{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:01:00Z","timestamp":1760659260053},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"27-28","license":[{"start":{"date-parts":[[2020,4,16]],"date-time":"2020-04-16T00:00:00Z","timestamp":1586995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,16]],"date-time":"2020-04-16T00:00:00Z","timestamp":1586995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11042-020-08879-6","type":"journal-article","created":{"date-parts":[[2020,4,16]],"date-time":"2020-04-16T04:15:32Z","timestamp":1587010532000},"page":"20263-20279","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory"],"prefix":"10.1007","volume":"79","author":[{"given":"Abdelhalim","family":"Kamrani","sequence":"first","affiliation":[]},{"given":"Khalid","family":"Zenkouar","sequence":"additional","affiliation":[]},{"given":"Said","family":"Najah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,16]]},"reference":[{"issue":"2","key":"8879_CR1","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1007\/s11277-015-2667-9","volume":"84","author":"J Ahmad","year":"2015","unstructured":"Ahmad J, Hwang SO, Ali A (2015) An experimental comparison of chaotic and non-chaotic image encryption schemes. Wirel Pers Commun 84(2):901\u2013918","journal-title":"Wirel Pers Commun"},{"key":"8879_CR2","unstructured":"Ahmed HEDH, Kalash HM, Allah OF (2007) Encryption efficiency analysis and security evaluation of rc6 block cipher for digital images. In: International conference on electrical engineering, 2007. ICEE\u201907. IEEE, pp 1\u20137"},{"issue":"4","key":"8879_CR3","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1109\/34.491620","volume":"18","author":"RR Bailey","year":"1996","unstructured":"Bailey RR, Srinath M (1996) Orthogonal moment features for use with parametric and non-parametric classifiers. IEEE Trans Pattern Anal Mach Intell 18(4):389\u2013399","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1-2","key":"8879_CR4","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"M Baptista","year":"1998","unstructured":"Baptista M (1998) Cryptography with chaos. Phys Lett A 240(1-2):50\u201354","journal-title":"Phys Lett A"},{"issue":"1","key":"8879_CR5","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1186\/s13640-017-0172-7","volume":"2017","author":"I Batioua","year":"2017","unstructured":"Batioua I, Benouini R, Zenkouar K, El Fadili H (2017) Image analysis using new set of separable two-dimensional discrete orthogonal moments based on racah polynomials. EURASIP J Image Video Process 2017(1):20","journal-title":"EURASIP J Image Video Process"},{"key":"8879_CR6","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.patcog.2017.06.013","volume":"71","author":"I Batioua","year":"2017","unstructured":"Batioua I, Benouini R, Zenkouar K, Zahi A, et al. (2017) 3d image analysis by separable discrete orthogonal moments based on krawtchouk and tchebichef polynomials. Pattern Recogn 71:264\u2013277","journal-title":"Pattern Recogn"},{"key":"8879_CR7","doi-asserted-by":"crossref","unstructured":"Benouini R, Batioua I, Zenkouar K, Najah S, Qjidaa H (2018) Efficient 3d object classification by using direct krawtchouk moment invariants. Multimed Tools Appl, p 1\u201326","DOI":"10.1007\/s11042-018-5937-1"},{"key":"8879_CR8","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1016\/j.patcog.2018.10.001","volume":"86","author":"R Benouini","year":"2019","unstructured":"Benouini R, Batioua I, Zenkouar K, Zahi A, Najah S, Qjidaa H (2019) Fractional-order orthogonal chebyshev moments and moment invariants for image representation and pattern recognition. Pattern Recogn 86:332\u2013343","journal-title":"Pattern Recogn"},{"key":"8879_CR9","unstructured":"Bianco ME, Reed DA (1991) Encryption system based on chaos theory. US Patent 5,048,086"},{"issue":"4","key":"8879_CR10","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/0030-4018(84)90047-6","volume":"51","author":"D Casasent","year":"1984","unstructured":"Casasent D, Cheatham RL (1984) Image segmentation and real-image tests for an optical moment-based feature extractor. Optics commun 51(4):227\u2013230","journal-title":"Optics commun"},{"key":"8879_CR11","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using dna sequence operations. Optics and Lasers in Engineering 88:197\u2013213","journal-title":"Optics and Lasers in Engineering"},{"key":"8879_CR12","unstructured":"Chen CS, Chen RJ (2006) Image encryption and decryption using scan methodology. In: Seventh international conference on parallel and distributed computing, applications and technologies, 2006. PDCAT\u201906. IEEE, pp 61\u201366"},{"issue":"8","key":"8879_CR13","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1016\/j.sigpro.2009.02.005","volume":"89","author":"C Deng","year":"2009","unstructured":"Deng C, Gao X, Li X, Tao D (2009) A local tchebichef moments-based robust image watermarking. Signal Process 89(8):1531\u20131539","journal-title":"Signal Process"},{"issue":"1","key":"8879_CR14","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/TC.1977.5009272","volume":"100","author":"SA Dudani","year":"1977","unstructured":"Dudani SA, Breeding KJ, McGhee RB (1977) Aircraft identification by moment invariants. IEEE Trans Comput 100(1):39\u201346","journal-title":"IEEE Trans Comput"},{"key":"8879_CR15","unstructured":"El-Ashry I (2010) Digital image encryption. MS. c Thesis, Electronics and Electrical Communications Engineering Dept., Faculty of Electronic Engineering Menofia University"},{"issue":"3","key":"8879_CR16","first-page":"241","volume":"5","author":"NF El Fishawy","year":"2007","unstructured":"El Fishawy NF, Zaid OMA (2007) Quality of encryption measurement of bitmap images with rc6, mrc6, and rijndael block cipher algorithms. IJ Network Security 5 (3):241\u2013251","journal-title":"IJ Network Security"},{"key":"8879_CR17","unstructured":"El-Wahed MA, Mesbah S, Shoukry A (2008) Efficiency and security of some image encryption algorithms. In: Proceedings of the world congress on engineering. London, vol 1, pp 2\u20134"},{"key":"8879_CR18","doi-asserted-by":"crossref","unstructured":"Elkamchouchi H, Makar M (2005) Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers. In: Radio science conference, 2005. NRSC 2005. Proceedings of the twenty-second national, pp 277\u2013284. IEEE","DOI":"10.1109\/NRSC.2005.194011"},{"issue":"9","key":"8879_CR19","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.1016\/j.optlaseng.2013.03.010","volume":"51","author":"R Enayatifar","year":"2013","unstructured":"Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (wdica) combined with chaotic map for image encryption. Opt Lasers Eng 51(9):1066\u20131077","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"8879_CR20","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/0031-3203(93)90098-H","volume":"26","author":"J Flusser","year":"1993","unstructured":"Flusser J, Suk T (1993) Pattern recognition by affine moment invariants. Pattern Recogn 26(1):167\u2013174","journal-title":"Pattern Recogn"},{"issue":"06","key":"8879_CR21","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8(06):1259\u20131284","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"2","key":"8879_CR22","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/0031-3203(93)90038-X","volume":"26","author":"S Ghosal","year":"1993","unstructured":"Ghosal S, Mehrotra R (1993) Orthogonal moment operators for subpixel edge detection. Pattern Recogn 26(2):295\u2013306","journal-title":"Pattern Recogn"},{"issue":"9","key":"8879_CR23","doi-asserted-by":"crossref","first-page":"1535","DOI":"10.1049\/iet-ipr.2019.0051","volume":"13","author":"M Guan","year":"2019","unstructured":"Guan M, Yang X, Hu W (2019) Chaotic image encryption algorithm using frequency-domain dna encoding. IET Image Process 13(9):1535\u20131539","journal-title":"IET Image Process"},{"issue":"7","key":"8879_CR24","doi-asserted-by":"crossref","first-page":"1596","DOI":"10.1117\/12.139804","volume":"32","author":"HS Hsu","year":"1993","unstructured":"Hsu HS, Tsai WH (1993) Moment-preserving edge detection and its application to image data compression. Optical Eng 32(7):1596\u20131609","journal-title":"Optical Eng"},{"issue":"2","key":"8879_CR25","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1109\/TIT.1962.1057692","volume":"8","author":"MK Hu","year":"1962","unstructured":"Hu MK (1962) Visual pattern recognition by moment invariants. IRE Trans Inform Theory 8(2):179\u2013187","journal-title":"IRE Trans Inform Theory"},{"key":"8879_CR26","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"issue":"24","key":"8879_CR27","doi-asserted-by":"crossref","first-page":"4887","DOI":"10.1016\/j.optcom.2012.06.011","volume":"285","author":"I Hussain","year":"2012","unstructured":"Hussain I, Shah T, Gondal MA (2012) An efficient image encryption algorithm based on s8 s-box transformation and nca map. Opt Commun 285(24):4887\u20134890","journal-title":"Opt Commun"},{"key":"8879_CR28","unstructured":"Jiang NZX, Lan X (2006) Advances in machine vision, image processing and pattern analysis"},{"issue":"2","key":"8879_CR29","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/TIFS.2015.2489178","volume":"11","author":"A Jolfaei","year":"2016","unstructured":"Jolfaei A, Wu XW, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inform Forensics Secur 11 (2):235\u2013246","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"2","key":"8879_CR30","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","volume":"30","author":"JS Khan","year":"2019","unstructured":"Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidim Syst Sign Process 30(2):943\u2013961","journal-title":"Multidim Syst Sign Process"},{"issue":"5","key":"8879_CR31","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/34.55109","volume":"12","author":"A Khotanzad","year":"1990","unstructured":"Khotanzad A, Hong YH (1990) Invariant image recognition by zernike moments. IEEE Trans Pattern Anal Mach Intell 12(5):489\u2013497","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"4","key":"8879_CR32","doi-asserted-by":"crossref","first-page":"897","DOI":"10.1109\/72.508933","volume":"7","author":"A Khotanzad","year":"1996","unstructured":"Khotanzad A, Liou JH (1996) Recognition and pose estimation of unoccluded three-dimensional objects from a two-dimensional perspective view by banks of neural networks. IEEE Trans Neural Netw 7(4):897\u2013906","journal-title":"IEEE Trans Neural Netw"},{"issue":"5","key":"8879_CR33","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1002\/andp.19975090504","volume":"509","author":"Z Kotulski","year":"1997","unstructured":"Kotulski Z, Szczepa\u0144ski J (1997) Discrete chaotic cryptography. Ann Phys 509(5):381\u2013394","journal-title":"Ann Phys"},{"issue":"17","key":"8879_CR34","first-page":"2543","volume":"5","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in dct domain. Int J Phys Sci 5(17):2543\u20132554","journal-title":"Int J Phys Sci"},{"key":"8879_CR35","doi-asserted-by":"crossref","unstructured":"Leng L, Zhang J, Xu J, Khan MK, Alghathbar K (2010) Dynamic weighted discrimination power analysis in dct domain for face and palmprint recognition. In: 2010 international conference on information and communication technology convergence (ICTC). IEEE, pp 467\u2013471","DOI":"10.1109\/ICTC.2010.5674791"},{"issue":"1","key":"8879_CR36","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2017","unstructured":"Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dynamics 87(1):127\u2013133","journal-title":"Nonlinear Dynamics"},{"issue":"2","key":"8879_CR37","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/TCSVT.2006.888840","volume":"17","author":"S Li","year":"2007","unstructured":"Li S, Chen G, Cheung A, Bhargava B, Lo KT (2007) On the design of perceptual mpeg-video encryption algorithms. IEEE Trans Circ Sys Video Technol 17 (2):214\u2013223","journal-title":"IEEE Trans Circ Sys Video Technol"},{"key":"8879_CR38","first-page":"2004","volume":"374","author":"S Li","year":"2004","unstructured":"Li S, Li C, Chen G, Zhang D, Bourbakis NG (2004) A general cryptanalysis of permutation-only multimedia encryption algorithms. IACR\u2019s Cryptology ePrint Archive: Report 374:2004","journal-title":"IACR\u2019s Cryptology ePrint Archive: Report"},{"key":"8879_CR39","doi-asserted-by":"crossref","unstructured":"Lian S (2008) Multimedia content encryption: techniques and applications. Auerbach Publications","DOI":"10.1201\/9781420065282"},{"issue":"01","key":"8879_CR40","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1142\/S0218488504002631","volume":"12","author":"J Liang","year":"2004","unstructured":"Liang J, Shi Z (2004) The information entropy, rough entropy and knowledge granulation in rough set theory. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 12(01):37\u201346","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"8879_CR41","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/j.optlastec.2013.05.023","volume":"57","author":"S Liu","year":"2014","unstructured":"Liu S, Guo C, Sheridan JT (2014) A review of optical image encryption techniques. Optics & Laser Technology 57:327\u2013342","journal-title":"Optics & Laser Technology"},{"issue":"2","key":"8879_CR42","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.cnsns.2014.05.022","volume":"20","author":"Y Luo","year":"2015","unstructured":"Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447\u2013460","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"2","key":"8879_CR43","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/70.134273","volume":"8","author":"d Markandey","year":"1992","unstructured":"Markandey d. (1992) Robot sensing techniques based on high-dimensional moment invariants and tensors. IEEE Trans Robotics Automation 8(2):186\u2013195","journal-title":"IEEE Trans Robotics Automation"},{"issue":"1","key":"8879_CR44","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29\u201342","journal-title":"Cryptologia"},{"issue":"9","key":"8879_CR45","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1109\/83.941859","volume":"10","author":"R Mukundan","year":"2001","unstructured":"Mukundan R, Ong S, Lee PA (2001) Image analysis by tchebichef moments. IEEE Trans Image Process 10(9):1357\u20131364","journal-title":"IEEE Trans Image Process"},{"key":"8879_CR46","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1016\/j.compeleceng.2015.08.018","volume":"54","author":"EA Naeem","year":"2016","unstructured":"Naeem EA, Elnaby MMA, El-sayed HS, El-Samie FEA, Faragallah OS (2016) Wavelet fusion for encrypting images with a few details. Comput Electrical Eng 54:450\u2013470","journal-title":"Comput Electrical Eng"},{"issue":"10","key":"8879_CR47","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1109\/LSP.2007.898331","volume":"14","author":"K Nakagaki","year":"2007","unstructured":"Nakagaki K, Mukundan R (2007) A fast 4x4 forward discrete tchebichef transform algorithm. IEEE Signal Process Lett 14(10):684\u2013687","journal-title":"IEEE Signal Process Lett"},{"issue":"9","key":"8879_CR48","doi-asserted-by":"crossref","first-page":"4177","DOI":"10.1016\/j.eswa.2015.01.041","volume":"42","author":"JR Padilla-L\u00f3pez","year":"2015","unstructured":"Padilla-L\u00f3pez JR, Chaaraoui AA, Fl\u00f3rez-Revuelta F (2015) Visual privacy protection methods: a survey. Expert Syst Appl 42(9):4177\u20134195","journal-title":"Expert Syst Appl"},{"issue":"6","key":"8879_CR49","doi-asserted-by":"crossref","first-page":"1895","DOI":"10.1016\/j.patcog.2007.11.015","volume":"41","author":"GA Papakostas","year":"2008","unstructured":"Papakostas GA, Karakasis EG, Koulouriotis DE (2008) Efficient and accurate computation of geometric moments on gray-scale images. Pattern Recogn 41 (6):1895\u20131904","journal-title":"Pattern Recogn"},{"issue":"1","key":"8879_CR50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.amc.2010.01.051","volume":"216","author":"GA Papakostas","year":"2010","unstructured":"Papakostas GA, Koulouriotis DE, Karakasis EG (2010) Computation strategies of orthogonal image moments: a comparative study. Appl Math Comput 216(1):1\u201317","journal-title":"Appl Math Comput"},{"issue":"9","key":"8879_CR51","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image and Vision Comput 24(9):926\u2013934","journal-title":"Image and Vision Comput"},{"issue":"2","key":"8879_CR52","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.jare.2015.07.002","volume":"7","author":"AG Radwan","year":"2016","unstructured":"Radwan AG, AbdElHaleem SH, Abd-El-Hafiz SK (2016) Symmetric encryption algorithms using chaotic and non-chaotic generators: a review. J Adv Res 7(2):193\u2013208","journal-title":"J Adv Res"},{"key":"8879_CR53","unstructured":"Sankpal PR, Vijaya P (2014) Image encryption using chaotic maps: a survey. In: 2014 fifth international conference on signal and image processing (ICSIP). IEEE, pp 102\u2013107"},{"issue":"2","key":"8879_CR54","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.amc.2007.03.080","volume":"193","author":"K See","year":"2007","unstructured":"See K, Loke KS, Lee P, Loe KF (2007) Image reconstruction using various discrete orthogonal polynomials in comparison with dct. Appl Math Comput 193(2):346\u2013359","journal-title":"Appl Math Comput"},{"issue":"4","key":"8879_CR55","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell System Technical Journal 28(4):656\u2013715","journal-title":"Bell System Technical Journal"},{"issue":"12","key":"8879_CR56","doi-asserted-by":"crossref","first-page":"2895","DOI":"10.1016\/S0031-3203(03)00187-0","volume":"36","author":"T Suk","year":"2003","unstructured":"Suk T, Flusser J (2003) Combined blur and affine moment invariants and their use in pattern recognition. Pattern Recogn 36(12):2895\u20132907","journal-title":"Pattern Recogn"},{"issue":"8","key":"8879_CR57","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1364\/JOSA.70.000920","volume":"70","author":"MR Teague","year":"1980","unstructured":"Teague MR (1980) Image analysis via the general theory of moments. JOSA 70 (8):920\u2013930","journal-title":"JOSA"},{"key":"8879_CR58","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.ins.2014.02.004","volume":"269","author":"S Tedmori","year":"2014","unstructured":"Tedmori S, Al-Najdawi N (2014) Image cryptographic algorithm based on the haar wavelet transform. Inf Sci 269:21\u201334","journal-title":"Inf Sci"},{"key":"8879_CR59","first-page":"50","volume":"102421","author":"JS Teh","year":"2020","unstructured":"Teh JS, Alawida M, Sii YC (2020) Implementation and practical problems of chaos-based cryptography revisited. J Inform Secur Appl 102421:50","journal-title":"J Inform Secur Appl"},{"issue":"11","key":"8879_CR60","doi-asserted-by":"crossref","first-page":"3985","DOI":"10.1007\/s11042-013-1808-y","volume":"74","author":"E Tsougenis","year":"2015","unstructured":"Tsougenis E, Papakostas GA, Koulouriotis DE (2015) Image watermarking via separable moments. Multimed Tools Appl 74(11):3985\u20134012","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"8879_CR61","doi-asserted-by":"crossref","first-page":"1106","DOI":"10.1109\/34.473239","volume":"17","author":"\u00c5 Wallin","year":"1995","unstructured":"Wallin \u00c5, Kubler O (1995) Complete sets of complex zernike moment invariants and the role of the pseudoinvariants. IEEE Trans Pattern Anal Mach Intell 17(11):1106\u20131110","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"8879_CR62","doi-asserted-by":"crossref","unstructured":"Wang C, Wang X, Xia Z, Ma B, Shi YQ (2019) Image description with polar harmonic fourier moments. IEEE Trans Circ Sys Video Technol","DOI":"10.1109\/TCSVT.2019.2960507"},{"key":"8879_CR63","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1016\/j.compeleceng.2017.07.026","volume":"65","author":"W Wang","year":"2018","unstructured":"Wang W, Si M, Pang Y, Ran P, Wang H, Jiang X, Liu Y, Wu J, Wu W, Chilamkurti N et al (2018) An encryption algorithm based on combined chaos in body area networks. Comput Electrical Eng 65:282\u2013291","journal-title":"Comput Electrical Eng"},{"key":"8879_CR64","doi-asserted-by":"crossref","unstructured":"Wang W, Tan H, Sun P, Pang Y, Ren B (2016) A novel digital image encryption algorithm based on wavelet transform and multi-chaos. In: Wireless communication and sensor network: proceedings of the international conference on wireless communication and sensor network (WCSN 2015). World Scientific, pp 711\u2013719","DOI":"10.1142\/9789813140011_0083"},{"key":"8879_CR65","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"issue":"20","key":"8879_CR66","doi-asserted-by":"crossref","first-page":"1760","DOI":"10.1080\/09500340.2013.858189","volume":"60","author":"J Wu","year":"2013","unstructured":"Wu J, Guo F, Zeng P, Zhou N (2013) Image encryption based on a reality-preserving fractional discrete cosine transform and a chaos-based generating sequence. J Mod Opt 60(20):1760\u20131771","journal-title":"J Mod Opt"},{"issue":"2","key":"8879_CR67","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT) 1(2):31\u201338","journal-title":"Journal of Selected Areas in Telecommunications (JSAT)"},{"key":"8879_CR68","doi-asserted-by":"crossref","unstructured":"Xin G, Fen-lin L, Bin L, Wei W, Juan C (2010) An image encryption algorithm based on spatiotemporal chaos in dct domain. In: 2010 the 2nd IEEE international conference on information management and engineering (ICIME). IEEE, pp 267\u2013270","DOI":"10.1109\/ICIME.2010.5477434"},{"issue":"22","key":"8879_CR69","doi-asserted-by":"crossref","first-page":"31035","DOI":"10.1007\/s11042-018-7081-3","volume":"78","author":"Z Xiong","year":"2019","unstructured":"Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryption algorithm combining crc and nine palace map. Multimed Tools Appl 78 (22):31035\u201331055","journal-title":"Multimed Tools Appl"},{"key":"8879_CR70","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41\u201352","journal-title":"Opt Lasers Eng"},{"issue":"11","key":"8879_CR71","doi-asserted-by":"crossref","first-page":"1367","DOI":"10.1109\/TIP.2003.818019","volume":"12","author":"PT Yap","year":"2003","unstructured":"Yap PT, Paramesran R, Ong SH (2003) Image analysis by krawtchouk moments. IEEE Trans Image Process 12(11):1367\u20131377","journal-title":"IEEE Trans Image Process"},{"issue":"5","key":"8879_CR72","doi-asserted-by":"crossref","first-page":"058104","DOI":"10.1007\/s11432-017-9191-x","volume":"61","author":"G Ye","year":"2018","unstructured":"Ye G, Huang X (2018) Spatial image encryption algorithm based on chaotic map and pixel frequency. Sci China Inform Sci 61(5):058104","journal-title":"Sci China Inform Sci"},{"key":"8879_CR73","doi-asserted-by":"crossref","unstructured":"Ye G, Pan C, Huang X, Mei Q (2018) An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dynamics, pp 1\u201312","DOI":"10.1007\/s11071-018-4391-y"},{"issue":"12","key":"8879_CR74","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775\u20132780","journal-title":"Opt Commun"},{"key":"8879_CR75","doi-asserted-by":"crossref","unstructured":"Zhou J, Shu H, Zhu H, Toumoulin C, Luo L (2005) Image analysis by discrete orthogonal hahn moments. In: International conference image analysis and recognition. Springer, pp 524\u2013531","DOI":"10.1007\/11559573_65"},{"issue":"4","key":"8879_CR76","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1016\/j.sigpro.2006.07.007","volume":"87","author":"H Zhu","year":"2007","unstructured":"Zhu H, Shu H, Liang J, Luo L, Coatrieux JL (2007) Image analysis by discrete orthogonal racah moments. Signal Process 87(4):687\u2013708","journal-title":"Signal Process"},{"issue":"13","key":"8879_CR77","doi-asserted-by":"crossref","first-page":"1688","DOI":"10.1016\/j.patrec.2007.04.013","volume":"28","author":"H Zhu","year":"2007","unstructured":"Zhu H, Shu H, Zhou J, Luo L, Coatrieux JL (2007) Image analysis by discrete orthogonal dual hahn moments. Pattern Recogn Lett 28(13):1688\u20131704","journal-title":"Pattern Recogn Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08879-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-08879-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08879-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T00:20:11Z","timestamp":1618532411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-08879-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,16]]},"references-count":77,"journal-issue":{"issue":"27-28","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["8879"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08879-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,16]]},"assertion":[{"value":"28 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}