{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:17:52Z","timestamp":1775323072971,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10586-025-05573-w","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:15:35Z","timestamp":1760033735000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing color image encryption scheme with a chaotic map and Fibonacci transform"],"prefix":"10.1007","volume":"28","author":[{"given":"Shalini","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]},{"family":"Nitish","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,9]]},"reference":[{"key":"5573_CR1","volume-title":"Cryptography and Network Security","author":"BA Forouzan","year":"2008","unstructured":"Forouzan, B.A.: Cryptography and Network Security. United Kingdom, McGraw-Hill (2008)"},{"key":"5573_CR2","doi-asserted-by":"publisher","unstructured":"Washington, L.C.: Elliptic Curves: Number Theory and Cryptography. Second Edition, Chapman and Hall\/CRC: (2008). https:\/\/doi.org\/10.1201\/9781420071474","DOI":"10.1201\/9781420071474"},{"issue":"6","key":"5573_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory. 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"5573_CR4","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1080\/00029890.1929.11986963","volume":"36","author":"L Hill","year":"1929","unstructured":"Hill, L.: Cryptography in an algebraic alphabet. Am. Math. Monthly. 36(6), 306\u2013312 (1929)","journal-title":"Am. Math. Monthly"},{"issue":"12","key":"5573_CR5","doi-asserted-by":"publisher","first-page":"2022","DOI":"10.1631\/jzus.2006.A2022","volume":"7","author":"I Ismail","year":"2006","unstructured":"Ismail, I., Amin, M., Diab, H.: How to repair the Hill cipher. J. Zhejiang University-Science A. 7(12), 2022\u20132030 (2006). https:\/\/doi.org\/10.1631\/jzus.2006.A2022","journal-title":"J. Zhejiang University-Science A"},{"key":"5573_CR6","doi-asserted-by":"crossref","unstructured":"Miller, V.: Use of elliptic curves in cryptography. Advances in Cryptology-CRYPTO\u201985 Proceedings: 417\u2013426. (1986)","DOI":"10.1007\/3-540-39799-X_31"},{"key":"5573_CR7","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptography. Math. Comput. 48, 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"5573_CR8","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shanon","year":"1949","unstructured":"Shanon, C.: Communication theory of security. Bell Syst. Tech. J. 28, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"issue":"5","key":"5573_CR9","doi-asserted-by":"publisher","first-page":"050502","DOI":"10.1088\/1674-1056\/adb8bb","volume":"34","author":"F Yu","year":"2025","unstructured":"Yu, F., Su, D., He, S., Wu, Y., Zhang, S., Yin, H.: Resonant tunneling diode cellular neural network with memristor coupling and its application in Police forensic digital image protection. Chin. Phys. B. 34(5), 050502 (2025)","journal-title":"Chin. Phys. B"},{"key":"5573_CR10","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1998","unstructured":"Baptista, M.S.: Cryptography with chaos. Phys. Lett. A. 240, 50\u201354 (1998). https:\/\/doi.org\/10.1016\/S0375-9601(98)00086-3","journal-title":"Phys. Lett. A"},{"issue":"2","key":"5573_CR11","doi-asserted-by":"publisher","first-page":"115","DOI":"10.3390\/fractalfract9020115","volume":"9","author":"F Yu","year":"2015","unstructured":"Yu, F., Zhang, S., Su, D., Wu, Y., Gracia, Y.M., Yin, H.: Dynamic analysis and implementation of FPGA for a new 4D Fractional-Order memristive Hopfield neural network. Fractal Fract. 9(2), 115 (2015)","journal-title":"Fractal Fract."},{"issue":"10","key":"5573_CR12","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1080\/09500340.2021.1924885","volume":"68","author":"P Lone","year":"2021","unstructured":"Lone, P., Singh, D., Mir, U.: A novel image encryption using random matrix affine cipher and the chaotic maps. J. Mod. Opt. 68(10), 507\u2013521 (2021). https:\/\/doi.org\/10.1080\/09500340.2021.1924885","journal-title":"J. Mod. Opt."},{"issue":"14","key":"5573_CR13","doi-asserted-by":"publisher","first-page":"2450170","DOI":"10.1142\/S0218127424501700","volume":"34","author":"X Ma","year":"2024","unstructured":"Ma, X., Wang, Z., Wang, C.: An image encryption algorithm based on Tabu search and Hyperchaos. Int. J. Bifurcat. Chaos. 34(14), 2450170 (2024)","journal-title":"Int. J. Bifurcat. Chaos"},{"issue":"2","key":"5573_CR14","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.11591\/ijece.v13i2.pp1903-1913","volume":"13","author":"A Rashid","year":"2023","unstructured":"Rashid, A., Hussein, K.: Image encryption algorithm based on the density and 6D logistic map. Int. J. Electr. Comput. Eng. 13(2), 1903\u20131913 (2023). https:\/\/doi.org\/10.11591\/ijece.v13i2.pp1903-1913","journal-title":"Int. J. Electr. Comput. Eng."},{"issue":"1","key":"5573_CR15","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TCSI.2024.3439869","volume":"72","author":"Q Deng","year":"2025","unstructured":"Deng, Q., Wang, C., Sun, Y., Deng, Z., Yang, G.: Memristive Tabu learning neuron generated Multi-Wing attractor with FPGA implementation and application in encryption. IEEE Trans. Circuits Syst. I Regul. Pap. 72(1), 300\u2013311 (2025)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"5573_CR16","doi-asserted-by":"publisher","first-page":"70025","DOI":"10.1109\/ACCESS.2018.2879844","volume":"6","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Wang, X.: Digital image encryption algorithm based on elliptic curve public cryptosystems. IEEE Access. 6, 70025\u201370034 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2879844","journal-title":"IEEE Access."},{"issue":"12","key":"5573_CR17","doi-asserted-by":"publisher","first-page":"5691","DOI":"10.3390\/app11125691","volume":"11","author":"H Liang","year":"2021","unstructured":"Liang, H., Zhang, G., Hou, W., Huang, P., Liu, B., Li, S.: A novel asymmetric hyperchaotic image encryption scheme based on ellitpic curve cryptograpy. Appl. Sci. MDPI. 11(12), 5691 (2021). https:\/\/doi.org\/10.3390\/app11125691","journal-title":"Appl. Sci. MDPI"},{"key":"5573_CR18","doi-asserted-by":"publisher","first-page":"14719","DOI":"10.1007\/s11071-024-09816-0","volume":"112","author":"S Dhall","year":"2024","unstructured":"Dhall, S., Yadav, K.: Cryptanalysis of substitution-permutation network based image encryption schemes: A systematic review. Nonlinear Dyn. 112, 14719\u201314744 (2024)","journal-title":"Nonlinear Dyn."},{"key":"5573_CR19","doi-asserted-by":"publisher","first-page":"28225","DOI":"10.1007\/s11042-020-09324-4","volume":"37\u201338","author":"S Farwa","year":"2020","unstructured":"Farwa, S., Bibi, N., Muhammad, N.: An efficient image encryption scheme using Fresnelet transfrom and elliptic curve based scrambling. Multimedia Tools Appl. 37\u201338, 28225\u201328232 (2020). https:\/\/doi.org\/10.1007\/s11042-020-09324-4","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"5573_CR20","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.jksuci.2017.06.004","volume":"30","author":"ZE Dawahdeh","year":"2018","unstructured":"Dawahdeh, Z.E., Yaakob, S.N., Bin Othman, R.R.: A new image encryption technique combining elliptic curve cryptosystem with hill cipher. J. King Saud University-Computer Inform. Sci. 30(3), 349 (2018)","journal-title":"J. King Saud University-Computer Inform. Sci."},{"key":"5573_CR21","doi-asserted-by":"publisher","unstructured":"Zhu, X., Liu, H., Liang, Y., Wu, J.: Image encryption based on Kronecker product over finite fields and DNA operation. Int. J. Light Electrons Opt. 224 (2020). https:\/\/doi.org\/10.1016\/j.ijleo.2020.164725","DOI":"10.1016\/j.ijleo.2020.164725"},{"key":"5573_CR22","doi-asserted-by":"publisher","unstructured":"Parida, P., Pradhan, C., Gao, X., Roy, D.: Image encryption and authentication with elliptic curve cryptography and multidimensional chaotic maps. IEEE Access. 9 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3072075","DOI":"10.1109\/ACCESS.2021.3072075"},{"key":"5573_CR23","doi-asserted-by":"publisher","DOI":"10.14704\/WEB\/V19I1\/WEB19160","author":"V Vamsi","year":"2022","unstructured":"Vamsi, V., Reddy, P.: Hybrid image encryption using elliptic curve cryptography, Hadmard transform and Hill cipher. Webology 19. (2022). https:\/\/doi.org\/10.14704\/WEB\/V19I1\/WEB19160","journal-title":"Webology 19"},{"key":"5573_CR24","doi-asserted-by":"publisher","first-page":"3878","DOI":"10.3390\/math10203878","volume":"10","author":"P Lone","year":"2022","unstructured":"Lone, P., Singh, D., Stoffova, V., Mishra, D., Mir, U., Kumar, N.: Cryptanalysis and improved image encryption scheme using elliptic curve and Affine-Hill cipher. Mathematics. 10, 3878 (2022). https:\/\/doi.org\/10.3390\/math10203878","journal-title":"Mathematics"},{"key":"5573_CR25","doi-asserted-by":"publisher","unstructured":"Mir, U., Lone, P., Singh, D., Mishra, D.: A public and private key image encryption by a modified approach of vigener cipher and the chaotic maps. Imaging Sci. J. 71 (2023). https:\/\/doi.org\/10.1080\/13682199.2023.2175436","DOI":"10.1080\/13682199.2023.2175436"},{"key":"5573_CR26","doi-asserted-by":"publisher","first-page":"145459","DOI":"10.1109\/ACCESS.2021.3123571","volume":"9","author":"W Feng","year":"2021","unstructured":"Feng, W., Qin, W., Zhang, J., Ahmad, M.: Cryptanalysis and improvement of the image encryption scheme based on feistel network and dynamic DNA encoding. IEEE Access. 9, 145459\u2013145470 (2021)","journal-title":"IEEE Access."},{"issue":"4","key":"5573_CR27","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1016\/j.jksuci.2022.01.017","volume":"34","author":"X Gao","year":"2022","unstructured":"Gao, X., Mou, J., Banerjee, S., Cao, Y., Xiong, L., Chen, X.: An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map. J. King Saud Univ. - Comput. Inform. Sci. 34(4), 1535\u20131551 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2022.01.017","journal-title":"J. King Saud Univ. - Comput. Inform. Sci."},{"issue":"17","key":"5573_CR28","doi-asserted-by":"publisher","first-page":"2116","DOI":"10.3390\/electronics10172116","volume":"10","author":"MK Khairullah","year":"2021","unstructured":"Khairullah, M.K., Alkahtani, A.A., Bin Baharuddin, M.Z., Al-Jubari, A.M.: Designing 1D chaotic maps for fast chaotic image encryption. Electronics. 10(17), 2116 (2021). https:\/\/doi.org\/10.3390\/electronics10172116","journal-title":"Electronics"},{"key":"5573_CR29","doi-asserted-by":"publisher","unstructured":"Benssalah, M., Rhaskali, Y., Drouiche, K.: An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimedia Tools Appl. 80 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09775-9","DOI":"10.1007\/s11042-020-09775-9"},{"key":"5573_CR30","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Dong, W., Zhang, J., Ding, Q.: An image encryption transmission scheme based on a polynomial chaotic map. Entropy (Basel Switzerland). 25 (2023). https:\/\/doi.org\/10.3390\/e25071005","DOI":"10.3390\/e25071005"},{"key":"5573_CR31","doi-asserted-by":"publisher","unstructured":"Motilal, K., Singh, L., Tuithung, T.: Improvement of image transmission using chaotic system and elliptic curve cryptography. Multimedia Tools Appl. 82 (2022). https:\/\/doi.org\/10.1007\/s11042-022-13253-9","DOI":"10.1007\/s11042-022-13253-9"},{"key":"5573_CR32","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1007\/s12652-021-03675-y","volume":"13","author":"KM Hosny","year":"2022","unstructured":"Hosny, K.M., Kamal, S.T., Darwish, M.M.: Novel encryption for color images using a fractional-order hyperchaotic system. J. Ambient Intelleligence Humaniz. Comput. 13, 973\u2013988 (2022). https:\/\/doi.org\/10.1007\/s12652-021-03675-y","journal-title":"J. Ambient Intelleligence Humaniz. Comput."},{"issue":"1","key":"5573_CR33","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s11042-021-11384-z","volume":"81","author":"KM Hosny","year":"2022","unstructured":"Hosny, K.M., Kamal, S.T., Darwish, M.M.: A color image encryption technique using block scrambling and chaos. Multimedia Tools Appl. 81(1), 505\u2013525 (2022). https:\/\/doi.org\/10.1007\/s11042-021-11384-z","journal-title":"Multimedia Tools Appl."},{"key":"5573_CR34","doi-asserted-by":"publisher","unstructured":"Hosny, K.M., Kamal, S.T., Darwish, M.M.: A novel color image encryption based on fractional shifted gegenbauer moments and 2D logistic-sine map. Visual Comput. 39 (2022). https:\/\/doi.org\/10.1007\/s00371-021-02382-1","DOI":"10.1007\/s00371-021-02382-1"},{"issue":"3","key":"5573_CR35","doi-asserted-by":"publisher","first-page":"443","DOI":"10.3390\/sym14030443","volume":"14","author":"W Alexan","year":"2022","unstructured":"Alexan, W., Gabr, M., Mamdouh, E., Elias, R., Aboshousha, A.: RGB image encryption through cellular automata, S-box and the Lorenz system. Symmetry. 14(3), 443 (2022)","journal-title":"Symmetry"},{"issue":"27\u201328","key":"5573_CR36","doi-asserted-by":"publisher","first-page":"19853","DOI":"10.1007\/s11042-020-08850-5","volume":"79","author":"TS Ali","year":"2020","unstructured":"Ali, T.S., Ali, R.: A new chaos-based color image encryption algorithm using permutation substitution and boolean operation. Multimedia Tools Appl. 79(27\u201328), 19853\u201319873 (2020)","journal-title":"Multimedia Tools Appl."},{"issue":"24","key":"5573_CR37","doi-asserted-by":"publisher","first-page":"3917","DOI":"10.3390\/math12243917","volume":"12","author":"W Feng","year":"2024","unstructured":"Feng, W., Yang, J., Zhao, X., Qin, Z., Zhang, J., Zhu, Z., Wen, H., Qian, K.: A novel Multi-Channel image encryption algorithm leveraging pixel reorganization and hyperchaotic maps. Mathematics. 12(24), 3917 (2024)","journal-title":"Mathematics"},{"key":"5573_CR38","doi-asserted-by":"publisher","first-page":"54928","DOI":"10.1109\/ACCESS.2023.3282160","volume":"11","author":"W Alexan","year":"2023","unstructured":"Alexan, W., Gabr, M., Mamdouh, E., Elias, R., Aboshousha, A.: Color image cryptosystem based on sine chaotic map, 4D Chen hyperchaotic map of Fractional-Order and hybrid DNA coding. IEEE Access. 11, 54928\u201354956 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3282160","journal-title":"IEEE Access."},{"issue":"11","key":"5573_CR39","doi-asserted-by":"publisher","first-page":"0260014","DOI":"10.1371\/journal.pone.0260014","volume":"16","author":"Z Liang","year":"2021","unstructured":"Liang, Z., Qin, Q., Zhou, C., Wang, N., Xu, Y., Zhou, W.: Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. PloS ONE. 16(11), 0260014 (2021)","journal-title":"PloS ONE"},{"key":"5573_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15550-3","author":"Q Li","year":"2023","unstructured":"Li, Q., Chen, L.: An image encryption algorithm based on 6-dimensional hyperchaotic system and DNA encoding. Multimed Tools Appllications. (2023). https:\/\/doi.org\/10.1007\/s11042-023-15550-3","journal-title":"Multimed Tools Appllications"},{"key":"5573_CR41","doi-asserted-by":"publisher","first-page":"12584","DOI":"10.1109\/ACCESS.2019.2893760","volume":"7","author":"W Feng","year":"2019","unstructured":"Feng, W., He, W., Li, H., Li, C.: Cryptanalysis and improvement of the image encryption scheme based on 2D Logistic-Adjusted-Sine map. IEEE Access. 7, 12584\u201312597 (2019)","journal-title":"IEEE Access."},{"key":"5573_CR42","doi-asserted-by":"publisher","first-page":"123190","DOI":"10.1016\/j.eswa.2024.123190","volume":"246","author":"W Feng","year":"2024","unstructured":"Feng, W., Zhang, J., Chen, Y., Qin, Z., Zhang, Y., Ahmad, M., Wo\u017aniak, M.: Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst. Appl. 246, 123190 (2024)","journal-title":"Expert Syst. Appl."},{"key":"5573_CR43","doi-asserted-by":"publisher","first-page":"3875","DOI":"10.1109\/ACCESS.2019.2958336","volume":"8","author":"R Abdelfatah","year":"2020","unstructured":"Abdelfatah, R.: Secure image transmission using Chaotic-Enhanced elliptic curve cryptography. IEEE Access. 8, 3875\u20133890 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2019.2958336","journal-title":"IEEE Access."},{"issue":"11","key":"5573_CR44","first-page":"8","volume":"3","author":"F Amounas","year":"2014","unstructured":"Amounas, F., El Kinani, E.H.: Security enhancement of image encryption based on matrix approach using elliptic curve. Int. J. Eng. Sci. Invention Res. Dev. 3(11), 8\u201316 (2014)","journal-title":"Int. J. Eng. Sci. Invention Res. Dev."},{"issue":"2","key":"5573_CR45","doi-asserted-by":"publisher","first-page":"444","DOI":"10.3390\/electronics12020444","volume":"12","author":"C Garc\u00eda","year":"2023","unstructured":"Garc\u00eda, C., Bermudez, C.F., Tlelo, E., Campos, E.: FPGA imple- mentation of a chaotic map with no fixed point. Electronics. 12(2), 444 (2023)","journal-title":"Electronics"},{"key":"5573_CR46","doi-asserted-by":"publisher","DOI":"10.17487\/RFC5639","author":"J Merkle","year":"2010","unstructured":"Merkle, J., Lochter, M.: Elliptic curve cryptography (ECC) brainpool standard curves and curve generation. RFC 5639. (2010). https:\/\/doi.org\/10.17487\/RFC5639","journal-title":"RFC 5639"},{"key":"5573_CR47","unstructured":"The U.S.C.-S.I.P.I. Image Database: University of Southern California, Signal and Image Processing Institute. (2013). Available at:, accessed http:\/\/sipi.usc.edu\/database\/"},{"key":"5573_CR48","unstructured":"Johnson, R.C.: Fibonacci numbers and matrices. manuscript (2008). available at http:\/\/www.dur.ac.uk\/reciever. johnson\/fibonacci"},{"key":"5573_CR49","doi-asserted-by":"crossref","unstructured":"Alligood, K.T., Sauer, T., Yorke, J.A.: Chaos: an Introduction To Dynamical Systems. Germany, Springer (1997)","DOI":"10.1007\/978-3-642-59281-2"},{"key":"5573_CR50","doi-asserted-by":"publisher","first-page":"25211","DOI":"10.1088\/1402-4896\/acb322","volume":"98","author":"Q Wang","year":"2023","unstructured":"Wang, Q., Zhang, X., Zhao, X.: Color image encryption algorithm based on bidirectional spiral transformation and DNA coding. Phys. Scr. 98, 25211 (2023)","journal-title":"Phys. Scr."},{"key":"5573_CR51","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.vlsi.2023.01.006","volume":"90","author":"F Yu","year":"2023","unstructured":"Yu, F., Xu, S., Xiao, X., Yao, W., Huang, Y., Cai, S., Yin, B., Li, Y.: Dynamics analysis, FPGA realization and image encryption application of a 5D memristive exponential hyperchaotic system. Integration. 90, 58\u201370 (2023)","journal-title":"Integration"},{"key":"5573_CR52","first-page":"125153","volume":"376","author":"H Liu","year":"2020","unstructured":"Liu, H., Kadir, A., Xu, C.: Cryptanalysis and constructing S-Box based on chaotic map and Backtracking. Appl. Math. Comput. 376, 125153 (2020)","journal-title":"Appl. Math. Comput."},{"key":"5573_CR53","doi-asserted-by":"publisher","first-page":"102071","DOI":"10.1016\/j.vlsi.2023.102071","volume":"93","author":"R Liu","year":"2023","unstructured":"Liu, R., Liu, H., Zhao, M.: Reveal the correlation between randomness and Lyapunov exponent of n-dimensional non-degenerate hyper chaotic map. Integration. 93, 102071 (2023)","journal-title":"Integration"},{"key":"5573_CR54","doi-asserted-by":"publisher","first-page":"12337","DOI":"10.1007\/s11071-024-10771-z","volume":"113","author":"H Liu","year":"2025","unstructured":"Liu, H.: Constructing a non-degenerate n-dimensional hyper chaotic map model over GF(p) with application in elliptic curve-based PRNG. Nonlinear Dyn. 113, 12337\u201312348 (2025)","journal-title":"Nonlinear Dyn."},{"key":"5573_CR55","doi-asserted-by":"publisher","first-page":"118339","DOI":"10.1109\/ACCESS.2024.3446733","volume":"12","author":"W Alexan","year":"2024","unstructured":"Alexan, W., Elabyad, N., Khaled, M., Osama, R., El-Damak, D., Abd El Ghany, M., Korayem, Y., Mamdouh, E., Gabr, M.: Triple layer RGB image encryption algorithm utilizing three hyperchaotic systems and its FPGA implementation. IEEE Access. 12, 118339\u2013118361 (2024)","journal-title":"IEEE Access."},{"key":"5573_CR56","doi-asserted-by":"publisher","first-page":"119284","DOI":"10.1109\/ACCESS.2023.3326848","volume":"11","author":"M Gabr","year":"2023","unstructured":"Gabr, M., Korayem, Y., Chen, Y.L., Yee, P.L., Ku, C.S., Alexan, W.: R3\u2014Rescale, rotate, and randomize: A novel image cryptosystem utilizing chaotic and hyper-chaotic systems. IEEE Access. 11, 119284\u2013119312 (2023)","journal-title":"IEEE Access."},{"key":"5573_CR57","doi-asserted-by":"publisher","first-page":"21092","DOI":"10.1109\/ACCESS.2024.3363018","volume":"12","author":"W Alexan","year":"2024","unstructured":"Alexan, W., El-Damak, D., Gabr, M.: Image encryption based on Fourier-DNA coding for hyperchaotic Chen system, Chen-based binary quantization S-box, and variable-base modulo operation. IEEE Access. 12, 21092\u201321113 (2024)","journal-title":"IEEE Access."},{"key":"5573_CR58","doi-asserted-by":"publisher","first-page":"102718","DOI":"10.1109\/ACCESS.2024.3433499","volume":"12","author":"D El-Damak","year":"2024","unstructured":"El-Damak, D., Alexan, W., Mamdouh, E., El-Aasser, M., Fathy, A., Gabr, M.: Fibonacci Q-matrix, hyperchaos, and Galois field (2\u2078) for augmented medical image encryption. IEEE Access. 12, 102718\u2013102744 (2024)","journal-title":"IEEE Access."},{"issue":"B","key":"5573_CR59","doi-asserted-by":"publisher","first-page":"121514","DOI":"10.1016\/j.eswa.2023.121514","volume":"237","author":"H Wen","year":"2024","unstructured":"Wen, H., Lin, Y.: Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst. Appl. 237(B), 121514 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"7","key":"5573_CR60","doi-asserted-by":"publisher","first-page":"101612","DOI":"10.1016\/j.jksuci.2023.101612","volume":"35","author":"H Wen","year":"2023","unstructured":"Wen, H., Lin, Y.: Cryptanalyzing an image cipher using multiple chaos and DNA operations. J. King Saud Univ. - Comput. Inform. Sci. 35(7), 101612 (2023)","journal-title":"J. King Saud Univ. - Comput. Inform. Sci."},{"issue":"4","key":"5573_CR61","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MMUL.2024.3484414","volume":"31","author":"K You","year":"2024","unstructured":"You, K., Chen, P., Li, C.: Cryptanalyzing an image encryption algorithm underpinned by a 3-D boolean Convolution neural network. IEEE MultiMedia. 31(4), 17\u201324 (2024)","journal-title":"IEEE MultiMedia"},{"key":"5573_CR62","doi-asserted-by":"publisher","first-page":"123748","DOI":"10.1016\/j.eswa.2024.123748","volume":"250","author":"H Wen","year":"2024","unstructured":"Wen, H., Lin, Y., Yang, L., Chen, R.: Cryptanalysis of an image encryption scheme using variant hill cipher and chaos. Expert Syst. Appl. 250, 123748 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"21","key":"5573_CR63","doi-asserted-by":"publisher","first-page":"29119","DOI":"10.1007\/s11042-018-6078-2","volume":"77","author":"S Zhu","year":"2018","unstructured":"Zhu, S., Zhu, C.: Image encryption algorithm with an avalanche effect based on a six dimensional discrete chaotic system. Multimedia Tools Appl. 77(21), 29119\u201329142 (2018)","journal-title":"Multimedia Tools Appl."},{"key":"5573_CR64","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-024-01737-w","author":"S Gupta","year":"2024","unstructured":"Gupta, S., Nitish, Harish, M., Sharma, A.K.: A hybrid authenticated image encryption scheme using elliptic curves for enhanced security. Int. J. Inform. Technol. (2024). https:\/\/doi.org\/10.1007\/s41870-024-01737-w","journal-title":"Int. J. Inform. Technol."},{"key":"5573_CR65","doi-asserted-by":"publisher","first-page":"76301","DOI":"10.1007\/s11042-024-18245-5","volume":"83","author":"PL Sharma","year":"2024","unstructured":"Sharma, P.L., Gupta, S., Nayyar, A., Harish, M., Gupta, K., Sharma, A.K.: ECC based novel color image encryption methodology using primitive polynomial. Multimed Tools Appl. 83, 76301\u201376340 (2024)","journal-title":"Multimed Tools Appl."},{"key":"5573_CR66","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1016\/j.jvcir.2021.103424","volume":"83","author":"L Chen","year":"2022","unstructured":"Chen, L., Li, L., Li, C.: Security measurement of a medical communication scheme based on chaos and DNA coding. J. Vis. Commun. Image Represent. 83, 103424: 1047\u20133203 (2022)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"5573_CR67","doi-asserted-by":"publisher","first-page":"12819","DOI":"10.1007\/s11042-023-16073-7","volume":"83","author":"Z Bao","year":"2024","unstructured":"Bao, Z., Xue, R., Hu, J., Liu, Y.: Color image encryption based on lite dense-ResNet and bit-XOR diffusion. Multimedia Tools Appl. 83, 12819\u201312848 (2024)","journal-title":"Multimedia Tools Appl."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05573-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05573-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05573-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:50:11Z","timestamp":1764071411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05573-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,9]]},"references-count":67,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5573"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05573-w","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,9]]},"assertion":[{"value":"23 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"No Human subject or animals are involved in the research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Ethics approval"}},{"value":"All authors have mutually consented to participate.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All the authors have consented the Journal to publish this paper.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"993"}}