{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:25:18Z","timestamp":1767968718111,"version":"3.49.0"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"30","license":[{"start":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T00:00:00Z","timestamp":1630713600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T00:00:00Z","timestamp":1630713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11042-021-11386-x","type":"journal-article","created":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T09:02:56Z","timestamp":1630746176000},"page":"36305-36339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["An efficient grayscale image encryption scheme based on variable length row-column swapping operations"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0954-5563","authenticated-orcid":false,"given":"Nadeem","family":"Iqbal","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Hanif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,4]]},"reference":[{"key":"11386_CR1","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/j.matcom.2020.05.016","volume":"177","author":"A Alghafis","year":"2020","unstructured":"Alghafis A, Firdousi F, Khan M, Batool SI, Amin M (2020) An efficient image encryption scheme based on chaotic and Deoxyribonucleic acid sequencing. Math Comput Simul 177:441\u2013466","journal-title":"Math Comput Simul"},{"key":"11386_CR2","doi-asserted-by":"crossref","unstructured":"Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimed Tools Appl\u00a0pp 1\u201321","DOI":"10.1007\/s11042-020-08850-5"},{"key":"11386_CR3","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122\u2013133","journal-title":"Signal Process"},{"key":"11386_CR4","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"key":"11386_CR5","doi-asserted-by":"crossref","unstructured":"Chai X, Bi J, Gan Z, Liu X, Zhang Y, Chen Y (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process p 107684","DOI":"10.1016\/j.sigpro.2020.107684"},{"issue":"3","key":"11386_CR6","doi-asserted-by":"crossref","first-page":"1797","DOI":"10.1007\/s11071-016-3153-y","volume":"87","author":"L Chen","year":"2017","unstructured":"Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map. Nonlinear Dyn 87(3):1797\u20131807","journal-title":"Nonlinear Dyn"},{"key":"11386_CR7","unstructured":"Diaconu AV (2015) KenKen puzzle-based image encryption algorithm. In Proc Rom Acad Ser A 16:313-320"},{"issue":"1","key":"11386_CR8","first-page":"154","volume":"8","author":"O Dorgham","year":"2018","unstructured":"Dorgham O, Al-Rahamneh B, Almomani A, Khatatneh KF (2018) Enhancing the security of exchanging and storing DICOM medical images on the cloud. Int J Cloud Appl Comput 8(1):154\u2013172","journal-title":"Int J Cloud Appl Comput"},{"key":"11386_CR9","unstructured":"Floating-Point Working Group (1985) IEEE computer society: IEEE standard for binary floating-point arithmetic, Standard 754\u20131985"},{"key":"11386_CR10","doi-asserted-by":"crossref","first-page":"55540","DOI":"10.1109\/ACCESS.2020.2981771","volume":"8","author":"H Guo","year":"2020","unstructured":"Guo H, Zhang X, Zhao X, Yu H, Zhang L (2020) Quadratic function chaotic system and its application on digital image encryption. IEEE Access 8:55540\u201355549","journal-title":"IEEE Access"},{"key":"11386_CR11","doi-asserted-by":"crossref","first-page":"123536","DOI":"10.1109\/ACCESS.2020.3004536","volume":"8","author":"M Hanif","year":"2020","unstructured":"Hanif M, Naqvi RA, Abbas S, Khan MA, Iqbal N (2020) A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations. IEEE Access 8:123536\u2013123555","journal-title":"IEEE Access"},{"key":"11386_CR12","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1016\/j.ijleo.2017.10.072","volume":"155","author":"TM Hoang","year":"2018","unstructured":"Hoang TM, Thanh HX (2018) Cryptanalysis and security improvement for a symmetric color image encryption algorithm. Optik 155:366\u2013383","journal-title":"Optik"},{"key":"11386_CR13","doi-asserted-by":"crossref","first-page":"174051","DOI":"10.1109\/ACCESS.2019.2956389","volume":"7","author":"N Iqbal","year":"2019","unstructured":"Iqbal N, Abbas S, Khan MA, Alyas T, Fatima A, Ahmad A (2019) An rgb image cipher using chaotic systems, 15-puzzle problem and dna computing. IEEE Access 7:174051\u2013174071","journal-title":"IEEE Access"},{"key":"11386_CR14","first-page":"102809","volume":"58","author":"N Iqbal","year":"2021","unstructured":"Iqbal N, Hanif M, Abbas S, Khan MA, Rehman ZU (2021) Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. J Inf Secur Appl 58:102809","journal-title":"J Inf Secur Appl"},{"key":"11386_CR15","unstructured":"Jian ZH, Da HU (2018) Quantum image encryption algorithm based on chaotic system and DNA coding. Journal of Southwest Jiaotong University 53(6)"},{"key":"11386_CR16","first-page":"102428","volume":"50","author":"KC Jithin","year":"2020","unstructured":"Jithin KC, Sankar S (2020) Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set. J Inf Secur Appl 50:102428","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"11386_CR17","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1016\/j.jmva.2004.06.003","volume":"94","author":"H Joe","year":"2005","unstructured":"Joe H (2005) Asymptotic efficiency of the two-stage estimation method for copula-based models. J Multivar Anal 94(2):401\u2013419","journal-title":"J Multivar Anal"},{"issue":"18","key":"11386_CR18","doi-asserted-by":"crossref","first-page":"26203","DOI":"10.1007\/s11042-019-07818-4","volume":"78","author":"M Khan","year":"2019","unstructured":"Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78(18):26203\u201326222","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"11386_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-014-2221-x","volume":"75","author":"A Kulsoom","year":"2016","unstructured":"Kulsoom A, Xiao D, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl 75(1):1\u201323","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"11386_CR20","doi-asserted-by":"crossref","first-page":"3119","DOI":"10.1142\/S0218127405014052","volume":"15","author":"S Li","year":"2005","unstructured":"Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurcation Chaos 15(10):3119\u20133151","journal-title":"Int J Bifurcation Chaos"},{"issue":"18","key":"11386_CR21","doi-asserted-by":"crossref","first-page":"11241","DOI":"10.1007\/s11042-015-2851-7","volume":"75","author":"X Liao","year":"2016","unstructured":"Liao X, Kulsoom A, Ullah S (2016) A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimed Tools Appl 75(18):11241\u201311266","journal-title":"Multimed Tools Appl"},{"key":"11386_CR22","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.ijleo.2017.09.099","volume":"153","author":"X Liao","year":"2018","unstructured":"Liao X, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik 153:117\u2013134","journal-title":"Optik"},{"issue":"3","key":"11386_CR23","doi-asserted-by":"crossref","first-page":"274","DOI":"10.3390\/e22030274","volume":"22","author":"F Masood","year":"2020","unstructured":"Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A novel hybrid secure image encryption based on julia set of fractals and 3D Lorenz chaotic map. Entropy 22(3):274","journal-title":"Entropy"},{"key":"11386_CR24","doi-asserted-by":"crossref","first-page":"815","DOI":"10.3390\/e21080815","volume":"21","author":"MA Murillo-Escobar","year":"2019","unstructured":"Murillo-Escobar MA, Meranza-Castill\u00f3n MO, L\u00f3pez-Guti\u00e9rrez RM, Cruz-Hern\u00e1ndez C (2019) Suggested integral analysis for chaos-based image cryptosystems. Entropy 21:815","journal-title":"Entropy"},{"issue":"2","key":"11386_CR25","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","volume":"78","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn 78(2):995\u20131015","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"11386_CR26","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1007\/s11042-013-1699-y","volume":"74","author":"B Norouzi","year":"2015","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74(3):781\u2013811","journal-title":"Multimed Tools Appl"},{"issue":"17","key":"11386_CR27","doi-asserted-by":"crossref","first-page":"10631","DOI":"10.1007\/s11042-014-2115-y","volume":"75","author":"Z Parvin","year":"2016","unstructured":"Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75(17):10631\u201310648","journal-title":"Multimed Tools Appl"},{"key":"11386_CR28","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.neucom.2017.12.048","volume":"283","author":"P Ping","year":"2018","unstructured":"Ping P, Xu F, Mao Y, Wang Z (2018) Designing permutation\u2013substitution image encryption networks with Henon map. Neurocomputing 283:53\u201363","journal-title":"Neurocomputing"},{"key":"11386_CR29","doi-asserted-by":"crossref","first-page":"140876","DOI":"10.1109\/ACCESS.2020.3012912","volume":"8","author":"A Qayyum","year":"2020","unstructured":"Qayyum A, Ahmad J, Boulila W, Rubaiee S, Masood F, Khan F, Buchanan WJ (2020) Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access 8:140876\u2013140895","journal-title":"IEEE Access"},{"issue":"4","key":"11386_CR30","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"issue":"1","key":"11386_CR31","first-page":"133","volume":"32","author":"T Sivakumar","year":"2016","unstructured":"Sivakumar T, Venkatesan R (2016) A New Image Encryption Method Based on Knight\u2019s Travel Path and True Random Number. J Inf Sci Eng 32(1):133\u2013152","journal-title":"J Inf Sci Eng"},{"key":"11386_CR32","doi-asserted-by":"crossref","first-page":"28539","DOI":"10.1109\/ACCESS.2019.2901870","volume":"7","author":"S Sun","year":"2019","unstructured":"Sun S, Guo Y, Wu R (2019) A novel image encryption scheme based on 7D hyperchaotic system and row-column simultaneous swapping. IEEE Access 7:28539\u201328547","journal-title":"IEEE Access"},{"issue":"3","key":"11386_CR33","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1007\/s11042-011-0775-4","volume":"59","author":"N Taneja","year":"2012","unstructured":"Taneja N, Raman B, Gupta I (2012) Combinational domain encryption for still visual data. Multimed Tools Appl 59(3):775\u2013793","journal-title":"Multimed Tools Appl"},{"key":"11386_CR34","doi-asserted-by":"crossref","unstructured":"Ur Rehman A, Liao X, Wang H (2021) An innovative technique for image encryption using tri-partite graph and chaotic maps. Multimed Tools Appl\u00a0pp 1\u201327","DOI":"10.1007\/s11042-021-10692-8"},{"key":"11386_CR35","doi-asserted-by":"crossref","first-page":"165737","DOI":"10.1016\/j.ijleo.2020.165737","volume":"225","author":"B Wang","year":"2021","unstructured":"Wang B, Zhang BF, Liu XW (2021) An image encryption approach on the basis of a time delay chaotic system. Optik 225:165737","journal-title":"Optik"},{"issue":"2","key":"11386_CR36","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1007\/s11071-014-1729-y","volume":"79","author":"X Wang","year":"2015","unstructured":"Wang X, Wang Q, Zhang Y (2015) A fast image algorithm based on rows and columns switch. Nonlinear Dyn 79(2):1141\u20131149","journal-title":"Nonlinear Dyn"},{"issue":"5","key":"11386_CR37","doi-asserted-by":"crossref","first-page":"6229","DOI":"10.1007\/s11042-016-3311-8","volume":"76","author":"X Wang","year":"2017","unstructured":"Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229\u20136245","journal-title":"Multimed Tools Appl"},{"key":"11386_CR38","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","volume":"142","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292\u2013300","journal-title":"Signal Process"},{"key":"11386_CR39","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"X Wu","year":"2018","unstructured":"Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272\u2013287","journal-title":"Signal Process"},{"key":"11386_CR40","doi-asserted-by":"crossref","unstructured":"Wu Y, Zhou Y, Noonan JP, Panetta K, Agaian S (2010) Image encryption using the sudoku matrix. In Mobile Multimedia\/Image Processing, Security, and Applications. International Society for Optics and Photonics.\u00a07708:77080P","DOI":"10.1117\/12.853197"},{"issue":"2","key":"11386_CR41","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption.\u00a0Cyber journals: multidisciplinary journals in science and technology. J Sel Areas Commun 1(2):31\u201338","journal-title":"J Sel Areas Commun"},{"key":"11386_CR42","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"Y Xian","year":"2021","unstructured":"Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154\u20131169","journal-title":"Inf Sci"},{"key":"11386_CR43","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"key":"11386_CR44","doi-asserted-by":"crossref","first-page":"105661","DOI":"10.1016\/j.optlastec.2019.105661","volume":"119","author":"Y-G Yang","year":"2019","unstructured":"Yang Y-G et al (2019) Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding. Opt Laser Technol 119:105661","journal-title":"Opt Laser Technol"},{"issue":"3","key":"11386_CR45","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.cnsns.2012.08.010","volume":"18","author":"W Zhang","year":"2013","unstructured":"Zhang W, Wong KW, Yu H, Zhu ZL (2013) A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simul 18(3):584\u2013600","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"11386_CR46","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao YL, Zhu ZL (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350","journal-title":"Signal Process"},{"key":"11386_CR47","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"11386_CR48","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.neucom.2014.11.095","volume":"169","author":"G Zhou","year":"2015","unstructured":"Zhou G, Zhang D, Liu Y, Yuan Y, Liu Q (2015) A novel image encryption algorithm based on chaos and Line map. Neurocomputing 169:150\u2013157","journal-title":"Neurocomputing"},{"issue":"2","key":"11386_CR49","doi-asserted-by":"crossref","first-page":"2043","DOI":"10.1007\/s11071-021-06206-8","volume":"103","author":"Y Zhou","year":"2021","unstructured":"Zhou Y, Li C, Li W, Li H, Feng W, Qian K (2021) Image encryption algorithm with circle index table scrambling and partition diffusion. Nonlinear Dyn 103(2):2043\u20132061","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"11386_CR50","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29\u201337","journal-title":"Opt Commun"},{"issue":"6","key":"11386_CR51","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171\u20131186","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11386-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11386-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11386-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T21:02:32Z","timestamp":1638565352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11386-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,4]]},"references-count":51,"journal-issue":{"issue":"30","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["11386"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11386-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,4]]},"assertion":[{"value":"16 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}