{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:21:45Z","timestamp":1772119305838,"version":"3.50.1"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T00:00:00Z","timestamp":1615593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T00:00:00Z","timestamp":1615593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s00530-021-00772-y","type":"journal-article","created":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T02:05:26Z","timestamp":1615601126000},"page":"907-925","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A novel multi-image cryptosystem based on weighted plain images and using combined chaotic maps"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5303-3453","authenticated-orcid":false,"given":"Ahmad","family":"Pourjabbar Kari","sequence":"first","affiliation":[]},{"given":"Ahmad","family":"Habibizad Navin","sequence":"additional","affiliation":[]},{"given":"Amir Massoud","family":"Bidgoli","sequence":"additional","affiliation":[]},{"given":"Mirkamal","family":"Mirnia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,13]]},"reference":[{"key":"772_CR1","unstructured":"Yan, C., Gong, B., Wei, Y., Gao, Y.: Deep multi-view enhancement hashing for image retrieval. In: IEEE transactions on pattern analysis and machine intelligence, PubMed ID: 32091992 (2020)"},{"issue":"4","key":"772_CR2","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"W Xingyuan","year":"2012","unstructured":"Xingyuan, W., Lin, T., Xue, Q.: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101\u20131108 (2012). https:\/\/doi.org\/10.1016\/j.sigpro.2011.10.023","journal-title":"Signal Process."},{"issue":"3","key":"772_CR3","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1016\/j.dsp.2013.01.005","volume":"23","author":"NK Pareek","year":"2013","unstructured":"Pareek, N.K., Vinod, P., Sud, K.K.: Diffusion-substitution based gray image encryption scheme. Digit. Signal Process. 23(3), 894\u2013901 (2013). https:\/\/doi.org\/10.1016\/j.dsp.2013.01.005","journal-title":"Digit. Signal Process."},{"key":"772_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.dsp.2014.05.011","volume":"32","author":"J Alireza","year":"2014","unstructured":"Alireza, J., Xin-Wen, W., Vallipuram, M.: Comments on the security of diffusion substitution based gray image encryption scheme. Digit. Signal Process. 32, 34\u201336 (2014). https:\/\/doi.org\/10.1016\/j.dsp.2014.05.011","journal-title":"Digit. Signal Process."},{"issue":"4","key":"772_CR5","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1016\/j.sigpro.2010.09.014","volume":"91","author":"L Chengqing","year":"2011","unstructured":"Chengqing, L., Kwok-Tung, L.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91(4), 949\u2013954 (2011). https:\/\/doi.org\/10.1016\/j.sigpro.2010.09.014","journal-title":"Signal Process."},{"key":"772_CR6","doi-asserted-by":"publisher","unstructured":"Kumar, K., Shrimankar, D.D., Singh, N.: Event BAGGING: a novel event summarization approach in multi view surveillance videos. In: 2017 International conference on innovations in electronics, signal processing and communication (IESC), IEEE. (2017). https:\/\/doi.org\/10.1109\/IESPC.2017.8071874","DOI":"10.1109\/IESPC.2017.8071874"},{"key":"772_CR7","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.sigpro.2015.01.016","volume":"113","author":"L Hongjun","year":"2015","unstructured":"Hongjun, L., Abdurahman, K.: Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process. 113, 104\u2013112 (2015). https:\/\/doi.org\/10.1016\/j.sigpro.2015.01.016","journal-title":"Signal Process."},{"key":"772_CR8","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.sigpro.2015.01.003","volume":"111","author":"C Jun-xin","year":"2015","unstructured":"Jun-xin, C., Zhi-liang, Z., Chong, F., Hai, Y., Yushu, Z.: Reusing the permutation matrix dynamically for efficient image cryptographic algorithm. Signal Process. 111, 294\u2013307 (2015). https:\/\/doi.org\/10.1016\/j.sigpro.2015.01.003","journal-title":"Signal Process."},{"key":"772_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5882-z","author":"K Kumar","year":"2018","unstructured":"Kumar, K., Shrimankar, D.D.: Deep event learning boost-up approach: DELTA. Multimed. Tools Appl. (2018). https:\/\/doi.org\/10.1007\/s11042-018-5882-z","journal-title":"Multimed. Tools Appl."},{"key":"772_CR10","doi-asserted-by":"crossref","unstructured":"Kumar, K., Shrimankar, D.D.: F-DES: fast and deep event summarization, proceedings of 2nd international conference on computer vision & image processing. IEEE Trans. Multimed. 20(2) 51\u201362 (2018)","DOI":"10.1109\/TMM.2017.2741423"},{"key":"772_CR11","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2020.1780164","author":"S Sharma","year":"2020","unstructured":"Sharma, S., Kumar, K., Singh, N.: Deep eigen space based ASL recognition system. IETE J. Res. (2020). https:\/\/doi.org\/10.1080\/03772063.2020.1780164","journal-title":"IETE J. Res."},{"issue":"2","key":"772_CR12","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.optcom.2009.09.070","volume":"283","author":"E Solak","year":"2017","unstructured":"Solak, E.: Cryptanalysis of a multi-chaotic systems based image cryptosystem. IEEE Opt. Commun. 283(2), 232\u2013236 (2017)","journal-title":"IEEE Opt. Commun."},{"key":"772_CR13","doi-asserted-by":"crossref","unstructured":"Sharma, S., Shivhare, S.N., Singh, N., Kumar, K.: Computationally efficient ANN model for small-scale problems, part of the advances in intelligent systems and computing, conference paper book series (AISC, volume 748). Mach. Intell. Signal Anal. 423\u2013435 (2018)","DOI":"10.1007\/978-981-13-0923-6_37"},{"key":"772_CR14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2018.5814","author":"M Singh","year":"2019","unstructured":"Singh, M., Govil, M.C., Pilli, E.S., Vipparthi, S.K.: SOD-CED: salient object detection for noisy images using convolution encoder\u2013decoder. IET Comput. Vis. (2019). https:\/\/doi.org\/10.1049\/iet-cvi.2018.5814","journal-title":"IET Comput. Vis."},{"issue":"11","key":"772_CR15","first-page":"2028","volume":"52","author":"Q Zhang","year":"2015","unstructured":"Zhang, Q., Guo, L., Wei, X.P.: Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52(11), 2028\u20132035 (2015)","journal-title":"Math. Comput. Model."},{"key":"772_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3003127","author":"RK Krishna","year":"2020","unstructured":"Krishna, R.K., Kumar, K.: P-MEC: polynomial congruence based multimedia encryption technique over cloud. IEEE Consum. Electron. Mag. (2020). https:\/\/doi.org\/10.1109\/MCE.2020.3003127","journal-title":"IEEE Consum. Electron. Mag."},{"issue":"4","key":"772_CR17","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101\u20131108 (2012)","journal-title":"Signal Process."},{"key":"772_CR18","doi-asserted-by":"publisher","unstructured":"Manupriya, P., Sinha, S., Kumar, K.: V\u2295SEE: video secret sharing encryption technique. In: 2017 Conference on information and communication technology (CICT), IEEE. (2018). https:\/\/doi.org\/10.1109\/INFOCOMTECH.2017.8340639","DOI":"10.1109\/INFOCOMTECH.2017.8340639"},{"key":"772_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08826-5","author":"H Li","year":"2020","unstructured":"Li, H., Deng, L., Gu, Z.: An image encryption scheme based on precision limited chaotic system. Multimed. Tools Appl. (2020). https:\/\/doi.org\/10.1007\/s11042-020-08826-5","journal-title":"Multimed. Tools Appl."},{"key":"772_CR20","doi-asserted-by":"publisher","DOI":"10.1145\/3404374","author":"C Yan","year":"2020","unstructured":"Yan, C., Li, Z., Zhang, Y., Liu, Y., Ji, X., Zhang, Y.: Depth image denoising using nuclear norm and learning graph model. ACM Trans. Multimed. Comput. Commun. Appl. (2020). https:\/\/doi.org\/10.1145\/3404374","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"772_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7704-3","author":"J Wang","year":"2019","unstructured":"Wang, J., Liu, W., Zhang, S.: Adaptive encryption of digital images based on lifting wavelet optimization. Multimed. Tools Appl. (2019). https:\/\/doi.org\/10.1007\/s11042-019-7704-3","journal-title":"Multimed. Tools Appl."},{"key":"772_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09043-w","author":"K Deepak Vagish","year":"2020","unstructured":"Deepak Vagish, K., Rajakumaran, C., Kavitha, R.: Chaos based encryption of quantum images. Multimed. Tools Appl. (2020). https:\/\/doi.org\/10.1007\/s11042-020-09043-w","journal-title":"Multimed. Tools Appl."},{"key":"772_CR23","doi-asserted-by":"publisher","first-page":"105821","DOI":"10.1016\/j.optlaseng.2019.105821","volume":"124","author":"Z-J Huang","year":"2019","unstructured":"Huang, Z.-J., Cheng, S., Gong, L.-H., Zhou, N.-R.: Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform. Opt. Lasers Eng. 124, 105821 (2019)","journal-title":"Opt. Lasers Eng."},{"key":"772_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09648-1","author":"A Pourjabbar Kari","year":"2020","unstructured":"Pourjabbar Kari, A., Habibizad Navin, A., Bidgoli, A.M., et al.: A new image encryption scheme based on hybrid chaotic maps. Multimed. Tools Appl. (2020). https:\/\/doi.org\/10.1007\/s11042-020-09648-1","journal-title":"Multimed. Tools Appl."},{"key":"772_CR25","doi-asserted-by":"crossref","unstructured":"Sharma, S., Kumar, K.: GUESS: genetic uses in video encryption with secret sharing. In: Proceedings of 2nd international conference on computer vision & image processing, pp. 51\u201362 (2018)","DOI":"10.1007\/978-981-10-7895-8_5"},{"key":"772_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00940-4","author":"B Mondal","year":"2019","unstructured":"Mondal, B., Behera, P.K., Gangopadhyay, S.: A secure image encryption scheme based on a novel 2D sine\u2013cosine cross-chaotic (SC3) map. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00940-4","journal-title":"J. Real Time Image Process."},{"key":"772_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08810-z","author":"X Wang","year":"2020","unstructured":"Wang, X., Zhao, H.: Fast image encryption algorithm based on parallel permutation-and-diffusion strategy. Multimed. Tools Appl. (2020). https:\/\/doi.org\/10.1007\/s11042-020-08810-z","journal-title":"Multimed. Tools Appl."},{"key":"772_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09779-5","author":"Y-G Yang","year":"2020","unstructured":"Yang, Y.-G., Guan, B.-W., Zhou, Y.-H., Shi, W.-M.: Double image compression-encryption algorithm based on fractional order hyper chaotic system and DNA approach. Multimed. Tools Appl. (2020). https:\/\/doi.org\/10.1007\/s11042-020-09779-5","journal-title":"Multimed. Tools Appl."},{"key":"772_CR29","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak, C., Huang, L.: A new color image encryption using combination of the 1D chaotic map. Signal Process. 138, 129\u2013137 (2017)","journal-title":"Signal Process."},{"key":"772_CR30","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.sigpro.2016.09.011","volume":"131","author":"M Hamdi","year":"2017","unstructured":"Hamdi, M., Rhouma, R., Belghith, S.: A selective compression-encryption of images based on SPIHT coding and Chirikov Standard Map. Signal Process. 131, 514\u2013526 (2017). https:\/\/doi.org\/10.1016\/j.sigpro.2016.09.011","journal-title":"Signal Process."},{"key":"772_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.10.002","author":"EY Xie","year":"2017","unstructured":"Xie, E.Y., Li, C., Yu, S., L\u00fc, J.: On the cryptanalysis of Fridrich\u2019s chaotic image encryption scheme. Signal Process. (2017). https:\/\/doi.org\/10.1016\/j.sigpro.2016.10.002","journal-title":"Signal Process."},{"key":"772_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.04.006","author":"Wu Jiahui","year":"2017","unstructured":"Jiahui, Wu., Liao, X., Yang, Bo.: Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process. (2017). https:\/\/doi.org\/10.1016\/j.sigpro.2017.04.006","journal-title":"Signal Process."},{"key":"772_CR33","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.sigpro.2017.05.002","volume":"140","author":"K Ratnavelu","year":"2017","unstructured":"Ratnavelu, K., Kalpana, M., Balasubramaniam, P., Wong, K., Raveendran, P.: Image encryption method based on chaotic fuzzy cellular neural networks. Signal Process. 140, 87\u201396 (2017)","journal-title":"Signal Process."},{"key":"772_CR34","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.sigpro.2017.06.028","volume":"142","author":"H Diab","year":"2018","unstructured":"Diab, H., El-semary, A.M.: Secure image cryptosystem with unique key streams via hyper-chaotic system. Signal Process. 142, 53\u201368 (2018)","journal-title":"Signal Process."},{"key":"772_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.07.034","author":"J Chen","year":"2017","unstructured":"Chen, J., Zhu, Z.-L., Zhang, L.-b, Zhang, Y., Yang, B.-Q.: Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process. (2017). https:\/\/doi.org\/10.1016\/j.sigpro.2017.07.034","journal-title":"Signal Process."},{"key":"772_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.08.020","author":"C Cao","year":"2017","unstructured":"Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process. (2017). https:\/\/doi.org\/10.1016\/j.sigpro.2017.08.020","journal-title":"Signal Process."},{"key":"772_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.11.005","author":"H Wang","year":"2017","unstructured":"Wang, H., Xiao, Di., Chen, X., Huang, H.: Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process. (2017). https:\/\/doi.org\/10.1016\/j.sigpro.2017.11.005","journal-title":"Signal Process."},{"key":"772_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.12.021","author":"S Dhall","year":"2017","unstructured":"Dhall, S., Pal, S.K., Sharma, K.: Cryptanalysis of image encryption scheme based on a new 1D chaotic system. Signal Process. (2017). https:\/\/doi.org\/10.1016\/j.sigpro.2017.12.021","journal-title":"Signal Process."},{"key":"772_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2017.12.017","author":"S Amina","year":"2017","unstructured":"Amina, S., Mohamed, F.K.: An efficient and secure chaotic cipher algorithm for image content preservation. Commun. Nonlinear Sci. Numer. Simul. (2017). https:\/\/doi.org\/10.1016\/j.cnsns.2017.12.017","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"772_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.01.026","author":"R Lan","year":"2018","unstructured":"Lan, R., He, J., Wang, S., Tianlong, Gu., Luo, X.: Integrated chaotic systems for image encryption. Signal Process. (2018). https:\/\/doi.org\/10.1016\/j.sigpro.2018.01.026","journal-title":"Signal Process."},{"key":"772_CR41","doi-asserted-by":"crossref","unstructured":"Kumar, K., Shrimankar, D.D., Singh, N.: SOMES: an efficient SOM technique for event summarization in multi-view surveillance videos. In: Recent findings in intelligent computing techniques, pp. 383\u2013389, conference paper. (2018)","DOI":"10.1007\/978-981-10-8633-5_38"},{"key":"772_CR42","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.jvcir.2018.12.009","volume":"58","author":"K Kumar","year":"2019","unstructured":"Kumar, K.: EVS-DK: event video skimming using deep keyframe. J. Vis. Commun. Image Represent. 58, 345\u2013352 (2019). https:\/\/doi.org\/10.1016\/j.jvcir.2018.12.009","journal-title":"J. Vis. Commun. Image Represent."},{"key":"772_CR43","doi-asserted-by":"publisher","unstructured":"Kumar, K., Kumar, A., Bahuguna, A.: D-CAD: deep and crowded anomaly detection. In: ICCCT-2017: proceedings of the 7th international conference on computer and communication technology, pp. 100\u2013105, November 2017. https:\/\/doi.org\/10.1145\/3154979.3154998.","DOI":"10.1145\/3154979.3154998"},{"key":"772_CR44","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2967645","author":"C Yan","year":"2020","unstructured":"Yan, C., Shao, B., Zhao, H., Ning, R., Zhang, Y., Feng, Xu.: 3D room layout estimation from a single RGB image. IEEE Trans. Multimed. (2020). https:\/\/doi.org\/10.1109\/TMM.2020.2967645","journal-title":"IEEE Trans. Multimed."},{"key":"772_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10157-4","author":"K Kumar","year":"2020","unstructured":"Kumar, K.: Text query based summarized event searching interface system using deep learning over cloud. Multimed. Tools Appl. (2020). https:\/\/doi.org\/10.1007\/s11042-020-10157-4","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"772_CR46","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1080\/02564602.2018.1454347","volume":"36","author":"K Kumar","year":"2019","unstructured":"Kumar, K., Shrimankar, D.D.: ESUMM: event summarization on scale-free networks. IETE Tech. Rev. 36(3), 265\u2013274 (2019). https:\/\/doi.org\/10.1080\/02564602.2018.1454347","journal-title":"IETE Tech. Rev."},{"key":"772_CR47","doi-asserted-by":"publisher","unstructured":"Atrish, A., Singh, N., Kumar, K., Kumar, V.: An automated hierarchical framework for player recognition in sports image. In: ICVIP 2017: proceedings of the international conference on video and image processing, pp. 103\u2013108, December 2017. https:\/\/doi.org\/10.1145\/3177404.3177432","DOI":"10.1145\/3177404.3177432"},{"key":"772_CR48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2987615","author":"TS Ali","year":"2020","unstructured":"Ali, T.S., Ali, R.: A novel medical image signcryption scheme using TLTS and Henon chaotic map. IEEE Access (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2987615","journal-title":"IEEE Access"},{"key":"772_CR49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3032403","author":"S Ibrahim","year":"2017","unstructured":"Ibrahim, S., Alharbi, A.: Efficient image encryption scheme using Henon map, dynamic S-boxes and elliptic curve cryptography. IEEE Access (2017). https:\/\/doi.org\/10.1109\/ACCESS.2020.3032403","journal-title":"IEEE Access"},{"key":"772_CR50","doi-asserted-by":"publisher","unstructured":"Yavuz, E., Yaz\u0131c\u0131, R., Kasapba\u015f\u0131, M.C., et al.: A chaos-based image encryption algorithm with simple logical functions. Comput. Electr. Eng. 54 (2015). https:\/\/doi.org\/10.1016\/j.compeleceng.2015.11.008","DOI":"10.1016\/j.compeleceng.2015.11.008"},{"issue":"1\u20132","key":"772_CR51","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s11071-013-1068-4","volume":"75","author":"X Zhang","year":"2014","unstructured":"Zhang, X., Zhao, Z.: Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn. 75(1\u20132), 319\u2013330 (2014)","journal-title":"Nonlinear Dyn."},{"issue":"1\u20132","key":"772_CR52","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s11071-013-1070-x","volume":"75","author":"X Wang","year":"2014","unstructured":"Wang, X., Xu, D.: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn. 75(1\u20132), 345\u2013353 (2014)","journal-title":"Nonlinear Dyn."},{"key":"772_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2017.12.017,PII:S1007-5704(17)30439-2","author":"S Amina","year":"2017","unstructured":"Amina, S., Mohamed, F.K.: An efficient and secure chaotic cipher algorithm for image content preservation. Signal Process. (2017). https:\/\/doi.org\/10.1016\/j.cnsns.2017.12.017,PII:S1007-5704(17)30439-2","journal-title":"Signal Process."},{"key":"772_CR54","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li, Y., Wang, C., Chen, H.: A hyper-chaos-based image encryption algorithm using pixel level permutation and bit-level permutation. Opt. Lasers Eng. 90, 238\u2013246 (2017)","journal-title":"Opt. Lasers Eng."},{"key":"772_CR55","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu, L., Gou, X., Li, Z., et al.: A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt. Lasers Eng. 91, 41\u201352 (2017)","journal-title":"Opt. Lasers Eng."},{"key":"772_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.06.010","author":"T Shahriyar","year":"2017","unstructured":"Shahriyar, T., Fathi, M.H., Sekhavat, Y.A.: An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Signal Process. (2017). https:\/\/doi.org\/10.1016\/j.sigpro.2017.06.010","journal-title":"Signal Process."},{"key":"772_CR57","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.optlaseng.2014.11.017","volume":"67","author":"JX Chen","year":"2015","unstructured":"Chen, J.X., Zhu, Z.L., Fu, C., et al.: An efficient image encryption scheme using gray code based permutation approach. Opt. Lasers Eng. 67, 191\u2013204 (2015)","journal-title":"Opt. Lasers Eng."},{"issue":"3","key":"772_CR58","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/s11042-013-1699-y","volume":"74","author":"B Norouzi","year":"2015","unstructured":"Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., et al.: A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed. Tools Appl. 74(3), 781\u2013811 (2015)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"772_CR59","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.cnsns.2014.06.032","volume":"20","author":"JX Chen","year":"2015","unstructured":"Chen, J.X., Zhu, Z.L., Fu, C., et al.: A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun. Nonlinear Sci. Numer. Simul. 20(3), 846\u2013860 (2015)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"18","key":"772_CR60","doi-asserted-by":"publisher","first-page":"3329","DOI":"10.1016\/j.ijleo.2012.11.002","volume":"124","author":"CY Song","year":"2013","unstructured":"Song, C.Y., Qiao, Y.L., Zhang, X.Z.: An image encryption scheme based on new spatiotemporal chaos. Opt. Int. J. Light Electron Opt. 124(18), 3329\u20133334 (2013)","journal-title":"Opt. Int. J. Light Electron Opt."},{"issue":"12","key":"772_CR61","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang, G., Liu, Q.: A novel image encryption method based on total shuffling scheme. Opt. Commun. 284(12), 2775\u20132780 (2011)","journal-title":"Opt. Commun."},{"issue":"2017","key":"772_CR62","first-page":"234","volume":"134","author":"Hu Ting","year":"2017","unstructured":"Ting, Hu., Liu, Ye., Gong, L.-H., Guo, S.-F., Yuan, H.-M.: Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process. 134(2017), 234\u2013243 (2017)","journal-title":"Signal Process."},{"key":"772_CR63","first-page":"2593","volume":"124","author":"Q Zhang","year":"2020","unstructured":"Zhang, Q., Guo, L., Wei, X.: A novel image fusion encryption algorithm based on DNA sequence operation and hyper chaotic system. Opt. Int. J. Light Electron Opt. 124, 2593\u20133002 (2020)","journal-title":"Opt. Int. J. Light Electron Opt."},{"issue":"12","key":"772_CR64","doi-asserted-by":"publisher","first-page":"1910","DOI":"10.4236\/am.2012.312262","volume":"3","author":"M Fran\u00e7ois","year":"2012","unstructured":"Fran\u00e7ois, M., Grosges, T., Barchiesi, D., et al.: Image encryption algorithm based on a chaotic iterative process. Appl. Math. 3(12), 1910 (2012)","journal-title":"Appl. Math."},{"key":"772_CR65","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"X Wu","year":"2019","unstructured":"Wu, X., Kan, H., Kurths, J.: A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl. Soft Comput. 37, 24\u201339 (2019)","journal-title":"Appl. Soft Comput."},{"key":"772_CR66","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"X Huang","year":"2018","unstructured":"Huang, X., Ye, G.: An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed. Tools Appl. 72, 57\u201370 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"772_CR67","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou, Y., Bao, L., Chen, C.P.: A new 1D chaotic system for image encryption. Signal Process. 97, 172\u2013182 (2014)","journal-title":"Signal Process."},{"issue":"6","key":"772_CR68","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1016\/j.optlaseng.2013.01.001","volume":"51","author":"A Bakhshandeh","year":"2013","unstructured":"Bakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt. Lasers Eng. 51(6), 665\u2013673 (2013)","journal-title":"Opt. Lasers Eng."},{"issue":"3","key":"772_CR69","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1093\/jigpal\/jzv013","volume":"23","author":"AM del Rey","year":"2015","unstructured":"del Rey, A.M., S\u00e1nchez, G.R., De La Villa Cuenca, A.: A protocol to encrypt digital images using chaotic maps and memory cellular automata. Log. J. IGPL 23(3), 485\u2013494 (2015)","journal-title":"Log. J. IGPL"},{"issue":"2","key":"772_CR70","first-page":"85","volume":"17","author":"FK Mohamed","year":"2014","unstructured":"Mohamed, F.K.: A parallel block-based encryption schema for digital images using reversible cellular automata. Eng. Sci. Technol. Int. J. 17(2), 85\u201394 (2014)","journal-title":"Eng. Sci. Technol. Int. J."},{"issue":"3","key":"772_CR71","doi-asserted-by":"publisher","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"X Liao","year":"2010","unstructured":"Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process. 90(3), 2714\u20132722 (2010)","journal-title":"Signal Process."},{"issue":"1","key":"772_CR72","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s11071-016-2912-0","volume":"86","author":"A Souyah","year":"2016","unstructured":"Souyah, A., Faraoun, K.M.: An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn. 86(1), 639\u2013653 (2016)","journal-title":"Nonlinear Dyn."},{"key":"772_CR73","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107286","author":"Y Chen","year":"2020","unstructured":"Chen, Y., Tang, C., Ye, R.: Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. (2020). https:\/\/doi.org\/10.1016\/j.sigpro.2019.107286","journal-title":"Signal Process."},{"issue":"1","key":"772_CR74","doi-asserted-by":"publisher","first-page":"9784","DOI":"10.1038\/s41598-020-66486-9","volume":"10","author":"X Wang","year":"2020","unstructured":"Wang, X., Guan, N., Zhao, H., Wang, S., Zhang, Y.: A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Sci. Rep. 10(1), 9784 (2020). https:\/\/doi.org\/10.1038\/s41598-020-66486-9","journal-title":"Sci. Rep."},{"key":"772_CR75","doi-asserted-by":"publisher","first-page":"107280","DOI":"10.1016\/j.sigpro.2019.107280","volume":"167","author":"SM Ismail","year":"2020","unstructured":"Ismail, S.M., Said, L.A., Radwan, A.G., Madian, A.H., Abu-ElYazeed, M.F.: A novel image encryption system merging fractional-order edge detection and generalized chaotic maps. Signal Process. 167, 107280 (2020). https:\/\/doi.org\/10.1016\/j.sigpro.2019.107280","journal-title":"Signal Process."},{"key":"772_CR76","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.sigpro.2018.10.011","volume":"155","author":"U Hayat","year":"2019","unstructured":"Hayat, U., Azam, N.A.: A novel image encryption scheme based on an elliptic curve. Signal Process. 155, 391\u2013402 (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2018.10.011","journal-title":"Signal Process."},{"key":"772_CR77","doi-asserted-by":"publisher","first-page":"14081","DOI":"10.1109\/ACCESS.2019.2893538","volume":"7","author":"H Zhu","year":"2019","unstructured":"Zhu, H., Zhao, Y., Song, Y.: 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 7, 14081\u201314098 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2893538","journal-title":"IEEE Access"},{"key":"772_CR78","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","volume":"160","author":"M Alawida","year":"2019","unstructured":"Alawida, M., Samsudin, A., Teh, J.S., Alkhawaldeh, R.S.: A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160, 45\u201358 (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2019.02.016","journal-title":"Signal Process."},{"key":"772_CR79","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.eij.2015.10.001","volume":"17","author":"NAA Abbas","year":"2016","unstructured":"Abbas, N.A.A.: Image encryption based on independent component analysis and Arnold\u2019s cat map. Egypt. Inform. J. 17, 139\u2013146 (2016)","journal-title":"Egypt. Inform. J."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00772-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-021-00772-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00772-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T05:39:30Z","timestamp":1631511570000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-021-00772-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,13]]},"references-count":79,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["772"],"URL":"https:\/\/doi.org\/10.1007\/s00530-021-00772-y","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-164388\/v1","asserted-by":"object"}]},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,13]]},"assertion":[{"value":"18 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose. The authors have no conflicts of interest to declare that are relevant to the content of this article. All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no financial or proprietary interests in any material discussed in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}