{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T10:38:13Z","timestamp":1769942293097,"version":"3.49.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100014717","name":"National Outstanding Youth Science Fund Project of National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072417"],"award-info":[{"award-number":["62072417"]}],"id":[{"id":"10.13039\/100014717","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017700","name":"Henan Provincial Science and Technology Research Project","doi-asserted-by":"publisher","award":["242102210141"],"award-info":[{"award-number":["242102210141"]}],"id":[{"id":"10.13039\/501100017700","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-024-05007-z","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T12:38:05Z","timestamp":1750077485000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A novel image encryption scheme using both pixel-level and bit-level permutations with an improved hyperchaotic system"],"prefix":"10.1007","volume":"28","author":[{"given":"Xuncai","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Heng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,16]]},"reference":[{"issue":"3","key":"5007_CR1","first-page":"598","volume":"147","author":"EN Lorenz","year":"1996","unstructured":"Lorenz, E.N., Haman, K.: The essence of chaos. Pure Appl. Geophys. 147(3), 598\u2013599 (1996)","journal-title":"Pure Appl. Geophys."},{"key":"5007_CR2","doi-asserted-by":"crossref","unstructured":"Mu, X.C., Song, E.: A new color image encryption algorithm based on 3D Lorenz chaos sequences. In: First International Conference on Pervasive Computing, Signal Processing and Applications, pp. 269\u2013272. IEEE (2010)","DOI":"10.1109\/PCSPA.2010.72"},{"key":"5007_CR3","doi-asserted-by":"crossref","unstructured":"Cel\u0130k, K., Kurt, E.: A new image encryption algorithm based on Lorenz system. In: International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ECAI.2016.7861097"},{"key":"5007_CR4","doi-asserted-by":"crossref","unstructured":"Kumar, G.M., Chandrasekaran, V.: A novel image encryption scheme using Lorenz attractor. In: IEEE Conference on Industrial Electronics and Applications, pp. 3662\u20133666. IEEE (2009)","DOI":"10.1109\/ICIEA.2009.5138890"},{"key":"5007_CR5","first-page":"1","volume":"2021","author":"R Lin","year":"2021","unstructured":"Lin, R., Li, S.: An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm. Secur. Commun. Netw. 2021, 1\u201318 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"5007_CR6","doi-asserted-by":"crossref","unstructured":"Khan, F.A., Ahmed, J., Khan, J.S., Ahmad, J., Khan, M.A.: A novel substitution box for encryption based on Lorenz equations. In: International Conference on Circuits, System and Simulation (ICCSS), pp. 32\u201336. IEEE (2017)","DOI":"10.1109\/CIRSYSSIM.2017.8023176"},{"issue":"2","key":"5007_CR7","doi-asserted-by":"publisher","first-page":"3681","DOI":"10.1007\/s11042-023-15810-2","volume":"83","author":"R Chen","year":"2024","unstructured":"Chen, R., Li, X., Teng, L., Wang, X.: An image encryption algorithm based on the LSCMM chaotic map and bidirectional dynamic diffusion. Multimed. Tools Appl. 83(2), 3681\u20133706 (2024)","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"5007_CR8","doi-asserted-by":"publisher","first-page":"11557","DOI":"10.1007\/s11042-023-15964-z","volume":"83","author":"S Fan","year":"2024","unstructured":"Fan, S., Chen, K., Tian, J.: A novel image encryption algorithm based on coupled map lattices model. Multimed. Tools Appl. 83(4), 11557\u201311572 (2024)","journal-title":"Multimed. Tools Appl."},{"issue":"23","key":"5007_CR9","doi-asserted-by":"publisher","first-page":"35379","DOI":"10.1007\/s11042-023-15002-y","volume":"82","author":"B Li","year":"2023","unstructured":"Li, B., Liu, J., Liu, Y., Xu, H., Wang, J.: Image encryption algorithm with 2D coupled discrete chaos. Multimed. Tools Appl. 82(23), 35379\u201335400 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"5007_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, J.: A symmetric image cryptosystem based on Chen\u2019s chaotic system. In: International Conference on Natural Computation (ICNC), pp. 1278\u20131282 (2013)","DOI":"10.1109\/ICNC.2013.6818175"},{"key":"5007_CR11","doi-asserted-by":"crossref","unstructured":"Fu, C., Chen, Z.F., Zhao, W., Jiang, H.Y.: A new fast color image encryption scheme using Chen chaotic system. In: IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD), pp 121\u2013126. IEEE (2017)","DOI":"10.1109\/SNPD.2017.8022710"},{"issue":"9","key":"5007_CR12","doi-asserted-by":"publisher","first-page":"1550122","DOI":"10.1142\/S0218127415501229","volume":"25","author":"J Llibre","year":"2015","unstructured":"Llibre, J., Rodrigues, A.: On the dynamics of a system that bridges the gap between Lorenz and Chen systems. Int. J. Bifurc. Chaos. 25(9), 1550122 (2015)","journal-title":"Int. J. Bifurc. Chaos."},{"key":"5007_CR13","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.chaos.2017.03.021","volume":"98","author":"XY Liang","year":"2017","unstructured":"Liang, X.Y., Qi, G.Y.: Mechanical analysis of Chen chaotic system. Chaos Solitons Fractals 98, 173\u2013177 (2017)","journal-title":"Chaos Solitons Fractals"},{"issue":"3","key":"5007_CR14","doi-asserted-by":"publisher","first-page":"8837","DOI":"10.1007\/s11042-023-15925-6","volume":"83","author":"SM Ahmed","year":"2024","unstructured":"Ahmed, S.M., Elkamchouchi, H.M.A., Elfahar, A., El-Shafai, W., Mohamed, A.G.: A hybrid medical image cryptosystem based on 4D-hyperchaotic S-boxes and logistic maps. Multimed. Tools Appl. 83(3), 8837\u20138865 (2024)","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"5007_CR15","doi-asserted-by":"publisher","first-page":"787","DOI":"10.3390\/e25050787","volume":"25","author":"W Ali","year":"2023","unstructured":"Ali, W., Zhu, C., Latif, R., Asim, M., Tariq, M.U.: Image encryption scheme based on orbital shift pixels shuffling with ILM chaotic system. Entropy 25(5), 787 (2023)","journal-title":"Entropy"},{"issue":"26","key":"5007_CR16","doi-asserted-by":"publisher","first-page":"39897","DOI":"10.1007\/s11042-023-14947-4","volume":"82","author":"H Wang","year":"2023","unstructured":"Wang, H., Dong, B., Ke, H., Qi, Q., Liu, G.: A novel image shift encryption algorithm based on the dynamic Joseph ring problem. Multimed. Tools Appl. 82(26), 39897\u201339927 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"5007_CR17","doi-asserted-by":"publisher","first-page":"27477","DOI":"10.1109\/ACCESS.2023.3257349","volume":"11","author":"S Shao","year":"2023","unstructured":"Shao, S., Li, J., Shao, P., Xu, G.: Chaotic image encryption using piecewise-logistic-sine map. IEEE Access. 11, 27477\u201327488 (2023)","journal-title":"IEEE Access."},{"key":"5007_CR18","first-page":"e01955","volume":"22","author":"F ElAzzaby","year":"2023","unstructured":"ElAzzaby, F., Sabour, K.H., ELakkad, N., El-Shafai, W., Torki, A., Rajkumar, S.R.: Color image encryption using a Zigzag transformation and sine-cosine maps. Sci. Afr. 22, e01955 (2023)","journal-title":"Sci. Afr."},{"issue":"24","key":"5007_CR19","doi-asserted-by":"publisher","first-page":"22645","DOI":"10.1007\/s11071-023-09010-8","volume":"111","author":"X Zhang","year":"2023","unstructured":"Zhang, X., Zhang, X.: Image encryption algorithm based on the Matryoshka transform and modular-inverse matrix. Nonlinear Dyn. 111(24), 22645\u201322678 (2023)","journal-title":"Nonlinear Dyn."},{"issue":"4","key":"5007_CR20","doi-asserted-by":"publisher","first-page":"3583","DOI":"10.1007\/s11071-021-06941-y","volume":"106","author":"H Yi","year":"2021","unstructured":"Yi, H., Zhou, L.L.: Image encryption using value-differencing transformation and modified zigzag transformation. Nonlinear Dyn. 106(4), 3583\u20133599 (2021)","journal-title":"Nonlinear Dyn."},{"issue":"27","key":"5007_CR21","doi-asserted-by":"publisher","first-page":"41879","DOI":"10.1007\/s11042-023-15012-w","volume":"82","author":"Y Huang","year":"2023","unstructured":"Huang, Y., Zhou, L.: A hyper-chaos-based image encryption scheme with double parity alternate scrambling. Multimed. Tools Appl. 82(27), 41879\u201341893 (2023)","journal-title":"Multimed. Tools Appl."},{"issue":"8","key":"5007_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101660","volume":"35","author":"H Wen","year":"2023","unstructured":"Wen, H., Huang, Y., Lin, Y.: High-quality color image compression-encryption using chaos and block permutation. J. King Saud Univ. Comput. Inf. Sci. 35(8), 101660 (2023)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"5","key":"5007_CR23","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s11128-022-03510-z","volume":"21","author":"Z Chen","year":"2022","unstructured":"Chen, Z., Yan, Y., Pan, J., Zhu, H.: Cyclic shift-based MQIR image encryption scheme. Quantum Inf. Process. 21(5), 175 (2022)","journal-title":"Quantum Inf. Process."},{"key":"5007_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2023.109626","volume":"166","author":"Q Lai","year":"2023","unstructured":"Lai, Q., Zhang, H.: A new image encryption method based on memristive hyperchaos. Opt. Laser Technol. 166, 109626 (2023)","journal-title":"Opt. Laser Technol."},{"key":"5007_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119074","volume":"213","author":"D Wei","year":"2023","unstructured":"Wei, D., Jiang, M., Deng, Y.: A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Syst. Appl. 213, 119074 (2023)","journal-title":"Expert Syst. Appl."},{"key":"5007_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-023-02147-1","author":"X Li","year":"2023","unstructured":"Li, X., Sun, B., Bi, X., Yan, H., Wang, L.: A novel color image encryption algorithm based on cross-plane scrambling and diffusion. Mobile Netw. Appl. (2023). https:\/\/doi.org\/10.1007\/s11036-023-02147-1","journal-title":"Mobile Netw. Appl."},{"issue":"10","key":"5007_CR27","doi-asserted-by":"publisher","first-page":"5041","DOI":"10.1007\/s00371-022-02645-5","volume":"39","author":"XY Wang","year":"2023","unstructured":"Wang, X.Y., Chen, X.: Image encryption algorithm based on cross-scrambling and rapid-mode diffusion. Vis. Comput. 39(10), 5041\u20135068 (2023)","journal-title":"Vis. Comput."},{"issue":"4","key":"5007_CR28","first-page":"1517","volume":"39","author":"Y Ding","year":"2023","unstructured":"Ding, Y., Duan, Z.K., Shiren, L.: 2D arcsine and sine combined logistic map for image encryption. Vis. Comput. 39(4), 1517\u20131532 (2023)","journal-title":"Vis. Comput."},{"issue":"6","key":"5007_CR29","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.jksuci.2023.101595","volume":"35","author":"M Alawida","year":"2023","unstructured":"Alawida, M.: A novel chaos-based permutation for image encryption. J. King Saud Univ. Comput. Inf. Sci. 35(6), 101\u2013595 (2023)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"1","key":"5007_CR30","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1007\/s11071-021-07017-7","volume":"107","author":"Y Su","year":"2022","unstructured":"Su, Y., Xu, M.X., Wang, X.Y., Zhang, H., Zhang, Y.Q.: A new image encryption algorithm based on Latin square matrix. Nonlinear Dyn. 107(1), 1277\u20131293 (2022)","journal-title":"Nonlinear Dyn."},{"key":"5007_CR31","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.ijleo.2023.171132","volume":"287","author":"B Sun","year":"2023","unstructured":"Sun, B., Zhang, C., Peng, Q., Du, B.: Color image encryption algorithm based on 5D memristive chaotic system and group scrambling. Optik 287, 171\u2013132 (2023)","journal-title":"Optik"},{"key":"5007_CR32","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1016\/j.optlastec.2018.07.052","volume":"108","author":"M Wang","year":"2018","unstructured":"Wang, M., Wang, X., Zhang, Y., Gao, Z.: A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt. Laser Technol. 108, 558\u2013573 (2018)","journal-title":"Opt. Laser Technol."},{"key":"5007_CR33","doi-asserted-by":"publisher","first-page":"102126","DOI":"10.1016\/j.vlsi.2023.102126","volume":"95","author":"J Zhang","year":"2023","unstructured":"Zhang, J., Zuo, J., Guo, Y., Hou, J., Xie, Q.: Nonlinear analysis, circuit implementation, and application in image encryption of a four-dimensional multi-scroll hyper-chaotic system. Integration 95, 102126 (2023)","journal-title":"Integration"},{"key":"5007_CR34","first-page":"323","volume":"291","author":"A Zarei","year":"2016","unstructured":"Zarei, A., Tavakoli, S.: Hopf bifurcation analysis and ultimate bound estimation of a new 4-D quadratic autonomous hyper-chaotic system. Appl. Math. Comput. 291, 323\u2013339 (2016)","journal-title":"Appl. Math. Comput."},{"key":"5007_CR35","doi-asserted-by":"publisher","first-page":"319","DOI":"10.3390\/e21030319","volume":"213","author":"T Li","year":"2019","unstructured":"Li, T., Shi, J., Li, X., Wu, J., Pan, F.: Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D Latin cubes. Entropy 213, 319 (2019)","journal-title":"Entropy"},{"key":"5007_CR36","doi-asserted-by":"publisher","first-page":"27361","DOI":"10.1109\/ACCESS.2020.2971759","volume":"8","author":"L Liu","year":"2020","unstructured":"Liu, L., Lei, Y., Wang, D.: A fast chaotic image encryption scheme with simultaneous permutation-diffusion operation. IEEE Access. 8, 27361\u201327374 (2020)","journal-title":"IEEE Access."},{"key":"5007_CR37","doi-asserted-by":"crossref","unstructured":"Xu M., Tian Z.: An image cipher based on Latin cubes. In: International Conference on Information and Computer Technologies (ICICT), pp. 160\u2013168. IEEE (2020)","DOI":"10.1109\/ICICT50521.2020.00033"},{"key":"5007_CR38","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1016\/j.optlaseng.2013.03.010","volume":"51","author":"R Enayatifar","year":"2013","unstructured":"Enayatifar, R., Abdullah, A.H., Lee, M.: A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Opt. Lasers Eng. 51, 1066\u20131077 (2013)","journal-title":"Opt. Lasers Eng."},{"key":"5007_CR39","doi-asserted-by":"publisher","first-page":"3949","DOI":"10.1016\/j.optlaseng.2017.04.009","volume":"96","author":"R Zahmoul","year":"2017","unstructured":"Zahmoul, R., Ejbali, R., Zaied, M.: Image encryption based on new Beta chaotic maps. Opt. Lasers Eng. 96, 3949 (2017)","journal-title":"Opt. Lasers Eng."},{"issue":"1","key":"5007_CR40","doi-asserted-by":"publisher","first-page":"013014","DOI":"10.1117\/1.JEI.21.1.013014","volume":"21","author":"Y Wu","year":"2012","unstructured":"Wu, Y., Yang, G., Jin, H., Noonan, J.P.: Image encryption using the two-dimensional logistic chaotic map. J. Electron. Imaging 21(1), 013014\u2013013014 (2012)","journal-title":"J. Electron. Imaging"},{"key":"5007_CR41","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.359","volume":"7","author":"G Pradhan","year":"2024","unstructured":"Pradhan, G., Dawadi, B.R., Chaulagain, A.: Chaos and DNA coding technique for image cryptography. Secur. Priv. 7, e359 (2024)","journal-title":"Secur. Priv."},{"key":"5007_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.csfx.2022.100075","volume":"8","author":"HR Shakir","year":"2022","unstructured":"Shakir, H.R.: Implementing digital image security framework with hybrid approach of chaotic map and singular-value decomposition. Chaos Solitons Fractals 8, 100075 (2022)","journal-title":"Chaos Solitons Fractals"},{"key":"5007_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105854","volume":"122","author":"X Wang","year":"2020","unstructured":"Wang, X., Sun, H.: A chaotic image encryption algorithm based on improved Joseph traversal and cyclic shift function. Opt. Laser Technol. 122, 105854 (2020)","journal-title":"Opt. Laser Technol."},{"key":"5007_CR44","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1007\/s11071-021-07017-7","volume":"107","author":"X Wang","year":"2022","unstructured":"Wang, X., Su, Y., Xu, M., Zhang, H., Zhang, Y.: A new image encryption algorithm based on Latin square matrix. Nonlinear Dyn. 107, 1277\u20131293 (2022)","journal-title":"Nonlinear Dyn."},{"issue":"2","key":"5007_CR45","doi-asserted-by":"publisher","first-page":"3621","DOI":"10.1007\/s11042-023-15662-w","volume":"83","author":"YG Yang","year":"2024","unstructured":"Yang, Y.G., Wang, Z.J., Wang, B.P., Zhou, Y.H., Shi, W.M., Liao, X.: A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic system. Multimed. Tools Appl. 83(2), 3621\u20133655 (2024)","journal-title":"Multimed. Tools Appl."},{"key":"5007_CR46","doi-asserted-by":"publisher","first-page":"2869","DOI":"10.1007\/s11071-022-07756-1","volume":"110","author":"HJ Qiu","year":"2022","unstructured":"Qiu, H.J., Xu, X., Jiang, Z., Sun, K., Xiao, C.: A color image encryption algorithm based on hyperchaotic map and Rubik\u2019s Cube scrambling. Nonlinear Dyn. 110, 2869\u20132887 (2022)","journal-title":"Nonlinear Dyn."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05007-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05007-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05007-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T20:22:08Z","timestamp":1756930928000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05007-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,16]]},"references-count":46,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5007"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05007-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,16]]},"assertion":[{"value":"30 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"388"}}