{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:15:24Z","timestamp":1766268924308,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11042-021-11295-z","type":"journal-article","created":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T06:02:46Z","timestamp":1629180166000},"page":"33297-33312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A new scan pattern method for color image encryption based on 3D-Lorenzo chaotic map method"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9729-2411","authenticated-orcid":false,"given":"Lahieb Mohammed","family":"Jawad","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"11295_CR1","first-page":"1","volume":"1","author":"OM Al-Hazaimeh","year":"2017","unstructured":"Al-Hazaimeh OM, Al-Jamal MF, Alhindawi N, Omari A (2017) Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys. Neural Comput Applic 1:1\u201311","journal-title":"Neural Comput Applic"},{"key":"11295_CR2","doi-asserted-by":"publisher","unstructured":"Al-Maadeed TA, Hussain I, Anees A, Mustafa MT (2021) A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-021-10695-5","DOI":"10.1007\/s11042-021-10695-5"},{"issue":"3","key":"11295_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13319-015-0059-2","volume":"6","author":"A Anees","year":"2015","unstructured":"Anees A (2015) An image encryption scheme based on Lorenz system for low profile applications. 3D Res 6(3):1\u201310","journal-title":"3D Res"},{"key":"11295_CR4","doi-asserted-by":"crossref","unstructured":"Devade SP, Metkar SP (2018) Image encryption technique for improvement of image security. In: Ambient communications and computer systems. Springer, Singapore, pp 671\u2013682","DOI":"10.1007\/978-981-10-7386-1_56"},{"key":"11295_CR5","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","volume":"90","author":"R Enayatifar","year":"2017","unstructured":"Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146\u2013154","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"11295_CR6","first-page":"92","volume":"1","author":"R Gupta","year":"2013","unstructured":"Gupta R, Bisht J (2013) Colour image encryption and decryption by using scan approach. Int J Softw Hardw Res Eng 1(2):92\u201396","journal-title":"Int J Softw Hardw Res Eng"},{"issue":"2","key":"11295_CR7","first-page":"81","volume":"3","author":"R Gupta","year":"2015","unstructured":"Gupta R, Bisht J, Gupta A (2015) Medical image encryption using two dimensional scan approach. Int J Eng Sci Innov Technol 3(2):81\u201385","journal-title":"Int J Eng Sci Innov Technol"},{"issue":"2","key":"11295_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.31987\/ijict.1.2.19","volume":"1","author":"LA Hamood","year":"2018","unstructured":"Hamood LA, Ibrahem MK (2018) Video encryption based on chaotic system and stream cipher. Iraqi J Inform Commun Technol 1(2):33\u201340","journal-title":"Iraqi J Inform Commun Technol"},{"key":"11295_CR9","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134\u2013144","journal-title":"Signal Process"},{"issue":"9","key":"11295_CR10","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1049\/el.2017.4426","volume":"54","author":"M Kaur","year":"2018","unstructured":"Kaur M, Kumar V (2018) Efficient image encryption method based on improved Lorenz chaotic system. Electron Lett 54(9):562\u2013564","journal-title":"Electron Lett"},{"issue":"3","key":"11295_CR11","doi-asserted-by":"publisher","first-page":"3749","DOI":"10.1007\/s11042-020-09854-x","volume":"80","author":"V Kumar","year":"2021","unstructured":"Kumar V, Girdhar A (2021) A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach. Multimedia Tools Appl 80(3):3749\u20133773","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"11295_CR12","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s11042-012-1281-z","volume":"66","author":"S Li","year":"2013","unstructured":"Li S, Zhao Y, Qu B (2013) Image scrambling based on chaotic sequences and vegin\u00e8re cipher. Multimedia Tools Appl 66(3):573\u2013588","journal-title":"Multimedia Tools Appl"},{"key":"11295_CR13","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238\u2013246","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"11295_CR14","doi-asserted-by":"publisher","first-page":"589","DOI":"10.3390\/e22050589","volume":"22","author":"CY Lin","year":"2020","unstructured":"Lin CY, Wu JL (2020) Cryptanalysis and improvement of a chaotic map-based image encryption system using both plaintext related permutation and diffusion. Entropy 22(5):589","journal-title":"Entropy"},{"key":"11295_CR15","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"11295_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e22030274","volume":"22","author":"F Masood","year":"2020","unstructured":"Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A novel hybrid secure image encryption based on julia set of fractals and 3D Lorenz chaotic map. Entropy 22(3):1\u201327","journal-title":"Entropy"},{"issue":"4","key":"11295_CR17","first-page":"23","volume":"2","author":"M Nandish","year":"2015","unstructured":"Nandish M, Rudra K (2015) Combination of DNA sequence in scan patterns and dyadic permutation in securing the image contents. European J Adv Eng Technol 2(4):23\u201330","journal-title":"European J Adv Eng Technol"},{"issue":"2","key":"11295_CR18","first-page":"297","volume":"2","author":"HT Panduranga","year":"2010","unstructured":"Panduranga HT, Kumar SN (2010) Hybrid approach for image encryption using SCAN patterns and Carrier Images. Int J Comput Sci Eng 2(2):297\u2013300","journal-title":"Int J Comput Sci Eng"},{"key":"11295_CR19","doi-asserted-by":"crossref","unstructured":"Pareek NK, Patidar V, Sud KK (2011) Colour Image encryption scheme based on permutation and substitution techniques. In: International conference on computer science and information technology. Springer, Berlin, pp 413\u2013427","DOI":"10.1007\/978-3-642-17857-3_41"},{"issue":"5","key":"11295_CR20","first-page":"275","volume":"6","author":"RM Rad","year":"2013","unstructured":"Rad RM, Attar A, Atani RE (2013) A new fast and simple image encryption algorithm using scan patterns and XOR. Int J Signal Process Image Process Pattern Recogn 6(5):275\u2013290","journal-title":"Int J Signal Process Image Process Pattern Recogn"},{"issue":"2","key":"11295_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11082-020-2219-8","volume":"52","author":"P Rakheja","year":"2020","unstructured":"Rakheja P, Vig R, Singh P (2020) Double image encryption using 3D Lorenz chaotic system, 2D non-separable linear canonical transform and QR decomposition. Opt Quant Electron 52(2):1\u201321","journal-title":"Opt Quant Electron"},{"issue":"2","key":"11295_CR22","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s11071-018-4600-8","volume":"95","author":"SF Raza","year":"2019","unstructured":"Raza SF, Satpute V (2019) A novel bit permutation-based image encryption algorithm. Nonlinear Dyn 95(2):859\u2013873","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"11295_CR23","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1504\/IJSCCPS.2017.088769","volume":"2","author":"I Saini","year":"2017","unstructured":"Saini I, Singh P, Yadav AK (2017) Analysis of Lorenz-chaos and exclusive-OR based image encryption scheme. Int J Soc Comput Cyber-Phys Syst 2 (1):59\u201372","journal-title":"Int J Soc Comput Cyber-Phys Syst"},{"key":"11295_CR24","doi-asserted-by":"crossref","unstructured":"Scarmana G, McDougall K (2015) Exploring The application of some common raster scanning paths on lossless compression of elevation images. In: International geoscience and remote sensing symposium, IGARSS, IEEE, pp 4514\u20134517","DOI":"10.1109\/IGARSS.2015.7326831"},{"key":"11295_CR25","doi-asserted-by":"publisher","first-page":"106162","DOI":"10.1016\/j.asoc.2020.106162","volume":"90","author":"KU Shahna","year":"2020","unstructured":"Shahna KU, Mohamed A (2020) A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl Soft Comput 90:106162","journal-title":"Appl Soft Comput"},{"issue":"7","key":"11295_CR26","first-page":"2278","volume":"1","author":"M Sharma","year":"2012","unstructured":"Sharma M, Kamargaonkar C, Gupta A (2012) A novel approach of image encryption and decryption by using partition and scanning pattern. Int J Eng Res Technol (IJERT) 1(7):2278\u20132281","journal-title":"Int J Eng Res Technol (IJERT)"},{"key":"11295_CR27","doi-asserted-by":"crossref","unstructured":"Singar CP, Bharti J, Pateriya RK (2017) Image encryption based on cell shuffling and scanning techniques. In: 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), IEEE, pp 257\u2013263","DOI":"10.1109\/RISE.2017.8378163"},{"issue":"2","key":"11295_CR28","first-page":"91","volume":"41","author":"T Sivakumar","year":"2014","unstructured":"Sivakumar T, Venkatesan R (2014) A novel approach for image encryption using dynamic SCAN pattern. IAENG Int J Comput Sci 41(2):91\u2013101","journal-title":"IAENG Int J Comput Sci"},{"issue":"6","key":"11295_CR29","first-page":"2317","volume":"9","author":"T Sivakumar","year":"2015","unstructured":"Sivakumar T, Venkatesan R (2015) A novel image encryption using calligraphy based scan method and random number. KSII Trans Internet Inform Syst 9(6):2317\u20132337","journal-title":"KSII Trans Internet Inform Syst"},{"issue":"1","key":"11295_CR30","first-page":"133","volume":"32","author":"T Sivakumar","year":"2016","unstructured":"Sivakumar T, Venkatesan R (2016) A new image encryption method based on knight\u2019s travel path and true random number. J Inform Sci Eng 32 (1):133\u2013152","journal-title":"J Inform Sci Eng"},{"key":"11295_CR31","doi-asserted-by":"crossref","unstructured":"Somaraj S, AliHussain M (2017) An image encryption technique using scan based approach and image as key. In: Proceedings of the First International Conference on Computational Intelligence and Informatics","DOI":"10.1007\/978-981-10-2471-9_62"},{"issue":"4","key":"11295_CR32","first-page":"5","volume":"10","author":"T Sivakumar","year":"2010","unstructured":"Sivakumar T, Keerthana SV (2010) Image encryption using rangoli based scan pattern and random number. Int J Latest Trends Eng Technol 10(4):5\u201313","journal-title":"Int J Latest Trends Eng Technol"},{"key":"11295_CR33","first-page":"1","volume":"201","author":"Z Tang","year":"2019","unstructured":"Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) Image encryption with double spiral scans and chaotic maps. Secur Commun Netw 201:1\u20135","journal-title":"Secur Commun Netw"},{"issue":"10","key":"11295_CR34","doi-asserted-by":"publisher","first-page":"3101","DOI":"10.1007\/s10489-020-01697-1","volume":"50","author":"R Vidhya","year":"2020","unstructured":"Vidhya R, Brindha M, Gounden NA (2020) Analysis of zig-zag scan based modified feedback convolution algorithm against differential attacks and its application to image encryption. Appl Intell 50(10):3101\u20133124","journal-title":"Appl Intell"},{"issue":"5","key":"11295_CR35","doi-asserted-by":"publisher","first-page":"6243","DOI":"10.1007\/s11042-017-4534-z","volume":"77","author":"XY Wang","year":"2018","unstructured":"Wang XY, Li P, Zhang YQ, Liu LY, Zhang H, Wang X (2018) A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimedia Tools Appl 77(5):6243\u20136265","journal-title":"Multimedia Tools Appl"},{"key":"11295_CR36","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41\u201352","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"11295_CR37","first-page":"919","volume":"8","author":"MAB Younes","year":"2008","unstructured":"Younes MAB, Jantan A (2008) An image encryption approach using a combination of permutation technique followed by encryption. Int J Comput Sci Netw Secur 8(4):919\u2013197","journal-title":"Int J Comput Sci Netw Secur"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11295-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11295-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11295-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T02:06:45Z","timestamp":1634695605000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11295-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":37,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["11295"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11295-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"13 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declare that she has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}