{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:58:24Z","timestamp":1773331104268,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2015,5,30]],"date-time":"2015-05-30T00:00:00Z","timestamp":1432944000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s11042-015-2691-5","type":"journal-article","created":{"date-parts":[[2015,5,29]],"date-time":"2015-05-29T08:42:16Z","timestamp":1432888936000},"page":"7739-7759","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":62,"title":["Image encryption algorithm based on hyper-chaotic system and dynamic S-box"],"prefix":"10.1007","volume":"75","author":[{"given":"Yang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiaojun","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,30]]},"reference":[{"key":"2691_CR1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/BF00203967","volume":"3","author":"C Adams","year":"1990","unstructured":"Adams C, Tavares S (1990) The structured design of cryptographically good S-boxes. J Cryptol 3:27\u201341","journal-title":"J Cryptol"},{"key":"2691_CR2","doi-asserted-by":"crossref","first-page":"6230","DOI":"10.7498\/aps.56.6230","volume":"56","author":"GL Cai","year":"2007","unstructured":"Cai GL, Tan ZM, Zhou WH, Tu WT (2007) Dynamical analysis of a new chaotic system and its chaotic control. Acta Phys Sin 56:6230\u20136237","journal-title":"Acta Phys Sin"},{"key":"2691_CR3","doi-asserted-by":"crossref","unstructured":"Feistel H (1973) Cryptography and computer privacy. Sci Am 228(5)","DOI":"10.1038\/scientificamerican0573-15"},{"key":"2691_CR4","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"XL Huang","year":"2014","unstructured":"Huang XL, Ye GD (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72:57\u201370","journal-title":"Multimed Tools Appl"},{"key":"2691_CR5","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1109\/TC.1979.1675242","volume":"28","author":"JB Kam","year":"1979","unstructured":"Kam JB, Davida GI (1979) Structured design and substitution permutation encryption networks. IEEE Trans Comput 28:747","journal-title":"IEEE Trans Comput"},{"key":"2691_CR6","unstructured":"Katz J, Lindell Y (2008) Introduction to Modern Cryptography. 1st ed. Taylor & Francis Group, pp 234\u2013256"},{"key":"2691_CR7","doi-asserted-by":"crossref","unstructured":"Li SJ, Mou XQ, Cai YL (2001) Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography, INDOCRYPT, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 2247, pp 316","DOI":"10.1007\/3-540-45311-3_30"},{"key":"2691_CR8","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"XF Liao","year":"2010","unstructured":"Liao XF, Lai SY, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714\u20132722","journal-title":"Signal Process"},{"key":"2691_CR9","first-page":"50","volume-title":"Theory and application of chaotic cryptography","author":"XF Liao","year":"2009","unstructured":"Liao XF, Xiao D, Chen Y, Xiang T (2009) Theory and application of chaotic cryptography, 1st edn. Science Press, Beijing, pp 50\u201359","edition":"1"},{"key":"2691_CR10","doi-asserted-by":"crossref","first-page":"1384","DOI":"10.1016\/j.jss.2013.01.012","volume":"86","author":"QZ Lin","year":"2013","unstructured":"Lin QZ, Wong KW, Chen JY (2013) An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps. J Syst Softw 86:1384\u20131389","journal-title":"J Syst Softw"},{"key":"2691_CR11","first-page":"406","volume":"28","author":"MH Liu","year":"2010","unstructured":"Liu MH, Feng JC (2010) Circuit design as implementation of four dimensional hyper-chaos and its projective synchronization. J Appl Sci 28:406\u2013412","journal-title":"J Appl Sci"},{"key":"2691_CR12","first-page":"1091","volume":"4","author":"SB Liu","year":"2009","unstructured":"Liu SB, Sun J, Xu ZQ (2009) An improved image encryption algorithm based on chaotic system. J Comput 4:1091\u20131100","journal-title":"J Comput"},{"key":"2691_CR13","doi-asserted-by":"crossref","first-page":"1548","DOI":"10.1016\/j.image.2013.07.009","volume":"28","author":"Y Liu","year":"2013","unstructured":"Liu Y, Tong XJ, Hu SC (2013) A family of new complex number chaotic maps based image encryption algorithm. Signal Process Image Commun 28:1548\u20131559","journal-title":"Signal Process Image Commun"},{"key":"2691_CR14","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1016\/j.chaos.2009.03.084","volume":"42","author":"S Mazloom","year":"2009","unstructured":"Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos, Solitons Fractals 42:1745\u20131754","journal-title":"Chaos, Solitons Fractals"},{"key":"2691_CR15","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/BF01212280","volume":"99","author":"J Milnor","year":"1985","unstructured":"Milnor J (1985) On the concept of attractor. Commun Math Phys 99:177\u2013195","journal-title":"Commun Math Phys"},{"key":"2691_CR16","doi-asserted-by":"crossref","first-page":"050507","DOI":"10.1088\/1674-1056\/23\/5\/050507","volume":"23","author":"GY Qi","year":"2014","unstructured":"Qi GY, Sandra BM (2014) Hyper-chaos encryption using convolutional masking and model free unmasking. Chin Phys B 23:050507","journal-title":"Chin Phys B"},{"key":"2691_CR17","first-page":"44","volume":"39","author":"J Qiu","year":"2012","unstructured":"Qiu J, Wang P (2012) Encryption algorithm for compressed image based on chaotic maps. Comput Sci 39:44\u201346","journal-title":"Comput Sci"},{"key":"2691_CR18","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1049\/el:19980680","volume":"34","author":"T Sang","year":"1998","unstructured":"Sang T, Wang RL, Yan YX (1998) Perturbance-based algorithm to expand cycle length of chaotic key stream. Electron Lett 34:873\u2013874","journal-title":"Electron Lett"},{"key":"2691_CR19","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92:1202\u20131215","journal-title":"Signal Process"},{"key":"2691_CR20","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1016\/j.jss.2011.10.051","volume":"85","author":"XJ Tong","year":"2012","unstructured":"Tong XJ (2012) The novel bilateral-diffusion image encryption algorithm with dynamical compound chaos. J Syst Softw 85:850\u2013858","journal-title":"J Syst Softw"},{"key":"2691_CR21","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s11432-010-0010-3","volume":"53","author":"XJ Tong","year":"2010","unstructured":"Tong XJ, Cui MG (2010) Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation. Sci China-Inf Sci 53:191\u2013202","journal-title":"Sci China-Inf Sci"},{"key":"2691_CR22","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1088\/1009-1963\/15\/6\/015","volume":"15","author":"JZ Wang","year":"2006","unstructured":"Wang JZ, Chen ZQ, Yuan ZZ (2006) The generation of a hyperchaotic system based on a three-dimensional autonomous chaotic system. Chin Phys 15:1216\u20131225","journal-title":"Chin Phys"},{"key":"2691_CR23","first-page":"523","volume-title":"On the design of S-boxes. Advances in cryptology-crypto 85. Lecture notes in computer science 218","author":"AF Webster","year":"1985","unstructured":"Webster AF, Tavares SE (1985) On the design of S-boxes. Advances in cryptology-crypto 85. Lecture notes in computer science 218. Springer-Verlag New York, New York, pp 523\u2013534"},{"key":"2691_CR24","doi-asserted-by":"crossref","first-page":"1884","DOI":"10.1016\/j.cnsns.2013.10.025","volume":"19","author":"XJ Wu","year":"2014","unstructured":"Wu XJ, Bai CX, Kan HB (2014) A new color image cryptosystem via hyperchaos synchronization. Commun Nonlinear Sci Numer Simul 19:1884\u20131897","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"2691_CR25","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"CX Zhu","year":"2012","unstructured":"Zhu CX (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285:29\u201337","journal-title":"Opt Commun"},{"key":"2691_CR26","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1016\/j.image.2013.02.004","volume":"28","author":"HG Zhu","year":"2013","unstructured":"Zhu HG, Zhao C, Zhang XD (2013) A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process Image Commun 28:670\u2013680","journal-title":"Signal Process Image Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2691-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-2691-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2691-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T00:21:47Z","timestamp":1652142107000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-2691-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,30]]},"references-count":26,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["2691"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-2691-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,30]]}}}