{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T19:26:11Z","timestamp":1771529171804,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-025-05918-5","type":"journal-article","created":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:54:51Z","timestamp":1771527291000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An efficient and robust image encryption model using hybrid technique, SHA-224 hashing, and shift AES"],"prefix":"10.1007","volume":"29","author":[{"given":"Shamsa","family":"Kanwal","sequence":"first","affiliation":[]},{"given":"Saba","family":"Inam","sequence":"additional","affiliation":[]},{"given":"Muqaddas","family":"Bibi","sequence":"additional","affiliation":[]},{"given":"Leila","family":"Jamel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,19]]},"reference":[{"key":"5918_CR1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5499538","author":"S Kanwal","year":"2021","unstructured":"Kanwal, S., Inam, S., Cheikhrouhou, O., Mahnoor, K., Zaguia, A., Hamam, H.: Analytic study of a novel color Image Encryption Method Based on the chaos System and color codes. Complexity (2021). https:\/\/doi.org\/10.1155\/2021\/5499538","journal-title":"Complexity"},{"key":"5918_CR2","doi-asserted-by":"publisher","first-page":"126005","DOI":"10.1088\/1402-4896\/ad0944","volume":"98","author":"S Inam","year":"2023","unstructured":"Inam, S., Kanwal, S., Firdous, R., Zakria, K., Hajjej, F.: A new method of image encryption using advanced encryption standard (AES) for network security. Phys. Scr. 98, 126005 (2023). https:\/\/doi.org\/10.1088\/1402-4896\/ad0944","journal-title":"Phys. Scr."},{"key":"5918_CR3","doi-asserted-by":"publisher","unstructured":"Kanwal, S., Inam, S., Othman, M.T., Waqar, A., Ibrahim, M., Nawaz, F., Nawaz, Z., Hamam, H.: An effective color image encryption based on Henon map, tent chaotic map, and orthogonal matrices. Sensors. 22(12), 4359 (2022). https:\/\/doi.org\/10.3390\/s22124359","DOI":"10.3390\/s22124359"},{"key":"5918_CR4","first-page":"15","volume":"13","author":"P Mahajan","year":"2013","unstructured":"Mahajan, P., Sachdeva, A.: A study of encryption algorithms AES, DES and RSA for security. Glob. J. Comput. Sci. Technol. 13, 15\u201322 (2013)","journal-title":"Glob. J. Comput. Sci. Technol."},{"issue":"11","key":"5918_CR5","doi-asserted-by":"publisher","first-page":"1890","DOI":"10.3390\/math13111890","volume":"13","author":"M Qi","year":"2025","unstructured":"Qi, M., Wang, D.: Secure parallel image cryptographic hash function using a novel 2D high-randomness hyperchaotic map. Mathematics. 13(11), 1890 (2025)","journal-title":"Mathematics"},{"issue":"1","key":"5918_CR6","first-page":"33","volume":"172","author":"M Jamil","year":"2017","unstructured":"Jamil, M., Khan, F., Patel, H.: Optimizing AES for image encryption by modifying key scheduling and encryption processes. International Journal of Computer Applications 172(1), 33\u201340 (2017)","journal-title":"International Journal of Computer Applications"},{"key":"5918_CR7","unstructured":"National Institute of Standards and Technology: Advanced Encryption Standard (AES) (FIPS Publication 197-upd1). (2023)"},{"key":"5918_CR8","doi-asserted-by":"publisher","unstructured":"Shukla, P.K., Aljaedi, A., Pareek, P.K., Alharbi, Adel, R., Jamal, S.S.: AES based white box cryptography in digital signature Verification. Sensors. 22, 23 (2022). https:\/\/doi.org\/10.3390\/s22239444","DOI":"10.3390\/s22239444"},{"issue":"2","key":"5918_CR9","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography8020024","volume":"8","author":"A Aljuffri","year":"2024","unstructured":"Aljuffri, A., Huang, R., Muntenaar, L., Gaydadjiev, G., Ma, K., Hamdioui, S., Taouil, M.: The security evaluation of an efficient lightweight AES accelerator. Cryptography 8(2), 24 (2024)","journal-title":"Cryptography"},{"issue":"8","key":"5918_CR10","doi-asserted-by":"publisher","first-page":"3422","DOI":"10.24996\/ijs.2025.66.8.31","volume":"66","author":"MM Hoobi","year":"2025","unstructured":"Hoobi, M.M., Abdulmunem, I.A.: A strong AES algorithm using hash functions for key generation. Iraqi Journal of Science 66(8), 3422\u20133440 (2025)","journal-title":"Iraqi Journal of Science"},{"issue":"3","key":"5918_CR11","first-page":"203","volume":"28","author":"S Singh","year":"2020","unstructured":"Singh, S., Raj, S.: Integration of AES and hashing functions for image encryption. Journal of Computer Security 28(3), 203\u2013214 (2020)","journal-title":"Journal of Computer Security"},{"key":"5918_CR12","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-85814-5","volume":"15","author":"S Mohi Ud Din","year":"2025","unstructured":"Mohi Ud Din, S., Shah, T., Alblehai, F., Nooh, S., Jamal, S.S.: A combinatory approach of non-chain ring and Henon map for image encryption application. Sci. Rep. 15, 1781 (2025)","journal-title":"Sci. Rep."},{"issue":"1","key":"5918_CR13","first-page":"29","volume":"2","author":"H Kiers","year":"1992","unstructured":"Kiers, H., Henon, M.: The Henon map and its applications in physics and cryptography. Journal of Nonlinear Science 2(1), 29\u201343 (1992)","journal-title":"Journal of Nonlinear Science"},{"key":"5918_CR14","unstructured":"Chai, M., Lan, Y.: Symbolic Partition in Chaotic Maps. Physical Review Letter (2023)"},{"issue":"2","key":"5918_CR15","first-page":"102","volume":"8","author":"S Wang","year":"2017","unstructured":"Wang, S., Yu, L.: Secure hash functions for data integrity verification in cryptographic systems. Journal of Information Security 8(2), 102\u2013110 (2017)","journal-title":"Journal of Information Security"},{"issue":"5","key":"5918_CR16","doi-asserted-by":"publisher","first-page":"44","DOI":"10.5120\/ijca2017914422","volume":"177","author":"A Sharma","year":"2021","unstructured":"Sharma, A., Bansal, A., Shukla, A.: Performance enhancement in AES encryption using Shift-AES for large data. International Journal of Computer Applications 177(5), 44\u201351 (2021)","journal-title":"International Journal of Computer Applications"},{"key":"5918_CR17","doi-asserted-by":"crossref","unstructured":"Kanwal, S., Inam, S., Quddus, S., Hajjej, F.: Research on color image encryption approach based on chaotic Duffing map. Physica Scripta. (2023)","DOI":"10.1088\/1402-4896\/ad0d68"},{"key":"5918_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100541","author":"S Inam","year":"2024","unstructured":"Inam, S., Kanwal, S., Anwar, A., Mirza, N.F., Alfraihi, H.: Security of end- to-end medical images encryption system using trained deep learning encryption and decryption network. Egyptian Informatics Journal (2024). https:\/\/doi.org\/10.1016\/j.eij.2024.100541","journal-title":"Egyptian Informatics Journal"},{"issue":"1","key":"5918_CR19","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-56364-z","volume":"14","author":"S Inam","year":"2024","unstructured":"Inam, S., Kanwal, S., Firdous, R., Hajjej, F.: Blockchain-based medical image encryption using Arnold\u2019s cat map in a cloud environment. Scientific Reports 14(1), 2323 (2024)","journal-title":"Scientific Reports"},{"key":"5918_CR20","doi-asserted-by":"crossref","unstructured":"Kanwal, S., Inam, S., Hajjej, F., Cheikhrouhou, O., Nawaz, Z., Bilal, A.: A New Image Encryption Technique Based on Sine map, Chaotic Tent map, and Circulant Matrices. Security and Communication Networks (2022)","DOI":"10.1155\/2022\/4152683"},{"issue":"1","key":"5918_CR21","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-91431-z","volume":"15","author":"S Janakiraman","year":"2025","unstructured":"Janakiraman, S., Vinoth Raj, R., Sivaraman, R., Sridevi, A., Upadhyay, H.N., Amirtharajan, R.: Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs. Sci. Rep. 15(1), 7465 (2025)","journal-title":"Sci. Rep."},{"key":"5918_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100512","author":"F Nawaz","year":"2024","unstructured":"Nawaz, F., Inam, S., Kanwal, S., Al-Otaibi, S., Hajjej, F.: A resilient image encryption scheme using Laplace transform. Egyptian Informatics Journal (2024). https:\/\/doi.org\/10.1016\/j.eij.2024.100512","journal-title":"Egyptian Informatics Journal"},{"key":"5918_CR23","doi-asserted-by":"crossref","unstructured":"Kanwal, S., Inam, S., Al-Otaibi, S., Akbar, J., Siddiqui, N.: & [Other authors]. An efficient image encryption algorithm using 3D-cyclic Chebyshev map and elliptic curve. Scientific Reports, (2024)","DOI":"10.1038\/s41598-024-77955-w"},{"key":"5918_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/eng2.13010","author":"S Kanwal","year":"2024","unstructured":"Kanwal, S., Inam, S., Shah, A.A., Iqbal, H., Bilal, A.: A robust approach to satellite image encryption using chaotic map and circulant matrices. Engineering Reports (2024). https:\/\/doi.org\/10.1002\/eng2.13010","journal-title":"Engineering Reports"},{"key":"5918_CR25","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, H.: A color image encryption with heterogeneous but-permutation and correlated chaos, Faculty of Electronic Information and Electrical Engineering. 342, 51 60, University of Dalian, China, 19. (2015)","DOI":"10.1016\/j.optcom.2014.12.043"},{"key":"5918_CR26","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.optlaseng.2018.11.015","volume":"115","author":"L Huang","year":"2019","unstructured":"Huang, L., Cai, S., Xiong, X., Xiao, M.: On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt. Lasers Eng. 115, 7\u201320 (2019)","journal-title":"Opt. Lasers Eng."},{"key":"5918_CR27","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-92065-x","volume":"15","author":"W Alexan","year":"2025","unstructured":"Alexan, W., Youssef, M., Hussein, H.H., Ahmed, K.K., Hosny, K.M., Fathy, A., Mansour, M.B.M.: A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5. Scientific Reports 15, 9775 (2025)","journal-title":"Scientific Reports"},{"issue":"1","key":"5918_CR28","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/2003724","volume":"2023","author":"M Akraam","year":"2023","unstructured":"Akraam, M., Rashid, T., Zafar, S.: A Chaos-based image encryption scheme is proposed using multiple chaotic maps. Mathematical Problems in Engineering 2023(1), 2003724 (2023)","journal-title":"Mathematical Problems in Engineering"},{"key":"5918_CR29","unstructured":"www.kaggle.com\/c\/ultrasound-nerve-segmentation\/data\/?select=samplesubmission.csv"},{"key":"5918_CR30","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-92752-9","volume":"15","author":"C Nithya","year":"2025","unstructured":"Nithya, C., Lakshmi, C., Thenmozhi, K., Harshavardhan, M.V., Kumaran, R., Velupillai Meikandan, P., Mahalingam, H., Amirtharajan, R.: Secure gray image sharing framework with adaptive key generation using image digest. Scientific Reports 15, 8854 (2025)","journal-title":"Scientific Reports"},{"key":"5918_CR31","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-85539-5","volume":"15","author":"D Ravichandran","year":"2025","unstructured":"Ravichandran, D., Jebarani, W.S.L., Mahalingam, H., Velupillai Meikandan, P., Pravinkumar, P., Amirtharajan, R.: An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework. Scientific Reports 15, 4143 (2025)","journal-title":"Scientific Reports"},{"key":"5918_CR32","doi-asserted-by":"publisher","first-page":"102336","DOI":"10.1016\/j.vlsi.2024.102336","volume":"101","author":"S Zhou","year":"2025","unstructured":"Zhou, S., Wei, Y., Zhang, Y., Iu, H.H.C., Zhang, H.: Image encryption algorithm based on the dynamic RNA computing and a new chaotic map. Integration. 101, 102336 (2025)","journal-title":"Integration"},{"issue":"2","key":"5918_CR33","doi-asserted-by":"publisher","first-page":"025227","DOI":"10.1088\/1402-4896\/ada58f","volume":"100","author":"Y Zhang","year":"2025","unstructured":"Zhang, Y., et al.: Exploiting multi-scroll hyperchaotic system and heap-queue cross-block permutation for visually meaningful medical image encryption. Phys. Scr. 100(2), 025227 (2025)","journal-title":"Phys. Scr."},{"key":"5918_CR34","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s10586-024-04919-0","volume":"28","author":"W Alexan","year":"2025","unstructured":"Alexan, W., Hosny, K., Gabr, M.: A new fast multiple color image encryption algorithm. Cluster Comput. 28, 325 (2025)","journal-title":"Cluster Comput."},{"key":"5918_CR35","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-11499-5","volume":"15","author":"S Inam","year":"2025","unstructured":"Inam, S., Kanwal, S., Amin, E., Cheikhrouhou, O., Hamdi, M.: Securing face images in UAV networks using chaos and DNA cryptography approach. Scientific Reports 15, 26011 (2025)","journal-title":"Scientific Reports"},{"key":"5918_CR36","doi-asserted-by":"publisher","first-page":"21092","DOI":"10.1109\/ACCESS.2024.3363018","volume":"12","author":"W Alexan","year":"2024","unstructured":"Alexan, W., El-Damak, D., Gabr, M.: Image encryption based on Fourier-DNA coding for hyperchaotic Chen system, Chen-based binary quantization S-box, and variable-base modulo operation. IEEE Access. 12, 21092\u201321113 (2024)","journal-title":"IEEE Access."},{"issue":"10","key":"5918_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101858","volume":"35","author":"W Zhang","year":"2023","unstructured":"Zhang, W., Xu, J., Zhao, B.: DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane. Journal of King Saud University - Computer and Information Sciences 35(10), 101858 (2023). https:\/\/doi.org\/10.1016\/j.jksuci.2023.101858","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"5918_CR38","doi-asserted-by":"publisher","first-page":"166748","DOI":"10.1016\/j.ijleo.2021.166748","volume":"238","author":"D Wei","year":"2021","unstructured":"Wei, D., Jiang, M.: A fast image encryption algorithm based on parallel compressive sensing and DNA sequence. Optik. 238, 166748 (2021). https:\/\/doi.org\/10.1016\/j.ijleo.2021.166748","journal-title":"Optik"},{"key":"5918_CR39","doi-asserted-by":"publisher","first-page":"Article5628","DOI":"10.1038\/s41598-025-88561-9","volume":"15","author":"C Lakshmi","year":"2025","unstructured":"Lakshmi, C., Nithya, C., Thenmozhi, K., Sivaraman, R., Yasvanthira Sri, D., Vinizia, B., Subashini, R., Meikandan, P.V., Mahalingam, H., Amirtharajan, R.: Reconfigurable security solution based on Hopfield neural network for e-healthcare applications. Sci. Rep. 15, Article5628 (2025)","journal-title":"Sci. Rep."},{"key":"5918_CR40","doi-asserted-by":"publisher","first-page":"20733","DOI":"10.1038\/s41598-024-71267-9","volume":"14","author":"R Li","year":"2024","unstructured":"Li, R., Liu, T., Yin, J.: An encryption algorithm for color images based on an improved dual-chaotic system combined with DNA encoding. Sci. Rep. 14, 20733 (2024)","journal-title":"Sci. Rep."},{"key":"5918_CR41","doi-asserted-by":"publisher","DOI":"10.3390\/info14080456","volume":"14","author":"M Jiang","year":"2023","unstructured":"Jiang, M., Yang, H.: Image encryption algorithm using Multi-Level permutation and improved logistic Chebyshev coupled map. Information 14, 456 (2023)","journal-title":"Information"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05918-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05918-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05918-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:54:53Z","timestamp":1771527293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05918-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,19]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5918"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05918-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,19]]},"assertion":[{"value":"27 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The authors declare that they have no conflicts of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"179"}}