria; educational grants; participation in speakers\u2019 bureaus; membership, employment, consultancies, stock ownership, or other equity interest; and expert testimony or patent-licensing arrangements), or non-financial interest (such as personal or professional relationships, affiliations, knowledge, or beliefs) in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}