{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T14:22:12Z","timestamp":1712067732755},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T00:00:00Z","timestamp":1615939200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T00:00:00Z","timestamp":1615939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11042-021-10670-0","type":"journal-article","created":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T22:02:45Z","timestamp":1616018565000},"page":"21521-21559","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Assessment of diverse image encryption mechanisms under prevalent invasion"],"prefix":"10.1007","volume":"80","author":[{"given":"Anjali","family":"Malik","sequence":"first","affiliation":[]},{"given":"Sunil","family":"Jadav","sequence":"additional","affiliation":[]},{"given":"Shailender","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,17]]},"reference":[{"issue":"11","key":"10670_CR1","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1016\/j.sigpro.2013.03.031","volume":"93","author":"AA Abd El-Latif","year":"2013","unstructured":"Abd El-Latif AA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93(11):2986\u20133000","journal-title":"Signal Process"},{"key":"10670_CR2","first-page":"1","volume-title":"2007 International Conference on Electrical Engineering","author":"HEDH Ahmed","year":"2007","unstructured":"Ahmed HEDH, Kalash HM, Allah OF (2007) Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. In: 2007 International Conference on Electrical Engineering, pp 1\u20137 IEEE"},{"key":"10670_CR3","doi-asserted-by":"crossref","unstructured":"Ahmed F, Siyal MY, Abbas VU 2010 A perceptually scalable and jpeg compression tolerant image encryption scheme. In 2010 Fourth pacific-rim symposium on image and video technology (pp. 232-238). IEEE","DOI":"10.1109\/PSIVT.2010.46"},{"issue":"12","key":"10670_CR4","doi-asserted-by":"publisher","first-page":"4653","DOI":"10.1016\/j.cnsns.2012.05.033","volume":"17","author":"A Akhshani","year":"2012","unstructured":"Akhshani A, Akhavan A, Lim SC, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653\u20134661","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10670_CR5","volume-title":"An introduction to multivariate statistical analysis","author":"TW Anderson","year":"1958","unstructured":"Anderson TW (1958) An introduction to multivariate statistical analysis. Wiley, New York"},{"issue":"15","key":"10670_CR6","doi-asserted-by":"publisher","first-page":"16529","DOI":"10.1007\/s11042-016-3926-9","volume":"76","author":"R Bansal","year":"2017","unstructured":"Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and Vigen\u00e8re scheme. Multimed Tools Appl 76(15):16529\u201316562","journal-title":"Multimed Tools Appl"},{"key":"10670_CR7","doi-asserted-by":"crossref","unstructured":"Barker E, Mouha N, 2017 Recommendation for the triple data encryption algorithm (TDEA) block cipher (no. NIST special publication (SP) 800-67 rev. 2 (draft)). National Institute of Standards and Technology","DOI":"10.6028\/NIST.SP.800-67r2"},{"issue":"7","key":"10670_CR8","first-page":"116","volume":"2","author":"S Basu","year":"2011","unstructured":"Basu S (2011) International data encryption algorithm (Idea)\u2013a typical illustration. J Global Res Comput Sci 2(7):116\u2013118","journal-title":"J Global Res Comput Sci"},{"key":"10670_CR9","volume-title":"2014 International Conference on Electronics","author":"S Chandra","year":"2014","unstructured":"Chandra S, Paira S, Alam SS, Goutam S (2014) A comparative survey of symmetric and asymmetric key cryptography. In: 2014 International Conference on Electronics. Computational Engineering (ICECCE), Communication and"},{"key":"10670_CR10","doi-asserted-by":"crossref","unstructured":"Chavan PV, Atique D (2014) Design and implementation of hierarchical visual cryptography with expansion less shares. arXiv preprint arXiv:1402.2745","DOI":"10.5121\/ijnsa.2014.6108"},{"issue":"3","key":"10670_CR11","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 21(3):749\u2013761","journal-title":"Chaos, Solitons and Fractals"},{"issue":"3","key":"10670_CR12","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.image.2011.11.003","volume":"27","author":"M Fran\u00e7ois","year":"2012","unstructured":"Fran\u00e7ois M, Grosges T, Barchiesi D, Erra R (2012) A new image encryption scheme based on a chaotic function. Signal Process Image Commun 27(3):249\u2013259","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"10670_CR13","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s13319-015-0062-7","volume":"6","author":"G Hanchinamani","year":"2015","unstructured":"Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Res 6(3):30","journal-title":"3D Res"},{"key":"10670_CR14","unstructured":"Jabade V, Gengaje S (2016) Modelling of geometric attacks for digital image watermarking. Int J Innov Eng Res Technol [IJIERT], ISSN:2394\u20133696"},{"issue":"7","key":"10670_CR15","first-page":"157","volume":"9","author":"Y Jain","year":"2016","unstructured":"Jain Y, Bansal R, Sharma G, Kumar B, Gupta S (2016) Image encryption schemes: a complete survey. Int J Signal Process, Image Process Pattern Recogn 9(7):157\u2013192","journal-title":"Int J Signal Process, Image Process Pattern Recogn"},{"issue":"1","key":"10670_CR16","first-page":"429","volume":"2","author":"M John Justin","year":"2012","unstructured":"John Justin M, Manimurugan S (2012) A survey on various encryption techniques. Int J Soft Comput Eng (IJSCE) ISSN: 2231-2307 2(1):429\u2013432","journal-title":"Int J Soft Comput Eng (IJSCE)"},{"key":"10670_CR17","unstructured":"Kamble VD, Doke K (2018) A novel survey on image encryption. Int Res J Eng Technol"},{"key":"10670_CR18","doi-asserted-by":"crossref","unstructured":"Kaur M, Kumar V (2018) A comprehensive review on image encryption techniques. Arch Comput Methods Eng:1\u201329","DOI":"10.1007\/s11831-018-9298-8"},{"key":"10670_CR19","unstructured":"Kester QA (2013) A hybrid cryptosystem based on Vigenere cipher and columnar transposition cipher. arXiv preprint arXiv:1307.7786."},{"key":"10670_CR20","first-page":"741","volume":"2","author":"KT Kevadia","year":"2016","unstructured":"Kevadia KT, Nayak AM, Patel KS, Patel BU (2016) A literature survey on image encryption. Int J Res Sci Eng Technol 2:741\u2013746","journal-title":"Int J Res Sci Eng Technol"},{"key":"10670_CR21","volume-title":"Cryptography on system-Chip Design using VLSI","author":"R Kohli","year":"2013","unstructured":"Kohli R (2013) Cryptography on system-Chip Design using VLSI. Lambert Academic Publication House, Germany"},{"key":"10670_CR22","unstructured":"Kumar, M., Lahcen, R.A.M., Mohapatra, R.N., Alwala, C. and Kurella, S.V.K., 2020. Review of image encryption techniques. Pp. 31-37."},{"issue":"1","key":"10670_CR23","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/s13319-018-0162-2","volume":"9","author":"M Kumari","year":"2018","unstructured":"Kumari M, Gupta S (2018) A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher. 3D Res 9(1):10","journal-title":"3D Res"},{"issue":"4","key":"10670_CR24","doi-asserted-by":"publisher","first-page":"Article No. 148","DOI":"10.1007\/s13319-017-0148-5","volume":"8","author":"M Kumari","year":"2017","unstructured":"Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Research 8(4):Article No. 148","journal-title":"3D Research"},{"issue":"43","key":"10670_CR25","doi-asserted-by":"publisher","first-page":"33161","DOI":"10.1007\/s11042-020-09627-6","volume":"79","author":"M Kumari","year":"2020","unstructured":"Kumari M, Gupta S, Malik A (2020) A superlative image encryption technique based on bit plane using key-based electronic code book. Multimed Tools Appl 79(43):33161\u201333191","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10670_CR26","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s11042-012-1281-z","volume":"66","author":"S Li","year":"2013","unstructured":"Li S, Zhao Y, Qu B (2013) Image scrambling based on chaotic sequences and Vegin\u00e8re cipher. Multimed Tools Appl 66(3):573\u2013588","journal-title":"Multimed Tools Appl"},{"issue":"20","key":"10670_CR27","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739\u201320753","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10670_CR28","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MMUL.2005.46","volume":"12","author":"V Licks","year":"2005","unstructured":"Licks V, Jordan R (2005) Geometric attacks on image watermarking systems. IEEE Multimedia 12(3):68\u201378","journal-title":"IEEE Multimedia"},{"issue":"1","key":"10670_CR29","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s13319-016-0114-7","volume":"8","author":"H Liu","year":"2017","unstructured":"Liu H, Jin C (2017) A novel color image encryption algorithm based on quantum chaos sequence. 3D Research 8(1):4","journal-title":"3D Research"},{"key":"10670_CR30","doi-asserted-by":"publisher","first-page":"6937","DOI":"10.1109\/ACCESS.2018.2889896","volume":"7","author":"X Liu","year":"2018","unstructured":"Liu X, Xiao D, Xiang Y (2018) Quantum image encryption using intra and inter bit permutation based on logistic map. IEEE Access 7:6937\u20136946","journal-title":"IEEE Access"},{"key":"10670_CR31","doi-asserted-by":"crossref","unstructured":"Loukhaoukha K, Chouinard JY, Berdai (2012) A secure image encryption algorithm based on Rubik's cube principle. J Electr Comput Eng","DOI":"10.1155\/2012\/173931"},{"key":"10670_CR32","first-page":"102","volume":"1","author":"S Mandal","year":"2014","unstructured":"Mandal S, Das S, Nath A (2014) Data hiding and retrieval using visual cryptography. Int J Innov Res Advan Eng 1:102\u2013110","journal-title":"Int J Innov Res Advan Eng"},{"key":"10670_CR33","first-page":"1","volume-title":"Ann Int Cryptol Conf","author":"M Matsui","year":"1994","unstructured":"Matsui M (1994) The first experimental cryptanalysis of the data encryption standard. In: Ann Int Cryptol Conf. Springer, Berlin, pp 1\u201311"},{"issue":"1","key":"10670_CR34","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a \u201cchaotic\u201d encryption algorithm. Cryptologia 13(1):29\u201342","journal-title":"Cryptologia"},{"issue":"23","key":"10670_CR35","first-page":"13265","volume":"12","author":"OF Mohammad","year":"2017","unstructured":"Mohammad OF, Ahmed Ahmed FYH, Zeebaree SRM (2017) A Survey and Analysis of the Image Encryption Methods. Int J Appl Eng Res ISSN 0973\u20134562 12(23):13265\u201313280","journal-title":"Int J Appl Eng Res"},{"issue":"2","key":"10670_CR36","first-page":"44","volume":"3","author":"A Mousa","year":"2006","unstructured":"Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. IJCSA 3(2):44\u201356","journal-title":"IJCSA"},{"issue":"2","key":"10670_CR37","first-page":"44","volume":"3","author":"A Mousa","year":"2006","unstructured":"Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. IJCSA 3(2):44\u201356","journal-title":"IJCSA"},{"issue":"4","key":"10670_CR38","first-page":"170","volume":"2","author":"B Padmavathi","year":"2013","unstructured":"Padmavathi B, Ranjitha Kumari S (2013) A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique. Int J Sci Res (IJSR), India, Online ISSN: 2319\u20137064 2(4):170\u2013174","journal-title":"Int J Sci Res (IJSR), India"},{"issue":"1","key":"10670_CR39","first-page":"291","volume":"64","author":"S Patel","year":"2020","unstructured":"Patel S, Vaish A (2020) A systematic survey on image encryption using compressive sensing. J Sci Res 64(1):291\u2013296","journal-title":"J Sci Res"},{"key":"10670_CR40","unstructured":"Rashi K, Manoj K (2013) Optimized on System Analysis Using AES and X-tea. Int J Adv Res Comput Sci Software Eng (2277-128X) 3(2)"},{"issue":"19","key":"10670_CR41","first-page":"12","volume":"50","author":"R Rayarikar","year":"2012","unstructured":"Rayarikar R, Upadhyay S, Pimpale P (2012) SMS encryption using AES algorithm on android. Int J Comput Appl 50(19):12\u201317","journal-title":"Int J Comput Appl"},{"key":"10670_CR42","doi-asserted-by":"crossref","unstructured":"Rivest RL (1996) The RC5 encryption algorithm, from dr. dobb\u2019s journal, january, 1995. In: William Stallings, Practical cryptography for data internetworks. IEEE Computer Society Press","DOI":"10.1007\/3-540-60590-8_7"},{"issue":"2","key":"10670_CR43","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s11042-010-0652-6","volume":"56","author":"IS Sam","year":"2012","unstructured":"Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56(2):315\u2013330","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10670_CR44","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1007\/s11071-012-0402-6","volume":"69","author":"IS Sam","year":"2012","unstructured":"Sam IS, Devaraj P, Bhuvaneswaran RS (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics 69(4):1995\u20132007","journal-title":"Nonlinear Dynamics"},{"issue":"4","key":"10670_CR45","first-page":"38","volume":"19","author":"B Schneier","year":"1994","unstructured":"Schneier B (1994) The blowfish encryption algorithm. Dr Dobb's J-Software Tools Professional Programmer 19(4):38\u201343","journal-title":"Dr Dobb's J-Software Tools Professional Programmer"},{"key":"10670_CR46","unstructured":"Sowjanya PL, Lorraine KS (2016) Image encryption using secure force algorithm with affine transform for wsn. Int J Eng Sci Res Technol"},{"issue":"12","key":"10670_CR47","first-page":"563","volume":"5","author":"G Tanwar","year":"2015","unstructured":"Tanwar G, Mishra N (2015) Survey on Image Encryption Techniques. Int J Adv Res Comput Sci Software Eng, ISSN: 2277 128X 5(12):563\u2013569","journal-title":"Int J Adv Res Comput Sci Software Eng"},{"key":"10670_CR48","doi-asserted-by":"crossref","unstructured":"Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2017) SIT: a lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv:1704.08688.","DOI":"10.14569\/IJACSA.2017.080151"},{"key":"10670_CR49","volume-title":"An improved chessboard covering algorithm with generalized fractal strategy","author":"H Wang","year":"2019","unstructured":"Wang H, Tao X, Huang JS (2019) An improved chessboard covering algorithm with generalized fractal strategy."},{"issue":"2","key":"10670_CR50","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip J Sci Technol, J Selected Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"Cyber J: Multidiscip J Sci Technol, J Selected Areas Telecommun (JSAT)"},{"issue":"01","key":"10670_CR51","doi-asserted-by":"publisher","first-page":"1850010","DOI":"10.1142\/S0218127418500104","volume":"28","author":"G Ye","year":"2018","unstructured":"Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurcation Chaos 28(01):1850010","journal-title":"Int J Bifurcation Chaos"},{"issue":"1","key":"10670_CR52","doi-asserted-by":"publisher","first-page":"9","DOI":"10.26483\/ijarcs.v10i1.6350","volume":"10","author":"MAB Younes","year":"2019","unstructured":"Younes MAB (2019) A survey of the most current image encryption and decryption techniques. Int J Adv Res in Comp Sci 10(1):9","journal-title":"Int J Adv Res in Comp Sci"},{"issue":"6","key":"10670_CR53","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s11128-018-1902-1","volume":"17","author":"N Zhou","year":"2018","unstructured":"Zhou N, Chen W, Yan X, Wang Y (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quantum Inform Process 17(6):137","journal-title":"Quantum Inform Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10670-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10670-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10670-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T05:17:54Z","timestamp":1621919874000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10670-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,17]]},"references-count":53,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10670"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10670-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,17]]},"assertion":[{"value":"2 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}