{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T08:08:07Z","timestamp":1773821287692,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T00:00:00Z","timestamp":1542585600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11042-018-6827-2","type":"journal-article","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T08:05:07Z","timestamp":1542614707000},"page":"14867-14895","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["A novel fractional order chaos-based image encryption using Fisher Yates algorithm and 3-D cat map"],"prefix":"10.1007","volume":"78","author":[{"given":"Farhan","family":"Musanna","sequence":"first","affiliation":[]},{"given":"Sanjeev","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,19]]},"reference":[{"key":"6827_CR1","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1016\/j.procs.2015.07.494","volume":"57","author":"M Ahmada","year":"2015","unstructured":"Ahmada M, Shamsi U, Khan IR (2015) An enhanced image encryption algorithm using fractional chaotic systems. Procedia Computer Science 57:852\u2013859","journal-title":"Procedia Computer Science"},{"key":"6827_CR2","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Proc 128:155\u2013170","journal-title":"Signal Proc"},{"issue":"3","key":"6827_CR3","doi-asserted-by":"publisher","first-page":"033012","DOI":"10.1117\/1.3210015","volume":"18","author":"G Bhatnagar","year":"2009","unstructured":"Bhatnagar G, Kumar S, Raman B, Sukavanam N (2009) Stereo image coding via digital watermarking. J Electron Imaging (SPIE) 18(3):033012","journal-title":"J Electron Imaging (SPIE)"},{"key":"6827_CR4","doi-asserted-by":"publisher","first-page":"247\u2014262","DOI":"10.1016\/j.ins.2014.02.018","volume":"277","author":"G Bhatnagar","year":"2014","unstructured":"Bhatnagar G, Saha A, Wu QMJ, Atrey PK (2014) Analysis and extension of multiresolution singular value decomposition. Inf Sci 277:247\u2014262","journal-title":"Inf Sci"},{"key":"6827_CR5","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons Fractals 21:749\u2013761","journal-title":"Chaos, Solitons Fractals"},{"key":"6827_CR6","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1142\/S0218127499001024","volume":"9","author":"G Chen","year":"1999","unstructured":"Chen G, Ueta T (1999) Yet another chaotic attractor. Int J Bifurcation Chaos 9:1465\u20131466","journal-title":"Int J Bifurcation Chaos"},{"key":"6827_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1023\/A:1016592219341","volume":"29","author":"K Diethelm","year":"2002","unstructured":"Diethelm K, Ford NJ, Freed AD (2002) A predictor-corrector approach for the numerical solution of fractional differential equations. Nonlinear Dynam 29:3\u201322","journal-title":"Nonlinear Dynam"},{"key":"6827_CR8","doi-asserted-by":"crossref","unstructured":"Dosselmann R, Yang XD et al (2008) A formal assessment of the structural similarity index. University of Regina. Department of Computer Science","DOI":"10.1109\/CCECE.2009.5090102"},{"key":"6827_CR9","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1145\/364520.364540","volume":"7","author":"R Durstenfeld","year":"1964","unstructured":"Durstenfeld R (1964) Algorithm 235: random permutation. Commun ACM 7:420","journal-title":"Commun ACM"},{"issue":"3","key":"6827_CR10","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1016\/0167-2789(91)90012-X","volume":"50","author":"J Ford","year":"1991","unstructured":"Ford J, Mantica G, Ristow GH (1991) The Arnol\u2019d cat: failure of the correspondence principle. Physica D: Nonlinear Phenomena 50(3):493\u2013520","journal-title":"Physica D: Nonlinear Phenomena"},{"key":"6827_CR11","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1016\/j.cnsns.2013.07.016","volume":"19","author":"J Fouda","year":"2014","unstructured":"Fouda J, Effa J, Sabat S, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19:578\u2013588","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"6827_CR12","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8:1259\u20131284","journal-title":"Int J Bifurcat Chaos"},{"key":"6827_CR13","volume-title":"Differential equations, dynamical systems, and an introduction to Chaos","author":"M Hirsch","year":"2004","unstructured":"Hirsch M, Smale S, Devaney RL (2004) Differential equations, dynamical systems, and an introduction to Chaos. Elsevier Academic Press, New York"},{"key":"6827_CR14","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"issue":"11","key":"6827_CR15","doi-asserted-by":"publisher","first-page":"2123","DOI":"10.1016\/j.optcom.2009.02.044","volume":"282","author":"CK Huang","year":"2009","unstructured":"Huang CK, Nien H (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123\u20132127","journal-title":"Opt Commun"},{"key":"6827_CR16","unstructured":"Institute ANS, Committee I.C.S.S, Board IS (1985) IEEE standard for binary floating point arithmetic: IEEE"},{"issue":"7","key":"6827_CR17","doi-asserted-by":"publisher","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3d chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943\u20132959","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"6827_CR18","volume-title":"Intelligent computing based on chaos","author":"L Kocarev","year":"2008","unstructured":"Kocarev L (2008) Intelligent computing based on chaos. Springer, Berlin"},{"key":"6827_CR19","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/j.chaos.2004.02.013","volume":"22","author":"C Li","year":"2004","unstructured":"Li C, Peng G (2004) Chaos in Chen\u2019s system with a fractional order. Chaos, Solitons and Fractals 22:443\u2013450","journal-title":"Chaos, Solitons and Fractals"},{"issue":"15-17","key":"6827_CR20","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(15-17):3895\u20133903","journal-title":"Opt Commun"},{"key":"6827_CR21","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang L, Nie L, Yan Y (2016) Fortune teller : predicting your career path. AAAI conference on artificial intelligence thirtieth AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v30i1.9969"},{"key":"6827_CR22","unstructured":"Liu Y, Zheng Y, Liang Y, Liu S, Rosenblum DS (2016) Urban water quality prediction based on multi-task multi-view learning. In: Proceedings of the twenty-fifth international joint conference on artificial intelligence (IJCAI-16)"},{"key":"6827_CR23","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.neucom.2015.08.096","volume":"181","author":"Y Liu","year":"2016","unstructured":"Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108\u2013115","journal-title":"Neurocomputing"},{"key":"6827_CR24","first-page":"231","volume-title":"Chaos-based image encryption","author":"Y Mao","year":"2005","unstructured":"Mao Y, Chen G (2005) Chaos-based image encryption. Springer, Berlin, pp 231\u2013265"},{"issue":"10","key":"6827_CR25","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y Mao","year":"2004","unstructured":"Mao Y, Chen G (2004) A novel fast image encryption scheme based on 3d chaotic baker maps. Int J Bifurcat Chaos 14(10):3613\u20133624","journal-title":"Int J Bifurcat Chaos"},{"issue":"5560","key":"6827_CR26","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"RM May","year":"1976","unstructured":"May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459\u2013467","journal-title":"Nature"},{"key":"6827_CR27","doi-asserted-by":"crossref","unstructured":"Musanna F, Rani A, Kumar S (2018) Image encryption using chaotic 3-D arnold\u2019s cat map and logistic map. In: Chaudhuri B, Kankanhalli M, Raman B (eds) Proceedings of 2nd international conference on computer vision & image processing. Advances in intelligent systems and computing, vol 704. Springer, Singapore","DOI":"10.1007\/978-981-10-7898-9_30"},{"issue":"9","key":"6827_CR28","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"N Pareek","year":"2006","unstructured":"Pareek N, Patidar V, Sud K (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926\u2013934","journal-title":"Image Vis Comput"},{"issue":"3","key":"6827_CR29","doi-asserted-by":"publisher","first-page":"2225","DOI":"10.1007\/s11042-013-1528-3","volume":"72","author":"A Rani","year":"2014","unstructured":"Rani A, Raman B, Kumar S (2014) A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection. Multimedia Tools and Applications 72(3):2225\u20132248","journal-title":"Multimedia Tools and Applications"},{"key":"6827_CR30","first-page":"120","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) On digital signatures and public key cryptosystems. Commun Ass Comput 21:120\u2013126","journal-title":"Commun Ass Comput"},{"key":"6827_CR31","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Nat. Inst. Standard Technol., Gaithersburg, MD, USA, NIST Special Pub. 800-22, Revision 1a","DOI":"10.6028\/NIST.SP.800-22"},{"issue":"5","key":"6827_CR32","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/5.4441","volume":"76","author":"ME Smid","year":"1988","unstructured":"Smid ME, Branstad DK (1988) Data encryption standard: past and future. Proc IEEE 76(5):550\u2013559","journal-title":"Proc IEEE"},{"issue":"3","key":"6827_CR33","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1080\/0161-110291890876","volume":"26","author":"W Stallings","year":"2002","unstructured":"Stallings W (2002) The advanced encryption standard. Cryptologia 26(3):165\u2013188","journal-title":"Cryptologia"},{"issue":"5","key":"6827_CR34","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1016\/j.sigpro.2012.11.008","volume":"93","author":"CK Volos","year":"2013","unstructured":"Volos CK, Kyprianidis IM, Stouboulos IN (2013) Image encryption process based on chaotic synchronization phenomena. Signal Process 93(5):1328\u20131340","journal-title":"Signal Process"},{"key":"6827_CR35","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using dna sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"6827_CR36","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13 (4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"6827_CR37","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","volume":"16","author":"A Wolf","year":"1985","unstructured":"Wolf A, Swift JB, Swinney H, Vastano L, John A (1985) Determining Lyapunov exponents from a time series. Physica D: Nonlinear Phenomena 16:285\u2013317","journal-title":"Physica D: Nonlinear Phenomena"},{"key":"6827_CR38","first-page":"333","volume":"14","author":"KW Wong","year":"2008","unstructured":"Wong KW (2008) Image encryption using chaotic maps. Springer 14:333\u2013355","journal-title":"Springer"},{"issue":"2","key":"6827_CR39","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan J, Agaian S (2011) Npcr and uaci randomness tests for image encryption. Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31\u201338","journal-title":"Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT)"},{"issue":"10","key":"6827_CR40","doi-asserted-by":"publisher","first-page":"3735","DOI":"10.1016\/j.cnsns.2014.02.029","volume":"19","author":"Y Xu","year":"2014","unstructured":"Xu Y, Hua W, Yongge L (2014) Image encryption based on synchronization of fractional chaotic systems. Commun Nonlinear Sci Numer Simulat 19(10):3735\u20133744","journal-title":"Commun Nonlinear Sci Numer Simulat"},{"key":"6827_CR41","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Hai Y, Zhao Y, Zhu Z (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350","journal-title":"Signal Process"},{"issue":"20","key":"6827_CR42","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Wang X (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273(20):329\u201351","journal-title":"Inf Sci"},{"issue":"11","key":"6827_CR43","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1016\/j.sigpro.2013.04.021","volume":"93","author":"Y Zhou","year":"2013","unstructured":"Zhou Y, Bao L, Chen C (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039\u20133052","journal-title":"Signal Process"},{"key":"6827_CR44","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"Z Zhu","year":"2011","unstructured":"Zhu Z, Zhang W, Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171\u20131186","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6827-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6827-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6827-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T09:39:04Z","timestamp":1662457144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6827-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,19]]},"references-count":44,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["6827"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6827-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,19]]},"assertion":[{"value":"7 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}