{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T23:49:42Z","timestamp":1768693782364,"version":"3.49.0"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2021,4,17]],"date-time":"2021-04-17T00:00:00Z","timestamp":1618617600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,4,17]],"date-time":"2021-04-17T00:00:00Z","timestamp":1618617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10660-2","type":"journal-article","created":{"date-parts":[[2021,4,17]],"date-time":"2021-04-17T08:02:31Z","timestamp":1618646551000},"page":"25367-25387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A new color image encryption using 2D improved logistic coupling map"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2344-6438","authenticated-orcid":false,"given":"Chanil","family":"Pak","sequence":"first","affiliation":[]},{"given":"Jongtae","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Ryusung","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Okchol","family":"Song","sequence":"additional","affiliation":[]},{"given":"Huigon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Ilgwon","family":"Yun","sequence":"additional","affiliation":[]},{"given":"Jinsim","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,17]]},"reference":[{"key":"10660_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","volume":"160","author":"M Alawida","year":"2019","unstructured":"Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45\u201358","journal-title":"Signal Process"},{"key":"10660_CR2","unstructured":"Bassham LE III (2010) SP 800-22 Rev. 1a. A Statistical test suite for random and pseudorandom number generators for cryptographic applications, Tech. rep. sp 800-22 National Institute of Standards & Technology"},{"key":"10660_CR3","first-page":"50","volume":"32","author":"E Bensikaddour","year":"2020","unstructured":"Bensikaddour E, Bentoutou Y, Taleb N (2020) Embedded implementation of multispectral satellite image encryption using a chaos-based block cipher. J of King Saud University - Comp and Info Sci 32:50\u201356","journal-title":"J of King Saud University - Comp and Info Sci"},{"key":"10660_CR4","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2d-LICM hyperchaotic map. Signal Process 143:122\u2013133","journal-title":"Signal Process"},{"key":"10660_CR5","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1007\/s11042-015-3088-1","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76:1159\u20131175","journal-title":"Multimed Tools Appl"},{"key":"10660_CR6","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"key":"10660_CR7","doi-asserted-by":"publisher","first-page":"9907","DOI":"10.1007\/s11042-016-3585-x","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X, Yang K, Gan Z (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76:9907\u20139927","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"10660_CR8","first-page":"78","volume":"24","author":"CL Chen","year":"2015","unstructured":"Chen CL, Ling LY, Hui QS, Xiu LJ (2015) A perturbation method to the tent map based on Lyapunov exponent and its application. Chinese Physics B 24(10):78\u201385","journal-title":"Chinese Physics B"},{"key":"10660_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sigpro.2018.11.010","volume":"157","author":"MA Chenaghlu","year":"2019","unstructured":"Chenaghlu MA, Balafar MA, Derakhshi MRF (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process 157:1\u201313","journal-title":"Signal Process"},{"key":"10660_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.sigpro.2017.12.021","volume":"146","author":"S Dhall","year":"2018","unstructured":"Dhall S, Pal SK, Sharma K (2018) Cryptanalysis of image encryption scheme based on a new 1D chaotic system. Signal Process 146:22\u201332","journal-title":"Signal Process"},{"key":"10660_CR11","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2015.10.027","volume":"355-356","author":"A Diaconu","year":"2015","unstructured":"Diaconu A (2015) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Info Sci 355-356:314\u2013327","journal-title":"Info Sci"},{"issue":"2","key":"10660_CR12","first-page":"136","volume":"67","author":"AAA El-Latif","year":"2013","unstructured":"El-Latif AAA, Niu X (2013) A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU 67(2):136\u2013143","journal-title":"AEU"},{"key":"10660_CR13","first-page":"173","volume":"47","author":"M Essaid","year":"2019","unstructured":"Essaid M, Akharraz I, Saaidi A, Mouhib A (2019) Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. JISA 47:173\u2013187","journal-title":"JISA"},{"key":"10660_CR14","doi-asserted-by":"publisher","first-page":"27919","DOI":"10.1007\/s11042-018-5974-9","volume":"77","author":"Z Gan","year":"2018","unstructured":"Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three-dimensional brownian motion. Multimed Tools Appl 77:27919\u201327953","journal-title":"Multimed Tools Appl"},{"key":"10660_CR15","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.sigpro.2019.06.010","volume":"164","author":"HM Ghadirli","year":"2019","unstructured":"Ghadirli HM, Nodehi A, Enayatifar R (2019) An overview of encryption algorithms in color images. Signal Process 164:163\u2013185","journal-title":"Signal Process"},{"key":"10660_CR16","doi-asserted-by":"publisher","first-page":"27017","DOI":"10.1007\/s11042-018-5902-z","volume":"77","author":"A Girdhar","year":"2018","unstructured":"Girdhar A, Kumar V (2018) A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences. Multimed Tools Appl 77:27017\u201327039","journal-title":"Multimed Tools Appl"},{"key":"10660_CR17","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018) 2D Logistic-Sine-coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"key":"10660_CR18","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted-Sine map. Info Sci 339:237\u2013253","journal-title":"Info Sci"},{"key":"10660_CR19","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun C, Chen CLP (2015) 2D Sine Logistic modulation map for image encryption. Info Sci 297:80\u201394","journal-title":"Info Sci"},{"issue":"4","key":"10660_CR20","doi-asserted-by":"publisher","first-page":"795","DOI":"10.21917\/ijivp.2014.0114","volume":"4","author":"RR Kumar","year":"2014","unstructured":"Kumar RR, Kumar MB (2014) A new chaotic image encryption using parametric switching based permutation and diffusion. IJIVP 4(4):795\u2013804","journal-title":"IJIVP"},{"key":"10660_CR21","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.sigpro.2018.01.026","volume":"147","author":"R Lan","year":"2018","unstructured":"Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133\u2013145","journal-title":"Signal Process"},{"key":"10660_CR22","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2018.12.002","volume":"115","author":"H Li","year":"2019","unstructured":"Li H, Wang Y, Zuo Z (2019) Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms. Opt Lasers Eng 115:197\u2013207","journal-title":"Opt Lasers Eng"},{"key":"10660_CR23","doi-asserted-by":"publisher","first-page":"10217","DOI":"10.1007\/s11042-017-5406-2","volume":"77","author":"J Liu","year":"2018","unstructured":"Liu J, Yang D, Zhou H, Chen S (2018) A digital image encryption algorithm based on bit-planes and an improved logistic map. Multimed Tools Appl 77:10217\u201310233","journal-title":"Multimed Tools Appl"},{"key":"10660_CR24","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ins.2020.02.008","volume":"520","author":"A Mansouri","year":"2020","unstructured":"Mansouri A, Wang X (2020) A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Info Sci 520:46\u201362","journal-title":"Info Sci"},{"key":"10660_CR25","first-page":"31","volume":"4","author":"YWu NPCR","year":"2011","unstructured":"NPCR YWu (2011) UACI Randomness tests for image encryption [J] Cyber Journals: multidisciplinary journals in science and technology. JSAT 4:31\u201338","journal-title":"JSAT"},{"key":"10660_CR26","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/BF00051604","volume":"64","author":"JA Nunez","year":"1996","unstructured":"Nunez JA, Cincotta PM, Wachlin FC (1996) Information entropy. Celest Mech Dyn Astron 64:43\u201353","journal-title":"Celest Mech Dyn Astron"},{"key":"10660_CR27","doi-asserted-by":"publisher","first-page":"12027","DOI":"10.1007\/s11042-018-6739-1","volume":"78","author":"C Pak","year":"2019","unstructured":"Pak C, An K, Jang P, Kim J, Kim S (2019) A novel bit-level color image encryption using improved 1D chaotic map. Multimed Tools Appl 78:12027\u201312242","journal-title":"Multimed Tools Appl"},{"key":"10660_CR28","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"key":"10660_CR29","doi-asserted-by":"publisher","first-page":"106162","DOI":"10.1016\/j.asoc.2020.106162","volume":"90","author":"KU Shahna","year":"2020","unstructured":"Shahna KU, Mohamed A (2020) A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. App Soft Comp J 90:106162","journal-title":"App Soft Comp J"},{"key":"10660_CR30","doi-asserted-by":"publisher","first-page":"25223","DOI":"10.1007\/s11042-018-5782-2","volume":"77","author":"SJ Sheela","year":"2018","unstructured":"Sheela SJ, Suresh KV, Tandur D (2018) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 77:25223\u201325251","journal-title":"Multimed Tools Appl"},{"key":"10660_CR31","doi-asserted-by":"publisher","first-page":"30993","DOI":"10.1007\/s11042-018-6145-8","volume":"77","author":"NB Slimane","year":"2018","unstructured":"Slimane NB, Aouf N, Bouallegue K, Machhout M (2018) A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model. Multimed Tools Appl 77:30993\u201331019","journal-title":"Multimed Tools Appl"},{"issue":"124","key":"10660_CR32","doi-asserted-by":"publisher","first-page":"3329","DOI":"10.1016\/j.ijleo.2012.11.002","volume":"124","author":"CY Song","year":"2013","unstructured":"Song CY, Qiao YL, Zhang XZ (2013) An image encryption scheme based on new spatiotemporal chaos. Optik 124(124):3329\u20133334","journal-title":"Optik"},{"key":"10660_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","volume":"80","author":"Z Tang","year":"2016","unstructured":"Tang Z, Song J, Zhang X, Sun R (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1\u201311","journal-title":"Opt Lasers Eng"},{"key":"10660_CR34","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.cjph.2019.09.011","volume":"62","author":"R Vidhya","year":"2019","unstructured":"Vidhya R, Brindha M, Gounden NA (2019) A secure image encryption algorithm based on a parametric switching chaotic system. Chinese J Physics 62:26\u201342","journal-title":"Chinese J Physics"},{"key":"10660_CR35","doi-asserted-by":"publisher","first-page":"6243","DOI":"10.1007\/s11042-017-4534-z","volume":"77","author":"XY Wang","year":"2018","unstructured":"Wang XY, Li P, Zhang YQ, Liu LY, Zhang H, Wang X (2018) A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed Tools Appl 77:6243\u20136265","journal-title":"Multimed Tools Appl"},{"key":"10660_CR36","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.compeleceng.2017.07.026","volume":"65","author":"W Wang","year":"2018","unstructured":"Wang W, Si M, Pang Y, Ran P, Wang H, Jiang X, Liu Y, Wu J, Wu W, Chilamkurti N, Jeon G (2018) An encryption algorithm based on combined chaos in body area networks. Comput Electr Eng 65:282\u2013291","journal-title":"Comput Electr Eng"},{"key":"10660_CR37","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/j.optlaseng.2019.05.013","volume":"121","author":"M Wang","year":"2019","unstructured":"Wang M, Wang X, Zhang Y, Zhou S, Zhao T (2019) A novel chaotic system and its application in a color image cryptosystem. Opt Lasers Eng 121:479\u2013494","journal-title":"Opt Lasers Eng"},{"key":"10660_CR38","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","volume":"342","author":"X Wang","year":"2015","unstructured":"Wang X, Zhang H (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51\u201360","journal-title":"Opt Commun"},{"key":"10660_CR39","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.optlaseng.2016.06.008","volume":"86","author":"XY Wang","year":"2016","unstructured":"Wang XY, Zhang YQ, Liu LT (2016) An enhanced sub-image encryption method. Opt Lasers Eng 86:248\u2013254","journal-title":"Opt Lasers Eng"},{"key":"10660_CR40","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.optcom.2014.12.026","volume":"341","author":"W Wen","year":"2015","unstructured":"Wen W, Zhang Y, Fang Z, Chen JX (2015) Infrared target-based selective encryption by chaotic maps. Opt Commun 341:131\u2013139","journal-title":"Opt Commun"},{"key":"10660_CR41","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"L Wenhao","year":"2016","unstructured":"Wenhao L, Kehui S, Congxu Z (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"key":"10660_CR42","first-page":"285","volume":"16D","author":"A Wolf","year":"1985","unstructured":"Wolf A, Swift JB, Swinney HL, Vastano JA (1985) Determining Lyapunov exponents from a time series. Physica 16D:285\u2013317","journal-title":"Physica"},{"key":"10660_CR43","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ins.2016.02.041","volume":"349\u2013350","author":"X Wu","year":"2016","unstructured":"Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Info Sci 349\u2013350:137\u2013153","journal-title":"Info Sci"},{"key":"10660_CR44","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"X Wu","year":"2018","unstructured":"Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272\u2013287","journal-title":"Signal Process"},{"key":"10660_CR45","doi-asserted-by":"publisher","first-page":"107684","DOI":"10.1016\/j.sigpro.2020.107684","volume":"176","author":"C Xiuli","year":"2020","unstructured":"Xiuli C, Jianqiang B, Zhihua G, Xianxing L, Yushu Z, Yiran C (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176:107684","journal-title":"Signal Process"},{"key":"10660_CR46","first-page":"115670","volume":"80","author":"K Xuejing","year":"2020","unstructured":"Xuejing K, Zihui G (2020) A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system. Signal Process: Image Commu 80:115670","journal-title":"Signal Process: Image Commu"},{"key":"10660_CR47","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585\u20134608","journal-title":"Multimed Tools Appl"},{"key":"10660_CR48","first-page":"87","volume":"52","author":"HM Yuan","year":"2017","unstructured":"Yuan HM, Liu Y, Lin T, Hu T, Gong LH (2017) A new parallel image cryptosystem based on 5D hyper-chaotic system. Signal Process: Image Commu 52:87\u201396","journal-title":"Signal Process: Image Commu"},{"key":"10660_CR49","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.ins.2020.02.012","volume":"520","author":"Y Zhang","year":"2020","unstructured":"Zhang Y (2020) The fast image encryption algorithm based on lifting scheme and chaos. Info Sci 520:177\u2013194","journal-title":"Info Sci"},{"issue":"11","key":"10660_CR50","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1016\/j.sigpro.2013.04.021","volume":"93","author":"Y Zhou","year":"2013","unstructured":"Zhou Y, Bao L, Chen CLP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039\u20133052","journal-title":"Signal Process"},{"issue":"7","key":"10660_CR51","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97(7):172\u2013182","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10660-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10660-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10660-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T16:39:05Z","timestamp":1675183145000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10660-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,17]]},"references-count":51,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10660"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10660-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,17]]},"assertion":[{"value":"14 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}