{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:15:02Z","timestamp":1760710502796,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["No.2018J01100"],"award-info":[{"award-number":["No.2018J01100"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No: 61672124"],"award-info":[{"award-number":["No: 61672124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund","award":["No: MMJJ20170203"],"award-info":[{"award-number":["No: MMJJ20170203"]}]},{"name":"Liaoning Province Science and Technology Innovation Leading Talents Program Project","award":["No: XLYC1802013"],"award-info":[{"award-number":["No: XLYC1802013"]}]},{"name":"Key R&D Projects of Liaoning Province","award":["No: 2019020105-JH2\/103"],"award-info":[{"award-number":["No: 2019020105-JH2\/103"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10724-3","type":"journal-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T10:03:39Z","timestamp":1614247419000},"page":"19291-19305","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A secure image encryption scheme based on genetic mutation and MLNCML chaotic system"],"prefix":"10.1007","volume":"80","author":[{"given":"Ying-Qian","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9574-9919","authenticated-orcid":false,"given":"Hui-Fang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xing-Yuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xin-Hao","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,25]]},"reference":[{"key":"10724_CR1","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.chaos.2016.12.018","volume":"95","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu \u00dc, Ka\u00e7ar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-box. Chaos, Solitons Fractals 95:92\u2013101","journal-title":"Chaos, Solitons Fractals"},{"issue":"1","key":"10724_CR2","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1007\/s11042-015-3088-1","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76(1):1159\u20131175","journal-title":"Multimed Tools Appl"},{"key":"10724_CR3","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"doi-asserted-by":"crossref","unstructured":"Chapaneri S, Chapaneri R, Sarode T (2014) Evaluation of chaotic map lattice systems for image encryption. International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA), Mumbai: 59\u201364.","key":"10724_CR4","DOI":"10.1109\/CSCITA.2014.6839235"},{"key":"10724_CR5","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.sigpro.2017.12.021","volume":"146","author":"S Dhall","year":"2017","unstructured":"Dhall S, Pal SK, Sharma K (2017) Cryptanalysis of image encryption scheme based on a new 1D chaotic system. Signal Process 146:22\u201332","journal-title":"Signal Process"},{"issue":"16","key":"10724_CR6","doi-asserted-by":"publisher","first-page":"21109","DOI":"10.1007\/s11042-017-5570-4","volume":"77","author":"S Guo","year":"2018","unstructured":"Guo S, Liu Y, Gong L, Yu W, Gong Y (2018) Bit-level image cryptosystem combining 2D hyper-chaos with a modified non-adjacent spatiotemporal chaos. Multimed Tools Appl 77(16):21109\u201321130","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10724_CR7","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"X Huang","year":"2014","unstructured":"Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72(1):57\u201370","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"publisher","unstructured":"Kocarev LC, Jakimoski G, Stojanovski T et al (1998) From chaotic maps to encryption schemes. Proceedings of the 1998 IEEE international symposium on circuits and systems (cat. No.98CH36187), Monterey, CA: 514-517. https:\/\/doi.org\/10.1109\/ISCAS.1998.698968.","key":"10724_CR8","DOI":"10.1109\/ISCAS.1998.698968"},{"doi-asserted-by":"crossref","unstructured":"Kong L, Li L (2016) A new image encryption algorithm based on chaos, 2016 35th Chinese control conference (CCC), Chengdu: 4932-4937.","key":"10724_CR9","DOI":"10.1109\/ChiCC.2016.7554120"},{"key":"10724_CR10","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238\u2013246","journal-title":"Opt Lasers Eng"},{"key":"10724_CR11","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.image.2018.01.002","volume":"62","author":"M Li","year":"2018","unstructured":"Li M, Guo Y, Huang J et al (2018) Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure. Signal Process Image Commun 62:164\u2013172","journal-title":"Signal Process Image Commun"},{"key":"10724_CR12","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1007\/s11071-014-1517-8","volume":"78","author":"F \u00d6zkaynak","year":"2014","unstructured":"\u00d6zkaynak F, YavuzS (2014) Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dynamics 78:1311\u20131320","journal-title":"Nonlinear Dynamics"},{"issue":"17","key":"10724_CR13","doi-asserted-by":"publisher","first-page":"10631","DOI":"10.1007\/s11042-014-2115-y","volume":"75","author":"Z Parvin","year":"2016","unstructured":"Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75(17):10631\u201310648","journal-title":"Multimed Tools Appl"},{"unstructured":"The USC-SIPI image database. (n.d.) http:\/\/sipi.usc.edu\/database\/","key":"10724_CR14"},{"issue":"5","key":"10724_CR15","doi-asserted-by":"publisher","first-page":"6229","DOI":"10.1007\/s11042-016-3311-8","volume":"76","author":"X Wang","year":"2017","unstructured":"Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229\u20136245","journal-title":"Multimed Tools Appl"},{"issue":"6921","key":"10724_CR16","first-page":"397","volume":"421","author":"JD Watson","year":"2003","unstructured":"Watson JD, Crick FHC (2003) A Structure for Deoxyribose Nucleic Acid. Nature 421(6921):397\u20138; discussion 396","journal-title":"Nature"},{"key":"10724_CR17","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"X Wu","year":"2018","unstructured":"Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272\u2013287","journal-title":"Signal Process"},{"issue":"4","key":"10724_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11071-015-2465-7","volume":"83","author":"G Ye","year":"2016","unstructured":"Ye G, Zhao H, Chai H (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dynamics 83(4):1\u201311","journal-title":"Nonlinear Dynamics"},{"key":"10724_CR19","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1007\/s11071-018-4391-y","volume":"94","author":"G Ye","year":"2018","unstructured":"Ye G, Pan C, Huang XL et al (2018) An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dynamics 94:745\u2013756","journal-title":"Nonlinear Dynamics"},{"issue":"1","key":"10724_CR20","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.26.1.013021","volume":"26","author":"K Zhan","year":"2017","unstructured":"Zhan K, Wei D, Shi J, Yu J (2017) Cross-utilizing hyperchaotic and DNA sequences for image encryption. J Electron Imag 26(1):013021","journal-title":"J Electron Imag"},{"issue":"3","key":"10724_CR21","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/s11071-014-1331-3","volume":"77","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dynamics 77(3):687\u2013698","journal-title":"Nonlinear Dynamics"},{"issue":"23","key":"10724_CR22","doi-asserted-by":"publisher","first-page":"6276","DOI":"10.1016\/j.ijleo.2013.05.009","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Wei X (2013) A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system. Optik-Int J Light Electron Opt 124(23):6276\u20136281","journal-title":"Optik-Int J Light Electron Opt"},{"issue":"3","key":"10724_CR23","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/j.compeleceng.2013.08.008","volume":"40","author":"X Zhang","year":"2014","unstructured":"Zhang X, Shao L, Zhao Z, Liang Z (2014) An image encryption scheme based on constructing large permutation with chaotic sequence. Comput Electric Eng 40(3):931\u2013941","journal-title":"Comput Electric Eng"},{"issue":"3","key":"10724_CR24","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.aeue.2013.08.007","volume":"68","author":"Q Zhang","year":"2014","unstructured":"Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEU \u2013 Int J Electron Commun 68(3):186\u2013192","journal-title":"AEU \u2013 Int J Electron Commun"},{"key":"10724_CR25","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.optlaseng.2016.02.002","volume":"82","author":"YQ Zhang","year":"2016","unstructured":"Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the MLNCML system using DNA sequences. Opt Lasers Eng 82:95\u2013103","journal-title":"Opt Lasers Eng"},{"issue":"11","key":"10724_CR26","doi-asserted-by":"publisher","first-page":"6303","DOI":"10.1007\/s11042-015-2573-x","volume":"75","author":"P Zhen","year":"2016","unstructured":"Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 75(11):6303\u20136319","journal-title":"Multimed Tools Appl"},{"key":"10724_CR27","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10724-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10724-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10724-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T06:04:56Z","timestamp":1621577096000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10724-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,25]]},"references-count":27,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10724"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10724-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,2,25]]},"assertion":[{"value":"14 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/competing interests"}}]}}