{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T04:41:46Z","timestamp":1769834506550,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T00:00:00Z","timestamp":1620950400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T00:00:00Z","timestamp":1620950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100010726","name":"Northwest Normal University","doi-asserted-by":"publisher","award":["NWNU-LKQN-17-14"],"award-info":[{"award-number":["NWNU-LKQN-17-14"]}],"id":[{"id":"10.13039\/100010726","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10960-7","type":"journal-article","created":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T04:03:47Z","timestamp":1620965027000},"page":"27155-27170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A novel color image encryption method based on an evolved dynamic parameter-control chaotic system"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8690-4307","authenticated-orcid":false,"given":"Jie","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Baoquan","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Xiangyu","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,14]]},"reference":[{"key":"10960_CR1","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Thesis. http:\/\/bear.buckingham.ac.uk\/id\/eprint\/149"},{"issue":"17","key":"10960_CR2","doi-asserted-by":"publisher","first-page":"3259","DOI":"10.1016\/j.optcom.2010.04.056","volume":"283","author":"A Akhshani","year":"2010","unstructured":"Akhshani A, Behnia S, Akhavan A, Hassan HA, Hassan ZJOC (2010) A novel scheme for image encryption based on 2d piecewise chaotic maps. Opt Commun 283(17):3259\u20133266","journal-title":"Opt Commun"},{"issue":"3","key":"10960_CR3","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1142\/S0218127492000756","volume":"2","author":"VS Anishchenko","year":"1992","unstructured":"Anishchenko VS, Vadivasova TE, Postnov DE, Safonova MAJIJoB (1992) Chaos: Synchronization of chaos. Int J Bifurcation Chaos 2(3):633\u2013644","journal-title":"Int J Bifurcation Chaos"},{"issue":"2","key":"10960_CR4","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S Behnia","year":"2008","unstructured":"Behnia S, Akhshani A, Mahmodi H, Akhavan AJCS (2008) Fractals: A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35(2):408\u2013419","journal-title":"Chaos, Solitons Fractals"},{"key":"10960_CR5","unstructured":"Cai Z (2019) Engineering: Security and confidentiality of network communication using chaotic encryption technology. (5) pp 1\u201310"},{"issue":"3","key":"10960_CR6","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) Encryption scheme based on 3d chaotic cat maps. Chaos, Solitons Fractals 21(3):749\u2013761","journal-title":"Chaos, Solitons Fractals"},{"issue":"11","key":"10960_CR7","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1016\/j.sigpro.2013.03.031","volume":"93","author":"AAA El-Latif","year":"2013","unstructured":"El-Latif AAA, Li L, Ning W, Qi H, Niu XJSP (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Proc 93(11):2986\u20133000","journal-title":"Signal Proc"},{"key":"10960_CR8","doi-asserted-by":"publisher","first-page":"183411","DOI":"10.1109\/ACCESS.2020.3029263","volume":"8","author":"S Fan","year":"2020","unstructured":"Fan S, Li K, Zhang Y, Wang JJIA (2020) A hybrid chaotic encryption scheme for wireless body area networks. IEEE Access 8:183411\u2013183429","journal-title":"IEEE Access"},{"issue":"1-3","key":"10960_CR9","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"ZH Guan","year":"2005","unstructured":"Guan ZH, Huang F, Guan WJPLA (2005) Chaos-based image encryption algorithm. Phys Lett 346(1-3):153\u2013157","journal-title":"Phys Lett"},{"key":"10960_CR10","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Fan J, Xu B, Huang H (2018) 2d logistic-sine-coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"issue":"12","key":"10960_CR11","doi-asserted-by":"publisher","first-page":"3330","DOI":"10.1109\/TCYB.2015.2504180","volume":"46","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y (2015) Dynamic parameter-control chaotic system. IEEE Trans Cybernet 46(12):3330\u20133341","journal-title":"IEEE Trans Cybernet"},{"issue":"2","key":"10960_CR12","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s11071-013-1214-z","volume":"76","author":"I Hussain","year":"2014","unstructured":"Hussain I, Gondal MAJND (2014) An extended image encryption using chaotic coupled map and s-box transformation. Nonlinear Dyn 76(2):1355\u20131363","journal-title":"Nonlinear Dyn"},{"issue":"1\/2","key":"10960_CR13","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1007\/s11042-019-08191-y","volume":"79","author":"X Kang","year":"2020","unstructured":"Kang X, Lin GF, Chen YJ, Zhao F, Zhang EH, Jing CN (2020) Applications: Robust and secure zero-watermarking algorithm for color images based on majority voting pattern and hyper-chaotic encryption. Multimed Tools Appl 79(1\/2):1169\u20131202","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"10960_CR14","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1049\/el.2017.4426","volume":"54","author":"M Kaur","year":"2018","unstructured":"Kaur M, Kumar VJEL (2018) An efficient image encryption method based on improved lorenz chaotic system. Electron Lett 54(9):562\u2013564","journal-title":"Electron Lett"},{"issue":"18","key":"10960_CR15","doi-asserted-by":"publisher","first-page":"26203","DOI":"10.1007\/s11042-019-07818-4","volume":"78","author":"M Khan","year":"2019","unstructured":"Khan M, Masood F (2019) Applications: A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78(18):26203\u201326222","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10960_CR16","first-page":"1","volume":"PP","author":"M Li","year":"2018","unstructured":"Li M, Fan H, Xiang Y, Li Y, Zhang Y (2018) Cryptanalysis and improvement of a chaotic image encryption by first-order time-delay system. IEEE MultiMed PP(3):1\u20131","journal-title":"IEEE MultiMed"},{"key":"10960_CR17","doi-asserted-by":"crossref","unstructured":"Li S, Mou X, Cai Y, Zhen J, Zhang J (2003) On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision","DOI":"10.1016\/S0010-4655(02)00875-5"},{"key":"10960_CR18","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang JJMT (2020) Applications: A multidimensional chaotic image encryption algorithm based on dna coding. 79:29\u201330","DOI":"10.1007\/s11042-020-08880-z"},{"issue":"10","key":"10960_CR19","doi-asserted-by":"publisher","first-page":"1850124","DOI":"10.1142\/S0217984918501245","volume":"32","author":"X Lv","year":"2018","unstructured":"Lv X, Liao X, Yang B, Matter Physics SPAP (2018) Bit-level plane image encryption based on coupled map lattice with time-varying delay. Mod Phys Lett B 32(10):1850124","journal-title":"Mod Phys Lett B"},{"key":"10960_CR20","doi-asserted-by":"crossref","unstructured":"Ni Z, Kang X, Lei W (2016) A novel image encryption algorithm based on bit-level improved arnold transform and hyper chaotic map. In: IEEE international conference on signal and image processing (ICSIP)","DOI":"10.1109\/SIPROCESS.2016.7888243"},{"issue":"5","key":"10960_CR21","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1049\/ip-cds:20050100","volume":"153","author":"S Ozoguz","year":"2006","unstructured":"Ozoguz S, Elwakil AS, Ergun S (2006) Systems: Cross-coupled chaotic oscillators and application to random bit generation. IEE Proc Circ Devices Syst 153(5):506\u2013510","journal-title":"IEE Proc Circ Devices Syst"},{"issue":"7","key":"10960_CR22","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1016\/j.cnsns.2008.11.005","volume":"14","author":"V Patidar","year":"2009","unstructured":"Patidar V, Pareek NK, Sud KK, Simulation N (2009) A new substitution\u2013diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14(7):3056\u20133075","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10960_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-0003-8","volume-title":"Differential equations and dynamical systems","author":"L Perko","year":"2001","unstructured":"Perko L (2001) Differential equations and dynamical systems. Springer, New York"},{"key":"10960_CR24","doi-asserted-by":"crossref","unstructured":"Pickover CA (2010) Graphics, bifurcation, order and chaos. 6(1):26\u201333","DOI":"10.1111\/j.1467-8659.1987.tb00342.x"},{"issue":"3","key":"10960_CR25","first-page":"821","volume":"16","author":"AN Pisarchik","year":"2006","unstructured":"Pisarchik AN, Flores-Carmona NJ, Carpio-Valadez MJC (2006) Encryption and decryption of images with chaotic map lattices. Chaos Interdiscip J Nonlinear 16(3):821","journal-title":"Chaos Interdiscip J Nonlinear"},{"key":"10960_CR26","doi-asserted-by":"crossref","unstructured":"Rajagopalan S, Rethinam S, Arumugham S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2018) Applications: Networked hardware assisted key image and chaotic attractors for secure rgb image communication. 77(18):1\u201334","DOI":"10.1007\/s11042-017-5566-0"},{"issue":"4","key":"10960_CR27","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"10960_CR28","doi-asserted-by":"crossref","unstructured":"Tariq S, Khan M, Alghafis A, Amin MJMT (2020) Applications: A novel hybrid encryption scheme based on chaotic lorenz system and logarithmic key generation. (10)","DOI":"10.1007\/s11042-020-09134-8"},{"key":"10960_CR29","doi-asserted-by":"crossref","unstructured":"Thompson JMT, Stewart HBJJoSP (2000) Nonlinear dynamics and chaos. 78(5-6):1635\u20131636","DOI":"10.1007\/BF02180148"},{"key":"10960_CR30","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2012","unstructured":"Xu L, Li Z, Li J, Hua WJO, Engineering Li (2012) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"10960_CR31","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1177\/1077546314534717","volume":"22","author":"G Ye","year":"2016","unstructured":"Ye G, Huang X (2016) Control: A feedback chaotic image encryption scheme based on both bit-level and pixel-level. J Vib Control 22(5):1171\u20131180","journal-title":"J Vib Control"},{"key":"10960_CR32","doi-asserted-by":"crossref","unstructured":"Ye GD, Huang XL, Zhang LY, Wang ZXJCPB (2017) A self-cited pixel summation based image encryption algorithm. 26(1):131\u2013138","DOI":"10.1088\/1674-1056\/26\/1\/010501"},{"key":"10960_CR33","doi-asserted-by":"publisher","first-page":"3155","DOI":"10.1007\/s11071-018-4614-2","volume":"94","author":"G Ye","year":"2018","unstructured":"Ye G, Pan C, Huang X, Qixiang M (2018) Correction to: An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn 94:3155","journal-title":"Nonlinear Dyn"},{"key":"10960_CR34","unstructured":"Yue, Zhou, Yicong, Bao (2014) Society S.: Discrete wheel-switching chaotic system and applications. circuits, L.J.I.t.o., systems, I.R.p.a.p.o.t.I.C."}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10960-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10960-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10960-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,24]],"date-time":"2021-07-24T15:08:31Z","timestamp":1627139311000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10960-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,14]]},"references-count":34,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10960"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10960-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,14]]},"assertion":[{"value":"16 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}