{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:05Z","timestamp":1775745305097,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2021,3,23]],"date-time":"2021-03-23T00:00:00Z","timestamp":1616457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,23]],"date-time":"2021-03-23T00:00:00Z","timestamp":1616457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11042-021-10807-1","type":"journal-article","created":{"date-parts":[[2021,3,23]],"date-time":"2021-03-23T01:02:46Z","timestamp":1616461366000},"page":"22135-22162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A novel image encryption algorithm based on improved key selection and digital chaotic map"],"prefix":"10.1007","volume":"80","author":[{"given":"Hongyue","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Lingfeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,23]]},"reference":[{"key":"10807_CR1","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography [D]. University of Buckingham"},{"key":"10807_CR2","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-319-14054-4_10","volume":"8893","author":"AA Adbulla","year":"2014","unstructured":"Adbulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and Fibonacci bit-plane mapping [C]. Security Standardisation Research, SSR 8893:151\u2013166","journal-title":"Security Standardisation Research, SSR"},{"key":"10807_CR3","doi-asserted-by":"crossref","unstructured":"Anand A, Raj A, Kohli R, Bibhu V (2016) Proposed symmetric key cryptography algorithm for data security. 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Noida, 159\u2013162.","DOI":"10.1109\/ICICCS.2016.7542294"},{"issue":"17","key":"10807_CR4","doi-asserted-by":"publisher","first-page":"174102","DOI":"10.1103\/PhysRevLett.88.174102","volume":"88","author":"C Bandt","year":"2002","unstructured":"Bandt C, Pompe B (2002) Permutation entropy: a natural complexity measure for time series [J]. Phys Rev Lett 88(17):174102","journal-title":"Phys Rev Lett"},{"key":"10807_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.optlaseng.2016.07.010","volume":"88","author":"A Beiazi","year":"2017","unstructured":"Beiazi A, El-Latif AAA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms [J]. Opt Lasers Eng 88:37\u201350","journal-title":"Opt Lasers Eng"},{"issue":"27\u201328","key":"10807_CR6","doi-asserted-by":"publisher","first-page":"19129","DOI":"10.1007\/s11042-020-08718-8","volume":"79","author":"MA Ben Farah","year":"2020","unstructured":"Ben Farah MA, Guesmi R, Kachouri A et al (2020) A new design of cryptosystem based on S-box and chaotic permutation [J]. Multimed Tools Appl 79(27\u201328):19129\u201319150","journal-title":"Multimed Tools Appl"},{"key":"10807_CR7","doi-asserted-by":"crossref","unstructured":"Ben ZH, Min LS, Min G, et al. (2016) Chaotic image encryption & image sharing algorithm research based on wavelet transform and CRT [C].2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), International Computer Conference on Wavelet Active Media Technology and Information Processing: 28\u201332","DOI":"10.1109\/ICCWAMTIP.2016.8079799"},{"issue":"2","key":"10807_CR8","first-page":"1","volume":"2020","author":"L Bocheng","year":"2020","unstructured":"Bocheng L, Hongyue X, Lingfeng L (2020) Reducing the dynamical degradation of digital chaotic maps with time-delay linear feedback and parameter perturbation [J]. Math Probl Eng 2020(2):1\u201312","journal-title":"Math Probl Eng"},{"key":"10807_CR9","doi-asserted-by":"crossref","unstructured":"Chen Chen, Sun Kehui, He Shaobo. An improved image encryption algorithm with finite computing Precision [J]. Signal Process, 2019, 168, 107340.","DOI":"10.1016\/j.sigpro.2019.107340"},{"key":"10807_CR10","doi-asserted-by":"publisher","first-page":"75834","DOI":"10.1109\/ACCESS.2018.2883690","volume":"6","author":"L ChengQing","year":"2018","unstructured":"ChengQing L, Lin DD, BingBing F et al (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy [J]. IEEE Access 6:75834\u201375842","journal-title":"IEEE Access"},{"issue":"2","key":"10807_CR11","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1177\/1077546309350898","volume":"17","author":"F Chyun-Chau","year":"2011","unstructured":"Chyun-Chau F, Wang M-C (2011) A combined input-state feedback linearization scheme and independent component analysis filter for the control of chaotic systems with significant measurement noise [J]. J Vib Control 17(2):215\u2013221","journal-title":"J Vib Control"},{"issue":"3","key":"10807_CR12","doi-asserted-by":"publisher","first-page":"268","DOI":"10.3390\/e21030268","volume":"21","author":"A Flores-Vergara","year":"2019","unstructured":"Flores-Vergara A, Inzunza-Gonzalez E, Garcia-Guerrero EE et al (2019) Implementing a chaotic cryptosystem by performing parallel computing on embedded systems with multiprocessors [J]. Entropy 21(3):268","journal-title":"Entropy"},{"issue":"1","key":"10807_CR13","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1007\/s11071-018-4391-y","volume":"94","author":"Y Guodong","year":"2018","unstructured":"Guodong Y, Pan C, Xiaoling H et al (2018) An efficient pixel-level chaotic image encryption algorithm [J]. Nonlinear Dyn 94(1):745\u2013756","journal-title":"Nonlinear Dyn"},{"key":"10807_CR14","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.jare.2018.01.009","volume":"10","author":"SM Ismail","year":"2018","unstructured":"Ismail SM, Said LA, Radwan AG, Madian AH, Abu-Elyazeed MF (2018) Generalized double-humped logistic map-based medical image encryption [J]. J Adv Res 10:85\u201398","journal-title":"J Adv Res"},{"issue":"2","key":"10807_CR15","doi-asserted-by":"publisher","first-page":"1650042","DOI":"10.1142\/S0219720016500426","volume":"15","author":"TM Khlebodarova","year":"2017","unstructured":"Khlebodarova TM, Kogai VV, Fadeev SI, Likhosvai VA (2017) Chaos and hyperchaos in simple gene network with negative feedback and time delays [J]. J Bioinforma Comput Biol 15(2):1650042","journal-title":"J Bioinforma Comput Biol"},{"key":"10807_CR16","unstructured":"Kohli R, Kumar M (2013) FPGA implementation of cryptographic algorithms using multi-encryption technique [J]. Computer Science"},{"key":"10807_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.02.031","volume":"396","author":"L Lingfeng","year":"2017","unstructured":"Lingfeng L, Suoxia M (2017) Delay-introducing method to improve the dynamical degradation of a digital chaotic map [J]. Inf Sci 396:1\u201313","journal-title":"Inf Sci"},{"issue":"7","key":"10807_CR18","first-page":"14750103","volume":"27","author":"L Lingfeng","year":"2017","unstructured":"Lingfeng L, Lin J, Suoxia M et al (2017) A double perturbation method for reducing dynamical degradation of the digital baker map [J]. Int J Bifurcation Chaos 27(7):14750103","journal-title":"Int J Bifurcation Chaos"},{"issue":"5","key":"10807_CR19","doi-asserted-by":"publisher","first-page":"1850059","DOI":"10.1142\/S0218127418500591","volume":"28","author":"L Lingfeng","year":"2018","unstructured":"Lingfeng L, Bocheng L, Hu H et al (2018) Reducing the dynamical degradation by bi-coupling digital chaotic maps [J]. Int J Bifurcation Chaos 28(5):1850059","journal-title":"Int J Bifurcation Chaos"},{"issue":"1","key":"10807_CR20","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1049\/iet-spr.2016.0584","volume":"12","author":"L Lingfeng","year":"2018","unstructured":"Lingfeng L, Shidi H, Lin J et al (2018) Image block encryption algorithm based on chaotic maps [J]. IET Signal Process 12(1):22\u201330","journal-title":"IET Signal Process"},{"issue":"10","key":"10807_CR21","doi-asserted-by":"publisher","first-page":"100501","DOI":"10.1088\/1674-1056\/24\/10\/100501","volume":"24","author":"C Lv-Chen","year":"2015","unstructured":"Lv-Chen C, Luo Y-L, Sen-Hui Q, Jun-Xiu L (2015) A perturbation method to the tent map based on Lyapunov exponent and its application [J]. Chinese Physics B 24(10):100501","journal-title":"Chinese Physics B"},{"issue":"4","key":"10807_CR22","first-page":"499","volume":"29","author":"B Mondal","year":"2017","unstructured":"Mondal B, Mandal T (2017) A light weight secure image encryption scheme based on chaos & DNA computing [N]. J King Saud Univ \u2013 Comput Inform Sci 29(4):499\u2013504","journal-title":"J King Saud Univ \u2013 Comput Inform Sci"},{"key":"10807_CR23","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1140\/epjst\/e2008-00850-4","volume":"165","author":"N Nagaraj","year":"2008","unstructured":"Nagaraj N, Shastry MC, Vaidya PG (2008) Increasing average period lengths by switching of robust chaos maps infinite precision [J]. European Phys J Special Topics 165:73\u201383","journal-title":"European Phys J Special Topics"},{"issue":"3","key":"10807_CR24","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1007\/s10773-018-3989-7","volume":"58","author":"J Nan","year":"2019","unstructured":"Nan J, Dong X, Hu H et al (2019) Quantum image encryption based on Henon mapping [J]. Int J Theor Phys 58(3):979\u2013991","journal-title":"Int J Theor Phys"},{"key":"10807_CR25","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata [J]. Opt Lasers Eng 90:225\u2013237","journal-title":"Opt Lasers Eng"},{"key":"10807_CR26","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.optlastec.2017.10.024","volume":"101","author":"R Parvaz","year":"2018","unstructured":"Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption [J]. Opt Laser Technol 101:30\u201341","journal-title":"Opt Laser Technol"},{"issue":"6","key":"10807_CR27","first-page":"2331","volume":"25","author":"KAK Pator","year":"2019","unstructured":"Pator KAK, Acharya B, Nath V (2019) A secure multi-stage one-round bit-plane permutation operation based chaotic image encryption [J]. Microsyst Technol Micro Nanosyst -Inf Storage Process Syst 25(6):2331\u20132338","journal-title":"Microsyst Technol Micro Nanosyst -Inf Storage Process Syst"},{"issue":"1","key":"10807_CR28","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1063\/1.166092","volume":"5","author":"S Pincus","year":"1995","unstructured":"Pincus S (1995) Approximate entropy (APEN) as a complexity measure [J]. Chaos 5(1):110\u2013117","journal-title":"Chaos"},{"issue":"9","key":"10807_CR29","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","volume":"13","author":"M Preishuber","year":"2018","unstructured":"Preishuber M, Hutter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of Chaos-based image and video encryption [J]. IEEE Trans Inform Foren Secur 13(9):2137\u20132150","journal-title":"IEEE Trans Inform Foren Secur"},{"issue":"2","key":"10807_CR30","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s11071-015-2521-3","volume":"84","author":"A Souyah","year":"2016","unstructured":"Souyah A, Faraoun KM (2016) Fast and efficient randomized encryption scheme for digital images based on Quadtree decomposition and reversible memory cellular automata [J]. Nonlinear Dyn 84(2):715\u2013732","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"10807_CR31","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1080\/0161-119191865821","volume":"15","author":"DD Wheeler","year":"1991","unstructured":"Wheeler DD, Matthews RAJ (1991) Supercomputer investigations of a chaotic encryption algorithm [J]. Cryptologia 15(2):140\u2013152","journal-title":"Cryptologia"},{"key":"10807_CR32","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"XJ Wu","year":"2018","unstructured":"Wu XJ, Wang KS, Wang X, Kan H, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys [J]. Signal Process 148:272\u2013287","journal-title":"Signal Process"},{"issue":"3","key":"10807_CR33","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1007\/s11071-015-1957-9","volume":"80","author":"T Xiaojun","year":"2015","unstructured":"Xiaojun T, Wang Z, Miao Z et al (2015) An image encryption algorithm based on the perturbed high-dimensional chaotic map [J]. Nonlinear Dyn 80(3):1493\u20131508","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"10807_CR34","doi-asserted-by":"publisher","first-page":"2277","DOI":"10.1007\/s11071-014-1564-1","volume":"78","author":"T Xiao-Jun","year":"2014","unstructured":"Xiao-Jun T, Miao Z, Wang Z, Yang L (2014) A image encryption scheme based on dynamical perturbation and linear feedback shift register [J]. Nonlinear Dyn 78(3):2277\u20132291","journal-title":"Nonlinear Dyn"},{"key":"10807_CR35","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"L Yueping","year":"2017","unstructured":"Yueping L, Wang C, Hua C (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation [J]. Opt Lasers Eng 90:238\u2013246","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"10807_CR36","doi-asserted-by":"publisher","first-page":"1750033","DOI":"10.1142\/S021812741750033X","volume":"27","author":"L Yunqi","year":"2017","unstructured":"Yunqi L, Luo Y, Shuxiang S et al (2017) Counteracting dynamical degradation of digital chaotic Chebyshev map via perturbation [J]. Int J Bifurcation Chaos 27(3):1750033","journal-title":"Int J Bifurcation Chaos"},{"issue":"22","key":"10807_CR37","doi-asserted-by":"publisher","first-page":"31035","DOI":"10.1007\/s11042-018-7081-3","volume":"78","author":"X Zenggang","year":"2019","unstructured":"Zenggang X, Wu Y, Conghuan Y et al (2019) Color image chaos encryption algorithm combining CRC and nine palace map [J]. Multimed Tools Appl 78(22):31035\u201331055","journal-title":"Multimed Tools Appl"},{"key":"10807_CR38","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"H Zhongyun","year":"2015","unstructured":"Zhongyun H, Yicong Z, Chi-man P et al (2015) 2D sine logistic modulation map for image encryption [J]. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"key":"10807_CR39","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"H Zhongyun","year":"2018","unstructured":"Zhongyun H, Fan J, Xu B et al (2018) 2D logistic-sine-coupling map for image encryption [J]. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"key":"10807_CR40","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"H Zhongyun","year":"2019","unstructured":"Zhongyun H, Yicong Z, Hejiao H (2019) Cosine-transform-based chaotic system for image encryption [J]. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10807-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10807-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10807-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T05:20:49Z","timestamp":1621920049000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10807-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,23]]},"references-count":40,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10807"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10807-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,23]]},"assertion":[{"value":"5 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}