{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:45:39Z","timestamp":1765039539914},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"43-44","license":[{"start":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T00:00:00Z","timestamp":1598140800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T00:00:00Z","timestamp":1598140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11042-020-09497-y","type":"journal-article","created":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T07:02:21Z","timestamp":1598166141000},"page":"31715-31738","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["An image encryption scheme using sequence generated by interval bisection of polynomial function"],"prefix":"10.1007","volume":"79","author":[{"given":"Priyajit","family":"Biswas","sequence":"first","affiliation":[]},{"given":"Shyamalendu","family":"Kandar","sequence":"additional","affiliation":[]},{"given":"Bibhas Chandra","family":"Dhara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,23]]},"reference":[{"key":"9497_CR1","doi-asserted-by":"publisher","first-page":"7782","DOI":"10.1016\/j.optcom.2015.03.079","volume":"350","author":"A Akhavan","year":"2015","unstructured":"Akhavan A, Samsudin A, Akhshani A (2015) Cryptanalysis of \u2018an improvement over an image encryption method based on total shuffling\u2019. Opt Commun 350:7782","journal-title":"Opt Commun"},{"issue":"3","key":"9497_CR2","first-page":"251259","volume":"4","author":"C Alexopoulos","year":"1995","unstructured":"Alexopoulos C, Bourbakis NG, Ioannou N (1995) Image encryption method using a class of fractals. Journal of Electronic Imaging 4(3):251259","journal-title":"Journal of Electronic Imaging"},{"issue":"1-2","key":"9497_CR3","doi-asserted-by":"publisher","first-page":"5054","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1998","unstructured":"Baptista MS (1998) Cryptography with chaos. Phys Lett A 240 (1-2):5054","journal-title":"Phys Lett A"},{"key":"9497_CR4","doi-asserted-by":"publisher","first-page":"96109","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao W, Zhou Y, Chen CL Philip, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96109","journal-title":"Signal Process"},{"key":"9497_CR5","doi-asserted-by":"publisher","first-page":"197213","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using dna sequence operations. Opt Lasers Eng 88:197213","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"9497_CR6","doi-asserted-by":"publisher","first-page":"020504","DOI":"10.1088\/1674-1056\/26\/2\/020504","volume":"26","author":"X-L Chai","year":"2017","unstructured":"Chai X-L, Gan Z-H, Yuan K, Lu Y, Chen Y-R (2017) An image encryption scheme based on three-dimensional brownian motion and chaotic system. Chinese Physics B 26(2):020504","journal-title":"Chinese Physics B"},{"key":"9497_CR7","doi-asserted-by":"publisher","first-page":"124144","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"X Chai","year":"2018","unstructured":"Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124144","journal-title":"Signal Process"},{"issue":"07","key":"9497_CR8","doi-asserted-by":"publisher","first-page":"14651466","DOI":"10.1142\/S0218127499001024","volume":"9","author":"G Chen","year":"1999","unstructured":"Chen G, Ueta T (1999) Yet another chaotic attractor. International Journal of Bifurcation and chaos 9(07):14651466","journal-title":"International Journal of Bifurcation and chaos"},{"key":"9497_CR9","doi-asserted-by":"publisher","first-page":"191204","DOI":"10.1016\/j.optlaseng.2014.11.017","volume":"67","author":"J Chen","year":"2015","unstructured":"Chen J, Zhu Z, Fu C, Yu H, Zhang L (2015) An efficient image encryption scheme using gray code based permutation approach. Opt Lasers Eng 67:191204","journal-title":"Opt Lasers Eng"},{"key":"9497_CR10","doi-asserted-by":"crossref","unstructured":"Das SK, Dhara BC (2017) A new image encryption method using circle 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, p 16","DOI":"10.1109\/ICCCNT.2017.8203912"},{"key":"9497_CR11","first-page":"314327","volume":"355","author":"A-V Diaconu","year":"2016","unstructured":"Diaconu A-V (2016) Circular inter\u2013intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314327","journal-title":"Inf Sci"},{"key":"9497_CR12","doi-asserted-by":"publisher","first-page":"144157","DOI":"10.1016\/j.image.2015.10.004","volume":"41","author":"S El Assad","year":"2016","unstructured":"El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144157","journal-title":"Signal Process Image Commun"},{"key":"9497_CR13","doi-asserted-by":"publisher","first-page":"5155","DOI":"10.1016\/j.optcom.2012.07.052","volume":"286","author":"Z Eslami","year":"2013","unstructured":"Eslami Z, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:5155","journal-title":"Opt Commun"},{"issue":"06","key":"9497_CR14","doi-asserted-by":"publisher","first-page":"12591284","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and chaos 8(06):12591284","journal-title":"International Journal of Bifurcation and chaos"},{"issue":"6","key":"9497_CR15","doi-asserted-by":"publisher","first-page":"73057326","DOI":"10.1007\/s11042-017-4634-9","volume":"77","author":"M Ghebleh","year":"2018","unstructured":"Ghebleh M, Kanso A, Stevanovi\u0107 D (2018) A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation. Multimedia Tools and Applications 77(6):73057326","journal-title":"Multimedia Tools and Applications"},{"key":"9497_CR16","unstructured":"Guo J-I, et al (2000) A new chaotic key-based design for image encryption and decryption Circuits and Systems, 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on, vol 4, IEEE, p 4952"},{"issue":"1","key":"9497_CR17","doi-asserted-by":"publisher","first-page":"5166","DOI":"10.1007\/s11071-016-3024-6","volume":"87","author":"T Hu","year":"2017","unstructured":"Hu T, Liu Y, Gong L-H, Ouyang C-J (2017) An image encryption scheme combining chaos with cycle operation for dna sequences. Nonlinear Dynamics 87(1):5166","journal-title":"Nonlinear Dynamics"},{"key":"9497_CR18","doi-asserted-by":"publisher","first-page":"134144","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134144","journal-title":"Signal Process"},{"issue":"9","key":"9497_CR19","first-page":"25762579","volume":"57","author":"I Hussain","year":"2013","unstructured":"Hussain I, Shah T, Gondal MA (2013) Application of s-box and chaotic map for image encryption. Math Comput Model 57(9):25762579","journal-title":"Math Comput Model"},{"issue":"5","key":"9497_CR20","doi-asserted-by":"publisher","first-page":"261265","DOI":"10.1016\/S0020-0190(96)00168-8","volume":"60","author":"J Jinn-Ke","year":"1996","unstructured":"Jinn-Ke J, Yuh-Min T (1996) On the security of image encryption method. Inf Process Lett 60(5):261265","journal-title":"Inf Process Lett"},{"issue":"1","key":"9497_CR21","doi-asserted-by":"publisher","first-page":"2942","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):2942","journal-title":"Cryptologia"},{"key":"9497_CR22","doi-asserted-by":"crossref","unstructured":"Mozaffari S (2018) Parallel image encryption with bitplane decomposition and genetic algorithm. Multimedia Tools and Applications, pp 121","DOI":"10.1007\/s11042-018-5817-8"},{"key":"9497_CR23","doi-asserted-by":"publisher","first-page":"2432","DOI":"10.1016\/j.optlaseng.2018.05.009","volume":"110","author":"H Nematzadeh","year":"2018","unstructured":"Nematzadeh H, Enayatifar R, Motameni H, Guimar\u00e3es FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Opt Lasers Eng 110:2432","journal-title":"Opt Lasers Eng"},{"issue":"9","key":"9497_CR24","doi-asserted-by":"publisher","first-page":"926934","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image and vision computing 24(9):926934","journal-title":"Image and vision computing"},{"key":"9497_CR25","doi-asserted-by":"publisher","first-page":"165171","DOI":"10.1016\/j.procs.2017.12.023","volume":"125","author":"SK Pujari","year":"2018","unstructured":"Pujari S K, Bhattacharjee G, Bhoi S (2018) A hybridized model for image encryption through genetic algorithm and dna sequence. Procedia Computer Science 125:165171","journal-title":"Procedia Computer Science"},{"issue":"7","key":"9497_CR26","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and fourier plane random encoding. Opt Lett 20(7):767\u2013769","journal-title":"Opt Lett"},{"key":"9497_CR27","doi-asserted-by":"crossref","unstructured":"Singar CP, Bharti J, Pateriya RK (2017) Image encryption based on cell shuffling and scanning techniques Recent Innovations in Signal processing and Embedded Systems (RISE), 2017 International Conference on, IEEE, p 257263","DOI":"10.1109\/RISE.2017.8378163"},{"issue":"05","key":"9497_CR28","doi-asserted-by":"publisher","first-page":"14051413","DOI":"10.1142\/S0218127410026563","volume":"20","author":"E Solak","year":"2010","unstructured":"Solak E, okal C, Yildiz O T, BIYIKO GLU TURKER (2010) Cryptanalysis of fridrich\u2019s chaotic image encryption. International Journal of Bifurcation and Chaos 20(05):14051413","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"9497_CR29","doi-asserted-by":"crossref","unstructured":"Somaraj S, Hussain MA (2017) Image encryption using edge map and key image. Indian Journal of Science and Technology, 8(1)","DOI":"10.17485\/ijst\/2017\/v10i4\/110673"},{"issue":"9","key":"9497_CR30","doi-asserted-by":"publisher","first-page":"24562468","DOI":"10.1016\/j.cnsns.2009.09.023","volume":"15","author":"Y Tang","year":"2010","unstructured":"Tang Y, Wang Z, Fang J (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Commun Nonlinear Sci Numer Simul 15(9):24562468","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"12","key":"9497_CR31","doi-asserted-by":"publisher","first-page":"887889","DOI":"10.1364\/OL.25.000887","volume":"25","author":"G Unnikrishnan","year":"2000","unstructured":"Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double-random phase encoding in the fractional fourier domain. Optics letters 25(12):887889","journal-title":"Optics letters"},{"key":"9497_CR32","doi-asserted-by":"crossref","unstructured":"Verma G, Sinha A (2017) Optical image encryption system using nonlinear approach based on biometric authentication. J Mod Opt, pp 19","DOI":"10.1080\/09500340.2017.1287435"},{"key":"9497_CR33","doi-asserted-by":"crossref","unstructured":"Wang H, Ye J-M, Liang H-F, Miao Z-H (2017) A medical image encryption algorithm based on synchronization of time-delay chaotic system. Advances in Manufacturing, 17","DOI":"10.1007\/s40436-017-0178-5"},{"key":"9497_CR34","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.optcom.2018.01.018","volume":"415","author":"Q Wang","year":"2018","unstructured":"Wang Q, Xiong D, Alfalou A, Brosseau C (2018) Optical image encryption method based on incoherent imaging and polarized light encoding. Opt Commun 415:56\u201363","journal-title":"Opt Commun"},{"key":"9497_CR35","doi-asserted-by":"publisher","first-page":"150154","DOI":"10.1016\/j.sigpro.2016.10.002","volume":"132","author":"EY Xie","year":"2017","unstructured":"Xie EY, Li C, Yu S, L\u00fc J (2017) On the cryptanalysis of fridrich\u2019s chaotic image encryption scheme. Signal Process 132:150154","journal-title":"Signal Process"},{"key":"9497_CR36","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"key":"9497_CR37","first-page":"361377","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic s-box. Inf Sci 450:361377","journal-title":"Inf Sci"},{"issue":"12","key":"9497_CR38","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775\u20132780","journal-title":"Opt Commun"},{"key":"9497_CR39","doi-asserted-by":"publisher","first-page":"329351","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"Y-Q Zhang","year":"2014","unstructured":"Zhang Y-Q, Wang X-Y (2014) A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice. Inf Sci 273:329351","journal-title":"Inf Sci"},{"key":"9497_CR40","first-page":"1020","volume":"26","author":"Y-Q Zhang","year":"2015","unstructured":"Zhang Y-Q, Wang X-Y (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:1020","journal-title":"Appl Soft Comput"},{"key":"9497_CR41","first-page":"3650","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao Y, Zhu Z (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:3650","journal-title":"Signal Process"},{"key":"9497_CR42","doi-asserted-by":"publisher","first-page":"197207","DOI":"10.1016\/j.sigpro.2014.01.020","volume":"100","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Cao W, Chen CLP (2014) Image encryption using binary bitplane. Signal Process 100:197207","journal-title":"Signal Process"},{"issue":"6","key":"9497_CR43","doi-asserted-by":"publisher","first-page":"11711186","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"Z Zhu","year":"2011","unstructured":"Zhu Z, Zhang W, Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):11711186","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09497-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09497-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09497-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,22]],"date-time":"2021-08-22T23:09:51Z","timestamp":1629673791000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09497-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,23]]},"references-count":43,"journal-issue":{"issue":"43-44","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["9497"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09497-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,23]]},"assertion":[{"value":"31 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}