{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T01:27:38Z","timestamp":1768699658892,"version":"3.49.0"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,2,13]],"date-time":"2021-02-13T00:00:00Z","timestamp":1613174400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,2,13]],"date-time":"2021-02-13T00:00:00Z","timestamp":1613174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10584-x","type":"journal-article","created":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T08:30:19Z","timestamp":1613291419000},"page":"17983-18006","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A novel 2D cascade modulation couple hyperchaotic mapping for randomized image encryption"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2253-1166","authenticated-orcid":false,"given":"Ali","family":"Shakiba","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,13]]},"reference":[{"issue":"2","key":"10584_CR1","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L Blum","year":"1986","unstructured":"Blum L, Blum M, Shub M (1986) A simple unpredictable pseudo-random number generator. SIAM J Comput 15(2):364\u2013383","journal-title":"SIAM J Comput"},{"key":"10584_CR2","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122\u2013133","journal-title":"Signal Process"},{"issue":"3","key":"10584_CR3","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749\u2013761","journal-title":"Chaos Solitons Fractals"},{"key":"10584_CR4","doi-asserted-by":"crossref","unstructured":"Dworkin MJ (2001) SP 800-38A: recommendation for block cipher modes of operation: Methods Techniq","DOI":"10.6028\/NIST.SP.800-38a"},{"issue":"06","key":"10584_CR5","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(06):1259\u20131284","journal-title":"Int J Bifurcat Chaos"},{"key":"10584_CR6","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","volume":"115","author":"L Gong","year":"2019","unstructured":"Gong L, Qiu K, Deng C, Zhou N (2019) An image compression and encryption algorithm based on chaotic system and compressive sensing. Optics Laser Technol 115:257\u2013267","journal-title":"Optics Laser Technol"},{"key":"10584_CR7","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.optlaseng.2019.03.006","volume":"121","author":"L Gong","year":"2019","unstructured":"Gong L, Qiu K, Deng C, Zhou N (2019) An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt Lasers Eng 121:169\u2013180","journal-title":"Opt Lasers Eng"},{"issue":"7","key":"10584_CR8","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/81.933333","volume":"48","author":"D He","year":"2001","unstructured":"He D, He C, Jiang LG, Zhu HW, Hu GR (2001) Chaotic characteristics of a one-dimensional iterative map with infinite collapses . IEEE Trans Circ Syst I: Fundament Theory Appli 48(7):900\u2013906","journal-title":"IEEE Trans Circ Syst I: Fundament Theory Appli"},{"issue":"2","key":"10584_CR9","first-page":"539","volume":"52","author":"H Hermassi","year":"2013","unstructured":"Hermassi H, Rhouma R, Belghith S (2013) Improvement of an image encryption algorithm based on hyper-chaos. Telecommun Syst 52(2):539\u2013549","journal-title":"Telecommun Syst"},{"key":"10584_CR10","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.sigpro.2016.12.008","volume":"134","author":"T Hu","year":"2017","unstructured":"Hu T, Liu Y, Gong LH, Guo SF, Yuan HM (2017) Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process 134:234\u2013243","journal-title":"Signal Process"},{"key":"10584_CR11","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018) 2D Logistic-Sine-Coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"issue":"11","key":"10584_CR12","doi-asserted-by":"publisher","first-page":"2123","DOI":"10.1016\/j.optcom.2009.02.044","volume":"282","author":"C Huang","year":"2009","unstructured":"Huang C, Nien H (2009) Multi chaotic systems based pixel shuffle for image encryption. Optics Commun 282(11):2123\u20132127","journal-title":"Optics Commun"},{"issue":"4","key":"10584_CR13","doi-asserted-by":"publisher","first-page":"2411","DOI":"10.1007\/s11071-011-0155-7","volume":"67","author":"X Huang","year":"2012","unstructured":"Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dynamics 67(4):2411\u20132417","journal-title":"Nonlinear Dynamics"},{"issue":"1","key":"10584_CR14","first-page":"1","volume":"11","author":"IA Ismail","year":"2010","unstructured":"Ismail IA, Amin M, Diab H (2010) A digital image encryption algorithm based a composition of two chaotic Logistic maps. IJ Network Security 11 (1):1\u201310","journal-title":"IJ Network Security"},{"issue":"5","key":"10584_CR15","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew Tent map and hyper chaotic system of 6th-order CNN. Optik-Int J Light Electron Optics 125(5):1671\u20131675","journal-title":"Optik-Int J Light Electron Optics"},{"key":"10584_CR16","doi-asserted-by":"publisher","DOI":"10.1201\/b17668","volume-title":"Introduction to modern cryptography","author":"J Katz","year":"2014","unstructured":"Katz J, Lindell Y (2014) Introduction to modern cryptography. Chapman and Hall\/CRC, Boca Raton"},{"key":"10584_CR17","doi-asserted-by":"crossref","unstructured":"Kocarev L, Tasev Z (2003) Public-key encryption based on Chebyshev maps. In: Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS\u201903, vol 3. IEEE, pp III\u2013III","DOI":"10.1109\/ISCAS.2003.1204947"},{"issue":"4","key":"10584_CR18","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1049\/iet-ifs.2012.0304","volume":"7","author":"J Li","year":"2013","unstructured":"Li J, Liu H (2013) Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET Inform Secur 7(4):265\u2013270","journal-title":"IET Inform Secur"},{"issue":"18","key":"10584_CR19","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1016\/j.ijleo.2012.10.068","volume":"124","author":"H Liu","year":"2013","unstructured":"Liu H, Wang X, Kadir A (2013) Color image encryption using Choquet fuzzy integral and hyper chaotic system. Optik-Int J Light Electron Optics 124 (18):3527\u20133533","journal-title":"Optik-Int J Light Electron Optics"},{"key":"10584_CR20","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"issue":"10","key":"10584_CR21","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y Mao","year":"2004","unstructured":"Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3D chaotic Baker maps. Int J Bifurcat Chaos 14(10):3613\u20133624","journal-title":"Int J Bifurcat Chaos"},{"issue":"1","key":"10584_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29\u201342","journal-title":"Cryptologia"},{"issue":"3","key":"10584_CR23","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1016\/j.chaos.2009.03.084","volume":"42","author":"S Mazloom","year":"2009","unstructured":"Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3):1745\u20131754","journal-title":"Chaos Solitons Fractals"},{"issue":"3","key":"10584_CR24","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1007\/s11042-012-1292-9","volume":"71","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469\u20131497","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10584_CR25","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.chaos.2007.07.083","volume":"40","author":"R Rhouma","year":"2009","unstructured":"Rhouma R, Meherzi S, Belghith S (2009) OCML-based colour image encryption. Chaos Solitons Fractals 40(1):309\u2013318","journal-title":"Chaos Solitons Fractals"},{"key":"10584_CR26","unstructured":"Rijmen V, Daemen J (2001) Advanced encryption standard. In: Proceedings of federal information processing standards publications, national institute of standards and technology, pp 19\u201322"},{"key":"10584_CR27","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.compeleceng.2017.04.004","volume":"62","author":"MJ Rostami","year":"2017","unstructured":"Rostami MJ, Shahba A, Saryazdi S, Nezamabadi-pour H (2017) A novel parallel image encryption with chaotic windows based on Logistic map. Comput Electric Eng 62:384\u2013400","journal-title":"Comput Electric Eng"},{"key":"10584_CR28","doi-asserted-by":"crossref","unstructured":"Shakiba A (2019) A novel randomized one-dimensional chaotic chebyshev mapping for chosen plaintext attack secure image encryption with a novel chaotic breadth first traversal. Multimed Tools Appl","DOI":"10.1007\/s11042-019-08071-5"},{"key":"10584_CR29","unstructured":"Shakiba A (2019) A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the chebyshev mappings and one-time pad. J King Saud Univ-Comput Inform Sci"},{"key":"10584_CR30","unstructured":"Shakiba A (2020) Generating dynamic S-boxes using 1D chebyshev chaotic maps"},{"key":"10584_CR31","doi-asserted-by":"crossref","unstructured":"Shakiba A (2020) A novel randomized bit-level two-dimensional hyperchaotic image encryption algorithm. Multimed Tools Appl 1\u201331","DOI":"10.1007\/s11042-020-09434-z"},{"issue":"07","key":"10584_CR32","doi-asserted-by":"publisher","first-page":"1650","DOI":"10.1142\/S0218127416501121","volume":"26","author":"A Shakiba","year":"2016","unstructured":"Shakiba A, Hooshmandasl MR, Meybodi MA (2016) Cryptanalysis of multiplicative coupled cryptosystems based on the Chebyshev polynomials. Int J Bifurcat Chaos 26(07):1650\u2013112","journal-title":"Int J Bifurcat Chaos"},{"issue":"18","key":"10584_CR33","doi-asserted-by":"publisher","first-page":"3329","DOI":"10.1016\/j.ijleo.2012.11.002","volume":"124","author":"CY Song","year":"2013","unstructured":"Song CY, Qiao YL, Zhang XZ (2013) An image encryption scheme based on new spatiotemporal chaos. Optik-Int J Light Electron Optics 124(18):3329\u20133334","journal-title":"Optik-Int J Light Electron Optics"},{"key":"10584_CR34","unstructured":"Stallings W (2017) Cryptography and network security: principles and practice. Pearson Upper Saddle River"},{"issue":"6","key":"10584_CR35","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1016\/j.imavis.2007.09.005","volume":"26","author":"X Tong","year":"2008","unstructured":"Tong X, Cui M (2008) Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis Comput 26(6):843\u2013850","journal-title":"Image Vis Comput"},{"issue":"2","key":"10584_CR36","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s11071-014-1729-y","volume":"79","author":"X Wang","year":"2015","unstructured":"Wang X, Wang Q, Zhang Y (2015) A fast image algorithm based on rows and columns switch. Nonlinear Dynamics 79(2):1141\u20131149","journal-title":"Nonlinear Dynamics"},{"key":"10584_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.optlaseng.2017.11.009","volume":"103","author":"X Wang","year":"2018","unstructured":"Wang X, Wang S, Zhang Y, Luo C (2018) A one-time pad color image cryptosystem based on SHA-3 and multiple chaotic systems. Optics Lasers in Eng 103:1\u20138","journal-title":"Optics Lasers in Eng"},{"key":"10584_CR38","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Yang B (2018) Image encryption using 2D H\u00e9non-Sine map and DNA approach. Signal Process 153:11\u201323","journal-title":"Signal Process"},{"issue":"2","key":"10584_CR39","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1007\/s11071-017-3698-4","volume":"90","author":"X Wu","year":"2017","unstructured":"Wu X, Wang K, Wang X, Kan H (2017) Lossless chaotic color image cryptosystem based on DNA encryption and entropy. Nonlinear Dynamics 90(2):855\u2013875","journal-title":"Nonlinear Dynamics"},{"key":"10584_CR40","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using Latin squares. Inform Sci 264:317\u2013339","journal-title":"Inform Sci"},{"key":"10584_CR41","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"issue":"01","key":"10584_CR42","doi-asserted-by":"publisher","first-page":"1850","DOI":"10.1142\/S0218127418500104","volume":"28","author":"G Ye","year":"2018","unstructured":"Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurcat Chaos 28(01):1850\u2013010","journal-title":"Int J Bifurcat Chaos"},{"issue":"4","key":"10584_CR43","doi-asserted-by":"publisher","first-page":"2079","DOI":"10.1007\/s11071-012-0409-z","volume":"69","author":"G Ye","year":"2012","unstructured":"Ye G, Wong KW (2012) An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dynamics 69(4):2079\u20132087","journal-title":"Nonlinear Dynamics"},{"key":"10584_CR44","doi-asserted-by":"crossref","unstructured":"Ye HS, Zhou NR, Gong LH (2020) Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Signal Process 107652","DOI":"10.1016\/j.sigpro.2020.107652"},{"issue":"04","key":"10584_CR45","doi-asserted-by":"publisher","first-page":"1850","DOI":"10.1142\/S0218127418500475","volume":"28","author":"Q Yin","year":"2018","unstructured":"Yin Q, Wang C (2018) A new chaotic image encryption scheme using breadth-first search and dynamic diffusion. Int J Bifurcat Chaos 28(04):1850\u2013047","journal-title":"Int J Bifurcat Chaos"},{"key":"10584_CR46","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.optlaseng.2019.105816","volume":"124","author":"SS Yu","year":"2020","unstructured":"Yu SS, Zhou NR, Gong LH, Nie Z (2020) Optical image encryption algorithm based on phase-truncated short-time fractional fourier transform and hyper-chaotic system. Opt Lasers Eng 124:105\u2013816","journal-title":"Opt Lasers Eng"},{"key":"10584_CR47","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-box. Inform Sci 450:361\u2013377","journal-title":"Inform Sci"},{"issue":"1","key":"10584_CR48","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74\u201382","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"11","key":"10584_CR49","doi-asserted-by":"publisher","first-page":"6303","DOI":"10.1007\/s11042-015-2573-x","volume":"75","author":"P Zhen","year":"2016","unstructured":"Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 75 (11):6303\u20136319","journal-title":"Multimed Tools Appl"},{"key":"10584_CR50","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.optlaseng.2018.05.014","volume":"110","author":"N Zhou","year":"2018","unstructured":"Zhou N, Jiang H, Gong L, Xie X (2018) Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging. Opt Lasers Eng 110:72\u201379","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"10584_CR51","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1007\/s11128-015-0926-z","volume":"14","author":"NR Zhou","year":"2015","unstructured":"Zhou NR, Hua TX, Gong LH, Pei DJ, Liao QH (2015) Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf Process 14(4):1193\u20131213","journal-title":"Quantum Inf Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10584-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10584-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10584-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T05:35:55Z","timestamp":1724477755000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10584-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,13]]},"references-count":51,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10584"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10584-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,13]]},"assertion":[{"value":"15 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that there are no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}