{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T16:43:12Z","timestamp":1775320992584,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2018,12,18]],"date-time":"2018-12-18T00:00:00Z","timestamp":1545091200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11042-018-7000-7","type":"journal-article","created":{"date-parts":[[2018,12,18]],"date-time":"2018-12-18T03:05:37Z","timestamp":1545102337000},"page":"16527-16561","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Lightweight, dynamic and efficient image encryption scheme"],"prefix":"10.1007","volume":"78","author":[{"given":"Hassan","family":"Noura","sequence":"first","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Mohamad","family":"Noura","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1490-9592","authenticated-orcid":false,"given":"Rapha\u00ebl","family":"Couturier","sequence":"additional","affiliation":[]},{"given":"Mohammad M.","family":"Mansour","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,18]]},"reference":[{"issue":"17","key":"7000_CR1","doi-asserted-by":"publisher","first-page":"3259","DOI":"10.1016\/j.optcom.2010.04.056","volume":"283","author":"A Akhshani","year":"2010","unstructured":"Akhshani A, Behnia S, Akhavan A, Abu Hassan H, Hassan Z (2010) A novel scheme for image encryption based on 2D piecewise chaotic maps. Opt Commun 283(17):3259\u20133266","journal-title":"Opt Commun"},{"key":"7000_CR2","unstructured":"Alajel KM, Xiang W, Leis J (2010) Error resilience performance evaluation of h. 264 i-frame and jpwl for wireless image transmission. In: 2010 4th international conference on signal processing and communication systems (ICSPCS). IEEE, pp 1\u20137"},{"issue":"11","key":"7000_CR3","doi-asserted-by":"publisher","first-page":"3743","DOI":"10.1016\/j.cnsns.2009.02.033","volume":"14","author":"G Alvarez","year":"2009","unstructured":"Alvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun Nonlinear Sci Numer Simul 14(11):3743\u20133749","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"5","key":"7000_CR4","doi-asserted-by":"publisher","first-page":"2613","DOI":"10.1016\/j.chaos.2008.09.051","volume":"41","author":"D Arroyo","year":"2009","unstructured":"Arroyo D, Li C, Li S, Alvarez G, Halang WA (2009) Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. Chaos Solitons Fractals 41(5):2613\u20132616","journal-title":"Chaos Solitons Fractals"},{"key":"7000_CR5","unstructured":"Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) Simon and speck: block ciphers for the internet of things. IACR Cryptology ePrint Archive 585"},{"key":"7000_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential cryptanalysis of the data encryption standard, vol 28","author":"E Biham","year":"1993","unstructured":"Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard, vol 28. Springer, New York"},{"key":"7000_CR7","doi-asserted-by":"crossref","unstructured":"Borghoff J, Canteaut A, G\u00fcneysu T, Kavun E B, Knezevic M, Knudsen LR, Leander G, Nikov V, Paar C, Rechberger C et al (2012) Prince\u2013a low-latency block cipher for pervasive computing applications. In: Advances in cryptology\u2013ASIACRYPT 2012. Springer, pp 208\u2013225","DOI":"10.1007\/978-3-642-34961-4_14"},{"issue":"8","key":"7000_CR8","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1016\/j.image.2014.04.001","volume":"29","author":"R Boriga","year":"2014","unstructured":"Boriga R, D\u0103sc\u0103lescu AC, Priescu I (2014) A new hyperchaotic map and its application in an image encryption scheme. Signal Process Image Commun 29 (8):887\u2013901","journal-title":"Signal Process Image Commun"},{"issue":"2","key":"7000_CR9","first-page":"525","volume":"52","author":"SE Borujeni","year":"2013","unstructured":"Borujeni SE, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst 52(2):525\u2013537","journal-title":"Telecommun Syst"},{"key":"7000_CR10","unstructured":"Chen J-X, Zhu Z-L, Chong F, Zhang L-B, Zhang Y (2015) An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn 81(3):1151\u20131166"},{"key":"7000_CR11","doi-asserted-by":"crossref","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media","DOI":"10.1007\/978-3-662-04722-4"},{"key":"7000_CR12","doi-asserted-by":"crossref","unstructured":"Dan T, Wang X (2008) Image encryption based on bivariate polynomials. In: 2008 international conference on computer science and software engineering, vol 6. IEEE, pp 193\u2013196","DOI":"10.1109\/CSSE.2008.220"},{"issue":"19","key":"7000_CR13","first-page":"335","volume":"106","author":"J-B du Prel","year":"2009","unstructured":"du Prel J-B, Hommel G, R\u00f6hrig B, Blettner M (2009) Confidence interval or p-value?: part 4 of a series on evaluation of scientific publications. Deutsches \u00c4rzteblatt Int 106(19):335\u2013339","journal-title":"Deutsches \u00c4rzteblatt Int"},{"key":"7000_CR14","first-page":"38G","volume":"800","author":"M Dworkin","year":"2016","unstructured":"Dworkin M (2016) Recommendation for block cipher modes of operation. NIST Spec Publ 800:38G","journal-title":"NIST Spec Publ"},{"key":"7000_CR15","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.image.2015.10.004","volume":"41","author":"S El Assad","year":"2016","unstructured":"El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144\u2013157","journal-title":"Signal Process Image Commun"},{"key":"7000_CR16","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.image.2016.01.009","volume":"42","author":"Z Fawaz","year":"2016","unstructured":"Fawaz Z, Noura H, Mostefaoui A (2016) An efficient and secure cipher scheme for images confidentiality preservation. Signal Process Image Commun 42:90\u2013108","journal-title":"Signal Process Image Commun"},{"key":"7000_CR17","doi-asserted-by":"crossref","unstructured":"Flayh NA, Parveen R, Ahson SI (2009) Wavelet based partial image encryption. In: International multimedia, signal processing and communication technologies, 2009. IMPACT\u201909. IEEE, pp 32\u201335","DOI":"10.1109\/MSPCT.2009.5164167"},{"issue":"5","key":"7000_CR18","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.image.2013.09.009","volume":"29","author":"M Ghebleh","year":"2014","unstructured":"Ghebleh M, Kanso A, Noura H (2014) An image encryption scheme based on irregularly decimated chaotic maps. Signal Process Image Commun 29(5):618\u2013627","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"7000_CR19","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","volume":"17","author":"J Granjal","year":"2015","unstructured":"Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294\u20131312","journal-title":"IEEE Commun Surv Tutorials"},{"key":"7000_CR20","doi-asserted-by":"crossref","unstructured":"Gueron S (2009) Intel\u2019s new aes instructions for enhanced performance and security. In: FSE, vol 5665. Springer, pp 51\u201366","DOI":"10.1007\/978-3-642-03317-9_4"},{"key":"7000_CR21","doi-asserted-by":"crossref","unstructured":"Guo J, Peyrin T, Poschmann A, Robshaw M (2011) The LED block cipher. In: Cryptographic hardware and embedded systems\u2013CHES 2011. Springer, pp 326\u2013341","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"7000_CR22","unstructured":"Gutub AA-A, Khan FA-A (2012) Hybrid crypto hardware utilizing symmetric-key and public-key cryptosystems. In: 2012 international conference on advanced computer science applications and technologies (ACSAT). IEEE, pp 116\u2013121"},{"key":"7000_CR23","unstructured":"Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. MTAP, pp 1\u201329, ISSN 1573-7721"},{"key":"7000_CR24","doi-asserted-by":"crossref","unstructured":"Hong D, Lee J-K, Kim D-C, Kwon D, Ryu KH, Lee D-G (2014) LEA: a 128-bit block cipher for fast encryption on common processors. In: Information security applications. Springer, pp 3\u201327","DOI":"10.1007\/978-3-319-05149-9_1"},{"issue":"1","key":"7000_CR25","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s11460-009-0016-z","volume":"4","author":"F Huang","year":"2009","unstructured":"Huang F, Feng Y (2009) Security analysis of image encryption based on twodimensional chaotic maps and improved algorithm. Front Electr Electron Eng Chin 4(1):5\u20139","journal-title":"Front Electr Electron Eng Chin"},{"issue":"2","key":"7000_CR26","first-page":"563","volume":"52","author":"CK Huang","year":"2013","unstructured":"Huang C K, Liao C-W, Hsu S L, Jeng Y C (2013) Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun Syst 52(2):563\u2013571","journal-title":"Telecommun Syst"},{"issue":"Supplement C","key":"7000_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.micpro.2017.10.013","volume":"56","author":"S Janakiraman","year":"2018","unstructured":"Janakiraman S, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Lightweight chaotic image encryption algorithm for real-time embedded system: implementation and analysis on 32-bit microcontroller. Microprocess Microsyst 56 (Supplement C):1\u201312","journal-title":"Microprocess Microsyst"},{"key":"7000_CR28","first-page":"51","volume-title":"On constructing of a 32 \u00d732 binary matrix as a diffusion layer for a 256-bit block cipher","author":"BW Koo","year":"2006","unstructured":"Koo BW, Jang HS, Song JH (2006) On constructing of a 32\u00d732 binary matrix as a diffusion layer for a 256-bit block cipher. Springer, Berlin, pp 51\u201364"},{"issue":"1","key":"7000_CR29","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.cnsns.2010.04.010","volume":"16","author":"A Kumar","year":"2011","unstructured":"Kumar A, Ghose M K (2011) Extended substitution-diffusion based image cipher using chaotic standard map. Commun Nonlinear Sci Numer Simul 16(1):372\u2013382","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"7000_CR30","unstructured":"Kumar M, Pal SK, Panigrahi A (2014) FeW: a lightweight block cipher. IACR Cryptology ePrint Archive 326"},{"key":"7000_CR31","unstructured":"Laiphrakpam DS, Khumanthem M S (2017) A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed Tools Appl 77(7):8629\u20138652"},{"key":"7000_CR32","unstructured":"Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. In: IEEE international symposium on circuits and systems, 2002. ISCAS 2002, vol 2. IEEE, pp II\u2013708"},{"issue":"7","key":"7000_CR33","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1142\/S0218127411029641","volume":"21","author":"C Li","year":"2011","unstructured":"Li C, Chen MZQ, Lo K-T (2011) Breaking an image encryption algorithm based on chaos. Int J Bifurcation Chaos 21(7):2067\u20132076","journal-title":"Int J Bifurcation Chaos"},{"key":"7000_CR34","first-page":"5","volume":"2008","author":"A Massoudi","year":"2008","unstructured":"Massoudi A, Lefebvre F, De Vleeschouwer C, Macq B, Quisquater J-J (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP J Inf Secur 2008:5","journal-title":"EURASIP J Inf Secur"},{"key":"7000_CR35","doi-asserted-by":"crossref","unstructured":"McKay K A, Bassham LE, Turan M S, Mouha NW (2017) Report on lightweight cryptography. NIST Interagency\/Internal Report (NISTIR)-8114","DOI":"10.6028\/NIST.IR.8114"},{"issue":"4","key":"7000_CR36","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1016\/j.jksuci.2016.02.003","volume":"29","author":"B Mondal","year":"2017","unstructured":"Mondal B, Mandal T (2017) A light weight secure image encryption scheme based on chaos & dna computing. J King Saud University - Comput Inf Sci 29(4):499\u2013504","journal-title":"J King Saud University - Comput Inf Sci"},{"key":"7000_CR37","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.comnet.2014.09.013","volume":"75","author":"H Noura","year":"2014","unstructured":"Noura H, Martin S, Al Agha K, Erss-rlnc KC (2014) Efficient and robust secure scheme for random linear network coding. Comput Netw 75:99\u2013112","journal-title":"Comput Netw"},{"key":"7000_CR38","doi-asserted-by":"crossref","unstructured":"Noura H, Sleem L, Noura M, Mansour MM, Chehab A, Couturier R (2017) A new efficient lightweight and secure image cipher scheme. Multimedia Tools and Applications","DOI":"10.1007\/s11042-017-5124-9"},{"issue":"11","key":"7000_CR39","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1109\/TVLSI.2009.2025171","volume":"18","author":"S O\u2019Melia","year":"2010","unstructured":"O\u2019Melia S, Elbirt AJ (2010) Enhancing the performance of symmetric-key cryptography via instruction set extensions. IEEE Trans Very Large Scale Integr VLSI Syst 18(11):1505\u20131518","journal-title":"IEEE Trans Very Large Scale Integr VLSI Syst"},{"key":"7000_CR40","doi-asserted-by":"crossref","unstructured":"Paar C, Pelzl J (2009) Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media","DOI":"10.1007\/978-3-642-04101-3"},{"key":"7000_CR41","unstructured":"Pradeep L N, Bhattacharjya A (2013) Random key and key dependent s-box generation for aes cipher to overcome known attacks. In: International symposium on security in computing and communication. Springer, pp 63\u201369"},{"issue":"7","key":"7000_CR42","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.1016\/j.cnsns.2009.07.007","volume":"15","author":"R Rhouma","year":"2010","unstructured":"Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution\u2013diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15 (7):1887\u20131892","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"7000_CR43","doi-asserted-by":"crossref","unstructured":"Rubio-Gonz\u00e1lez C, Gunawi HS, Liblit B, Arpaci-Dusseau RH, Arpaci-Dusseau AC (2009) Error propagation analysis for file systems. In: ACM sigplan notices, vol 44. ACM, pp 270\u2013280","DOI":"10.1145\/1543135.1542506"},{"key":"7000_CR44","doi-asserted-by":"crossref","unstructured":"Seyedzade SM, Mirzakuchaki S, Atani RE (2010) A novel image encryption algorithm based on hash function. In: 2010 6th Iranian machine vision and image processing (MVIP). IEEE, pp 1\u20136","DOI":"10.1109\/IranianMVIP.2010.5941167"},{"issue":"5","key":"7000_CR45","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"S Seyedzadeh","year":"2012","unstructured":"Seyedzadeh S , Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202\u20131215","journal-title":"Signal Process"},{"key":"7000_CR46","doi-asserted-by":"crossref","unstructured":"Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T (2011) Piccolo: an ultra-lightweight blockcipher. In: Cryptographic hardware and embedded systems\u2013CHES 2011. Springer, pp 342\u2013357","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"7000_CR47","unstructured":"Suzaki T, Minematsu K, Morioka S, Kobayashi E (2013) TWINE: a lightweight block cipher for multiple platforms. In: Knudsen LR, Wu H (eds) Selected areas in cryptography, volume 7707 of lecture notes in computer science. Springer, Berlin, pp 339\u2013354"},{"issue":"14","key":"7000_CR48","doi-asserted-by":"publisher","first-page":"2722","DOI":"10.1016\/j.optcom.2009.03.075","volume":"282","author":"X Tong","year":"2009","unstructured":"Tong X, Cui M, Wang Z (2009) A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator. Opt Commun 282(14):2722\u20132728","journal-title":"Opt Commun"},{"issue":"2","key":"7000_CR49","doi-asserted-by":"publisher","first-page":"43","DOI":"10.20982\/tqmp.03.2.p043","volume":"3","author":"CRW VanVoorhis","year":"2007","unstructured":"VanVoorhis CRW, Morgan BL (2007) Understanding power and rules of thumb for determining sample sizes. Tutor Quant Methods Psychol 3(2):43\u201350","journal-title":"Tutor Quant Methods Psychol"},{"issue":"2","key":"7000_CR50","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s11277-014-1888-7","volume":"79","author":"SM Wadi","year":"2014","unstructured":"Wadi S M, Zainal N (2014) High definition image encryption algorithm based on aes modification. Wirel Pers Commun 79(2):811\u2013829","journal-title":"Wirel Pers Commun"},{"key":"7000_CR51","doi-asserted-by":"crossref","unstructured":"Wu W, Zhang L (2011) LBlock: a lightweight block cipher. In: Applied cryptography and network security. Springer, pp 327\u2013344","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"7000_CR52","doi-asserted-by":"crossref","unstructured":"Xu S, Wang Y, Wang J, Tian M (2008) Cryptanalysis of two chaotic image encryption schemes based on permutation and xor operations. In: International conference on computational intelligence and security, 2008. CIS\u201908, vol 2. IEEE, pp 433\u2013437","DOI":"10.1109\/CIS.2008.146"},{"issue":"3","key":"7000_CR53","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/s11071-014-1331-3","volume":"77","author":"Y-Q Zhang","year":"2014","unstructured":"Zhang Y-Q, Wang X-Y (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77 (3):687\u2013698","journal-title":"Nonlinear Dyn"},{"issue":"6","key":"7000_CR54","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"Z-L Zhu","year":"2011","unstructured":"Zhu Z-L, Zhang W, Wong K-Wo, Hai Y (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171\u20131186","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7000-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-7000-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7000-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T15:38:49Z","timestamp":1775317129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-7000-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,18]]},"references-count":54,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["7000"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-7000-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,18]]},"assertion":[{"value":"26 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}