{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:15:36Z","timestamp":1742379336416,"version":"3.37.3"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"University of Mohamed Seddik Benyahia Jijel, Algeria"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10425-3","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T14:08:15Z","timestamp":1611842895000},"page":"14723-14752","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Delayed outputs fractional-order hyperchaotic systems synchronization for images encryption"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8086-0614","authenticated-orcid":false,"given":"M. S.","family":"Bouridah","sequence":"first","affiliation":[]},{"given":"T.","family":"Bouden","sequence":"additional","affiliation":[]},{"given":"M. E.","family":"Yal\u00e7in","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,28]]},"reference":[{"key":"10425_CR1","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S Behnia","year":"2008","unstructured":"Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals 35:408\u2013419","journal-title":"Chaos Solitons Fractals"},{"key":"10425_CR2","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4:36\u201372","journal-title":"J Cryptol"},{"key":"#cr-split#-10425_CR3.1","doi-asserted-by":"crossref","unstructured":"Biham E, Shamir A (1993) Differential cryptanalysis of the full 16-round DES BT - advances in cryptology - CRYPTO.' 92. In: Brickell EF","DOI":"10.1007\/978-1-4613-9314-6_5"},{"key":"#cr-split#-10425_CR3.2","unstructured":"(ed) 12th annual international cryptology conference santa barbara, California, USA August 16-20, 1992 Proceedings, Springer Berlin Heidelberg, Berlin, Heidelberg pp 487-496"},{"key":"10425_CR4","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.physleta.2004.04.004","volume":"326","author":"S Bowong","year":"2004","unstructured":"Bowong S (2004) Stability analysis for the synchronization of chaotic systems with different order: application to secure communications. Phys Lett A 326:102\u2013113","journal-title":"Phys Lett A"},{"key":"10425_CR5","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"key":"10425_CR6","doi-asserted-by":"crossref","unstructured":"Chapaneri S, Chapaneri R, Sarode T (2014) Evaluation of chaotic map lattice systems for image encryption. In: Proceedings of international conference on circuits, systems, communication and information technology applications (CSCITA) pp 59\u201362","DOI":"10.1109\/CSCITA.2014.6839235"},{"key":"10425_CR7","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.physleta.2003.12.043","volume":"321","author":"C Chen","year":"2004","unstructured":"Chen C, Feng G, Guan X (2004) Robust synchronization of chaotic Lur\u2019e systems via delayed feedback control. Phys Lett A 321:344\u2013354","journal-title":"Phys Lett A"},{"key":"10425_CR8","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/3.817635","volume":"36","author":"HF Chen","year":"2000","unstructured":"Chen HF, Liu JM (2000) Open-loop chaotic synchronization of injection-locked semiconductor lasers with Gigahertz range modulation. IEEE J Quant Electron 36:27\u201334","journal-title":"IEEE J Quant Electron"},{"key":"10425_CR9","doi-asserted-by":"publisher","first-page":"3384","DOI":"10.1016\/j.na.2006.10.020","volume":"67","author":"F Chen","year":"2007","unstructured":"Chen F, Zhang W (2007) LMI Criteria for robust chaos synchronization of a class of chaotic systems. Nonlinear Anal 67:3384\u20133393","journal-title":"Nonlinear Anal"},{"key":"10425_CR10","doi-asserted-by":"publisher","unstructured":"Diaconu AV, Costea A, Costea MA (2014) Color image scrambling technique based on transposition of pixels between RGB channels using knight\u2019s moving rules and digital chaotic map. Mathematical Problems in Engineering. https:\/\/doi.org\/10.1155\/2014\/932875","DOI":"10.1155\/2014\/932875"},{"key":"10425_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.optlaseng.2015.03.007","volume":"71","author":"R Enayatifar","year":"2015","unstructured":"Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng 71:33\u201341","journal-title":"Opt Lasers Eng"},{"key":"10425_CR12","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1016\/j.physleta.2019.01.056","volume":"383","author":"D Feng","year":"2019","unstructured":"Feng D, An H, Zhu H, Zhao Y (2019) The synchronization method for fractional-order hyperchaotic systems. Phys Lett A 383:1427\u20131434","journal-title":"Phys Lett A"},{"key":"10425_CR13","doi-asserted-by":"publisher","first-page":"24809","DOI":"10.1007\/s11042-019-7623-3","volume":"78","author":"A Firdous","year":"2019","unstructured":"Firdous A, ur Rehman A, Saad Missen MM (2019) A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2. Multimed Tools Appl 78:24809\u2013248352","journal-title":"Multimed Tools Appl"},{"key":"10425_CR14","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"Z Gan","year":"2019","unstructured":"Gan Z, Chai X, Han D, Chen TY (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput Applic 31:7111\u20137130","journal-title":"Neural Comput Applic"},{"key":"10425_CR15","doi-asserted-by":"crossref","unstructured":"Gu K (2000) An integral inequality in the stability problem of time-delay systems. In: Proceedings of the 39th IEEE conference on decision and control, Los Alamitos, CA pp 2805\u20132810","DOI":"10.1109\/CDC.2000.914233"},{"key":"10425_CR16","doi-asserted-by":"publisher","first-page":"020502","DOI":"10.1088\/1674-1056\/22\/2\/020502","volume":"22","author":"Q Han","year":"2013","unstructured":"Han Q, Liu CX, Sun L, Zhu R (2013) A fractional order hyperchaotic system derived from a Liu system and its circuit realization. Chin Phys B 22:020502\u201302050","journal-title":"Chin Phys B"},{"key":"10425_CR17","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/81.404062","volume":"42","author":"TT Hartley","year":"1995","unstructured":"Hartley TT, Lorenzo CF, Qammer HK (1995) Chaos in a fractional order Chua\u2019s system. IEEE Trans Circuits Syst I 42:485\u2013490","journal-title":"IEEE Trans Circuits Syst I"},{"key":"10425_CR18","doi-asserted-by":"publisher","first-page":"1938","DOI":"10.1016\/j.aml.2011.05.025","volume":"24","author":"AS Hegazi","year":"2011","unstructured":"Hegazi AS, Matouk AE (2011) Dynamical behaviors and synchronization in the fractional order hyperchaotic Chen system. Appl Math Lett 24:1938\u20131944","journal-title":"Appl Math Lett"},{"key":"10425_CR19","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018) 2D logistic-sine-coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"key":"10425_CR20","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/e17010028","volume":"17","author":"X Huang","year":"2014","unstructured":"Huang X, Sun T, Li Y, Liang J (2014) A color image encryption algorithm based on a fractional-order hyperchaotic system. Entropy 17:28\u201338","journal-title":"Entropy"},{"key":"10425_CR21","doi-asserted-by":"publisher","first-page":"135308","DOI":"10.1109\/ACCESS.2020.3011524","volume":"8","author":"Huang Y","year":"2020","unstructured":"Huang Y, Huang L, Wang Y, Peng Y, Yu F (2020) Shape Synchronization in Driver-Response of 4-D Chaotic System and Its Application in Image Encryption. IEEE Access 8:135308\u2013135319","journal-title":"IEEE Access"},{"key":"10425_CR22","doi-asserted-by":"publisher","first-page":"5703","DOI":"10.1016\/j.ijleo.2015.09.091","volume":"126","author":"J Kalpana","year":"2015","unstructured":"Kalpana J, Murali P (2015) An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos. Opt - Int J Light Electron Opt 126:5703\u20135709","journal-title":"Opt - Int J Light Electron Opt"},{"key":"10425_CR23","volume-title":"Nonlinear systems","author":"HK Khalil","year":"1993","unstructured":"Khalil HK (1993) Nonlinear systems. Macmillan Publishing, Company NY"},{"key":"10425_CR24","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.cnsns.2007.11.011","volume":"14","author":"A Kiani-B","year":"2009","unstructured":"Kiani-B A, Fallahi K, Pariz N, Leung H (2009) A chaotic secure communication scheme using fractional chaotic systems based on an extended fractional Kalman filter. Commun Nonlinear Sci 14:63\u201379","journal-title":"Commun Nonlinear Sci"},{"key":"10425_CR25","unstructured":"Kilbas A, Srivastava H, Trujillo J (2006) Theory and applications of fractional differential equations. NorthHolland mathematics studies 204"},{"key":"10425_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-014-2221-x","volume":"75","author":"A Kulsoom","year":"2016","unstructured":"Kulsoom A, Xiao D, ur-Rehman A, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl 75:1\u201323","journal-title":"Multimed Tools Appl"},{"key":"10425_CR27","first-page":"77","volume":"22","author":"Li Z","year":"2204","unstructured":"Li Z, Xu D (2204) A secure communication scheme using projective chaos synchronization. Chaos Soliton Fract 22:77\u201381","journal-title":"Chaos Soliton Fract"},{"key":"10425_CR28","doi-asserted-by":"publisher","first-page":"6605","DOI":"10.1007\/s11042-015-2592-7","volume":"75","author":"Y Liang","year":"2015","unstructured":"Liang Y, Liu G, Zhou N, Wu J (2015) Color image encryption combining a reality-preserving fractional dct with chaotic mapping in hsi space. Multimed Tools Appl 75:6605\u20136620","journal-title":"Multimed Tools Appl"},{"key":"10425_CR29","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1142\/S0218127403006455","volume":"13","author":"X Liao","year":"2003","unstructured":"Liao X, Chen G (2003) SChaos synchronization of general Lur\u2019e systems via time-delay feedback control. Int J Bifurc Chaos 13:207\u2013213","journal-title":"Int J Bifurc Chaos"},{"key":"10425_CR30","doi-asserted-by":"publisher","first-page":"17669","DOI":"10.1007\/s11042-020-08645-8","volume":"79","author":"Y Liu","year":"2020","unstructured":"Liu Y, Zhang J, Han D, Wu P, Sun Y, MY S (2020) A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl 79:17669\u201317705","journal-title":"Multimed Tools Appl"},{"key":"10425_CR31","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11071-016-2872-4","volume":"86","author":"S Liu","year":"2016","unstructured":"Liu S, Zhou X, Li X, Jiang W (2016) Asymptotical stability of Riemann\u2013Liouville fractional nonlinear systems. Nonlinear Dyn 86:65\u201371","journal-title":"Nonlinear Dyn"},{"key":"10425_CR32","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1007\/s11071-013-1032-3","volume":"74","author":"P Muthukumar","year":"2013","unstructured":"Muthukumar P, Balasubramaniam P (2013) Feedback synchronization of the fractional order reverse butterfly-shaped chaotic system and its application to digital cryptography. Nonlinear Dyn 74:1169\u20131181","journal-title":"Nonlinear Dyn"},{"key":"10425_CR33","doi-asserted-by":"publisher","first-page":"23517","DOI":"10.1007\/s11042-016-4052-4","volume":"76","author":"P Muthukumar","year":"2017","unstructured":"Muthukumar P, Balasubramaniam P, Ratnavelu K (2017) A novel cascade encryption algorithm for digital images based on anti-synchronized fractional order dynamical systems. Multimed Tools Appl 76:23517\u201323538","journal-title":"Multimed Tools Appl"},{"key":"10425_CR34","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.cnsns.2008.06.028","volume":"14","author":"B Nana","year":"2009","unstructured":"Nana B, Woafo P, Domngang S (2009) Chaotic synchronization with experimental application to secure communications. Commun Nonlinear Sci 14:66\u201376","journal-title":"Commun Nonlinear Sci"},{"key":"10425_CR35","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1142\/S0218127410025429","volume":"20","author":"ZM Odibat","year":"2010","unstructured":"Odibat ZM (2010) Synchronization of chaotic fractional-order systems via linear control. Int J Bifurcat Chaos 20:81\u201397","journal-title":"Int J Bifurcat Chaos"},{"key":"10425_CR36","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"key":"10425_CR37","volume-title":"Fractional differential equations","author":"I Podlubny","year":"1999","unstructured":"Podlubny I (1999) Fractional differential equations. Academic Press, New York"},{"key":"10425_CR38","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.cnsns.2010.10.023","volume":"16","author":"N Smaoui","year":"2011","unstructured":"Smaoui N, Karouma A, Zribi M (2011) Secure communications based on the synchronization of the hyperchaotic Chen and the unified chaotic systems. Commun Nonlinear Sci Numer Simul 16:79\u201393","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10425_CR39","doi-asserted-by":"publisher","first-page":"2105","DOI":"10.1007\/s11042-018-6346-1","volume":"78","author":"ur Rehman A","year":"2019","unstructured":"ur Rehman A, Liao X (2019) A novel robust dual diffusion\/confusion encryption technique for color image based on Chaos DNA and SHA-2. Multimed Tools Appl 78:2105\u20132133","journal-title":"Multimed Tools Appl"},{"key":"10425_CR40","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.ijleo.2018.01.064","volume":"159","author":"A ur Rehman","year":"2018","unstructured":"ur Rehman A, Liao X, Ashraf R, Ullah S, Wang H (2018) A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2. Int J Light Electron Opt 159:348\u2013367","journal-title":"Int J Light Electron Opt"},{"key":"10425_CR41","doi-asserted-by":"publisher","unstructured":"Vidhya R, Brindha M (2020) A novel dynamic chaotic image encryption using butterfly network topology based diffusion and decision based permutation. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09462-9","DOI":"10.1007\/s11042-020-09462-9"},{"key":"10425_CR42","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","volume":"342","author":"X Wang","year":"2015","unstructured":"Wang X, Zhang H (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51\u201360","journal-title":"Opt Commun"},{"key":"10425_CR43","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","volume":"342","author":"X Wang","year":"2015","unstructured":"Wang X, Zhang H (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51\u201360","journal-title":"Opt Commun"},{"key":"10425_CR44","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85:290\u2013299","journal-title":"J Syst Softw"},{"key":"10425_CR45","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"X Wu","year":"2015","unstructured":"Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput J 37:24\u201339","journal-title":"Appl Soft Comput J"},{"key":"10425_CR46","doi-asserted-by":"publisher","unstructured":"Wu X, Li Y, Kurths J (2015) A new color image encryption scheme using cml and a fractional-order chaotic system. PloS one. https:\/\/doi.org\/10.1371\/journal.pone.0119660","DOI":"10.1371\/journal.pone.0119660"},{"key":"10425_CR47","doi-asserted-by":"publisher","first-page":"3735","DOI":"10.1016\/j.cnsns.2014.02.029","volume":"19","author":"Y Xu","year":"2014","unstructured":"Xu Y, Wang H, LI Y, Pei B (2014) Image encryption based on synchronization of fractional chaotic systems. Commun Nonlinear Sci Numer Simulat 19:3735\u20133744","journal-title":"Commun Nonlinear Sci Numer Simulat"},{"key":"10425_CR48","doi-asserted-by":"publisher","first-page":"3735","DOI":"10.1016\/j.cnsns.2014.02.029","volume":"19","author":"Y Xu","year":"2014","unstructured":"Xu Y, Wang H, Li Y, Pei B (2014) Image encryption based on synchronization of fractional chaotic systems. Commun Nonlinear Sci Numer Simulat 19:3735\u20133744","journal-title":"Commun Nonlinear Sci Numer Simulat"},{"key":"10425_CR49","doi-asserted-by":"publisher","first-page":"1707","DOI":"10.1142\/S021812740100295X","volume":"11","author":"ME Yal\u00e7in","year":"2001","unstructured":"Yal\u00e7in ME, Suykens JAK, Vandewalle J (2001) Master-slave synchronization of Lur\u2019e systems with time-delay. Int J Bifurc Chaos 11:1707\u20131722","journal-title":"Int J Bifurc Chaos"},{"key":"10425_CR50","doi-asserted-by":"publisher","first-page":"1522","DOI":"10.1016\/j.jfranklin.2018.10.024","volume":"356","author":"W Zhang","year":"2019","unstructured":"Zhang W, Cao J, Wu R, Alsaadi FE, Alsaedi A (2019b) Lag projective synchronization of Fractional-Order delayed chaotic systems. J Franklin Inst 356:1522\u20131534","journal-title":"J Franklin Inst"},{"key":"10425_CR51","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52:2028\u20132035","journal-title":"Math Comput Model"},{"key":"10425_CR52","doi-asserted-by":"publisher","first-page":"54175","DOI":"10.1109\/ACCESS.2020.2979827","volume":"8","author":"YQ Zhang","year":"2020","unstructured":"Zhang YQ, Hao JL, Wang XY (2020) An efficient image encryption scheme based on S-Boxes and fractional-order differential Logistic map. IEEE Access 8:54175\u201354188","journal-title":"IEEE Access"},{"key":"10425_CR53","doi-asserted-by":"publisher","first-page":"100504","DOI":"10.1088\/1674-1056\/26\/10\/100504","volume":"26","author":"LM Zhang","year":"2017","unstructured":"Zhang LM, Sun KH, Liu WH, He SB (2017) A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations. Chin Phys B 26:100504","journal-title":"Chin Phys B"},{"key":"10425_CR54","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"10425_CR55","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1080\/00207721.2017.1412534","volume":"49","author":"H Zhang","year":"2018","unstructured":"Zhang H, Ye R, Liu S, Cao J, Alsaedi A, Li X (2018) LMI-based approach to stability analysis for fractional-order neural networks with discrete and distributed delays. Int J Syst Sci 49:537\u2013545","journal-title":"Int J Syst Sci"},{"key":"10425_CR56","first-page":"89","volume":"12","author":"NR Zhou","year":"2011","unstructured":"Zhou NR, Wang YX, Gong LH, He H, Wu JH (2011) Novel single\u2013channel color image encryption algorithm based on chaos and fractional Fourier transform. Opt Commun 12:89\u201396","journal-title":"Opt Commun"},{"key":"10425_CR57","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285:29\u201337","journal-title":"Opt Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10425-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10425-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10425-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T19:07:50Z","timestamp":1674932870000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10425-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":58,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10425"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10425-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"29 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}