{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:05:58Z","timestamp":1775469958227,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2021,8,14]],"date-time":"2021-08-14T00:00:00Z","timestamp":1628899200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,8,14]],"date-time":"2021-08-14T00:00:00Z","timestamp":1628899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11042-021-11178-3","type":"journal-article","created":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T23:05:00Z","timestamp":1628895900000},"page":"33213-33255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Performance comparison between Chaos and quantum-chaos based image encryption techniques"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8888-0222","authenticated-orcid":false,"given":"Manju","family":"Kumari","sequence":"first","affiliation":[]},{"given":"Shailender","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,14]]},"reference":[{"key":"11178_CR1","unstructured":"CISO Benchmark Report CiscoCybersecuritySeries (2019)"},{"key":"11178_CR2","unstructured":"https:\/\/securityboulevard.com\/2020\/02\/20-ransomware-statistics-youre-powerless-to-resist-reading\/"},{"key":"11178_CR3","unstructured":"Alloghani M, Alani MM, Al-Jumeily D, Baker T, Mustafina J, Hussain A, Aljaaf AJ (2021) A systematic review on the status and progress of homomorphic encryption technologies"},{"key":"11178_CR4","doi-asserted-by":"publisher","first-page":"102028","DOI":"10.1016\/j.adhoc.2019.102028","volume":"98","author":"B Al-Maytami","year":"2020","unstructured":"Al-Maytami B, Fan P, Hussain A, Baker T, Liatsis P (2020) An efficient queries processing model based on multi broadcast searchable keywords encryption (MBSKE). Ad Hoc Netw 98:102028","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"11178_CR5","doi-asserted-by":"publisher","first-page":"49","DOI":"10.5121\/ijnsa.2019.11404","volume":"11","author":"M Kumari","year":"2019","unstructured":"Kumari M, Pawar V, Kumar P (2019) A novel image encryption scheme with Huffman encoding and steganography technique. Int J Netw Secur Its Appl 11(4):49\u201373. https:\/\/doi.org\/10.5121\/ijnsa.2019.11404","journal-title":"Int J Netw Secur Its Appl"},{"key":"11178_CR6","volume-title":"Book, Hoboken","author":"MY Rhee","year":"2003","unstructured":"Rhee MY (2003) Internet security: cryptographic principles, algorithms, and protocols. In: Book, Hoboken. J. Wiley, NJ"},{"key":"11178_CR7","unstructured":"John Justin M, Manimurugan S (2013) A survey on various encryption techniques. International Journal of Soft Computing and Engineering (IJSCE) 2(1). ISSN 2231:2307"},{"issue":"05","key":"11178_CR8","first-page":"796","volume":"02","author":"SF El-Zoghdy","year":"2011","unstructured":"El-Zoghdy SF, Nada YA, Abdo AA (2011) How good is the DES algorithm in image ciphering. Int J Advanced Networking and Applications 02(05):796\u2013803","journal-title":"Int J Advanced Networking and Applications"},{"key":"11178_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2611003","volume-title":"On the security of 2-key triple DES. In: on the security of 2-key triple DES","author":"CJ Mitchell","year":"2016","unstructured":"Mitchell CJ (2016) On the security of 2-key triple DES. In: on the security of 2-key triple DES. Royal Holloway, University of London, Information Security Group"},{"key":"11178_CR10","unstructured":"FIPS 197 (2001) Advanced Encryption Standard (AES)"},{"key":"11178_CR11","doi-asserted-by":"publisher","unstructured":"Schneier B (1994) Description of a new variable-length key, 64-bit block cipher (blowfish). In: Anderson R. (eds) Fast software encryption. FSE 1993. Lecture notes in computer science, vol 809. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/3-540-58108-1_24","DOI":"10.1007\/3-540-58108-1_24"},{"key":"11178_CR12","doi-asserted-by":"crossref","unstructured":"Fluhrer S, Mantin I, Shamir A (2001) Weaknesses in the key scheduling algorithm of RC4. Springer, Selected Areas in Cryptography 2001, volume 2259. ISBN: 978\u20133\u2013540-43066-7","DOI":"10.1007\/3-540-45537-X_1"},{"key":"11178_CR13","unstructured":"Padmavathi B, Kumari SR (2013) A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution. International journal of Science and Research (IJSR) 2(4) ISSN 2319:7064"},{"key":"11178_CR14","unstructured":"Tanwar G, Mishra N (2015) Survey on image encryption techniques. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) 5(12)"},{"key":"11178_CR15","volume-title":"2014 international conference on electronics, communication and computational engineering (ICECCE) (pp. 83\u201393)","author":"S Chandra","year":"2014","unstructured":"Chandra S, Paira S, Alam SS, Sanyal G (2014) A comparative survey of symmetric and asymmetric key cryptography. In: 2014 international conference on electronics, communication and computational engineering (ICECCE) (pp. 83\u201393). IEEE"},{"issue":"9","key":"11178_CR16","doi-asserted-by":"publisher","first-page":"1961","DOI":"10.1007\/s10623-018-00597-3","volume":"87","author":"C-Y Lai","year":"2019","unstructured":"Lai C-Y, Chung K-M (2019) Quantum encryption and generalized Shannon impossibility. Des Codes Crypt 87(9):1961\u20131972. https:\/\/doi.org\/10.1007\/s10623-018-00597-3","journal-title":"Des Codes Crypt"},{"key":"11178_CR17","unstructured":"Wu Y, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT):9"},{"key":"11178_CR18","doi-asserted-by":"publisher","unstructured":"Kumari M, Gupta S (2018) A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher. 3D Res 9(1). https:\/\/doi.org\/10.1007\/s13319-018-0162-2","DOI":"10.1007\/s13319-018-0162-2"},{"issue":"23","key":"11178_CR19","first-page":"13265","volume":"12","author":"OF Mohammad","year":"2017","unstructured":"Mohammad OF, Rahim MSM, Zeebaree SRM, Ahmed FY (2017) A survey and analysis of the image encryption methods. Int J Appl Eng Res 12(23):13265\u201313280","journal-title":"Int J Appl Eng Res"},{"issue":"3","key":"11178_CR20","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.image.2011.11.003","volume":"27","author":"M Fran\u00e7ois","year":"2012","unstructured":"Fran\u00e7ois M, Grosges T, Barchiesi D, Erra R (2012) A new image encryption scheme based on a chaotic function. Signal Process Image Commun 27(3):249\u2013259. https:\/\/doi.org\/10.1016\/j.image.2011.11.003","journal-title":"Signal Process Image Commun"},{"key":"11178_CR21","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1007\/s11071-012-0402-6","volume":"69","author":"I Shatheesh Sam","year":"2012","unstructured":"Shatheesh Sam I, Devaraj P, Bhuvaneswaran RS (2012) An intertwining chaotic maps based image encryption scheme. Springer Nonlinear Dyn 69:1995\u20132007. https:\/\/doi.org\/10.1007\/s11071-012-0402-6","journal-title":"Springer Nonlinear Dyn"},{"issue":"3","key":"11178_CR22","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.image.2011.11.003","volume":"27","author":"M Fran\u00e7ois","year":"2012","unstructured":"Fran\u00e7ois M, Grosges T, Barchiesi D, Erra R (2012) A new image encryption scheme based on a chaotic function. Springer, Signal Process Image Commun 27(3):249\u2013259. https:\/\/doi.org\/10.1016\/j.image.2011.11.003","journal-title":"Springer, Signal Process Image Commun"},{"issue":"2","key":"11178_CR23","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s11042-010-0652-6","volume":"56","author":"IS Sam","year":"2012","unstructured":"Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl, Springer 56(2):315\u2013330. https:\/\/doi.org\/10.1007\/s11042-010-0652-6","journal-title":"Multimed Tools Appl, Springer"},{"issue":"3","key":"11178_CR24","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s13319-015-0062-7","volume":"6","author":"G Hanchinamani","year":"2015","unstructured":"Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Res 6(3):30. https:\/\/doi.org\/10.1007\/s13319-015-0062-7","journal-title":"3D Res"},{"key":"11178_CR25","unstructured":"Bansal et al (2017) An innovative image encryption scheme based on cha.pdf"},{"issue":"4","key":"11178_CR26","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s13319-017-0148-5","volume":"8","author":"M Kumari","year":"2017","unstructured":"Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. Springer, 3D Research 8(4):37","journal-title":"Springer, 3D Research"},{"key":"11178_CR27","unstructured":"Kevadia KT, Nayak AM, Patel KS, Patel BU (2016) A literature survey on image encryption 2:741\u2013746"},{"issue":"11","key":"11178_CR28","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1016\/j.sigpro.2013.03.031","volume":"93","author":"AA Abd El-Latif","year":"2013","unstructured":"Abd El-Latif AA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93(11):2986\u20133000. https:\/\/doi.org\/10.1016\/j.sigpro.2013.03.031","journal-title":"Signal Process"},{"key":"11178_CR29","doi-asserted-by":"publisher","first-page":"e7","DOI":"10.1017\/ATSIP.2018.33","volume":"8","author":"W Sirichotedumrong","year":"2019","unstructured":"Sirichotedumrong W, Kiya H (2019) Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems. APSIPA Trans Signal Inf Process 8:e7. https:\/\/doi.org\/10.1017\/ATSIP.2018.33","journal-title":"APSIPA Trans Signal Inf Process"},{"key":"11178_CR30","doi-asserted-by":"publisher","unstructured":"Akhshani A, Akhavan A, Lim S-C, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653\u20134661. https:\/\/doi.org\/10.1016\/j.cnsns.2012.05.033","DOI":"10.1016\/j.cnsns.2012.05.033"},{"key":"11178_CR31","doi-asserted-by":"publisher","unstructured":"Liu H, Jin C (2017) A novel color image encryption algorithm based on quantum chaos sequence. 3D Res 4 8(1). https:\/\/doi.org\/10.1007\/s13319-016-0114-7","DOI":"10.1007\/s13319-016-0114-7"},{"issue":"6","key":"11178_CR32","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s11128-018-1902-1","volume":"17","author":"N Zhou","year":"2018","unstructured":"Zhou N, Chen W, Yan X, Wang Y (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quantum Inf Process 17(6):137. https:\/\/doi.org\/10.1007\/s11128-018-1902-1","journal-title":"Quantum Inf Process"},{"key":"11178_CR33","doi-asserted-by":"publisher","first-page":"6937","DOI":"10.1109\/ACCESS.2018.2889896","volume":"7","author":"X Liu","year":"2019","unstructured":"Liu X, Xiao D, Xiang Y (2019) Quantum image encryption using intra and inter bit permutation based on logistic map. IEEE Access 7:6937\u20136946. https:\/\/doi.org\/10.1109\/ACCESS.2018.2889896","journal-title":"IEEE Access"},{"issue":"03","key":"11178_CR34","first-page":"2010","volume":"05","author":"A Pandya","year":"2018","unstructured":"Pandya A, Pandey P (2018) Comparative analysis of encryption techniques. Int Res J Eng Technol 05(03):2010\u20132012","journal-title":"Int Res J Eng Technol"},{"issue":"1","key":"11178_CR35","doi-asserted-by":"publisher","first-page":"9","DOI":"10.26483\/ijarcs.v10i1.6349","volume":"10","author":"MAB Younes","year":"2019","unstructured":"Younes MAB (2019) A survey of the most current image encryption and decryption techniques. Int J Adv Res Comput Sci 10(1):9","journal-title":"Int J Adv Res Comput Sci"},{"issue":"1","key":"11178_CR36","first-page":"291","volume":"64","author":"S Patel","year":"2020","unstructured":"Patel S, Vaish A (2020) A systematic survey on image encryption using compressive sensing. J Sci Res 64(1):291\u2013296","journal-title":"J Sci Res"},{"issue":"1","key":"11178_CR37","first-page":"31","volume":"22","author":"AML Rachid","year":"2020","unstructured":"Rachid AML, Chandan A, Surya V, Krishna K, Ram M, Manish K (2020) Review of image encryption techniques. IOSR Journal of Computer Engineering (IOSR-JCE) 22(1):31\u201337","journal-title":"IOSR Journal of Computer Engineering (IOSR-JCE)"},{"key":"11178_CR38","doi-asserted-by":"publisher","first-page":"33161","DOI":"10.1007\/s11042-020-09627-6","volume":"79","author":"M Kumari","year":"2020","unstructured":"Kumari M, Gupta S, Malik A (2020) A superlative image encryption technique based on bit plane using key-based electronic code book. Springer Multimed Tools Appl 79:33161\u201333191. https:\/\/doi.org\/10.1007\/s11042-020-09627-6","journal-title":"Springer Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11178-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11178-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11178-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T23:02:18Z","timestamp":1744153338000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11178-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,14]]},"references-count":38,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["11178"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11178-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,14]]},"assertion":[{"value":"29 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}