{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T03:59:34Z","timestamp":1773115174663,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T00:00:00Z","timestamp":1559606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T00:00:00Z","timestamp":1559606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11042-019-07766-z","type":"journal-article","created":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T09:05:46Z","timestamp":1559639146000},"page":"26073-26087","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["An image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7747-1738","authenticated-orcid":false,"given":"Haidar Raad","family":"Shakir","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,4]]},"reference":[{"key":"7766_CR1","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1080\/09720529.2016.1187958","volume":"20","author":"S Ahadpour","year":"2017","unstructured":"Ahadpour S, Sadra Y (2017) Chaotic trigonometric Haar wavelet with focus on image encryption. J Discret Math Sci Cryptogr 20:1217\u20131239. \n                    https:\/\/doi.org\/10.1080\/09720529.2016.1187958","journal-title":"J Discret Math Sci Cryptogr"},{"key":"7766_CR2","first-page":"943","volume":"3","author":"S Ajish","year":"2015","unstructured":"Ajish S (2015) Wavelet based advanced encryption standard algorithm for image encryption. Int J Eng Res Gen Sci 3:943\u2013950","journal-title":"Int J Eng Res Gen Sci"},{"key":"7766_CR3","doi-asserted-by":"crossref","unstructured":"Arrag S, Hamdoun A, Tragha A (2012) Design and implementation a different architectures of mixcolumn in FPGA. arXiv:12093061","DOI":"10.5121\/vlsic.2012.3402"},{"key":"7766_CR4","volume":"8755","author":"L Bao","year":"2013","unstructured":"Bao L, Zhou Y, Chen CLP (2013) Image encryption in the wavelet domain. In: Mobile multimedia\/image processing, security, and applications 2013. International Society for Optics and. Photonics 8755:875502","journal-title":"Photonics"},{"key":"7766_CR5","first-page":"71","volume":"6","author":"R Bhavik","year":"2016","unstructured":"Bhavik R, Sunil W (2016) A comparative study of hybrid cryptographic algorithms. Int J Mod Eng Res 6:71\u201375","journal-title":"Int J Mod Eng Res"},{"key":"7766_CR6","first-page":"437","volume":"40","author":"J de Dieu Nkapkop","year":"2016","unstructured":"de Dieu Nkapkop J (2016) A secure and fast chaotic encryption algorithm using the true accuracy of the computer. Informatica 40:437\u2013445","journal-title":"Informatica"},{"key":"7766_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i15\/71871","volume":"9","author":"K Gulshan","year":"2016","unstructured":"Gulshan K, Praveen P, Rahul S, Kumar RM (2016) Chaotic image encryption technique based on IDEA and discrete wavelet transformation. Indian J Sci Technol 9:1\u20136","journal-title":"Indian J Sci Technol"},{"key":"7766_CR8","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.sigpro.2016.09.011","volume":"131","author":"M Hamdi","year":"2017","unstructured":"Hamdi M, Rhouma R, Belghith S (2017) A selective compression-encryption of images based on SPIHT coding and Chirikov standard map. Signal Process 131:514\u2013526. \n                    https:\/\/doi.org\/10.1016\/j.sigpro.2016.09.011","journal-title":"Signal Process"},{"key":"7766_CR9","doi-asserted-by":"publisher","unstructured":"Juang Y-S, Ko L-T, Chen J-E et al (2012) Histogram modification and wavelet transform for high performance watermarking. Math Probl Eng doi. \n                    https:\/\/doi.org\/10.1155\/2012\/164869","DOI":"10.1155\/2012\/164869"},{"key":"7766_CR10","first-page":"235","volume":"45","author":"N Khalifa","year":"2016","unstructured":"Khalifa N, Filali RL, Benrejeb M (2016) A fast selective image encryption using discrete wavelet transform and chaotic systems synchronization. Inf Technol Control 45:235\u2013242","journal-title":"Inf Technol Control"},{"key":"7766_CR11","first-page":"93","volume":"5","author":"MM Khudhar","year":"2016","unstructured":"Khudhar MM (2016) An efficient system for encrypted image by using hybrid DWT-DCT compression algorithm. Int J Comput Sci Mob Comput 5:93\u2013102","journal-title":"Int J Comput Sci Mob Comput"},{"key":"7766_CR12","first-page":"777","volume":"8","author":"DC Mishra","year":"2013","unstructured":"Mishra DC, Sharma RK (2013) Grayscale-image encryption using Random Hill cipher over SL n (F) associated with discrete wavelet transformation. Appl Appl Math 8:777\u2013791","journal-title":"Appl Appl Math"},{"key":"7766_CR13","first-page":"6956","volume":"3","author":"NH Nazmudeen","year":"2014","unstructured":"Nazmudeen NH (2014) A combined approach of using DWT-DCT watermarking and AES encryption to improve the security of satellite images. Int J Eng Comput Sci 3:6956\u20136962","journal-title":"Int J Eng Comput Sci"},{"key":"7766_CR14","first-page":"232","volume":"1","author":"JDD Nkapkop","year":"2014","unstructured":"Nkapkop JDD, Effa JY, Fouda J et al (2014) A fast image encryption algorithm based on chaotic maps and the linear diophantine equation. Comput Sci Appl 1:232\u2013243","journal-title":"Comput Sci Appl"},{"key":"7766_CR15","first-page":"22","volume":"3","author":"A Ravindran","year":"2016","unstructured":"Ravindran A, Jayaram A, Ambily N, John BM (2016) Hiding information in medical X-ray images. Int J Adv Inf Eng Technol 3:22\u201324","journal-title":"Int J Adv Inf Eng Technol"},{"key":"7766_CR16","first-page":"36","volume":"3","author":"C Samson","year":"2012","unstructured":"Samson C, Sastry VUK (2012) An RGB image encryption supported by wavelet-based lossless compression. Int J Adv Comput Sci Appl 3:36\u201341","journal-title":"Int J Adv Comput Sci Appl"},{"key":"7766_CR17","doi-asserted-by":"crossref","unstructured":"Singh SK, Gopi VP, Palanisamy P (2014) Image security using DES and RNS with reversible watermarking. In: 2014 international conference on electronics and communication systems (ICECS). pp 1\u20135.","DOI":"10.1109\/ECS.2014.6892688"},{"key":"7766_CR18","unstructured":"Soni K, Manocha A (2016) Image encryption and decryption with wavelet compression approach. Int J Eng Sci:6320\u20136327"},{"key":"7766_CR19","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.ins.2014.02.004","volume":"269","author":"S Tedmori","year":"2014","unstructured":"Tedmori S, Al-Najdawi N (2014) Image cryptographic algorithm based on the Haar wavelet transform. Inf Sci 269:21\u201334. \n                    https:\/\/doi.org\/10.1016\/j.ins.2014.02.004","journal-title":"Inf Sci"},{"key":"7766_CR20","first-page":"1","volume":"2016","author":"W Wang","year":"2016","unstructured":"Wang W, Tan H, Pang Y et al (2016) A novel encryption algorithm based on DWT and multichaos mapping. J Sensors 2016:1\u20137","journal-title":"J Sensors"},{"key":"7766_CR21","doi-asserted-by":"crossref","unstructured":"Wu X, Wang Z (2015) A new DWT-based lossless chaotic encryption scheme for color images. In: 2015 International Conference on Computer and Computational Sciences (ICCCS) pp 211\u2013216","DOI":"10.1109\/ICCACS.2015.7361352"},{"key":"7766_CR22","first-page":"81","volume":"3","author":"S Yogeshwaran","year":"2015","unstructured":"Yogeshwaran S, Vignesvar K, Prabhu Soundharian EM, Hanis S (2015) A novel image encryption scheme using chaotic logistic mapping& hybrid cellular automata. Int J Electr Electron Data Commun 3:81\u201386","journal-title":"Int J Electr Electron Data Commun"},{"key":"7766_CR23","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TIFS.2013.2291625","volume":"9","author":"J Zhou","year":"2014","unstructured":"Zhou J, Liu X, Au OC, Tang YY (2014) Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Trans Inf Forensics Secur 9:39\u201350. \n                    https:\/\/doi.org\/10.1109\/TIFS.2013.2291625","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-07766-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-07766-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-07766-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T23:13:53Z","timestamp":1591139633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-07766-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,4]]},"references-count":23,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["7766"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-07766-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,4]]},"assertion":[{"value":"11 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}