{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T03:57:55Z","timestamp":1773115075678,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,7,28]],"date-time":"2012-07-28T00:00:00Z","timestamp":1343433600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s11042-012-1173-2","type":"journal-article","created":{"date-parts":[[2012,7,28]],"date-time":"2012-07-28T10:02:10Z","timestamp":1343469730000},"page":"1559-1584","source":"Crossref","is-referenced-by-count":56,"title":["A new image encryption scheme based on cyclic elliptic curve and chaotic system"],"prefix":"10.1007","volume":"70","author":[{"given":"Ahmed A. Abd","family":"El-Latif","sequence":"first","affiliation":[]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,28]]},"reference":[{"key":"1173_CR1","doi-asserted-by":"crossref","unstructured":"Akhavan A, Samsudin A, Akhshani A (2011) A symmetric image encryption scheme based on combination of nonlinear chaotic maps. J Frankl Inst. doi: 10.1016\/j.jfranklin.2011.05.001","DOI":"10.1016\/j.jfranklin.2011.05.001"},{"key":"1173_CR2","doi-asserted-by":"crossref","unstructured":"Amin M, Abd El-Latif AA (2010) Efficient modified RC5 based on chaos adapted to image encryption. J Electron Imag 19(1)","DOI":"10.1117\/1.3360179"},{"key":"1173_CR3","doi-asserted-by":"crossref","first-page":"3484","DOI":"10.1016\/j.cnsns.2009.12.025","volume":"15","author":"M Amin","year":"2010","unstructured":"Amin M, Faragallah OS, Abd El-Latif AA (2010) A chaotic block cipher algorithm for image cryptosystems. Comm Nonlinear Sci Numer Simulat 15:3484\u20133497","journal-title":"Comm Nonlinear Sci Numer Simulat"},{"key":"1173_CR4","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/j.chaos.2007.08.013","volume":"40","author":"S Behnia","year":"2009","unstructured":"Behnia S, Akhshani A, Mahmodi H, Akhavan A (2009) Applications of tripled chaotic maps in cryptography. Chaos, Solitons Fractals 40:505\u2013519","journal-title":"Chaos, Solitons Fractals"},{"key":"1173_CR5","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21:749\u2013761","journal-title":"Chaos, Solitons Fractals"},{"key":"1173_CR6","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.comcom.2008.09.002","volume":"32","author":"PP Deepthi","year":"2009","unstructured":"Deepthi PP, Sathidevi PS (2009) New stream ciphers based on elliptic curve point multiplication. Comput Commun 32:25\u201333","journal-title":"Comput Commun"},{"key":"1173_CR7","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T ElGamal","year":"1985","unstructured":"ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory IT-31:469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"issue":"6","key":"1173_CR8","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(6):1259\u20131284","journal-title":"Int J Bifurc Chaos"},{"key":"1173_CR9","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"T Gao","year":"2008","unstructured":"Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394\u2013400","journal-title":"Phys Lett A"},{"key":"1173_CR10","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"Z-H Guan","year":"2005","unstructured":"Guan Z-H, Huang F, Guan W (2005) Chaos based image encryption algorithm. Phys Lett A 346:153\u2013157","journal-title":"Phys Lett A"},{"issue":"200","key":"1173_CR11","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1090\/S0025-5718-1992-1134730-7","volume":"59","author":"T Hansen","year":"1992","unstructured":"Hansen T, Mullen GL (1992) Primitive polynomials over finite fields. Math Comput 59(200):639\u2013643","journal-title":"Math Comput"},{"issue":"1","key":"1173_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2991\/jnmp.2002.9.1.4","volume":"9","author":"MA Jafarizadeh","year":"2002","unstructured":"Jafarizadeh MA, Behnia S (2002) Hierarchy of chaotic maps with an invariant measure and their compositions. J Nonlinear Math Phys 9(1):1\u201316","journal-title":"J Nonlinear Math Phys"},{"key":"1173_CR13","doi-asserted-by":"crossref","first-page":"1371","DOI":"10.1016\/j.imavis.2008.12.008","volume":"27","author":"C Li","year":"2009","unstructured":"Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27:1371\u20131381","journal-title":"Image Vis Comput"},{"key":"1173_CR14","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1016\/j.cnsns.2010.05.008","volume":"16","author":"C Li","year":"2011","unstructured":"Li C, Li S, Lo K-T (2011) Breaking a modified substitution\u2013diffusion image cipher based on chaotic standard and logistic maps. Comm Nonlinear Sci Numer Simulat 16:837\u2013843","journal-title":"Comm Nonlinear Sci Numer Simulat"},{"key":"1173_CR15","doi-asserted-by":"crossref","unstructured":"Lian S (2008) Multimedia content encryption: techniques and applications. Auerbach Publications, CRC Press, New York","DOI":"10.1201\/9781420065282"},{"key":"1173_CR16","doi-asserted-by":"crossref","first-page":"2509","DOI":"10.1016\/j.chaos.2007.10.054","volume":"40","author":"S Lian","year":"2009","unstructured":"Lian S (2009) Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons Fractals 40:2509\u20132519","journal-title":"Chaos, Solitons Fractals"},{"key":"1173_CR17","doi-asserted-by":"crossref","unstructured":"Mao Y, Chen G (2005) Chaos-based image encryption. In: Bayro E (ed) Handbook of computational geometry for pattern recognition, computer vision, neuralcomputing and robotics. Springer-Verlag, Berlin, Germany, pp 231\u2013265","DOI":"10.1007\/3-540-28247-5_8"},{"issue":"10","key":"1173_CR18","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y Mao","year":"2004","unstructured":"Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurc Chaos 14(10):3613\u20133624","journal-title":"Int J Bifurc Chaos"},{"key":"1173_CR19","first-page":"328","volume":"547","author":"F Morain","year":"1990","unstructured":"Morain F (1990) Building cyclic elliptic curves modulo large primes. LNCS 547:328\u2013336","journal-title":"LNCS"},{"key":"1173_CR20","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic Map. Image Vis Comput 24:926\u2013934","journal-title":"Image Vis Comput"},{"key":"1173_CR21","doi-asserted-by":"crossref","first-page":"2755","DOI":"10.1016\/j.cnsns.2009.11.010","volume":"15","author":"V Patidar","year":"2010","unstructured":"Patidar V, Pareek NK, Purohit G, Sud KK (2010) Modified substitution\u2013diffusion image cipher using chaotic standard and logistic maps. Comm Nonlinear Sci Numer Simulat 15:2755\u20132765","journal-title":"Comm Nonlinear Sci Numer Simulat"},{"key":"1173_CR22","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1016\/j.cnsns.2008.11.005","volume":"14","author":"V Patidar","year":"2009","unstructured":"Patidar V, Pareek NK, Sud KK (2009) A new substitution\u2013diffusion based image cipher using chaotic standard and logistic maps. Comm Nonlinear Sci Numer Simulat 14:3056\u20133075","journal-title":"Comm Nonlinear Sci Numer Simulat"},{"key":"1173_CR23","doi-asserted-by":"crossref","first-page":"2638","DOI":"10.1016\/j.physd.2008.03.049","volume":"237","author":"AN Pisarchik","year":"2008","unstructured":"Pisarchik AN, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Physica D 237:2638\u20132648","journal-title":"Physica D"},{"key":"1173_CR24","doi-asserted-by":"crossref","first-page":"5973","DOI":"10.1016\/j.physleta.2008.07.057","volume":"372","author":"R Rhouma","year":"2008","unstructured":"Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372:5973\u20135978","journal-title":"Phys Lett A"},{"key":"1173_CR25","doi-asserted-by":"crossref","first-page":"5790","DOI":"10.1016\/j.physleta.2008.07.042","volume":"372","author":"R Rhouma","year":"2008","unstructured":"Rhouma R, Belghith S (2008) Cryptanalysis of a spatiotemporal chaotic image\/video cryptosystem. Phys Lett A 372:5790\u20135794","journal-title":"Phys Lett A"},{"key":"1173_CR26","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1016\/j.cnsns.2009.07.007","volume":"15","author":"R Rhouma","year":"2010","unstructured":"Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution\u2013diffusion based image cipher. Comm Nonlinear Sci Numer Simulat 15:1887\u20131892","journal-title":"Comm Nonlinear Sci Numer Simulat"},{"key":"1173_CR27","unstructured":"Ronald L, Rivest MJB, Robshaw R, Sidney and Yin YL (1998) \u201cThe RC6TM block cipher\u201d, version1.1. URL: ftp:\/\/ftp.rsasecurity.com\/pub\/rsalabs\/rc6\/rc6v11.pdf"},{"issue":"2","key":"1173_CR28","first-page":"84","volume":"19","author":"SV Sathyanarayana","year":"2010","unstructured":"Sathyanarayana SV, Aswatha Kumar M, Hari Bhat KN (2010) Random binary and non-binary sequences derived from random sequence of points on cyclic elliptic curve over finite field GF(2 m ) and their properties. Inf Secur J: A Glob Perspect 19(2):84\u201394","journal-title":"Inf Secur J: A Glob Perspect"},{"key":"1173_CR29","first-page":"137","volume":"12","author":"SV Sathyanarayana","year":"2011","unstructured":"Sathyanarayana SV, Aswatha Kumar M, Hari Bhat KN (2011) Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points. Int J Netw Secur 12:137\u2013150","journal-title":"Int J Netw Secur"},{"key":"1173_CR30","volume-title":"Applied cryptography\u2014protocols, algorithms, and source code in C","author":"B Schneier","year":"1996","unstructured":"Schneier B (1996) Applied cryptography\u2014protocols, algorithms, and source code in C, 2nd edn. Wiley, Hoboken","edition":"2"},{"key":"1173_CR31","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1016\/j.chaos.2008.01.028","volume":"38","author":"F Sun","year":"2008","unstructured":"Sun F, Liu S, Li Z, L\u00fc Z (2008) A novel image encryption algorithm based on spatial chaos map. Chaos,Solitons Fractals 38:631\u2013640","journal-title":"Chaos,Solitons Fractals"},{"key":"1173_CR32","unstructured":"The USC-SIPI image database, http:\/\/sipi.usc.edu\/database\/database.php"},{"issue":"6","key":"1173_CR33","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.physleta.2005.05.040","volume":"343","author":"K Wang","year":"2005","unstructured":"Wang K, Pei, Zou L, Song A, He Z (2005) On the security of 3D Cat map based symmetric image encryption scheme. Phys Lett A 343(6):432\u2013439","journal-title":"Phys Lett A"},{"key":"1173_CR34","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","volume":"372","author":"K-W Wong","year":"2008","unstructured":"Wong K-W, Kwok BS-H, Law W-S (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372:2645\u20132652","journal-title":"Phys Lett A"},{"key":"1173_CR35","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1016\/j.chaos.2007.01.034","volume":"38","author":"Q Zhou","year":"2008","unstructured":"Zhou Q, Wong K-W, Liao X, Xiang T, Hu Y (2008) Parallel image encryption algorithm based on discretized chaotic map. Chaos, Solitons Fractals 38:1081\u20131092","journal-title":"Chaos, Solitons Fractals"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-012-1173-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-012-1173-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-012-1173-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T20:37:38Z","timestamp":1562013458000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-012-1173-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,28]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["1173"],"URL":"https:\/\/doi.org\/10.1007\/s11042-012-1173-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,28]]}}}