{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T04:40:17Z","timestamp":1766378417921,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T00:00:00Z","timestamp":1491177600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11042-017-4634-9","type":"journal-article","created":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T00:49:37Z","timestamp":1491266977000},"page":"7305-7326","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2291-0892","authenticated-orcid":false,"given":"M.","family":"Ghebleh","sequence":"first","affiliation":[]},{"given":"A.","family":"Kanso","sequence":"additional","affiliation":[]},{"given":"D.","family":"Stevanovi\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,3]]},"reference":[{"issue":"17","key":"4634_CR1","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1016\/j.optcom.2010.04.056","volume":"283","author":"A Akhshani","year":"2010","unstructured":"Akhshani A, Behnia S, Akhavan A, Hassan HA, Hassan Z (2010) A novel scheme for image encryption based on 2D piecewise chaotic maps. Opt Commun 283(17):3259\u20133266","journal-title":"Opt Commun"},{"issue":"1","key":"4634_CR2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.physleta.2005.11.055","volume":"352","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Breaking an encryption scheme based on chaotic baker map. Phys Lett A 352(1):78\u201382","journal-title":"Phys Lett A"},{"issue":"3","key":"4634_CR3","doi-asserted-by":"crossref","first-page":"033112","DOI":"10.1063\/1.2959102","volume":"18","author":"D Arroyo","year":"2008","unstructured":"Arroyo D, Rhouma R, Alvarez G, Li S, Fernandez V (2008) On the security of a new image encryption scheme based on chaotic map lattices. Chaos: An Interdisciplinary Journal of Nonlinear Science 18(3):033112","journal-title":"Chaos: An Interdisciplinary Journal of Nonlinear Science"},{"issue":"5","key":"4634_CR4","doi-asserted-by":"crossref","first-page":"2613","DOI":"10.1016\/j.chaos.2008.09.051","volume":"41","author":"D Arroyo","year":"2009","unstructured":"Arroyo D, Li C, Li S, Alvarez G, Halang WA (2009) Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. Chaos, Solitons Fractals 41(5):2613\u20132616","journal-title":"Chaos, Solitons Fractals"},{"issue":"2","key":"4634_CR5","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S Behnia","year":"2008","unstructured":"Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35 (2):408\u2013419","journal-title":"Chaos, Solitons Fractals"},{"issue":"1","key":"4634_CR6","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1142\/S0218127408020288","volume":"18","author":"S Behnia","year":"2008","unstructured":"Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) Chaotic cryptographic scheme based on composition maps. Int J Bifurcation Chaos 18(1):251\u2013261","journal-title":"Int J Bifurcation Chaos"},{"key":"4634_CR7","volume-title":"Elementary statistics: a step by step approach","author":"AG Bluman","year":"1997","unstructured":"Bluman AG (1997) Elementary statistics: a step by step approach. McGraw-Hill, Boston"},{"issue":"3","key":"4634_CR8","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749\u2013761","journal-title":"Chaos, Solitons Fractals"},{"issue":"8","key":"4634_CR9","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1007\/s11082-016-0669-9","volume":"48","author":"H Chen","year":"2016","unstructured":"Chen H, Tanougast C, Liu Z, Hao B (2016) Securing color image by using hyperchaotic system in gyrator transform domains. Opt Quant Electron 48(8):396","journal-title":"Opt Quant Electron"},{"issue":"15","key":"4634_CR10","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1016\/j.physleta.2009.02.030","volume":"373","author":"C \u00c7okal","year":"2009","unstructured":"\u00c7okal C, Solak E (2009) Cryptanalysis of a chaos-based image encryption algorithm. Phys Lett A 373(15):1357\u20131360","journal-title":"Phys Lett A"},{"issue":"3","key":"4634_CR11","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.image.2011.11.003","volume":"27","author":"M Fran\u00e7ois","year":"2012","unstructured":"Fran\u00e7ois M, Grosges T, Barchiesi T, Erra R (2012) A new image encryption scheme based on a chaotic function. Signal Process Image Commun 27(3):249\u2013259","journal-title":"Signal Process Image Commun"},{"issue":"6","key":"4634_CR12","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259\u20131284","journal-title":"Int J Bifurcation Chaos"},{"issue":"5","key":"4634_CR13","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.image.2013.09.009","volume":"29","author":"M Ghebleh","year":"2014","unstructured":"Ghebleh M, Kanso A, Noura H (2014) An image encryption scheme based on irregularly decimated chaotic maps. Signal Process Image Commun 29(5):618\u2013627","journal-title":"Signal Process Image Commun"},{"issue":"13","key":"4634_CR14","doi-asserted-by":"crossref","first-page":"1074","DOI":"10.1080\/09500340.2013.831139","volume":"60","author":"L Gong","year":"2013","unstructured":"Gong L, Liu X, Zheng F, Zhou N (2013) Flexible multiple-image encryption algorithm based on log-polar transform and double random phase encoding technique. J Mod Opt 60(13):1074\u20131082","journal-title":"J Mod Opt"},{"key":"4634_CR15","unstructured":"http:\/\/sipi.usc.edu\/database\/\n                        \n                    . Accessed 12 october 2015"},{"key":"4634_CR16","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM, Chen CP (2015) 2D Sine Logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"issue":"7","key":"4634_CR17","doi-asserted-by":"crossref","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943\u20132959","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"8","key":"4634_CR18","doi-asserted-by":"crossref","first-page":"2561","DOI":"10.1142\/S0218127410027192","volume":"20","author":"C Li","year":"2010","unstructured":"Li C, Arroyo D, Lo KT (2010) Breaking a chaotic cryptographic scheme based on composition maps. Int J Bifurcation Chaos 20(8):2561\u20132568","journal-title":"Int J Bifurcation Chaos"},{"issue":"1","key":"4634_CR19","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2007.04.023","volume":"369","author":"C Li","year":"2007","unstructured":"Li C, Li S, Alvarez G, Chen G, Lo KT (2007) Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys Lett A 369(1):23\u201330","journal-title":"Phys Lett A"},{"issue":"9","key":"4634_CR20","doi-asserted-by":"crossref","first-page":"1371","DOI":"10.1016\/j.imavis.2008.12.008","volume":"27","author":"C Li","year":"2009","unstructured":"Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27(9):1371\u20131381","journal-title":"Image Vis Comput"},{"issue":"5","key":"4634_CR21","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1142\/S0218127406015507","volume":"16","author":"S Li","year":"2006","unstructured":"Li S, Chen G, Alvarez G (2006) Return-map cryptanalysis revisited. Int J Bifurcation Chaos 16(5):1557\u20131568","journal-title":"Int J Bifurcation Chaos"},{"issue":"10","key":"4634_CR22","doi-asserted-by":"crossref","first-page":"3119","DOI":"10.1142\/S0218127405014052","volume":"15","author":"S Li","year":"2005","unstructured":"Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurcation Chaos 15(10):3119\u20133151","journal-title":"Int J Bifurcation Chaos"},{"issue":"7","key":"4634_CR23","doi-asserted-by":"crossref","first-page":"1130","DOI":"10.1016\/j.jss.2007.07.037","volume":"81","author":"S Li","year":"2008","unstructured":"Li S, Li C, Chen G, Lo KT (2008) Cryptanalysis of the RCES\/RSES image encryption scheme. J Syst Softw 81(7):1130\u20131143","journal-title":"J Syst Softw"},{"issue":"9","key":"4634_CR24","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"X Liao","year":"2010","unstructured":"Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90(9):2714\u20132722","journal-title":"Signal Process"},{"key":"4634_CR25","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.optlastec.2014.01.015","volume":"60","author":"Y Liu","year":"2014","unstructured":"Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60:111\u2013115","journal-title":"Opt Laser Technol"},{"issue":"16","key":"4634_CR26","doi-asserted-by":"crossref","first-page":"2514","DOI":"10.1016\/j.ijleo.2012.08.017","volume":"124","author":"P Lu","year":"2013","unstructured":"Lu P, Xu Z, Lu X, Liu X (2013) Digital image information encryption based on compressive sensing and double random-phase encoding technique. Optik 124 (16):2514\u20132518","journal-title":"Optik"},{"issue":"10","key":"4634_CR27","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y Mao","year":"2004","unstructured":"Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurcation Chaos 14(10):3613\u20133624","journal-title":"Int J Bifurcation Chaos"},{"issue":"1","key":"4634_CR28","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyna 67(1):557\u2013566","journal-title":"Nonlinear Dyna"},{"key":"4634_CR29","unstructured":"NIST Special publication 800-22 rev1a, a statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications. \n                        http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/rng\/documentation_software.html\n                        \n                     (2010). Accessed 23 september 2015"},{"issue":"9","key":"4634_CR30","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926\u2013934","journal-title":"Image Vis Comput"},{"issue":"7","key":"4634_CR31","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1016\/j.cnsns.2008.11.005","volume":"14","author":"V Patidar","year":"2009","unstructured":"Patidar V, Pareek NK, Sud KK (2009) A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14(7):3056\u20133075","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"3","key":"4634_CR32","doi-asserted-by":"crossref","first-page":"033118","DOI":"10.1063\/1.2242052","volume":"16","author":"AN Pisarchik","year":"2006","unstructured":"Pisarchik AN, Flores-Carmona NJ, Carpio-Valadez M (2006) Encryption and decryption of images with chaotic map lattices. Chaos: An Interdisciplinary Journal of Nonlinear Science 16(3):033118","journal-title":"Chaos: An Interdisciplinary Journal of Nonlinear Science"},{"key":"4634_CR33","unstructured":"Poole D (2014) Linear algebra: a modern introduction, 3rd Edition. Cengage Learning"},{"issue":"38","key":"4634_CR34","doi-asserted-by":"crossref","first-page":"5973","DOI":"10.1016\/j.physleta.2008.07.057","volume":"372","author":"R Rhouma","year":"2008","unstructured":"Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372(38):5973\u20135978","journal-title":"Phys Lett A"},{"issue":"7","key":"4634_CR35","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1016\/j.cnsns.2009.07.007","volume":"15","author":"R Rhouma","year":"2010","unstructured":"Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution-diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15 (7):1887\u20131892","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"3","key":"4634_CR36","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423","journal-title":"Bell Syst Tech J"},{"issue":"2","key":"4634_CR37","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.optcom.2009.09.070","volume":"283","author":"E Solak","year":"2010","unstructured":"Solak E, Rhouma R, Belghith S (2010) Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt Commun 283(2):232\u2013236","journal-title":"Opt Commun"},{"issue":"5","key":"4634_CR38","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.1142\/S0218127410026563","volume":"20","author":"E Solak","year":"2010","unstructured":"Solak E, \u00c7okal C, Yildiz OT, Biyikog\u030clu T (2010) Cryptanalysis of Fridrich\u2019s chaotic image encryption. Int J Bifurcation Chaos 20(5):1405\u20131413","journal-title":"Int J Bifurcation Chaos"},{"key":"4634_CR39","unstructured":"Subramanyan B, Chhabria VM, Babu ST (2011) Image encryption based on AES key expansion Second international conference on emerging applications of information technology (EAIT), 2011. IEEE, pp 217\u2013220"},{"key":"4634_CR40","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.optlastec.2012.10.016","volume":"48","author":"L Sui","year":"2013","unstructured":"Sui L, Gao B (2013) Single-channel color image encryption based on iterative fractional Fourier transform and chaos. Opt Laser Technol 48:117\u2013127","journal-title":"Opt Laser Technol"},{"issue":"6","key":"4634_CR41","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1016\/j.imavis.2007.09.005","volume":"26","author":"X Tong","year":"2008","unstructured":"Tong X, Cui M (2008) Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis Comput 26(6):843\u2013850","journal-title":"Image Vis Comput"},{"key":"4634_CR42","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.protcy.2013.12.161","volume":"11","author":"SM Wadi","year":"2013","unstructured":"Wadi SM, Zainal N (2013) Rapid encryption method based on AES algorithm for grey scale HD image encryption. Procedia Technol 11:51\u201356","journal-title":"Procedia Technol"},{"issue":"24","key":"4634_CR43","doi-asserted-by":"crossref","first-page":"5804","DOI":"10.1016\/j.optcom.2011.08.053","volume":"284","author":"X Wang","year":"2011","unstructured":"Wang X, He G (2011) Cryptanalysis on a novel image encryption method based on total shuffling scheme. Opt Commun 284(24):5804\u20135807","journal-title":"Opt Commun"},{"issue":"11","key":"4634_CR44","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/TCSII.2008.2002565","volume":"55","author":"KW Wong","year":"2008","unstructured":"Wong KW, Yuen CH (2008) Embedding compression in chaos-based cryptography. IEEE Trans Circuits Syst Express Briefs 55(11):1193\u20131197","journal-title":"IEEE Trans Circuits Syst Express Briefs"},{"key":"4634_CR45","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.optlastec.2012.05.030","volume":"45","author":"J Wu","year":"2013","unstructured":"Wu J, Luo X, Zhou N (2013) Four-image encryption method based on spectrum truncation, chaos and the MODFrFT. Opt Laser Technol 45:571\u2013577","journal-title":"Opt Laser Technol"},{"key":"4634_CR46","unstructured":"Wu Y, Noonan JP, Agaian S (2011) A wheel-switch chaotic system for image encryption International conference on system science and engineering (ICSSE), 2011. IEEE , pp 23\u201327"},{"key":"4634_CR47","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR And UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT):31\u201338"},{"issue":"1","key":"4634_CR48","doi-asserted-by":"crossref","first-page":"013014","DOI":"10.1117\/1.JEI.21.1.013014","volume":"21","author":"Y Wu","year":"2012","unstructured":"Wu Y, Yang G, Jin H, Noonan JP (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1):013014\u20131","journal-title":"J Electron Imaging"},{"key":"4634_CR49","unstructured":"Zhao G, Yang X, Zhou B, Wei W (2010) RSA-based digital image encryption algorithm in wireless sensor networks 2nd international conference on signal processing systems (ICSPS), 2010. IEEE, pp v2\u2013640"},{"issue":"11","key":"4634_CR50","doi-asserted-by":"crossref","first-page":"3039","DOI":"10.1016\/j.sigpro.2013.04.021","volume":"93","author":"Y Zhou","year":"2013","unstructured":"Zhou Y, Bao L, Chen CP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039\u20133052","journal-title":"Signal Process"},{"key":"4634_CR51","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"N Zhou","year":"2015","unstructured":"Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321","journal-title":"Opt Commun"},{"key":"4634_CR52","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"N Zhou","year":"2016","unstructured":"Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression\u2013encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121\u2013133","journal-title":"Opt Laser Technol"},{"issue":"4","key":"4634_CR53","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1007\/s11128-015-0926-z","volume":"14","author":"NR Zhou","year":"2015","unstructured":"Zhou NR, Hua TX, Gong LH, Pei DJ, Liao QH (2015) Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf Proces 14(4):1193\u20131213","journal-title":"Quantum Inf Proces"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4634-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4634-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4634-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T08:22:22Z","timestamp":1521447742000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4634-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,3]]},"references-count":53,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["4634"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4634-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2017,4,3]]}}}