{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:25:16Z","timestamp":1771230316041,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T00:00:00Z","timestamp":1354147200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11042-012-1292-9","type":"journal-article","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T14:53:43Z","timestamp":1354200823000},"page":"1469-1497","source":"Crossref","is-referenced-by-count":181,"title":["A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process"],"prefix":"10.1007","volume":"71","author":[{"given":"Benyamin","family":"Norouzi","sequence":"first","affiliation":[]},{"given":"Sattar","family":"Mirzakuchaki","sequence":"additional","affiliation":[]},{"given":"Seyed Mohammad","family":"Seyedzadeh","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Mosavi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,29]]},"reference":[{"key":"1292_CR1","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1016\/j.optcom.2010.04.056","volume":"283","author":"A Akhshani","year":"2010","unstructured":"Akhshani A, Behnia S, Akhavan A, Hassan HA, Hassan Z (2010) A novel scheme for image encryption based on 2D piecewise chaotic maps. J Opt Commun 283:3259\u20133266","journal-title":"J Opt Commun"},{"key":"1292_CR2","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/S0375-9601(99)00747-1","volume":"263","author":"E Alvarez","year":"1999","unstructured":"Alvarez E, Fernandez A, Garc\u00eda P, Jimenez J, Marcano A (1999) New approach to chaotic encryption. J Phys Lett A 263:373\u2013375","journal-title":"J Phys Lett A"},{"key":"1292_CR3","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/S0375-9601(00)00642-3","volume":"276","author":"G Alvarez","year":"2000","unstructured":"Alvarez G, Montoya F, Romera M, Pastor G (2000) Cryptanalysis of a chaotic encryption system. J Phys Lett A 276:191\u2013196","journal-title":"J Phys Lett A"},{"issue":"11","key":"1292_CR4","doi-asserted-by":"crossref","first-page":"3484","DOI":"10.1016\/j.cnsns.2009.12.025","volume":"15","author":"M Amin","year":"2010","unstructured":"Amin M, Faragallah OS, El-Latif AAA (2010) A chaotic block cipher algorithm for image cryptosystems. J Commun Nonlinear Sci Numer Simul 15(11):3484\u20133497","journal-title":"J Commun Nonlinear Sci Numer Simul"},{"key":"1292_CR5","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1998","unstructured":"Baptista MS (1998) Cryptography with chaos. J Phys Lett A 240:50\u201354","journal-title":"J Phys Lett A"},{"key":"1292_CR6","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.physleta.2007.01.081","volume":"366","author":"S Behnia","year":"2007","unstructured":"Behnia S, Akhshani A, Ahadpour S, Mahmodi H, Akhavan A (2007) A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. J Phys Lett A 366:391\u2013396","journal-title":"J Phys Lett A"},{"issue":"2","key":"1292_CR7","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S Behnia","year":"2008","unstructured":"Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. J Chaos Solitons Fractals 35(2):408\u2013419","journal-title":"J Chaos Solitons Fractals"},{"key":"1292_CR8","unstructured":"Belkhouche F and Qidwai U (2003) Binary image encoding using one-dimensional chaotic map. Proc IEEE Annu Techical Conf 39\u201343"},{"key":"1292_CR9","doi-asserted-by":"crossref","unstructured":"Borujeni SE and Eshghi M (2009) Chaotic image encryption design using Tompkins-Paige algorithm. J Math Probl Eng 2009(762652)","DOI":"10.1155\/2009\/762652"},{"key":"1292_CR10","doi-asserted-by":"crossref","unstructured":"Borujeni SE, Eshghi M Chaotic image encryption system using phase-magnitude transformation and pixel substitution. J Telecommun Syst. doi: 10.1007\/s11235-011-9458-8 , 2011","DOI":"10.1007\/s11235-011-9458-8"},{"key":"1292_CR11","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1155\/S1110865703309011","volume":"13","author":"HC Chen","year":"2003","unstructured":"Chen HC, Guo JI, Huang LC, Yen JC (2003) Design and realization of a New signal security system for multimedia data transmission. EURASIP J Appl Signal Proc 13:1291\u20131305","journal-title":"EURASIP J Appl Signal Proc"},{"key":"1292_CR12","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. J Chaos Solitons Fractals 21:749\u2013761","journal-title":"J Chaos Solitons Fractals"},{"key":"1292_CR13","doi-asserted-by":"crossref","unstructured":"El-Latif AAA, Li L, Niu X (2012) A New image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tool Appl. doi: 10.1007\/s11042-012-1173-2","DOI":"10.1007\/s11042-012-1173-2"},{"key":"1292_CR14","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/j.optcom.2006.07.043","volume":"268","author":"LH Encinas","year":"2006","unstructured":"Encinas LH, Dominguez A (2006) Comment on \u2018a technique for image encryption using digital signature\u2019. J Opt Commun 268:261\u2013265","journal-title":"J Opt Commun"},{"key":"1292_CR15","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.image.2011.11.003","volume":"27","author":"M Francois","year":"2012","unstructured":"Francois M, Grosges T, Barchiesi D, Erra R (2012) A New image encryption scheme based on a chaotic function. J Signal Process Image Commun 27:249\u2013259","journal-title":"J Signal Process Image Commun"},{"key":"1292_CR16","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"T Gao","year":"2008","unstructured":"Gao T, Chen Z (2008) A New image encryption algorithm based on hyper-chaos. J Phys Lett A 372:394\u2013400","journal-title":"J Phys Lett A"},{"key":"1292_CR17","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.chaos.2006.11.009","volume":"38","author":"T Gao","year":"2008","unstructured":"Gao T, Chen Z (2008) Image encryption based on a new total shuffling algorithm. J Chaos Solitons Fractals 38:213\u2013220","journal-title":"J Chaos Solitons Fractals"},{"key":"1292_CR18","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","volume":"29","author":"H Gao","year":"2006","unstructured":"Gao H, Zhang Y, Liang S, Li D (2006) A New chaotic algorithm for image encryption. J Chaos Solitons Fractals 29:393\u2013399","journal-title":"J Chaos Solitons Fractals"},{"key":"1292_CR19","doi-asserted-by":"crossref","first-page":"1362","DOI":"10.1016\/j.physleta.2010.01.024","volume":"374","author":"X Ge","year":"2010","unstructured":"Ge X, Liu F, Lu B, Yang C (2010) Improvement of Rhouma\u2019s attacks on Gao algorithm. J Phys Lett A 374:1362\u20131367","journal-title":"J Phys Lett A"},{"key":"1292_CR20","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-46416-6_11","volume":"547","author":"T Habutsu","year":"1991","unstructured":"Habutsu T, Nishio Y, Sasase I, Mori S (1991) A secret key cryptosystem by iterating a chaotic map. J Lect Notes Comput Sci 547:127\u2013140","journal-title":"J Lect Notes Comput Sci"},{"issue":"4","key":"1292_CR21","doi-asserted-by":"crossref","first-page":"2411","DOI":"10.1007\/s11071-011-0155-7","volume":"67","author":"X Huang","year":"2010","unstructured":"Huang X (2010) Image encryption algorithm using chaotic Chebyshev generator. J Nonlinear Dyn 67(4):2411\u20132417","journal-title":"J Nonlinear Dyn"},{"key":"1292_CR22","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.cnsns.2010.04.010","volume":"16","author":"A Kumar","year":"2011","unstructured":"Kumar A, Ghose MK (2011) Extended substitution\u2013diffusion based image cipher using chaotic standard Map. J Commun Nonlinear Sci Numer Simulat 16:372\u2013382","journal-title":"J Commun Nonlinear Sci Numer Simulat"},{"key":"1292_CR23","first-page":"708","volume":"2","author":"S Li","year":"2002","unstructured":"Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. Proc IEEE Symp Circ Syst 2:708\u2013711","journal-title":"Proc IEEE Symp Circ Syst"},{"key":"1292_CR24","doi-asserted-by":"crossref","first-page":"2509","DOI":"10.1016\/j.chaos.2007.10.054","volume":"40","author":"S Lian","year":"2009","unstructured":"Lian S (2009) Efficient image or video encryption based on spatiotemporal chaos system. J Chaos Solitons Fractals 40:2509\u20132519","journal-title":"J Chaos Solitons Fractals"},{"key":"1292_CR25","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S Lian","year":"2005","unstructured":"Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of the chaotic standard Map. J Chaos Solitons Fractals 26:117\u2013129","journal-title":"J Chaos Solitons Fractals"},{"key":"1292_CR26","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"X Liao","year":"2010","unstructured":"Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. J Signal Process 90:2714\u20132722","journal-title":"J Signal Process"},{"issue":"10","key":"1292_CR27","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y Mao","year":"2004","unstructured":"Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on the three-dimensional chaotic baker Map. J Bifurcat Chaos 14(10):3613\u20133624","journal-title":"J Bifurcat Chaos"},{"key":"1292_CR28","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1016\/j.chaos.2009.03.084","volume":"42","author":"S Mazloom","year":"2009","unstructured":"Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. J Chaos Solitons Fractals 42:1745\u20131754","journal-title":"J Chaos Solitons Fractals"},{"issue":"1","key":"1292_CR29","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A New image encryption method: parallel Sub-image encryption with hyper chaos. J Nonlinear Dyn 67(1):557\u2013566","journal-title":"J Nonlinear Dyn"},{"key":"1292_CR30","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic Map. J Image Vis Comput 24:926\u2013934","journal-title":"J Image Vis Comput"},{"issue":"10","key":"1292_CR31","doi-asserted-by":"crossref","first-page":"2755","DOI":"10.1016\/j.cnsns.2009.11.010","volume":"15","author":"V Patidar","year":"2010","unstructured":"Patidar V, Pareek NK, Purohit G, Sud KK (2010) Modified substitution\u2013diffusion image cipher using chaotic standard and logistic maps. J Commun Nonlinear Sci Numer Simul 15(10):2755\u20132765","journal-title":"J Commun Nonlinear Sci Numer Simul"},{"key":"1292_CR32","doi-asserted-by":"crossref","first-page":"4331","DOI":"10.1016\/j.optcom.2011.05.028","volume":"284","author":"V Patidar","year":"2011","unstructured":"Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard Map based pseudorandom permutation-substitution scheme for image encryption. J Opt Commun 284:4331\u20134339","journal-title":"J Opt Commun"},{"key":"1292_CR33","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1016\/j.cnsns.2008.11.005","volume":"14","author":"V Patidar","year":"2009","unstructured":"Patidar V, Pareek NK, Sud KK (2009) A New substitution\u2013diffusion based image cipher using chaotic standard and logistic maps. J Commun Nonlinear Sci Numer Simulat 14:3056\u20133075","journal-title":"J Commun Nonlinear Sci Numer Simulat"},{"key":"1292_CR34","first-page":"132","volume":"1","author":"SRM Prasanna","year":"2006","unstructured":"Prasanna SRM, Rao YVS, Mitra A (2006) An image encryption method with magnitude and phase manipulation using carrier images. Int J Electr Comput Eng 1:132\u2013137","journal-title":"Int J Electr Comput Eng"},{"key":"1292_CR35","doi-asserted-by":"crossref","first-page":"5973","DOI":"10.1016\/j.physleta.2008.07.057","volume":"372","author":"R Rhouma","year":"2008","unstructured":"Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. J Phys Lett A 372:5973\u20135978","journal-title":"J Phys Lett A"},{"key":"1292_CR36","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s11042-010-0652-6","volume":"56","author":"IS Sam","year":"2012","unstructured":"Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tool Appl 56:315\u2013330. doi: 10.1007\/s11042-010-0652-6","journal-title":"Multimed Tool Appl"},{"key":"1292_CR37","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled Two-dimensional piecewise chaotic Map. J Signal Process 92:1202\u20131215","journal-title":"J Signal Process"},{"key":"1292_CR38","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.optlaseng.2007.09.001","volume":"46","author":"N Singh","year":"2008","unstructured":"Singh N, Sinha A (2008) Optical image encryption using fractional Fourier transform and chaos. J Opt Lasers Eng 46:117\u2013123","journal-title":"J Opt Lasers Eng"},{"key":"1292_CR39","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0030-4018(03)01261-6","volume":"218","author":"A Sinha","year":"2003","unstructured":"Sinha A, Singh K (2003) A technique for image encryption using digital signature. J Opt Commun 218:229\u2013234","journal-title":"J Opt Commun"},{"key":"1292_CR40","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1016\/j.chaos.2008.01.028","volume":"38","author":"F Sun","year":"2008","unstructured":"Sun F, Liu S, Li Z, Lu Z (2008) A novel image encryption scheme based on spatial chaos map. J Chaos Solitons Fractals 38:631\u2013640","journal-title":"J Chaos Solitons Fractals"},{"key":"1292_CR41","doi-asserted-by":"crossref","first-page":"2066","DOI":"10.1016\/j.optcom.2010.01.028","volume":"283","author":"F Sun","year":"2010","unstructured":"Sun F, Lu Z, Liu S (2010) A New cryptosystem based on spatial chaotic system. J Opt Commun 283:2066\u20132073","journal-title":"J Opt Commun"},{"key":"1292_CR42","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1007\/s11042-011-0775-4","volume":"59","author":"N Taneja","year":"2012","unstructured":"Taneja N, Raman B, Gupta I (2012) Combinational domain encryption for still visual data. Multimed Tool Appl 59:775\u2013793. doi: 10.1007\/s11042-011-0775-4","journal-title":"Multimed Tool Appl"},{"key":"1292_CR43","doi-asserted-by":"crossref","first-page":"2722","DOI":"10.1016\/j.optcom.2009.03.075","volume":"282","author":"X Tong","year":"2009","unstructured":"Tong X, Cui M, Wang Z (2009) A New feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator. J Opt Commun 282:2722\u20132728","journal-title":"J Opt Commun"},{"key":"1292_CR44","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1007\/s11071-011-9984-7","volume":"67","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L (2012) An image blocks encryption algorithm based on spatiotemporal chaos. J Nonlinear Dyn 67:365\u2013371","journal-title":"J Nonlinear Dyn"},{"issue":"1","key":"1292_CR45","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong KW, Liao X, Chen G (2011) A New chaos-based fast image encryption algorithm. J Appl Soft Comput 11(1):514\u2013522","journal-title":"J Appl Soft Comput"},{"key":"1292_CR46","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","volume":"41","author":"Y Wang","year":"2009","unstructured":"Wang Y, Wong KW, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. J Chaos Solitons Fractals 41:1773\u20131783","journal-title":"J Chaos Solitons Fractals"},{"key":"1292_CR47","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.optcom.2005.11.006","volume":"260","author":"X Wang","year":"2006","unstructured":"Wang X, Zhao D, Chen L (2006) Image encryption based on extended fractional Fourier transform and digital holography technique. J Opt Commun 260:449\u2013453","journal-title":"J Opt Commun"},{"key":"1292_CR48","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/S0375-9601(03)00259-7","volume":"310","author":"KW Wong","year":"2003","unstructured":"Wong KW, Ho SW, Yung CK (2003) A chaotic cryptography scheme for generating short ciphertext. J Phys Lett A 310:67\u201373","journal-title":"J Phys Lett A"},{"key":"1292_CR49","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","volume":"372","author":"KW Wong","year":"2008","unstructured":"Wong KW, Kwok BSH, Law WS (2008) A fast image encryption scheme based on chaotic standard Map. J Phys Lett A 372:2645\u20132652","journal-title":"J Phys Lett A"},{"key":"1292_CR50","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.physleta.2005.02.083","volume":"349","author":"T Xiang","year":"2006","unstructured":"Xiang T, Liao X, Tang G, Chen Y, Wong KW (2006) A novel block cryptosystem based on iterating a chaotic Map. J Phys Lett A 349:109\u2013115","journal-title":"J Phys Lett A"},{"key":"1292_CR51","doi-asserted-by":"crossref","unstructured":"Xiao D, Liao X, and Wei P Analysis and Improvement of a Chaos-based Image Encryption Algorithm. J Chaos Solitons Fractals 40:2191\u20132199","DOI":"10.1016\/j.chaos.2007.10.009"},{"key":"1292_CR52","doi-asserted-by":"crossref","unstructured":"Yanchuk S and Kapitaniak T Symmetry-increasing bifurcation as a predictor of a chaos-hyperchaos transition in coupled systems. J Phys Rev E 64, doi: 10.1103\/PhysRevE.64.056235","DOI":"10.1103\/PhysRevE.64.056235"},{"key":"1292_CR53","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/S0375-9601(01)00651-X","volume":"290","author":"S Yanchuk","year":"2001","unstructured":"Yanchuk S, Kapitaniak T (2001) Chaos\u2013hyperchaos transition in coupled R\u00f6ssler systems. J Phys Lett A 290:139\u2013144","journal-title":"J Phys Lett A"},{"key":"1292_CR54","first-page":"49","volume":"4","author":"JC Yen","year":"2000","unstructured":"Yen JC, Guo JI (2000) A New chaotic key-based design for image encryption and decryption. Proc IEEE Int Conf Circ Syst 4:49\u201352","journal-title":"Proc IEEE Int Conf Circ Syst"},{"issue":"11","key":"1292_CR55","doi-asserted-by":"crossref","first-page":"3518","DOI":"10.1016\/j.cnsns.2009.12.005","volume":"15","author":"N Yujun","year":"2010","unstructured":"Yujun N, Xingyuan W, Mingjun W, Huaguang Z (2010) A New hyperchaotic system and its circuit implementation. Commun Nonlinear Sci Numer Simul 15(11):3518\u20133524","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"1292_CR56","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. J Math Comput Model 52:2028\u20132035","journal-title":"J Math Comput Model"},{"key":"1292_CR57","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. J Opt Commun 284:2775\u20132780","journal-title":"J Opt Commun"},{"key":"1292_CR58","doi-asserted-by":"crossref","first-page":"3303","DOI":"10.1016\/j.cnsns.2011.12.015","volume":"17","author":"L Zhao","year":"2012","unstructured":"Zhao L, Adhikari A, Xiao D, Sakurai K (2012) On the security analysis of an image scrambling encryption of pixel Bit and its improved scheme based on self-correlation encryption. J Commun Nonlinear Sci Numer Simulat 17:3303\u20133327","journal-title":"J Commun Nonlinear Sci Numer Simulat"},{"key":"1292_CR59","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. J Opt Commun 285:29\u201337","journal-title":"J Opt Commun"},{"key":"1292_CR60","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a Bit-level permutation. J Inform Sci 181:1171\u20131186","journal-title":"J Inform Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-012-1292-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-012-1292-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-012-1292-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T06:35:33Z","timestamp":1562394933000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-012-1292-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,29]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["1292"],"URL":"https:\/\/doi.org\/10.1007\/s11042-012-1292-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,29]]}}}