{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:18:12Z","timestamp":1761581892581},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2019,11,16]],"date-time":"2019-11-16T00:00:00Z","timestamp":1573862400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,16]],"date-time":"2019-11-16T00:00:00Z","timestamp":1573862400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11042-019-08104-z","type":"journal-article","created":{"date-parts":[[2019,11,16]],"date-time":"2019-11-16T17:01:32Z","timestamp":1573923692000},"page":"2161-2183","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A multilevel distributed image based encryption for full integrity"],"prefix":"10.1007","volume":"79","author":[{"given":"R.","family":"Sumathi","sequence":"first","affiliation":[]},{"given":"N. R.","family":"Raajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,16]]},"reference":[{"key":"8104_CR1","doi-asserted-by":"publisher","unstructured":"Abuturab MR An Asymmetric Color Image Cryptosystem Based on Schur Decomposition in Gyrator Transform Domain. Opt Lasers Eng 582014:39\u201347. https:\/\/doi.org\/10.1016\/j.optlaseng.2014.01.025","DOI":"10.1016\/j.optlaseng.2014.01.025"},{"key":"8104_CR2","doi-asserted-by":"publisher","first-page":"2771","DOI":"10.1007\/s11277-014-1667-5","volume":"77","author":"F Ahmed","year":"2014","unstructured":"Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A Noisy Channel Tolerant Image Encryption Scheme. Wirel Pers Commun 77:2771\u20132791. https:\/\/doi.org\/10.1007\/s11277-014-1667-5","journal-title":"Wirel Pers Commun"},{"key":"8104_CR3","doi-asserted-by":"publisher","first-page":"24527","DOI":"10.1007\/s11042-016-4206-4","volume":"76","author":"M Alsaedi","year":"2017","unstructured":"Alsaedi M (2017) Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations. Multimed Tools Appl 76:24527\u201324547. https:\/\/doi.org\/10.1007\/s11042-016-4206-4","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"8104_CR4","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1504\/IJICS.2016.079183","volume":"8","author":"A Beloucif","year":"2016","unstructured":"Beloucif A, Noui O, Noui L (2016) Design of a Tweakable Image Encryption Algorithm Using Chaos-Based Schema. Int J Inf Comput Secur 8(3):205\u2013220. https:\/\/doi.org\/10.1504\/IJICS.2016.079183","journal-title":"Int J Inf Comput Secur"},{"key":"8104_CR5","volume-title":"A Hybrid Image Encryption Algorithm using Ahao and Conway's Game-of-Life Cellular Automata","author":"M Brindha","year":"2015","unstructured":"Brindha M, Ammasai Gounden NG, Sriram M (2015) A Hybrid Image Encryption Algorithm using Ahao and Conway's Game-of-Life Cellular Automata. Security and Communication Networks, Hoboken"},{"key":"8104_CR6","doi-asserted-by":"publisher","unstructured":"Chai X et al A Fast Chaos-Based Image Encryption Scheme with a Novel Plain Image-Related Swapping Block Permutation and Block Diffusion. Multimed Tools Appl 76(142017):15561\u201315585. https:\/\/doi.org\/10.1007\/s11042-016-3858-4","DOI":"10.1007\/s11042-016-3858-4"},{"key":"8104_CR7","unstructured":"Chen R-J, Chen Y-H, Chen C-S, Lai J-L Image encryption\/decryption system using 2-D cellular automata\u0130. IEEE 10th International Symposium on Consumer Electronics 2006:1\u20136"},{"key":"8104_CR8","first-page":"1690","volume":"2","author":"R-J Chen","year":"2005","unstructured":"Chen R-J, Wen-Kai L, Lai J-L (2005) Image encryption using progressive cellular Automata substitution and SCAN. IEEE International Symposium on Circuits and Systems 2:1690\u20131693","journal-title":"IEEE International Symposium on Circuits and Systems"},{"issue":"3","key":"8104_CR9","doi-asserted-by":"publisher","first-page":"2363","DOI":"10.1364\/OE.20.002363","volume":"20","author":"F Chong","year":"2012","unstructured":"Chong F, Chen J-J, Zou H, Meng W-H, Zhan Y-F, Ya-Wen Y (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363\u20132378. https:\/\/doi.org\/10.1364\/OE.20.002363","journal-title":"Opt Express"},{"issue":"12","key":"8104_CR10","doi-asserted-by":"publisher","first-page":"1836","DOI":"10.1016\/j.optlaseng.2012.06.002","volume":"50","author":"J Jin","year":"2012","unstructured":"Jin J (2012) An image encryption based on elementary cellular automata\u0130. Optics and Lasers in Engineering, Elsevier Publication 50(12):1836\u20131843","journal-title":"Optics and Lasers in Engineering, Elsevier Publication"},{"key":"8104_CR11","doi-asserted-by":"crossref","unstructured":"Kumar S et al. (2015) Comparative Analysis of Color Image Encryption Using 2D Chaotic Maps, pp. 379\u201387, 10.1007\/978-81-322-2247-7_39","DOI":"10.1007\/978-81-322-2247-7_39"},{"issue":"1","key":"8104_CR12","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s11042-015-3064-9","volume":"76","author":"M Mollaeefar","year":"2017","unstructured":"Mollaeefar M et al (2017) A Novel Encryption Scheme for Colored Image Based on High Level Chaotic Maps. Multimed Tools Appl 76(1):607\u2013629. https:\/\/doi.org\/10.1007\/s11042-015-3064-9","journal-title":"Multimed Tools Appl"},{"key":"8104_CR13","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A New Color Image Encryption Using Combination of the 1D Chaotic Map. Signal Process 138, Elsevier B.V.:129\u2013137. https:\/\/doi.org\/10.1016\/j.sigpro.2017.03.011","journal-title":"Signal Process"},{"key":"8104_CR14","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1186\/s13640-018-0386-3","volume":"2018","author":"H Pan","year":"2018","unstructured":"Pan H, Lei Y, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing 2018:142. https:\/\/doi.org\/10.1186\/s13640-018-0386-3","journal-title":"EURASIP Journal on Image and Video Processing"},{"issue":"9","key":"8104_CR15","first-page":"926","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V (2006) Image encryption using chaotic logistic map, image and vision computing. Elsevier Publication 24(9):926\u2013934","journal-title":"Elsevier Publication"},{"issue":"5","key":"8104_CR16","doi-asserted-by":"publisher","first-page":"404","DOI":"10.4103\/0256-4602.123123","volume":"30","author":"Z Qiang","year":"2013","unstructured":"Qiang Z, Wei X (2013) RGB Color Image Encryption Method Based on Lorenz Chaotic System and DNA Computation. IETE Tech Rev 30(5):404\u2013409. https:\/\/doi.org\/10.4103\/0256-4602.123123","journal-title":"IETE Tech Rev"},{"key":"8104_CR17","doi-asserted-by":"crossref","unstructured":"Sharma M (2016) Chaos Based Image Encryption Using Two Step Iterated Logistic Map. pp. 1\u20135","DOI":"10.1109\/ICRAIE.2016.7939535"},{"key":"8104_CR18","unstructured":"Sharma V, Agnihotri HC, Chetan HP An Image Encryption and Decryption Techniques Using Two Chaotic Schemes. International Journal of Research in Advent Technology 2(2) E-ISSN: 2321-9637"},{"issue":"3","key":"8104_CR19","first-page":"117","volume":"15","author":"M Swathi Suresh","year":"2015","unstructured":"Swathi Suresh M, Varghese DA (2015) An Efficient and optimized RC5 Image Encryption Algorithm for Secured Image Transmission. International Journal of Imaging and Robotics 15(3):117\u2013125","journal-title":"International Journal of Imaging and Robotics"},{"key":"8104_CR20","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.sigpro.2017.06.010","volume":"141","author":"S Toughi","year":"2017","unstructured":"Toughi S et al (2017) An Image Encryption Scheme Based on Elliptic Curve Pseudo Random and Advanced Encryption System. Signal Process 141, Elsevier B.V.:217\u2013227. https:\/\/doi.org\/10.1016\/j.sigpro.2017.06.010","journal-title":"Signal Process"},{"key":"8104_CR21","first-page":"499","volume":"1","author":"Z Xuelong","year":"2005","unstructured":"Xuelong Z, Li Q, Manwu X, Fengyu L (2005) A symmetric cryptography based on Extended cellular automata\u0130. IEEE International Conference on Systems Man and Cybernetics 1:499\u2013503","journal-title":"IEEE International Conference on Systems Man and Cybernetics"},{"key":"8104_CR22","doi-asserted-by":"publisher","first-page":"3477","DOI":"10.1007\/s11128-013-0612-y","volume":"12","author":"Y-G Yang","year":"2013","unstructured":"Yang Y-G, Xia J, Jia X, Zhang H (2013) Novel image encryption\/decryption based on quantum Fourier transform and double phase encoding. Quantum Inf Process 12:3477\u20133493. https:\/\/doi.org\/10.1007\/s11128-013-0612-y","journal-title":"Quantum Inf Process"},{"issue":"22","key":"8104_CR23","doi-asserted-by":"publisher","first-page":"5290","DOI":"10.1016\/j.optcom.2011.07.070","volume":"284","author":"R Ye","year":"2011","unstructured":"Ye R (2011) A Novel Chaos-Based Image Encryption Scheme with an Efficient Permutation-Diffusion Mechanism. Opt Commun 284(22, Elsevier B.V.):5290\u20135298. https:\/\/doi.org\/10.1016\/j.optcom.2011.07.070","journal-title":"Opt Commun"},{"key":"8104_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1458","volume-title":"A secure image encryption algorithm based on chaotic maps and SHA-3","author":"G Ye","year":"2016","unstructured":"Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Security and Communication Networks, Hoboken"},{"key":"8104_CR25","doi-asserted-by":"publisher","unstructured":"Ye G, Pan C, Huang X, Zhao Z, He J (2018) A Chaotic Image Encryption Algorithm Based on Information Entropy. International Journal of Bifurcation and Chaos 28(1). https:\/\/doi.org\/10.1142\/S0218127418500104","DOI":"10.1142\/S0218127418500104"},{"key":"8104_CR26","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1007\/s11071-015-2465-7","volume":"83","author":"G Ye","year":"2016","unstructured":"Ye G, Zhao H (2016) Huajin ChaiChaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83:2067\u20132077. https:\/\/doi.org\/10.1007\/s11071-015-2465-7","journal-title":"Nonlinear Dyn"},{"key":"8104_CR27","doi-asserted-by":"crossref","unstructured":"Yun-Peng Z, Wei L, Shui-Ping C, Zhengjun Z, Xuan N, Wei-Di D (2009) Digital image encryption algorithm based on chaos and improved DES. In: IEEE International Conference on Systems Man and Cybernetics, pp. 474\u2013479","DOI":"10.1109\/ICSMC.2009.5346839"},{"key":"8104_CR28","doi-asserted-by":"publisher","first-page":"6647","DOI":"10.1007\/s11042-017-4577-1","volume":"77","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77:6647\u20136669. https:\/\/doi.org\/10.1007\/s11042-017-4577-1","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"8104_CR29","first-page":"594","volume":"285","author":"Y Zhou","year":"2012","unstructured":"Zhou Y, Panetta K, Agaian S, Chen CLP (2012) Image encryption using P-Fibonacci transform and decomposition. Optics Communications, Elsevier Publication 285(5):594\u2013608","journal-title":"Optics Communications, Elsevier Publication"},{"key":"8104_CR30","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optcom.2012.07.052","volume":"286","author":"N Ziba Eslami","year":"2013","unstructured":"Ziba Eslami N, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:51\u201355","journal-title":"Opt Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08104-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08104-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08104-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,15]],"date-time":"2020-11-15T00:07:16Z","timestamp":1605398836000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08104-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,16]]},"references-count":30,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["8104"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08104-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,16]]},"assertion":[{"value":"31 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}