{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T21:02:13Z","timestamp":1770930133681,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Joint Funds of Natural Science Foundation of Liaoning Province","award":["2023-BSBA-121"],"award-info":[{"award-number":["2023-BSBA-121"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["N25LPY007"],"award-info":[{"award-number":["N25LPY007"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62171114"],"award-info":[{"award-number":["62171114"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Liaoning Provincial Science and Technology Plan Project","award":["2023JH2\/101700370"],"award-info":[{"award-number":["2023JH2\/101700370"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-025-05901-0","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T18:52:23Z","timestamp":1770922343000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protection of batch color images using a novel parallel cross-plane encryption scheme"],"prefix":"10.1007","volume":"29","author":[{"given":"Wei","family":"Song","sequence":"first","affiliation":[]},{"given":"Buyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chong","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Junxin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yanfeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"5901_CR1","unstructured":"Madnick, S.: Why data breaches spiked in 2023. Harvard Business Review. https:\/\/hbr.org\/2024\/02\/why-data-breaches-spiked-in-2023 (2024)"},{"key":"5901_CR2","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.ins.2020.02.024","volume":"520","author":"J Chen","year":"2020","unstructured":"Chen, J., Chen, L., Zhou, Y.: Cryptanalysis of a dna-based image encryption scheme. Inf. Sci. 520, 130\u2013141 (2020)","journal-title":"Inf. Sci."},{"key":"5901_CR3","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1016\/j.ins.2022.11.121","volume":"621","author":"S Gao","year":"2023","unstructured":"Gao, S., Wu, R., Wang, X., Liu, J., Li, Q., Tang, X.: Efr-cstp: Encryption for face recognition based on the chaos and semi-tensor product theory. Inf. Sci. 621, 766\u2013781 (2023)","journal-title":"Inf. Sci."},{"key":"5901_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.114111","volume":"176","author":"G Long","year":"2023","unstructured":"Long, G., Chai, X., Gan, Z., Jiang, D., He, X., Sun, M.: Exploiting one-dimensional exponential chebyshev chaotic map and matching embedding for visually meaningful image encryption. Chaos, Solitons & Fractals 176, 114111 (2023)","journal-title":"Chaos, Solitons & Fractals"},{"issue":"2","key":"5901_CR5","doi-asserted-by":"publisher","first-page":"186","DOI":"10.3390\/e24020186","volume":"24","author":"J Xu","year":"2022","unstructured":"Xu, J., Zhao, B., Wu, Z.: Research on color image encryption algorithm based on bit-plane and chen chaotic system. Entropy 24(2), 186 (2022)","journal-title":"Entropy"},{"issue":"1","key":"5901_CR6","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s11042-021-11384-z","volume":"81","author":"KM Hosny","year":"2022","unstructured":"Hosny, K.M., Kamal, S.T., Darwish, M.M.: A color image encryption technique using block scrambling and chaos. Multimedia Tools and Applications 81(1), 505\u2013525 (2022)","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"5901_CR7","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/abed7d","volume":"96","author":"X Gao","year":"2021","unstructured":"Gao, X.: A color image encryption algorithm based on an improved h\u00e9non map. Phys. Scr. 96(6), 065203 (2021)","journal-title":"Phys. Scr."},{"key":"5901_CR8","doi-asserted-by":"publisher","first-page":"11541","DOI":"10.1109\/ACCESS.2023.3242311","volume":"11","author":"W Alexan","year":"2023","unstructured":"Alexan, W., Elkandoz, M., Mashaly, M., Azab, E., Aboshousha, A.: Color image encryption through chaos and kaa map. IEEE Access 11, 11541\u201311554 (2023)","journal-title":"IEEE Access"},{"issue":"3","key":"5901_CR9","doi-asserted-by":"publisher","first-page":"2869","DOI":"10.1007\/s11071-022-07756-1","volume":"110","author":"H Qiu","year":"2022","unstructured":"Qiu, H., Xu, X., Jiang, Z., Sun, K., Xiao, C.: A color image encryption algorithm based on hyperchaotic map and rubik s cube scrambling. Nonlinear Dynamics 110(3), 2869\u20132887 (2022)","journal-title":"Nonlinear Dynamics"},{"key":"5901_CR10","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.matcom.2022.07.029","volume":"204","author":"W Song","year":"2023","unstructured":"Song, W., Fu, C., Zheng, Y., Tie, M., Liu, J., Chen, J.: A parallel image encryption algorithm using intra bitplane scrambling. Mathematics and Computers in Simulation 204, 71\u201388 (2023)","journal-title":"Mathematics and Computers in Simulation"},{"issue":"1","key":"5901_CR11","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1007\/s40747-022-00835-1","volume":"9","author":"X Chen","year":"2023","unstructured":"Chen, X., Gong, M., Gan, Z., Lu, Y., Chai, X., He, X.: Cie-lscp: color image encryption scheme based on the lifting scheme and cross-component permutation. Complex & Intelligent Systems 9(1), 927\u2013950 (2023)","journal-title":"Complex & Intelligent Systems"},{"key":"5901_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119923","volume":"223","author":"Q Lai","year":"2023","unstructured":"Lai, Q., Liu, Y.: A cross-channel color image encryption algorithm using two-dimensional hyperchaotic map. Expert Syst. Appl. 223, 119923 (2023)","journal-title":"Expert Syst. Appl."},{"key":"5901_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102831","volume":"59","author":"S Jahangir","year":"2021","unstructured":"Jahangir, S., Shah, T.: A novel multiple color image encryption scheme based on algebra m (2, f2 [u]\/< u8>) and chaotic map. Journal of Information Security and Applications 59, 102831 (2021)","journal-title":"Journal of Information Security and Applications"},{"issue":"1","key":"5901_CR14","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-92065-x","volume":"15","author":"W Alexan","year":"2025","unstructured":"Alexan, W., Youssef, M., Hussein, H.H., Ahmed, K.K., Hosny, K.M., Fathy, A., Mansour, M.B.M.: A new multiple image encryption algorithm using hyperchaotic systems, svd, and modified rc5. Sci. Rep. 15(1), 9775 (2025)","journal-title":"Sci. Rep."},{"key":"5901_CR15","doi-asserted-by":"publisher","first-page":"123921","DOI":"10.1109\/ACCESS.2024.3454512","volume":"12","author":"M Youssef","year":"2024","unstructured":"Youssef, M., Gabr, M., Alexan, W., Mansour, M.B.M., Kamal, K., Hosny, H., El-Damak, D.: Enhancing satellite image security through multiple image encryption via hyperchaos, svd, rc5, and dynamic s-box generation. IEEE Access 12, 123921\u2013123945 (2024)","journal-title":"IEEE Access"},{"key":"5901_CR16","doi-asserted-by":"crossref","unstructured":"El-Damak, D., Alexan, W., Mamdouh, E., El-Aasser, M., Fathy, A., Gabr, M.: Fibonacci q-matrix, hyperchaos, and galois field (2 8) for augmented medical image encryption. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3433499"},{"key":"5901_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-17166-z","author":"V Guleria","year":"2023","unstructured":"Guleria, V., Kumar, Y., Mishra, D.: Multiple colour image encryption using multiple parameter frdct, 3d arnold transform and rsa. Multimedia Tools and Applications (2023). https:\/\/doi.org\/10.1007\/s11042-023-17166-z","journal-title":"Multimedia Tools and Applications"},{"key":"5901_CR18","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","volume":"142","author":"J Wu","year":"2018","unstructured":"Wu, J., Liao, X., Yang, B.: Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process. 142, 292\u2013300 (2018)","journal-title":"Signal Process."},{"key":"5901_CR19","doi-asserted-by":"crossref","unstructured":"Huang, H., Cai, Z.: Duple color image encryption system based on 3d non-equilateral arnold transform for iiot. IEEE Transactions on Industrial Informatics (2022)","DOI":"10.1109\/TII.2022.3217482"},{"key":"5901_CR20","volume":"102","author":"W Song","year":"2022","unstructured":"Song, W., Fu, C., Tie, M., Sham, C.-W., Liu, J., Ma, H.-f: A fast parallel batch image encryption algorithm using intrinsic properties of chaos. Signal Processing: Image Communication 102, 116628 (2022)","journal-title":"Signal Processing: Image Communication"},{"key":"5901_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122052","volume":"238","author":"N-R Zhou","year":"2024","unstructured":"Zhou, N.-R., Hu, L.-L., Huang, Z.-W., Wang, M.-M., Luo, G.-S.: Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm. Expert Syst. Appl. 238, 122052 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"06","key":"5901_CR22","doi-asserted-by":"publisher","DOI":"10.1142\/S0218348X23401114","volume":"31","author":"X Gao","year":"2023","unstructured":"Gao, X., Mou, J., Li, B., Banerjee, S., Sun, B.: Multi-image hybrid encryption algorithm based on pixel substitution and gene theory. Fractals 31(06), 2340111 (2023)","journal-title":"Fractals"},{"issue":"5","key":"5901_CR23","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/acc905","volume":"98","author":"X Zhang","year":"2023","unstructured":"Zhang, X., Liu, M., Tian, J.: Multiple-image encryption algorithm based on sarrus rule and 3d fibonacci matrix. Phys. Scr. 98(5), 055208 (2023)","journal-title":"Phys. Scr."},{"issue":"4","key":"5901_CR24","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1016\/j.jksuci.2022.01.017","volume":"34","author":"X Gao","year":"2022","unstructured":"Gao, X., Mou, J., Banerjee, S., Cao, Y., Xiong, L., Chen, X.: An effective multiple-image encryption algorithm based on 3d cube and hyperchaotic map. Journal of King Saud University-Computer and Information Sciences 34(4), 1535\u20131551 (2022)","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"5901_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-023-02925-0","author":"W Song","year":"2024","unstructured":"Song, W., Fu, C., Lin, Z., Zhang, Y., Chen, J., Sham, C.-W.: Batch medical image encryption using 3d latin cube-based simultaneous permutation and diffusion. Signal, Image and Video Processing (2024). https:\/\/doi.org\/10.1007\/s11760-023-02925-0","journal-title":"Signal, Image and Video Processing"},{"key":"5901_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.113630","volume":"173","author":"Z Zhou","year":"2023","unstructured":"Zhou, Z., Xu, X., Yao, Y., Jiang, Z., Sun, K.: Novel multiple-image encryption algorithm based on a two-dimensional hyperchaotic modular model. Chaos, Solitons & Fractals 173, 113630 (2023)","journal-title":"Chaos, Solitons & Fractals"},{"issue":"6","key":"5901_CR27","doi-asserted-by":"publisher","DOI":"10.3390\/e25060898","volume":"25","author":"J Wu","year":"2023","unstructured":"Wu, J., Zhang, J., Liu, D., Wang, X.: A multiple-medical-image encryption method based on sha-256 and dna encoding. Entropy 25(6), 898 (2023)","journal-title":"Entropy"},{"key":"5901_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169624","volume":"266","author":"M Demirta\u015f","year":"2022","unstructured":"Demirta\u015f, M.: A novel multiple grayscale image encryption method based on 3d bit-scrambling and diffusion. Optik 266, 169624 (2022)","journal-title":"Optik"},{"key":"5901_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103686","volume":"80","author":"W Song","year":"2024","unstructured":"Song, W., Fu, C., Zheng, Y., Zhang, Y., Chen, J., Wang, P.: Batch image encryption using cross image permutation and diffusion. Journal of Information Security and Applications 80, 103686 (2024)","journal-title":"Journal of Information Security and Applications"},{"issue":"5","key":"5901_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-024-04919-0","volume":"28","author":"W Alexan","year":"2025","unstructured":"Alexan, W., Hosny, K., Gabr, M.: A new fast multiple color image encryption algorithm. Cluster Computing 28(5), 1\u201334 (2025)","journal-title":"Cluster Computing"},{"key":"5901_CR31","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.matcom.2020.07.007","volume":"178","author":"DS Malik","year":"2020","unstructured":"Malik, D.S., Shah, T.: Color multiple image encryption scheme based on 3d-chaotic maps. Mathematics and Computers in Simulation 178, 646\u2013666 (2020)","journal-title":"Mathematics and Computers in Simulation"},{"key":"5901_CR32","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1016\/j.ins.2020.09.032","volume":"546","author":"Z Hua","year":"2021","unstructured":"Hua, Z., Zhu, Z., Yi, S., Zhang, Z., Huang, H.: Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Information Sciences 546, 1063\u20131083 (2021)","journal-title":"Information Sciences"},{"issue":"3","key":"5901_CR33","doi-asserted-by":"publisher","first-page":"2917","DOI":"10.1007\/s11071-022-07949-8","volume":"111","author":"D Li","year":"2023","unstructured":"Li, D., Li, J., Di, X., Li, B.: Design of cross-plane colour image encryption based on a new 2d chaotic map and combination of ecies framework. Nonlinear Dyn. 111(3), 2917\u20132942 (2023)","journal-title":"Nonlinear Dyn."},{"key":"5901_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115070","volume":"185","author":"Z Fan","year":"2024","unstructured":"Fan, Z., Sun, X., Zhao, J., Zhang, C., Du, B.: Dynamics analysis and feasibility verification of a 3d discrete memristive chaotic map with multi-vortex-like volume behavior. Chaos, Solitons & Fractals 185, 115070 (2024)","journal-title":"Chaos, Solitons & Fractals"},{"issue":"2","key":"5901_CR35","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","volume":"88","author":"M Everingham","year":"2010","unstructured":"Everingham, M., Van Gool, L., Williams, C.K.I., Winn, J., Zisserman, A.: The pascal visual object classes (voc) challenge. Int. J. Comput. Vision 88(2), 303\u2013338 (2010)","journal-title":"Int. J. Comput. Vision"},{"issue":"08","key":"5901_CR36","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. International journal of bifurcation and chaos 16(08), 2129\u20132151 (2006)","journal-title":"International journal of bifurcation and chaos"},{"issue":"3","key":"5901_CR37","doi-asserted-by":"publisher","first-page":"2867","DOI":"10.1007\/s11071-024-10331-5","volume":"113","author":"M-M Wang","year":"2025","unstructured":"Wang, M.-M., Song, X.-G., Liu, S.-H., Zhao, X.-Q., Zhou, N.-r: A novel 2d log-logistic-sine chaotic map for image encryption. Nonlinear Dynamics 113(3), 2867\u20132896 (2025)","journal-title":"Nonlinear Dynamics"},{"key":"5901_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115521","volume":"188","author":"L-L Hu","year":"2024","unstructured":"Hu, L.-L., Chen, M.-X., Wang, M.-M., Zhou, N.-R.: A multi-image encryption scheme based on block compressive sensing and nonlinear bifurcation diffusion. Chaos, Solitons & Fractals 188, 115521 (2024)","journal-title":"Chaos, Solitons & Fractals"},{"issue":"4","key":"5901_CR39","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1109\/TCBB.2022.3140306","volume":"20","author":"W Wang","year":"2023","unstructured":"Wang, W., Yu, X., Fang, B., Zhao, Y., Chen, Y., Wei, W., Chen, J.: Cross-modality LGE-CMR segmentation using image-to-image translation based data augmentation. IEEE\/ACM Trans. Comput. Biol. Bioinf. 20(4), 2367\u20132375 (2023)","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinf."},{"key":"5901_CR40","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3310097","author":"J Chen","year":"2023","unstructured":"Chen, J., Wang, W., Fang, B., Liu, Y., Yu, K., Leung, V.C., Hu, X.: Digital twin empowered wireless healthcare monitoring for smart home. IEEE Journal on Selected Areas in Communications (2023). https:\/\/doi.org\/10.1109\/jsac.2023.3310097","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"5901_CR41","doi-asserted-by":"crossref","unstructured":"Chen, J., Guo, Z., Xu, X., Zhang, L.-b., Teng, Y., Chen, Y., Wo\u017aniak, M., Wang, W.: A robust deep learning framework based on spectrograms for heart sound classification. IEEE\/ACM Transactions on Computational Biology and Bioinformatics (2023)","DOI":"10.1109\/TCBB.2023.3247433"},{"key":"5901_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2024.109546","volume":"223","author":"Y Peng","year":"2024","unstructured":"Peng, Y., Fu, C., Zheng, Y., Tian, Y., Cao, G., Chen, J.: Medical steganography: Enhanced security and image quality, and new sq assessment. Signal Processing 223, 109546 (2024)","journal-title":"Signal Processing"},{"issue":"3","key":"5901_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2025.107511","volume":"362","author":"H Zhang","year":"2025","unstructured":"Zhang, H., Kone, M.M.K., Ma, X.-Q., Zhou, N.-R.: Frequency-domain attention-guided adaptive robust watermarking model. Journal of the Franklin Institute 362(3), 107511 (2025)","journal-title":"Journal of the Franklin Institute"},{"key":"5901_CR44","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.apm.2024.04.012","volume":"131","author":"Z Guo","year":"2024","unstructured":"Guo, Z., Chen, S.-H., Zhou, L., Gong, L.-H.: Optical image encryption and authentication scheme with computational ghost imaging. Appl. Math. Model. 131, 49\u201366 (2024)","journal-title":"Appl. Math. Model."},{"issue":"17","key":"5901_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2024.107203","volume":"361","author":"J-L Hu","year":"2024","unstructured":"Hu, J.-L., Chen, M.-X., Zhou, S., Zhou, N.-R.: Optical image authentication and encryption scheme with computational ghost imaging. Journal of the Franklin Institute 361(17), 107203 (2024)","journal-title":"Journal of the Franklin Institute"},{"key":"5901_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121452","volume":"237","author":"O Kocak","year":"2024","unstructured":"Kocak, O., Erkan, U., Toktas, A., Gao, S.: Pso-based image encryption scheme using modular integrated logistic exponential map. Expert Syst. Appl. 237, 121452 (2024)","journal-title":"Expert Syst. Appl."},{"key":"5901_CR47","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2024.3377011","author":"Q Lai","year":"2024","unstructured":"Lai, Q., Yang, L., Hu, G., Guan, Z.-H., Iu, H.H.-C.: Constructing multiscroll memristive neural network with local activity memristor and application in image encryption. IEEE Transactions on Cybernetics (2024). https:\/\/doi.org\/10.1109\/TCYB.2024.3377011","journal-title":"IEEE Transactions on Cybernetics"},{"key":"5901_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125897","volume":"264","author":"J Yang","year":"2025","unstructured":"Yang, J., Liu, X.: Enhancing secure storage and sharing of multi-image in cloud environments using a novel chaotic map. Expert Syst. Appl. 264, 125897 (2025)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"5901_CR49","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1007\/s11071-024-10268-9","volume":"113","author":"X Liu","year":"2025","unstructured":"Liu, X., Yang, J.: A novel multi-layer image encryption algorithm based on 2d drop-wave function. Nonlinear Dyn. 113(2), 1775\u20131797 (2025)","journal-title":"Nonlinear Dyn."},{"key":"5901_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124891","volume":"257","author":"Y Lin","year":"2024","unstructured":"Lin, Y., Xie, Z., Chen, T., Cheng, X., Wen, H.: Image privacy protection scheme based on high-quality reconstruction dct compression and nonlinear dynamics. Expert Systems with Applications 257, 124891 (2024)","journal-title":"Expert Systems with Applications"},{"key":"5901_CR51","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3237136","author":"S Gao","year":"2023","unstructured":"Gao, S., Wu, R., Wang, X., Liu, J., Li, Q., Wang, C., Tang, X.: Asynchronous updating boolean network encryption algorithm. IEEE Transactions on Circuits and Systems for Video Technology (2023). https:\/\/doi.org\/10.1109\/TCSVT.2023.3237136","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"5901_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.114958","volume":"183","author":"S Gao","year":"2024","unstructured":"Gao, S., Iu, H.H.-C., Mou, J., Erkan, U., Liu, J., Wu, R., Tang, X.: Temporal action segmentation for video encryption. Chaos, Solitons & Fractals 183, 114958 (2024)","journal-title":"Chaos, Solitons & Fractals"},{"key":"5901_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121514","volume":"237","author":"H Wen","year":"2024","unstructured":"Wen, H., Lin, Y.: Cryptanalysis of an image encryption algorithm using quantum chaotic map and dna coding. Expert Systems with Applications 237, 121514 (2024)","journal-title":"Expert Systems with Applications"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05901-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05901-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05901-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T20:02:21Z","timestamp":1770926541000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05901-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,12]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5901"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05901-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,12]]},"assertion":[{"value":"22 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"131"}}