{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:15:00Z","timestamp":1759940100494,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T00:00:00Z","timestamp":1629331200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T00:00:00Z","timestamp":1629331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61977014","61902056","61603082"],"award-info":[{"award-number":["61977014","61902056","61603082"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11042-021-11096-4","type":"journal-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T06:03:30Z","timestamp":1629353010000},"page":"33429-33454","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An ultrahigh-resolution image encryption algorithm using random super-pixel strategy"],"prefix":"10.1007","volume":"80","author":[{"given":"Wei","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2265-0165","authenticated-orcid":false,"given":"Weijie","family":"Han","sequence":"additional","affiliation":[]},{"given":"Zhiliang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,19]]},"reference":[{"issue":"8","key":"11096_CR1","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(8):2129\u20132151. https:\/\/doi.org\/10.1142\/S0218127406015970","journal-title":"Int J Bifurcat Chaos"},{"issue":"1","key":"11096_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.matcom.2004.09.001","volume":"68","author":"J-C-H Castro","year":"2005","unstructured":"Castro J-C-H, Sierra J-M, Seznec A, Izquierdo A, Ribagorda A (2005) The strict avalanche criterion randomness test. Math Comput Simul 68 (1):1\u20137. https:\/\/doi.org\/10.1016\/j.matcom.2004.09.001","journal-title":"Math Comput Simul"},{"key":"11096_CR3","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1007\/s10586-018-02895-w","volume":"22","author":"U Cavusoglu","year":"2019","unstructured":"Cavusoglu U, Kacar S (2019) A novel parallel image encryption algorithm based on chaos. Clust Comput 22:1211\u20131223. https:\/\/doi.org\/10.1007\/s10586-018-02895-w","journal-title":"Clust Comput"},{"key":"11096_CR4","doi-asserted-by":"publisher","first-page":"107457","DOI":"10.1016\/j.sigpro.2020.107457","volume":"171","author":"W Cao","year":"2020","unstructured":"Cao W, Mao Y, Zhou Y (2020) Designing a 2D infinite collapse map for image encryption. Signal Process 171:107457. https:\/\/doi.org\/10.1016\/j.sigpro.2020.107457","journal-title":"Signal Process"},{"key":"11096_CR5","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362. https:\/\/doi.org\/10.1016\/j.sigpro.2018.09.029","journal-title":"Signal Process"},{"key":"11096_CR6","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.optlaseng.2018.11.017","volume":"115","author":"R Enayatifar","year":"2019","unstructured":"Enayatifar R, Guimaraes F-G, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt Lasers Eng 115:131\u2013140. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.11.017","journal-title":"Opt Lasers Eng"},{"key":"11096_CR7","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah A-H, Isnin I-F (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83\u201393. https:\/\/doi.org\/10.1016\/j.optlaseng.2013.12.003","journal-title":"Opt Lasers Eng"},{"issue":"06","key":"11096_CR8","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"08","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 08(06):1259\u20131284. https:\/\/doi.org\/10.1142\/S021812749800098X","journal-title":"Int J Bifurcat Chaos"},{"key":"11096_CR9","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1016\/j.ijleo.2019.02.007","volume":"185","author":"W Gao","year":"2019","unstructured":"Gao W, Sun J, Qiao W, Zhang X (2019) Digital image encryption scheme based on generalized Mandelbrot-Julia set. Optik 185:917\u2013929. https:\/\/doi.org\/10.1016\/j.ijleo.2019.02.007","journal-title":"Optik"},{"key":"11096_CR10","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.sigpro.2019.06.010","volume":"164","author":"H-M Ghadirli","year":"2019","unstructured":"Ghadirli H-M, Nodehi A, Enayatifar R (2019) An overview of encryption algorithms in color images. Signal Process 164:163\u2013185. https:\/\/doi.org\/10.1016\/j.sigpro.2019.06.010","journal-title":"Signal Process"},{"key":"11096_CR11","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419. https:\/\/doi.org\/10.1016\/j.ins.2018.12.048","journal-title":"Inf Sci"},{"key":"11096_CR12","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.sigpro.2018.10.011","volume":"155","author":"U Hayat","year":"2019","unstructured":"Hayat U, Azam N-A (2019) A novel image encryption scheme based on an elliptic curve. Signal Process 155:391\u2013402. https:\/\/doi.org\/10.1016\/j.sigpro.2018.10.011","journal-title":"Signal Process"},{"key":"11096_CR13","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.optcom.2009.12.060","volume":"283","author":"Y Han","year":"2010","unstructured":"Han Y, Zhang Y (2010) Optical image encryption based on two beams\u2019 interference. Opt Commun 283:1690\u20131692. https:\/\/doi.org\/10.1016\/j.optcom.2009.12.060","journal-title":"Opt Commun"},{"key":"11096_CR14","doi-asserted-by":"publisher","first-page":"102428","DOI":"10.1016\/j.jisa.2019.102428","volume":"50","author":"KC Jithin","year":"2020","unstructured":"Jithin KC, Sankar S (2020) Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set. J Inform Secur Appl 50:102428. https:\/\/doi.org\/10.1016\/j.jisa.2019.102428","journal-title":"J Inform Secur Appl"},{"key":"11096_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optlastec.2017.03.041","volume":"95","author":"R Kumar","year":"2017","unstructured":"Kumar R, Bhaduri B (2017) Optical image encryption using Kronecker product and hybrid phase masks. Opt Laser Technol 95:51\u201355. https:\/\/doi.org\/10.1016\/j.optlastec.2017.03.041","journal-title":"Opt Laser Technol"},{"key":"11096_CR16","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1007\/s11071-018-4251-9","volume":"93","author":"Y Luo","year":"2018","unstructured":"Luo Y, Zhou R, Liu J, Cao Y, Ding X (2018) A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dyn 93:1165\u20131181. https:\/\/doi.org\/10.1007\/s11071-018-4251-9","journal-title":"Nonlinear Dyn"},{"key":"11096_CR17","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284:3895\u20133903. https:\/\/doi.org\/10.1016\/j.optcom.2011.04.001","journal-title":"Opt Commun"},{"key":"11096_CR18","doi-asserted-by":"publisher","first-page":"19193","DOI":"10.1007\/s11042-017-5391-5","volume":"77","author":"C Li","year":"2018","unstructured":"Li C, Luo G, Li C (2018) A parallel image encryption algorithm based on chaotic Duffing oscillators. Multimed Tools Appl 77:19193\u201319208. https:\/\/doi.org\/10.1007\/s11042-017-5391-5","journal-title":"Multimed Tools Appl"},{"key":"11096_CR19","doi-asserted-by":"publisher","unstructured":"Liu M-Y, Tuzel O, Ramalingam S, Chellappa R (2011) Entropy rate superpixel segmentation. In: IEEE Conference on Computer Vision and Pattern Recognition, pp 2097\u20132104. https:\/\/doi.org\/10.1109\/CVPR.2011.5995323","DOI":"10.1109\/CVPR.2011.5995323"},{"key":"11096_CR20","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/s11071-018-4076-6","volume":"92","author":"W-K Lee","year":"2018","unstructured":"Lee W -K, C.-W.Phan R, Yap W-S, Goi B-M (2018) SPRING: A novel parallel chaos-based image encryption scheme. Nonlinear Dyn 92:575\u2013593. https:\/\/doi.org\/10.1007\/s11071-018-4076-6","journal-title":"Nonlinear Dyn"},{"key":"11096_CR21","doi-asserted-by":"publisher","unstructured":"Li Z, Chen J (2015) Superpixel segmentation using linear spectral clustering. In: IEEE Conference on Computer Vision and Pattern Recognition, pp 1356\u20131363. https:\/\/doi.org\/10.1109\/CVPR.2015.7298741","DOI":"10.1109\/CVPR.2015.7298741"},{"issue":"17","key":"11096_CR22","doi-asserted-by":"publisher","first-page":"2543","DOI":"10.5897\/IJPS.9000180","volume":"5","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Khan M-K, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: Anovel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543\u20132554. https:\/\/doi.org\/10.5897\/IJPS.9000180","journal-title":"Int J Phys Sci"},{"key":"11096_CR23","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11042-015-3058-7","volume":"76","author":"L Leng","year":"2017","unstructured":"Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76:333\u2013354. https:\/\/doi.org\/10.1007\/s11042-015-3058-7","journal-title":"Multimed Tools Appl"},{"key":"11096_CR24","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.jisa.2019.01.010","volume":"45","author":"B Mondal","year":"2019","unstructured":"Mondal B, Singh S, Kumar P (2019) A secure image encryption scheme based on cellular automata and chaotic skew tent map. J Inform Secur Appl 45:117\u2013130. https:\/\/doi.org\/10.1016\/j.jisa.2019.01.010","journal-title":"J Inform Secur Appl"},{"key":"11096_CR25","doi-asserted-by":"publisher","first-page":"105818","DOI":"10.1016\/j.optlastec.2019.105818","volume":"121","author":"M Mahmud","year":"2020","unstructured":"Mahmud M, Atta-ur-Rahman Lee M, Choi J -Y (2020) Evolutionary-based image encryption using RNA codons truth table. Opt Laser Technol 121:105818. https:\/\/doi.org\/10.1016\/j.optlastec.2019.105818","journal-title":"Opt Laser Technol"},{"key":"11096_CR26","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","volume":"78","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn 78:995\u20131015. https:\/\/doi.org\/10.1007\/s11071-014-1492-0","journal-title":"Nonlinear Dyn"},{"key":"11096_CR27","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"A-Y Niyat","year":"2017","unstructured":"Niyat A-Y, Moattar M-H, Torshiz M-N (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225\u2013237. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.10.019","journal-title":"Opt Lasers Eng"},{"key":"11096_CR28","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.sigpro.2018.04.018","volume":"150","author":"P Ping","year":"2018","unstructured":"Ping P, Wu J, Mao Y, Xu F, Fan J (2018) Design of image cipher using life-like cellular automata and chaotic map. Signal Process 150:233\u2013247. https:\/\/doi.org\/10.1016\/j.sigpro.2018.04.018","journal-title":"Signal Process"},{"key":"11096_CR29","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-981-13-7091-5_13","volume":"556","author":"KA-K Patro","year":"2019","unstructured":"Patro KA-K, Raghuvanshi A-S, Acharya B (2019) A parallel bit-plane operation based chaotic image encryption scheme. Proceedings of the Third International Conference on Microelectronics. Computing and Communication Systems 556:143\u2013154. https:\/\/doi.org\/10.1007\/978-981-13-7091-5_13","journal-title":"Proceedings of the Third International Conference on Microelectronics. Computing and Communication Systems"},{"key":"11096_CR30","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/ICCV.2003.1238308","volume":"1","author":"X Ren","year":"2003","unstructured":"Ren X, Malik J (2003) Learning a classification model for segmentation. ICCV 1:10\u201317. https:\/\/doi.org\/10.1109\/ICCV.2003.1238308","journal-title":"ICCV"},{"key":"11096_CR31","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy system. Bell Syst Tech J 28:656\u2013715. https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst Tech J"},{"key":"11096_CR32","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.neucom.2015.06.114","volume":"215","author":"Z Tian","year":"2016","unstructured":"Tian Z, Lin Y (2016) Video object segmentation based on supervoxel for multimedia corpus construction. Neurocomputing 215:128\u2013137. https:\/\/doi.org\/10.1016\/j.neucom.2015.06.114","journal-title":"Neurocomputing"},{"key":"11096_CR33","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11263-014-0744-2","volume":"7578","author":"M Van den Bergh","year":"2012","unstructured":"Van den Bergh M, Boix X, Roig G, de Capitani B, Van Gool L (2012) SEEDS: Superpixels Extracted via energy-driven sampling. European Conference on Computer Vision 7578:13\u201326. https:\/\/doi.org\/10.1007\/s11263-014-0744-2","journal-title":"European Conference on Computer Vision"},{"key":"11096_CR34","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.ijleo.2017.07.041","volume":"145","author":"A Vaish","year":"2017","unstructured":"Vaish A, Kumar M (2017) Color image encryption using MSVD, DWT and Arnold transform in fractional Fourier domain. Optik 145:273\u2013283. https:\/\/doi.org\/10.1016\/j.ijleo.2017.07.041","journal-title":"Optik"},{"key":"11096_CR35","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1016\/j.optlastec.2018.07.052","volume":"108","author":"M Wang","year":"2018","unstructured":"Wang M, Wang X, Zhang Y, Gao Z (2018) A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt Laser Technol 108:558\u2013573. https:\/\/doi.org\/10.1016\/j.optlastec.2018.07.052","journal-title":"Opt Laser Technol"},{"key":"11096_CR36","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340\u2013358. https:\/\/doi.org\/10.1016\/j.ins.2019.02.049","journal-title":"Inf Sci"},{"key":"11096_CR37","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.sigpro.2018.10.001","volume":"155","author":"H Wang","year":"2019","unstructured":"Wang H, Xiao D, Li M, Xiang Y, Li X (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Process 155:218\u2013232. https:\/\/doi.org\/10.1016\/j.sigpro.2018.10.001","journal-title":"Signal Process"},{"key":"11096_CR38","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.jvcir.2017.06.005","volume":"48","author":"X Wang","year":"2017","unstructured":"Wang X, Wu C, Xiang K, Chen W (2017) Efficient local and global contour detection based on superpixels. J Vis Commun Image Represent 48:77\u201387. https:\/\/doi.org\/10.1016\/j.jvcir.2017.06.005","journal-title":"J Vis Commun Image Represent"},{"key":"11096_CR39","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.sigpro.2017.11.005","volume":"144","author":"H Wang","year":"2018","unstructured":"Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444\u2013452. https:\/\/doi.org\/10.1016\/j.sigpro.2017.11.005","journal-title":"Signal Process"},{"key":"11096_CR40","doi-asserted-by":"publisher","first-page":"105995","DOI":"10.1016\/j.optlaseng.2019.105995","volume":"128","author":"S Wang","year":"2019","unstructured":"Wang S, Wang C, Xu C (2019) An image encryption algorithm based on a hidden attractor chaos system and the Knuth\u2013Durstenfeld algorithm. Opt Lasers Eng 128:105995. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105995","journal-title":"Opt Lasers Eng"},{"key":"11096_CR41","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.biosystems.2016.03.011","volume":"144","author":"X Wang","year":"2016","unstructured":"Wang X, Zhang H, Bao X -M (2016) Color image encryption scheme using CML and DNA sequence operations. BioSystems 144:18\u201326. https:\/\/doi.org\/10.1016\/j.biosystems.2016.03.011","journal-title":"BioSystems"},{"key":"11096_CR42","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1038\/311419a0","volume":"311","author":"S Wolfram","year":"1984","unstructured":"Wolfram S (1984) Cellular automata as models of complexity. Nature 311:419\u2013424. https:\/\/doi.org\/10.1038\/311419a0. https:\/\/ui.adsabs.harvard.edu\/link_gateway\/1984Natur.311..419W\/","journal-title":"Nature"},{"key":"11096_CR43","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/0196-8858(86)90028-X","volume":"7","author":"S Wolfram","year":"1986","unstructured":"Wolfram S (1986) Random sequence generation by cellular automata. Adv Appl Math 7:123\u2013169. https:\/\/doi.org\/10.1016\/0196-8858(86)90028-X","journal-title":"Adv Appl Math"},{"key":"11096_CR44","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu Y, Zhou Y, Saveriades G, Agaian S (2013) P.noonan J, Natarajan P Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci 222:323\u2013324. https:\/\/doi.org\/10.1016\/j.ins.2012.07.049","journal-title":"Inf. Sci"},{"key":"11096_CR45","unstructured":"Wu Y (2011) NPCR And UACI randomness tests for image encryption. Cyber J Multidisci J Sci Technol J Select Areas Telecommun (JSAT): 31\u201338"},{"key":"11096_CR46","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Bo Y (2018) Image encryption using 2D h\u00e9non-sine map and DNA approach. Signal Process 153:11\u201323. https:\/\/doi.org\/10.1016\/j.sigpro.2018.06.008","journal-title":"Signal Process"},{"key":"11096_CR47","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ins.2016.02.041","volume":"349\u2013350","author":"X Wu","year":"2016","unstructured":"Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inform Sci 349\u2013350:137\u2013153. https:\/\/doi.org\/10.1016\/j.ins.2016.02.041","journal-title":"Inform Sci"},{"key":"11096_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2018.11.010","volume":"478","author":"M Xu","year":"2019","unstructured":"Xu M, Tian Z (2019) A novel image cipher based on 3D bit matrix and latin cubes. Inf Sci 478:1\u201314. https:\/\/doi.org\/10.1016\/j.ins.2018.11.010","journal-title":"Inf Sci"},{"key":"11096_CR49","doi-asserted-by":"publisher","first-page":"504","DOI":"10.3390\/e21050504","volume":"21","author":"W Zhang","year":"2019","unstructured":"Zhang W, Zhu Z, Yu H (2019) A Symmetric image encryption algorithm based on a Coupled Logistic-Bernoulli map and cellular automata diffusion strategy. Entropy 21:504. https:\/\/doi.org\/10.3390\/e21050504","journal-title":"Entropy"},{"key":"11096_CR50","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao Y-L, Zhu Z-L (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350. https:\/\/doi.org\/10.1016\/j.sigpro.2015.06.008","journal-title":"Signal Process"},{"key":"11096_CR51","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.ins.2020.02.012","volume":"520","author":"Y Zhang","year":"2020","unstructured":"Zhang Y (2020) The fast image encryption algorithm based on lifting scheme and chaos. Inf Sci 520:177\u2013194. https:\/\/doi.org\/10.1016\/j.ins.2020.02.012","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11096-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11096-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11096-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T02:12:39Z","timestamp":1634695959000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11096-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,19]]},"references-count":51,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["11096"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11096-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,8,19]]},"assertion":[{"value":"19 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}