{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:03:26Z","timestamp":1772283806778,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T00:00:00Z","timestamp":1616112000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T00:00:00Z","timestamp":1616112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11042-021-10750-1","type":"journal-article","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T13:04:49Z","timestamp":1616159089000},"page":"21727-21750","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["An efficient image encryption scheme using elementary cellular automata with novel permutation box"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3964-8843","authenticated-orcid":false,"given":"Ashish","family":"Kumar","sequence":"first","affiliation":[]},{"given":"N. S.","family":"Raghava","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,19]]},"reference":[{"issue":"1","key":"10750_CR1","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.cnsns.2012.05.023","volume":"18","author":"AA Abdo","year":"2013","unstructured":"Abdo AA, Lian S, Ismail IA, Amin M, Diab H (2013) A cryptosystem based on elementary cellular automata. Commun Nonlinear Sci Numer Simul 18(1):136\u2013147. https:\/\/doi.org\/10.1016\/j.cnsns.2012.05.023","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10750_CR2","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Doctoral dissertation University of Buckingham. http:\/\/bear.buckingham.ac.uk\/id\/eprint\/149"},{"key":"10750_CR3","doi-asserted-by":"publisher","unstructured":"Ahlawat S, Choudhary A, Nayyar A, Singh S, Yoon B (2020) Improved Handwritten Digit Recognition Using Convolutional Neural Networks (CNN). Sensors 20(12):3344. https:\/\/doi.org\/10.3390\/s20123344","DOI":"10.3390\/s20123344"},{"issue":"12","key":"10750_CR4","doi-asserted-by":"publisher","first-page":"3847","DOI":"10.1007\/s00521-017-2970-3","volume":"30","author":"J Ahmad","year":"2017","unstructured":"Ahmad J, Khan MA, Ahmed F, Khan JS (2017) A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput & Applic 30(12):3847\u20133857. https:\/\/doi.org\/10.1007\/s00521-017-2970-3","journal-title":"Neural Comput & Applic"},{"key":"10750_CR5","doi-asserted-by":"publisher","first-page":"21241","DOI":"10.1007\/s11042-020-08823-8","volume":"79.29\u201330","author":"AA Azza","year":"2020","unstructured":"Azza AA, Lian S (2020) Multi-secret image sharing based on elementary cellular automata with steganography. Multimed Tools Appl 79.29\u201330:21241\u201321264. https:\/\/doi.org\/10.1007\/s11042-020-08823-8","journal-title":"Multimed Tools Appl"},{"key":"10750_CR6","doi-asserted-by":"publisher","first-page":"164000","DOI":"10.1016\/j.ijleo.2019.164000","volume":"203","author":"A Babaei","year":"2020","unstructured":"Babaei A, Motameni H, Enayatifar R (2020) A new permutation-diffusion-based image encryption technique using cellular automata and DNA sequence. Optik 203:164000. https:\/\/doi.org\/10.1016\/j.ijleo.2019.164000","journal-title":"Optik"},{"issue":"3","key":"10750_CR7","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1504\/ijhpcn.2018.10012999","volume":"11","author":"J Baek","year":"2018","unstructured":"Baek J, Wang L, Yang J (2018) A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption. Int J High Perform Comput Networking 11(3):231. https:\/\/doi.org\/10.1504\/ijhpcn.2018.10012999","journal-title":"Int J High Perform Comput Networking"},{"issue":"2","key":"10750_CR8","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s11047-018-9696-8","volume":"19","author":"K Bhattacharjee","year":"2018","unstructured":"Bhattacharjee K, Naskar N, Roy S, Das S (2018) A survey of cellular automata: types, dynamics, non-uniformity and applications. Nat Comput 19(2):433\u2013461. https:\/\/doi.org\/10.1007\/s11047-018-9696-8","journal-title":"Nat Comput"},{"key":"10750_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/1280351","volume":"2017","author":"E Borriello","year":"2017","unstructured":"Borriello E, Imari Walker S (2017) An Information-Based Classification of Elementary Cellular Automata. Complexity 2017:1\u20138. https:\/\/doi.org\/10.1155\/2017\/1280351","journal-title":"Complexity"},{"key":"10750_CR10","doi-asserted-by":"publisher","unstructured":"Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76(1):1159\u20131175. https:\/\/doi.org\/10.1007\/s11042-015-3088-1","DOI":"10.1007\/s11042-015-3088-1"},{"key":"10750_CR11","doi-asserted-by":"publisher","unstructured":"Dooley JF (n.d.) Cipher Mysteries,\u201d History of Cryptography and Cryptanalysis. Springer International Publishing, pp. 263\u2013292, doi: https:\/\/doi.org\/10.1007\/978-3-319-90443-6_16.","DOI":"10.1007\/978-3-319-90443-6_16"},{"key":"10750_CR12","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.optlaseng.2018.11.017","volume":"115","author":"R Enayatifar","year":"2019","unstructured":"Enayatifar R, Guimar\u00e3es FG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt Lasers Eng 115:131\u2013140. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.11.017","journal-title":"Opt Lasers Eng"},{"key":"10750_CR13","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.cplett.2016.02.061","volume":"650","author":"N Flores-Gallegos","year":"2016","unstructured":"Flores-Gallegos N (2016) A new approach of Shannon\u2019s entropy in atoms. Chem Phys Lett 650:57\u201359. https:\/\/doi.org\/10.1016\/j.cplett.2016.02.061","journal-title":"Chem Phys Lett"},{"key":"10750_CR14","doi-asserted-by":"publisher","unstructured":"Gadekallu TR, Khare N, Bhattacharya S, Singh S, Maddikunta PKR, Srivastava G, (2020), \u201cDeep neural networks to predict diabetic retinopathy,\u201d J Ambient Intell Humaniz Comput, doi: https:\/\/doi.org\/10.1007\/s12652-020-01963-7.","DOI":"10.1007\/s12652-020-01963-7"},{"key":"10750_CR15","doi-asserted-by":"publisher","unstructured":"Gadekallu TR, Rajput DS, Reddy MPK, Lakshmanna K, Bhattacharya S, Singh S, Jolfaei A, Alazab M, (2020), \u201cA novel PCA\u2013whale optimization-based deep neural network model for classification of tomato plant diseases using GPU,\u201d J Real-Time Image Proc, doi: https:\/\/doi.org\/10.1007\/s11554-020-00987-8.","DOI":"10.1007\/s11554-020-00987-8"},{"issue":"4","key":"10750_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1038\/scientificamerican1070-120","volume":"223","author":"M Gardner","year":"1970","unstructured":"Gardner M (1970) Mathematical games. Sci Am 223(4):120\u2013123. https:\/\/doi.org\/10.1038\/scientificamerican1070-120","journal-title":"Sci Am"},{"key":"10750_CR17","doi-asserted-by":"publisher","first-page":"106339","DOI":"10.1016\/j.optlastec.2020.106339","volume":"131","author":"H Ghazanfaripour","year":"2020","unstructured":"Ghazanfaripour H, Broumandnia A (2020) Designing a digital image encryption scheme using chaotic maps with prime modular. Opt Laser Technol 131:106339. https:\/\/doi.org\/10.1016\/j.optlastec.2020.106339","journal-title":"Opt Laser Technol"},{"key":"10750_CR18","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1504\/ijhpcn.2019.10025215","volume":"15.1\/2","author":"BB Gupta","year":"2019","unstructured":"Gupta BB, Tewari A (2019) A novel ECC-based lightweight authentication protocol for internet of things devices. Int J High Perform Comput Networking 15.1\/2:106. https:\/\/doi.org\/10.1504\/ijhpcn.2019.10025215","journal-title":"Int J High Perform Comput Networking"},{"issue":"6","key":"10750_CR19","doi-asserted-by":"publisher","first-page":"10936","DOI":"10.1109\/jiot.2019.2934947","volume":"6","author":"S Hussain","year":"2019","unstructured":"Hussain S, Chaudhry SA (2019) Comments on \u2018Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment. IEEE Internet Things J 6(6):10936\u201310940. https:\/\/doi.org\/10.1109\/jiot.2019.2934947","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"10750_CR20","doi-asserted-by":"publisher","first-page":"14","DOI":"10.5120\/ijca2017913256","volume":"162","author":"R Jadhav","year":"2017","unstructured":"Jadhav R, VV (2017) Security issues and solutions in wireless sensor networks. Int J Comput Appl 162(2):14\u201319. https:\/\/doi.org\/10.5120\/ijca2017913256","journal-title":"Int J Comput Appl"},{"issue":"12","key":"10750_CR21","doi-asserted-by":"publisher","first-page":"1836","DOI":"10.1016\/j.optlaseng.2012.06.002","volume":"50","author":"J Jin","year":"2012","unstructured":"Jin J (2012) An image encryption based on elementary cellular automata. Opt Lasers Eng 50(12):1836\u20131843. https:\/\/doi.org\/10.1016\/j.optlaseng.2012.06.002","journal-title":"Opt Lasers Eng"},{"issue":"03","key":"10750_CR22","doi-asserted-by":"publisher","first-page":"1830008","DOI":"10.1142\/s0218127418300082","volume":"28","author":"S Kamilya","year":"2018","unstructured":"Kamilya S, Das S (2018) A study of Chaos in cellular automata. Int J Bifurcation Chaos 28(03):1830008. https:\/\/doi.org\/10.1142\/s0218127418300082","journal-title":"Int J Bifurcation Chaos"},{"issue":"4","key":"10750_CR23","doi-asserted-by":"publisher","first-page":"21","DOI":"10.4018\/ijcac.2019100102","volume":"9","author":"S Kaushik","year":"2019","unstructured":"Kaushik S, Gandhi C (2019) Ensure hierarchal identity based data security in cloud environment. Int J Cloud Appl Comput 9(4):21\u201336. https:\/\/doi.org\/10.4018\/ijcac.2019100102","journal-title":"Int J Cloud Appl Comput"},{"issue":"3785","key":"10750_CR24","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1126\/science.157.3785.180","volume":"157","author":"JG Kemeny","year":"1967","unstructured":"Kemeny JG (1967) Theory of self-reproducing automata. John von Neumann. Edited by Arthur W. Burks. University of Illinois Press, Urbana, 1966. 408 pp., illus. $10. Science 157(3785):180. https:\/\/doi.org\/10.1126\/science.157.3785.180","journal-title":"Science"},{"issue":"1","key":"10750_CR25","first-page":"66","volume":"47","author":"A Kumar","year":"2020","unstructured":"Kumar A, Raghava NS (2020) Selective colour image encryption using H\u00e9non chaotic system with a keyless substitution cipher. Eng Appl Sci Res 47(1):66\u201376","journal-title":"Eng Appl Sci Res"},{"issue":"1","key":"10750_CR26","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2016","unstructured":"Li C, Luo G, Qin K, Li C (2016) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127\u2013133. https:\/\/doi.org\/10.1007\/s11071-016-3030-8","journal-title":"Nonlinear Dyn"},{"key":"10750_CR27","doi-asserted-by":"publisher","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238\u2013246. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.10.020","DOI":"10.1016\/j.optlaseng.2016.10.020"},{"key":"10750_CR28","doi-asserted-by":"crossref","unstructured":"Mayer RE (2002) Multimedia learning, in Psychology of learning and motivation, 41, Elsevier, pp. 85\u2013139","DOI":"10.1016\/S0079-7421(02)80005-6"},{"key":"10750_CR29","doi-asserted-by":"publisher","unstructured":"McAndrew A (2016) Introduction to cryptography with open-source software. CRC Press, doi: https:\/\/doi.org\/10.1201\/9781439825716","DOI":"10.1201\/9781439825716"},{"key":"10750_CR30","doi-asserted-by":"publisher","unstructured":"McGee AR, Chandrashekhar U, Richman SH (2004) Using ITU-T X.805 for comprehensive network security assessment and planning, 11th International Telecommunications Network Strategy and Planning Symposium. NETWORKS,. IEEE, doi: https:\/\/doi.org\/10.1109\/netwks.2004.240993.","DOI":"10.1109\/netwks.2004.240993"},{"issue":"3","key":"10750_CR31","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/tc.2019.2949300","volume":"69","author":"A Moran","year":"2020","unstructured":"Moran A, Frasser CF, Roca M, Rossello JL (2020) Energy-efficient pattern recognition hardware with elementary cellular automata. IEEE Trans Comput 69(3):392\u2013401. https:\/\/doi.org\/10.1109\/tc.2019.2949300","journal-title":"IEEE Trans Comput"},{"key":"10750_CR32","doi-asserted-by":"publisher","unstructured":"(2019), MSB based Cellular Automata for Edge Detection, Int J Innov Technol Explor Eng, 8.9, pp. 1354\u20131358, doi: https:\/\/doi.org\/10.35940\/ijitee.i7491.078919.","DOI":"10.35940\/ijitee.i7491.078919"},{"issue":"6","key":"10750_CR33","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1049\/iet-cvi.2015.0344","volume":"10","author":"B Murugan","year":"2016","unstructured":"Murugan B, Nanjappa Gounder AG (2016) Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput Vis 10(6):593\u2013602. https:\/\/doi.org\/10.1049\/iet-cvi.2015.0344","journal-title":"IET Comput Vis"},{"issue":"5","key":"10750_CR34","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1109\/81.922466","volume":"48","author":"AT Parker","year":"2001","unstructured":"Parker AT, Short KM (2001) Reconstructing the keystream from a chaotic encryption scheme. IEEE Trans Circuits Systems I Fund Theory Appl 48(5):624\u2013630. https:\/\/doi.org\/10.1109\/81.922466","journal-title":"IEEE Trans Circuits Systems I Fund Theory Appl"},{"key":"10750_CR35","doi-asserted-by":"publisher","unstructured":"Ravichandran D, Malayappan S, Manavalan R, Madhuri P, Amirtharajan R (2019) A 3D Key for Encrypting 2D Images - A DNA Melded Chaotic Approach, International conference on vision towards emerging trends in communication and networking (ViTECoN). IEEE, doi: https:\/\/doi.org\/10.1109\/vitecon.2019.8899349.","DOI":"10.1109\/vitecon.2019.8899349"},{"key":"10750_CR36","doi-asserted-by":"publisher","unstructured":"Rey AM (n.d.) Message Authentication Protocol Based on Cellular Automata, Lecture Notes in Computer Science. Springer Berlin Heidelberg, pp. 52\u201360, doi: https:\/\/doi.org\/10.1007\/978-3-540-71805-5_6.","DOI":"10.1007\/978-3-540-71805-5_6"},{"issue":"2","key":"10750_CR37","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","volume":"4","author":"A Riahi Sfar","year":"2018","unstructured":"Riahi Sfar A, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the internet of things. Digit Commun Netw 4(2):118\u2013137. https:\/\/doi.org\/10.1016\/j.dcan.2017.04.003","journal-title":"Digit Commun Netw"},{"key":"10750_CR38","doi-asserted-by":"publisher","first-page":"5083","DOI":"10.1007\/s12652-020-01813-6","volume":"11","author":"S Roy","year":"2020","unstructured":"Roy S, Rawat U, Sareen HA, Nayak SK (2020) IECA: an efficient IoT friendly image encryption technique using programmable cellular automata. J Ambient Intell Humaniz Comput 11:5083\u20135102. https:\/\/doi.org\/10.1007\/s12652-020-01813-6","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"10750_CR39","doi-asserted-by":"publisher","unstructured":"Sanchez-Avila C, Sanchez-Reillol R (n.d.) The Rijndael block cipher (AES proposal): a comparison with DES,\u201d Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186). IEEE, doi: https:\/\/doi.org\/10.1109\/ccst.2001.962837.","DOI":"10.1109\/ccst.2001.962837"},{"key":"10750_CR40","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.parco.2003.12.014","volume":"30.5\u20136","author":"F Seredynski","year":"2004","unstructured":"Seredynski F, Bouvry P, Zomaya AY (2004) Cellular automata computations and secret key cryptography. Parallel Comput 30.5\u20136:753\u2013766. https:\/\/doi.org\/10.1016\/j.parco.2003.12.014","journal-title":"Parallel Comput"},{"key":"10750_CR41","doi-asserted-by":"crossref","unstructured":"Shifa A, Asghar MN, Fleury M (2016) Multimedia security perspectives in IoT, in 2016 Sixth International Conference on Innovative Computing Technology (INTECH), pp. 550\u2013555","DOI":"10.1109\/INTECH.2016.7845081"},{"key":"10750_CR42","doi-asserted-by":"publisher","unstructured":"Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions, J Ambient Intell Humaniz Comput, doi: https:\/\/doi.org\/10.1007\/s12652-017-0494-4.","DOI":"10.1007\/s12652-017-0494-4"},{"issue":"9","key":"10750_CR43","doi-asserted-by":"publisher","first-page":"2879","DOI":"10.1016\/j.asoc.2012.04.002","volume":"12","author":"NK Sreelaja","year":"2012","unstructured":"Sreelaja NK, Pai GAV (2012) Stream cipher for binary image encryption using ant Colony optimization based key generation. Appl Soft Comput 12(9):2879\u20132895","journal-title":"Appl Soft Comput"},{"key":"10750_CR44","doi-asserted-by":"publisher","unstructured":"Wolfram S (n.d.) Cryptography with Cellular Automata, Lecture Notes in Computer Science. Springer Berlin Heidelberg, pp. 429\u2013432, doi: https:\/\/doi.org\/10.1007\/3-540-39799-x_32.","DOI":"10.1007\/3-540-39799-x_32"},{"key":"10750_CR45","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/access.2017.2775038","volume":"6","author":"Q Zheng","year":"2018","unstructured":"Zheng Q, Wang X, Khurram Khan M, Zhang W, Gupta BB, Guo W (2018) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6:711\u2013722. https:\/\/doi.org\/10.1109\/access.2017.2775038","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10750-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10750-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10750-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T05:18:50Z","timestamp":1621919930000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10750-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,19]]},"references-count":45,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10750"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10750-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,19]]},"assertion":[{"value":"10 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}