{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T08:02:07Z","timestamp":1768464127618,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"23-24","license":[{"start":{"date-parts":[[2019,1,26]],"date-time":"2019-01-26T00:00:00Z","timestamp":1548460800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,26]],"date-time":"2019-01-26T00:00:00Z","timestamp":1548460800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11042-019-7235-y","type":"journal-article","created":{"date-parts":[[2019,1,26]],"date-time":"2019-01-26T22:02:10Z","timestamp":1548540130000},"page":"16797-16821","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A new efficient and configurable image encryption structure for secure transmission"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4707-0861","authenticated-orcid":false,"given":"Walid I.","family":"Khedr","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,26]]},"reference":[{"key":"7235_CR1","unstructured":"(2017) Security analysis of ChaCha20-Poly1305 AEAD. Technical Report. KDDI Research, Inc. \nhttp:\/\/www.cryptrec.go.jp\/estimation\/cryptrec-ex-2601-2016.pdf\n\n. Accessed 17 Nov 2018"},{"key":"7235_CR2","doi-asserted-by":"crossref","unstructured":"Aissa B, Nadir D, Ammar M (2014) An approach using stream cipher algorithm for image encryption and decryption. In: 2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), p 498\u2013503","DOI":"10.1109\/STA.2014.7086692"},{"key":"7235_CR3","doi-asserted-by":"crossref","unstructured":"Ashur T, Dunkelman O, Luykx A (2017) Boosting authenticated encryption robustness with minimal modifications. Springer International Publishing, Cham, p 3\u201333","DOI":"10.1007\/978-3-319-63697-9_1"},{"key":"7235_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44757-4","volume-title":"The hash function BLAKE","author":"J-P Aumasson","year":"2014","unstructured":"Aumasson J-P, Meier W, Phan RC-W, Henzen L (2014) The hash function BLAKE. Springer, Berlin"},{"key":"7235_CR5","doi-asserted-by":"publisher","unstructured":"Bahrami S, Naderi M (2012) Image encryption using a lightweight stream encryption algorithm. Advances in Multimedia 2012:8. \nhttps:\/\/doi.org\/10.1155\/2012\/767364","DOI":"10.1155\/2012\/767364"},{"key":"7235_CR6","volume-title":"Protocols for authentication and key establishment","author":"C Boyd","year":"2013","unstructured":"Boyd C, Mathuria A (2013) Protocols for authentication and key establishment. Springer Science & Business Media, Berlin"},{"key":"7235_CR7","doi-asserted-by":"publisher","unstructured":"Chen Z, Hu T (2014) Statistical test for bivariate uniformity. Advances in Statistics 2014:1\u20136. \nhttps:\/\/doi.org\/10.1155\/2014\/740831","DOI":"10.1155\/2014\/740831"},{"key":"7235_CR8","doi-asserted-by":"publisher","first-page":"2472","DOI":"10.1016\/j.ijleo.2013.12.001","volume":"125","author":"J-x Chen","year":"2014","unstructured":"Chen J-x, Zhu Z-l, Yu H (2014) A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme. Optik 125:2472\u20132478","journal-title":"Optik"},{"key":"7235_CR9","doi-asserted-by":"publisher","unstructured":"Chen J-x, Zhu Z-l, Fu C, Zhang L-b, Zhang Y (2015) An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dynamics 81(3):1151\u20131166. \nhttps:\/\/doi.org\/10.1007\/s11071-015-2057-6","DOI":"10.1007\/s11071-015-2057-6"},{"key":"7235_CR10","doi-asserted-by":"crossref","unstructured":"Cheng H, Huang C, Ding Q, Chu S-C (2014) An efficient image encryption scheme based on ZUC stream cipher and chaotic logistic map. In: J.-S. Pan, V. Snasel, E. S. Corchado, A. Abraham, & S.-L. Wang Intelligent Data analysis and its Applications, Volume II. Springer InternationalPublishing, Cham, p 301\u2013310","DOI":"10.1007\/978-3-319-07773-4_30"},{"key":"7235_CR11","doi-asserted-by":"crossref","unstructured":"Chunguang H, Hai C, Yu S, Qun D (2015) Permutation of image encryption system based on block cipher and stream cipher encryption algorithm. In: Third International Conference on Robot, Vision and Signal Processing (RVSP), p 163\u2013166","DOI":"10.1109\/RVSP.2015.46"},{"key":"7235_CR12","volume-title":"The design of Rijndael: AES-the advanced encryption standard","author":"J Daemen","year":"2013","unstructured":"Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, Berlin"},{"key":"7235_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14172-5","volume-title":"Guide to signals and patterns in image processing: foundations, methods and applications","author":"A Das","year":"2015","unstructured":"Das A (2015) Guide to signals and patterns in image processing: foundations, methods and applications. Springer, Berlin"},{"key":"7235_CR14","doi-asserted-by":"publisher","unstructured":"Diab H (2018) An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations. IEEE Access 6:42227\u201342244. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2018.2858839","DOI":"10.1109\/ACCESS.2018.2858839"},{"key":"7235_CR15","first-page":"525","volume":"52","author":"S Etemadi Borujeni","year":"2013","unstructured":"Etemadi Borujeni S, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst 52:525\u2013537","journal-title":"Telecommun Syst"},{"key":"7235_CR16","volume-title":"Image encryption: a communication perspective","author":"OS Faragallah","year":"2013","unstructured":"Faragallah OS, El-Samie FEA, Ahmed HEH, Elashry IF, Shahieen MH, El-Rabaie E-SM et al (2013) Image encryption: a communication perspective. CRC Press, Boca Raton"},{"key":"7235_CR17","doi-asserted-by":"publisher","first-page":"4617","DOI":"10.1007\/s11042-016-3723-5","volume":"76","author":"M Fei","year":"2017","unstructured":"Fei M, Ju Z, Zhen X, Li J (2017) Real-time visual tracking based on improved perceptual hashing. Multimed Tools Appl 76:4617\u20134634","journal-title":"Multimed Tools Appl"},{"key":"7235_CR18","doi-asserted-by":"publisher","unstructured":"Hadmi A, Puech W, Said BAE, Ouahman AA (2012) Perceptual image hashing. Watermarking, Mithun Das Gupta, IntechOpen. \nhttps:\/\/doi.org\/10.5772\/37435\n\n. Available from: \nhttps:\/\/www.intechopen.com\/books\/watermarking-volume-2\/perceptual-image-hashing\n\n. Accessed 17 Nov 2018","DOI":"10.5772\/37435"},{"key":"7235_CR19","unstructured":"ISO-16684-1 (2012) Graphic technology -- extensible metadata platform (XMP) specification -- Part 1: Data model, serialization and core properties"},{"key":"7235_CR20","doi-asserted-by":"publisher","first-page":"13391","DOI":"10.1007\/s11042-017-4953-x","volume":"77","author":"O Jallouli","year":"2018","unstructured":"Jallouli O, Assad SE, Chetto M, Lozi R (2018) Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques. Multimed Tools Appl 77:13391\u201313417","journal-title":"Multimed Tools Appl"},{"key":"7235_CR21","doi-asserted-by":"publisher","unstructured":"Kaur M, Kumar V (2018) Adaptive differential evolution-based Lorenz chaotic system for image encryption. Arab J Sci Eng 43(12):8127\u20138144. \nhttps:\/\/doi.org\/10.1007\/s13369-018-3355-3","DOI":"10.1007\/s13369-018-3355-3"},{"key":"7235_CR22","doi-asserted-by":"crossref","unstructured":"Kim H, Han J, Cho S (2007) An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices. Presented at the Proceedings of the 2007 ACM symposium on Applied computing, Seoul, Korea","DOI":"10.1145\/1244002.1244256"},{"key":"7235_CR23","unstructured":"Klinger E, Starkweather D (2018) pHash\u2013the open source perceptual hash library. Available: \nwww.phash.org"},{"key":"7235_CR24","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/s13319-018-0162-2","volume":"9","author":"M Kumari","year":"2018","unstructured":"Kumari M, Gupta S (2018) A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher. 3D Res 9:10","journal-title":"3D Res"},{"key":"7235_CR25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5013","volume-title":"The Dublin core metadata element set: RFC 5013","author":"J Kunze","year":"2007","unstructured":"Kunze J, Baker T (2007) The Dublin core metadata element set: RFC 5013. IETF, California"},{"key":"7235_CR26","doi-asserted-by":"publisher","first-page":"1518","DOI":"10.1016\/j.chaos.2005.11.090","volume":"32","author":"HS Kwok","year":"2007","unstructured":"Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32:1518\u20131529","journal-title":"Chaos, Solitons Fractals"},{"key":"7235_CR27","doi-asserted-by":"publisher","unstructured":"Liu H, Xiao D, Xiao Y, Zhang Y (2016) Robust image hashing with tampering recovery capability via low-rank and sparse representation. Multimed Tools Appl 75(13):7681\u20137696. \nhttps:\/\/doi.org\/10.1007\/s11042-015-2688-0","DOI":"10.1007\/s11042-015-2688-0"},{"key":"7235_CR28","doi-asserted-by":"crossref","unstructured":"Nir Y, Langley A (2015) RFC 7539: ChaCha20 and Poly1305 for IETF Protocols","DOI":"10.17487\/RFC7539"},{"key":"7235_CR29","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s00530-013-0314-4","volume":"20","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014) A novel image encryption based on hash function with only two-round diffusion proces. Multimedia Systems 20:45\u201364","journal-title":"Multimedia Systems"},{"key":"7235_CR30","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/s11042-013-1699-y","volume":"74","author":"B Norouzi","year":"2015","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74:781\u2013811","journal-title":"Multimed Tools Appl"},{"key":"7235_CR31","doi-asserted-by":"publisher","unstructured":"Saarinen M-J, Aumasson J-P (2015) The BLAKE2 cryptographic hash and message authentication code (MAC):IETF RFC 7693. Internet Engineering Task Force. \nhttps:\/\/doi.org\/10.17487\/RFC7693","DOI":"10.17487\/RFC7693"},{"key":"7235_CR32","unstructured":"Saraswathi PV, Venkatesulu M (2017) A novel stream cipher using pesudo random binary sequence generator for medical image encryption. In: 2017 International Conference on Trends in Electronics and Informatics (ICEI), p 425\u2013429"},{"key":"7235_CR33","doi-asserted-by":"publisher","first-page":"2879","DOI":"10.1016\/j.asoc.2012.04.002","volume":"12","author":"NK Sreelaja","year":"2012","unstructured":"Sreelaja NK, Vijayalakshmi Pai GA (2012) Stream cipher for binary image encryption using ant Colony optimization based key generation. Appl Soft Comput 12:2879\u20132895","journal-title":"Appl Soft Comput"},{"key":"7235_CR34","volume-title":"Cryptography and network security: principles and practice","author":"W Stallings","year":"2016","unstructured":"Stallings W (2016) Cryptography and network security: principles and practice. Pearson, London"},{"key":"7235_CR35","doi-asserted-by":"publisher","unstructured":"Wang X, Zhu X, Zhang Y (2018) An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6:23733\u201323746. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2018.2805847","DOI":"10.1109\/ACCESS.2018.2805847"},{"issue":"1","key":"7235_CR36","first-page":"81","volume":"4","author":"AB Watson","year":"1994","unstructured":"Watson AB (1994) Image compression using the discrete cosine transform. Mathematica Journal 4(1):81","journal-title":"Mathematica Journal"},{"key":"7235_CR37","unstructured":"Weber A The USC-SIPI image database volume 3: miscellaneous [Online]. Available: \nhttp:\/\/sipi.usc.edu\/database\/database.php?volume=misc"},{"key":"7235_CR38","doi-asserted-by":"publisher","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","volume":"372","author":"K-W Wong","year":"2008","unstructured":"Wong K-W, Kwok BS-H, Law W-S (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372:2645\u20132652","journal-title":"Phys Lett A"},{"key":"7235_CR39","doi-asserted-by":"publisher","first-page":"2652","DOI":"10.1016\/j.chaos.2008.09.047","volume":"41","author":"K-W Wong","year":"2009","unstructured":"Wong K-W, Kwok BS-H, Yuen C-H (2009) An efficient diffusion approach for chaos-based image encryption. Chaos, Solitons Fractals 41:2652\u20132663","journal-title":"Chaos, Solitons Fractals"},{"key":"7235_CR40","unstructured":"www.bouncycastle.org (2018) The Legion of the Bouncy Castle Java cryptography APIs"},{"key":"7235_CR41","doi-asserted-by":"publisher","first-page":"9265","DOI":"10.1007\/s11042-016-3532-x","volume":"76","author":"D Xiao","year":"2017","unstructured":"Xiao D, Chang Y, Xiang T, Bai S (2017) A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multimed Tools Appl 76:9265\u20139296","journal-title":"Multimed Tools Appl"},{"key":"7235_CR42","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1016\/j.ijleo.2018.06.112","volume":"171","author":"M Xu","year":"2018","unstructured":"Xu M, Tian Z (2018) A novel image encryption algorithm based on self-orthogonal Latin squares. Optik 171:891\u2013903","journal-title":"Optik"},{"key":"7235_CR43","doi-asserted-by":"publisher","first-page":"6647","DOI":"10.1007\/s11042-017-4577-1","volume":"77","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77:6647\u20136669","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7235-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7235-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7235-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T17:03:14Z","timestamp":1593622994000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7235-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,26]]},"references-count":43,"journal-issue":{"issue":"23-24","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["7235"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7235-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,26]]},"assertion":[{"value":"17 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}