{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T07:00:30Z","timestamp":1768719630908,"version":"3.49.0"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T00:00:00Z","timestamp":1699574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T00:00:00Z","timestamp":1699574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62061014"],"award-info":[{"award-number":["62061014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005047","name":"Natural Science Foundation of Liaoning Province","doi-asserted-by":"publisher","award":["2020-MS-274"],"award-info":[{"award-number":["2020-MS-274"]}],"id":[{"id":"10.13039\/501100005047","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Basic Scientific Research Projects of Colleges and Universities of Liaoning Province","award":["LJKZ0545"],"award-info":[{"award-number":["LJKZ0545"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11036-023-02147-1","type":"journal-article","created":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T10:02:03Z","timestamp":1699610523000},"page":"583-594","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Novel Color Image Encryption Algorithm Based on Cross-plane Scrambling and Diffusion"],"prefix":"10.1007","volume":"29","author":[{"given":"Xuejun","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1192-1185","authenticated-orcid":false,"given":"Bo","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xiuguo","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Huizhen","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Linian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,10]]},"reference":[{"key":"2147_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01293-9","author":"J Mou","year":"2019","unstructured":"Mou J, Yang F, Chu R, Cao Y (2019) Image compression and encryption algorithm based on hyper-chaotic map. Mobile Networks and Applications. https:\/\/doi.org\/10.1007\/s11036-019-01293-9","journal-title":"Mobile Networks and Applications"},{"key":"2147_CR2","doi-asserted-by":"crossref","unstructured":"X.\u00a0Li, J.\u00a0Mou, S.\u00a0Banerjee, Z.\u00a0Wang, Y.\u00a0Cao, Design and dsp implementation of a fractional-order detuned laser hyperchaotic circuit with applications in image encryption, Chaos, Solitons & Fractals 159 (2022) 112133. https:\/\/doi.org\/10.1016\/j.chaos.2022.112133","DOI":"10.1016\/j.chaos.2022.112133"},{"key":"2147_CR3","doi-asserted-by":"crossref","unstructured":"C.\u00a0Wang, B.\u00a0Ma, Z.\u00a0Xia, J.\u00a0Li, Q.\u00a0Li, Y.\u00a0Q. Shi, Stereoscopic image description with trinion fractional-order continuous orthogonal moments, IEEE Transactions on Circuits and Systems for Video Technology 32\u00a0(4) (2022) 1998\u20132012. https:\/\/doi.org\/10.1109\/TCSVT.2021.3094882","DOI":"10.1109\/TCSVT.2021.3094882"},{"key":"2147_CR4","doi-asserted-by":"crossref","unstructured":"M.\u00a0Zhou, C.\u00a0Wang, A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks, Signal Processing 171 (2020). https:\/\/doi.org\/10.1016\/j.sigpro.2020.107484","DOI":"10.1016\/j.sigpro.2020.107484"},{"key":"2147_CR5","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Zhou, C.\u00a0Li, W.\u00a0Li, H.\u00a0Li, W.\u00a0Feng, K.\u00a0Qian, Image encryption algorithm with circle index table scrambling and partition diffusion, Nonlinear Dynamics 103\u00a0(2) (2021) 2043\u20132061. https:\/\/doi.org\/10.1007\/s11071-021-06206-8","DOI":"10.1007\/s11071-021-06206-8"},{"key":"2147_CR6","doi-asserted-by":"crossref","unstructured":"X.\u00a0Wang, X.\u00a0Wang, B.\u00a0Ma, Q.\u00a0Li, Y.-Q. Shi, High precision error prediction algorithm based on ridge regression predictor for reversible data hiding, IEEE Signal Processing Letters 28 (2021) 1125\u20131129. https:\/\/doi.org\/10.1109\/lsp.2021.3080181","DOI":"10.1109\/LSP.2021.3080181"},{"key":"2147_CR7","doi-asserted-by":"crossref","unstructured":"B.\u00a0Ma, Y.\u00a0Q. Shi, A reversible data hiding scheme based on code division multiplexing, IEEE Transactions on Information Forensics and Security 11\u00a0(9) (2016) 1914\u20131927. https:\/\/doi.org\/10.1109\/tifs.2016.2566261","DOI":"10.1109\/TIFS.2016.2566261"},{"key":"2147_CR8","doi-asserted-by":"crossref","unstructured":"Q.\u00a0Li, X.\u00a0Wang, B.\u00a0Ma, X.\u00a0Wang, C.\u00a0Wang, S.\u00a0Gao, Y.\u00a0Shi, Concealed attack for robust watermarking based on generative model and perceptual loss, IEEE Transactions on Circuits and Systems for Video Technology (2021) 1\u20131 https:\/\/doi.org\/10.1109\/TCSVT.2021.3138795","DOI":"10.1109\/TCSVT.2021.3138795"},{"key":"2147_CR9","doi-asserted-by":"crossref","unstructured":"F.\u00a0Yu, H.\u00a0Shen, Z.\u00a0Zhang, Y.\u00a0Huang, S.\u00a0Cai, S.\u00a0Du, A new multi-scroll chua\u2019s circuit with composite hyperbolic tangent-cubic nonlinearity: Complex dynamics, hardware implementation and image encryption application, Integration 81 (2021) 71\u201383. https:\/\/doi.org\/10.1016\/j.vlsi.2021.05.011","DOI":"10.1016\/j.vlsi.2021.05.011"},{"key":"2147_CR10","doi-asserted-by":"crossref","unstructured":"X.\u00a0Gao, J.\u00a0Mou, L.\u00a0Xiong, Y.\u00a0Sha, H.\u00a0Yan, Y.\u00a0Cao, A fast and efficient multiple images encryption based on single-channel encryption and chaotic system, Nonlinear Dynamics 108\u00a0(1) (2022) 613\u2013636. https:\/\/doi.org\/10.1007\/s11071-021-07192-7","DOI":"10.1007\/s11071-021-07192-7"},{"key":"2147_CR11","doi-asserted-by":"crossref","unstructured":"F.\u00a0Yang, X.\u00a0An, L.\u00a0xiong, A new discrete chaotic map application in image encryption algorithm, Physica Scripta 97\u00a0(3) (2022). https:\/\/doi.org\/10.1088\/1402-4896\/ac4fd0","DOI":"10.1088\/1402-4896\/ac4fd0"},{"key":"2147_CR12","doi-asserted-by":"crossref","unstructured":"C.-L. Li, Y.\u00a0Zhou, H.-M. Li, W.\u00a0Feng, J.-R. Du, Image encryption scheme with bit-level scrambling and multiplication diffusion, Multimedia Tools and Applications 80\u00a0(12) (2021) 18479\u201318501. https:\/\/doi.org\/10.1007\/s11042-021-10631-7","DOI":"10.1007\/s11042-021-10631-7"},{"key":"2147_CR13","doi-asserted-by":"crossref","unstructured":"H.\u00a0Liu, A.\u00a0Kadir, Asymmetric color image encryption scheme using 2d discrete-time map, Signal Processing 113 (2015) 104\u2013112. https:\/\/doi.org\/10.1016\/j.sigpro.2015.01.016","DOI":"10.1016\/j.sigpro.2015.01.016"},{"key":"2147_CR14","doi-asserted-by":"crossref","unstructured":"H.\u00a0Li, Y.\u00a0Wang, Z.\u00a0Zuo, Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms, Optics and Lasers in Engineering 115 (2019) 197\u2013207. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.12.002","DOI":"10.1016\/j.optlaseng.2018.12.002"},{"key":"2147_CR15","doi-asserted-by":"crossref","unstructured":"M.\u00a0Khan, F.\u00a0Masood, A novel chaotic image encryption technique based on multiple discrete dynamical maps, Multimedia Tools and Applications 78\u00a0(18) (2019) 26203\u201326222. https:\/\/doi.org\/10.1007\/s11042-019-07818-4","DOI":"10.1007\/s11042-019-07818-4"},{"key":"2147_CR16","doi-asserted-by":"crossref","unstructured":"M.\u00a0Z. Talhaoui, X.\u00a0Wang, A new fractional one dimensional chaotic map and its application in high-speed image encryption, Information Sciences 550 (2021) 13\u201326. https:\/\/doi.org\/10.1016\/j.ins.2020.10.048","DOI":"10.1016\/j.ins.2020.10.048"},{"key":"2147_CR17","doi-asserted-by":"crossref","unstructured":"A.\u00a0Belazi, M.\u00a0Khan, A.\u00a0A.\u00a0A. El-Latif, S.\u00a0Belghith, Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption, Nonlinear Dynamics 87\u00a0(1) (2016) 337\u2013361. https:\/\/doi.org\/10.1007\/s11071-016-3046-0","DOI":"10.1007\/s11071-016-3046-0"},{"key":"2147_CR18","doi-asserted-by":"crossref","unstructured":"X.\u00a0Ma, J.\u00a0Mou, J.\u00a0Liu, C.\u00a0Ma, F.\u00a0Yang, X.\u00a0Zhao, A novel simple chaotic circuit based on memristor-memcapacitor, Nonlinear Dynamics 100\u00a0(3) (2020) 2859\u20132876. https:\/\/doi.org\/10.1007\/s11071-020-05601-x","DOI":"10.1007\/s11071-020-05601-x"},{"key":"2147_CR19","doi-asserted-by":"crossref","unstructured":"J.\u00a0Deng, M.\u00a0Zhou, C.\u00a0Wang, S.\u00a0Wang, C.\u00a0Xu, Image segmentation encryption algorithm with chaotic sequence generation participated by cipher and multi-feedback loops, Multimedia Tools and Applications 80\u00a0(9) (2021) 13821\u201313840. https:\/\/doi.org\/10.1007\/s11042-020-10429-z","DOI":"10.1007\/s11042-020-10429-z"},{"key":"2147_CR20","doi-asserted-by":"crossref","unstructured":"X.\u00a0Liu, J.\u00a0Mou, H.\u00a0Yan, X.\u00a0Bi, Memcapacitor-coupled chebyshev hyperchaotic map, International Journal of Bifurcation and Chaos 32\u00a0(12) (2022) 2250180. https:\/\/doi.org\/10.1142\/S0218127422501802","DOI":"10.1142\/S0218127422501802"},{"key":"2147_CR21","doi-asserted-by":"crossref","unstructured":"E.\u00a0Mahmoud, B.\u00a0Al-Harthi, A hyperchaotic detuned laser model with an infinite number of equilibria existing on a plane and its modified complex phase synchronization with time lag, Chaos, Solitons & Fractals 130 (2020) 109442\u2013109457. https:\/\/doi.org\/10.1016\/j.chaos.2019.109442","DOI":"10.1016\/j.chaos.2019.109442"},{"key":"2147_CR22","doi-asserted-by":"crossref","unstructured":"J.\u00a0Xu, J.\u00a0Mou, J.\u00a0Liu, J.\u00a0Hao, The image compression-encryption algorithm based on the compression sensing and fractional-order chaotic system, The Visual Computer (2021) 1\u201318 https:\/\/doi.org\/10.1007\/s00371-021-02085-7","DOI":"10.1007\/s00371-021-02085-7"},{"key":"2147_CR23","doi-asserted-by":"crossref","unstructured":"X.\u00a0Gao, J.\u00a0Mou, S.\u00a0Banerjee, Y.\u00a0Cao, L.\u00a0Xiong, X.\u00a0Chen, An effective multiple-image encryption algorithm based on 3d cube and hyperchaotic map, Journal of King Saud University - Computer and Information Sciences (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2022.01.017","DOI":"10.1016\/j.jksuci.2022.01.017"},{"key":"2147_CR24","doi-asserted-by":"crossref","unstructured":"H.\u00a0Lin, C.\u00a0Wang, F.\u00a0Yu, C.\u00a0Xu, Q.\u00a0Hong, W.\u00a0Yao, Y.\u00a0Sun, An extremely simple multiwing chaotic system: Dynamics analysis, encryption application, and hardware implementation, IEEE Transactions on Industrial Electronics 68\u00a0(12) (2021) 12708\u201312719. https:\/\/doi.org\/10.1109\/tie.2020.3047012","DOI":"10.1109\/TIE.2020.3047012"},{"key":"2147_CR25","doi-asserted-by":"crossref","unstructured":"X.\u00a0Han, J.\u00a0Mou, H.\u00a0Jahanshahi, Y.\u00a0Cao, F.\u00a0Bu, A new set of hyperchaotic maps based on modulation and coupling, The European Physical Journal Plus 137\u00a0(4) (2022) 523. https:\/\/doi.org\/10.1140\/epjp\/s13360-022-02734-3","DOI":"10.1140\/epjp\/s13360-022-02734-3"},{"key":"2147_CR26","doi-asserted-by":"crossref","unstructured":"L.\u00a0Ren, J.\u00a0Mou, S.\u00a0Banerjee, Y.\u00a0Zhang, A hyperchaotic map with a new discrete memristor model: Design, dynamical analysis, implementation and application, Chaos, Solitons & Fractals 167 (2023) 113024. https:\/\/doi.org\/10.1016\/j.chaos.2022.113024","DOI":"10.1016\/j.chaos.2022.113024"},{"key":"2147_CR27","doi-asserted-by":"crossref","unstructured":"X.-D. Chen, Y.\u00a0Wang, J.\u00a0Wang, Q.-H. Wang, Asymmetric color cryptosystem based on compressed sensing and equal modulus decomposition in discrete fractional random transform domain, Optics and Lasers in Engineering 121 (2019) 143\u2013149. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.04.004","DOI":"10.1016\/j.optlaseng.2019.04.004"},{"key":"2147_CR28","doi-asserted-by":"crossref","unstructured":"W.\u00a0Wen, Y.\u00a0Hong, Y.\u00a0Fang, M.\u00a0Li, M.\u00a0Li, A visually secure image encryption scheme based on semi-tensor product compressed sensing, Signal Processing 173 (2020). https:\/\/doi.org\/10.1016\/j.sigpro.2020.107580","DOI":"10.1016\/j.sigpro.2020.107580"},{"key":"2147_CR29","doi-asserted-by":"crossref","unstructured":"X.\u00a0Chai, H.\u00a0Wu, Z.\u00a0Gan, D.\u00a0Han, Y.\u00a0Zhang, Y.\u00a0Chen, An efficient approach for encrypting double color images into a visually meaningful cipher image using 2d compressive sensing, Information Sciences 556 (2021) 305\u2013340. https:\/\/doi.org\/10.1016\/j.ins.2020.10.007","DOI":"10.1016\/j.ins.2020.10.007"},{"key":"2147_CR30","doi-asserted-by":"crossref","unstructured":"Q.\u00a0Liu, Y.\u00a0Wang, J.\u00a0Wang, Q.-H. Wang, Optical image encryption using chaos-based compressed sensing and phase-shifting interference in fractional wavelet domain, Optical Review 25\u00a0(1) (2017) 46\u201355. https:\/\/doi.org\/10.1007\/s10043-017-0390-3","DOI":"10.1007\/s10043-017-0390-3"},{"key":"2147_CR31","doi-asserted-by":"crossref","unstructured":"G.\u00a0Cheng, C.\u00a0Wang, C.\u00a0Xu, A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing, Multimedia Tools and Applications 79\u00a0(39-40) (2020) 29243\u201329263. https:\/\/doi.org\/10.1007\/s11042-020-09542-w","DOI":"10.1007\/s11042-020-09542-w"},{"key":"2147_CR32","doi-asserted-by":"crossref","unstructured":"F.\u00a0Yu, Z.\u00a0Zhang, H.\u00a0Shen, Y.\u00a0Huang, S.\u00a0Cai, S.\u00a0Du, Fpga implementation and image encryption application of a new prng based on a memristive hopfield neural network with a special activation gradient, Chinese Physics B 31\u00a0(2) (2022) 020505. https:\/\/doi.org\/10.1088\/1674-1056\/ac3cb2","DOI":"10.1088\/1674-1056\/ac3cb2"},{"key":"2147_CR33","doi-asserted-by":"crossref","unstructured":"F.\u00a0Yu, H.\u00a0Shen, Z.\u00a0Zhang, Y.\u00a0Huang, S.\u00a0Cai, S.\u00a0Du, Dynamics analysis, hardware implementation and engineering applications of novel multi-style attractors in a neural network under electromagnetic radiation, Chaos, Solitons & Fractals 152 (2021). https:\/\/doi.org\/10.1016\/j.chaos.2021.111350","DOI":"10.1016\/j.chaos.2021.111350"},{"key":"2147_CR34","doi-asserted-by":"crossref","unstructured":"Y.-G. Yang, B.-W. Guan, J.\u00a0Li, D.\u00a0Li, Y.-H. Zhou, W.-M. Shi, Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2d compressed sensing and dna encoding, Optics & Laser Technology 119 (2019). https:\/\/doi.org\/10.1016\/j.optlastec.2019.105661","DOI":"10.1016\/j.optlastec.2019.105661"},{"key":"2147_CR35","doi-asserted-by":"crossref","unstructured":"X.\u00a0Wang, Y.\u00a0Wang, X.\u00a0Zhu, C.\u00a0Luo, A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and dna level, Optics and Lasers in Engineering 125 (2020). https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105851","DOI":"10.1016\/j.optlaseng.2019.105851"},{"key":"2147_CR36","doi-asserted-by":"crossref","unstructured":"M.\u00a0A.\u00a0B. Farah, R.\u00a0Guesmi, A.\u00a0Kachouri, M.\u00a0Samet, A novel chaos based optical image encryption using fractional fourier transform and dna sequence operation, Optics & Laser Technology 121 (2020). https:\/\/doi.org\/10.1016\/j.optlastec.2019.105777","DOI":"10.1016\/j.optlastec.2019.105777"},{"key":"2147_CR37","doi-asserted-by":"crossref","unstructured":"T.\u00a0Wang, M.-h. Wang, Hyperchaotic image encryption algorithm based on bit-level permutation and dna encoding, Optics & Laser Technology 132 (2020). https:\/\/doi.org\/10.1016\/j.optlastec.2020.106355","DOI":"10.1016\/j.optlastec.2020.106355"},{"key":"2147_CR38","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Sha, S.\u00a0Bo, C.\u00a0Yang, J.\u00a0Mou, H.\u00a0Jahanshahi, A chaotic image encryption scheme based on genetic central dogma and kmp method, International Journal of Bifurcation and Chaos 32\u00a0(12) (2022) 2250186. https:\/\/doi.org\/10.1142\/S0218127422501863","DOI":"10.1142\/S0218127422501863"},{"key":"2147_CR39","doi-asserted-by":"crossref","unstructured":"U.\u00a0S. Choi, S.\u00a0J. Cho, J.\u00a0G. Kim, S.\u00a0W. Kang, H.\u00a0D. Kim, Color image encryption based on programmable complemented maximum length cellular automata and generalized 3-d chaotic cat map, Multimedia Tools and Applications 79\u00a0(31-32) (2020) 22825\u201322842. https:\/\/doi.org\/10.1007\/s11042-020-09033-y","DOI":"10.1007\/s11042-020-09033-y"},{"key":"2147_CR40","doi-asserted-by":"crossref","unstructured":"P.\u00a0K. Naskar, S.\u00a0Bhattacharyya, D.\u00a0Nandy, A.\u00a0Chaudhuri, A robust image encryption scheme using chaotic tent map and cellular automata, Nonlinear Dynamics 100\u00a0(3) (2020) 2877\u20132898. https:\/\/doi.org\/10.1007\/s11071-020-05625-3","DOI":"10.1007\/s11071-020-05625-3"},{"key":"2147_CR41","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Su, Y.\u00a0Wo, G.\u00a0Han, Reversible cellular automata image encryption for similarity search, Signal Processing: Image Communication 72 (2019) 134\u2013147. https:\/\/doi.org\/10.1016\/j.image.2018.12.008","DOI":"10.1016\/j.image.2018.12.008"},{"key":"2147_CR42","doi-asserted-by":"crossref","unstructured":"X.\u00a0Li, J.\u00a0Mou, Y.\u00a0Cao, S.\u00a0Banerjee, An optical image encryption algorithm based on a fractional-order laser hyperchaotic system, International Journal of Bifurcation and Chaos 32\u00a0(03) (2022) 2250035. https:\/\/doi.org\/10.1142\/S0218127422500353","DOI":"10.1142\/S0218127422500353"},{"key":"2147_CR43","doi-asserted-by":"crossref","unstructured":"S.-S. Yu, N.-R. Zhou, L.-H. Gong, Z.\u00a0Nie, Optical image encryption algorithm based on phase-truncated short-time fractional fourier transform and hyper-chaotic system, Optics and Lasers in Engineering 124 (2020). https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105816","DOI":"10.1016\/j.optlaseng.2019.105816"},{"key":"2147_CR44","doi-asserted-by":"crossref","unstructured":"A.\u00a0B. Joshi, D.\u00a0Kumar, A.\u00a0Gaffar, D.\u00a0C. Mishra, Triple color image encryption based on 2d multiple parameter fractional discrete fourier transform and 3d arnold transform, Optics and Lasers in Engineering 133 (2020). https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106139","DOI":"10.1016\/j.optlaseng.2020.106139"},{"key":"2147_CR45","doi-asserted-by":"crossref","unstructured":"O.\u00a0S. Faragallah, H.\u00a0S. El-sayed, A.\u00a0Afifi, W.\u00a0El-Shafai, Efficient and secure opto-cryptosystem for color images using 2d logistic-based fractional fourier transform, Optics and Lasers in Engineering 137 (2021). https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106333","DOI":"10.1016\/j.optlaseng.2020.106333"},{"key":"2147_CR46","doi-asserted-by":"crossref","unstructured":"A.\u00a0Mansouri, X.\u00a0Wang, A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme, Information Sciences 520 (2020) 46\u201362. https:\/\/doi.org\/10.1016\/j.ins.2020.02.008","DOI":"10.1016\/j.ins.2020.02.008"},{"key":"2147_CR47","doi-asserted-by":"crossref","unstructured":"M.\u00a0A.\u00a0B. Farah, A.\u00a0Farah, T.\u00a0Farah, An image encryption scheme based on a new hybrid chaotic map and optimized substitution box, Nonlinear Dynamics 99\u00a0(4) (2019) 3041\u20133064. https:\/\/doi.org\/10.1007\/s11071-019-05413-8","DOI":"10.1007\/s11071-019-05413-8"},{"key":"2147_CR48","doi-asserted-by":"crossref","unstructured":"X.\u00a0Wang, J.\u00a0Yang, Spatiotemporal chaos in multiple coupled mapping lattices with multi-dynamic coupling coefficient and its application in color image encryption, Chaos, Solitons & Fractals 147 (2021). https:\/\/doi.org\/10.1016\/j.chaos.2021.110970","DOI":"10.1016\/j.chaos.2021.110970"},{"key":"2147_CR49","doi-asserted-by":"crossref","unstructured":"Z.\u00a0Hua, Z.\u00a0Zhu, S.\u00a0Yi, Z.\u00a0Zhang, H.\u00a0Huang, Cross-plane colour image encryption using a two-dimensional logistic tent modular map, Information Sciences 546 (2021) 1063\u20131083. https:\/\/doi.org\/10.1016\/j.ins.2020.09.032","DOI":"10.1016\/j.ins.2020.09.032"},{"key":"2147_CR50","doi-asserted-by":"crossref","unstructured":"L.\u00a0Chua, Memristor-the missing circuit element, IEEE Transactions on Circuit Theory 18\u00a0(5) (1971) 507\u2013519. https:\/\/doi.org\/10.1109\/TCT.1971.1083337","DOI":"10.1109\/TCT.1971.1083337"},{"key":"2147_CR51","doi-asserted-by":"crossref","unstructured":"C.\u00a0Li, Y.\u00a0Yang, X.\u00a0Yang, X.\u00a0Zi, F.\u00a0Xiao, A tristable locally active memristor and its application in hopfield neural network,\u00a0Nonlinear Dynamics 108\u00a0(2) (2022) 1697\u20131717. https:\/\/doi.org\/10.1007\/s11071-022-07268-y","DOI":"10.1007\/s11071-022-07268-y"},{"key":"2147_CR52","doi-asserted-by":"crossref","unstructured":"C.\u00a0Li, H.\u00a0Li, W.\u00a0Xie, J.\u00a0Du, A s-type bistable locally active memristor model and its analog implementation in an oscillator circuit, Nonlinear Dynamics 106\u00a0(1) (2021) 1041\u20131058. https:\/\/doi.org\/10.1007\/s11071-021-06814-4","DOI":"10.1007\/s11071-021-06814-4"},{"key":"2147_CR53","doi-asserted-by":"crossref","unstructured":"F.\u00a0Min, Y.\u00a0Cheng, L.\u00a0Lu, X.\u00a0Li, Extreme multistability and antimonotonicity in a shinriki oscillator with two flux-controlled memristors, International Journal of Bifurcation and Chaos 31\u00a0(11) (2021) 2150167. https:\/\/doi.org\/10.1142\/S0218127421501674","DOI":"10.1142\/S0218127421501674"},{"key":"2147_CR54","doi-asserted-by":"crossref","unstructured":"C.\u00a0Chen, F.\u00a0Min, Y.\u00a0Zhang, B.\u00a0Bao, Memristive electromagnetic induction effects on hopfield neural network, Nonlinear Dynamics 106\u00a0(3) (2021) 2559\u20132576. https:\/\/doi.org\/10.1007\/s11071-021-06910-5","DOI":"10.1007\/s11071-021-06910-5"},{"key":"2147_CR55","doi-asserted-by":"crossref","unstructured":"T.\u00a0Ma, J.\u00a0Mou, H.\u00a0Yan, Y.\u00a0Cao, A new class of hopfield neural network with double memristive synapses and its dsp implementation, The European Physical Journal Plus 137\u00a0(10) (2022) 1135. https:\/\/doi.org\/10.1140\/epjp\/s13360-022-03353-8","DOI":"10.1140\/epjp\/s13360-022-03353-8"},{"key":"2147_CR56","doi-asserted-by":"crossref","unstructured":"X.\u00a0Liu, X.\u00a0Bi, H.\u00a0Yan, J.\u00a0Mou, G.\u00a0Innocenti, A chaotic oscillator based on meminductor, memcapacitor, and memristor, Complexity 2021 (2021) 1\u201316. https:\/\/doi.org\/10.1155\/2021\/7223557","DOI":"10.1155\/2021\/7223557"},{"key":"2147_CR57","doi-asserted-by":"crossref","unstructured":"R.\u00a0I. Abdelfatah, A color image authenticated encryption using conic curve and mersenne twister, Multimedia Tools and Applications 79\u00a0(33-34) (2020) 24731\u201324756. https:\/\/doi.org\/10.1007\/s11042-020-09092-1","DOI":"10.1007\/s11042-020-09092-1"},{"key":"2147_CR58","doi-asserted-by":"crossref","unstructured":"S.\u00a0Zhou, P.\u00a0He, N.\u00a0Kasabov, A dynamic dna color image encryption method based on sha-512, Entropy (Basel) 22\u00a0(10) (2020). https:\/\/doi.org\/10.3390\/e22101091","DOI":"10.3390\/e22101091"},{"key":"2147_CR59","doi-asserted-by":"crossref","unstructured":"Y.-Q. Zhang, Y.\u00a0He, P.\u00a0Li, X.-Y. Wang, A new color image encryption scheme based on 2dnlcml system and genetic operations, Optics and Lasers in Engineering 128 (2020). https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106040","DOI":"10.1016\/j.optlaseng.2020.106040"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02147-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-023-02147-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02147-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T19:06:18Z","timestamp":1735671978000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-023-02147-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,10]]},"references-count":59,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2147"],"URL":"https:\/\/doi.org\/10.1007\/s11036-023-02147-1","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,10]]},"assertion":[{"value":"8 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that we have no conflicts of interests about the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}