{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T06:47:05Z","timestamp":1774766825015,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,1,18]],"date-time":"2022-01-18T00:00:00Z","timestamp":1642464000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,18]],"date-time":"2022-01-18T00:00:00Z","timestamp":1642464000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s10489-021-03063-1","type":"journal-article","created":{"date-parts":[[2022,1,18]],"date-time":"2022-01-18T08:19:46Z","timestamp":1642493986000},"page":"10979-10998","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Image encryption using permutation generated by modified Regula-Falsi method"],"prefix":"10.1007","volume":"52","author":[{"given":"Aakash","family":"Paul","sequence":"first","affiliation":[]},{"given":"Shyamalendu","family":"Kandar","sequence":"additional","affiliation":[]},{"given":"Bibhas Chandra","family":"Dhara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,18]]},"reference":[{"issue":"1\u20133","key":"3063_CR1","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.cnsns.2014.11.021","volume":"23","author":"J-x Chen","year":"2015","unstructured":"Chen J-x, Zhu Z-l, Fu C, Zhang L-b, Zhang Y (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Communications in Nonlinear Science and Numerical Simulation 23(1\u20133):294\u2013310","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"10","key":"3063_CR2","doi-asserted-by":"publisher","first-page":"6663","DOI":"10.1007\/s11227-019-02878-7","volume":"75","author":"A Arab","year":"2019","unstructured":"Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and aes algorithm. The Journal of Supercomputing 75(10):6663\u20136682","journal-title":"The Journal of Supercomputing"},{"issue":"9","key":"3063_CR3","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image and Vision Computing 24(9):926\u2013934","journal-title":"Image and Vision Computing"},{"issue":"6","key":"3063_CR4","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/0031-3203(92)90074-S","volume":"25","author":"N Bourbakis","year":"1992","unstructured":"Bourbakis N, Alexopoulos C (1992) Picture data encryption using scan patterns. Pattern Recognition 25(6):567\u2013581","journal-title":"Pattern Recognition"},{"issue":"4","key":"3063_CR5","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1117\/12.148572","volume":"2","author":"CJ Kuo","year":"1993","unstructured":"Kuo CJ (1993) Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging 2(4):345\u2013352","journal-title":"Journal of Electronic Imaging"},{"issue":"11\u201313","key":"3063_CR6","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1016\/S0167-8655(97)00099-8","volume":"18","author":"X Li","year":"1997","unstructured":"Li X, Knipe J, Cheng H (1997) Image compression and encryption using tree structures. Pattern Recognition Letters 18(11\u201313):1253\u20131259","journal-title":"Pattern Recognition Letters"},{"issue":"4","key":"3063_CR7","first-page":"279","volume":"10","author":"HK-C Chang","year":"1997","unstructured":"Chang HK-C, Liu J-L (1997) A linear quadtree compression scheme for image encryption. Signal Processing: Image Communication 10(4):279\u2013290","journal-title":"Signal Processing: Image Communication"},{"issue":"7","key":"3063_CR8","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and fourier plane random encoding. Optics Letters 20(7):767\u2013769","journal-title":"Optics Letters"},{"issue":"1","key":"3063_CR9","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29\u201342","journal-title":"Cryptologia"},{"issue":"06","key":"3063_CR10","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and chaos 8(06):1259\u20131284","journal-title":"International Journal of Bifurcation and chaos"},{"key":"3063_CR11","unstructured":"Sathishkumar G, Srinivas R, Bagan KB (2012) Image encryption using random pixel permutation by chaotic mapping. In: 2012 IEEE symposium on computers & informatics (ISCI). IEEE, pp 247\u2013251"},{"issue":"1\u20132","key":"3063_CR12","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s11071-013-1068-4","volume":"75","author":"X Zhang","year":"2014","unstructured":"Zhang X, Zhao Z (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dynamics 75(1\u20132):319\u2013330","journal-title":"Nonlinear Dynamics"},{"issue":"4","key":"3063_CR13","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"T Gao","year":"2008","unstructured":"Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Physics Letters A 372(4):394\u2013400","journal-title":"Physics Letters A"},{"issue":"12","key":"3063_CR14","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1016\/j.optlaseng.2013.05.011","volume":"51","author":"H Li","year":"2013","unstructured":"Li H, Wang Y, Yan H, Li L, Li Q, Zhao X (2013) Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform. Optics and Lasers in Engineering 51(12):1327\u20131331","journal-title":"Optics and Lasers in Engineering"},{"key":"3063_CR15","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics and Lasers in Engineering 90:238\u2013246","journal-title":"Optics and Lasers in Engineering"},{"issue":"05","key":"3063_CR16","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1142\/S0218127410026563","volume":"20","author":"E Solak","year":"2010","unstructured":"Solak E, \u00c7okal C, Yildiz OT, Biyiko\u011flu T (2010) Cryptanalysis of fridrich\u2019s chaotic image encryption. International Journal of Bifurcation and Chaos 20(05):1405\u20131413","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"1\u20132","key":"3063_CR17","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s11071-012-0639-0","volume":"71","author":"C Zhu","year":"2013","unstructured":"Zhu C, Liao C, Deng X (2013) Breaking and improving an image encryption scheme based on total shuffling scheme. Nonlinear Dynamics 71(1\u20132):25\u201334","journal-title":"Nonlinear Dynamics"},{"issue":"6","key":"3063_CR18","doi-asserted-by":"publisher","first-page":"6883","DOI":"10.1007\/s11042-017-4605-1","volume":"77","author":"L Teng","year":"2018","unstructured":"Teng L, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit-level permutation. Multimedia Tools and Applications 77(6):6883\u20136896","journal-title":"Multimedia Tools and Applications"},{"key":"3063_CR19","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao Y-l, Zhu Z-l (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Processing 118:36\u201350","journal-title":"Signal Processing"},{"key":"3063_CR20","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2015.10.027","volume":"355","author":"A-V Diaconu","year":"2016","unstructured":"Diaconu A-V (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Information Sciences 355:314\u2013327","journal-title":"Information Sciences"},{"issue":"2","key":"3063_CR21","first-page":"1","volume":"10","author":"S Sun","year":"2018","unstructured":"Sun S (2018) A novel hyperchaotic image encryption scheme based on dna encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics Journal 10(2):1\u201314","journal-title":"IEEE Photonics Journal"},{"key":"3063_CR22","doi-asserted-by":"publisher","first-page":"67581","DOI":"10.1109\/ACCESS.2018.2879565","volume":"6","author":"P Ping","year":"2018","unstructured":"Ping P, Fan J, Mao Y, Xu F, Gao J (2018) A chaos based image encryption scheme using digit-level permutation and block diffusion. IEEE Access 6:67581\u201367593","journal-title":"IEEE Access"},{"key":"3063_CR23","doi-asserted-by":"publisher","first-page":"106162","DOI":"10.1016\/j.asoc.2020.106162","volume":"90","author":"K Shahna","year":"2020","unstructured":"Shahna K, Mohamed A (2020) A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl Soft Comput 90:106162","journal-title":"Appl Soft Comput"},{"key":"3063_CR24","doi-asserted-by":"crossref","unstructured":"Idrees B, Zafar S, Rashid T, Gao W (2019) Image encryption algorithm using s-box and dynamic h\u00e9non bit level permutation. Multimed Tools Appl: 1\u201328","DOI":"10.1007\/s11042-019-08282-w"},{"key":"3063_CR25","doi-asserted-by":"crossref","unstructured":"Biswas P, Kandar S, Dhara BC (2017) A novel image encryption technique using one dimensional chaotic map and circular shift technique. In: Proceedings of the 6th international conference on software and computer applications. pp 112\u2013116","DOI":"10.1145\/3056662.3056685"},{"issue":"6","key":"3063_CR26","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"Z-l Zhu","year":"2011","unstructured":"Zhu Z-l, Zhang W, Wong K-w, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences 181(6):1171\u20131186","journal-title":"Information Sciences"},{"key":"3063_CR27","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","volume":"100","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Cao W, Chen CP (2014) Image encryption using binary bitplane. Signal Processing 100:197\u2013207","journal-title":"Signal Processing"},{"key":"3063_CR28","doi-asserted-by":"crossref","unstructured":"Wang P, Qiu J (2019) An adaptive image encryption scheme based on bit-level permutation. In: Proceedings of the international conference on artificial intelligence. Information Processing and Cloud Computing, pp 1\u20135","DOI":"10.1145\/3371425.3371490"},{"issue":"2","key":"3063_CR29","first-page":"525","volume":"52","author":"SE Borujeni","year":"2013","unstructured":"Borujeni SE, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommunication Systems 52(2):525\u2013537","journal-title":"Telecommunication Systems"},{"key":"3063_CR30","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun C-M, Chen CP (2015) 2d sine logistic modulation map for image encryption. Information Sciences 297:80\u201394","journal-title":"Information Sciences"},{"key":"3063_CR31","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic s-box. Information Sciences 450:361\u2013377","journal-title":"Information Sciences"},{"key":"3063_CR32","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.chaos.2016.12.018","volume":"95","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu \u00dc, Ka\u00e7ar S, Pehlivan I (2017) Zengin A Secure image encryption algorithm design using a novel chaos based s-box. Chaos, Solitons & Fractals 95:92\u2013101","journal-title":"Chaos, Solitons & Fractals"},{"issue":"2","key":"3063_CR33","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s11071-013-1214-z","volume":"76","author":"I Hussain","year":"2014","unstructured":"Hussain I, Gondal MA (2014) An extended image encryption using chaotic coupled map and s-box transformation. Nonlinear Dynamics 76(2):1355\u20131363","journal-title":"Nonlinear Dynamics"},{"issue":"13","key":"3063_CR34","doi-asserted-by":"publisher","first-page":"7739","DOI":"10.1007\/s11042-015-2691-5","volume":"75","author":"Y Liu","year":"2016","unstructured":"Liu Y, Tong X, Ma J (2016) Image encryption algorithm based on hyper-chaotic system and dynamic s-box. Multimedia Tools and Applications 75(13):7739\u20137759","journal-title":"Multimedia Tools and Applications"},{"key":"3063_CR35","doi-asserted-by":"crossref","unstructured":"Farah MB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn: 1\u201324","DOI":"10.1007\/s11071-019-05413-8"},{"key":"3063_CR36","doi-asserted-by":"crossref","unstructured":"Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the lss chaotic map and single s-box. IEEE Access","DOI":"10.1109\/ACCESS.2020.2970806"},{"issue":"9","key":"3063_CR37","doi-asserted-by":"publisher","first-page":"13157","DOI":"10.1007\/s11042-020-10440-4","volume":"80","author":"M Mousavi","year":"2021","unstructured":"Mousavi M, Sadeghiyan B (2021) A new image encryption scheme with feistel like structure using chaotic s-box and rubik cube based p-box. Multimedia Tools and Applications 80(9):13157\u201313177","journal-title":"Multimedia Tools and Applications"},{"key":"3063_CR38","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","volume":"147","author":"DS Laiphrakpam","year":"2017","unstructured":"Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved elgamal encryption technique. Optik 147:88\u2013102","journal-title":"Optik"},{"key":"3063_CR39","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Processing 144:134\u2013144","journal-title":"Signal Processing"},{"key":"3063_CR40","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Processing 132:96\u2013109","journal-title":"Signal Processing"},{"key":"3063_CR41","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.optlaseng.2018.05.009","volume":"110","author":"H Nematzadeh","year":"2018","unstructured":"Nematzadeh H, Enayatifar R, Motameni H, Guimar\u00e3es FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Optics and Lasers in Engineering 110:24\u201332","journal-title":"Optics and Lasers in Engineering"},{"issue":"24","key":"3063_CR42","doi-asserted-by":"publisher","first-page":"35419","DOI":"10.1007\/s11042-019-08168-x","volume":"78","author":"X Chai","year":"2019","unstructured":"Chai X, Zhang J, Gan Z, Zhang Y (2019) Medical image encryption algorithm based on latin square and memristive chaotic system. Multimedia Tools and Applications 78(24):35419\u201335453","journal-title":"Multimedia Tools and Applications"},{"key":"3063_CR43","doi-asserted-by":"crossref","unstructured":"Thakur S, Singh A, Kumar B, Ghrera S (2020) Improved dwt-svd-based medical image watermarking through hamming code and chaotic encryption. In: Advances in VLSI, communication, and signal processing. Springer, pp 897\u2013905","DOI":"10.1007\/978-981-32-9775-3_80"},{"issue":"3","key":"3063_CR44","doi-asserted-by":"publisher","first-page":"3373","DOI":"10.1007\/s12652-020-02399-9","volume":"12","author":"S Jeevitha","year":"2021","unstructured":"Jeevitha S, Prabha NA (2021) Novel medical image encryption using dwt block-based scrambling and edge maps. Journal of Ambient Intelligence and Humanized Computing 12(3):3373\u20133388","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"3","key":"3063_CR45","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s11517-021-02328-8","volume":"59","author":"D Ravichandran","year":"2021","unstructured":"Ravichandran D, Murthy B, Balasubramanian V, Fathima S, Amirtharajan R et al (2021) An efficient medical image encryption using hybrid dna computing and chaos in transform domain. Medical & Biological Engineering & Computing 59(3):589\u2013605","journal-title":"Medical & Biological Engineering & Computing"},{"key":"3063_CR46","doi-asserted-by":"publisher","first-page":"164000","DOI":"10.1016\/j.ijleo.2019.164000","volume":"203","author":"A Babaei","year":"2020","unstructured":"Babaei A, Motameni H, Enayatifar R (2020) A new permutation-diffusion-based image encryption technique using cellular automata and dna sequence. Optik 203:164000","journal-title":"Optik"},{"key":"3063_CR47","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.optlaseng.2018.11.017","volume":"115","author":"R Enayatifar","year":"2019","unstructured":"Enayatifar R, Guimar\u00e3es FG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using dna sequence. Optics and Lasers in Engineering 115:131\u2013140","journal-title":"Optics and Lasers in Engineering"},{"key":"3063_CR48","doi-asserted-by":"crossref","unstructured":"Azimi Z, Ahadpour S (2019) Color image encryption based on dna encoding and pair coupled chaotic maps. Multimed Tools Appl: 1\u201318","DOI":"10.1007\/s11042-019-08375-6"},{"issue":"3","key":"3063_CR49","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlinear Dynamics 83(3):1123\u20131136","journal-title":"Nonlinear Dynamics"},{"key":"3063_CR50","unstructured":"Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5d chaotic map. Futur Gener Comput Syste"},{"key":"3063_CR51","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.optlaseng.2014.11.017","volume":"67","author":"J-x Chen","year":"2015","unstructured":"Chen J-x, Zhu Z-l, Fu C, Yu H, Zhang L-b (2015) An efficient image encryption scheme using gray code based permutation approach. Optics and Lasers in Engineering 67:191\u2013204","journal-title":"Optics and Lasers in Engineering"},{"key":"3063_CR52","doi-asserted-by":"crossref","unstructured":"Sinha RK, Agrawal I, Jain K, Gupta A, Sahu S (2020) Image encryption using modified rubik\u2019s cube algorithm. In: Advances in computational intelligence. Springer, pp 69\u201378","DOI":"10.1007\/978-981-13-8222-2_6"},{"key":"3063_CR53","unstructured":"Vidhya R, Brindha M (2020) A chaos based image encryption algorithm using rubik\u2019s cube and prime factorization process (cierpf). J King Saud Univ-Comput Inf Sci"},{"key":"3063_CR54","doi-asserted-by":"crossref","unstructured":"Das SK, Dhara BC (2017) A new image encryption method using circle. In: 2017 8th International conference on computing, communication and networking technologies (ICCCNT). IEEE, pp 1\u20136","DOI":"10.1109\/ICCCNT.2017.8203912"},{"key":"3063_CR55","doi-asserted-by":"crossref","unstructured":"Priya A, Sinha K, Darshani MP, Sahana SK (2019) A novel multimedia encryption and decryption technique using binary tree traversal. In: Proceeding of the second international conference on microelectronics, computing & communication systems (MCCS 2017). Springer, pp 163\u2013178","DOI":"10.1007\/978-981-10-8234-4_15"},{"key":"3063_CR56","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.jisa.2018.12.003","volume":"44","author":"S Kandar","year":"2019","unstructured":"Kandar S, Chaudhuri D, Bhattacharjee A, Dhara BC (2019) Image encryption using sequence generated by cyclic group. Journal of Information Security and Applications 44:117\u2013129","journal-title":"Journal of Information Security and Applications"},{"issue":"43","key":"3063_CR57","doi-asserted-by":"publisher","first-page":"31715","DOI":"10.1007\/s11042-020-09497-y","volume":"79","author":"P Biswas","year":"2020","unstructured":"Biswas P, Kandar S, Dhara BC (2020) An image encryption scheme using sequence generated by interval bisection of polynomial function. Multimedia Tools and Applications 79(43):31715\u201331738","journal-title":"Multimedia Tools and Applications"},{"key":"3063_CR58","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep, Booz-allen and hamilton inc mclean va","DOI":"10.6028\/NIST.SP.800-22"},{"key":"3063_CR59","unstructured":"Brown RG, Eddelbuettel D, Bauer D (2018) Dieharder Duke University Physics Department Durham, NC 27708\u20130305"},{"key":"3063_CR60","doi-asserted-by":"crossref","unstructured":"Kumar CM, Vidhya R, Brindha M (2021) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell: 1\u201330","DOI":"10.1007\/s10489-021-02508-x"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-03063-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-03063-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-03063-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T04:01:42Z","timestamp":1666756902000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-03063-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,18]]},"references-count":60,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["3063"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-03063-1","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,18]]},"assertion":[{"value":"30 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}