{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T06:44:36Z","timestamp":1753685076088,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"21-23","license":[{"start":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T00:00:00Z","timestamp":1627603200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T00:00:00Z","timestamp":1627603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11042-021-11226-y","type":"journal-article","created":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T01:51:09Z","timestamp":1627696269000},"page":"32595-32613","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Securing physical layer using new chaotic parametric maps"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1769-3782","authenticated-orcid":false,"given":"Karima Amara","family":"Korba","sequence":"first","affiliation":[]},{"given":"Djamel","family":"Abed","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Fezari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,30]]},"reference":[{"key":"11226_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","volume":"160","author":"M Alawida","year":"2019","unstructured":"Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45\u201358","journal-title":"Signal Process"},{"issue":"08","key":"11226_CR2","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos 16 (08):2129\u20132151","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"11226_CR3","doi-asserted-by":"crossref","unstructured":"Andreatos AS, Leros AP (2013) Secure image encryption based on a chua chaotic noise generator. Journal of Engineering Science & Technology Review, 6(4)","DOI":"10.25103\/jestr.064.11"},{"issue":"5","key":"11226_CR4","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1109\/LCOMM.2018.2812821","volume":"22","author":"A Bouchemel","year":"2018","unstructured":"Bouchemel A, Abed D, Moussaoui A (2018) Enhancement of compressed image transmission in wmsns using modified-\u03bc-nonlinear transformation. IEEE Commun Lett 22(5):934\u2013937","journal-title":"IEEE Commun Lett"},{"key":"11226_CR5","doi-asserted-by":"publisher","first-page":"107457","DOI":"10.1016\/j.sigpro.2020.107457","volume":"171","author":"W Cao","year":"2020","unstructured":"Cao W, Mao Y, Zhou Y (2020) Designing a 2d infinite collapse map for image encryption. Signal Process 171:107457","journal-title":"Signal Process"},{"key":"11226_CR6","doi-asserted-by":"crossref","unstructured":"Chen B, Cai P, Zhang Y, Huang J, Wu YS, Tang J (2010) Research on autocorrelation of chaotic sequence by phase space method. In: 2010 IEEE International conference on wireless communications, Networking and Information Security, IEEE, pp 6\u201312","DOI":"10.1109\/WCINS.2010.5541875"},{"key":"11226_CR7","doi-asserted-by":"crossref","unstructured":"Farah MB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics, pp 1\u201324","DOI":"10.1007\/s11071-019-05413-8"},{"key":"11226_CR8","doi-asserted-by":"crossref","unstructured":"Guesmi R, Farah MB (2020) A new efficient medical image cipher based on hybrid chaotic map and dna code. Multimedia Tools and Applications, pp 1\u201320","DOI":"10.1007\/s11042-020-09672-1"},{"issue":"1","key":"11226_CR9","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TCSI.2017.2717943","volume":"65","author":"Z Hua","year":"2017","unstructured":"Hua Z, Zhou Y (2017) One-dimensional nonlinear model for producing chaos. IEEE Transactions on Circuits and Systems I: Regular Papers 65(1):235\u2013246","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"issue":"3","key":"11226_CR10","doi-asserted-by":"publisher","first-page":"2557","DOI":"10.1109\/TIE.2017.2736515","volume":"65","author":"Z Hua","year":"2017","unstructured":"Hua Z, Zhou B, Zhou Y (2017) Sine-transform-based chaotic system with fpga implementation. IEEE Trans Ind Electron 65(3):2557\u20132566","journal-title":"IEEE Trans Ind Electron"},{"key":"11226_CR11","unstructured":"Kari AP, Navin AH, Bidgoli AM, Mirnia M (2020) A new image encryption scheme based on hybrid chaotic maps. Multimedia Tools and Applications, pp 1\u201320"},{"key":"11226_CR12","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.sigpro.2018.01.026","volume":"147","author":"R Lan","year":"2018","unstructured":"Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133\u2013145","journal-title":"Signal Process"},{"key":"11226_CR13","unstructured":"Lasota A, Mackey MC (2013) Chaos, fractals, and noise: stochastic aspects of dynamics, vol 97. Springer Science & Business Media"},{"issue":"6","key":"11226_CR14","doi-asserted-by":"publisher","first-page":"6890","DOI":"10.1364\/OE.26.006890","volume":"26","author":"B Liu","year":"2018","unstructured":"Liu B, Zhang L, Xin X (2018) Enhanced secure 4-d modulation space optical multi-carrier system based on joint constellation and stokes vector scrambling. Optics Express 26(6):6890\u20136898","journal-title":"Optics Express"},{"key":"11226_CR15","unstructured":"Moldovyan N, Moldovyan A (2006) Innovative cryptography (programming series). Charles River Media, Inc"},{"issue":"1","key":"11226_CR16","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10044-018-0765-5","volume":"22","author":"AS Saljoughi","year":"2019","unstructured":"Saljoughi AS, Mirvaziri H (2019) A new method for image encryption by 3d chaotic map. Pattern Anal Applic 22(1):243\u2013257","journal-title":"Pattern Anal Applic"},{"issue":"01","key":"11226_CR17","doi-asserted-by":"publisher","first-page":"1730004","DOI":"10.1142\/S021812741730004X","volume":"27","author":"WS Sayed","year":"2017","unstructured":"Sayed WS, Fahmy HA, Rezk AA, Radwan AG (2017) Generalized smooth transition map between tent and logistic maps. International Journal of Bifurcation and Chaos 27(01):1730004","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"11226_CR18","doi-asserted-by":"publisher","first-page":"47199","DOI":"10.1109\/ACCESS.2018.2866797","volume":"6","author":"A Sultan","year":"2018","unstructured":"Sultan A, Yang X, Hajomer AA, Hussain SB, Hu W (2018) Dynamic qam mapping for physical-layer security using digital chaos. IEEE Access 6:47199\u201347205","journal-title":"IEEE Access"},{"key":"11226_CR19","doi-asserted-by":"crossref","unstructured":"Sultan A, Yang X, Hussain SB, Hu W (2018) Physical-layer data encryption using chaotic constellation rotation in ofdm-pon. In: 2018 15Th international bhurban conference on applied sciences and technology, IBCAST, IEEE, pp 446\u2013448","DOI":"10.1109\/IBCAST.2018.8312262"},{"key":"11226_CR20","doi-asserted-by":"crossref","unstructured":"Wu Q, Zhang F, Hong Q, Wang X, Zeng Z (2020) Research on cascading high-dimensional isomorphic chaotic maps. Cogn Neurodyn, pp 1\u201311","DOI":"10.1007\/s11571-020-09583-9"},{"issue":"16","key":"11226_CR21","doi-asserted-by":"publisher","first-page":"21803","DOI":"10.1007\/s11042-017-5590-0","volume":"77","author":"B Yang","year":"2018","unstructured":"Yang B, Liao X (2018) A new color image encryption scheme based on logistic map over the finite field z n. Multimedia Tools and Applications 77 (16):21803\u201321821","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"11226_CR22","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimedia Tools and Applications 77(4):4585\u20134608","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"11226_CR23","doi-asserted-by":"publisher","first-page":"355","DOI":"10.3390\/sym12030355","volume":"12","author":"G Zhang","year":"2020","unstructured":"Zhang G, Ding W, Li L (2020) Image encryption algorithm based on tent delay-sine cascade with logistic map. Symmetry 12(3):355","journal-title":"Symmetry"},{"issue":"13","key":"11226_CR24","doi-asserted-by":"publisher","first-page":"15627","DOI":"10.1364\/OE.21.015627","volume":"21","author":"L Zhang","year":"2013","unstructured":"Zhang L, Liu B, Xin X, Liu D (2013) A novel 3d constellation-masked method for physical security in hierarchical ofdma system. Optics Express 21(13):15627\u201315633","journal-title":"Optics Express"},{"issue":"12","key":"11226_CR25","doi-asserted-by":"publisher","first-page":"2711","DOI":"10.1364\/OL.40.002711","volume":"40","author":"L Zhang","year":"2015","unstructured":"Zhang L, Liu B, Xin X (2015) Secure optical generalized filter bank multi-carrier system based on cubic constellation masked method. Opt Lett 40(12):2711\u20132714","journal-title":"Opt Lett"},{"issue":"9","key":"11226_CR26","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/JLT.2017.2669909","volume":"35","author":"W Zhang","year":"2017","unstructured":"Zhang W, Zhang C, Chen C, Qiu K (2017) Experimental demonstration of security-enhanced ofdma-pon using chaotic constellation transformation and pilot-aided secure key agreement. J Light Technol 35(9):1524\u20131530","journal-title":"J Light Technol"},{"issue":"11","key":"11226_CR27","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1016\/j.sigpro.2013.04.021","volume":"93","author":"Y Zhou","year":"2013","unstructured":"Zhou Y, Bao L, Chen CP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039\u20133052","journal-title":"Signal Process"},{"issue":"9","key":"11226_CR28","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","volume":"45","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Hua Z, Pun CM, Chen CP (2014) Cascade chaotic system with applications. IEEE Trans Cybern 45(9):2001\u20132012","journal-title":"IEEE Trans Cybern"},{"key":"11226_CR29","doi-asserted-by":"publisher","first-page":"125304","DOI":"10.1016\/j.optcom.2020.125304","volume":"462","author":"X Zhuo","year":"2020","unstructured":"Zhuo X, Bi M, Hu Z, Li H, Wang X, Yang X (2020) Secure scheme for ofdm-pon system using tr based on modified henon chaos. Opt Commun 462:125304","journal-title":"Opt Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11226-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11226-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11226-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T04:55:45Z","timestamp":1633841745000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11226-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,30]]},"references-count":29,"journal-issue":{"issue":"21-23","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["11226"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11226-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,7,30]]},"assertion":[{"value":"12 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}