{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:01:13Z","timestamp":1761663673981},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2017,12,9]],"date-time":"2017-12-09T00:00:00Z","timestamp":1512777600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11042-017-5461-8","type":"journal-article","created":{"date-parts":[[2017,12,9]],"date-time":"2017-12-09T02:44:22Z","timestamp":1512787462000},"page":"20385-20414","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Hyper-chaotic Feeded GA (HFGA): a reversible optimization technique for robust and sensitive image encryption"],"prefix":"10.1007","volume":"77","author":[{"given":"Parisa Gholizadeh","family":"Pashakolaee","sequence":"first","affiliation":[]},{"given":"Hadi Shahriar","family":"Shahhoseini","sequence":"additional","affiliation":[]},{"given":"Morteza","family":"Mollajafari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,9]]},"reference":[{"key":"5461_CR1","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1016\/j.aeue.2012.01.015","volume":"66","author":"AH Abdullah","year":"2012","unstructured":"Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-Int J Electron Commun 66:806\u2013816","journal-title":"AEU-Int J Electron Commun"},{"key":"5461_CR2","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16:2129\u20132151","journal-title":"Int J Bifurcation Chaos"},{"key":"5461_CR3","doi-asserted-by":"crossref","first-page":"3743","DOI":"10.1016\/j.cnsns.2009.02.033","volume":"14","author":"G Alvarez","year":"2009","unstructured":"Alvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun Nonlinear Sci Numer Simul 14:3743\u20133749","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5461_CR4","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/978-3-642-20542-2_8","volume":"10","author":"G Alvarez","year":"2011","unstructured":"Alvarez G, Amigo JM, Arroyo D, Li S (2011) Lessons learnt from the cryptanalysis of chaos-based ciphers. Chaos-Based Cryptogr 10:257\u2013295","journal-title":"Chaos-Based Cryptogr"},{"key":"5461_CR5","unstructured":"Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2016) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451\u201318472"},{"key":"5461_CR6","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S Behnia","year":"2008","unstructured":"Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35:408\u2013419","journal-title":"Chaos, Solitons Fractals"},{"key":"5461_CR7","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"key":"5461_CR8","doi-asserted-by":"crossref","first-page":"1159","DOI":"10.1007\/s11042-015-3088-1","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76:1159\u20131175","journal-title":"Multimed Tools Appl"},{"key":"5461_CR9","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017a) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"key":"5461_CR10","doi-asserted-by":"crossref","first-page":"9907","DOI":"10.1007\/s11042-016-3585-x","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X, Yang K, Gan Z (2017b) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76:9907\u20139927","journal-title":"Multimed Tools Appl"},{"key":"5461_CR11","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21:749\u2013761","journal-title":"Chaos, Solitons Fractals"},{"key":"5461_CR12","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.optlaseng.2014.11.017","volume":"67","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZI, Fu C, Yu H, Zhang LB (2015a) An efficient image encryption scheme using gray code based permutation approach. Opt Lasers Eng 67:191\u2013204","journal-title":"Opt Lasers Eng"},{"key":"5461_CR13","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.sigpro.2015.01.003","volume":"111","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Yu H, Zhang Y (2015b) Reusing the permutation matrix dynamically for efficient image cryptographic algorithm. Signal Process 111:294\u2013307","journal-title":"Signal Process"},{"key":"5461_CR14","doi-asserted-by":"crossref","unstructured":"Das S, Mandal SN, Ghoshal N (2015) Diffusion and encryption of digital image using genetic algorithm. Proceedings of the 3rd international conference on frontiers of intelligent computing 729\u2013736","DOI":"10.1007\/978-3-319-11933-5_82"},{"key":"5461_CR15","doi-asserted-by":"crossref","unstructured":"El-Samie FEA et al. (2013) Image encryption: a communication perspective. CRC Press, Boca Raton","DOI":"10.1201\/b16309"},{"key":"5461_CR16","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","volume":"90","author":"R Enayatifar","year":"2017","unstructured":"Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146\u2013154","journal-title":"Opt Lasers Eng"},{"key":"5461_CR17","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.optcom.2012.07.052","volume":"286","author":"Z Eslami","year":"2013","unstructured":"Eslami Z, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:51\u201355","journal-title":"Opt Commun"},{"key":"5461_CR18","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8:1259\u20131284","journal-title":"Int J Bifurcation Chaos"},{"key":"5461_CR19","doi-asserted-by":"publisher","unstructured":"Fu Z, Huang F, Sun X, Vasilakos A, Yang CN (2016) Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Serv Comput. https:\/\/doi.org\/10.1109\/TSC.2016.2622697","DOI":"10.1109\/TSC.2016.2622697"},{"key":"5461_CR20","doi-asserted-by":"crossref","DOI":"10.1201\/9781420038262","volume-title":"Multimedia security handbook","author":"B Furht","year":"2004","unstructured":"Furht B, Kirovski D (2004) Multimedia security handbook. CRC Press, Boca Raton"},{"key":"5461_CR21","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","volume":"29","author":"H Gao","year":"2006","unstructured":"Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos, Solitons Fractals 29:393\u2013399","journal-title":"Chaos, Solitons Fractals"},{"key":"5461_CR22","doi-asserted-by":"publisher","unstructured":"Ghebleh M, Kanso A, Stevanovi\u0107 D (2017) A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-017-4634-9","DOI":"10.1007\/s11042-017-4634-9"},{"key":"5461_CR23","doi-asserted-by":"crossref","first-page":"4753","DOI":"10.1007\/s11042-015-2501-0","volume":"75","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016a) Hash key-based image encryption using crossover operator and chaos. Multimed tools Appl 75:4753\u20134769","journal-title":"Multimed tools Appl"},{"key":"5461_CR24","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah M, Kachouri A, Samet M (2016b) A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 83:1123\u20131136","journal-title":"Nonlinear Dyn"},{"key":"5461_CR25","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"B Gupta","year":"2016","unstructured":"Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey"},{"key":"5461_CR26","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"5461_CR27","first-page":"11","volume":"754","author":"W Kahan","year":"1996","unstructured":"Kahan W (1996) IEEE standard 754 for binary floating-point arithmetic. Lect Notes Status IEEE 754:11\u201312","journal-title":"Lect Notes Status IEEE"},{"key":"5461_CR28","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.sigpro.2015.07.008","volume":"118","author":"C Li","year":"2016","unstructured":"Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203\u2013210","journal-title":"Signal Process"},{"key":"5461_CR29","doi-asserted-by":"publisher","unstructured":"Li J, Yu C, Gupta B, Ren X (2017) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-017-4452-0","DOI":"10.1007\/s11042-017-4452-0"},{"key":"5461_CR30","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"X Liao","year":"2010","unstructured":"Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714\u20132722","journal-title":"Signal Process"},{"key":"5461_CR31","first-page":"35","volume":"12","author":"Z Liu","year":"2010","unstructured":"Liu Z et al (2010) Double-image encryption based on the affine transform and the gyrator transform. J Opt 12:35\u201347","journal-title":"J Opt"},{"key":"5461_CR32","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"key":"5461_CR33","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557\u2013566","journal-title":"Nonlinear Dyn"},{"key":"5461_CR34","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1049\/iet-cvi.2015.0344","volume":"10","author":"B Murugan","year":"2016","unstructured":"Murugan B, Gounder A (2016) Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput Vis 10:593\u2013602","journal-title":"IET Comput Vis"},{"key":"5461_CR35","doi-asserted-by":"crossref","first-page":"1817","DOI":"10.1007\/s11042-015-3085-4","volume":"76","author":"B Norouzi","year":"2017","unstructured":"Norouzi B, Mirzakuchaki S (2017) Breaking a novel image encryption scheme based on an improper fractional order chaotic system. Multimed Tools Appl 76:1817\u20131826","journal-title":"Multimed Tools Appl"},{"key":"5461_CR36","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s00530-013-0314-4","volume":"20","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014a) A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems 20:45\u201364","journal-title":"Multimedia Systems"},{"key":"5461_CR37","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1007\/s11042-012-1292-9","volume":"71","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014b) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71:1469\u20131497","journal-title":"Multimed Tools Appl"},{"key":"5461_CR38","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1007\/s11042-013-1699-y","volume":"74","author":"B Norouzi","year":"2015","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74:781\u2013811","journal-title":"Multimed Tools Appl"},{"key":"5461_CR39","doi-asserted-by":"crossref","first-page":"10631","DOI":"10.1007\/s11042-014-2115-y","volume":"75","author":"Z Parvin","year":"2016","unstructured":"Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75:10631\u201310648","journal-title":"Multimed Tools Appl"},{"key":"5461_CR40","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1016\/j.cnsns.2008.11.005","volume":"14","author":"V Patidar","year":"2009","unstructured":"Patidar V, Pareek N, Sud K (2009) A new substitution\u2013diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056\u20133075","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5461_CR41","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/j.sigpro.2014.06.020","volume":"105","author":"P Ping","year":"2014","unstructured":"Ping P, Xu F, Wang ZJ (2014) Image encryption based on non-affine and balanced cellular automata. Signal Process 105:419\u2013429","journal-title":"Signal Process"},{"key":"5461_CR42","doi-asserted-by":"crossref","DOI":"10.1201\/9781420057133","volume-title":"Cryptography: theory and practice","author":"DR Stinson","year":"2005","unstructured":"Stinson DR (2005) Cryptography: theory and practice. CRC press, Boca Raton"},{"key":"5461_CR43","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.optlaseng.2016.07.012","volume":"88","author":"Y Su","year":"2017","unstructured":"Su Y, Tang C, Chen X, Li B, Xu W, Lei Z (2017) Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map. Opt Lasers Eng 88:20\u201327","journal-title":"Opt Lasers Eng"},{"key":"5461_CR44","doi-asserted-by":"publisher","unstructured":"Teng L, Wang X, Meng J (2017) A chaotic color image encryption using integrated bit-level permutation. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-017-4605-1","DOI":"10.1007\/s11042-017-4605-1"},{"key":"5461_CR45","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s11071-015-2330-8","volume":"83","author":"X Wang","year":"2016","unstructured":"Wang X, Zhang HI (2016) A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dyn 83:333\u2013346","journal-title":"Nonlinear Dyn"},{"key":"5461_CR46","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.physleta.2005.05.040","volume":"343","author":"K Wang","year":"2005","unstructured":"Wang K, Zou L, Song A, He Z (2005) On the security of 3D cat map based symmetric image encryption scheme. Phys Lett A 343:432\u2013439","journal-title":"Phys Lett A"},{"key":"5461_CR47","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.physleta.2006.11.023","volume":"363","author":"Y Wang","year":"2007","unstructured":"Wang Y, Liao X, Xiang T, Wong KW, Yang D (2007) Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map. Phys Lett A 363:277\u2013281","journal-title":"Phys Lett A"},{"key":"5461_CR48","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"XY Wang","year":"2010","unstructured":"Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615\u2013621","journal-title":"Nonlinear Dyn"},{"key":"5461_CR49","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"key":"5461_CR50","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85:290\u2013299","journal-title":"J Syst Softw"},{"key":"5461_CR51","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75:1947\u20131962","journal-title":"Multimed Tools Appl"},{"key":"5461_CR52","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.physleta.2005.02.083","volume":"349","author":"T Xiang","year":"2006","unstructured":"Xiang T, Liao X, Tang G, Chen Y, Wong KW (2006) A novel block cryptosystem based on iterating a chaotic map. Phys Lett A 349:109\u2013115","journal-title":"Phys Lett A"},{"key":"5461_CR53","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","volume":"132","author":"EY Xie","year":"2017","unstructured":"Xie EY, Li C, Yu S, Lu J (2017) On the cryptanalysis of Fridrich's chaotic image encryption scheme. Signal Process 132:150\u2013154","journal-title":"Signal Process"},{"key":"5461_CR54","doi-asserted-by":"publisher","unstructured":"Yu C, Li J, Li X, Ren X, Gupta B (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-017-4637-6","DOI":"10.1007\/s11042-017-4637-6"},{"key":"5461_CR55","first-page":"435","volume":"18","author":"C Yuan","year":"2017","unstructured":"Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF. Internet Technol 18:435\u2013442","journal-title":"Internet Technol"},{"key":"5461_CR56","doi-asserted-by":"crossref","first-page":"3518","DOI":"10.1016\/j.cnsns.2009.12.005","volume":"15","author":"N Yujun","year":"2010","unstructured":"Yujun N, Xingyuan W, Mingjun W, Huaguang Z (2010) A new hyperchaotic system and its circuit implementation. Commun Nonlinear Sci Numer Simul 15:3518\u20133524","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5461_CR57","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284:2775\u20132780","journal-title":"Opt Commun"},{"key":"5461_CR58","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1007\/s11071-012-0329-y","volume":"69","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Li C, Li Q, Zhang D, Shu S (2012) Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 69:1091\u20131096","journal-title":"Nonlinear Dyn"},{"key":"5461_CR59","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.optlaseng.2016.02.002","volume":"82","author":"YQ Zhang","year":"2016","unstructured":"Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the MLNCML system using DNA sequences. Opt Lasers Eng 82:95\u2013103","journal-title":"Opt Lasers Eng"},{"key":"5461_CR60","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285:29\u201337","journal-title":"Opt Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5461-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5461-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5461-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T03:53:48Z","timestamp":1660103628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5461-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,9]]},"references-count":60,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["5461"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5461-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,9]]}}}