{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T17:21:28Z","timestamp":1764350488695},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2019,8,24]],"date-time":"2019-08-24T00:00:00Z","timestamp":1566604800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,24]],"date-time":"2019-08-24T00:00:00Z","timestamp":1566604800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s11042-019-08086-y","type":"journal-article","created":{"date-parts":[[2019,8,24]],"date-time":"2019-08-24T11:02:48Z","timestamp":1566644568000},"page":"34901-34925","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field"],"prefix":"10.1007","volume":"78","author":[{"given":"Subhrajyoti","family":"Deb","sequence":"first","affiliation":[]},{"given":"Bhaskar","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Bubu","family":"Bhuyan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,24]]},"reference":[{"key":"8086_CR1","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.optlastec.2019.03.005","volume":"116","author":"AA Abd EL-Latif","year":"2019","unstructured":"Abd EL-Latif AA, Abd-El-Atty B, Venegas-Andraca SE (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92\u2013102","journal-title":"Opt Laser Technol"},{"issue":"2","key":"8086_CR2","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.aeue.2012.07.004","volume":"67","author":"AA Abd El-Latif","year":"2013","unstructured":"Abd El-Latif AA, Niu X (2013) A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU-Int J Electron C 67(2):136\u2013143","journal-title":"AEU-Int J Electron C"},{"issue":"3","key":"8086_CR3","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s11042-012-1173-2","volume":"70","author":"AA Abd El-Latif","year":"2014","unstructured":"Abd El-Latif AA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70(3):1559\u20131584","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"8086_CR4","first-page":"322","volume":"4","author":"AA Abd El-Latif","year":"2012","unstructured":"Abd El-Latif AA, Li L, Wang N, Peng J-L, Shi Z-F, Niu X (2012) A new image encryption scheme for secure digital images based on combination of polynomial chaotic maps Research Journal of Applied Sciences. Eng Technol 4(4):322\u2013328","journal-title":"Eng Technol"},{"issue":"11","key":"8086_CR5","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1016\/j.sigpro.2013.03.031","volume":"93","author":"AA Abd El-Latif","year":"2013","unstructured":"Abd El-Latif AA, Li L, Wang N, Qi H, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93(11):2986\u20133000","journal-title":"Signal Process"},{"issue":"1","key":"8086_CR6","first-page":"10","volume":"1","author":"B A\u00efssa","year":"2013","unstructured":"A\u00efssa B, Nadir D, Mohamed R (2013) Image encryption using stream cipher based on nonlinear combination generator with enhanced security. New Trends in Mathematical Sciences 1(1):10\u201319","journal-title":"New Trends in Mathematical Sciences"},{"key":"8086_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.optcom.2015.03.079","volume":"350","author":"A Akhavan","year":"2015","unstructured":"Akhavan A, Samsudin A, Akhshani A (2015) Cryptanalysis of \u201dan improvement over an image encryption method based on total shuffling\u201d. Opt Commun 350:77\u201382","journal-title":"Opt Commun"},{"key":"8086_CR8","doi-asserted-by":"crossref","unstructured":"Abd El-Latif AA, Wang N, Peng J-L, Li Q, Niu X (2013) A new encryption scheme for color images based on quantum chaotic system in transform domain. In: Fifth International Conference on Digital Image Processing (ICDIP 2013), vol 8878. International society for optics and photonics, pp 88781s","DOI":"10.1117\/12.2031074"},{"key":"8086_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.optlaseng.2016.07.010","volume":"88","author":"A Belazi","year":"2017","unstructured":"Belazi A, Abd El-Latif AA, Diaconu A-V, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37\u201350","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"8086_CR10","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s11071-016-3046-0","volume":"87","author":"A Belazi","year":"2017","unstructured":"Belazi A, Khan M, Abd El-Latif AA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation\u2013substitution-based encryption. Nonlinear Dyn 87 (1):337\u2013361","journal-title":"Nonlinear Dyn"},{"issue":"6","key":"8086_CR11","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1007\/s11760-013-0570-y","volume":"9","author":"O Benrhouma","year":"2015","unstructured":"Benrhouma O, Hermassi H, Abd El-Latif AA, Belghith S (2015) Cryptanalysis of a video encryption method based on mixing and permutation operations in the dct domains. SIViP 9(6):1281\u20131286","journal-title":"SIViP"},{"key":"8086_CR12","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.dam.2017.01.033","volume":"222","author":"SK Bishoi","year":"2017","unstructured":"Bishoi SK, Haran HK, Ul Hasan S (2017) A note on the multiple-recursive matrix method for generating pseudorandom vectors. Discret Appl Math 222:67\u201375","journal-title":"Discret Appl Math"},{"key":"8086_CR13","unstructured":"Bos JW, Alex Halderman J, Heninger N Jonathan Moore, Michael Naehrig, and Eric Wustrow. Elliptic curve cryptography in practice. Cryptology ePrint Archive, Report 2013\/734, 2013. Available: \nhttps:\/\/eprint.iacr.org\/2013\/734"},{"issue":"7","key":"8086_CR14","doi-asserted-by":"publisher","first-page":"9907","DOI":"10.1007\/s11042-016-3585-x","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X, Yang K, Gan Z (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76(7):9907\u20139927","journal-title":"Multimed Tools Appl"},{"key":"8086_CR15","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"J Chen","year":"2018","unstructured":"Chen J, Zhu Z-l, Zhang L-b, Zhang Y, Yang B-q (2018) Exploiting self-adaptive permutation\u2013diffusion and dna random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353","journal-title":"Signal Process"},{"key":"8086_CR16","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1016\/j.procs.2015.02.103","volume":"46","author":"P Das","year":"2015","unstructured":"Das P, Deb S, Kar N, Bhattacharya B (2015) An improved dna based dual cover steganography. Procedia Computer Science 46:604\u2013611","journal-title":"Procedia Computer Science"},{"key":"8086_CR17","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-981-10-6890-4_61","volume-title":"Proceedings of the International Conference on Computing and Communication Systems","author":"Subhrajyoti Deb","year":"2018","unstructured":"Deb S, Bhuyan B, Ch. Gupta N (2018) Design and analysis of lfsr-based stream cipher. In: Mandal JK, Saha G, Kandar D, Maji AK (eds) Proceedings of the International Conference on Computing and Communication Systems. Springer, Singapore, pp 631\u2013639"},{"issue":"11","key":"8086_CR18","doi-asserted-by":"publisher","first-page":"4614","DOI":"10.1109\/TIP.2015.2467317","volume":"24","author":"M Dzwonkowski","year":"2015","unstructured":"Dzwonkowski M, Papaj M, Rykaczewski R (2015) A new quaternion-based encryption method for dicom images. IEEE Trans Image Process 24(11):4614\u20134622","journal-title":"IEEE Trans Image Process"},{"issue":"06","key":"8086_CR19","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(06):1259\u20131284","journal-title":"Int J Bifurcation Chaos"},{"issue":"21","key":"8086_CR20","doi-asserted-by":"publisher","first-page":"27919","DOI":"10.1007\/s11042-018-5974-9","volume":"77","author":"Z Gan","year":"2018","unstructured":"Gan Z, Chai X, Zhang M, Yang L (2018) A double color image encryption scheme based on three-dimensional brownian motion. Multimed Tools Appl 77(21):27919\u201327953","journal-title":"Multimed Tools Appl"},{"key":"8086_CR21","first-page":"5","volume":"IX","author":"A Kerckhoffs","year":"1883","unstructured":"Kerckhoffs A (1883) La cryptographic militaire. Journal des Sciences Militaires IX:5\u201338","journal-title":"Journal des Sciences Militaires"},{"issue":"3","key":"8086_CR22","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6\u201321","journal-title":"IEEE Circuits Syst Mag"},{"issue":"4","key":"8086_CR23","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1016\/j.ijleo.2015.11.188","volume":"127","author":"P Kumar","year":"2016","unstructured":"Kumar P, Rana SB (2016) Development of modified aes algorithm for data security. Optik-International Journal for Light and Electron Optics 127(4):2341\u20132345","journal-title":"Optik-International Journal for Light and Electron Optics"},{"key":"8086_CR24","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.sigpro.2016.01.017","volume":"125","author":"M Kumar","year":"2016","unstructured":"Kumar M, Iqbal A, Kumar P (2016) A new rgb image encryption algorithm based on dna encoding and elliptic curve diffie\u2013hellman cryptography. Signal Process 125:187\u2013202","journal-title":"Signal Process"},{"issue":"7","key":"8086_CR25","doi-asserted-by":"publisher","first-page":"8629","DOI":"10.1007\/s11042-017-4755-1","volume":"77","author":"DS Laiphrakpam","year":"2018","unstructured":"Laiphrakpam DS, Khumanthem MS (2018) A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed Tools Appl 77 (7):8629\u20138652","journal-title":"Multimed Tools Appl"},{"key":"8086_CR26","unstructured":"Lauter KE, Stange KE The elliptic curve discrete logarithm problem and equivalent hard problems for elliptic divisibility sequences. Cryptology ePrint Archive, Report 2008\/099, 2008. Available: \nhttps:\/\/eprint.iacr.org\/2008\/099"},{"key":"8086_CR27","first-page":"223","volume":"4","author":"L Li","year":"2012","unstructured":"Li L, Abd ElLatif AA, Qi H, Niu X (2012) An improved additively homomorphic image encryption scheme based on elliptic curve elgamal. International Journal of Advancements in Computing Technology 4:223\u2013230","journal-title":"International Journal of Advancements in Computing Technology"},{"key":"8086_CR28","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"key":"8086_CR29","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.sigpro.2015.01.016","volume":"113","author":"H Liu","year":"2015","unstructured":"Liu H, Kadir A (2015) Asymmetric color image encryption scheme using 2d discrete-time map. Signal Process 113:104\u2013112","journal-title":"Signal Process"},{"issue":"2","key":"8086_CR30","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s11554-014-0409-y","volume":"13","author":"T Meenpal","year":"2017","unstructured":"Meenpal T, Banik S, Maitra S (2017) A scheme for conditional access-based systems using index locations of dct coefficients. J Real-Time Image Proc 13(2):363\u2013373","journal-title":"J Real-Time Image Proc"},{"key":"8086_CR31","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.compbiomed.2015.04.031","volume":"62","author":"P Praveenkumar","year":"2015","unstructured":"Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2015) Medical data sheet in safe havens\u2013a tri-layer cryptic solution. Comput Biol Med 62:264\u2013276","journal-title":"Comput Biol Med"},{"issue":"7","key":"8086_CR32","doi-asserted-by":"publisher","first-page":"8393","DOI":"10.1007\/s11042-017-4741-7","volume":"77","author":"P Praveenkumar","year":"2018","unstructured":"Praveenkumar P, Kerthana Devi N, Ravichandran D, Avila J, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Transreceiving of encrypted medical image\u2013a cognitive approach. Multimed Tools Appl 77(7):8393\u20138418","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"8086_CR33","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.1007\/s11277-017-4971-z","volume":"98","author":"S Roy","year":"2018","unstructured":"Roy S, Pal AK (2018) An svd based location specific robust color image watermarking scheme using rdwt and arnold scrambling. Wirel Pers Commun 98 (2):2223\u20132250","journal-title":"Wirel Pers Commun"},{"key":"8086_CR34","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, National Institute of Standards and Technology","DOI":"10.6028\/NIST.SP.800-22"},{"issue":"3","key":"8086_CR35","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423","journal-title":"Bell Syst Tech J"},{"issue":"20","key":"8086_CR36","doi-asserted-by":"publisher","first-page":"4048","DOI":"10.1016\/j.optcom.2012.06.004","volume":"285","author":"L Teng","year":"2012","unstructured":"Teng L, Wang X (2012) A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt Commun 285(20):4048\u20134054","journal-title":"Opt Commun"},{"issue":"6","key":"8086_CR37","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1007\/s12095-017-0265-2","volume":"10","author":"S Ul Hasan","year":"2018","unstructured":"Ul Hasan S, Panario D, Wang Q (2018) Nonlinear vectorial primitive recursive sequences. Cryptogr Commun 10(6):1075\u20131090","journal-title":"Cryptogr Commun"},{"key":"8086_CR38","first-page":"293","volume":"347","author":"L Wang","year":"2019","unstructured":"Wang L, Dong T, Ge M-F (2019) Finite-time synchronization of memristor chaotic systems and its application in image encryption. Appl Math Comput 347:293\u2013305","journal-title":"Appl Math Comput"},{"issue":"4","key":"8086_CR39","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101\u20131108","journal-title":"Signal Process"},{"issue":"4","key":"8086_CR40","doi-asserted-by":"publisher","first-page":"89","DOI":"10.14257\/ijsia.2014.8.4.09","volume":"8","author":"A Zaghloul","year":"2014","unstructured":"Zaghloul A, Zhang T, Hou H, Amin M, Abd El-Latif AA, Abd El-Wahab MS (2014) A block encryption scheme for secure still visual data based on one-way coupled map lattice. International Journal of Security and Its Applications 8 (4):89\u2013100","journal-title":"International Journal of Security and Its Applications"},{"key":"8086_CR41","unstructured":"Zaghloul A, Zhang T, Amin M, Abd El-Latif AA (2014) Color encryption scheme based on adapted quantum logistic map. In: Sixth International Conference on Digital Image Processing (ICDIP 2014), vol 9159. International Society for Optics and Photonics, pp 915922"},{"key":"8086_CR42","unstructured":"Zeng G, Han W, He K High efficiency feedback shift register: \u03c3 \u2212lfsr. Cryptology ePrint Archive, Report 2007\/114, 2007. Available: \nhttps:\/\/eprint.iacr.org\/2007\/114"},{"key":"8086_CR43","doi-asserted-by":"crossref","unstructured":"Zhang TJ, Abd El-Latif AA, Amin M, Zaghloul A (2014) Diffusion-substitution mechanism for color image encryption based on multiple chaotic systems. In: Electronic Engineering and Information Science, vol. 981 of Advanced Materials Research, pp 327\u2013330. Trans Tech Publications Ltd 8","DOI":"10.4028\/www.scientific.net\/AMR.981.327"},{"issue":"4","key":"8086_CR44","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.optlaseng.2012.11.001","volume":"51","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Di X (2013) Double optical image encryption using discrete chirikov standard map and chaos-based fractional random transform. Opt Lasers Eng 51 (4):472\u2013480","journal-title":"Opt Lasers Eng"},{"issue":"7","key":"8086_CR45","doi-asserted-by":"publisher","first-page":"217","DOI":"10.14257\/ijsia.2015.9.7.19","volume":"9","author":"T Zhang","year":"2015","unstructured":"Zhang T, El-Fatyany A, Li L, Amin M, Abd El-Latif AA (2015) Secret sharing-based chaotic image encryption. International Journal of Security and Its Applications 9(7):217\u2013224","journal-title":"International Journal of Security and Its Applications"},{"key":"8086_CR46","doi-asserted-by":"crossref","unstructured":"Zhang TJ, Manhrawy IM, Abdo AA, Abd El-Latif AA, Rhouma R (2014) Cryptanalysis of elementary cellular automata based image encryption. In: Electronic Engineering and Information Science, vol 981 of advanced materials research, pp 372\u2013375. Trans tech publications ltd, 8","DOI":"10.4028\/www.scientific.net\/AMR.981.372"},{"key":"8086_CR47","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.optcom.2014.09.083","volume":"338","author":"T Zhao","year":"2015","unstructured":"Zhao T, Ran Q, Chi Y (2015) Image encryption based on nonlinear encryption system and public-key cryptography. Opt Commun 338:64\u201372","journal-title":"Opt Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08086-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08086-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08086-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,22]],"date-time":"2020-08-22T23:18:08Z","timestamp":1598138288000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08086-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,24]]},"references-count":47,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["8086"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08086-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,24]]},"assertion":[{"value":"1 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}