{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:41:34Z","timestamp":1767339694562},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2018,3,27]],"date-time":"2018-03-27T00:00:00Z","timestamp":1522108800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11042-018-5902-z","type":"journal-article","created":{"date-parts":[[2018,3,27]],"date-time":"2018-03-27T09:08:30Z","timestamp":1522141710000},"page":"27017-27039","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":68,"title":["A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences"],"prefix":"10.1007","volume":"77","author":[{"given":"Ashish","family":"Girdhar","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,27]]},"reference":[{"issue":"04","key":"5902_CR1","first-page":"18","volume":"12","author":"J Ahmad","year":"2012","unstructured":"Ahmad J, Ahmed F (2012) Efficiency analysis and security evaluation of image encryption schemes. Int J Video Image Processd Netw Secur 12(04):18\u201331","journal-title":"Int J Video Image Processd Netw Secur"},{"issue":"02","key":"5902_CR2","doi-asserted-by":"publisher","first-page":"101","DOI":"10.4236\/cs.2011.22015","volume":"02","author":"Q Alsafasfeh","year":"2011","unstructured":"Alsafasfeh Q, Al-Arni M (2011) A new chaotic behavior from Lorenz and Rossler systems and its electronic circuit implementation. Circ Syst 02(02):101\u2013105","journal-title":"Circ Syst"},{"key":"5902_CR3","volume-title":"Ergodic problems of classical mechanics. Mathematical physics monograph series","author":"VI Arnold","year":"1968","unstructured":"Arnold VI, Avez A (1968) Ergodic problems of classical mechanics. Mathematical physics monograph series. W.A. Benjamin, New York"},{"issue":"3","key":"5902_CR4","first-page":"254","volume":"18","author":"Z Bashir","year":"2016","unstructured":"Bashir Z, Rashid T, Zafar S (2016) Hyperchaotic dynamical system based image encryption scheme with time-varying delays. Pac Sci Rev A Nat Sci Eng 18(3):254\u2013260, ISSN 2405-8823","journal-title":"Pac Sci Rev A Nat Sci Eng"},{"key":"5902_CR5","doi-asserted-by":"crossref","unstructured":"Cao YY, Fu C (2008) An image encryption scheme based on high dimension chaos system. International conference on intelligent computation technology and automation vol. 1, pp 104-108, Changsha, Hunan, China October, 2008","DOI":"10.1109\/ICICTA.2008.397"},{"key":"5902_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah A, Isnin I (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83\u201393","journal-title":"Opt Lasers Eng"},{"issue":"1\u20133","key":"5902_CR7","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.tcs.2004.11.004","volume":"334","author":"P Gaborit","year":"2005","unstructured":"Gaborit P, King O (2005) Linear constructions for DNA codes. Theor Comput Sci 334(1\u20133):99\u2013113","journal-title":"Theor Comput Sci"},{"issue":"04","key":"5902_CR8","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1142\/S0129183106008625","volume":"17","author":"T Gao","year":"2006","unstructured":"Gao T, Chen Z, Yuan Z, Chen G (2006) A hyperchaos generated from Chen's system. Int J Mod Phys C 17(04):471\u2013478","journal-title":"Int J Mod Phys C"},{"issue":"1\u20133","key":"5902_CR9","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"Z Guan","year":"2005","unstructured":"Guan Z, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1\u20133):153\u2013157","journal-title":"Phys Lett A"},{"issue":"18","key":"5902_CR10","first-page":"27","volume":"85","author":"R Gupta","year":"2014","unstructured":"Gupta R, Jain A (2014) A new image encryption algorithm based on DNA approach. Int J Comput Appl 85(18):27\u201331","journal-title":"Int J Comput Appl"},{"key":"5902_CR11","unstructured":"Gupta S, Jain A (2015) Efficient image encryption algorithm using DNA approach. International conference on computing for sustainable global development (INDIACom), ISSN: 1511\u20130054, pp 726\u2013731"},{"key":"5902_CR12","unstructured":"IEEE Standard for Floating-Point Arithmetic-IEEE Xplore Document (2017) Ieeexplore.ieee.org, 2017. [Online]. Available: http:\/\/ieeexplore.ieee.org\/document\/4610935\/ . Accessed 06 Jan 2017"},{"issue":"2","key":"5902_CR13","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TIFS.2015.2489178","volume":"11","author":"A Jolfaei","year":"2016","unstructured":"Jolfaei A, Wu X, Muthukkumarasamy V (Feb. 2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forensics Secur 11(2):235\u2013246","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5902_CR14","doi-asserted-by":"crossref","unstructured":"Kadhim F, Majeed G, Ali R (2016) Proposal new s-box depending on DNA computing and mathematical operations. In Multidisciplinary in IT and communication science and applications (AIC-MITCSA), pp 1\u20136","DOI":"10.1109\/AIC-MITCSA.2016.7759926"},{"issue":"10","key":"5902_CR15","first-page":"1558","volume":"15","author":"T Kong","year":"2004","unstructured":"Kong T, Zhang D (2004) A new anti-Arnold transformation algorithm. J Softw 15(10):1558\u20131564","journal-title":"J Softw"},{"key":"5902_CR16","first-page":"20","volume":"21","author":"M Kumar","year":"2015","unstructured":"Kumar M, Powduri P, Reddy A (2015) An RGB image encryption using diffusion process associated with chaotic map. J Inf Secur Appl 21:20\u201330","journal-title":"J Inf Secur Appl"},{"key":"5902_CR17","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.sigpro.2016.01.017","volume":"125","author":"M Kumar","year":"2016","unstructured":"Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie\u2013Hellman cryptography. Signal Process 125:187\u2013202","journal-title":"Signal Process"},{"issue":"10","key":"5902_CR18","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320\u20133327","journal-title":"Comput Math Appl"},{"issue":"1","key":"5902_CR19","first-page":"64","volume":"8","author":"X Liu","year":"2008","unstructured":"Liu X, Zhang J, Zhang J, He X (2008) Image scrambling algorithm based on chaos theory and sorting transformation. Int J Comput Sci Netw Secur 8(1):64\u201368","journal-title":"Int J Comput Sci Netw Secur"},{"issue":"5","key":"5902_CR20","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240\u20131248","journal-title":"Comput Electr Eng"},{"issue":"5","key":"5902_CR21","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"key":"5902_CR22","unstructured":"Liu Y, Nie L, Han L, Zhang L, Rosenblum D (2015) Action2Activity: recognizing complex activities from sensor data. In Proceedings of international joint conference on artificial intelligence, pp 1617\u20131623"},{"key":"5902_CR23","unstructured":"Liu Y, Zheng Y, Liu S, Rosenblum D (2016) Urban water quality prediction based on multi-task multi-view learning. Proceedings of the twenty-fifth international joint conference on artificial intelligence, pp 2576\u20132582"},{"key":"5902_CR24","doi-asserted-by":"crossref","unstructured":"Liu L, Cheng L, Jia Y, Rosenblum D (2016) Recognizing complex activities by a probabilistic interval-based model. Proceedings of the thirtieth AAAI conference on artificial intelligence, pp 1266\u20131272","DOI":"10.1609\/aaai.v30i1.10155"},{"key":"5902_CR25","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.neucom.2015.08.096","volume":"181","author":"Y Liu","year":"2016","unstructured":"Liu Y, Liqiang N, Liu L, Rosenblum D (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108\u2013115 ISSN 0925-2312","journal-title":"Neurocomputing"},{"key":"5902_CR26","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang L, Nie Y, Rosenblum D (2016) Fortune teller: predicting your career path. Proceedings of the thirtieth AAAI conference on artificial intelligence, pp 201\u2013207","DOI":"10.1609\/aaai.v30i1.9969"},{"issue":"2","key":"5902_CR27","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","volume":"20","author":"EN Lorenz","year":"1963","unstructured":"Lorenz EN (1963) Deterministic nonperiodic flow. J Atmos Sci 20(2):130\u2013141","journal-title":"J Atmos Sci"},{"issue":"1","key":"5902_CR28","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/S0303-2647(99)00044-1","volume":"52","author":"AP Mills","year":"1999","unstructured":"Mills AP, Yurke B, Platzman PM (1999) Article for analog vector algebra computation. Biosystems 52(1):175\u2013180","journal-title":"Biosystems"},{"issue":"04","key":"5902_CR29","doi-asserted-by":"publisher","DOI":"10.1142\/S0218348X1450011X","volume":"22","author":"D Mishra","year":"2014","unstructured":"Mishra D, Sharma R, Kumar M, Kumar K (2014) Security of color image data designed by public-key cryptosystem associated with 2D-DWT. Fractals 22(04):1450011","journal-title":"Fractals"},{"key":"5902_CR30","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.sigpro.2014.10.033","volume":"109","author":"M Murillo-Escobar","year":"2015","unstructured":"Murillo-Escobar M, Cruz-Hern\u00e1ndez C, Abundiz-P\u00e9rez F, L\u00f3pez-Guti\u00e9rrez R, Acosta Del Campo O (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119\u2013131","journal-title":"Signal Process"},{"key":"5902_CR31","doi-asserted-by":"crossref","unstructured":"Ni Z, Kang X, Wang L (2016) A novel image encryption algorithm based on bit-level improved Arnold transform and hyper chaotic map. In IEEE International Conference on Signal and Image Processing (ICSIP), Beijing, China, pp 156\u2013160","DOI":"10.1109\/SIPROCESS.2016.7888243"},{"key":"5902_CR32","first-page":"1","volume":"2017","author":"Y Niu","year":"2017","unstructured":"Niu Y, Zhang X, Han F (2017) Image encryption algorithm based on Hyperchaotic maps and nucleotide sequences database. Comput Intell Neurosci 2017:1\u20139","journal-title":"Comput Intell Neurosci"},{"key":"5902_CR33","unstructured":"Niyat A, HeiHei R, Vafaei Jahan M (2015) A RGB image encryption algorithm based on DNA sequence operation and hyper-chaotic system. Proceedings of International Congress on Technology, Communication and Knowledge, Iran"},{"issue":"9","key":"5902_CR34","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"N Pareek","year":"2006","unstructured":"Pareek N, Patidar V, Sud K (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926\u2013934","journal-title":"Image Vis Comput"},{"key":"5902_CR35","doi-asserted-by":"crossref","unstructured":"Pietro D, Liu Y, Hopkins D, Ungar L (2017) Beyond binary labels: political ideology prediction of twitter users. Proceedings of the 55th annual meeting of the association for computational linguistics Vol. 1, pp 729\u2013740","DOI":"10.18653\/v1\/P17-1068"},{"key":"5902_CR36","doi-asserted-by":"crossref","unstructured":"Ping P, Mao Y, Lv X, Xu F, Xu G (2015) An image scrambling algorithm using discrete Henon map. IEEE, Lijiang, pp 429\u2013432","DOI":"10.1109\/ICInfA.2015.7279326"},{"issue":"3","key":"5902_CR37","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/BF02916835","volume":"43","author":"D Qi","year":"2000","unstructured":"Qi D, Zou J, Han X (2000) A new class of scrambling transformation and its application in the image information covering. Sci China Ser E Technol Sci 43(3):304\u2013312","journal-title":"Sci China Ser E Technol Sci"},{"issue":"5","key":"5902_CR38","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/0375-9601(76)90101-8","volume":"57","author":"OE Rossler","year":"1976","unstructured":"Rossler OE (1976) An equation for continuous chaos. Phys Lett A 57(5):397\u2013398, 1976","journal-title":"Phys Lett A"},{"key":"5902_CR39","doi-asserted-by":"crossref","unstructured":"Saranya MR, Mohan AK, Anusudha K (2014) A composite image cipher using DNA sequence and genetic algorithm. IEEE, Mysore, pp 1022\u20131026","DOI":"10.1109\/IC3I.2014.7019805"},{"key":"5902_CR40","doi-asserted-by":"crossref","unstructured":"Saranya MR, Mohan AK, Anusudha K (2015) Algorithm for enhanced image security using DNA and genetic algorithm. IEEE, Kozhikode, pp 1\u20135","DOI":"10.1109\/SPICES.2015.7091462"},{"key":"5902_CR41","unstructured":"SIPI Image Database\u2013Misc (2017) Sipi.usc.edu, 2017. [Online]. Available: http:\/\/sipi.usc.edu\/database\/database.php?volume=misc . Accessed 20 Jul 2017"},{"key":"5902_CR42","doi-asserted-by":"crossref","unstructured":"Srividhya N, Vino T (2016) Genome based highly secured image using DNA cryptography and trellis algorithm. International conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp 1\u20136","DOI":"10.1109\/WiSPNET.2016.7566421"},{"issue":"1","key":"5902_CR43","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong K, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514\u2013522","journal-title":"Appl Soft Comput"},{"issue":"4","key":"5902_CR44","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101\u20131108","journal-title":"Signal Process"},{"issue":"4356","key":"5902_CR45","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1038\/171737a0","volume":"171","author":"J Watson","year":"1953","unstructured":"Watson J, Crick F (1953) Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid. Nature 171(4356):737\u2013738","journal-title":"Nature"},{"issue":"2","key":"5902_CR46","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290\u2013299","journal-title":"J Syst Softw"},{"key":"5902_CR47","first-page":"31","volume":"4","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. J Sel Areas Telecommun (JSAT) 4:31\u201338","journal-title":"J Sel Areas Telecommun (JSAT)"},{"issue":"2","key":"5902_CR48","doi-asserted-by":"publisher","DOI":"10.1063\/1.2728112","volume":"17","author":"T Xiang","year":"2007","unstructured":"Xiang T, Wong K, Liao X (2007) Selective image encryption using a spatiotemporal chaotic system. Chaos Interdisciplinary J Nonlinear Sci 17(2):023115","journal-title":"Chaos Interdisciplinary J Nonlinear Sci"},{"key":"5902_CR49","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41\u201352","journal-title":"Opt Lasers Eng"},{"key":"5902_CR50","doi-asserted-by":"crossref","unstructured":"Yanling W(2009) Image scrambling method based on chaotic sequences and mapping. Proceedings of the first international workshop on education technology and computer science, March 2009","DOI":"10.1109\/ETCS.2009.630"},{"issue":"5","key":"5902_CR51","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.patrec.2009.11.008","volume":"31","author":"G Ye","year":"2010","unstructured":"Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347\u2013354","journal-title":"Pattern Recogn Lett"},{"issue":"5","key":"5902_CR52","doi-asserted-by":"publisher","first-page":"404","DOI":"10.4103\/0256-4602.123123","volume":"30","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Wei X (2013) RGB color image encryption method based on Lorenz chaotic system and DNA computation. IETE Tech Rev 30(5):404","journal-title":"IETE Tech Rev"},{"key":"5902_CR53","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19:74\u201382","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5902_CR54","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (Apr. 2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"key":"5902_CR55","unstructured":"Zou J, Ward RK, Qi D (2004) A new digital scrambling method based on Fibonacci numbers. Circuits and systems, 2004. ISCAS apos. Proceedings of the 2004 international symposium, volume 3, issue 23\u201326, pp III -965-968"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-5902-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5902-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5902-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T02:17:21Z","timestamp":1660702641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-5902-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,27]]},"references-count":55,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5902"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5902-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,27]]},"assertion":[{"value":"8 May 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}