{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:28:03Z","timestamp":1740122883778,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"33-34","license":[{"start":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T00:00:00Z","timestamp":1593129600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T00:00:00Z","timestamp":1593129600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s11042-020-09168-y","type":"journal-article","created":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T23:08:48Z","timestamp":1593126528000},"page":"24873-24888","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Exploring a novel fusion-scheme based on mathematical equation system for encryption-image algorithm"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8385-7592","authenticated-orcid":false,"given":"Delia","family":"Torres-Mu\u00f1oz","sequence":"first","affiliation":[]},{"given":"H\u00e9ctor","family":"V\u00e1zquez-Leal","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Hern\u00e1ndez-Mej\u00eda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,26]]},"reference":[{"key":"9168_CR1","unstructured":"Bansal R, Chawla R, Gupta S (2016) A comparison of image encryption techniques based on chaotic maps. In: 2016 3Rd international conference on computing for sustainable global development (INDIACom), pp 933\u2013938"},{"key":"9168_CR2","doi-asserted-by":"crossref","unstructured":"Borujeni Shahram Etemadi EM (2009) Chaotic image encryption design using tompkins-paige algorithm. In: Mathematical problems in engineering 2009, vol 22, pp 762\u2013652","DOI":"10.1155\/2009\/762652"},{"key":"9168_CR3","first-page":"493","volume-title":"Component Fusion Image Encryption Method Based on Composite Chaotic Model 2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)","author":"H Chen","year":"2019","unstructured":"Chen H (2019) Component Fusion Image Encryption Method Based on Composite Chaotic Model 2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE). Hohhot, China, pp 493\u20134934"},{"key":"9168_CR4","doi-asserted-by":"crossref","unstructured":"Chen D, Zhu Z, Yang G (2008) An improved image encryption algorithm based on chaos. In: 2008 The 9th international conference for young computer scientists, pp 2792\u20132796","DOI":"10.1109\/ICYCS.2008.519"},{"key":"9168_CR5","doi-asserted-by":"crossref","unstructured":"Chidambaram N, et al. (2018) A Logistic Approach to Route Image in a Protected Way-a Skeptimistic Image Image Encryption a Fusion, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore","DOI":"10.1109\/ICICCT.2018.8473336"},{"key":"9168_CR6","doi-asserted-by":"crossref","unstructured":"Chunguang H, Hai C, Yu S, Qun D (2015) Permutation of image encryption system based on block cipher and stream cipher encryption algorithm. In: 2015 Third international conference on robot, vision and signal process- ing (RVSP), pp 163\u2013166","DOI":"10.1109\/RVSP.2015.46"},{"key":"9168_CR7","unstructured":"Cid C, Murphy S, Robshaw M (2004) Computational and algebraic aspects of the advanced encryption standard. In: Proceedings of the Seventh Inter- national Workshop on Computer Algebra in Scientific Computing, CASC 2004, pp 93\u2013103"},{"key":"9168_CR8","doi-asserted-by":"publisher","first-page":"13172","DOI":"10.1038\/s41598-017-12664-1","volume":"7","author":"S Dongfeng","year":"2017","unstructured":"Dongfeng S, Jian H, Yingjian W, et al. (2017) Simultaneous fusion, imaging and encryption of multiple objects using a single-pixel detector. Sci Rep 7:13172","journal-title":"Sci Rep"},{"key":"9168_CR9","first-page":"1","volume-title":"A novel image encryption scheme based on permutation\/diffusion process using an improved 2D chaotic system,2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)","author":"M Essaid","year":"2019","unstructured":"Essaid M, Akharraz I, Saaidi A, Mouhib A (2019) A novel image encryption scheme based on permutation\/diffusion process using an improved 2D chaotic system,2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS). Fez, Morocco, pp 1\u20136"},{"key":"9168_CR10","first-page":"1","volume-title":"Image cryptography based on the imitation of gene fusion and horizontal gene transfer, 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)","author":"Z Hamici","year":"2017","unstructured":"Hamici Z (2017) Image cryptography based on the imitation of gene fusion and horizontal gene transfer, 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA). Montreal, QC, pp 1\u20136"},{"issue":"2","key":"9168_CR11","first-page":"563","volume":"52","author":"CK Huang","year":"2013","unstructured":"Huang CK, Liao CW, Hsu SL, Jeng YC (2013) Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun Syst 52(2):563\u2013571","journal-title":"Telecommun Syst"},{"key":"9168_CR12","doi-asserted-by":"crossref","unstructured":"Kalubandi VKP, Vaddi H, Ramineni V, Loganathan A (2016) A novel image encryption algorithm using AES and visual cryptography. In: 2016 2Nd international conference on next generation computing technologies (NGCT), pp 808\u2013813","DOI":"10.1109\/NGCT.2016.7877521"},{"key":"9168_CR13","doi-asserted-by":"crossref","unstructured":"Khan M (2018) W.H.: A novel image encryption scheme based on quantum dynamical spinning and rotations. PLOs one 13(11)","DOI":"10.1371\/journal.pone.0206460"},{"key":"9168_CR14","doi-asserted-by":"crossref","unstructured":"Liang Y, Xiao Z (2018) Image encryption algorithm based on compressive sensing and fractional DCT via polynomial interpolation. Int j Autom comput","DOI":"10.1007\/s11633-018-1159-2"},{"key":"9168_CR15","doi-asserted-by":"crossref","unstructured":"Liu S, Sun J, Xu Z, Liu J (2008) Analysis on an image encryption algorithm. In: 2008 International workshop on education technology and training 2008 international workshop on geoscientific and remote sensing, vol 1, pp 803\u2013806","DOI":"10.1109\/ETTandGRS.2008.239"},{"key":"9168_CR16","doi-asserted-by":"crossref","unstructured":"Nag A, Singh JP, Khan S, Ghosh S, Biswas S, Sarkar D, Sarkar PP (2011) Image encryption using affine transform and XOR operation. In: 2011 International conference on signal processing, communication, computing and networking technologies, pp 309\u2013312","DOI":"10.1109\/ICSCCN.2011.6024565"},{"key":"9168_CR17","doi-asserted-by":"crossref","unstructured":"Nasir Q, Abdlrudha HH (2012) High Security nested PWLCM chaotic map Bit-Level permutation based image encryption. In: International Journal of Communication, Network and System Sciences, vol 5, pp 548\u2013556","DOI":"10.4236\/ijcns.2012.59065"},{"key":"9168_CR18","doi-asserted-by":"crossref","unstructured":"Pan H, Lei Y, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. J Image Video Proc 2018 142","DOI":"10.1186\/s13640-018-0386-3"},{"key":"9168_CR19","doi-asserted-by":"publisher","first-page":"656","DOI":"10.3390\/e21070656","volume":"21","author":"P Ramasamy","year":"2019","unstructured":"Ramasamy P, Ranganathan V, Kadry S, Damasevicius R, Blazauskas T (2019) An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced Logistic-Tent map. Entropy 21:656","journal-title":"Entropy"},{"key":"9168_CR20","doi-asserted-by":"crossref","unstructured":"Somaraj S, Hussain MA (2015) Performance and security analysis for image encryption using key image. In: Indian journal of science and technology 8(35)","DOI":"10.17485\/ijst\/2015\/v8i35\/73141"},{"key":"9168_CR21","doi-asserted-by":"crossref","unstructured":"Sun S, Guo Y, Wu R (2019). In: IEEE Access, vol 7, pp 28539\u201328547","DOI":"10.1109\/ACCESS.2019.2901870"},{"key":"9168_CR22","unstructured":"Wolfram S (1999) The Mathematica book, version 4 cambridge university press"},{"key":"9168_CR23","unstructured":"Wu Y, Member S, Noonan JP, Member L, Agaian S, Member S (2011) NPCR And UACI randomness tests for image encryption. In: Multidisciplinary journals in science and technology, journal of selected areas in telecommunications JSAT"},{"key":"9168_CR24","doi-asserted-by":"publisher","unstructured":"Ye Z, Yin H, Ye Y (2017) Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain. In: 2017 14th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE),  https:\/\/doi.org\/10.1109\/ICEEE.2017.8108905, pp 1\u20136","DOI":"10.1109\/ICEEE.2017.8108905"},{"key":"9168_CR25","doi-asserted-by":"crossref","unstructured":"Yu G, Shen Y, Zhang G, Yang Y (2013) A chaos-based color image encryption algorithm. In: 2013 Sixth international symposium on computational intelligence and design, vol 2, pp 92\u201395","DOI":"10.1109\/ISCID.2013.137"},{"key":"9168_CR26","doi-asserted-by":"crossref","unstructured":"Zhang Y (2013) Encryption speed improvement on an improvement over an image encryption method based on total shuffling. In: Proceedings of 2013 International Conference on Sensor Network Security Technology and Privacy Communication System, pp 201\u2013205","DOI":"10.1109\/SNS-PCS.2013.6553865"},{"key":"9168_CR27","doi-asserted-by":"crossref","unstructured":"Zhang X, Chen W (2008) A new chaotic algorithm for image encryption. In: 2008 International conference on audio, language and image processing, pp 889\u2013892","DOI":"10.1109\/ICALIP.2008.4590187"},{"key":"9168_CR28","unstructured":"Zhang Y, Zhang Z, Lei Y (2010) Research on chaotic cryptosystem based on time delay feedback Chua circuit. In: 2010 International conference on computer and communication technologies in agriculture engineering, vol 3, pp 187\u2013190"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09168-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09168-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09168-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T23:28:52Z","timestamp":1624663732000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09168-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,26]]},"references-count":28,"journal-issue":{"issue":"33-34","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["9168"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09168-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,6,26]]},"assertion":[{"value":"30 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}