{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:36:25Z","timestamp":1775914585340,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T00:00:00Z","timestamp":1609632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T00:00:00Z","timestamp":1609632000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10218-8","type":"journal-article","created":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T14:02:38Z","timestamp":1609682558000},"page":"10949-10983","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":88,"title":["Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation"],"prefix":"10.1007","volume":"80","author":[{"given":"Xiaopeng","family":"Yan","sequence":"first","affiliation":[]},{"given":"Xingyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yongjin","family":"Xian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,3]]},"reference":[{"key":"10218_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","volume":"160","author":"M Alawida","year":"2019","unstructured":"Alawida M, Samsudin A, Sen Teh J et al (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45\u201358","journal-title":"Signal Process"},{"key":"10218_CR2","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1007\/s11042-019-08375-6","volume":"79","author":"Z Azimi","year":"2019","unstructured":"Azimi Z, Ahadpour S (2019) Color image encryption based on DNA encoding and pair coupled chaotic maps. Multimed Tools Appl 79:1727\u20131744","journal-title":"Multimed Tools Appl"},{"key":"10218_CR3","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"key":"10218_CR4","doi-asserted-by":"publisher","first-page":"107457","DOI":"10.1016\/j.sigpro.2020.107457","volume":"171","author":"WJ Cao","year":"2020","unstructured":"Cao WJ, Mao YJ, Zhou YC (2020) Designing a 2D infinite collapse map for image encryption. Signal Process 171:107457","journal-title":"Signal Process"},{"key":"10218_CR5","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"issue":"1","key":"10218_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"X Chai","year":"2019","unstructured":"Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Applic 31(1):219\u2013237","journal-title":"Neural Comput Applic"},{"key":"10218_CR7","first-page":"1","volume":"10","author":"Y Chen","year":"2018","unstructured":"Chen Y, Xu W, Zuo J et al (2018) The fire recognition algorithm using dynamic feature fusion and IV-SVM classifier. Clust Comput 10:1\u201311","journal-title":"Clust Comput"},{"key":"10218_CR8","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"J Chen","year":"2018","unstructured":"Chen J, Zhu ZL, Zhang LB et al (2018) Exploiting self-adaptive permutation diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353","journal-title":"Signal Process"},{"key":"10218_CR9","doi-asserted-by":"publisher","first-page":"58791","DOI":"10.1109\/ACCESS.2019.2911892","volume":"7","author":"Y Chen","year":"2019","unstructured":"Chen Y, Wang J, Chen X, Zhu M, Yang K, Wang Z, Xia R (2019) Single-image super-resolution algorithm based on structural self-similarity and deformation block features. IEEE Access 7:58791\u201358801","journal-title":"IEEE Access"},{"key":"10218_CR10","doi-asserted-by":"publisher","unstructured":"Chen Y, Wang J, Liu S, Chen X, Xiong J, Xie J, Yang K (2019) Multiscale fast correlation filtering tracking algorithm based on a feature fusion model. Concurr Comput Pract Exp. https:\/\/doi.org\/10.1002\/cpe.5533","DOI":"10.1002\/cpe.5533"},{"key":"10218_CR11","first-page":"7435","volume":"22","author":"Y Chen","year":"2019","unstructured":"Chen Y, Wang J, Xia R et al (2019) The visual object tracking algorithm research based on adaptive combination kernel[J]. J Ambient Intell Humaniz Comput 22:7435\u20137445","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"11","key":"10218_CR12","first-page":"1","volume":"9","author":"Y Chen","year":"2019","unstructured":"Chen Y, Wang J, Chen R et al (2019) Image super-resolution algorithm based on Dual-Channel convolutional neural networks. Appl Sci-Basel 9(11):1\u201316","journal-title":"Appl Sci-Basel"},{"issue":"3","key":"10218_CR13","doi-asserted-by":"publisher","first-page":"7435","DOI":"10.1007\/s10586-018-1772-4","volume":"22","author":"Y Chen","year":"2019","unstructured":"Chen Y, Xiong J, Xu W, Zuo J (2019) A novel online incremental and decremental learning algorithm based on variable support vector machine. Clust Comput 22(3):7435\u20137445","journal-title":"Clust Comput"},{"key":"10218_CR14","doi-asserted-by":"publisher","unstructured":"Chen Y, Tao J, Liu L, Xiong J, Xia R, Xie J, Zhang Q, Yang K (2020) Research of improving semantic image segmentation based on a feature fusion model. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-020-02066-z","DOI":"10.1007\/s12652-020-02066-z"},{"key":"10218_CR15","doi-asserted-by":"publisher","unstructured":"Chen Y, Liu L, Tao J, Xia R, Zhang Q, Yang K, Xiong J, Chen X (2020) The improved image inpainting algorithm via encoder and similarity constraint. Vis Comput. https:\/\/doi.org\/10.1007\/s00371-020-01932-3","DOI":"10.1007\/s00371-020-01932-3"},{"key":"10218_CR16","doi-asserted-by":"publisher","first-page":"24979","DOI":"10.1007\/s11042-019-7693-2","volume":"78","author":"JC Dagadu","year":"2019","unstructured":"Dagadu JC, Li JP, Addo PC (2019) An image cryptosystem based on pseudorandomly enhanced chaotic DNA and random permutation. Multimed Tools Appl 78:24979\u201325000","journal-title":"Multimed Tools Appl"},{"key":"10218_CR17","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2015.10.027","volume":"355","author":"AV Diaconu","year":"2016","unstructured":"Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314\u2013327","journal-title":"Inf Sci"},{"key":"10218_CR18","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83\u201393","journal-title":"Opt Lasers Eng"},{"key":"10218_CR19","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah A, Isnin I (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence opt. Lasers Eng 56:83\u201393","journal-title":"Lasers Eng"},{"key":"10218_CR20","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","volume":"90","author":"R Enayatifar","year":"2017","unstructured":"Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146\u2013154","journal-title":"Opt Lasers Eng"},{"key":"10218_CR21","first-page":"1","volume":"99","author":"K Gu","year":"2019","unstructured":"Gu K, Wu N, Yin B et al (2019) Secure data query framework for cloud and fog computing. IEEE Trans Netw Serv Manag 99:1\u20131","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"3","key":"10218_CR22","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 83(3):1123\u20131136","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"10218_CR23","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s11071-016-3024-6","volume":"87","author":"T Hu","year":"2017","unstructured":"Hu T, Liu Y, Gong L-H, Ouyang C-J (2017) An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dyn 87(1):51\u201366","journal-title":"Nonlinear Dyn"},{"key":"10218_CR24","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"key":"10218_CR25","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"ZY Hua","year":"2018","unstructured":"Hua ZY, Jin F, Xu BX et al (2018) 2D logistic-sine-coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"issue":"10","key":"10218_CR26","doi-asserted-by":"publisher","first-page":"5455","DOI":"10.1007\/s11042-015-2515-7","volume":"75","author":"A Jain","year":"2016","unstructured":"Jain A, Rajpal N (2016) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed Tools Appl 75(10):5455\u20135472","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"10218_CR27","doi-asserted-by":"publisher","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943\u20132959","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"3","key":"10218_CR28","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circ Syst Mag 1(3):6\u201321","journal-title":"IEEE Circ Syst Mag"},{"key":"10218_CR29","doi-asserted-by":"publisher","first-page":"26411","DOI":"10.1109\/ACCESS.2019.2901742","volume":"7","author":"Z Liao","year":"2019","unstructured":"Liao Z, Zhang R, He S, Zeng D, Wang J, Kim HJ (2019) Deep learning-based data storage for low latency in data center networks. IEEE Access 7:26411\u201326417","journal-title":"IEEE Access"},{"key":"10218_CR30","doi-asserted-by":"publisher","unstructured":"Liu Y, Zhang J (2020) A multidimensional chaotic image encryption algorithm based on DNA coding. Multimed Tools Appl 1-23. https:\/\/doi.org\/10.1007\/s11042-020-08880-z","DOI":"10.1007\/s11042-020-08880-z"},{"key":"10218_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8822777","volume":"2020","author":"H Lu","year":"2020","unstructured":"Lu H, Xie JB, Xia R, Xiong J et al (2020) Saliency detection via the improved hierarchical principal component analysis method. WCMC 2020:1\u201312. https:\/\/doi.org\/10.1155\/2020\/8822777","journal-title":"WCMC"},{"key":"10218_CR32","doi-asserted-by":"publisher","first-page":"102794","DOI":"10.1016\/j.jvcir.2020.102794","volume":"71","author":"W Lu","year":"2020","unstructured":"Lu W, Zhang X, Lu H, Li F (2020) Deep hierarchical encoding model for sentence semantic matching. J Vis Commun Image Represent 71:102794. https:\/\/doi.org\/10.1016\/j.jvcir.2020.102794","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"10218_CR33","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11554-019-00917-3","volume":"17","author":"YJ Luo","year":"2020","unstructured":"Luo YJ, Qin JH, Xiang XY, Tan Y, Liu Q, Xiang L (2020) Coverless real-time image information hiding based on image block matching and dense convolutional network. J Real-Time Image Proc 17(1):125\u2013135","journal-title":"J Real-Time Image Proc"},{"issue":"1","key":"10218_CR34","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67(1):557\u2013566","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"10218_CR35","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s11042-015-3064-9","volume":"76","author":"M Mollaeefar","year":"2017","unstructured":"Mollaeefar M, Sharif A, Nazari M (2017) A novel encryption scheme for colored image based on high level chaotic maps. Multimed Tools Appl 76(1):607\u2013629","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10218_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11235-016-0212-0","volume":"65","author":"P Praveenkumar","year":"2017","unstructured":"Praveenkumar P, Amirtharajan R, Thenmozhi K et al (2017) Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst 65(1):1\u201314","journal-title":"Telecommun Syst"},{"issue":"7","key":"10218_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e21070656","volume":"21","author":"P Ramasamy","year":"2019","unstructured":"Ramasamy P, Ranganathan V, Kadry S et al (2019) An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic-tent map. Entropy 21(7):1\u201317","journal-title":"Entropy"},{"issue":"1\u20132","key":"10218_CR38","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s11071-015-2008-2","volume":"81","author":"SM Seyedzadeh","year":"2015","unstructured":"Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81(1\u20132):511\u2013529","journal-title":"Nonlinear Dyn"},{"key":"10218_CR39","doi-asserted-by":"publisher","unstructured":"Sun L, Ma C, Chen Y, et al (2019) Low rank component induced spatial-spectral kernel method for Hyperspectral image classification. IEEE Trans Circ Syst Video Technol PP(99):1-1. https:\/\/doi.org\/10.1109\/TCSVT.2019.2946723","DOI":"10.1109\/TCSVT.2019.2946723"},{"key":"10218_CR40","doi-asserted-by":"publisher","unstructured":"Sun L, Wu F, Zhan T, et al (2020) Weighted nonlocal low-rank tensor decomposition method for sparse Unmixing of Hyperspectral images. IEEE J Sel Top Appl Earth Obs Remote Sens PP(99):1-1. https:\/\/doi.org\/10.1109\/JSTARS.2020.2980576","DOI":"10.1109\/JSTARS.2020.2980576"},{"key":"10218_CR41","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.sigpro.2017.06.010","volume":"141","author":"S Toughi","year":"2017","unstructured":"Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Signal Process 141:217\u2013227","journal-title":"Signal Process"},{"key":"10218_CR42","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.ijleo.2018.01.064","volume":"159","author":"A Ur Rehman","year":"2018","unstructured":"Ur Rehman A, Liao X, Ashraf R et al (2018) A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2. Optik 159:348\u2013367","journal-title":"Optik"},{"key":"10218_CR43","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"XY Wang","year":"2020","unstructured":"Wang XY, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16\u201336","journal-title":"Inf Sci"},{"key":"10218_CR44","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","volume":"539","author":"XY Wang","year":"2020","unstructured":"Wang XY, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195\u2013214","journal-title":"Inf Sci"},{"key":"10218_CR45","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.optlaseng.2018.11.010","volume":"115","author":"XY Wang","year":"2019","unstructured":"Wang XY, Li ZM (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107\u2013118","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"10218_CR46","doi-asserted-by":"publisher","first-page":"6229","DOI":"10.1007\/s11042-016-3311-8","volume":"76","author":"X Wang","year":"2017","unstructured":"Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229\u20136245","journal-title":"Multimed Tools Appl"},{"issue":"1\u20132","key":"10218_CR47","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s11071-013-1070-x","volume":"75","author":"XY Wang","year":"2014","unstructured":"Wang XY, Xu D (2014) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75(1\u20132):345\u2013353","journal-title":"Nonlinear Dyn"},{"key":"10218_CR48","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"XY Wang","year":"2015","unstructured":"Wang XY, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"key":"10218_CR49","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.optlaseng.2014.12.025","volume":"68","author":"XY Wang","year":"2015","unstructured":"Wang XY, Gu SX, Zhang YQ (2015) Novel image encryption algorithm based on cycle shift and chaotic system. Opt Lasers Eng 68:126\u2013134","journal-title":"Opt Lasers Eng"},{"key":"10218_CR50","doi-asserted-by":"publisher","first-page":"39705","DOI":"10.1109\/ACCESS.2018.2855726","volume":"6","author":"XY Wang","year":"2018","unstructured":"Wang XY, Feng L, Wang SB et al (2018) Spatiotemporal chaos in coupled logistic map lattice with dynamic coupling coefficient and its application in image encryption. IEEE Access 6:39705\u201339724","journal-title":"IEEE Access"},{"key":"10218_CR51","doi-asserted-by":"publisher","first-page":"62272","DOI":"10.1109\/ACCESS.2018.2875676","volume":"6","author":"X Wang","year":"2018","unstructured":"Wang X, Hou Y, Wang S, Li R (2018) A new image encryption algorithm based on CML and DNA sequence. IEEE Access 6:62272\u201362285","journal-title":"IEEE Access"},{"issue":"5","key":"10218_CR52","doi-asserted-by":"publisher","first-page":"5851","DOI":"10.3934\/mbe.2019292","volume":"16","author":"J Wang","year":"2019","unstructured":"Wang J, Qin J, Xiang X, Tan Y, Pan N, College of Computer Science and Information Technology, Central South University of Forestry and Technology, 498 shaoshan S Rd, Changsha, 410004, China (2019) CAPTCHA recognition based on deep convolutional neural network. Math Bioences Eng 16(5):5851\u20135861","journal-title":"Math Bioences Eng"},{"issue":"18","key":"10218_CR53","doi-asserted-by":"publisher","first-page":"26111","DOI":"10.1007\/s11042-019-07794-9","volume":"78","author":"X Wang","year":"2019","unstructured":"Wang X, Wang Y, Zhu X, Unar S (2019) Image encryption scheme based on Chaos and DNA plane operations. Multimed Tools Appl 78(18):26111\u201326128","journal-title":"Multimed Tools Appl"},{"key":"10218_CR54","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"XY Wang","year":"2019","unstructured":"Wang XY, Feng L, Zhao HY (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340\u2013358","journal-title":"Inf Sci"},{"key":"10218_CR55","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"X Wu","year":"2015","unstructured":"Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24\u201339","journal-title":"Appl Soft Comput"},{"key":"10218_CR56","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2017.04.006","volume":"141","author":"J Wu","year":"2017","unstructured":"Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109\u2013124","journal-title":"Signal Process"},{"key":"10218_CR57","doi-asserted-by":"publisher","first-page":"12349","DOI":"10.1007\/s11042-017-4885-5","volume":"77","author":"X Wu","year":"2018","unstructured":"Wu X, Kurths J, Kan H (2018) A robust and lossless DNA encryption scheme for color images. Multimed Tools Appl 77:12349\u201312376","journal-title":"Multimed Tools Appl"},{"key":"10218_CR58","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"JH Wu","year":"2018","unstructured":"Wu JH, Liao XF, Yang B (2018) Image encryption using 2D Henon-sine map and DNA approach. Signal Process 153:11\u201323","journal-title":"Signal Process"},{"key":"10218_CR59","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"X Wu","year":"2018","unstructured":"Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272\u2013287","journal-title":"Signal Process"},{"key":"10218_CR60","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41\u201352","journal-title":"Opt Lasers Eng"},{"key":"10218_CR61","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.optlaseng.2019.04.011","volume":"121","author":"QY Xu","year":"2019","unstructured":"Xu QY, Sun KH, Cao C, Zhu CX (2019) A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt Lasers Eng 121:203\u2013214","journal-title":"Opt Lasers Eng"},{"key":"10218_CR62","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"A Yaghouti","year":"2017","unstructured":"Yaghouti A, Moattar M, Torshiz M (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng 90:225\u2013237","journal-title":"Lasers Eng"},{"key":"10218_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/5904607","volume":"2020","author":"F Yu","year":"2020","unstructured":"Yu F, Liu L, Shen H, Zhang Z, Huang Y, Shi C, Cai S, Wu X, du S, Wan Q (2020) Dynamic analysis, circuit design, and synchronization of a novel 6D Memristive four-wing Hyperchaotic system with multiple coexisting attractors. Complexity 2020:1\u201317. https:\/\/doi.org\/10.1155\/2020\/5904607","journal-title":"Complexity"},{"issue":"6","key":"10218_CR64","doi-asserted-by":"publisher","first-page":"8087","DOI":"10.1007\/s11042-016-3454-7","volume":"76","author":"HM Yuan","year":"2017","unstructured":"Yuan HM, Liu Y, Gong LH, Wang J (2017) A new image cryptosystem based on 2D hyper-chaotic system. Multimed Tools Appl 76(6):8087\u20138108","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10218_CR65","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.26.1.013021","volume":"26","author":"K Zhan","year":"2017","unstructured":"Zhan K, Wei D, Shi J, Yu J (2017) Cross-utilizing hyperchaotic and DNA sequences for image encryption. J Elect Imaging 26(1):013021","journal-title":"J Elect Imaging"},{"issue":"10","key":"10218_CR66","doi-asserted-by":"publisher","first-page":"100504","DOI":"10.1088\/1674-1056\/26\/10\/100504","volume":"26","author":"LM Zhang","year":"2017","unstructured":"Zhang LM, Sun KH, Liu WH, He SB (2017) A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations. Chin Phys B 26(10):100504","journal-title":"Chin Phys B"},{"key":"10218_CR67","doi-asserted-by":"publisher","first-page":"83873","DOI":"10.1109\/ACCESS.2019.2924944","volume":"7","author":"J Zhang","year":"2019","unstructured":"Zhang J, Wu Y, Feng W, Wang J et al (2019) Spatially attentive visual tracking using multi-model adaptive response fusion. IEEE Access 7:83873\u201383887","journal-title":"IEEE Access"},{"issue":"1","key":"10218_CR68","first-page":"1","volume":"21","author":"JY Zhang","year":"2020","unstructured":"Zhang JY, Zhong SQ, Wang T et al (2020) Blockchain-based systems and applications: a survey. J Internet Technol 21(1):1\u201314","journal-title":"J Internet Technol"},{"key":"10218_CR69","doi-asserted-by":"publisher","first-page":"14751","DOI":"10.1007\/s11042-019-7240-1","volume":"79","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Lu W, Ou W, Zhang G, Zhang X, Cheng J, Zhang W (2020) Chinese medical question answer selection via hybrid models based on CNN and GRU. Multimed Tools Appl 79:14751\u201314776","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"10218_CR70","doi-asserted-by":"publisher","first-page":"6303","DOI":"10.1007\/s11042-015-2573-x","volume":"75","author":"P Zhen","year":"2016","unstructured":"Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 75(11):6303\u20136319","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10218-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10218-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10218-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T00:00:11Z","timestamp":1616716811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10218-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,3]]},"references-count":70,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10218"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10218-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,3]]},"assertion":[{"value":"7 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='' removed-->Conflict of interest"}}]}}