{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T04:05:07Z","timestamp":1770523507439,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"25","license":[{"start":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T00:00:00Z","timestamp":1686182400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T00:00:00Z","timestamp":1686182400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s00521-023-08643-5","type":"journal-article","created":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T16:01:36Z","timestamp":1686240096000},"page":"18325-18341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Applicable image cryptosystem using bit-level permutation, particle swarm optimisation, and quantum walks"],"prefix":"10.1007","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4739-0037","authenticated-orcid":false,"given":"Bassem","family":"Abd-El-Atty","sequence":"first","affiliation":[]},{"given":"Ahmed A.","family":"Abd EL-Latif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,8]]},"reference":[{"key":"8643_CR1","doi-asserted-by":"crossref","unstructured":"Tao L, Liang X, Hu B, Han L (2022) Compound encryption of multiple images by utilizing a novel chaos and nonlinear transform. Neural Comput Appl","DOI":"10.1007\/s00521-022-07849-3"},{"key":"8643_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2021.168474","volume":"251","author":"M Jin","year":"2022","unstructured":"Jin M, Wang W, Wang X (2022) Optical color image cryptosystem based on interference principle and deep learning. Optik 251:168474","journal-title":"Optik"},{"key":"8643_CR3","doi-asserted-by":"publisher","first-page":"12845","DOI":"10.1007\/s00521-021-05937-4","volume":"33","author":"Z Gan","year":"2021","unstructured":"Gan Z, Bi J, Ding W, Chai X (2021) Exploiting 2d compressed sensing and information entropy for secure color image compression and encryption. Neural Comput Appl 33:12845\u201312867","journal-title":"Neural Comput Appl"},{"key":"8643_CR4","doi-asserted-by":"publisher","first-page":"12755","DOI":"10.1007\/s00521-021-05921-y","volume":"33","author":"K Wang","year":"2021","unstructured":"Wang K, Wu X, Gao T (2021) Double color images compression-encryption via compressive sensing. Neural Comput Appl 33:12755\u201312776","journal-title":"Neural Comput Appl"},{"key":"8643_CR5","doi-asserted-by":"publisher","first-page":"1950214","DOI":"10.1142\/S0217732319502146","volume":"34","author":"H-S Li","year":"2019","unstructured":"Li H-S, Li C, Chen X, Xia H (2019) Quantum image encryption based on phase-shift transform and quantum Haar wavelet packet transform. Mod Phys Lett A 34:1950214","journal-title":"Mod Phys Lett A"},{"key":"8643_CR6","doi-asserted-by":"publisher","first-page":"11448","DOI":"10.1007\/s10489-021-03071-1","volume":"52","author":"Q Lai","year":"2022","unstructured":"Lai Q, Zhang H, Kuate PDK, Xu G, Zhao X-W (2022) Analysis and implementation of no-equilibrium chaotic system with application in image encryption. Appl Intell 52:11448\u201311471","journal-title":"Appl Intell"},{"key":"8643_CR7","doi-asserted-by":"publisher","first-page":"2556","DOI":"10.1007\/s10489-021-02508-x","volume":"52","author":"CM Kumar","year":"2021","unstructured":"Kumar CM, Vidhya R, Brindha M (2021) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell 52:2556\u20132585","journal-title":"Appl Intell"},{"key":"8643_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6615512","volume":"2021","author":"A Alanezi","year":"2021","unstructured":"Alanezi A, Abd-El-Atty B, Kolivand H, El-Latif AAA, El-Rahiem BA, Sankar S, Khalifa HS (2021) Securing digital images through simple permutation-substitution mechanism in cloud-based smart city environment. Secur Commun Netw 2021:1\u201317","journal-title":"Secur Commun Netw"},{"key":"8643_CR9","doi-asserted-by":"crossref","unstructured":"Zheng J, Zeng Q (2022) An image encryption algorithm using a dynamic s-box and chaotic maps. Appl Intell","DOI":"10.1007\/s10489-022-03174-3"},{"key":"8643_CR10","doi-asserted-by":"publisher","first-page":"14311","DOI":"10.1007\/s00521-021-06077-5","volume":"33","author":"M Riyahi","year":"2021","unstructured":"Riyahi M, Rafsanjani MK, Motevalli R (2021) A novel image encryption scheme based on multi-directional diffusion technique and integrated chaotic map. Neural Comput Appl 33:14311\u201314326","journal-title":"Neural Comput Appl"},{"key":"8643_CR11","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"Z Gan","year":"2018","unstructured":"Gan Z, Chai X, Han D, Chen Y (2018) A chaotic image encryption algorithm based on 3-d bit-plane permutation. Neural Comput Appl 31:7111\u20137130","journal-title":"Neural Comput Appl"},{"key":"8643_CR12","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340\u2013358","journal-title":"Inf Sci"},{"key":"8643_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106393","volume":"137","author":"X Wang","year":"2021","unstructured":"Wang X, Li Y (2021) Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Opt Lasers Eng 137:106393","journal-title":"Opt Lasers Eng"},{"key":"8643_CR14","first-page":"960","volume":"43","author":"J Ferdush","year":"2019","unstructured":"Ferdush J, Mondol G, Prapti AP, Begum M, Sheikh MNA, Galib SM (2019) An enhanced image encryption technique combining genetic algorithm and particle swarm optimization with chaotic function. Int J Comput Appl 43:960\u2013967","journal-title":"Int J Comput Appl"},{"key":"8643_CR15","first-page":"247","volume":"10","author":"M Ahmad","year":"2018","unstructured":"Ahmad M, Alam MZ, Umayya Z, Khan S, Ahmad F (2018) An image encryption approach using particle swarm optimization and chaotic map. Int J Inf Technol 10:247\u2013255","journal-title":"Int J Inf Technol"},{"key":"8643_CR16","doi-asserted-by":"publisher","first-page":"5299","DOI":"10.1007\/s00500-020-05528-w","volume":"25","author":"S Saravanan","year":"2021","unstructured":"Saravanan S, Sivabalakrishnan M (2021) A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption. Soft Comput 25:5299\u20135322","journal-title":"Soft Comput"},{"key":"8643_CR17","doi-asserted-by":"publisher","first-page":"5409","DOI":"10.1007\/s00500-021-06554-y","volume":"26","author":"Y Luo","year":"2022","unstructured":"Luo Y, Ouyang X, Liu J, Cao L, Zou Y (2022) An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system. Soft Comput 26:5409\u20135435","journal-title":"Soft Comput"},{"key":"8643_CR18","volume":"71","author":"B Abd-El-Atty","year":"2022","unstructured":"Abd-El-Atty B (2022) Quaternion with quantum walks for designing a novel color image cryptosystem. J Inf Secur Appl 71:103367","journal-title":"J Inf Secur Appl"},{"key":"8643_CR19","doi-asserted-by":"crossref","unstructured":"Abd-El-Atty B, ElAffendi M, El-Latif AAA (2022) A novel image cryptosystem using gray code, quantum walks, and henon map for cloud applications. Complex Intell Syst","DOI":"10.1007\/s40747-022-00829-z"},{"key":"8643_CR20","doi-asserted-by":"crossref","unstructured":"Yang Y-G, Zhao Q-Q (2016) Novel pseudo-random number generator based on quantum random walks. Sci Rep 6","DOI":"10.1038\/srep20362"},{"issue":"1","key":"8643_CR21","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1007\/s00521-022-07830-0","volume":"35","author":"B Abd-El-Atty","year":"2023","unstructured":"Abd-El-Atty B (2023) A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput Appl 35(1):773\u2013785","journal-title":"Neural Comput Appl"},{"key":"8643_CR22","doi-asserted-by":"crossref","unstructured":"Li Y, Li X, Jin X, Zhao G, Ge S, Tian Y, Zhang X, Zhang K, Wang Z (2015) An image encryption algorithm based on zigzag transformation and 3-dimension chaotic logistic map. In: Applications and techniques in information security, pp\u00a03\u201313, Springer, Berlin","DOI":"10.1007\/978-3-662-48683-2_1"},{"key":"8643_CR23","doi-asserted-by":"crossref","unstructured":"Abd-El-Atty B, El-Latif AAA, Venegas-Andraca SE (2019) An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quant Inf Process 18","DOI":"10.1007\/s11128-019-2386-3"},{"key":"8643_CR24","unstructured":"True color kodak images. http:\/\/r0k.us\/graphics\/kodak\/. Accessed 7 July 2022"},{"key":"8643_CR25","doi-asserted-by":"crossref","unstructured":"Bassham LE, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Barker EB, Leigh SD, Levenson M, Vangel M, Banks DL, Heckert NA, Dray JF, Vo S (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech Rep","DOI":"10.6028\/NIST.SP.800-22r1a"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08643-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-08643-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08643-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T08:17:52Z","timestamp":1692692272000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-08643-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,8]]},"references-count":25,"journal-issue":{"issue":"25","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["8643"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-08643-5","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,8]]},"assertion":[{"value":"2 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"This research contains neither human nor animal studies.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}}]}}