{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:18:10Z","timestamp":1775323090643,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T00:00:00Z","timestamp":1516233600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016 YFB 0800601"],"award-info":[{"award-number":["2016 YFB 0800601"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61472331"],"award-info":[{"award-number":["61472331"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11042-017-5590-0","type":"journal-article","created":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T08:48:13Z","timestamp":1516265293000},"page":"21803-21821","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["A new color image encryption scheme based on logistic map over the finite field ZN"],"prefix":"10.1007","volume":"77","author":[{"given":"Bo","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,18]]},"reference":[{"key":"5590_CR1","doi-asserted-by":"publisher","first-page":"1839","DOI":"10.1007\/s11071-015-2281-0","volume":"82","author":"J Ahmad","year":"2015","unstructured":"Ahmad J, Hwang SO (2015) Chaos-based diffusion for highly autocorrelated data in encryption algorithms. NonlinearDyn 82:1839\u20131850","journal-title":"Nonlinear Dyn"},{"key":"5590_CR2","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/j.cnsns.2010.04.031","volume":"16","author":"D Arroyo","year":"2011","unstructured":"Arroyo D, Alvarez G, Amig J (2011) Cryptanalysis of a family of self-synchronizing chaotic stream ciphers. Original Res Article Commun Nonlinear Sci Num Simul 16:805\u2013813","journal-title":"Original Res Article Commun Nonlinear Sci Num Simul"},{"key":"5590_CR3","doi-asserted-by":"publisher","first-page":"14867","DOI":"10.1007\/s11042-015-2671-9","volume":"75","author":"K Muhammad","year":"2016","unstructured":"Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75:14867\u201314893","journal-title":"Multimed Tools Appl"},{"key":"5590_CR4","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TIT.2011.2171534","volume":"58","author":"F Chen","year":"2012","unstructured":"Chen F, Wong KW, Liao XF (2012) Period distribution of generalized discrete arnold cat map for N = p\n                           e. IEEE Trans Inf Theory 58:445\u2013452","journal-title":"IEEE Trans Inf Theory"},{"key":"5590_CR5","doi-asserted-by":"publisher","first-page":"3249","DOI":"10.1109\/TIT.2012.2235907","volume":"59","author":"F Chen","year":"2013","unstructured":"Chen F, Wong KW, Liao XF, Xiang T (2013) Period distribution of the generalized discrete arnold cat map for N =\u20092e. IEEE Trans Inf Theory 59:3249\u20133255","journal-title":"IEEE Trans Inf Theory"},{"key":"5590_CR6","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s11042-012-1173-2","volume":"70","author":"AAA El-Latif","year":"2014","unstructured":"El-Latif AAA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70:1559\u20131584","journal-title":"Multimed Tools Appl"},{"key":"5590_CR7","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","volume":"90","author":"R Enayatifar","year":"2017","unstructured":"Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146\u2013154","journal-title":"Opt Lasers Eng"},{"key":"5590_CR8","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1080\/19393555.2016.1212954","volume":"25","author":"R Hamza","year":"2016","unstructured":"Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Inf Secur J Global Perspective 25:162\u2013179","journal-title":"Inf Secur J Global Perspective"},{"key":"5590_CR9","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"5590_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20542-2","volume-title":"Chaos-based cryptography: theory, algorithms and applications","author":"L Kocarev","year":"2011","unstructured":"Kocarev L, Lian S (2011) Chaos-based cryptography: theory, algorithms and applications. Springer-Verlag, New York"},{"key":"5590_CR11","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1016\/j.cnsns.2010.05.008","volume":"16","author":"C Li","year":"2011","unstructured":"Li C, Li S, Lo K (2011) Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps. Original Res Article Commun Nonlinear Sci Num Simul 16:837\u2013843","journal-title":"Original Res Article Commun Nonlinear Sci Num Simul"},{"key":"5590_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.optlastec.2016.06.012","volume":"86","author":"M Li","year":"2016","unstructured":"Li M, Liu SW, Niu LP, Liu H (2016) Cryptanalyzing a chaotic encryption algorithm for highly autocorrelated data. Opt Laser Technol 86:33\u201338","journal-title":"Opt Laser Technol"},{"key":"5590_CR13","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.sigpro.2013.07.020","volume":"94","author":"JB Lima","year":"2014","unstructured":"Lima JB, Novaes LFG (2014) Image encryption based on the fractional Fourier transform over finite fields. Signal Process 94:521\u2013530","journal-title":"Signal Process"},{"key":"5590_CR14","doi-asserted-by":"crossref","unstructured":"Lima JB, Silva ESD, Souza RMCD (2015) A finite field cosine transform-based image processing scheme for color image encryption. In: IEEE Global Conference on Signal and Information Processing, pp 1071\u20131075","DOI":"10.1109\/GlobalSIP.2015.7418362"},{"key":"5590_CR15","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1109\/TCSVT.2014.2369711","volume":"25","author":"Z Lin","year":"2015","unstructured":"Lin Z, Yu S, L\u00fc J, Cai S, Chen G (2015) Design and arm embedded implementation of a chaotic map-based real-time secure video communication system. IEEE Trans Circ Syst Video Tech 25:1203\u20131216","journal-title":"IEEE Trans Circ Syst Video Tech"},{"key":"5590_CR16","first-page":"27","volume":"22","author":"DC Mishra","year":"2014","unstructured":"Mishra DC, Sharma RK, Kumar M, Kumar K (2014) Security Of color image data designed by public- key cryptosystem associated with 2D-Dwt. Fractals-complex Geometry Patterns and Scaling in Nature and Society 22:27\u2013175","journal-title":"Fractals-complex Geometry Patterns and Scaling in Nature and Society"},{"key":"5590_CR17","doi-asserted-by":"publisher","first-page":"2258","DOI":"10.1587\/transfun.E93.A.2258","volume":"E93-A","author":"T Miyazaki","year":"2010","unstructured":"Miyazaki T, Araki S, Uehara S (2010) Some properties of Logistic maps over integers. IEICE Trans Fundam E93-A:2258\u20132265","journal-title":"IEICE Trans Fundam"},{"key":"5590_CR18","unstructured":"Miyazaki T, Araki S, Uehara S (2013) A study on the pseudorandom number generator for the Logistic map over prime fields. In: Proc. of The 30th Symposium on Cryptography and Information Security, Japanese"},{"key":"5590_CR19","doi-asserted-by":"publisher","unstructured":"Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) Image steganography using uncorrelated color space and its application for security of visual contents in online social network, Future Generation Computer Systems. \n                    https:\/\/doi.org\/10.1016\/j.future.2016.11.029","DOI":"10.1016\/j.future.2016.11.029"},{"key":"5590_CR20","volume-title":"Applied cryptography: protocols, algorithms, and source code in C","author":"B Schneier","year":"2015","unstructured":"Schneier B (2015) Applied cryptography: protocols, algorithms, and source code in C. Wiley, New Jersey"},{"key":"5590_CR21","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92:1202\u20131215","journal-title":"Signal Process"},{"key":"5590_CR22","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s11432-010-0010-3","volume":"53","author":"XJ Tong","year":"2010","unstructured":"Tong XJ, Cui MG (2010) Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation. Sci China Inf Sci 53:191\u2013202","journal-title":"Sci China Inf Sci"},{"key":"5590_CR23","doi-asserted-by":"publisher","first-page":"2333","DOI":"10.1007\/s11071-016-2648-x","volume":"84","author":"XJ Tong","year":"2016","unstructured":"Tong XJ, Zhang M, Wang Z, Ma J (2016) A joint color image encryption and compression scheme based on hyperchaotic system. Nonlinear Dyn 84:2333\u20132356","journal-title":"Nonlinear Dyn"},{"key":"5590_CR24","first-page":"1","volume":"5","author":"W Wang","year":"2016","unstructured":"Wang W, Tan HY, Pang Y, Li ZY, Ran P, Wu J (2016) A novel encryption algorithm based on DWT and multichaos mapping. J Sens 5:1\u20137","journal-title":"J Sens"},{"key":"5590_CR25","unstructured":"Wu Y (2011) NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications"},{"key":"5590_CR26","doi-asserted-by":"publisher","first-page":"3507","DOI":"10.1016\/j.cnsns.2010.01.004","volume":"15","author":"H Yang","year":"2010","unstructured":"Yang H, Wong KW, Liao XF, Zhang W, Wei P (2010) A fast image encryption and authentication scheme based on chaotic maps. Commun Nonlinear Sci Numer Simul 15:3507\u20133517","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5590_CR27","doi-asserted-by":"publisher","first-page":"3477","DOI":"10.1007\/s11128-013-0612-y","volume":"12","author":"YG Yang","year":"2013","unstructured":"Yang YG, Xia J, Jia X, Zhang H (2013) Novel image encryption\/decryption based on quantum Fourier transform and double phase encoding. Quantum Inf Process 12:3477\u20133493","journal-title":"Quantum Inf Process"},{"key":"5590_CR28","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1007\/s11432-011-4401-x","volume":"55","author":"RM Yin","year":"2012","unstructured":"Yin RM, Wang J, Yuan J (2012) Weak key analysis for chaotic cipher based on randomness properties. Sci China Inf Sci 55:1162\u20131171","journal-title":"Sci China Inf Sci"},{"key":"5590_CR29","doi-asserted-by":"publisher","unstructured":"Zhang D, Liao XF, Yang B, Zhang YS (2017) A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform, Multimedia Tools and Application. \n                    https:\/\/doi.org\/10.1007\/s11042-017-4370-1","DOI":"10.1007\/s11042-017-4370-1"},{"key":"5590_CR30","doi-asserted-by":"publisher","unstructured":"Zhang J (2015) An image encryption scheme based on cat map and hyperchaotic lorenz system. In: IEEE International Conference on Computational Intelligence and Communication Technology. \n                    https:\/\/doi.org\/10.1109\/CICT.2015.134\n                    \n                  , pp 78\u201382","DOI":"10.1109\/CICT.2015.134"},{"key":"5590_CR31","doi-asserted-by":"publisher","first-page":"11255","DOI":"10.1007\/s11042-014-2227-4","volume":"74","author":"M Zhang","year":"2015","unstructured":"Zhang M, Tong XJ (2015) A new algorithm of image compression and encryption based on spatiotemporal cross chaotic system. Multimed Tools Appl 74:11255\u201311279","journal-title":"Multimed Tools Appl"},{"key":"5590_CR32","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao YL, Zhu ZL (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350","journal-title":"Signal Process"},{"key":"5590_CR33","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"YS Zhang","year":"2014","unstructured":"Zhang YS, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19:74\u201382","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5590_CR34","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.aeue.2013.10.002","volume":"68","author":"YS Zhang","year":"2014","unstructured":"Zhang YS, Xiao D (2014) Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU Int J Electron Commun 68:361\u2013368","journal-title":"AEU Int J Electron Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5590-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5590-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5590-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T21:57:03Z","timestamp":1589839023000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5590-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,18]]},"references-count":34,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["5590"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5590-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,18]]},"assertion":[{"value":"16 March 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}