{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T15:34:11Z","timestamp":1768836851827,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:00:00Z","timestamp":1610064000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:00:00Z","timestamp":1610064000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10153-8","type":"journal-article","created":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T20:20:58Z","timestamp":1610137258000},"page":"12077-12099","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Security analysis of an audio data encryption scheme based on key chaining and DNA encoding"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7228-2818","authenticated-orcid":false,"given":"Imad","family":"El Hanouti","sequence":"first","affiliation":[]},{"given":"Hakim","family":"El Fadili","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,8]]},"reference":[{"key":"10153_CR1","doi-asserted-by":"publisher","unstructured":"Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Sci (80). https:\/\/doi.org\/10.1126\/science.7973651","DOI":"10.1126\/science.7973651"},{"key":"10153_CR2","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16:2129\u20132151. https:\/\/doi.org\/10.1142\/S0218127406015970","journal-title":"Int J Bifurc Chaos"},{"key":"10153_CR3","unstructured":"Arroyo D, Alvarez G, Fernandez V (2008) On the inadequacy of the logistic map for cryptographic applications. arXiv Prepr arXiv08054355"},{"key":"10153_CR4","doi-asserted-by":"publisher","unstructured":"Barua R, Misra J (2003) Binary arithmetic for DNA computers. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics). https:\/\/doi.org\/10.1007\/3-540-36440-4_11","DOI":"10.1007\/3-540-36440-4_11"},{"key":"10153_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.jksuci.2018.05.002","volume":"32","author":"EH Bensikaddour","year":"2020","unstructured":"Bensikaddour EH, Bentoutou Y, Taleb N (2020) Embedded implementation of multispectral satellite image encryption using a chaos-based block cipher. J King Saud Univ - Comput Inf Sci 32:50\u201356. https:\/\/doi.org\/10.1016\/j.jksuci.2018.05.002","journal-title":"J King Saud Univ - Comput Inf Sci"},{"key":"10153_CR6","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1023\/B:MTAP.0000033983.62130.00","volume":"24","author":"B Bhargava","year":"2004","unstructured":"Bhargava B, Shi C, Wang SY (2004) MPEG video encryption algorithms. Multimed Tools Appl 24:57\u201379. https:\/\/doi.org\/10.1023\/B:MTAP.0000033983.62130.00","journal-title":"Multimed Tools Appl"},{"key":"10153_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1198\/tas.2011.10191","volume":"65","author":"LD Broemeling","year":"2011","unstructured":"Broemeling LD (2011) An account of early statistical inference in Arab cryptology. Am Stat 65:255\u2013257. https:\/\/doi.org\/10.1198\/tas.2011.10191","journal-title":"Am Stat"},{"key":"10153_CR8","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/s11432-008-0102-5","volume":"51","author":"S Chen","year":"2008","unstructured":"Chen S, Zhong XX, Wu ZZ (2008) Chaos block cipher for wireless sensor network. Sci China, Ser F Inf Sci 51:1055\u20131063. https:\/\/doi.org\/10.1007\/s11432-008-0102-5","journal-title":"Sci China, Ser F Inf Sci"},{"key":"10153_CR9","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2018.1701148","volume":"56","author":"M Du","year":"2018","unstructured":"Du M, Wang K, Chen Y et al (2018) Big data privacy preserving in multi-access edge computing for heterogeneous internet of things. IEEE Commun Mag 56:62\u201367. https:\/\/doi.org\/10.1109\/MCOM.2018.1701148","journal-title":"IEEE Commun Mag"},{"key":"10153_CR10","doi-asserted-by":"publisher","unstructured":"El Hanouti I, El Fadili H, Zenkouar K (2020) Breaking an image encryption scheme based on Arnold map and Lucas series. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09815-4","DOI":"10.1007\/s11042-020-09815-4"},{"key":"10153_CR11","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s11042-012-1173-2","volume":"70","author":"AAA El-Latif","year":"2014","unstructured":"El-Latif AAA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70:1559\u20131584. https:\/\/doi.org\/10.1007\/s11042-012-1173-2","journal-title":"Multimed Tools Appl"},{"key":"10153_CR12","doi-asserted-by":"publisher","first-page":"17521","DOI":"10.1007\/s11042-018-7096-9","volume":"78","author":"MT Gencoglu","year":"2019","unstructured":"Gencoglu MT (2019) Embedded image coding using Laplace transform for Turkish letters. Multimed Tools Appl 78:17521\u201317534. https:\/\/doi.org\/10.1007\/s11042-018-7096-9","journal-title":"Multimed Tools Appl"},{"key":"10153_CR13","doi-asserted-by":"publisher","first-page":"20080","DOI":"10.1021\/ja208497p","volume":"133","author":"AJ Genot","year":"2011","unstructured":"Genot AJ, Bath J, Turberfield AJ (2011) Reversible logic circuits made of DNA. J Am Chem Soc 133:20080\u201320083. https:\/\/doi.org\/10.1021\/ja208497p","journal-title":"J Am Chem Soc"},{"key":"10153_CR14","doi-asserted-by":"publisher","first-page":"3425","DOI":"10.1007\/s11042-014-2443-y","volume":"75","author":"M Ghadi","year":"2016","unstructured":"Ghadi M, Laouamer L, Moulahi T (2016) Securing data exchange in wireless multimedia sensor networks: perspectives and challenges. Multimed Tools Appl 75:3425\u20133451. https:\/\/doi.org\/10.1007\/s11042-014-2443-y","journal-title":"Multimed Tools Appl"},{"key":"10153_CR15","doi-asserted-by":"crossref","unstructured":"Gupta V, Parthasarathy S, Zaki M (1999) Arithmetic and logic operations with DNA","DOI":"10.1090\/dimacs\/048\/11"},{"key":"10153_CR16","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/35.144777","volume":"30","author":"IW Habib","year":"2002","unstructured":"Habib IW, Saadawi TN (2002) Multimedia traffic characteristics in broadband networks. IEEE Commun Mag 30:48\u201354. https:\/\/doi.org\/10.1109\/35.144777","journal-title":"IEEE Commun Mag"},{"key":"10153_CR17","doi-asserted-by":"publisher","unstructured":"Hraoui S, Gmira F, Jarar AO, Satori K, Saaidi A (2013) Benchmarking AES and chaos based logistic map for image encryption. In: Proceedings of IEEE\/ACS International Conference on Computer Systems and Applications, AICCSA. https:\/\/doi.org\/10.1109\/AICCSA.2013.6616441","DOI":"10.1109\/AICCSA.2013.6616441"},{"key":"10153_CR18","unstructured":"Iqbal S, Malik M, Iqbal S, Muhammad O, Sher H (2008) Study of nonlinear dynamics using logistic map. In: LUMS 2nd international conference on mathematics and its applications in information technology (LICM08)"},{"key":"10153_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.micpro.2017.10.013","volume":"56","author":"S Janakiraman","year":"2018","unstructured":"Janakiraman S, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Lightweight chaotic image encryption algorithm for real-time embedded system: implementation and analysis on 32-bit microcontroller. Microprocess Microsyst 56:1\u201312. https:\/\/doi.org\/10.1016\/j.micpro.2017.10.013","journal-title":"Microprocess Microsyst"},{"key":"10153_CR20","unstructured":"Kerckhoffs A (1883) Auguste Kerckhoffs \u201cLa cryptographie militaire.\u201d Des Sci Mil"},{"key":"10153_CR21","doi-asserted-by":"publisher","first-page":"537","DOI":"10.2307\/1853680","volume":"74","author":"K Larew","year":"1968","unstructured":"Larew K, Kahn D (1968) The Codebreakers: the story of secret writing. Am Hist Rev 74:537. https:\/\/doi.org\/10.2307\/1853680","journal-title":"Am Hist Rev"},{"key":"10153_CR22","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1016\/j.jss.2007.07.037","volume":"81","author":"S Li","year":"2008","unstructured":"Li S, Li C, Chen G, Lo KT (2008) Cryptanalysis of the RCES\/RSES image encryption scheme. J Syst Softw 81:1130\u20131143. https:\/\/doi.org\/10.1016\/j.jss.2007.07.037","journal-title":"J Syst Softw"},{"key":"10153_CR23","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MMUL.2017.4031322","volume":"24","author":"H Li","year":"2017","unstructured":"Li H, Wang K, Liu X, Sun Y, Guo S (2017) A selective privacy-preserving approach for multimedia data. IEEE Multimed 24:14\u201325. https:\/\/doi.org\/10.1109\/MMUL.2017.4031322","journal-title":"IEEE Multimed"},{"key":"10153_CR24","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1007\/s11071-014-1533-8","volume":"78","author":"C Li","year":"2014","unstructured":"Li C, Xie T, Liu Q, Cheng G (2014) Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn 78:1545\u20131551. https:\/\/doi.org\/10.1007\/s11071-014-1533-8","journal-title":"Nonlinear Dyn"},{"key":"10153_CR25","doi-asserted-by":"publisher","first-page":"20511","DOI":"10.1007\/s11042-018-6824-5","volume":"78","author":"Z Lin","year":"2019","unstructured":"Lin Z, Liu J, Lian J, Ma Y, Zhang X (2019) A novel fast image encryption algorithm for embedded systems. Multimed Tools Appl 78:20511\u201320531. https:\/\/doi.org\/10.1007\/s11042-018-6824-5","journal-title":"Multimed Tools Appl"},{"key":"10153_CR26","doi-asserted-by":"publisher","unstructured":"Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A novel hybrid secure image encryption based on Julia set of fractals and 3D lorenz chaotic map. Entropy. https:\/\/doi.org\/10.3390\/e22030274","DOI":"10.3390\/e22030274"},{"key":"10153_CR27","doi-asserted-by":"publisher","first-page":"18295","DOI":"10.1007\/s11042-017-5376-4","volume":"77","author":"D Mishra","year":"2018","unstructured":"Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SKH, Gope P (2018) Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 77:18295\u201318325. https:\/\/doi.org\/10.1007\/s11042-017-5376-4","journal-title":"Multimed Tools Appl"},{"key":"10153_CR28","doi-asserted-by":"publisher","first-page":"25019","DOI":"10.1007\/s11042-019-7696-z","volume":"78","author":"PK Naskar","year":"2019","unstructured":"Naskar PK, Paul S, Nandy D, Chaudhuri A (2019) DNA encoding and channel shuffling for secured encryption of audio data. Multimed Tools Appl 78:25019\u201325042. https:\/\/doi.org\/10.1007\/s11042-019-7696-z","journal-title":"Multimed Tools Appl"},{"key":"10153_CR29","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s11071-018-4056-x","volume":"92","author":"F \u00d6zkaynak","year":"2018","unstructured":"\u00d6zkaynak F (2018) Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn 92:305\u2013313. https:\/\/doi.org\/10.1007\/s11071-018-4056-x","journal-title":"Nonlinear Dyn"},{"key":"10153_CR30","unstructured":"Reif JH (1998) Paradigms for biomolecular computation. In: Unconventional models of computation. Springer, New york, pp. 72\u201393"},{"key":"10153_CR31","doi-asserted-by":"publisher","first-page":"26073","DOI":"10.1007\/s11042-019-07766-z","volume":"78","author":"HR Shakir","year":"2019","unstructured":"Shakir HR (2019) An image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling. Multimed Tools Appl 78:26073\u201326087. https:\/\/doi.org\/10.1007\/s11042-019-07766-z","journal-title":"Multimed Tools Appl"},{"key":"10153_CR32","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656\u2013715. https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst Tech J"},{"key":"10153_CR33","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.ifacol.2018.07.172","volume":"51","author":"D Smekal","year":"2018","unstructured":"Smekal D, Hajny J, Martinasek Z (2018) Comparative analysis of different implementations of encryption algorithms on FPGA network cards. IFAC-PapersOnLine 51:312\u2013317. https:\/\/doi.org\/10.1016\/j.ifacol.2018.07.172","journal-title":"IFAC-PapersOnLine."},{"key":"10153_CR34","doi-asserted-by":"publisher","first-page":"2105","DOI":"10.1007\/s11042-018-6346-1","volume":"78","author":"RA Ur","year":"2019","unstructured":"Ur RA, Liao X (2019) A novel robust dual diffusion\/confusion encryption technique for color image based on Chaos, DNA and SHA-2. Multimed Tools Appl 78:2105\u20132133. https:\/\/doi.org\/10.1007\/s11042-018-6346-1","journal-title":"Multimed Tools Appl"},{"key":"10153_CR35","doi-asserted-by":"publisher","first-page":"14246","DOI":"10.1021\/ja036676m","volume":"125","author":"H Yan","year":"2003","unstructured":"Yan H, Feng L, LaBean TH, Reif JH (2003) Parallel molecular computations of pairwise exclusive-or (XOR) using DNA \u201cstring tile\u201d self-assembly. J Am Chem Soc 125:14246\u201314247. https:\/\/doi.org\/10.1021\/ja036676m","journal-title":"J Am Chem Soc"},{"key":"10153_CR36","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1007\/s11071-015-1956-x","volume":"80","author":"WS Yap","year":"2015","unstructured":"Yap WS, Phan RCW, Yau WC, Heng SH (2015) Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 80:1483\u20131491. https:\/\/doi.org\/10.1007\/s11071-015-1956-x","journal-title":"Nonlinear Dyn"},{"key":"10153_CR37","doi-asserted-by":"crossref","unstructured":"Zeraoulia E, Sprott JC (2011) Robust Chaos and its applications. World Scientific","DOI":"10.1142\/8296"},{"key":"10153_CR38","doi-asserted-by":"publisher","first-page":"13387","DOI":"10.1002\/chem.201701411","volume":"23","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Wang Z, Wang Z, Liu X, Yuan X (2017) A DNA-based encryption method based on two biological axioms of DNA Chip and Polymerase chain reaction (PCR) amplification techniques. Chem - A Eur J 23:13387\u201313403. https:\/\/doi.org\/10.1002\/chem.201701411","journal-title":"Chem - A Eur J"}],"updated-by":[{"DOI":"10.1007\/s11042-021-10592-x","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10153-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10153-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10153-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T19:44:31Z","timestamp":1627674271000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10153-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,8]]},"references-count":38,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10153"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10153-8","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11042-021-10592-x","asserted-by":"object"}]},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,8]]},"assertion":[{"value":"30 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2021","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-021-10592-x","URL":"https:\/\/doi.org\/10.1007\/s11042-021-10592-x","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}