{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T08:26:13Z","timestamp":1777537573533,"version":"3.51.4"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"33-34","license":[{"start":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T00:00:00Z","timestamp":1593475200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T00:00:00Z","timestamp":1593475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004541","name":"Ministry of Human Resource Development","doi-asserted-by":"publisher","award":["16919006"],"award-info":[{"award-number":["16919006"]}],"id":[{"id":"10.13039\/501100004541","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s11042-020-09034-x","type":"journal-article","created":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T10:03:46Z","timestamp":1593511426000},"page":"25115-25142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["A novel chaos-based approach in conjunction with MR-SVD and pairing function for generating visually meaningful cipher images"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8428-3551","authenticated-orcid":false,"given":"Farhan","family":"Musanna","sequence":"first","affiliation":[]},{"given":"Deepak","family":"Dangwal","sequence":"additional","affiliation":[]},{"given":"Sanjeev","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,30]]},"reference":[{"key":"9034_CR1","doi-asserted-by":"crossref","unstructured":"Akhbari B, Ghaemmaghami S (2005) Watermarking of still images using multiresolution singular value decomposition. In: 2005. ISPACS 2005. Proceedings of International Symposium on Intelligent Signal Processing and Communication Systems. IEEE, pp 325\u2013328","DOI":"10.1109\/ISPACS.2005.1595412"},{"key":"9034_CR2","doi-asserted-by":"crossref","unstructured":"Ashino R, Morimoto A, Nagase M, Vaillancourt R (2005) Comparing multiresolution svd with other methods for image compression. In: Advances In Analysis. World Scientific, pp 457\u2013470","DOI":"10.1142\/9789812701732_0042"},{"issue":"6-7","key":"9034_CR3","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1016\/j.mcm.2003.12.014","volume":"41","author":"R Ashino","year":"2005","unstructured":"Ashino R, Morimoto A, Vaillancourt R (2005) Image compression with multiresolution singular value decomposition and other methods. Math Comput Model 41(6-7):773\u2013790","journal-title":"Math Comput Model"},{"key":"9034_CR4","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.ins.2015.06.049","volume":"324","author":"L Bao","year":"2015","unstructured":"Bao L, Zhou Y (2015) Image encryption: Generating visually meaningful encrypted images. Inf Sci 324:197\u2013207","journal-title":"Inf Sci"},{"issue":"1-2","key":"9034_CR5","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1998","unstructured":"Baptista M S (1998) Cryptography with chaos. Phys Lett A 240 (1-2):50\u201354","journal-title":"Phys Lett A"},{"key":"9034_CR6","first-page":"258","volume":"77","author":"G Cantor","year":"1874","unstructured":"Cantor G (1874) Ueber eine eigenschaft des inbegriffs aller reellen algebraischen zahlen. J Reine Angewan Math 77:258\u2013262","journal-title":"J Reine Angewan Math"},{"key":"9034_CR7","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35\u201351","journal-title":"Signal Process"},{"key":"9034_CR8","doi-asserted-by":"crossref","unstructured":"Chen M, Zhang Z, Cai Z, Pan Y (2016) A novel image encryption method based on fractional fourier transform and odd-even quantification. In: Eighth International Conference on Digital Image Processing (ICDIP 2016). International Society for Optics and Photonics, vol 10033, pp 1003332","DOI":"10.1117\/12.2245059"},{"issue":"1-2","key":"9034_CR9","first-page":"43","volume":"13","author":"S Dube","year":"2019","unstructured":"Dube S, Sharma K (2019) Hybrid approach to enhance contrast of image for forensic investigation using segmented histogram. Int J Adv Intell Parad 13(1-2):43\u201366","journal-title":"Int J Adv Intell Parad"},{"key":"9034_CR10","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/BF01020332","volume":"19","author":"MJ Feigenbaum","year":"1978","unstructured":"Feigenbaum MJ (1978) . J Stat Phys 19:25","journal-title":"J Stat Phys"},{"issue":"12","key":"9034_CR11","doi-asserted-by":"crossref","first-page":"1910","DOI":"10.4236\/am.2012.312262","volume":"3","author":"M Fran\u010bois","year":"2012","unstructured":"Fran\u010bois M, Grosges T, Barchiesi D, Erra R (2012) Image encryption algorithm based on a chaotic iterative process. Appl Math 3(12):1910","journal-title":"Appl Math"},{"issue":"6","key":"9034_CR12","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(6):1259\u20131284","journal-title":"Int J Bifurcat Chaos"},{"issue":"23","key":"9034_CR13","doi-asserted-by":"crossref","first-page":"5415","DOI":"10.1016\/j.optcom.2011.08.013","volume":"284","author":"C Fu","year":"2011","unstructured":"Fu C, Lin B-b, Miao Y-s, Liu X, Chen J-j (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284(23):5415\u20135423","journal-title":"Opt Commun"},{"issue":"5","key":"9034_CR14","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/BF02163027","volume":"14","author":"GH Golub","year":"1970","unstructured":"Golub GH, Reinsch C (1970) Singular value decomposition and least squares solutions. Numer Math 14(5):403\u2013420","journal-title":"Numer Math"},{"key":"9034_CR15","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.optcom.2014.01.061","volume":"321","author":"C Guo","year":"2014","unstructured":"Guo C, Liu Si, Sheridan JT (2014) Optical double image encryption employing a pseudo image technique in the fourier domain. Opt Commun 321:61\u201372","journal-title":"Opt Commun"},{"key":"9034_CR16","doi-asserted-by":"crossref","unstructured":"Haralick RM, Shapiro LG (1992) Computer and robot vision, vol 1. Addison-wesley Reading","DOI":"10.1007\/978-1-4471-3201-1_1"},{"key":"9034_CR17","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun C M, Chen CLP (2015) 2D Sine Logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"issue":"5","key":"9034_CR18","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1109\/83.918566","volume":"10","author":"R Kakarala","year":"2001","unstructured":"Kakarala R, Ogunbona PO (2001) Signal analysis using a multiresolution form of the singular value decomposition. IEEE Trans Image Process 10(5):724\u2013735","journal-title":"IEEE Trans Image Process"},{"key":"9034_CR19","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.optlaseng.2016.10.009","volume":"90","author":"A Kanso","year":"2017","unstructured":"Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196\u2013208","journal-title":"Opt Lasers Eng"},{"key":"9034_CR20","doi-asserted-by":"crossref","unstructured":"Katz J, Lindell Y (2008) Introduction to modern cryptography: principles and protocols cryptography and network security","DOI":"10.1201\/9781420010756"},{"issue":"2","key":"9034_CR21","doi-asserted-by":"crossref","first-page":"2549","DOI":"10.3233\/JIFS-182778","volume":"37","author":"JS Khan","year":"2019","unstructured":"Khan JS, Ahmad J, Ahmed SS, Siddiqa HA, Abbasi SF, Kayhan SK (2019) Dna key based visual chaotic image encryption. J Intell Fuzzy Syst 37(2):2549\u20132561","journal-title":"J Intell Fuzzy Syst"},{"key":"9034_CR22","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/j.sigpro.2013.07.020","volume":"94","author":"JB Lima","year":"2014","unstructured":"Lima JB, Novaes L F G (2014) Image encryption based on the fractional fourier transform over finite fields. Signal Process 94:521\u2013530","journal-title":"Signal Process"},{"key":"9034_CR23","doi-asserted-by":"crossref","unstructured":"Lima JxB, da Silva ES, de Souza RMC (2015) A finite field cosine transform-based image processing scheme for color image encryption. In: 2015 IEEE Global Conference on Signal and Information Processing (globalSIP). IEEE, pp 1071\u20131075","DOI":"10.1109\/GlobalSIP.2015.7418362"},{"issue":"5","key":"9034_CR24","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X et al (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"key":"9034_CR25","doi-asserted-by":"crossref","first-page":"1708","DOI":"10.1016\/j.procs.2015.02.114","volume":"46","author":"S Malini","year":"2015","unstructured":"Malini S, Moni R S (2015) Image denoising using multiresolution singular value decomposition transform. Procedia Comput Sci 46:1708\u20131715","journal-title":"Procedia Comput Sci"},{"issue":"10","key":"9034_CR26","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y Mao","year":"2004","unstructured":"Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3d chaotic baker maps. Int J Bifurcat Chaos 14(10):3613\u20133624","journal-title":"Int J Bifurcat Chaos"},{"issue":"7","key":"9034_CR27","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1016\/j.patcog.2005.01.002","volume":"38","author":"K Martin","year":"2005","unstructured":"Martin K, Lukac R, Plataniotis KN (2005) Efficient encryption of wavelet-based coded color images. Pattern Recogn 38(7):1111\u20131115","journal-title":"Pattern Recogn"},{"issue":"11","key":"9034_CR28","doi-asserted-by":"crossref","first-page":"14867","DOI":"10.1007\/s11042-018-6827-2","volume":"78","author":"F Musanna","year":"2019","unstructured":"Musanna F, Kumar S (2019) A novel fractional order chaos-based image encryption using fisher yates algorithm and 3-d cat map. Multimed Tools Appl 78 (11):14867\u201314895","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"9034_CR29","doi-asserted-by":"crossref","first-page":"4331","DOI":"10.1016\/j.optcom.2011.05.028","volume":"284","author":"V Patidar","year":"2011","unstructured":"Patidar V, Pareek N K, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt Commun 284(19):4331\u20134339","journal-title":"Opt Commun"},{"issue":"4","key":"9034_CR30","doi-asserted-by":"crossref","first-page":"3670","DOI":"10.1103\/PhysRevE.51.3670","volume":"51","author":"SC Phatak","year":"1995","unstructured":"Phatak S C, Rao SS (1995) Logistic map a possible random-number generator. Phys Rev E 51(4):3670","journal-title":"Phys Rev E"},{"key":"9034_CR31","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, Booz-Allen and Hamilton Inc Mclean Va","DOI":"10.6028\/NIST.SP.800-22"},{"issue":"2","key":"9034_CR32","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1117\/1.482647","volume":"7","author":"J Scharinger","year":"1998","unstructured":"Scharinger J (1998) Fast encryption of image data using chaotic kolmogorov flows. J Electron Imaging 7(2):318\u2013326","journal-title":"J Electron Imaging"},{"key":"9034_CR33","doi-asserted-by":"crossref","unstructured":"Sharma K, Bala S, Bansal H, Shrivastava G (2017) Introduction to the special issue on secure solutions for network in scalable computing. Scalable Comput Pract Exper 18(3):iii\u2013iv","DOI":"10.12694\/scpe.v18i3.1299"},{"key":"9034_CR34","doi-asserted-by":"crossref","unstructured":"Shaw AK, Majumder S (2016) Multiresolution svd and pixel-wise masking based image watermarking. In: 2016 2nd International Conference on Control, Instrumentation, Energy & Communication (CIEC). IEEE, pp 193\u2013196","DOI":"10.1109\/CIEC.2016.7513816"},{"key":"9034_CR35","unstructured":"Shrivastava G, Gia NN, Bouhlel MS, Sharma K (2018) Special issue on advance research in model driven security, privacy and forensic of smart devices preface"},{"key":"9034_CR36","doi-asserted-by":"crossref","unstructured":"Shrivastava G, Kumar P, Gupta BB, Bala S, Dey N (2018) Handbook of research on network forensics and analysis techniques. IGI Global","DOI":"10.4018\/978-1-5225-4100-4"},{"issue":"12","key":"9034_CR37","doi-asserted-by":"crossref","first-page":"7397","DOI":"10.1007\/s13369-018-3104-7","volume":"43","author":"LD Singh","year":"2018","unstructured":"Singh LD, Singh KM (2018) Visually meaningful multi-image encryption scheme. Arab J Sci Eng 43(12):7397\u20137407","journal-title":"Arab J Sci Eng"},{"key":"9034_CR38","unstructured":"Szudzik M (2006) An elegant pairing function. In: Wolfram Research (ed.) Special NKS 2006 Wolfram Science Conference, pp 1\u201312"},{"issue":"3","key":"9034_CR39","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1007\/s00521-016-2490-6","volume":"29","author":"W Wen","year":"2018","unstructured":"Wen W, Zhang Y, Fang Y, Fang Z (2018) Image salient regions encryption for generating visually meaningful ciphertext image. Neural Comput Appl 29(3):653\u2013663","journal-title":"Neural Comput Appl"},{"key":"9034_CR40","unstructured":"Wu Y, Noonan J P, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: Multidisciplinary journals in science and technology Journal of Selected Areas in Telecommunications (JSAT), pp 31\u201338"},{"issue":"1","key":"9034_CR41","first-page":"1","volume":"5","author":"Y-G Yang","year":"2015","unstructured":"Yang Y-G, Pan Q-X, Sun S-J, Xu P (2015) Novel image encryption based on quantum walks. Sci Rep 5(1):1\u20139","journal-title":"Sci Rep"},{"key":"9034_CR42","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.ins.2017.11.009","volume":"429","author":"Y-G Yang","year":"2018","unstructured":"Yang Y-G, Zhang Y-C, Chen X-B, Zhou Y-H, Shi W-M (2018) Eliminating the texture features in visually meaningful cipher images. Inf Sci 429:102\u2013119","journal-title":"Inf Sci"},{"issue":"4","key":"9034_CR43","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1007\/s11071-012-0409-z","volume":"69","author":"G Ye","year":"2012","unstructured":"Ye G, Wong K-W (2012) An efficient chaotic image encryption algorithm based on a generalized arnold map. Nonlinear Dyn 69(4):2079\u20132087","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"9034_CR44","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1109\/TIP.2012.2221725","volume":"22","author":"H Yeganeh","year":"2013","unstructured":"Yeganeh H, Wang Z (2013) Objective quality assessment of tone-mapped images. IEEE Trans Image Process 22(2):657\u2013667","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"9034_CR45","first-page":"70","volume":"1","author":"M Zeghid","year":"2007","unstructured":"Zeghid M, Machhout M, Khriji L, Baganne A, Tourki R (2007) A modified aes based algorithm for image encryption. Int J Comput Sci Eng 1(1):70\u201375","journal-title":"Int J Comput Sci Eng"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09034-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09034-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09034-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T23:42:44Z","timestamp":1625010164000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09034-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,30]]},"references-count":45,"journal-issue":{"issue":"33-34","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["9034"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09034-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,30]]},"assertion":[{"value":"25 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}