{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T03:52:56Z","timestamp":1774669976325,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T00:00:00Z","timestamp":1600905600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T00:00:00Z","timestamp":1600905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09854-x","type":"journal-article","created":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T21:02:45Z","timestamp":1600981365000},"page":"3749-3773","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":62,"title":["A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3460-6989","authenticated-orcid":false,"given":"Vijay","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Ashish","family":"Girdhar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,24]]},"reference":[{"issue":"02","key":"9854_CR1","doi-asserted-by":"crossref","first-page":"101","DOI":"10.4236\/cs.2011.22015","volume":"02","author":"Q Alsafasfeh","year":"2011","unstructured":"Alsafasfeh Q, Al-Arni M (2011) A new chaotic behavior from Lorenz and Rossler systems and its electronic circuit implementation. Circ Systems 02(02):101\u2013105","journal-title":"Circ Systems"},{"issue":"3","key":"9854_CR2","doi-asserted-by":"crossref","first-page":"3649","DOI":"10.1007\/s11042-017-5537-5","volume":"78","author":"MA Alsmirat","year":"2018","unstructured":"Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2018) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649\u20133688","journal-title":"Multimed Tools Appl"},{"key":"9854_CR3","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.cnsns.2017.12.017","volume":"60","author":"S Amina","year":"2018","unstructured":"Amina S, Mohamed FK (2018) An efficient and secure chaotic cipher algorithm for image content preservation. Commun Nonlinear Sci Numer Simul 60:12\u201332","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"9854_CR4","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"key":"9854_CR5","doi-asserted-by":"crossref","unstructured":"Cao YY, Fu C (2008) An image encryption scheme based on high dimension chaos system, International Conference on Intelligent Computation Technology and Automation, vol. 1, pp. 104\u2013108, Changsha, Hunan, China October","DOI":"10.1109\/ICICTA.2008.397"},{"key":"9854_CR6","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122\u2013133","journal-title":"Signal Process"},{"issue":"3","key":"9854_CR7","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749\u2013761","journal-title":"Chaos, Solitons Fractals"},{"issue":"01","key":"9854_CR8","doi-asserted-by":"crossref","first-page":"1450069","DOI":"10.1142\/S0129183114500697","volume":"26","author":"A Del Rey","year":"2015","unstructured":"Del Rey A, S\u00e1nchez G (2015) An image encryption algorithm based on 3D cellular automata and chaotic maps. Int J Modern Physics C 26(01):1450069","journal-title":"Int J Modern Physics C"},{"key":"9854_CR9","doi-asserted-by":"crossref","unstructured":"Elabady NF, Abdalkader HM, Moussa MI, Sabbeh SF (2015) Image encryption based on new one-dimensional chaotic map. ICET, 2nd International Conference on Engineering and Technology, pp 851\u2013892","DOI":"10.1109\/ICEngTechnol.2014.7016811"},{"key":"9854_CR10","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah A, Isnin I (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83\u201393","journal-title":"Opt Lasers Eng"},{"key":"9854_CR11","doi-asserted-by":"crossref","first-page":"105777","DOI":"10.1016\/j.optlastec.2019.105777","volume":"121","author":"MB Farah","year":"2020","unstructured":"Farah MB, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:105777","journal-title":"Opt Laser Technol"},{"issue":"4","key":"9854_CR12","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"T Gao","year":"2008","unstructured":"Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394\u2013400","journal-title":"Phys Lett A"},{"issue":"04","key":"9854_CR13","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1142\/S0129183106008625","volume":"17","author":"T Gao","year":"2006","unstructured":"Gao T, Chen Z, Yuan Z, Chen G (2006) A Hyperchaos generated from Chen\u2019s system. Int J Modern Physics C 17(04):471\u2013478","journal-title":"Int J Modern Physics C"},{"issue":"4","key":"9854_CR14","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MCOM.2018.1700817","volume":"56","author":"A Ghoneim","year":"2018","unstructured":"Ghoneim A, Muhammad G, Amin SU, Gupta B (2018) Medical image forgery detection for smart healthcare. IEEE Commun Mag 56(4):33\u201337","journal-title":"IEEE Commun Mag"},{"issue":"20","key":"9854_CR15","doi-asserted-by":"crossref","first-page":"27017","DOI":"10.1007\/s11042-018-5902-z","volume":"77","author":"A Girdhar","year":"2018","unstructured":"Girdhar A, Kumar V (2018) A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences. Multimed Tools Appl 77(20):27017\u201327039","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"9854_CR16","doi-asserted-by":"crossref","first-page":"4947","DOI":"10.1007\/s12652-019-01179-4","volume":"10","author":"A Girdhar","year":"2019","unstructured":"Girdhar A, Kumar V (2019) A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map. J Ambient Intell Humaniz Comput 10(12):4947\u20134961","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"9854_CR17","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1504\/IJHPCN.2019.097508","volume":"13","author":"NEH Gol\u00e9a","year":"2019","unstructured":"Gol\u00e9a NEH, Melkemi KE (2019) ROI-based fragile watermarking for medical image tamper detection. Int J High Perform Comput Netw 13(2):199","journal-title":"Int J High Perform Comput Netw"},{"issue":"18","key":"9854_CR18","first-page":"27","volume":"85","author":"R Gupta","year":"2014","unstructured":"Gupta R, Jain A (2014) A new image encryption algorithm based on DNA approach. Int J Comp Appl 85(18):27\u201331","journal-title":"Int J Comp Appl"},{"key":"9854_CR19","unstructured":"Gupta S, Jain A (2015) Efficient image encryption algorithm using DNA approach, 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 726\u2013731"},{"key":"9854_CR20","doi-asserted-by":"crossref","first-page":"12452","DOI":"10.1109\/ACCESS.2020.2965740","volume":"8","author":"X Hu","year":"2020","unstructured":"Hu X, Wei L, Chen W, Chen Q, Guo Y (2020) Color image encryption algorithm based on dynamic Chaos and matrix convolution. IEEE Access 8:12452\u201312466","journal-title":"IEEE Access"},{"key":"9854_CR21","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"9854_CR22","unstructured":"IEEE Standard for Floating-Point Arithmetic - IEEE Xplore Document (2017) Ieeexplore.ieee.org. [Online]. Available: http:\/\/ieeexplore.ieee.org\/document\/4610935\/. (Accessed: 06 Jan 2017)"},{"key":"9854_CR23","doi-asserted-by":"crossref","unstructured":"Kadhim F, Majeed G, Ali R (2016) Proposal new s-box depending on DNA computing and mathematical operations. In Multidisciplinary in IT and communication science and applications (AICMITCSA), pp 1\u20136","DOI":"10.1109\/AIC-MITCSA.2016.7759926"},{"issue":"3","key":"9854_CR24","first-page":"22","volume":"9","author":"A Kumar","year":"2019","unstructured":"Kumar A (2019) Design of Secure Image Fusion Technique Using Cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput 9(3):22\u201336","journal-title":"Int J Cloud Appl Comput"},{"key":"9854_CR25","first-page":"20","volume":"21","author":"M Kumar","year":"2015","unstructured":"Kumar M, Powduri P, Reddy A (2015) An RGB image encryption using diffusion process associated with chaotic map. J Info Sec Appl 21:20\u201330","journal-title":"J Info Sec Appl"},{"key":"9854_CR26","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.sigpro.2016.01.017","volume":"125","author":"M Kumar","year":"2016","unstructured":"Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie\u2013Hellman cryptography. Signal Process 125:187\u2013202","journal-title":"Signal Process"},{"issue":"5","key":"9854_CR27","doi-asserted-by":"crossref","first-page":"2558","DOI":"10.1016\/j.ijleo.2015.11.221","volume":"127","author":"X Li","year":"2016","unstructured":"Li X, Wang L, Yan Y, Liu P (2016) An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems. Optik - Int J Light Electron Optics 127(5):2558\u20132565","journal-title":"Optik - Int J Light Electron Optics"},{"issue":"10","key":"9854_CR28","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320\u20133327","journal-title":"Comput Math Appl"},{"key":"9854_CR29","doi-asserted-by":"crossref","unstructured":"Liu HJ, Zhu ZL, Jiang HY, Wang BL (2009) A novel image encryption algorithm based on improved 3D chaotic cat map. In: The 9th International Conference for Young Computer Scientists, pp 3016\u20133021","DOI":"10.1109\/ICYCS.2008.449"},{"issue":"5","key":"9854_CR30","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240\u20131248","journal-title":"Comput Electr Eng"},{"issue":"5","key":"9854_CR31","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"issue":"1","key":"9854_CR32","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a \u201cchaotic\u201d encryption algorithm. Cryptologia 13(1):29\u201342","journal-title":"Cryptologia"},{"issue":"1","key":"9854_CR33","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/S0303-2647(99)00044-1","volume":"52","author":"AP Mills","year":"1999","unstructured":"Mills AP, Yurke B, Platzman PM (1999) Article for analog vector algebra computation. Biosystems 52(1):175\u2013180","journal-title":"Biosystems"},{"key":"9854_CR34","doi-asserted-by":"crossref","unstructured":"Mishra D, Sharma R, Kumar M, Kumar K (2014) Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT. Fractals 22(04) 1450011\u20131-14","DOI":"10.1142\/S0218348X1450011X"},{"key":"9854_CR35","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.sigpro.2014.10.033","volume":"109","author":"M Murillo-Escobar","year":"2015","unstructured":"Murillo-Escobar M, Cruz-Hern\u00e1ndez C, Abundiz-P\u00e9rez F, L\u00f3pez-Guti\u00e9rrez R, Acosta Del Campo O (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119\u2013131","journal-title":"Signal Process"},{"issue":"11","key":"9854_CR36","doi-asserted-by":"crossref","first-page":"14867","DOI":"10.1007\/s11042-018-6827-2","volume":"78","author":"F Musanna","year":"2018","unstructured":"Musanna F, Kumar S (2018) A novel fractional order chaos-based image encryption using fisher yates algorithm and 3-D cat map. Multimed Tools Appl 78(11):14867\u201314895","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"9854_CR37","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1016\/j.chaos.2005.11.057","volume":"32","author":"H Nien","year":"2007","unstructured":"Nien H, Huang C, Changchien S, Shieh H, Chen C, Tuan Y (2007) Digital color image encoding and decoding using a novel chaotic random generator. Chaos, Solitons Fractals 32(3):1070\u20131080","journal-title":"Chaos, Solitons Fractals"},{"key":"9854_CR38","first-page":"1","volume":"2017","author":"Y Niu","year":"2017","unstructured":"Niu Y, Zhang X, Han F (2017) Image encryption algorithm based on Hyperchaotic maps and nucleotide sequences database. Comput Intell Neurosci 2017:1\u20139","journal-title":"Comput Intell Neurosci"},{"key":"9854_CR39","unstructured":"Niyat A, HeiHei R, Jahan M (2015) A RGB image encryption algorithm based on DNA sequence operation and hyper-chaotic system. International Congress on Technology Communication and Knowledge (ICTCK), Mashhad, Iran"},{"issue":"9","key":"9854_CR40","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"N Pareek","year":"2006","unstructured":"Pareek N, Patidar V, Sud K (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926\u2013934","journal-title":"Image Vis Comput"},{"issue":"10","key":"9854_CR41","doi-asserted-by":"crossref","first-page":"1350071","DOI":"10.1142\/S012918311350071X","volume":"24","author":"P Ping","year":"2013","unstructured":"Ping P, Xu F, Wang Z (2013) Color Image Encryption Based On Two-Dimensional Cellular Automata. Int J Modern Physics C 24(10):1350071","journal-title":"Int J Modern Physics C"},{"key":"9854_CR42","doi-asserted-by":"crossref","unstructured":"Ping P, Mao Y, Lv X, Xu F, Xu G (2015) An image scrambling algorithm using discrete Henon map, IEEE International Conference on Information and Automation, Lijiang, Yunnan, China pp. 429\u2013432","DOI":"10.1109\/ICInfA.2015.7279326"},{"issue":"3","key":"9854_CR43","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/BF02916835","volume":"43","author":"D Qi","year":"2000","unstructured":"Qi D, Zou J, Han X (2000) A new class of scrambling transformation and its application in the image information covering. Sci China Series E: Technol Sci 43(3):304\u2013312","journal-title":"Sci China Series E: Technol Sci"},{"issue":"2","key":"9854_CR44","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.jare.2015.07.002","volume":"7","author":"A Radwan","year":"2016","unstructured":"Radwan A, AbdElHaleem S, Abd-El-Hafiz S (2016) Symmetric encryption algorithms using chaotic and non-chaotic generators: a review. J Adv Res 7(2):193\u2013208","journal-title":"J Adv Res"},{"issue":"10","key":"9854_CR45","doi-asserted-by":"crossref","first-page":"1450054","DOI":"10.1142\/S0129183114500545","volume":"25","author":"M Ram\u00edrez-Torres","year":"2014","unstructured":"Ram\u00edrez-Torres M, Murgu\u00eda J, Carlos M (2014) Image encryption with an improved cryptosystem based on a matrix approach. Int J Modern Physics C 25(10):1450054","journal-title":"Int J Modern Physics C"},{"key":"9854_CR46","doi-asserted-by":"crossref","unstructured":"Saranya MR, Mohan AK, Anusudha K (2014) A composite image cipher using DNA sequence and genetic algorithm, International Conference On Contemporary Computing and Informatics, Mysore, Karnataka, India, pp.1022\u20131026","DOI":"10.1109\/IC3I.2014.7019805"},{"key":"9854_CR47","doi-asserted-by":"crossref","unstructured":"Saranya MR, Mohan AK, Anusudha K (2015) Algorithm for enhanced image security using DNA and genetic algorithm, IEEE International Conference on Signal Processing Informatics Communication and Energy Systems, Kozhikode, Kerala, India, pp. 1\u20135","DOI":"10.1109\/SPICES.2015.7091462"},{"key":"9854_CR48","unstructured":"SIPI Image Database \u2013 Misc (2017) Sipi.usc.edu. [Online]. Available: http:\/\/sipi.usc.edu\/database\/database.php?volume=misc. (Accessed: 20- Jul- 2017)"},{"key":"9854_CR49","doi-asserted-by":"crossref","unstructured":"Srividhya N, Vino T (2016) Genome based highly secured image using DNA cryptography and trellis algorithm, International Conference on Wireless Communications, Signal Processing and Networking, pp. 1\u20136","DOI":"10.1109\/WiSPNET.2016.7566421"},{"issue":"4","key":"9854_CR50","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","volume":"41","author":"Y Wang","year":"2009","unstructured":"Wang Y, Wong K, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41(4):1773\u20131783","journal-title":"Chaos, Solitons Fractals"},{"issue":"1","key":"9854_CR51","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong K, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514\u2013522","journal-title":"Appl Soft Comput"},{"issue":"4","key":"9854_CR52","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101\u20131108","journal-title":"Signal Process"},{"key":"9854_CR53","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.optlaseng.2015.12.006","volume":"82","author":"X Wang","year":"2016","unstructured":"Wang X, Zhao Y, Zhang H, Guo K (2016) A novel color image encryption scheme using alternate chaotic mapping structure. Opt Lasers Eng 82:79\u201386","journal-title":"Opt Lasers Eng"},{"key":"9854_CR54","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.optlaseng.2015.07.015","volume":"77","author":"L Wang","year":"2016","unstructured":"Wang L, Song H, Liu P (2016) A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt Lasers Eng 77:118\u2013125","journal-title":"Opt Lasers Eng"},{"issue":"4356","key":"9854_CR55","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1038\/171737a0","volume":"171","author":"J Watson","year":"1953","unstructured":"Watson J, Crick F (1953) Molecular structure of nucleic acids: a structure for Deoxyribose nucleic acid. Nature 171(4356):737\u2013738","journal-title":"Nature"},{"issue":"2","key":"9854_CR56","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290\u2013299","journal-title":"J Syst Softw"},{"key":"9854_CR57","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.sigpro.2017.04.006","volume":"141","author":"J Wu","year":"2017","unstructured":"Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109\u2013124","journal-title":"Signal Process"},{"issue":"2","key":"9854_CR58","doi-asserted-by":"crossref","first-page":"023115","DOI":"10.1063\/1.2728112","volume":"17","author":"T Xiang","year":"2007","unstructured":"Xiang T, Wong K, Liao X (2007) Selective image encryption using a spatiotemporal chaotic system. Chaos: Interdisciplin J Nonlin Sci 17(2):023115","journal-title":"Chaos: Interdisciplin J Nonlin Sci"},{"key":"9854_CR59","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41\u201352","journal-title":"Opt Lasers Eng"},{"issue":"22","key":"9854_CR60","doi-asserted-by":"crossref","first-page":"5290","DOI":"10.1016\/j.optcom.2011.07.070","volume":"284","author":"R Ye","year":"2011","unstructured":"Ye R (2011) A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt Commun 284(22):5290\u20135298","journal-title":"Opt Commun"},{"key":"9854_CR61","doi-asserted-by":"crossref","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X, Ren X, Gupta B (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585\u20134608","journal-title":"Multimed Tools Appl"},{"key":"9854_CR62","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.optlaseng.2017.04.009","volume":"96","author":"R Zahmoul","year":"2017","unstructured":"Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39\u201349","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"9854_CR63","doi-asserted-by":"crossref","first-page":"404","DOI":"10.4103\/0256-4602.123123","volume":"30","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Wei X (2013) RGB Color Image Encryption Method Based on Lorenz Chaotic System and DNA Computation. IETE Technical Rev 30(5):404","journal-title":"IETE Technical Rev"},{"issue":"1","key":"9854_CR64","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74\u201382","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"3","key":"9854_CR65","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1016\/j.chaos.2004.09.035","volume":"24","author":"L Zhang","year":"2005","unstructured":"Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos, Solitons Fractals 24(3):759\u2013765","journal-title":"Chaos, Solitons Fractals"},{"issue":"11\u201312","key":"9854_CR66","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Mathematic Comput Model 52(11\u201312):2028\u20132035","journal-title":"Mathematic Comput Model"},{"key":"9854_CR67","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"issue":"6","key":"9854_CR68","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"Z Zhu","year":"2011","unstructured":"Zhu Z, Zhang W, Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171\u20131186","journal-title":"Inf Sci"},{"issue":"2","key":"9854_CR69","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JPHOT.2020.2981494","volume":"12","author":"Z Zhu","year":"2020","unstructured":"Zhu Z, Wu C, Wang J, Hu K, Chen X-D (2020) A novel 3D vector decomposition for color-image encryption. IEEE Photonics J 12(2):1\u201314","journal-title":"IEEE Photonics J"},{"key":"9854_CR70","doi-asserted-by":"crossref","first-page":"75728","DOI":"10.1109\/ACCESS.2020.2988880","volume":"8","author":"C Zou","year":"2020","unstructured":"Zou C, Zhang Q, Wei X, Liu C (2020) Image encryption based on improved Lorenz system. IEEE Access 8:75728\u201375740","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09854-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09854-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09854-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T07:41:19Z","timestamp":1632469279000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09854-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,24]]},"references-count":70,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9854"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09854-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,24]]},"assertion":[{"value":"31 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}