{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T13:49:16Z","timestamp":1758980956669,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11042-021-11424-8","type":"journal-article","created":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T12:02:38Z","timestamp":1632744158000},"page":"1209-1235","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Fast image encryption algorithm based on (n,\u00a0m,\u00a0k)-PCMLCA"],"prefix":"10.1007","volume":"81","author":[{"given":"Sung Won","family":"Kang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5727-7903","authenticated-orcid":false,"given":"Un Sook","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Sung Jin","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,27]]},"reference":[{"key":"11424_CR1","unstructured":"Aboughalia RA, Alkishriwo OAS (2018) Color Image Encryption Based on Chaotic Block Permutation and XOR Operation. in:Libyan Intern Conf Electric Eng Technol (LICEET2018) Tripoli - Libya."},{"key":"11424_CR2","doi-asserted-by":"publisher","unstructured":"Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45\u201358. https:\/\/doi.org\/10.1016\/j.sigpro.2019.02.016","DOI":"10.1016\/j.sigpro.2019.02.016"},{"key":"11424_CR3","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"key":"11424_CR4","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-2773-2","volume-title":"Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generaters","author":"S Bilan","year":"2018","unstructured":"Bilan S (2018) Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generaters. IGI Global, Hershey PA, USA"},{"key":"11424_CR5","doi-asserted-by":"publisher","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362. https:\/\/doi.org\/10.1016\/j.sigpro.2018.09.029","DOI":"10.1016\/j.sigpro.2018.09.029"},{"key":"11424_CR6","doi-asserted-by":"publisher","unstructured":"Cattell K, Muzio J (1996) Synthesis of one-dimensional linear hybrid cellular automata. IEEE Trans Comput-Aided Design Integr Circuits Syst 15(3):325\u2013335. https:\/\/doi.org\/10.1109\/43.489103","DOI":"10.1109\/43.489103"},{"key":"11424_CR7","doi-asserted-by":"publisher","unstructured":"Chen G, Mao YM, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. IEEE Trans Comput-Aided Design Integr Circuits Syst 21(2):749\u2013761. https:\/\/doi.org\/10.1016\/j.chaos.2003.12.022","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"11424_CR8","doi-asserted-by":"publisher","unstructured":"Chen CS, Wang T, Kou YZ (2013) Improvement of trace-driven I-Cache timing attack on the RSA algorithm. J Syst Software 86(1):100\u2013107. https:\/\/doi.org\/10.1016\/j.jss.2012.07.020","DOI":"10.1016\/j.jss.2012.07.020"},{"key":"11424_CR9","doi-asserted-by":"publisher","unstructured":"Cho SJ, Choi US, Kim HD, Hwang YH, Kim JG, Heo SH (2007) New synthesis of one-dimensional 90\/150 linear hybrid group cellular automata. IEEE Trans Comput-Aided Design Integr Circuits Syst 26(9):1720\u20131724. https:\/\/doi.org\/10.1109\/TCAD.2007.895784","DOI":"10.1109\/TCAD.2007.895784"},{"key":"11424_CR10","doi-asserted-by":"publisher","unstructured":"Choi US, Cho SJ, Kim JG, Kang SW, Kim HD, Kim ST (2019) Color Image Encryption Based on PC-MLCA and 3-D Chaotic Cat Map. in:Proceedings of the 4th IEEE Intern Conf Comp Commun Syst(ICCCS), Singapore Singapore. https:\/\/doi.org\/10.1109\/20CCOMS.2019.8821691","DOI":"10.1109\/20CCOMS.2019.8821691"},{"key":"11424_CR11","doi-asserted-by":"publisher","unstructured":"Choi US, Cho SJ, Kim JG, Kang SW, Kim HD (2020) Color image encryption based on programmable complemented maximum length cellular automata and generalized 3-D chaotic cat map. Multimedia Tools App. https:\/\/doi.org\/10.1007\/s11042-020-09033-y","DOI":"10.1007\/s11042-020-09033-y"},{"key":"11424_CR12","doi-asserted-by":"publisher","unstructured":"Das AK, Chaudhuri PP (1993) Vector Space Theoretic Analysis of Additive Cellular Automata and Its Application for Pseudoexhaustive Test Pattern Generation. IEEE Trans Comput 42:340\u2013352. https:\/\/doi.org\/10.1109\/12.2101767","DOI":"10.1109\/12.2101767"},{"key":"11424_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of rijndael: AES - The advanced encryption standard","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The design of rijndael: AES - The advanced encryption standard. Springer Science & Business Media, Berlin, Germany"},{"key":"11424_CR14","doi-asserted-by":"publisher","unstructured":"Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Laser Eng 71(8):33\u201341. https:\/\/doi.org\/10.1016\/j.optlaseng.2015.03.007","DOI":"10.1016\/j.optlaseng.2015.03.007"},{"key":"11424_CR15","doi-asserted-by":"publisher","unstructured":"Essaid M, Akharraz I, Saaidi A, Mouhib A (2018) A New Image Encryption Scheme Based on Confusion-Diffusion Using an Enhanced Skew Tent Map. Procedia Comp Sci 127:539\u2013548. https:\/\/doi.org\/10.1016\/j.procs.2018.01.153","DOI":"10.1016\/j.procs.2018.01.153"},{"key":"11424_CR16","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation and Chaos 8:1259\u20131284","journal-title":"Int J Bifurcation and Chaos"},{"key":"11424_CR17","doi-asserted-by":"publisher","unstructured":"Gao S, Liao X, Liu X (2019) Real-time detecting one specific tampering operation in multiple operator chains. J Real-Time Image Process 16:741\u2013750. https:\/\/doi.org\/10.1007\/s11554-019-00860-3","DOI":"10.1007\/s11554-019-00860-3"},{"key":"11424_CR18","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.sigpro.2019.06.010","volume":"164","author":"HM Ghadirl","year":"2019","unstructured":"Ghadirl HM, Nodehi A, Enayatifar R (2019) An overview of encryption algorithms in color images. Signal Process 164:163\u2013185","journal-title":"Signal Process"},{"issue":"7","key":"11424_CR19","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1109\/TCAD.2004.829808","volume":"23","author":"S Guan","year":"2004","unstructured":"Guan S, Tan SK (2004) Pseudorandom Number Generation With Self-Programmable Cellular Automata. IEEE Trans Comput-Aided Design Integr Circuits Syst 23(7), 1095\u20131101","journal-title":"IEEE Trans Comput-Aided Design Integr Circuits Syst"},{"key":"11424_CR20","doi-asserted-by":"publisher","unstructured":"Hasheminejad A, Rostami MJ (2019) A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Optik 184:205\u2013213. https:\/\/doi.org\/10.1016\/j.ijleo.2019.03.065","DOI":"10.1016\/j.ijleo.2019.03.065"},{"key":"11424_CR21","doi-asserted-by":"publisher","unstructured":"Huang L, Cai S, Xiong X, Xiao M (2019) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt Laser Eng 115:7\u201320. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.11.015","DOI":"10.1016\/j.optlaseng.2018.11.015"},{"key":"11424_CR22","doi-asserted-by":"publisher","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018a) 2D Logistic-Sine-coupling map for image encryption. Signal Process 149:148\u2013161. https:\/\/doi.org\/10.1016\/j.sigpro.2018.03.010","DOI":"10.1016\/j.sigpro.2018.03.010"},{"key":"11424_CR23","doi-asserted-by":"crossref","unstructured":"Hua Z, Yi S, Zhou Y (2018b) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134\u2013144","DOI":"10.1016\/j.sigpro.2017.10.004"},{"key":"11424_CR24","doi-asserted-by":"publisher","unstructured":"Jeong HS, Park KC, Cho SJ, Kim ST (2018) Color medical image encryption using two-dimensional chaotic map and C-MLCA. in:Proceedings of the 10th International Conference on Ubiquitous and Future Networks (ICUFN), Prague Czech Republic. https:\/\/doi.org\/10.1109\/ICUFN.2018.8437025","DOI":"10.1109\/ICUFN.2018.8437025"},{"key":"11424_CR25","doi-asserted-by":"publisher","unstructured":"Jha DP, Kohli R, Gupta A (2016) Proposed encryption algorithm for data security using matrix properties. 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Greater Noida India. https:\/\/doi.org\/10.1109\/ICICCS.2016.7542316","DOI":"10.1109\/ICICCS.2016.7542316"},{"key":"11424_CR26","unstructured":"Kohli R, Kumar M (2013) FPGA implementation of cryptographic algorithms using multi-encryption technique. Int J Adv Res Comput Sci Softw Eng 3(5)"},{"key":"11424_CR27","doi-asserted-by":"publisher","unstructured":"Koppu S, Viswanatham VM (2017) A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform Modelling and Simulation in Engineering. Model Simulation Eng 1\u201312. https:\/\/doi.org\/10.1155\/2017\/7470204","DOI":"10.1155\/2017\/7470204"},{"key":"11424_CR28","doi-asserted-by":"publisher","unstructured":"Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133\u2013145. https:\/\/doi.org\/10.1016\/j.sigpro.2018.01.026","DOI":"10.1016\/j.sigpro.2018.01.026"},{"key":"11424_CR29","doi-asserted-by":"publisher","unstructured":"Liao X, Li K, Zhu X, Liu KJR (2020) Robust Detection of Image Operator Chain with Two-stream Convolutional Neural Network. IEEE J Select Topics Signal Process 14(5):955\u2013968. https:\/\/doi.org\/10.1109\/JSTSP.2020.3002391","DOI":"10.1109\/JSTSP.2020.3002391"},{"key":"11424_CR30","doi-asserted-by":"publisher","unstructured":"Nandi S, Chakraborty S, Roy S, Karaa WBA, Nath S, Dey N (2014) 1-D Group Cellular Automata Based Image Encryption Technique. in: Proceedings of the 2014 IEEE Intern Conf Control, Instrument, Commun, Computation Technol (ICCICCT). Kanyakumari India. https:\/\/doi.org\/10.1109\/ICCICCT.2014.6993017","DOI":"10.1109\/ICCICCT.2014.6993017"},{"key":"11424_CR31","doi-asserted-by":"publisher","unstructured":"Patro KAK, Acharya B (2018) Secure multi-level permutation operation based multiple colour image encryption. J Inform Sec App 40:111-133. https:\/\/doi.org\/10.1016\/j.jisa.2018.03.006","DOI":"10.1016\/j.jisa.2018.03.006"},{"key":"11424_CR32","doi-asserted-by":"publisher","unstructured":"Somaraj S, Ali Hussain M (2014) Securing Medical Images by Image Encryption using Key Image. Intern J Comp App 104(3):30\u201334. https:\/\/doi.org\/10.1016\/j.jss.2012.07.020","DOI":"10.1016\/j.jss.2012.07.020"},{"key":"11424_CR33","doi-asserted-by":"publisher","first-page":"5429","DOI":"10.1007\/s11042-014-1861-1","volume":"74","author":"Z Tang","year":"2015","unstructured":"Tang Z, Zhang X, Lan W (2015) Efficient image encryption with block shuffling and chaotic map. Multimedia Tools App 74:5429\u20135448","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"11424_CR34","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1016\/j.neucom.2017.09.068","volume":"275","author":"Y Wang","year":"2018","unstructured":"Wang Y, Zhao Y, Zhou Q, Lin Z (2018) Image encryption using partitioned cellular automata. Neurocomputing 275(1), 1318\u20131332","journal-title":"Neurocomputing"},{"key":"11424_CR35","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology. J Select Areas Telecom (JSAT) 31\u201338"},{"key":"11424_CR36","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.optcom.2014.10.044","volume":"338","author":"W Zhang","year":"2015","unstructured":"Zhang W, Yu H, Zhu Z (2015) Color image encryption based on paired interpermuting planes. Opt Commu 338:199\u2013208","journal-title":"OPT COMMU"},{"key":"11424_CR37","doi-asserted-by":"publisher","unstructured":"Zhang Y (2019) A Fast Image Encryption Algorithm Based on Convolution Operation. IETE J Res 65(1):4\u201318. https:\/\/doi.org\/10.1080\/03772063.2017.1400406","DOI":"10.1080\/03772063.2017.1400406"},{"key":"11424_CR38","doi-asserted-by":"publisher","unstructured":"Zhang S, Luo H (2012) The Research of Image Encryption Algorithm Based on Chaos Cellular Automata. J Multimedia 7(1):66\u201373. https:\/\/doi.org\/10.4304\/jmm.7.1.66-73","DOI":"10.4304\/jmm.7.1.66-73"},{"key":"11424_CR39","doi-asserted-by":"publisher","unstructured":"Zhang Z, Zhao Z (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn 75:319\u2013330. https:\/\/doi.org\/10.1007\/s11071-013-1068-4","DOI":"10.1007\/s11071-013-1068-4"},{"key":"11424_CR40","doi-asserted-by":"publisher","unstructured":"Zhu C, Sun K (2018) Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps. IEEE Access 6:18759 \u2013 18770. https:\/\/doi.org\/10.1109\/ACCESS.2018.2817600","DOI":"10.1109\/ACCESS.2018.2817600"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11424-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11424-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11424-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T20:37:37Z","timestamp":1642711057000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11424-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,27]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["11424"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11424-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,9,27]]},"assertion":[{"value":"21 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}