{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T01:27:49Z","timestamp":1771637269275,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862042"],"award-info":[{"award-number":["61862042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61601215"],"award-info":[{"award-number":["61601215"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Special Fund of Jiangxi Province","award":["YC2019-S101"],"award-info":[{"award-number":["YC2019-S101"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10680-y","type":"journal-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T18:03:19Z","timestamp":1614276199000},"page":"19237-19261","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A new perturbation-feedback hybrid control method for reducing the dynamic degradation of digital chaotic systems and its application in image encryption"],"prefix":"10.1007","volume":"80","author":[{"given":"Hongyue","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Lingfeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,25]]},"reference":[{"issue":"1","key":"10680_CR1","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s11071-019-04809-w","volume":"96","author":"M Alawida","year":"2019","unstructured":"Alawida M, Samsudin A, Teh J (2019) S. Enhancing unimodal digital chaotic maps through hybridization [J]. Nonlinear Dyn 96(1):601\u2013613","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"10680_CR2","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1007\/s42835-020-00393-x","volume":"15","author":"B Arpaci","year":"2020","unstructured":"Arpaci B, Kurt E, Celik K, Ciylan B (2020) Colored image encryption and decryption with a new algorithm and a Hyperchaotic electrical circuit [J]. J Electric Eng Technol 15(3):1413\u20131429","journal-title":"J Electric Eng Technol"},{"key":"10680_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.image.2019.08.014","volume":"79","author":"AP Artiles Jose","year":"2019","unstructured":"Artiles Jose AP, Chaves Daniel PB, Pimentel C (2019) Image encryption using block cipher and chaotic sequences [J]. Signal Process Image Communication 79:24\u201331","journal-title":"Signal Process Image Communication"},{"key":"10680_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sigpro.2018.11.010","volume":"157","author":"M Asgari-Chenaghlu","year":"2019","unstructured":"Asgari-Chenaghlu M, Balafar M-A, Feizi-Derakhshi M-R (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation [J]. Signal Process 157:1\u201313","journal-title":"Signal Process"},{"issue":"7","key":"10680_CR5","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1016\/j.cnsns.2012.11.025","volume":"18","author":"MS Azzaz","year":"2013","unstructured":"Azzaz MS, Tanougast C, Sadoudi S et al (2013) A new auto-switched chaotic system and its FPGA implementation [J]. Commun Nonlinear Sci Numer Simul 18(7):1792\u20131804","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"6","key":"10680_CR6","doi-asserted-by":"publisher","first-page":"2543","DOI":"10.1016\/j.cnsns.2010.09.005","volume":"16","author":"MA Ben Farah","year":"2011","unstructured":"Ben Farah MA, Kachouri A, Samet M (2011) Improvement of cryptosystem based on iterating chaotic map [J]. Commun Nonlinear Sci Numer Simul 16(6):2543\u20132553","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"27\u201328","key":"10680_CR7","doi-asserted-by":"publisher","first-page":"19129","DOI":"10.1007\/s11042-020-08718-8","volume":"79","author":"MA Ben Farah","year":"2020","unstructured":"Ben Farah MA, Guesmi R, Kachouri A et al (2020) A new design of cryptosystem based on S-box and chaotic permutation [J]. Multimed Tools Appl 79(27\u201328):19129\u201319150","journal-title":"Multimed Tools Appl"},{"key":"10680_CR8","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"JX Chen","year":"2018","unstructured":"Chen JX, Zhu ZL, Zhang LB et al (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption [J]. Signal Process 142:340\u2013353","journal-title":"Signal Process"},{"issue":"1","key":"10680_CR9","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1140\/epjp\/i2019-12374-y","volume":"134","author":"C Chen","year":"2019","unstructured":"Chen C, Sun KH, Peng YX et al (2019) A novel control method to counteract the dynamical degradation of a digital chaotic sequence [J]. Eur Phys J Plus 134(1):31","journal-title":"Eur Phys J Plus"},{"issue":"4","key":"10680_CR10","doi-asserted-by":"publisher","first-page":"2957","DOI":"10.1007\/s11071-017-3638-3","volume":"89","author":"MA Dastgheib","year":"2017","unstructured":"Dastgheib MA, Farhang M (2017) A digital pseudo-random number generator based on sawtooth chaotic map with a guaranteed enhanced period [J]. Nonlinear Dyn 89(4):2957\u20132966","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"10680_CR11","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1080\/03772063.2016.1251855","volume":"63","author":"T Gopalakrishnan","year":"2017","unstructured":"Gopalakrishnan T, Ramakrishnan S (2017) Chaotic image encryption with hash keying as key generator [J]. IETE J Res 63(2):172\u2013187","journal-title":"IETE J Res"},{"issue":"1","key":"10680_CR12","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/s11277-019-06573-x","volume":"109","author":"T Gopalakrishnan","year":"2019","unstructured":"Gopalakrishnan T, Ramakrishnan S (2019) Image encryption using hyper-chaotic map for permutation and diffusion by multiple hyper-chaotic maps [J]. Wirel Pers Commun 109(1):437\u2013454","journal-title":"Wirel Pers Commun"},{"issue":"8","key":"10680_CR13","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1016\/0167-4048(94)90051-5","volume":"13","author":"H Gustafson","year":"1994","unstructured":"Gustafson H, Dawson E, Nielsen L, Caelli W (1994) A computer package for measuring the strength of encryption algorithms [J]. Computer & Security 13(8):687\u2013697","journal-title":"Computer & Security"},{"key":"10680_CR14","first-page":"119","volume":"35","author":"R Hamza","year":"2017","unstructured":"Hamza R (2017) A novel pseudo random sequence generator for image-cryptographic applications [J]. J Inform Secur Appl 35:119\u2013127","journal-title":"J Inform Secur Appl"},{"issue":"1","key":"10680_CR15","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TCSI.2017.2717943","volume":"65","author":"ZY Hua","year":"2018","unstructured":"Hua ZY, Zhou YC (2018) One-dimensional nonlinear model for producing Chaos [J]. IEEE Trans Circuits Syst I-Regul Pap 65(1):235\u2013246","journal-title":"IEEE Trans Circuits Syst I-Regul Pap"},{"key":"10680_CR16","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"ZY Hua","year":"2015","unstructured":"Hua ZY, Zhou YC, Pun CM et al (2015) 2D sine logistic modulation map for image encryption[J]. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"issue":"7","key":"10680_CR17","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.1364\/OL.44.001536","volume":"44","author":"N Jiang","year":"2019","unstructured":"Jiang N, Zhao A, Xue CP et al (2019) Physical secure optical communication based on private chaotic spectral phase encryption\/decryption [J]. Opt Lett 44(7):1536\u20131539","journal-title":"Opt Lett"},{"issue":"1\u20132","key":"10680_CR18","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s11071-015-2173-3","volume":"82","author":"M Khan","year":"2015","unstructured":"Khan M (2015) A novel image encryption scheme based on multiple chaotic S-boxes [J]. Nonlinear Dyn 82(1\u20132):527\u2013533","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"10680_CR19","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s11071-017-3656-1","volume":"90","author":"D Lambic","year":"2017","unstructured":"Lambic D, Nikolic M (2017) Pseudo-random number generator based on discrete-space chaotic map [J]. Nonlinear Dyn 90(1):223\u2013232","journal-title":"Nonlinear Dyn"},{"issue":"SI","key":"10680_CR20","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.optlaseng.2018.09.015","volume":"112","author":"X Li","year":"2019","unstructured":"Li X, Wang Y, Wang QH et al (2019) Modified integral imaging reconstruction and encryption using an improved SR reconstruction algorithm [J]. Opt Lasers Eng 112(SI):162\u2013169","journal-title":"Opt Lasers Eng"},{"issue":"6","key":"10680_CR21","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.1109\/TCSI.2018.2888688","volume":"66","author":"CQ Li","year":"2019","unstructured":"Li CQ, Feng BB, Li SJ et al (2019) Dynamic analysis of digital chaotic maps via state-mapping networks [J]. IEEE Trans Circuits Syst I-Regul Pap 66(6):2322\u20132335","journal-title":"IEEE Trans Circuits Syst I-Regul Pap"},{"issue":"8","key":"10680_CR22","doi-asserted-by":"publisher","DOI":"10.1088\/0031-8949\/90\/8\/085205","volume":"90","author":"LF Liu","year":"2015","unstructured":"Liu LF, Miao SX (2015) A universal method for improving the dynamical degradation of a digital chaotic system[J]. Phys Scr 90(8):085205","journal-title":"Phys Scr"},{"key":"10680_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.02.031","volume":"396","author":"LF Liu","year":"2017","unstructured":"Liu LF, Miao SX (2017) Delay-introducing method to improve the dynamical degradation of a digital chaotic map [J]. Inf Sci 396:1\u201313","journal-title":"Inf Sci"},{"issue":"4","key":"10680_CR24","first-page":"703","volume":"32","author":"LF Liu","year":"2015","unstructured":"Liu LF, Hu HP, Deng YS (2015) An analogue-digital mixed method for solving the dynamical degradation of digital chaotic systems [J]. IMA J Math Control Inf 32(4):703\u2013715","journal-title":"IMA J Math Control Inf"},{"issue":"07","key":"10680_CR25","doi-asserted-by":"publisher","first-page":"174102","DOI":"10.1142\/S0218127417501036","volume":"27","author":"LF Liu","year":"2017","unstructured":"Liu LF, Lin J, Miao SX et al (2017) A double perturbation method for reducing dynamical degradation of the digital baker map [J]. Int J Bifurcat Chaos 27(07):174102\u2013174396","journal-title":"Int J Bifurcat Chaos"},{"issue":"03","key":"10680_CR26","doi-asserted-by":"publisher","first-page":"1750033","DOI":"10.1142\/S021812741750033X","volume":"27","author":"YQ Liu","year":"2017","unstructured":"Liu YQ, Luo YL, Song SX et al (2017) Counteracting dynamical degradation of digital chaotic Chebyshev map via perturbation [J]. Int J Bifurcat Chaos 27(03):1750033","journal-title":"Int J Bifurcat Chaos"},{"issue":"1","key":"10680_CR27","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11071-016-3051-3","volume":"87","author":"MA Murillo-Escobar","year":"2017","unstructured":"Murillo-Escobar MA, Cruz-Hernandez C, Cardoza-Avendao L et al (2017) A novel pseudorandom number generator based on pseudorandomly enhanced logistic map [J]. Nonlinear Dyn 87(1):407\u2013425","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"10680_CR28","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1140\/epjst\/e2008-00850-4","volume":"165","author":"N Nagaraj","year":"2008","unstructured":"Nagaraj N, Shastry MC, Vaidya PG (2008) Increasing average period lengths by switching of robust chaos maps in finite precision [J]. Eur Phys J Spec Top 165(1):73\u201383","journal-title":"Eur Phys J Spec Top"},{"key":"10680_CR29","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.jisa.2019.05.017","volume":"47","author":"N Nesa","year":"2019","unstructured":"Nesa N, Ghosh T, Banerjee I (2019) Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map [J]. Journal of Information Security and Applications 47:320\u2013328","journal-title":"Journal of Information Security and Applications"},{"issue":"3","key":"10680_CR30","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.chaos.2011.12.006","volume":"45","author":"KJ Persohn","year":"2012","unstructured":"Persohn KJ, Povinelli R (2012) Analyzing logistic map pseudo-random number generators for periodicity induced by finite precision floating-point representation [J]. Chaos, Solitons Fractals 45(3):238\u2013245","journal-title":"Chaos, Solitons Fractals"},{"issue":"7","key":"10680_CR31","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.1049\/iet-ipr.2019.0562","volume":"14","author":"S Rajagopalan","year":"2020","unstructured":"Rajagopalan S, Poori S, Narasimhan M, Rethinam S, Vallipalayam Kuppusamy C, Balasubramanian R, Moorthi Paramasivam Annamalai V, Rengarajan A (2020) Chua's diode and strange attractor: a three-layer hardware\u2013software co-design for medical image confidentiality [J]. IET Image Process 14(7):1354\u20131365","journal-title":"IET Image Process"},{"issue":"8","key":"10680_CR32","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TNB.2017.2780881","volume":"16","author":"D Ravichandran","year":"2017","unstructured":"Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos blend to secure medical privacy [J]. IEEE Trans Nanobiosci 16(8):850\u2013858","journal-title":"IEEE Trans Nanobiosci"},{"issue":"17","key":"10680_CR33","doi-asserted-by":"publisher","first-page":"24765","DOI":"10.1007\/s11042-019-7602-8","volume":"78","author":"JY Tang","year":"2019","unstructured":"Tang JY, Yu ZN, Liu LF (2019) A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption [J]. Multimed Tools Appl 78(17):24765\u201324788","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10680_CR34","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1007\/s11071-015-1957-9","volume":"80","author":"XJ Tong","year":"2015","unstructured":"Tong XJ, Wang Z, Zhang M et al (2015) An image encryption algorithm based on the perturbed high-dimensional chaotic map [J]. Nonlinear Dyn 80(3):1493\u20131508","journal-title":"Nonlinear Dyn"},{"key":"10680_CR35","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.optlaseng.2018.11.010","volume":"115","author":"XY Wang","year":"2019","unstructured":"Wang XY, Li ZM (2019) A color image encryption algorithm based on Hopfield chaotic neural network [J]. Opt Lasers Eng 115:107\u2013118","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"10680_CR36","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.1088\/1674-1056\/23\/3\/030503","volume":"23","author":"XY Wang","year":"2014","unstructured":"Wang XY, Wang Q (2014) A fast image encryption algorithm based on only blocks in cipher text [J]. Chinese Physics B 23(3):1674\u20131056","journal-title":"Chinese Physics B"},{"issue":"17\u201319","key":"10680_CR37","doi-asserted-by":"publisher","first-page":"2617","DOI":"10.1142\/S0217979204025798","volume":"18","author":"SH Wang","year":"2004","unstructured":"Wang SH, Liu WR, Lu HP et al (2004) Periodicity of chaotic trajectories in realizations of finite computer precisions and its implication in chaos communications [C]. Int J Moder Phys B 18(17\u201319):2617\u20132622","journal-title":"Int J Moder Phys B"},{"issue":"2","key":"10680_CR38","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s11071-014-1729-y","volume":"79","author":"XY Wang","year":"2015","unstructured":"Wang XY, Wang Q, Zhang YQ (2015) A fast image algorithm based on rows and columns switch [J]. Nonlinear Dyn 79(2):1141\u20131149","journal-title":"Nonlinear Dyn"},{"issue":"12","key":"10680_CR39","doi-asserted-by":"publisher","first-page":"3469","DOI":"10.1109\/TCSI.2014.2336512","volume":"61","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou YC, Bao L (2014) Discrete wheel-switching chaotic system and applications [J]. IEEE Trans Circuits Syst I-Regul Pap 61(12):3469\u20133477","journal-title":"IEEE Trans Circuits Syst I-Regul Pap"},{"issue":"22","key":"10680_CR40","doi-asserted-by":"publisher","first-page":"5101","DOI":"10.1109\/JLT.2016.2606121","volume":"34","author":"YY Xie","year":"2016","unstructured":"Xie YY, Li JC, Kong ZF et al (2016) Exploiting optics Chaos for image encryption-then-transmission [J]. J Lightwave Technol 34(22):5101\u20135109","journal-title":"J Lightwave Technol"},{"issue":"24","key":"10680_CR41","doi-asserted-by":"publisher","first-page":"240503","DOI":"10.7498\/aps.64.240503","volume":"64","author":"ZS Yuan","year":"2015","unstructured":"Yuan ZS, Li HT, Zhu XH (2015) A digital-analog hybrid random number generator based on memristor [J]. Acta Phys Sin 64(24):240503","journal-title":"Acta Phys Sin"},{"issue":"9","key":"10680_CR42","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","volume":"45","author":"YC Zhou","year":"2015","unstructured":"Zhou YC, Hua ZY, Pun CM et al (2015) Cascade chaotic system with applications [J]. IEEE Trans Cybern 45(9):2001\u20132012","journal-title":"IEEE Trans Cybern"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10680-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10680-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10680-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,29]],"date-time":"2023-01-29T16:22:27Z","timestamp":1675009347000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10680-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,25]]},"references-count":42,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10680"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10680-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,25]]},"assertion":[{"value":"14 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}