{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T10:08:16Z","timestamp":1768558096596,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s11042-017-4811-x","type":"journal-article","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T16:07:19Z","timestamp":1496333239000},"page":"11669-11692","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Chaos triggered image encryption - a reconfigurable security solution"],"prefix":"10.1007","volume":"77","author":[{"given":"Balakrishnan","family":"Ramalingam","sequence":"first","affiliation":[]},{"given":"Dhivya","family":"Ravichandran","sequence":"additional","affiliation":[]},{"given":"Arun Adhithiya","family":"Annadurai","sequence":"additional","affiliation":[]},{"given":"Amirtharajan","family":"Rengarajan","sequence":"additional","affiliation":[]},{"given":"John Bosco Balaguru","family":"Rayappan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,1]]},"reference":[{"key":"4811_CR1","doi-asserted-by":"crossref","unstructured":"Aneesh R, Jiju K (2012) Design of FPGA based 8-bit RISC controller IP core using VHDL. In: India Conf (INDICON), 2012 Annu IEEE, pp 427\u201332","DOI":"10.1109\/INDCON.2012.6420656"},{"key":"4811_CR2","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s11554-011-0219-4","volume":"8","author":"MS Azzaz","year":"2013","unstructured":"Azzaz MS, Tanougast C, Sadoudi S, Dandache A (2013) Robust chaotic key stream generator for real-time images encryption. J Real-Time Image Process 8:297\u2013306","journal-title":"J Real-Time Image Process"},{"key":"4811_CR3","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1049\/iet-ipr.2012.0586","volume":"8","author":"ML Barakat","year":"2014","unstructured":"Barakat ML, Mansingka AS, Radwan AG, Salama KN (2014) Hardware stream cipher with controllable chaos generator for colour image encryption. Image Process IET 8:33\u201343","journal-title":"Image Process IET"},{"key":"4811_CR4","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1016\/j.image.2013.09.006","volume":"29","author":"C Dong","year":"2014","unstructured":"Dong C (2014) Signal Processing : image communication color image encryption using one-time keys and coupled chaotic systems. Signal Process Image Commun 29:628\u2013640","journal-title":"Signal Process Image Commun"},{"key":"4811_CR5","doi-asserted-by":"crossref","unstructured":"El-Samie FEA, Ahmed HEH, Elashry IF, Shahieen MH, Faragallah OS, El-Rabaie ESM, et al (2013) Image encryption: a communication perspective. CRC press, Taylor & Francis, pp 3\u201319","DOI":"10.1201\/b16309"},{"key":"4811_CR6","volume-title":"Practical cryptography","author":"N Ferguson","year":"2003","unstructured":"Ferguson N, Schneier B (2003) Practical cryptography, 1st edn. Wiley Publishing, Indiana","edition":"1"},{"key":"4811_CR7","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125:1671\u20131675","journal-title":"Optik"},{"key":"4811_CR8","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"Kocarev L (2001) Chaos-based cryptography: a brief overview. Circuits Syst Mag IEEE 1:6\u201321","journal-title":"Circuits Syst Mag IEEE"},{"key":"4811_CR9","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1016\/j.cnsns.2010.05.008","volume":"16","author":"C Li","year":"2011","unstructured":"Li C, Li S, Lo K-T (2011) Breaking a modified substitution\u2013diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 16:837\u2013843","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"4811_CR10","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math with Appl 59:3320\u20133327","journal-title":"Comput Math with Appl"},{"key":"4811_CR11","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38:1240\u20131248","journal-title":"Comput Electr Eng"},{"key":"4811_CR12","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"S Mohammad Seyedzadeh","year":"2012","unstructured":"Mohammad Seyedzadeh S, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92:1202\u20131215","journal-title":"Signal Process"},{"key":"4811_CR13","first-page":"95","volume":"2","author":"VS Nemade","year":"2012","unstructured":"Nemade VS (2012) Review of different image encryption techniques. World J 2:95\u201398","journal-title":"World J"},{"key":"4811_CR14","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"N Abolfazl Yaghouti","year":"2017","unstructured":"Abolfazl Yaghouti N, Mohammad Hossein M, Masood Niazi T (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225\u2013237","journal-title":"Opt Lasers Eng"},{"key":"4811_CR15","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s11042-006-5117-6","volume":"28","author":"SC Ou","year":"2006","unstructured":"Ou SC, Chung HY, Sung WT (2006) Improving the compression and encryption of images using FPGA-based cryptosystems. Multimed Tools Appl 28:5\u201322","journal-title":"Multimed Tools Appl"},{"key":"4811_CR16","first-page":"551","volume":"52","author":"A Pande","year":"2013","unstructured":"Pande A, Zambreno J (2013) A chaotic encryption scheme for real-time embedded systems : design and implementation. Telecommun Syst 52:551\u2013561","journal-title":"Telecommun Syst"},{"key":"4811_CR17","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2010","unstructured":"Pareek NK, Patidar V, Sud KK (2010) Image encryption using chaotic logistic map. Image Vis Comput 24:926\u2013934","journal-title":"Image Vis Comput"},{"key":"4811_CR18","unstructured":"Pareek NK, Patidar V, Sud KK. A random bit generator using chaotic maps. 10:32\u20138"},{"key":"4811_CR19","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/978-3-642-17857-3_41","volume":"131","author":"NK Pareek","year":"2011","unstructured":"Pareek NK, Patidar V, Sud KK (2011) Colour image encryption scheme based on permutation and substitution techniques. Adv Comput Sci Inf Technol Pt I 131:413\u2013427","journal-title":"Adv Comput Sci Inf Technol Pt I"},{"key":"4811_CR20","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1016\/j.cnsns.2008.11.005","volume":"14","author":"V Patidar","year":"2009","unstructured":"Patidar V, Pareek NK, Sud KK (2009) A new substitution\u2013diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056\u20133075","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"4811_CR21","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1103\/PhysRevE.66.026215","volume":"66","author":"VI Ponomarenko","year":"2002","unstructured":"Ponomarenko VI, Prokhorov MD (2002) Extracting information masked by the chaotic signal of a time-delay system. Phys Rev E 66:262\u2013215","journal-title":"Phys Rev E"},{"key":"4811_CR22","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1186\/1687-5281-2013-43","volume":"2013","author":"S Sadoudi","year":"2013","unstructured":"Sadoudi S, Tanougast C, Azzaz M, Dandache A (2013) Design and FPGA implementation of a wireless hyperchaotic communication system for secure real-time image transmission. EURASIP J Image Video Process 2013:43","journal-title":"EURASIP J Image Video Process"},{"key":"4811_CR23","unstructured":"Schneier B (1996) Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, Inc., New York, pp 13-15"},{"key":"4811_CR24","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","volume":"41","author":"Y Wang","year":"2009","unstructured":"Wang Y, Wong K-W, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41:1773\u20131783","journal-title":"Chaos, Solitons Fractals"},{"key":"4811_CR25","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/j.compeleceng.2015.03.011","volume":"46","author":"Y Wang","year":"2015","unstructured":"Wang Y, Lei P, Yang H, Cao H (2015) Security analysis on a color image encryption based on DNA encoding and chaos map. Comput Electr Eng 46:433\u2013446","journal-title":"Comput Electr Eng"},{"key":"4811_CR26","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.optlaseng.2015.12.006","volume":"82","author":"X Wang","year":"2016","unstructured":"Wang X, Zhao Y, Zhang H, Guo K (2016) A novel color image encryption scheme using alternate chaotic mapping structure. Opt Lasers Eng 82:79\u201386","journal-title":"Opt Lasers Eng"},{"issue":"10","key":"4811_CR27","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222(10):323\u2013342","journal-title":"Inf Sci"},{"key":"4811_CR28","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"X Wu","year":"2015","unstructured":"Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput J 37:24\u201339","journal-title":"Appl Soft Comput J"},{"key":"4811_CR29","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"X Wu","year":"2015","unstructured":"Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24\u201339","journal-title":"Appl Soft Comput"},{"key":"4811_CR30","doi-asserted-by":"crossref","unstructured":"Yavuz E, Yaz\u0131c\u0131 R, Kasapba\u015f\u0131 MC, Yama\u00e7 E (2015) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471\u2013483","DOI":"10.1016\/j.compeleceng.2015.11.008"},{"key":"4811_CR31","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1016\/j.compeleceng.2013.08.008","volume":"40","author":"X Zhang","year":"2014","unstructured":"Zhang X, Shao L, Zhao Z, Liang Z (2014) An image encryption scheme based on constructing large permutation with chaotic sequence. Comput Electr Eng 40:931\u2013941","journal-title":"Comput Electr Eng"},{"key":"4811_CR32","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.image.2014.06.012","volume":"29","author":"X Zhang","year":"2014","unstructured":"Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29:902\u2013913","journal-title":"Signal Process Image Commun"},{"key":"4811_CR33","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4811-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4811-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4811-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T07:39:58Z","timestamp":1569397198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4811-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,1]]},"references-count":33,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["4811"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4811-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,1]]}}}