{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:40Z","timestamp":1771700200809,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T00:00:00Z","timestamp":1557964800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T00:00:00Z","timestamp":1557964800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61370073"],"award-info":[{"award-number":["61370073"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National High Technology Research and Development Program of China","award":["2007AA01Z423"],"award-info":[{"award-number":["2007AA01Z423"]}]},{"name":"project of Science and Technology Department of Sichuan Province"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11042-019-7693-2","type":"journal-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T18:50:58Z","timestamp":1558032658000},"page":"24979-25000","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["An image cryptosystem based on pseudorandomly enhanced chaotic DNA and random permutation"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0785-9996","authenticated-orcid":false,"given":"Joshua C.","family":"Dagadu","sequence":"first","affiliation":[]},{"given":"Jian-Ping","family":"Li","sequence":"additional","affiliation":[]},{"given":"Prince C.","family":"Addo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,16]]},"reference":[{"key":"7693_CR1","unstructured":"Al-Husainy MAF (2012) A novel encryption method for image security. Int J Secur Appl, 6(1)"},{"issue":"08","key":"7693_CR2","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifur Chaos 16(08):2129\u20132151","journal-title":"Int J Bifur Chaos"},{"issue":"09","key":"7693_CR3","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1142\/S021797929800051X","volume":"12","author":"M Andrecut","year":"1998","unstructured":"Andrecut M (1998) Logistic map as a random number generator. Int J Modern Phys B 12(09):921\u2013930","journal-title":"Int J Modern Phys B"},{"key":"7693_CR4","doi-asserted-by":"crossref","unstructured":"Askar S, Karawia A, Alshamrani A (2015) Image encryption algorithm based on chaotic economic model. Math Probl Eng, 2015","DOI":"10.1155\/2015\/341729"},{"issue":"1","key":"7693_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11047-012-9334-9","volume":"12","author":"M Babaei","year":"2013","unstructured":"Babaei M (2013) A novel text and image encryption method based on chaos theory and dna computing. Nat Comput 12(1):101\u2013107","journal-title":"Nat Comput"},{"key":"7693_CR6","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"key":"7693_CR7","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using dna sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"key":"7693_CR8","doi-asserted-by":"crossref","unstructured":"Chakraborty S, Seal A, Roy M, Mali K (2016) A novel lossless image encryption method using dna substitution and chaotic logistic map. Int J Secur Appl, 10(2)","DOI":"10.14257\/ijsia.2016.10.2.19"},{"issue":"3","key":"7693_CR9","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals 21(3):749\u2013761","journal-title":"Chaos, Solitons & Fractals"},{"issue":"12","key":"7693_CR10","first-page":"996","volume":"57","author":"SL Chen","year":"2010","unstructured":"Chen SL, Hwang T, Lin WW (2010) Randomness enhancement using digitalized modified logistic map. IEEE Trans Circ Syst II: Express Briefs 57(12):996\u20131000","journal-title":"IEEE Trans Circ Syst II: Express Briefs"},{"key":"7693_CR11","doi-asserted-by":"crossref","unstructured":"El-Alfy ESM, Thampi SM, Takagi H, Piramuthu S, Hanne T (2015) Advances in intelligent informatics. Springer","DOI":"10.1007\/978-3-319-11218-3"},{"issue":"9","key":"7693_CR12","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1016\/j.optlaseng.2013.03.010","volume":"51","author":"R Enayatifar","year":"2013","unstructured":"Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (wdica) combined with chaotic map for image encryption. Opt Lasers Eng 51(9):1066\u20131077","journal-title":"Opt Lasers Eng"},{"key":"7693_CR13","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a dna sequence. Opt Lasers Eng 56:83\u201393","journal-title":"Opt Lasers Eng"},{"key":"7693_CR14","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.optlaseng.2015.03.007","volume":"71","author":"R Enayatifar","year":"2015","unstructured":"Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng 71:33\u201341","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"7693_CR15","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","volume":"29","author":"H Gao","year":"2006","unstructured":"Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals 29(2):393\u2013399","journal-title":"Chaos, Solitons & Fractals"},{"issue":"3","key":"7693_CR16","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah M, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlin Dyn 83(3):1123\u20131136","journal-title":"Nonlin Dyn"},{"issue":"3","key":"7693_CR17","doi-asserted-by":"publisher","first-page":"2211","DOI":"10.1007\/s11042-013-1533-6","volume":"72","author":"H Hermassi","year":"2014","unstructured":"Hermassi H, Belazi A, Rhouma R, Belghith SM (2014) Security analysis of an image encryption algorithm based on a dna addition combining with chaotic maps. Multimed Tools Appl 72(3):2211\u20132224","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"7693_CR18","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"X Huang","year":"2014","unstructured":"Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and dna sequence. Multimed Tools Appl 72(1):57\u201370","journal-title":"Multimed Tools Appl"},{"key":"7693_CR19","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.optlastec.2014.01.015","volume":"60","author":"Y Liu","year":"2014","unstructured":"Liu Y, Tang J, Xie T (2014) Cryptanalyzing a rgb image encryption algorithm based on dna encoding and chaos map. Optics Laser Technol 60:111\u2013115","journal-title":"Optics Laser Technol"},{"key":"7693_CR20","unstructured":"Mao Y, Chen G (2005) Chaos-based image encryption. In: Handbook of geometric computing. Springer, Berlin"},{"issue":"2","key":"7693_CR21","first-page":"127","volume":"1","author":"A Mitra","year":"2006","unstructured":"Mitra A, Rao YS, Prasanna S, et al (2006) A new image encryption approach using combinational permutation techniques. Int J Comput Sci 1(2):127\u2013131","journal-title":"Int J Comput Sci"},{"issue":"1","key":"7693_CR22","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11071-016-3051-3","volume":"87","author":"M Murillo-Escobar","year":"2017","unstructured":"Murillo-Escobar M, Cruz-Hern\u00e1ndez C., Cardoza-Avenda\u00f1o L., M\u00e9ndez-Ram\u00edrez R. (2017) A novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlin Dyn 87(1):407\u2013425","journal-title":"Nonlin Dyn"},{"key":"7693_CR23","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1016\/j.ijleo.2017.04.103","volume":"140","author":"B Norouzi","year":"2017","unstructured":"Norouzi B, Mirzakuchaki S, Norouzi P (2017) Breaking an image encryption technique based on neural chaotic generator. Optik-Int J Light Electron Opt 140:946\u2013952","journal-title":"Optik-Int J Light Electron Opt"},{"issue":"11","key":"7693_CR24","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/s10916-016-0611-5","volume":"40","author":"MM Parvees","year":"2016","unstructured":"Parvees MM, Samath JA, Bose BP (2016) Secured medical images-a chaotic pixel scrambling approach. J Med Syst 40(11):232","journal-title":"J Med Syst"},{"issue":"17","key":"7693_CR25","doi-asserted-by":"publisher","first-page":"10,631","DOI":"10.1007\/s11042-014-2115-y","volume":"75","author":"Z Parvin","year":"2016","unstructured":"Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75(17):10,631\u201310,648","journal-title":"Multimed Tools Appl"},{"key":"7693_CR26","unstructured":"Penard W, van Werkhoven T (2008) On the secure hash algorithm family. National Security Agency, Tech. Rep"},{"issue":"4","key":"7693_CR27","doi-asserted-by":"publisher","first-page":"3670","DOI":"10.1103\/PhysRevE.51.3670","volume":"51","author":"S Phatak","year":"1995","unstructured":"Phatak S, Rao SS (1995) Logistic map: a possible random-number generator. Phys Rev E 51(4):3670","journal-title":"Phys Rev E"},{"key":"7693_CR28","unstructured":"Prasanna S, Ashalatha M, Nirmala S, Haribhat K (2000) Study of permutations in the context of speech privacy. Proc of ECCAP, 99\u2013106"},{"key":"7693_CR29","unstructured":"Praveenkumar P, Devi NK, Ravichandran D, Avila J, Thenmozhi K, Rayappan JBB, Amirtharajan R (2017) Transreceiving of encrypted medical image\u2013a cognitive approach. Multimed Tools Appl, 1\u201326"},{"key":"7693_CR30","unstructured":"American National Standards Institute\/Institute of Electrical and Electronics Engineers (1985) IEEE standard for binary floating-point arithmetic. In: ANSI\/IEEE Std 754\u20131985 (pp 754\u20131985). New York"},{"key":"7693_CR31","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.compbiomed.2016.03.020","volume":"72","author":"D Ravichandran","year":"2016","unstructured":"Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2016) Chaos based crossover and mutation for securing dicom image. Comput Biol Med 72:170\u2013184","journal-title":"Comput Biol Med"},{"key":"7693_CR32","unstructured":"Sankpal PR, Vijaya P (2014) Image encryption using chaotic maps: a survey. In: 2014 Fifth International conference on signal and image processing (ICSIP). IEEE, pp 102\u2013107"},{"issue":"4","key":"7693_CR33","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Labs Techn J 28(4):656\u2013715","journal-title":"Bell Labs Techn J"},{"issue":"13","key":"7693_CR34","doi-asserted-by":"publisher","first-page":"4655","DOI":"10.1007\/s11042-013-1828-7","volume":"74","author":"A ur Rehman","year":"2015","unstructured":"ur Rehman A, Liao X, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and dna complementary rules. Multimed Tools Appl 74(13):4655\u20134677","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"7693_CR35","doi-asserted-by":"publisher","first-page":"6229","DOI":"10.1007\/s11042-016-3311-8","volume":"76","author":"X Wang","year":"2017","unstructured":"Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and dna encoding. Multimed Tools Appl 76(5):6229\u20136245","journal-title":"Multimed Tools Appl"},{"issue":"5451","key":"7693_CR36","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1038\/248765a0","volume":"248","author":"JD Watson","year":"1974","unstructured":"Watson JD, Crick F (1974) Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid jd watson and fhc crick published in nature, number 4356 april 25, 1953. Nature 248(5451):765","journal-title":"Nature"},{"key":"7693_CR37","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"7693_CR38","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s11071-013-1074-6","volume":"75","author":"G Ye","year":"2014","unstructured":"Ye G (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlin Dyn 75(3):417\u2013427","journal-title":"Nonlin Dyn"},{"issue":"11","key":"7693_CR39","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X (2010) Image encryption using dna addition combining with chaotic maps. Math Comput Model 52(11):2028\u20132035","journal-title":"Math Comput Model"},{"issue":"18","key":"7693_CR40","doi-asserted-by":"publisher","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on dna sequence operation and hyper-chaotic system. Optik-Int J Light Electron Opt 124(18):3596\u20133600","journal-title":"Optik-Int J Light Electron Opt"},{"issue":"1","key":"7693_CR41","doi-asserted-by":"publisher","first-page":"013,021","DOI":"10.1117\/1.JEI.26.1.013021","volume":"26","author":"K Zhan","year":"2017","unstructured":"Zhan K, Wei D, Shi J, Yu J (2017) Cross-utilizing hyperchaotic and dna sequences for image encryption. J Electron Imag 26(1):013,021\u2013013,021","journal-title":"J Electron Imag"},{"key":"7693_CR42","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","volume":"100","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Cao W, Chen CP (2014) Image encryption using binary bitplane. Signal Process 100:197\u2013207","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7693-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7693-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7693-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T23:25:35Z","timestamp":1589498735000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7693-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,16]]},"references-count":42,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["7693"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7693-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,16]]},"assertion":[{"value":"26 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"There are no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}