{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T12:21:40Z","timestamp":1777119700111,"version":"3.51.4"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T00:00:00Z","timestamp":1766534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T00:00:00Z","timestamp":1766534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09876-9","type":"journal-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T15:19:14Z","timestamp":1766589554000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A hybrid encryption model for medical image security in IoT healthcare"],"prefix":"10.1007","volume":"28","author":[{"given":"Shahnwaz","family":"Afzal","sequence":"first","affiliation":[]},{"given":"Mohammad Ubaidullah","family":"Bokhari","sequence":"additional","affiliation":[]},{"given":"Imran","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Md Ashraf","family":"Sidiqui","sequence":"additional","affiliation":[]},{"given":"Ausaf","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Aijaz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"9876_CR1","doi-asserted-by":"publisher","unstructured":"Rehman AU, Khan JS, Ahmad J, Hwang SO. A new image encryption scheme based on dynamic S-boxes and chaotic maps. 3D Res. 2016;7(1):Art. no. 2. https:\/\/doi.org\/10.1007\/s13319-016-0084-9.","DOI":"10.1007\/s13319-016-0084-9"},{"key":"9876_CR2","doi-asserted-by":"publisher","first-page":"2277","DOI":"10.1007\/s12652-018-0825-0","volume":"10","author":"S Suri","year":"2019","unstructured":"Suri S, Vijay R. A synchronous intertwining logistic map\u2013DNA approach for color image encryption. J Ambient Intell Humaniz Comput. 2019;10:2277\u201390. https:\/\/doi.org\/10.1007\/s12652-018-0825-0.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"9876_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.biosystems.2016.03.011","volume":"144","author":"XY Wang","year":"2016","unstructured":"Wang XY, Zhang HL, Bao XM. Color image encryption scheme using CML and DNA sequence operations. BioSystems. 2016;144:18\u201326. https:\/\/doi.org\/10.1016\/j.biosystems.2016.03.011.","journal-title":"BioSystems"},{"issue":"11","key":"9876_CR4","doi-asserted-by":"publisher","first-page":"13681","DOI":"10.1007\/s11042-016-3769-4","volume":"76","author":"B Norouzi","year":"2017","unstructured":"Norouzi B, Mirzakuchaki S. An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimedia Tools Appl. 2017;76(11):13681\u2013701. https:\/\/doi.org\/10.1007\/s11042-016-3769-4.","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"9876_CR5","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1007\/s11071-012-0329-y","volume":"69","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Li C, Li Q, Zhang D, Shu S. Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 2012;69(3):1091\u20136. https:\/\/doi.org\/10.1007\/s11071-012-0329-y.","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"9876_CR6","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.ijleo.2014.08.129","volume":"126","author":"Y Zhang","year":"2015","unstructured":"Zhang Y. Cryptanalysis of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik. 2015;126(2):223\u20139. https:\/\/doi.org\/10.1016\/j.ijleo.2014.08.129.","journal-title":"Optik"},{"issue":"3","key":"9876_CR7","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M. A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn. 2016;83(3):1123\u201336. https:\/\/doi.org\/10.1007\/s11071-015-2392-7.","journal-title":"Nonlinear Dyn"},{"key":"9876_CR8","doi-asserted-by":"publisher","unstructured":"Y G., L S., X X., H X. Image hiding algorithm based on local binary pattern and compressive sensing. Math Comput Simul. 2025;237(Art 316). https:\/\/doi.org\/10.1016\/j.matcom.2025.05.005.","DOI":"10.1016\/j.matcom.2025.05.005"},{"key":"9876_CR9","doi-asserted-by":"publisher","first-page":"Art113804","DOI":"10.1016\/j.knosys.2025.113804","volume":"324","author":"LL Hu","year":"2025","unstructured":"Hu LL, Chen MX, Wang MM, Zhou NR. Visually meaningful triple image encryption algorithm based on 2D compressive sensing and multi-region embedding. Knowl Based Syst. 2025;324:Art113804. https:\/\/doi.org\/10.1016\/j.knosys.2025.113804.","journal-title":"Knowl Based Syst"},{"issue":"9","key":"9876_CR10","doi-asserted-by":"publisher","first-page":"2417","DOI":"10.1007\/s11431-024-2980-x","volume":"68","author":"M Liu","year":"2025","unstructured":"Liu M, Ye G, Zhou J. Asymmetric image encryption-hiding scheme based on reversible neural network. Sci China Technological Sci. 2025;68(9):2417\u201331. https:\/\/doi.org\/10.1007\/s11431-024-2980-x.","journal-title":"Sci China Technological Sci"},{"key":"9876_CR11","doi-asserted-by":"publisher","unstructured":"Chen L, Li C, Li C. Security measurement of a medical communication scheme based on chaos and DNA coding. J Vis Commun Image Represent. 2022;83:Art 103424. https:\/\/doi.org\/10.1016\/j.jvcir.2021.103424.","DOI":"10.1016\/j.jvcir.2021.103424"},{"key":"9876_CR12","unstructured":"Hellman J. ChaCha, a variant of Salsa20, in SASC 2008\u2014The State of the Art of Stream Ciphers, 2008. https:\/\/cr.yp.to\/chacha\/chacha-20080120.pdf."},{"key":"9876_CR13","doi-asserted-by":"publisher","unstructured":"Zhang J, Fang D, Ren H. Image encryption algorithm based on DNA encoding and chaotic maps. Math Probl Eng. 2014;2014:Art 917147. https:\/\/doi.org\/10.1155\/2014\/917147.","DOI":"10.1155\/2014\/917147"},{"key":"9876_CR14","doi-asserted-by":"publisher","unstructured":"Wen H, Yu S, L\u00fc J. Breaking an image encryption algorithm based on DNA encoding and spatiotemporal chaos. Entropy. 2019;21(3)LArt. no. 246. https:\/\/doi.org\/10.3390\/e21030246.","DOI":"10.3390\/e21030246"},{"key":"9876_CR15","unstructured":"Patel S, BKP, Muthu RK. Image encryption decryption using chaotic logistic mapping and DNA encoding, arXiv preprint arXiv:2003.06616, 2020. https:\/\/arxiv.org\/abs\/2003.06616."},{"issue":"5","key":"9876_CR16","doi-asserted-by":"publisher","first-page":"7365","DOI":"10.1007\/s11042-021-11803-1","volume":"81","author":"U Erkan","year":"2022","unstructured":"Erkan U, Toktas A, Engino\u011flu S, Akbacak E, Thanh DNH. An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN. Multimed Tools Appl. 2022;81(5):7365\u201391. https:\/\/doi.org\/10.1007\/s11042-021-11803-1.","journal-title":"Multimed Tools Appl"},{"key":"9876_CR17","doi-asserted-by":"publisher","first-page":"100856","DOI":"10.1109\/ACCESS.2023.3315658","volume":"11","author":"M Es-Sabry","year":"2023","unstructured":"Es-Sabry M, et al. Securing images using high dimensional chaotic maps and DNA encoding techniques. IEEE Access. 2023;11:100856\u201378. https:\/\/doi.org\/10.1109\/ACCESS.2023.3315658.","journal-title":"IEEE Access"},{"key":"9876_CR18","doi-asserted-by":"publisher","unstructured":"Zhao Y, Shi Q, Ding Q. Cryptanalysis of an image encryption algorithm using DNA coding and chaos. Entropy. 2025;27(1):Art. no. 40. https:\/\/doi.org\/10.3390\/e27010040.","DOI":"10.3390\/e27010040"},{"issue":"4","key":"9876_CR19","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1166\/asl.2010.1170","volume":"3","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Wang Q, Wei X. A novel image encryption scheme based on DNA coding and multi-chaotic maps. Adv Sci Lett. 2010;3(4):447\u201351. https:\/\/doi.org\/10.1166\/asl.2010.1170.","journal-title":"Adv Sci Lett"},{"key":"9876_CR20","unstructured":"Chattopadhyay C, Sarkar B, Mukherjee D. Encoding by DNA relations and randomization through chaotic sequences for image encryption, 2015. http:\/\/arxiv.org\/abs\/1505.01795."},{"issue":"20","key":"9876_CR21","doi-asserted-by":"publisher","first-page":"2638","DOI":"10.1016\/j.physd.2008.03.049","volume":"237","author":"AN Pisarchik","year":"2008","unstructured":"Pisarchik AN, Zanin M. Image encryption with chaotically coupled chaotic maps. Phys D Nonlinear Phenom. 2008;237(20):2638\u201348. https:\/\/doi.org\/10.1016\/j.physd.2008.03.049.","journal-title":"Phys D Nonlinear Phenom"},{"issue":"12","key":"9876_CR22","doi-asserted-by":"publisher","first-page":"3998","DOI":"10.1016\/j.cnsns.2010.01.041","volume":"15","author":"JW Yoon","year":"2010","unstructured":"Yoon JW, Kim H. An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun Nonlinear Sci Numer Simul. 2010;15(12):3998\u20134006. https:\/\/doi.org\/10.1016\/j.cnsns.2010.01.041.","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"7","key":"9876_CR23","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.optlaseng.2011.03.017","volume":"49","author":"H Li","year":"2011","unstructured":"Li H, Wang Y. Double-image encryption based on discrete fractional random transform and chaotic maps. Opt Lasers Eng. 2011;49(7):753\u20137. https:\/\/doi.org\/10.1016\/j.optlaseng.2011.03.017.","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"9876_CR24","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.image.2011.11.003","volume":"27","author":"M Fran\u00e7ois","year":"2012","unstructured":"Fran\u00e7ois M, Grosges T, Barchiesi D, Erra R. A new image encryption scheme based on a chaotic function. Signal Process Image Commun. 2012;27(3):249\u201359. https:\/\/doi.org\/10.1016\/j.image.2011.11.003.","journal-title":"Signal Process Image Commun"},{"issue":"11","key":"9876_CR25","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1016\/j.sigpro.2013.03.031","volume":"93","author":"AA Abd El-Latif","year":"2013","unstructured":"Abd El-Latif AA, Li L, Wang N, Han Q, Niu X. A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Sig Process. 2013;93(11):2986\u20133000. https:\/\/doi.org\/10.1016\/j.sigpro.2013.03.031.","journal-title":"Sig Process"},{"issue":"5","key":"9876_CR26","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X. A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng. 2012;38(5):1240\u20138. https:\/\/doi.org\/10.1016\/j.compeleceng.2012.02.007.","journal-title":"Comput Electr Eng"},{"key":"9876_CR27","doi-asserted-by":"publisher","unstructured":"Mazloom S, Eftekhari-Moghadam AM. Color image encryption based on coupled nonlinear chaotic ma., Chaos Solitons Fractals. 2009;42(3):1745\u20131754. https:\/\/doi.org\/10.1016\/j.chaos.2009.03.084.","DOI":"10.1016\/j.chaos.2009.03.084"},{"issue":"7","key":"9876_CR28","doi-asserted-by":"publisher","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso A, Ghebleh M. A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul. 2012;17(7):2943\u201359. https:\/\/doi.org\/10.1016\/j.cnsns.2011.11.030.","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"9876_CR29","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.optcom.2012.06.023","volume":"285","author":"M Shan","year":"2012","unstructured":"Shan M, Chang J, Zhong Z, Hao B. Double image encryption based on discrete multiple-parameter fractional fourier transform and chaotic maps. Opt Commun. 2012;285:21\u20132. https:\/\/doi.org\/10.1016\/j.optcom.2012.06.023.","journal-title":"Opt Commun"},{"key":"9876_CR30","doi-asserted-by":"publisher","unstructured":"Bokhari MU, Afzal S, Khan I, Khan MZ. Securing IoT communications: a novel lightweight stream cipher using DNA cryptography and Grain-80 cipher. SN Comput Sci. 2025;6(2):Art. no. 88. https:\/\/doi.org\/10.1007\/s42979-024-03618-2.","DOI":"10.1007\/s42979-024-03618-2"},{"key":"9876_CR31","doi-asserted-by":"publisher","unstructured":"Qaid GRS, Ebrahim NS. A lightweight cryptographic algorithm based on DNA computing for IoT devices. Secur Commun Netw. 2023;2023(Art 9967129). https:\/\/doi.org\/10.1155\/2023\/9967129.","DOI":"10.1155\/2023\/9967129"},{"key":"9876_CR32","doi-asserted-by":"publisher","first-page":"14284","DOI":"10.1109\/ACCESS.2021.3052161","volume":"9","author":"AG Mohamed","year":"2021","unstructured":"Mohamed AG, Korany NO, El-Khamy SE. New DNA coded fuzzy based (DNAFZ) S-Boxes: application to robust image encryption using hyper chaotic maps. IEEE Access. 2021;9:14284\u2013305. https:\/\/doi.org\/10.1109\/ACCESS.2021.3052161.","journal-title":"IEEE Access"},{"key":"9876_CR33","doi-asserted-by":"publisher","first-page":"43777","DOI":"10.1007\/s11042-022-13012-w","volume":"81","author":"X Wang","year":"2022","unstructured":"Wang X, Du X. Chaotic image encryption method based on improved zigzag permutation and DNA rules. Multimed Tools Appl. 2022;81:43777\u2013803. https:\/\/doi.org\/10.1007\/s11042-022-13012-w.","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"9876_CR34","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1007\/s40747-023-01187-0","volume":"10","author":"YM Afify","year":"2024","unstructured":"Afify YM, Sharkawy NH, Gad W, Badr N. A new dynamic DNA-coding model for gray-scale image encryption. Complex Intell Syst. 2024;10(1):745\u201361. https:\/\/doi.org\/10.1007\/s40747-023-01187-0.","journal-title":"Complex Intell Syst"},{"issue":"4","key":"9876_CR35","doi-asserted-by":"publisher","first-page":"5091","DOI":"10.1007\/s11042-022-12169-8","volume":"82","author":"M Gupta","year":"2023","unstructured":"Gupta M, Singh VP, Gupta KK, Shukla PK. An efficient image encryption technique based on two-level security for internet of things. Multimedia Tools Appl. 2023;82(4):5091\u2013111. https:\/\/doi.org\/10.1007\/s11042-022-12169-8.","journal-title":"Multimedia Tools Appl"},{"issue":"11","key":"9876_CR36","doi-asserted-by":"publisher","first-page":"5083","DOI":"10.1007\/s12652-020-01813-6","volume":"11","author":"S Roy","year":"2020","unstructured":"Roy S, Rawat U, Sareen HA, Nayak SK. IECA: an efficient IoT friendly image encryption technique using programmable cellular automata. J Ambient Intell Humaniz Comput. 2020;11(11):5083\u2013102. https:\/\/doi.org\/10.1007\/s12652-020-01813-6.","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"9876_CR37","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1080\/19393555.2020.1718248","volume":"29","author":"PT Akkasaligar","year":"2020","unstructured":"Akkasaligar PT, Biradar S. Selective medical image encryption using DNA cryptography. Inf Secur J. 2020;29(2):91\u2013101. https:\/\/doi.org\/10.1080\/19393555.2020.1718248.","journal-title":"Inf Secur J"},{"key":"9876_CR38","doi-asserted-by":"publisher","unstructured":"Inam S, Kanwal S, Firdous R, Hajjej F. Blockchain-based medical image encryption using Arnold\u2019s cat map in a cloud environment. Sci Rep. 2024;14(1):Art. no. 56364. https:\/\/doi.org\/10.1038\/s41598-024-56364-z.","DOI":"10.1038\/s41598-024-56364-z"},{"key":"9876_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-19472-6","author":"SE Kaddouhi","year":"2024","unstructured":"Kaddouhi SE, Qobbi Y, Abid A, Jarjar M, Zaaraoui H, Jarjar A. A new image encryption approach that uses an improved Hill-Vigen\u00e8re method and chaotic maps. Multimed Tools Appl. 2024. https:\/\/doi.org\/10.1007\/s11042-024-19472-6.","journal-title":"Multimed Tools Appl"},{"key":"9876_CR40","doi-asserted-by":"publisher","unstructured":"Zhang B, Liu L. Chaos-based image encryption: Review, application, and challenges. Mathematics. Art No 2585. 2023;11(11). https:\/\/doi.org\/10.3390\/math11112585.","DOI":"10.3390\/math11112585"},{"key":"9876_CR41","doi-asserted-by":"publisher","unstructured":"Liu W, Wang H, Chen Y, Sun K. A new image encryption scheme based on block compressive sensing and chaotic laser system for IoT. Eur Phys J Plus. 2024;139(6):Art. no. 5221. https:\/\/doi.org\/10.1140\/epjp\/s13360-024-05221-z.","DOI":"10.1140\/epjp\/s13360-024-05221-z"},{"issue":"3","key":"9876_CR42","doi-asserted-by":"publisher","first-page":"2261","DOI":"10.1007\/s11277-023-10382-8","volume":"130","author":"P Kumari","year":"2023","unstructured":"Kumari P, Mondal B. An encryption scheme based on grain stream cipher and chaos for privacy protection of image data on IoT network. Wirel Personal Communication. 2023;130(3):2261\u201380. https:\/\/doi.org\/10.1007\/s11277-023-10382-8.","journal-title":"Wirel Personal Communication"},{"key":"9876_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICIEV.2017.8338573","volume":"2018\u2013Janua","author":"S Mostafa","year":"2017","unstructured":"Mostafa S, Fahim MANI, Hossain ABMA. A new chaos-based medical image encryption scheme. 2017 6th Int Conf Inf Electron Vis 2017 7th Int Symp Comput Med Heal Technol ICIEV-ISCMHT 2017. 2017;2018\u2013Janua:1\u20136. https:\/\/doi.org\/10.1109\/ICIEV.2017.8338573.","journal-title":"2017 6th Int Conf Inf Electron Vis 2017 7th Int Symp Comput Med Heal Technol ICIEV-ISCMHT 2017"},{"issue":"11","key":"9876_CR44","doi-asserted-by":"publisher","first-page":"5399","DOI":"10.1007\/s12652-020-01896-1","volume":"11","author":"ZW Peng","year":"2020","unstructured":"Peng ZW, et al. Dynamic analysis of seven-dimensional fractional-order chaotic system and its application in encrypted communication. J Ambient Intell Humaniz Comput. 2020;11(11):5399\u2013417. https:\/\/doi.org\/10.1007\/s12652-020-01896-1.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"9876_CR45","doi-asserted-by":"publisher","unstructured":"Long G, Verma V, Jiang D, Yang Y, Ahmad M. A LE-controlled 4D non-degenerate hyperchaotic system and STP-CS model based efficient image encryption algorithm. Physica Scripta. 2025;100(2):Art. no. 025208. https:\/\/doi.org\/10.1088\/1402-4896\/ad9d8b.","DOI":"10.1088\/1402-4896\/ad9d8b"},{"key":"9876_CR46","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3540566","author":"S Fu","year":"2025","unstructured":"Fu S, Dong F, Chen R, Shen D, Zhang J, He Q. Multi-dimensional training optimization for efficient federated synergy learning. IEEE Trans Mob Comput. 2025. https:\/\/doi.org\/10.1109\/TMC.2025.3540566.","journal-title":"IEEE Trans Mob Comput"},{"key":"9876_CR47","doi-asserted-by":"publisher","first-page":"43189","DOI":"10.1007\/s11042-022-13162-x","volume":"81","author":"TA Dhopavkar","year":"2022","unstructured":"Dhopavkar TA, Nayak SK, Roy S. IETD: a novel image encryption technique using Tinkerbell map and duffing map for IoT applications. Multimedia Tools Application. 2022;81:43189\u2013228. https:\/\/doi.org\/10.1007\/s11042-022-13162-x.","journal-title":"Multimedia Tools Application"},{"key":"9876_CR48","doi-asserted-by":"publisher","unstructured":"Som S, Kotal A, Mitra A, Palit S, Chaudhuri BB. A chaos-based partial image encryption scheme. in Proceedings of the 2014 2nd International Conference on Business and Information Management (ICBIM), 2014, pp. 58\u201363. https:\/\/doi.org\/10.1109\/ICBIM.2014.6970933.","DOI":"10.1109\/ICBIM.2014.6970933"},{"key":"9876_CR49","doi-asserted-by":"publisher","first-page":"Art125050","DOI":"10.1016\/j.eswa.2024.125050","volume":"257","author":"T Umar","year":"2024","unstructured":"Umar T, Nadeem M, Anwer F. Chaos-based image encryption scheme to secure sensitive multimedia content in cloud storage. Expert Syst Appl. 2024;257:Art125050. https:\/\/doi.org\/10.1016\/j.eswa.2024.125050.","journal-title":"Expert Syst Appl"},{"key":"9876_CR50","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.ins.2020.02.012","volume":"520","author":"Y Zhang","year":"2020","unstructured":"Zhang Y. The fast image encryption algorithm based on lifting scheme and chaos. Inf Sci (Ny). 2020;520:177\u201394. https:\/\/doi.org\/10.1016\/j.ins.2020.02.012.","journal-title":"Inf Sci (Ny)"},{"key":"9876_CR51","doi-asserted-by":"publisher","first-page":"155184","DOI":"10.1109\/ACCESS.2020.3019216","volume":"8","author":"SF Yousif","year":"2020","unstructured":"Yousif SF, Abboud AJ, Radhi HY. Robust image encryption with scanning Technology, the El-Gamal algorithm and chaos theory. IEEE Access. 2020;8:155184\u2013209. https:\/\/doi.org\/10.1109\/ACCESS.2020.3019216.","journal-title":"IEEE Access"},{"key":"9876_CR52","doi-asserted-by":"publisher","first-page":"26257","DOI":"10.1109\/ACCESS.2022.3151174","volume":"10","author":"ZA Abduljabbar","year":"2022","unstructured":"Abduljabbar ZA, et al. Provably secure and fast color image encryption algorithm based on S-Boxes and hyperchaotic map. IEEE Access. 2022;10:26257\u201370. https:\/\/doi.org\/10.1109\/ACCESS.2022.3151174.","journal-title":"IEEE Access"},{"issue":"10","key":"9876_CR53","doi-asserted-by":"publisher","first-page":"9007","DOI":"10.1007\/s12652-020-02597-5","volume":"12","author":"W El-Shafai","year":"2021","unstructured":"El-Shafai W, Khallaf F, El-Rabaie ESM, El-Samie FEA. Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications. J Ambient Intell Humaniz Comput. 2021;12(10):9007\u201335. https:\/\/doi.org\/10.1007\/s12652-020-02597-5.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"9876_CR54","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y. Image encryption using 2D Logistic-adjusted-Sine map. Inf Sci. 2016;339:237\u201353.","journal-title":"Inf Sci"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09876-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09876-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09876-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T15:19:15Z","timestamp":1766589555000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09876-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,24]]},"references-count":54,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9876"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09876-9","relation":{},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,24]]},"assertion":[{"value":"12 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This study does not involve any human participants or identifiable personal data. All images are fully anonymized public benchmark images. Therefore, no institutional ethics approval, informed consent, or administrative permissions were required. Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"321"}}