{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T04:48:22Z","timestamp":1775278102666,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"13-14","license":[{"start":{"date-parts":[[2019,1,11]],"date-time":"2019-01-11T00:00:00Z","timestamp":1547164800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11042-018-7144-5","type":"journal-article","created":{"date-parts":[[2019,1,11]],"date-time":"2019-01-11T22:56:44Z","timestamp":1547247404000},"page":"9163-9176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A Novel Image Encryption Algorithm Based on Hybrid Chaotic Mapping and Intelligent Learning in Financial Security System"],"prefix":"10.1007","volume":"79","author":[{"given":"Shuang","family":"Pan","sequence":"first","affiliation":[]},{"given":"Jianguo","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Shaobo","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,11]]},"reference":[{"key":"7144_CR1","unstructured":"Acharya RV (2018) System and method for electronic deposit of a financial instrument by banking customers from remote locations by use of a digital image: U.S. Patent 9,946,998[P]. 4\u201317"},{"key":"7144_CR2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"key":"7144_CR3","unstructured":"Dongare A S, Alvi A S, Tarbani N M (2017) An Efficient Technique for Image Encryption and Decryption for Secured Multimedia Application[J]"},{"issue":"1\u20133","key":"7144_CR4","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"ZH Guan","year":"2005","unstructured":"Guan ZH, Huang F, Guan W (2005) Chaos-based image encryption algorithm[J]. Phys Lett A 346(1\u20133):153\u2013157","journal-title":"Phys Lett A"},{"issue":"2","key":"7144_CR5","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1007\/s10773-014-2245-z","volume":"54","author":"T Hua","year":"2015","unstructured":"Hua T et al (2015) Quantum image encryption algorithm based on image correlation decomposition. Int J Theor Phys 54(2):526\u2013537","journal-title":"Int J Theor Phys"},{"issue":"10","key":"7144_CR6","doi-asserted-by":"publisher","first-page":"5455","DOI":"10.1007\/s11042-015-2515-7","volume":"75","author":"A Jain","year":"2016","unstructured":"Jain A, Rajpal N (2016) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed Tools Appl 75(10):5455\u20135472","journal-title":"Multimed Tools Appl"},{"key":"7144_CR7","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.sigpro.2015.07.008","volume":"118","author":"C Li","year":"2016","unstructured":"Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation[J]. Signal Process 118:203\u2013210","journal-title":"Signal Process"},{"key":"7144_CR8","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation[J]. Opt Lasers Eng 90:238\u2013246","journal-title":"Opt Lasers Eng"},{"key":"7144_CR9","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238\u2013246","journal-title":"Opt Lasers Eng"},{"key":"7144_CR10","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.sigpro.2014.10.033","volume":"109","author":"MA Murillo-Escobar","year":"2015","unstructured":"Murillo-Escobar MA, Cruz-Hern\u00e1ndez C, Abundiz-P\u00e9rez F et al (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos[J]. Signal Process 109:119\u2013131","journal-title":"Signal Process"},{"issue":"3","key":"7144_CR11","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1007\/s11042-012-1292-9","volume":"71","author":"B Norouzi","year":"2014","unstructured":"Norouzi B et al (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469\u20131497","journal-title":"Multimed Tools Appl"},{"key":"7144_CR12","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/j.future.2016.01.006","volume":"80","author":"M Qiu","year":"2018","unstructured":"Qiu M, Gai K, Thuraisingham B et al (2018) Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry[J]. Futur Gener Comput Syst 80:421\u2013429","journal-title":"Futur Gener Comput Syst"},{"issue":"1\u20132","key":"7144_CR13","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s11071-015-2008-2","volume":"81","author":"SM Seyedzadeh","year":"2015","unstructured":"Seyedzadeh SM, Norouzi B, Mosavi MR et al (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map[J]. Nonlinear Dyn 81(1\u20132):511\u2013529","journal-title":"Nonlinear Dyn"},{"issue":"20","key":"7144_CR14","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1016\/j.ijleo.2015.06.018","volume":"126","author":"XJ Tong","year":"2015","unstructured":"Tong XJ, Zhang M, Wang Z et al (2015) An image encryption scheme based on a new hyperchaotic finance system[J]. Opt-Int J Light Electron Opt 126(20):2445\u20132452","journal-title":"Opt-Int J Light Electron Opt"},{"key":"7144_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique[J]. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"key":"7144_CR16","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.optlaseng.2014.12.025","volume":"68","author":"XY Wang","year":"2015","unstructured":"Wang XY, Gu SX, Zhang YQ (2015) Novel image encryption algorithm based on cycle shift and chaotic system[J]. Opt Lasers Eng 68:126\u2013134","journal-title":"Opt Lasers Eng"},{"issue":"7","key":"7144_CR17","first-page":"502","volume":"38","author":"XJ Wu","year":"2016","unstructured":"Wu XJ, Wang DW, Kurths J (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyper-chaos [J]. Inf Sci 38(7):502\u2013512","journal-title":"Inf Sci"},{"key":"7144_CR18","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J et al (2016) A novel bit-level image encryption algorithm based on chaotic maps[J]. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"key":"7144_CR19","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice[J]. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"issue":"1\u20132","key":"7144_CR20","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s11071-013-1068-4","volume":"75","author":"XP Zhang","year":"2014","unstructured":"Zhang XP, Zhao ZM (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion[J ]. Nonlinear Dyn 75(1\u20132):319\u2013330","journal-title":"Nonlinear Dyn"},{"issue":"11","key":"7144_CR21","doi-asserted-by":"publisher","first-page":"4980","DOI":"10.1166\/jctn.2015.4467","volume":"12","author":"L Zhang","year":"2015","unstructured":"Zhang L et al (2015) Double image multi-encryption algorithm based on fractional chaotic time series. J Comput Theor Nanosci 12(11):4980\u20134986","journal-title":"J Comput Theor Nanosci"},{"key":"7144_CR22","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","volume":"62","author":"N Zhou","year":"2014","unstructured":"Zhou N, Zhang A, Zheng F et al (2014) Novel image compression\u2013encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing[J]. Opt Laser Technol 62:152\u2013160","journal-title":"Opt Laser Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7144-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-7144-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7144-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T09:25:00Z","timestamp":1586165100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-7144-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,11]]},"references-count":22,"journal-issue":{"issue":"13-14","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["7144"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-7144-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,11]]},"assertion":[{"value":"3 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}