{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T21:26:43Z","timestamp":1770067603961,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09815-4","type":"journal-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T19:02:49Z","timestamp":1601665369000},"page":"4975-4997","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Breaking an image encryption scheme based on Arnold map and Lucas series"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7228-2818","authenticated-orcid":false,"given":"Imad","family":"El Hanouti","sequence":"first","affiliation":[]},{"given":"Hakim","family":"El Fadili","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Zenkouar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"9815_CR1","doi-asserted-by":"publisher","unstructured":"Ahmad J, Masood F, Shah SA, Jamal SS, Hussain I (2020) A novel secure occupancy monitoring scheme based on multi-chaos mapping. Symmetry (Basel) https:\/\/doi.org\/10.3390\/sym12030350, 12","DOI":"10.3390\/sym12030350"},{"key":"9815_CR2","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16:2129\u20132151. https:\/\/doi.org\/10.1142\/S0218127406015970","journal-title":"Int J Bifurc Chaos"},{"key":"9815_CR3","doi-asserted-by":"crossref","unstructured":"Arroyo D, Alvarez G, Li S (2009). Some hints for the design of digital chaos-based cryptosystems: lessons learned from cryptanalysis. In: IFAC proceedings volumes (IFAC-PapersOnline)","DOI":"10.3182\/20090622-3-UK-3004.00034"},{"key":"9815_CR4","doi-asserted-by":"publisher","first-page":"27611","DOI":"10.1007\/s11042-019-07881-x","volume":"78","author":"SI Batool","year":"2019","unstructured":"Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78:27611\u201327637. https:\/\/doi.org\/10.1007\/s11042-019-07881-x","journal-title":"Multimed Tools Appl"},{"key":"9815_CR5","doi-asserted-by":"crossref","unstructured":"Bin Muhaya F, Usama M, Khan MK (2009). Modified AES using chaotic key generator for satellite imagery encryption. In: lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)","DOI":"10.1007\/978-3-642-04070-2_107"},{"key":"9815_CR6","doi-asserted-by":"publisher","first-page":"35493","DOI":"10.1007\/s11042-019-08108-9","volume":"78","author":"M Boussif","year":"2019","unstructured":"Boussif M, Aloui N, Cherif A (2019) Images encryption algorithm based on the quaternion multiplication and the XOR operation. Multimed Tools Appl 78:35493\u201335510. https:\/\/doi.org\/10.1007\/s11042-019-08108-9","journal-title":"Multimed Tools Appl"},{"key":"9815_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1198\/tas.2011.10191","volume":"65","author":"LD Broemeling","year":"2011","unstructured":"Broemeling LD (2011) An account of early statistical inference in Arab cryptology. Am Stat 65:255\u2013257. https:\/\/doi.org\/10.1198\/tas.2011.10191","journal-title":"Am Stat"},{"key":"9815_CR8","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2018.1701148","volume":"56","author":"M Du","year":"2018","unstructured":"Du M, Wang K, Chen Y et al (2018) Big data privacy preserving in multi-access edge computing for heterogeneous internet of things. IEEE Commun Mag 56:62\u201367. https:\/\/doi.org\/10.1109\/MCOM.2018.1701148","journal-title":"IEEE Commun Mag"},{"key":"9815_CR9","unstructured":"Dunlap RA (2010). The Golden ratio and Fibonacci numbers"},{"key":"9815_CR10","doi-asserted-by":"publisher","first-page":"603","DOI":"10.2307\/2324989","volume":"99","author":"FJ Dyson","year":"1992","unstructured":"Dyson FJ, Falk H (1992) Period of a discrete cat mapping. Am Math Mon 99:603. https:\/\/doi.org\/10.2307\/2324989","journal-title":"Am Math Mon"},{"key":"9815_CR11","doi-asserted-by":"publisher","first-page":"28225","DOI":"10.1007\/s11042-018-6015-4","volume":"77","author":"M Farajallah","year":"2018","unstructured":"Farajallah M, El Assad S, Deforges O (2018) Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Multimed Tools Appl 77:28225\u201328248. https:\/\/doi.org\/10.1007\/s11042-018-6015-4","journal-title":"Multimed Tools Appl"},{"key":"9815_CR12","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1016\/j.physleta.2010.12.065","volume":"375","author":"X Ge","year":"2011","unstructured":"Ge X, Liu F, Lu B, Wang W (2011) Cryptanalysis of a spatiotemporal chaotic image\/video cryptosystem and its improved version. Phys Lett Sect A Gen At Solid State Phys 375:908\u2013913. https:\/\/doi.org\/10.1016\/j.physleta.2010.12.065","journal-title":"Phys Lett Sect A Gen At Solid State Phys"},{"key":"9815_CR13","doi-asserted-by":"crossref","unstructured":"Hraoui S, Gmira F, Abbou MF, et al (2019) A new cryptosystem of color image using a dynamic-Chaos Hill cipher algorithm. In: Procedia Computer Science","DOI":"10.1016\/j.procs.2019.01.048"},{"key":"9815_CR14","doi-asserted-by":"crossref","unstructured":"Hraoui S, Gmira F, Jarar AO, et al (2013). Benchmarking AES and chaos based logistic map for image encryption. In: Proceedings of IEEE\/ACS International Conference on Computer Systems and Applications, AICCSA","DOI":"10.1109\/AICCSA.2013.6616441"},{"key":"9815_CR15","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TIFS.2015.2489178","volume":"11","author":"A Jolfaei","year":"2016","unstructured":"Jolfaei A, Wu XW, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forensics Secur 11:235\u2013246. https:\/\/doi.org\/10.1109\/TIFS.2015.2489178","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9815_CR16","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11042-010-0571-6","volume":"55","author":"C Lamy-Bergot","year":"2011","unstructured":"Lamy-Bergot C, Fracchia R, Mazzotti M, Moretti S, Piri E, Sutinen T, Zuo J, Vehkaper\u00e4 J, Feher G, Jeney G, Panza G, Amon P (2011) Optimisation of multimedia over wireless IP links via X-layer design: an end-to-end transmission chain simulator. Multimed Tools Appl 55:261\u2013288. https:\/\/doi.org\/10.1007\/s11042-010-0571-6","journal-title":"Multimed Tools Appl"},{"key":"9815_CR17","doi-asserted-by":"publisher","first-page":"537","DOI":"10.2307\/1853680","volume":"74","author":"K Larew","year":"1968","unstructured":"Larew K, Kahn D (1968) The Codebreakers: the story of secret writing. Am Hist Rev 74:537. https:\/\/doi.org\/10.2307\/1853680","journal-title":"Am Hist Rev"},{"key":"9815_CR18","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1016\/j.imavis.2008.09.004","volume":"27","author":"C Li","year":"2009","unstructured":"Li C, Li S, Chen G, Halang WA (2009) Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis Comput 27:1035\u20131039. https:\/\/doi.org\/10.1016\/j.imavis.2008.09.004","journal-title":"Image Vis Comput"},{"key":"9815_CR19","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1016\/j.jss.2007.07.037","volume":"81","author":"S Li","year":"2008","unstructured":"Li S, Li C, Chen G, Lo KT (2008) Cryptanalysis of the RCES\/RSES image encryption scheme. J Syst Softw 81:1130\u20131143. https:\/\/doi.org\/10.1016\/j.jss.2007.07.037","journal-title":"J Syst Softw"},{"key":"9815_CR20","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MMUL.2017.4031322","volume":"24","author":"H Li","year":"2017","unstructured":"Li H, Wang K, Liu X, Sun Y, Guo S (2017) A selective privacy-preserving approach for multimedia data. IEEE Multimed 24:14\u201325. https:\/\/doi.org\/10.1109\/MMUL.2017.4031322","journal-title":"IEEE Multimed"},{"key":"9815_CR21","doi-asserted-by":"publisher","first-page":"102361","DOI":"10.1016\/j.jisa.2019.102361","volume":"48","author":"C Li","year":"2019","unstructured":"Li C, Zhang Y, Xie EY (2019) When an attacker meets a cipher-image in 2018: a year in review. J Inf Secur Appl 48:102361. https:\/\/doi.org\/10.1016\/j.jisa.2019.102361","journal-title":"J Inf Secur Appl"},{"key":"9815_CR22","doi-asserted-by":"publisher","first-page":"2509","DOI":"10.1016\/j.chaos.2007.10.054","volume":"40","author":"S Lian","year":"2009","unstructured":"Lian S (2009) Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons Fractals 40:2509\u20132519. https:\/\/doi.org\/10.1016\/j.chaos.2007.10.054","journal-title":"Chaos, Solitons Fractals"},{"key":"9815_CR23","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s11042-007-0150-7","volume":"38","author":"S Lian","year":"2008","unstructured":"Lian S, Sun J, Liu G, Wang Z (2008) Efficient video encryption scheme based on advanced video coding. Multimed Tools Appl 38:75\u201389. https:\/\/doi.org\/10.1007\/s11042-007-0150-7","journal-title":"Multimed Tools Appl"},{"key":"9815_CR24","doi-asserted-by":"publisher","first-page":"20511","DOI":"10.1007\/s11042-018-6824-5","volume":"78","author":"Z Lin","year":"2019","unstructured":"Lin Z, Liu J, Lian J, Ma Y, Zhang X (2019) A novel fast image encryption algorithm for embedded systems. Multimed Tools Appl 78:20511\u201320531. https:\/\/doi.org\/10.1007\/s11042-018-6824-5","journal-title":"Multimed Tools Appl"},{"key":"9815_CR25","doi-asserted-by":"publisher","unstructured":"Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020). A novel hybrid secure image encryption based on Julia set of fractals and 3D lorenz chaotic map. Entropy. https:\/\/doi.org\/10.3390\/e22030274, 22","DOI":"10.3390\/e22030274"},{"key":"9815_CR26","doi-asserted-by":"publisher","unstructured":"Masood F, Boulila W, Ahmad J, Arshad, Sankar S., Rubaiee S., Buchanan W.J. (2020). A novel privacy approach of digital aerial images based on mersenne twister method with DNA genetic encoding and chaos. Remote Sens https:\/\/doi.org\/10.3390\/rs12111893, 12","DOI":"10.3390\/rs12111893"},{"key":"9815_CR27","unstructured":"Nance J (2011). Periods of the discretized Arnold cat map and its extension to n dimensions. arXiv Prepr arXiv11112984"},{"key":"9815_CR28","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1007\/s11071-014-1517-8","volume":"78","author":"F \u00d6zkaynak","year":"2014","unstructured":"\u00d6zkaynak F, Yavuz S (2014) Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn 78:1311\u20131320. https:\/\/doi.org\/10.1007\/s11071-014-1517-8","journal-title":"Nonlinear Dyn"},{"key":"9815_CR29","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","volume":"13","author":"M Preishuber","year":"2018","unstructured":"Preishuber M, Hutter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensics Secur 13:2137\u20132150. https:\/\/doi.org\/10.1109\/TIFS.2018.2812080","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9815_CR30","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","volume":"13","author":"M Preishuber","year":"2018","unstructured":"Preishuber M, Hutter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of Chaos-based image and video encryption. IEEE Trans Inf Forensics Secur 13:2137\u20132150. https:\/\/doi.org\/10.1109\/TIFS.2018.2812080","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9815_CR31","doi-asserted-by":"publisher","first-page":"5790","DOI":"10.1016\/j.physleta.2008.07.042","volume":"372","author":"R Rhouma","year":"2008","unstructured":"Rhouma R, Belghith S (2008) Cryptanalysis of a spatiotemporal chaotic image\/video cryptosystem. Phys Lett Sect A Gen At Solid State Phys 372:5790\u20135794. https:\/\/doi.org\/10.1016\/j.physleta.2008.07.042","journal-title":"Phys Lett Sect A Gen At Solid State Phys"},{"key":"9815_CR32","doi-asserted-by":"publisher","first-page":"26073","DOI":"10.1007\/s11042-019-07766-z","volume":"78","author":"HR Shakir","year":"2019","unstructured":"Shakir HR (2019) An image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling. Multimed Tools Appl 78:26073\u201326087. https:\/\/doi.org\/10.1007\/s11042-019-07766-z","journal-title":"Multimed Tools Appl"},{"key":"9815_CR33","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656\u2013715. https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst Tech J"},{"key":"9815_CR34","doi-asserted-by":"crossref","unstructured":"Subramanyan B, Chhabria VM, Sankar Babu TG (2011). Image encryption based on AES key expansion. In: proceedings - 2nd international conference on emerging applications of information technology, EAIT 2011","DOI":"10.1109\/EAIT.2011.60"},{"key":"9815_CR35","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s11277-014-1888-7","volume":"79","author":"SM Wadi","year":"2014","unstructured":"Wadi SM, Zainal N (2014) High definition image encryption algorithm based on AES modification. Wirel Pers Commun 79:811\u2013829. https:\/\/doi.org\/10.1007\/s11277-014-1888-7","journal-title":"Wirel Pers Commun"},{"key":"9815_CR36","doi-asserted-by":"publisher","unstructured":"Wightman AS (1968). Problemes Ergodiques de la Mecanique Classique. V. I. Arnold and A. Avez. Gauthier-Villars, Paris, 1967. iv + 243 pp., illus. Paper, 48 F. Monographies Internationales de Mathematiques Modernes. Science (80- ). https:\/\/doi.org\/10.1126\/science.159.3821.1344","DOI":"10.1126\/science.159.3821.1344"},{"key":"9815_CR37","unstructured":"Wu Y, Noonan JP, Agaian S (2011). NPCR and UACI randomness tests for image encryption. cyberjournals.com"},{"key":"9815_CR38","doi-asserted-by":"publisher","first-page":"31303","DOI":"10.1007\/s11042-019-07894-6","volume":"78","author":"Y Zhang","year":"2019","unstructured":"Zhang Y (2019) Security analysis of a chaos triggered image encryption scheme. Multimed Tools Appl 78:31303\u201331318. https:\/\/doi.org\/10.1007\/s11042-019-07894-6","journal-title":"Multimed Tools Appl"},{"key":"9815_CR39","doi-asserted-by":"publisher","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik (Stuttg) 124:3596\u20133600. https:\/\/doi.org\/10.1016\/j.ijleo.2012.11.018","journal-title":"Optik (Stuttg)"},{"key":"9815_CR40","doi-asserted-by":"publisher","first-page":"2066","DOI":"10.1016\/j.cnsns.2012.12.012","volume":"18","author":"W Zhang","year":"2013","unstructured":"Zhang W, Wo WK, Yu H, Liang ZZ (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18:2066\u20132080. https:\/\/doi.org\/10.1016\/j.cnsns.2012.12.012","journal-title":"Commun Nonlinear Sci Numer Simul"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09815-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09815-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09815-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T01:11:36Z","timestamp":1633137096000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09815-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,2]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9815"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09815-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,2]]},"assertion":[{"value":"9 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}