{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T20:45:54Z","timestamp":1775681154607,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:00:00Z","timestamp":1619481600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:00:00Z","timestamp":1619481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10898-w","type":"journal-article","created":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T18:04:28Z","timestamp":1619546668000},"page":"26069-26091","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A hybrid chaotic blowfish encryption for high-resolution satellite imagery"],"prefix":"10.1007","volume":"80","author":[{"given":"Syed Zeeshan","family":"Abbas","sequence":"first","affiliation":[]},{"given":"Haroon","family":"Ibrahim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5454-3770","authenticated-orcid":false,"given":"Majid","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,27]]},"reference":[{"issue":"2A","key":"10898_CR1","first-page":"68","volume":"39","author":"M Abd Ulkareem Nasser","year":"2013","unstructured":"Abd Ulkareem Nasser M, Abduljaleel IQ (2013) Speech encryption using chaotic map and blowfish algorithms. J Basrah Res (Sciences) 39(2A):68\u201376","journal-title":"J Basrah Res (Sciences)"},{"issue":"6","key":"10898_CR2","first-page":"147","volume":"8","author":"R Ahmad","year":"2016","unstructured":"Ahmad R, Manaf AA, Ismail W (2016) Implementation of a high-performance blowfish for secure wireless communication. J Telecom Electronic Comput Eng (JTEC) 8(6):147\u2013151","journal-title":"J Telecom Electronic Comput Eng (JTEC)"},{"key":"10898_CR3","doi-asserted-by":"crossref","unstructured":"Alghafis A, Waseem HM, Khan M (2019) A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states. Physica A: Statistical Mechanics and its Applications:123908","DOI":"10.1016\/j.physa.2019.123908"},{"key":"10898_CR4","doi-asserted-by":"crossref","unstructured":"Alghafis A, Munir N, Khan M, Hussain I (2020) An encryption scheme based on discrete quantum map and continuous chaotic system. Int J Theor Phys:1\u201314","DOI":"10.1007\/s10773-020-04402-7"},{"key":"10898_CR5","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.matcom.2020.05.016","volume":"177","author":"A Alghafis","year":"2020","unstructured":"Alghafis A, Firdousi F, Khan M, Batool SI, Amin M (2020) An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Math Comput Simul 177:441\u2013466","journal-title":"Math Comput Simul"},{"key":"10898_CR6","doi-asserted-by":"crossref","unstructured":"Alghafis A, Waseem HM, Khan M, Jamal SS, Amin M, Batool SI (2020) A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox. Wireless Networks","DOI":"10.1007\/s11276-020-02363-7"},{"issue":"9","key":"10898_CR7","doi-asserted-by":"publisher","first-page":"3091","DOI":"10.1007\/s10773-019-04188-3","volume":"58","author":"KM Ali","year":"2019","unstructured":"Ali KM, Khan M (2019) Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int J Theor Phys 58(9):3091\u20133117","journal-title":"Int J Theor Phys"},{"issue":"10","key":"10898_CR8","doi-asserted-by":"publisher","first-page":"3565","DOI":"10.1007\/s10773-019-04221-5","volume":"58","author":"U Arshad","year":"2019","unstructured":"Arshad U, Batool SI, Amin M (2019) A novel image encryption scheme based on Walsh compressed quantum spinning chaotic Lorenz system. Int J Theor Phys 58(10):3565\u20133588","journal-title":"Int J Theor Phys"},{"key":"10898_CR9","doi-asserted-by":"publisher","first-page":"123458","DOI":"10.1016\/j.physa.2019.123458","volume":"546","author":"U Arshad","year":"2020","unstructured":"Arshad U, Khan M, Shaukat S, Amin M, Shah T (2020) An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation. Physica A: Statistical Mechanics and its Applications 546:123458","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"issue":"19","key":"10898_CR10","doi-asserted-by":"publisher","first-page":"27611","DOI":"10.1007\/s11042-019-07881-x","volume":"78","author":"SI Batool","year":"2019","unstructured":"Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78(19):27611\u201327637","journal-title":"Multimed Tools Appl"},{"key":"10898_CR11","doi-asserted-by":"publisher","first-page":"122677","DOI":"10.1016\/j.physa.2019.122677","volume":"537","author":"SI Batool","year":"2020","unstructured":"Batool SI, Amin M, Waseem HM (2020) Public key digital contents confidentiality scheme based on quantum spin and finite state automation. Physica A: Statistical Mechanics and its Applications 537:122677","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"10898_CR12","doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer J, Seifert JP (2003, January). Fault based cryptanalysis of the advanced encryption standard (AES). In International Conference on Financial Cryptography (pp. 162-181). Springer, Berlin, Heidelberg.","DOI":"10.1007\/978-3-540-45126-6_12"},{"issue":"3","key":"10898_CR13","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu B, Cavusoglu H, Benbasat I (2010) Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q 34(3):523\u2013548","journal-title":"MIS Q"},{"key":"10898_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05900-6","volume-title":"A concise guide to chaotic electronic circuits","author":"A Buscarino","year":"2014","unstructured":"Buscarino A, Fortuna L, Frasca M, Sciuto G (2014) A concise guide to chaotic electronic circuits. Springer International Publishing, Heidelberg, Germany"},{"key":"10898_CR15","doi-asserted-by":"crossref","unstructured":"\u00c7atalta\u015f \u00d6, T\u00fct\u00fcnc\u00fc K (2017, September) Comparison of LSB image steganography technique in different color spaces. In 2017 international artificial intelligence and data processing symposium (IDAP) (pp. 1-6). IEEE.","DOI":"10.1109\/IDAP.2017.8090342"},{"key":"10898_CR16","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.chaos.2016.12.018","volume":"95","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu \u00dc, Ka\u00e7ar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-box. Chaos, Solitons Fractals 95:92\u2013101","journal-title":"Chaos, Solitons Fractals"},{"issue":"3","key":"10898_CR17","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D Coppersmith","year":"1994","unstructured":"Coppersmith D (1994) The data encryption standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243\u2013250","journal-title":"IBM J Res Dev"},{"issue":"9","key":"10898_CR18","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1049\/el:19920563","volume":"28","author":"D Erdmann","year":"1992","unstructured":"Erdmann D, Murphy S (1992) H\u00e9non stream cipher. Electron Lett 28(9):893\u2013895","journal-title":"Electron Lett"},{"issue":"06","key":"10898_CR19","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(06):1259\u20131284","journal-title":"Int J Bifurc Chaos"},{"key":"10898_CR20","doi-asserted-by":"crossref","unstructured":"Guo JI (2000, May). A new chaotic key-based design for image encryption and decryption. In 2000 IEEE International Symposium on Circuits and Systems (ISCAS) (Vol. 4, pp. 49-52). IEEE.","DOI":"10.1109\/ISCAS.2000.858685"},{"key":"10898_CR21","first-page":"119","volume":"35","author":"R Hamza","year":"2017","unstructured":"Hamza R (2017) A novel pseudo random sequence generator for image-cryptographic applications. J Inform Secur Appl 35:119\u2013127","journal-title":"J Inform Secur Appl"},{"issue":"4","key":"10898_CR22","doi-asserted-by":"publisher","first-page":"2079","DOI":"10.1007\/s11071-015-2127-9","volume":"81","author":"LM Jawad","year":"2015","unstructured":"Jawad LM, Sulong G (2015) Chaotic map-embedded blowfish algorithm for security enhancement of colour image encryption. Nonlinear Dynamics 81(4):2079\u20132093","journal-title":"Nonlinear Dynamics"},{"issue":"7\u20138","key":"10898_CR23","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1007\/s00521-014-1663-4","volume":"25","author":"M Khan","year":"2014","unstructured":"Khan M, Shah T (2014) A novel image encryption technique based on H\u00e9non chaotic map and S 8 symmetric group. Neural Comput & Applic 25(7\u20138):1717\u20131722","journal-title":"Neural Comput & Applic"},{"issue":"11","key":"10898_CR24","doi-asserted-by":"publisher","first-page":"e0206460","DOI":"10.1371\/journal.pone.0206460","volume":"13","author":"M Khan","year":"2018","unstructured":"Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS One 13(11):e0206460","journal-title":"PLoS One"},{"issue":"8","key":"10898_CR25","doi-asserted-by":"publisher","first-page":"2720","DOI":"10.1007\/s10773-019-04162-z","volume":"58","author":"M Khan","year":"2019","unstructured":"Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer\u2019s arbitrary spin. Int J Theor Phys 58(8):2720\u20132743","journal-title":"Int J Theor Phys"},{"issue":"12","key":"10898_CR26","doi-asserted-by":"publisher","first-page":"e0225031","DOI":"10.1371\/journal.pone.0225031","volume":"14","author":"M Khan","year":"2019","unstructured":"Khan M, Masood F, Alghafis A, Amin M, Batool Naqvi SI (2019) A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PLoS One 14(12):e0225031","journal-title":"PLoS One"},{"issue":"12","key":"10898_CR27","doi-asserted-by":"publisher","first-page":"4293","DOI":"10.1007\/s10773-019-04301-6","volume":"58","author":"M Khan","year":"2019","unstructured":"Khan M, Hussain I, Jamal SS, Amin M (2019) A privacy scheme for digital images based on quantum particles. Int J Theor Phys 58(12):4293\u20134310","journal-title":"Int J Theor Phys"},{"key":"10898_CR28","unstructured":"Krishnamurthy GN, Ramaswamy V (2010) Encryption quality analysis and security evaluation of CAST-128 algorithm and its modified version using digital images. arXiv preprint arXiv:1004.0571."},{"issue":"2","key":"10898_CR29","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/S0165-0114(96)00075-9","volume":"89","author":"CS Lee","year":"1997","unstructured":"Lee CS, Kuo YH, Yu PT (1997) Weighted fuzzy mean filters for image processing. Fuzzy Sets Syst 89(2):157\u2013180","journal-title":"Fuzzy Sets Syst"},{"issue":"9","key":"10898_CR30","doi-asserted-by":"publisher","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"X Liao","year":"2010","unstructured":"Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90(9):2714\u20132722","journal-title":"Signal Process"},{"issue":"10","key":"10898_CR31","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320\u20133327","journal-title":"Comput Math Appl"},{"key":"10898_CR32","doi-asserted-by":"crossref","unstructured":"Mousa A (2005, June) Data encryption performance based on blowfish. In 47th International Symposium ELMAR, 2005. (pp. 131-134). IEEE.","DOI":"10.1109\/ELMAR.2005.193660"},{"key":"10898_CR33","unstructured":"Nath A, Ghosh S, Mallick MA (2010, July) Symmetric key cryptography using random key generator. In Security and Management (pp. 234-242)."},{"key":"10898_CR34","doi-asserted-by":"crossref","unstructured":"Nie T, Zhang T (2009, January) A study of DES and blowfish encryption algorithm. In Tencon 2009-2009 IEEE Region 10 Conference (pp. 1-4). IEEE.","DOI":"10.1109\/TENCON.2009.5396115"},{"key":"10898_CR35","doi-asserted-by":"crossref","unstructured":"Pal K, Ghosh G, Koley S, Bhattacharya M (2013, December) A new combined crypto-watermarking technique using RSA algorithm and discrete cosine transform to retrieve embedded EPR from noisy bio-medical images. In 2013 IEEE 1st International Conference on Condition Assessment Techniques in Electrical Systems (CATCON) (pp. 368-373). IEEE.","DOI":"10.1109\/CATCON.2013.6737529"},{"key":"10898_CR36","doi-asserted-by":"crossref","unstructured":"Prasetyo KN, Purwanto Y, Darlis D (2014, May) An implementation of data encryption for internet of things using blowfish algorithm on FPGA. In 2014 2nd International Conference on Information and Communication Technology (ICoICT) (pp. 75-79). IEEE.","DOI":"10.1109\/ICoICT.2014.6914043"},{"key":"10898_CR37","doi-asserted-by":"crossref","unstructured":"Schneier B (1993, December) Description of a new variable-length key, 64-bit block cipher (blowfish). In International Workshop on Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg.","DOI":"10.1007\/3-540-58108-1_24"},{"issue":"16","key":"10898_CR38","first-page":"4110","volume":"6","author":"T Shah","year":"2011","unstructured":"Shah T, Hussain I, Gondal MA, Mahmood H (2011) Statistical analysis of S-box in image encryption applications based on majority logic criterion. International Journal of Physical Sciences 6(16):4110\u20134127","journal-title":"International Journal of Physical Sciences"},{"issue":"7","key":"10898_CR39","first-page":"150","volume":"4","author":"P Singh","year":"2013","unstructured":"Singh P, Singh K (2013) Image encryption and decryption using blowfish algorithm in MATLAB. Int J Sci Eng Res 4(7):150\u2013154","journal-title":"Int J Sci Eng Res"},{"key":"10898_CR40","doi-asserted-by":"crossref","unstructured":"Tariq S, Khan M, Alghafis A, Amin M (2020) A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation. Multimed Tools Appl:1\u201323","DOI":"10.1007\/s11042-020-09134-8"},{"issue":"2","key":"10898_CR41","first-page":"6","volume":"1","author":"J Thakur","year":"2011","unstructured":"Thakur J, Kumar N (2011) DES, AES and blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int J Emerg Technol Adv Eng 1(2):6\u201312","journal-title":"Int J Emerg Technol Adv Eng"},{"issue":"08","key":"10898_CR42","doi-asserted-by":"publisher","first-page":"1917","DOI":"10.1142\/S0218127400001183","volume":"10","author":"T Ueta","year":"2000","unstructured":"Ueta T, Chen G (2000) Bifurcation analysis of Chen's equation. Int J Bifurc Chaos 10(08):1917\u20131931","journal-title":"Int J Bifurc Chaos"},{"key":"10898_CR43","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R Von Solms","year":"2013","unstructured":"Von Solms R, Van Niekerk J (2013) From information security to cyber security. Comput Secur 38:97\u2013102","journal-title":"Comput Secur"},{"key":"10898_CR44","doi-asserted-by":"crossref","unstructured":"Wang Q, Gao J, Lin W, Yuan Y (2019) Learning from synthetic data for crowd counting in the wild. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 8198-8207).","DOI":"10.1109\/CVPR.2019.00839"},{"key":"10898_CR45","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340\u2013358","journal-title":"Inf Sci"},{"issue":"9","key":"10898_CR46","doi-asserted-by":"publisher","first-page":"6891","DOI":"10.1007\/s11042-019-08570-5","volume":"79","author":"UA Waqas","year":"2020","unstructured":"Waqas UA, Khan M, Batool SI (2020) A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimed Tools Appl 79(9):6891\u20136914","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10898_CR47","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s00340-019-7142-y","volume":"125","author":"HM Waseem","year":"2019","unstructured":"Waseem HM, Khan M (2019) A new approach to digital content privacy using quantum spin and finite-state machine. Appl Phys B 125(2):27","journal-title":"Appl Phys B"},{"issue":"6","key":"10898_CR48","doi-asserted-by":"publisher","first-page":"063022","DOI":"10.1117\/1.JEI.27.6.063022","volume":"27","author":"HM Waseem","year":"2018","unstructured":"Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. J Electron Imag 27(6):063022","journal-title":"J Electron Imag"},{"key":"10898_CR49","doi-asserted-by":"publisher","first-page":"71821","DOI":"10.1109\/ACCESS.2020.2987097","volume":"8","author":"HM Waseem","year":"2020","unstructured":"Waseem HM, Alghafis A, Khan M (2020) An efficient public key cryptosystem based on dihedral group and quantum spin states. IEEE Access 8:71821\u201371832","journal-title":"IEEE Access"},{"key":"10898_CR50","unstructured":"Weber A (1997) The USC-SIPI image database. Signal and Image Processing Institute of the University of Southern California. URL: http:\/\/sipi.usc.edu\/services\/database."},{"key":"10898_CR51","volume-title":"Principles of information security","author":"ME Whitman","year":"2011","unstructured":"Whitman ME, Mattord HJ (2011). Principles of information security. Cengage Learning."},{"issue":"2","key":"10898_CR52","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Selected Areas Telecomm (JSAT) 1(2):31\u201338","journal-title":"J Selected Areas Telecomm (JSAT)"},{"key":"10898_CR53","doi-asserted-by":"crossref","unstructured":"Yanling W (2009, March). Image scrambling method based on chaotic sequences and mapping. In 2009 First International Workshop on Education Technology and Computer Science (Vol. 3, pp. 453-457). IEEE.","DOI":"10.1109\/ETCS.2009.630"},{"issue":"5","key":"10898_CR54","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.patrec.2009.11.008","volume":"31","author":"G Ye","year":"2010","unstructured":"Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347\u2013354","journal-title":"Pattern Recogn Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10898-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10898-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10898-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T16:04:37Z","timestamp":1724947477000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10898-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,27]]},"references-count":54,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10898"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10898-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,27]]},"assertion":[{"value":"24 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"It is declared that we have no conflict concerning the publication of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}