{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:04:33Z","timestamp":1775837073046,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T00:00:00Z","timestamp":1614643200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T00:00:00Z","timestamp":1614643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-020-10308-7","type":"journal-article","created":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T22:02:44Z","timestamp":1614722564000},"page":"19803-19826","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR"],"prefix":"10.1007","volume":"80","author":[{"given":"Subhrajyoti","family":"Deb","sequence":"first","affiliation":[]},{"given":"Bubu","family":"Bhuyan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,2]]},"reference":[{"issue":"08","key":"10308_CR1","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(08):2129\u20132151","journal-title":"Int J Bifurc Chaos"},{"issue":"1","key":"10308_CR2","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s11071-016-3046-0","volume":"87","author":"A Belazi","year":"2017","unstructured":"Belazi A, Khan M, El-Latif AAA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation\u2013substitution-based encryption. Nonlinear Dyn 87(1):337\u2013361","journal-title":"Nonlinear Dyn"},{"key":"10308_CR3","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.dam.2017.01.033","volume":"222","author":"SK Bishoi","year":"2017","unstructured":"Bishoi SK, Haran HK, Hasan SU (2017) A note on the multiple-recursive matrix method for generating pseudorandom vectors. Discrete Appl Math 222:67\u201375","journal-title":"Discrete Appl Math"},{"key":"10308_CR4","first-page":"231","volume":"29","author":"L Burnett","year":"2004","unstructured":"Burnett L, Millan W, Dawson E, Clark A (2004) Simpler methods for generating better Boolean functions with good cryptographic properties. Australas J Comb 29:231\u2013248","journal-title":"Australas J Comb"},{"issue":"7","key":"10308_CR5","doi-asserted-by":"publisher","first-page":"9907","DOI":"10.1007\/s11042-016-3585-x","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X, Yang K, Gan Z (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76(7):9907\u20139927","journal-title":"Multimed Tools Appl"},{"key":"10308_CR6","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"issue":"1","key":"10308_CR7","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"X Chai","year":"2019","unstructured":"Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl 31(1):219\u2013237","journal-title":"Neural Comput Appl"},{"issue":"1","key":"10308_CR8","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/s11277-019-06420-z","volume":"108","author":"JC Dagadu","year":"2019","unstructured":"Dagadu JC, Li JP, Aboagye EO (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun 108(1):591\u2013612","journal-title":"Wirel Pers Commun"},{"key":"10308_CR9","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1016\/j.procs.2015.02.103","volume":"46","author":"P Das","year":"2015","unstructured":"Das P, Deb S, Kar N, Bhattacharya B (2015) An Improved DNA based dual cover steganography. Procedia Comput Sci 46:604\u2013611","journal-title":"Procedia Comput Sci"},{"key":"10308_CR10","doi-asserted-by":"crossref","unstructured":"Deb S, Bhuyan B, Gupta NC (2018) Design and analysis of LFSR-based stream cipher. In: Proceedings of the international conference on computing and communication systems. Springer, pp 631\u2013639","DOI":"10.1007\/978-981-10-6890-4_61"},{"issue":"24","key":"10308_CR11","doi-asserted-by":"publisher","first-page":"34901","DOI":"10.1007\/s11042-019-08086-y","volume":"78","author":"S Deb","year":"2019","unstructured":"Deb S, Biswas B, Bhuyan B (2019) Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field. Multimed Tools Appl 78(24):34901\u201334925","journal-title":"Multimed Tools Appl"},{"issue":"20","key":"10308_CR12","doi-asserted-by":"publisher","first-page":"2571","DOI":"10.1016\/j.ijleo.2015.06.035","volume":"126","author":"C Dong","year":"2015","unstructured":"Dong C (2015) Asymmetric color image encryption scheme using discrete-time map and hash value. Optik 126(20):2571\u20132575","journal-title":"Optik"},{"key":"10308_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/8124912","volume":"2017","author":"H Fan","year":"2017","unstructured":"Fan H, Li M (2017) Cryptanalysis and improvement of chaos-based image encryption scheme with circular inter-intra-pixels bit-level permutation. Math Probl Eng 2017:1\u201311. https:\/\/doi.org\/10.1155\/2017\/8124912","journal-title":"Math Probl Eng"},{"key":"10308_CR14","doi-asserted-by":"crossref","unstructured":"Filiol E, Fontaine C (1998) Highly nonlinear balanced Boolean functions with a good correlation-immunity. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 475\u2013488","DOI":"10.1007\/BFb0054147"},{"issue":"11","key":"10308_CR15","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"ZH Gan","year":"2019","unstructured":"Gan ZH, Chai XL, Han DJ, Chen YR (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput Appl 31 (11):7111\u20137130","journal-title":"Neural Comput Appl"},{"issue":"1","key":"10308_CR16","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1504\/IJESDF.2012.045388","volume":"4","author":"A Jolfaei","year":"2012","unstructured":"Jolfaei A, Vizandan A, Mirghadri A (2012) Image encryption using HC-128 and HC-256 stream ciphers. Int J Electr Secur Digit Forensics 4(1):19\u201342","journal-title":"Int J Electr Secur Digit Forensics"},{"issue":"5","key":"10308_CR17","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik-Int J Light Electron Opt 125(5):1671\u20131675","journal-title":"Optik-Int J Light Electron Opt"},{"issue":"7-8","key":"10308_CR18","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1007\/s00521-014-1663-4","volume":"25","author":"M Khan","year":"2014","unstructured":"Khan M, Shah T (2014) A novel image encryption technique based on H\u00e9non chaotic map and S8 symmetric group. Neural Comput Appl 25(7-8):1717\u20131722","journal-title":"Neural Comput Appl"},{"issue":"4","key":"10308_CR19","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1016\/j.ijleo.2015.11.188","volume":"127","author":"P Kumar","year":"2016","unstructured":"Kumar P, Rana SB (2016) Development of modified AES algorithm for data security. Optik-Int J Light Electron Opt 127(4):2341\u20132345","journal-title":"Optik-Int J Light Electron Opt"},{"issue":"1","key":"10308_CR20","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/s13319-018-0162-2","volume":"9","author":"M Kumari","year":"2018","unstructured":"Kumari M, Gupta S (2018) A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher. 3D Res 9(1):10","journal-title":"3D Res"},{"issue":"11","key":"10308_CR21","doi-asserted-by":"publisher","first-page":"2517","DOI":"10.1007\/s11517-019-02037-3","volume":"57","author":"S Kumar","year":"2019","unstructured":"Kumar S, Panna B, Jha RK (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 57 (11):2517\u20132533","journal-title":"Med Biol Eng Comput"},{"key":"10308_CR22","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","volume":"147","author":"DS Laiphrakpam","year":"2017","unstructured":"Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved ElGamal encryption technique. Optik 147:88\u2013102","journal-title":"Optik"},{"issue":"7","key":"10308_CR23","doi-asserted-by":"publisher","first-page":"8629","DOI":"10.1007\/s11042-017-4755-1","volume":"77","author":"DS Laiphrakpam","year":"2018","unstructured":"Laiphrakpam DS, Khumanthem MS (2018) A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed Tools Appl 77(7):8629\u20138652","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10308_CR24","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.1007\/s11071-018-4659-2","volume":"95","author":"B Li","year":"2019","unstructured":"Li B, Liao X, Jiang Y (2019) A novel image encryption scheme based on improved random number generator and its implementation. Nonlinear Dyn 95(3):1781\u20131805","journal-title":"Nonlinear Dyn"},{"key":"10308_CR25","doi-asserted-by":"crossref","unstructured":"Liang Y, He F, Zeng X (2020) 3D mesh simplification with feature preservation based on whale optimization algorithm and differential evolution. Integr Comput-Aided Eng (Preprint):1\u201319","DOI":"10.3233\/ICA-200641"},{"key":"10308_CR26","first-page":"1","volume":"35","author":"JB Lima","year":"2015","unstructured":"Lima JB, Madeiro F, Sales FJ (2015) Encryption of medical images based on the cosine number transform. Signal Process: Image Commun 35:1\u20138","journal-title":"Signal Process: Image Commun"},{"key":"10308_CR27","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.sigpro.2015.01.016","volume":"113","author":"H Liu","year":"2015","unstructured":"Liu H, Kadir A (2015) Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process 113:104\u2013112","journal-title":"Signal Process"},{"key":"10308_CR28","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"issue":"19","key":"10308_CR29","doi-asserted-by":"publisher","first-page":"24701","DOI":"10.1007\/s11042-018-5669-2","volume":"77","author":"G Maddodi","year":"2018","unstructured":"Maddodi G, Awad A, Awad D, Awad M, Lee B (2018) A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding. Multimed Tools Appl 77(19):24701\u201324725","journal-title":"Multimed Tools Appl"},{"key":"10308_CR30","doi-asserted-by":"crossref","unstructured":"Maitra S (2011) Boolean functions: cryptographic and combinatorial properties: functions with symmetry. World Scientific","DOI":"10.1142\/7959"},{"issue":"2","key":"10308_CR31","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1109\/TIT.2019.2932739","volume":"66","author":"S Maitra","year":"2019","unstructured":"Maitra S, Mandal B, Martinsen T, Roy D, St\u0103nic\u0103 P (2019) Analysis on Boolean function in a restricted (biased) domain. IEEE Trans Inf Theory 66(2):1219\u20131231","journal-title":"IEEE Trans Inf Theory"},{"issue":"23","key":"10308_CR32","doi-asserted-by":"publisher","first-page":"31177","DOI":"10.1007\/s11042-018-6214-z","volume":"77","author":"B Mondal","year":"2018","unstructured":"Mondal B, Kumar P, Singh S (2018) A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimed Tools Appl 77(23):31177\u201331198","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10308_CR33","doi-asserted-by":"publisher","first-page":"197","DOI":"10.3233\/ICA-180591","volume":"26","author":"G Murcia","year":"2019","unstructured":"Murcia G, Ort\u00edz MJ, L\u00f3pez-Gordo M, Ferr\u00e1ndez JM, S\u00e1nchez Ferrer F, Fern\u00e1ndez E (2019) Neural representation of different 3D architectural images: an EEG study. Integr Comput-Aided Eng 26(2):197\u2013205","journal-title":"Integr Comput-Aided Eng"},{"issue":"8","key":"10308_CR34","doi-asserted-by":"publisher","first-page":"3317","DOI":"10.1007\/s00521-017-3287-y","volume":"31","author":"F \u00d6zkaynak","year":"2019","unstructured":"\u00d6zkaynak F (2019) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl 31(8):3317\u20133326","journal-title":"Neural Comput Appl"},{"issue":"7","key":"10308_CR35","doi-asserted-by":"publisher","first-page":"8393","DOI":"10.1007\/s11042-017-4741-7","volume":"77","author":"P Praveenkumar","year":"2018","unstructured":"Praveenkumar P, Devi N K, Ravichandran D, Avila J, Thenmozhi K, Rayappan JBB, et al. (2018) Transreceiving of encrypted medical image\u2013a cognitive approach. Multimed Tools Appl 77(7):8393\u20138418","journal-title":"Multimed Tools Appl"},{"key":"10308_CR36","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology","DOI":"10.6028\/NIST.SP.800-22"},{"issue":"16","key":"10308_CR37","first-page":"4110","volume":"6","author":"T Shah","year":"2011","unstructured":"Shah T, Hussain I, Gondal MA, Mahmood H (2011) Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int J Phys Sci 6(16):4110\u20134127","journal-title":"Int J Phys Sci"},{"issue":"8","key":"10308_CR38","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10916-019-1389-z","volume":"43","author":"S Stalin","year":"2019","unstructured":"Stalin S, Maheshwary P, Shukla PK, Maheshwari M, Gour B, Khare A (2019) Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA). J Med Syst 43(8):267","journal-title":"J Med Syst"},{"issue":"1","key":"10308_CR39","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11071-017-3874-6","volume":"91","author":"A Ullah","year":"2018","unstructured":"Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91(1):359\u2013370","journal-title":"Nonlinear Dyn"},{"key":"10308_CR40","doi-asserted-by":"crossref","unstructured":"Wong K, Yap W, Goi B, Wong DC (2019) Differential cryptanalysis on chaotic based image encryption scheme. In: IOP conference series: materials science and engineering, vol 495. IOP Publishing, p 012041","DOI":"10.1088\/1757-899X\/495\/1\/012041"},{"issue":"2","key":"10308_CR41","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1109\/TSC.2015.2501981","volume":"11","author":"Y Wu","year":"2015","unstructured":"Wu Y, He F, Zhang D, Li X (2015) Service-oriented feature-based data exchange for cloud-based design and manufacturing. IEEE Trans Serv Comput 11(2):341\u2013353","journal-title":"IEEE Trans Serv Comput"},{"key":"10308_CR42","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.sigpro.2018.11.011","volume":"157","author":"Z Xia","year":"2019","unstructured":"Xia Z, Wang X, Zhou W, Li R, Wang C, Zhang C (2019) Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process 157:108\u2013118","journal-title":"Signal Process"},{"key":"10308_CR43","unstructured":"Zeng G, Han W, He K (2007) High efficiency feedback shift register: \u03c3 \u2212LFSR. https:\/\/eprint.iacr.org\/2007\/114. Cryptology ePrint Archive, Report 2007\/114"},{"issue":"8","key":"10308_CR44","first-page":"902","volume":"29","author":"X Zhang","year":"2014","unstructured":"Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process: Image Commun 29(8):902\u2013913","journal-title":"Signal Process: Image Commun"},{"key":"10308_CR45","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10308-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10308-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10308-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T17:08:53Z","timestamp":1621616933000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10308-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,2]]},"references-count":45,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10308"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10308-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,2]]},"assertion":[{"value":"11 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}