{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T20:46:33Z","timestamp":1778618793118,"version":"3.51.4"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"29-30","license":[{"start":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T00:00:00Z","timestamp":1587513600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T00:00:00Z","timestamp":1587513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11042-019-08322-5","type":"journal-article","created":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T15:04:07Z","timestamp":1587567847000},"page":"20665-20687","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":57,"title":["Efficient chaotic-based image cryptosystem with different modes of operation"],"prefix":"10.1007","volume":"79","author":[{"given":"Ibrahim F.","family":"Elashry","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-2120","authenticated-orcid":false,"given":"Walid","family":"El-Shafai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Emad S.","family":"Hasan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"El-Rabaie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alaa M.","family":"Abbas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hala S.","family":"El-sayed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Osama S.","family":"Faragallah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,4,22]]},"reference":[{"issue":"7","key":"8322_CR1","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1016\/j.cnsns.2008.11.005","volume":"14","author":"V Patidar","year":"2009","unstructured":"Patidar V, Pareek NK, Sud KK (2009) A new substitution\u2013diffusion-based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14(7):3056\u20133075","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"11","key":"8322_CR2","doi-asserted-by":"publisher","first-page":"3484","DOI":"10.1016\/j.cnsns.2009.12.025","volume":"15","author":"M Amin","year":"2010","unstructured":"Amin M, Faragallah OS, El-Latif AAA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Numer Simul 15(11):3484\u20133497","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"3","key":"8322_CR3","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"XY Wang","year":"2010","unstructured":"Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynam 62(3):615\u2013621","journal-title":"Nonlinear Dynam"},{"issue":"6","key":"8322_CR4","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171\u20131186","journal-title":"Inf Sci"},{"key":"8322_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"8322_CR6","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202\u20131215","journal-title":"Signal Process"},{"key":"8322_CR7","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","volume":"132","author":"EY Xie","year":"2017","unstructured":"Xie EY, Li C, Yu S, L\u00fc J (2017) On the cryptanalysis of Fridrich's chaotic image encryption scheme. Signal Process 132:150\u2013154","journal-title":"Signal Process"},{"key":"8322_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index-based diffusion. Opt Lasers Eng 91:41\u201352","journal-title":"Opt Lasers Eng"},{"key":"8322_CR9","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"key":"8322_CR10","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238\u2013246","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"8322_CR11","doi-asserted-by":"publisher","first-page":"1518","DOI":"10.1016\/j.chaos.2005.11.090","volume":"32","author":"HS Kwok","year":"2007","unstructured":"Kwok HS, Tang WK (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32(4):1518\u20131529","journal-title":"Chaos, Solitons Fractals"},{"key":"8322_CR12","doi-asserted-by":"crossref","unstructured":"Kadir R, Shahril R, Maarof MA (2010) A modified image encryption scheme based on 2D chaotic map. In: Computer and communication engineering (ICCCE), 2010 international conference on IEEE, May, pp 1\u20135","DOI":"10.1109\/ICCCE.2010.5556842"},{"issue":"7","key":"8322_CR13","doi-asserted-by":"publisher","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943\u20132959","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"3","key":"8322_CR14","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.image.2012.12.009","volume":"28","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Xiao D, Shu Y, Li J (2013) A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process Image Commun 28(3):292\u2013300","journal-title":"Signal Process Image Commun"},{"key":"8322_CR15","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11227-016-1849-x","volume":"73","author":"A Tewari","year":"2017","unstructured":"Tewari A, Gupta BB (2017) J cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. Supercomput 73:1085. https:\/\/doi.org\/10.1007\/s11227-016-1849-x","journal-title":"Supercomput"},{"key":"8322_CR16","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"B Gupta","year":"2016","unstructured":"Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security, 1st edn. IGI Global, Hershey","edition":"1"},{"issue":"Part 3","key":"8322_CR17","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou C, Psannis KE, Kim B-G, Gupta B (2018) Secure integration of IoT and cloud computing. Futur Gener Comput Syst 78(Part 3):964\u2013975","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"8322_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13319-019-0216-0","volume":"10","author":"A Gutub","year":"2019","unstructured":"Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Res 10(1, 36 pages):1\u201336. https:\/\/doi.org\/10.1007\/s13319-019-0216-0","journal-title":"3D Res"},{"key":"8322_CR19","first-page":"127","volume":"38","author":"M Parvez","year":"2011","unstructured":"Parvez M, Gutub A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38:127\u2013142","journal-title":"Kuwait J Sci Eng"},{"key":"8322_CR20","first-page":"50","volume":"2","author":"N Alassaf","year":"2017","unstructured":"Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IoT systems. J Res Eng Appl Sci 2:50\u201358","journal-title":"J Res Eng Appl Sci"},{"key":"8322_CR21","unstructured":"Almazrooie M, Samsudin A, Gutub AA-A, Salleh MS, Omar MA, Hassan SA (2018) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J King Saud Uni Comput Inf Sci"},{"key":"8322_CR22","doi-asserted-by":"publisher","unstructured":"Alanazi N, Alanizy A, Baghoza N, Al Ghamdi M, Gutub A (2018) 3-layer PC text security via combining compression, AES cryptography 2LSB image steganography. J Res Eng Appl Sci 3(4). https:\/\/doi.org\/10.1016\/j.jksuci.2018.02.006","DOI":"10.1016\/j.jksuci.2018.02.006"},{"key":"8322_CR23","doi-asserted-by":"publisher","unstructured":"Gutub A, Aljuaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. J Comput Hardw Eng 1(2):118\u2013124. https:\/\/doi.org\/10.63019\/jche.v1i2.513","DOI":"10.63019\/jche.v1i2.513"},{"key":"8322_CR24","doi-asserted-by":"publisher","unstructured":"Alassaf N, Gutub A, Parah S, Al Ghamdi M (2018) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-018-6801-z","DOI":"10.1007\/s11042-018-6801-z"},{"key":"8322_CR25","doi-asserted-by":"publisher","unstructured":"Aljuaid N, Gutub A, Khan E (2018) Enhancing PC data security via combining RSA cryptography and video based steganography. J Inf Secur Cybercrimes Res 1. https:\/\/doi.org\/10.26735\/16587790.2018.006","DOI":"10.26735\/16587790.2018.006"},{"issue":"5","key":"8322_CR26","doi-asserted-by":"publisher","first-page":"5591","DOI":"10.1007\/s11042-017-5293-6","volume":"78","author":"A Gutub","year":"2019","unstructured":"Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591\u20135619","journal-title":"Multimed Tools Appl"},{"key":"8322_CR27","first-page":"1","volume":"78","author":"M Al-Ghamdi","year":"2018","unstructured":"Al-Ghamdi M, Al-Ghamdi M, Gutub A (2018) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl 78:1\u201328","journal-title":"Multimed Tools Appl"},{"key":"8322_CR28","unstructured":"Elhosany HM, Hossin HE, Kazemian HB, Faragallah OS (2012) C9. Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation. In: Radio science conference (NRSC), 2012 29th national, IEEE, April, pp 223\u2013235"},{"key":"8322_CR29","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X et al (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585. https:\/\/doi.org\/10.1007\/s11042-017-4637-6","journal-title":"Multimed Tools Appl"},{"issue":"08","key":"8322_CR30","doi-asserted-by":"publisher","first-page":"1722","DOI":"10.4236\/cs.2016.78149","volume":"7","author":"SJ Mary","year":"2016","unstructured":"Mary SJ, Christopher CS, Joe SSA (2016) Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits Syst 7(08):1722","journal-title":"Circuits Syst"},{"key":"8322_CR31","doi-asserted-by":"publisher","first-page":"3649","DOI":"10.1007\/s11042-017-5537-5","volume":"78","author":"MA Alsmirat","year":"2019","unstructured":"Alsmirat MA, Al-Alem F, Al-Ayyoub M et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78:3649. https:\/\/doi.org\/10.1007\/s11042-017-5537-5","journal-title":"Multimed Tools Appl"},{"issue":"13","key":"8322_CR32","doi-asserted-by":"publisher","first-page":"5190","DOI":"10.1016\/j.ijleo.2016.03.018","volume":"127","author":"F \u00d6zkaynak","year":"2016","unstructured":"\u00d6zkaynak F, \u00d6zer AB (2016) Cryptanalysis of a new image encryption algorithm based on chaos. Optik Int J Light Electron Optics 127(13):5190\u20135192","journal-title":"Optik Int J Light Electron Optics"},{"key":"8322_CR33","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.compeleceng.2015.11.008","volume":"54","author":"E Yavuz","year":"2016","unstructured":"Yavuz E, Yaz\u0131c\u0131 R, Kasapba\u015f\u0131 MC, Yama\u00e7 E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471\u2013483","journal-title":"Comput Electr Eng"},{"issue":"13","key":"8322_CR34","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1002\/sec.1458","volume":"9","author":"G Ye","year":"2016","unstructured":"Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw 9(13):2015\u20132023","journal-title":"Secur Commun Netw"},{"key":"8322_CR35","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.optcom.2014.12.045","volume":"341","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Yu H (2015) Optical image encryption scheme using 3-D chaotic map based joint image scrambling and random encoding in gyrator domains. Optics Commun 341:263\u2013270","journal-title":"Optics Commun"},{"key":"8322_CR36","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"J Chen","year":"2018","unstructured":"Chen J, Zhu ZL, Zhang LB, Zhang Y, Yang BQ (2018) Exploiting self-adaptive permutation\u2013diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353","journal-title":"Signal Process"},{"issue":"8","key":"8322_CR37","doi-asserted-by":"publisher","first-page":"4753","DOI":"10.1007\/s11042-015-2501-0","volume":"75","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl 75(8):4753\u20134769","journal-title":"Multimed Tools Appl"},{"key":"8322_CR38","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-319-29360-8_4","volume-title":"International workshop on post-quantum cryptography","author":"MV Anand","year":"2016","unstructured":"Anand MV, Targhi EE, Tabia GN, Unruh D (2016) Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation. In: International workshop on post-quantum cryptography. Springer, Cham, pp 44\u201363"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08322-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-019-08322-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08322-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T06:46:18Z","timestamp":1696056378000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-019-08322-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,22]]},"references-count":38,"journal-issue":{"issue":"29-30","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["8322"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08322-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,22]]},"assertion":[{"value":"7 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}