{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T23:20:07Z","timestamp":1776295207427,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T00:00:00Z","timestamp":1637712000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T00:00:00Z","timestamp":1637712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11042-021-11687-1","type":"journal-article","created":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T14:02:51Z","timestamp":1637762571000},"page":"3867-3897","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol"],"prefix":"10.1007","volume":"81","author":[{"given":"Zia","family":"Bashir","sequence":"first","affiliation":[]},{"given":"M. G. Abbas","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Hussain","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0954-5563","authenticated-orcid":false,"given":"Nadeem","family":"Iqbal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,24]]},"reference":[{"issue":"12","key":"11687_CR1","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1049\/iet-ipr.2013.0570","volume":"8","author":"SK Abd-El-Hafiz","year":"2014","unstructured":"Abd-El-Hafiz SK, Radwan AG, Haleem SHA, Barakat ML (2014) A fractal-based image encryption system. IET Image Process 8(12):742\u2013752","journal-title":"IET Image Process"},{"issue":"12","key":"11687_CR2","doi-asserted-by":"publisher","first-page":"312","DOI":"10.3390\/sym9120312","volume":"9","author":"Z Bashir","year":"2017","unstructured":"Bashir Z, Watrobski J, Rashid T, Zafar S, Sa\u0142abun W (2017) Chaotic dynamical state variables selection procedure based image encryption scheme. Symmetry 9(12):312","journal-title":"Symmetry"},{"issue":"1","key":"11687_CR3","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1007\/s11042-020-09695-8","volume":"80","author":"Z Bashir","year":"2021","unstructured":"Bashir Z, Iqbal N, Hanif M (2021) A novel grayscale image encryption scheme based on pixels\u2019 swapping operations. Multimed Tools Applic 80(1):1029\u20131054","journal-title":"Multimed Tools Applic"},{"key":"11687_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.optlaseng.2016.07.010","volume":"88","author":"A Belazi","year":"2017","unstructured":"Belazi A, El-Latif AAA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37\u201350","journal-title":"Opt Lasers Eng"},{"issue":"10","key":"11687_CR5","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.2009.5273804","volume":"47","author":"C Bissell","year":"2009","unstructured":"Bissell C (2009) Vladimir Aleksandrovich Kotelnikov: pioneer of the sampling theorem, cryptography, optimal detection, planetary mapping [History of Communications]. IEEE Commun Mag 47(10):24\u201332","journal-title":"IEEE Commun Mag"},{"key":"11687_CR6","doi-asserted-by":"crossref","unstructured":"Cassels JWS, Silverman JH (1987) The arithmetic of elliptic curves. Bulletin (New Series) of the American Mathematical Society 17(1):148\u2013149","DOI":"10.1090\/S0273-0979-1987-15544-3"},{"issue":"15","key":"11687_CR7","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1016\/j.physleta.2009.02.030","volume":"373","author":"C Cokal","year":"2009","unstructured":"Cokal C, Solak E (2009) Cryptanalysis of a chaos-based image encryption algorithm. Phys Lett A 373(15):1357\u20131360","journal-title":"Phys Lett A"},{"key":"11687_CR8","doi-asserted-by":"crossref","unstructured":"Das S, Mandal S, Ghoshal N (2015) Multiple-image encryption using genetic algorithm. In: Intelligent computing and applications. Springer, New Delhi, pp 145\u2013153","DOI":"10.1007\/978-81-322-2268-2_16"},{"issue":"6","key":"11687_CR9","doi-asserted-by":"publisher","first-page":"e52","DOI":"10.1002\/spy2.52","volume":"1","author":"D Dey","year":"2018","unstructured":"Dey D, Giri D, Jana B, Maitra T, Mohapatra RN (2018) Linear-feedback shift register-based multi-ant cellular automation and chaotic map-based image encryption. Security and Privacy 1(6):e52","journal-title":"Security and Privacy"},{"issue":"7","key":"11687_CR10","doi-asserted-by":"publisher","first-page":"073103","DOI":"10.1117\/1.OE.55.7.073103","volume":"55","author":"H Di","year":"2016","unstructured":"Di H, Kang Y, Liu Y, Zhang X (2016) Multiple image encryption by phase retrieval. Optical Engineering 55(7):073103","journal-title":"Optical Engineering"},{"issue":"7","key":"11687_CR11","doi-asserted-by":"publisher","first-page":"073103","DOI":"10.1117\/1.OE.55.7.073103","volume":"55","author":"H Di","year":"2016","unstructured":"Di H, Kang Y, Liu Y, Zhang X (2016) Multiple image encryption by phase retrieval. Opt Eng 55(7):073103","journal-title":"Opt Eng"},{"issue":"6","key":"11687_CR12","first-page":"644","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans 22(6):644\u2013654","journal-title":"IEEE Trans"},{"issue":"3","key":"11687_CR13","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn 83(3):1123\u20131136","journal-title":"Nonlinear Dyn"},{"key":"11687_CR14","unstructured":"Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science & Business Media"},{"issue":"12","key":"11687_CR15","doi-asserted-by":"publisher","first-page":"4094","DOI":"10.1016\/j.cnsns.2014.04.012","volume":"19","author":"X Huang","year":"2014","unstructured":"Huang X, Ye G (2014) An efficient self-adaptive model for chaotic image encryption algorithm. Commun Nonlinear Sci 19(12):4094\u20134104","journal-title":"Commun Nonlinear Sci"},{"key":"11687_CR16","doi-asserted-by":"publisher","first-page":"174051","DOI":"10.1109\/ACCESS.2019.2956389","volume":"7","author":"N Iqbal","year":"2019","unstructured":"Iqbal N, Abbas S, Khan MA, Alyas T, Fatima A, Ahmad A (2019) An RGB image cipher using chaotic systems, 15-puzzle problem and DNA computing. IEEE Access 7:174051\u2013174071","journal-title":"IEEE Access"},{"issue":"10","key":"11687_CR17","doi-asserted-by":"publisher","first-page":"801","DOI":"10.3390\/e20100801","volume":"20","author":"AA Karawia","year":"2018","unstructured":"Karawia AA (2018) Encryption algorithm of multiple-image using mixed image elements and two dimensional chaotic economic map. Entropy 20(10):801","journal-title":"Entropy"},{"key":"11687_CR18","unstructured":"Kaushik A (2013) Extended Diffie-Hellman algorithm for key exchange and management. Int J Adv Eng Sci Appl Math 3(3)"},{"issue":"177","key":"11687_CR19","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203\u2013209","journal-title":"Math Comput"},{"key":"11687_CR20","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.sigpro.2016.01.017","volume":"125","author":"M Kumar","year":"2016","unstructured":"Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187\u2013202","journal-title":"Signal Process"},{"key":"11687_CR21","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.chaos.2017.12.023","volume":"107","author":"Q Lai","year":"2018","unstructured":"Lai Q, Nestor T, Kengne J, Zhao XW (2018) Coexisting attractors and circuit implementation of a new 4D chaotic system with two equilibria. Chaos Solitons Fractals 107:92\u2013102","journal-title":"Chaos Solitons Fractals"},{"issue":"7","key":"11687_CR22","doi-asserted-by":"publisher","first-page":"8629","DOI":"10.1007\/s11042-017-4755-1","volume":"77","author":"DS Laiphrakpam","year":"2018","unstructured":"Laiphrakpam DS, Khumanthem MS (2018) A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed Tools Appl 77(7):8629\u20138652","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"11687_CR23","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1016\/j.cnsns.2010.05.008","volume":"16","author":"C Li","year":"2011","unstructured":"Li C, Li S, Lo KT (2011) Breaking a modified substitution\u2013diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci 16(2):837\u2013843","journal-title":"Commun Nonlinear Sci"},{"key":"11687_CR24","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238\u2013246","journal-title":"Opt Lasers Eng"},{"key":"11687_CR25","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.ijleo.2018.06.029","volume":"171","author":"CL Li","year":"2018","unstructured":"Li CL, Li HM, Li FD, Wei DQ, Yang XB, Zhang J (2018) Multiple-image encryption by using robust chaotic map in wavelet transform domain. Optik 171:277\u2013286","journal-title":"Optik"},{"issue":"5","key":"11687_CR26","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"issue":"18","key":"11687_CR27","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1016\/j.ijleo.2012.10.068","volume":"124","author":"H Liu","year":"2013","unstructured":"Liu H, Wang X, Kadir A (2013) Color image encryption using Choquet fuzzy integral and hyperchaotic system. Optik-International Journal for Light and Electron Optics 124(18):3527\u20133533","journal-title":"Optik-International Journal for Light and Electron Optics"},{"key":"11687_CR28","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.optcom.2014.09.046","volume":"335","author":"W Liu","year":"2015","unstructured":"Liu W, Xie Z, Liu Z, Zhang Y, Liu S (2015) Multiple-image encryption based on optical asymmetric key cryptosystem. Opt Commun 335:205\u2013211","journal-title":"Opt Commun"},{"key":"11687_CR29","doi-asserted-by":"publisher","first-page":"38507","DOI":"10.1109\/ACCESS.2019.2906052","volume":"7","author":"Y Luo","year":"2019","unstructured":"Luo Y, Ouyang X, Liu J, Cao L (2019) An image encryption method based on elliptic curve elgamal encryption and chaotic systems. IEEE Access 7:38507\u201338522","journal-title":"IEEE Access"},{"key":"11687_CR30","doi-asserted-by":"publisher","first-page":"88093","DOI":"10.1109\/ACCESS.2020.2990170","volume":"8","author":"MA Malik","year":"2020","unstructured":"Malik MA, Bashir Z, Iqbal N, Imtiaz MA (2020) Color image encryption algorithm based on hyper-chaos and DNA computing. IEEE Access 8:88093\u201388107","journal-title":"IEEE Access"},{"key":"11687_CR31","unstructured":"Menzes AJ, Van OPC, Vanstone SA (2001) Handbook of Applied Cryptology [M]"},{"key":"11687_CR32","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225\u2013237","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"11687_CR33","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","volume":"78","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn 78(2):995\u20131015","journal-title":"Nonlinear Dyn"},{"issue":"12","key":"11687_CR34","doi-asserted-by":"publisher","first-page":"16527","DOI":"10.1007\/s11042-018-7000-7","volume":"78","author":"H Noura","year":"2019","unstructured":"Noura H, Chehab A, Noura M, Couturier R, Mansour MM (2019) Lightweight, dynamic and efficient image encryption scheme. Multimed Tools Appl 78(12):16527\u201316561","journal-title":"Multimed Tools Appl"},{"key":"11687_CR35","doi-asserted-by":"crossref","unstructured":"Paar C, Pelzl J (2009) Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media","DOI":"10.1007\/978-3-642-04101-3"},{"issue":"9","key":"11687_CR36","doi-asserted-by":"publisher","first-page":"23145","DOI":"10.3390\/s150923145","volume":"15","author":"R Sampangi","year":"2015","unstructured":"Sampangi R, Sampalli S (2015) Butterfly encryption scheme for resource-constrained wireless networks. Sensors 15(9):23145\u201323167","journal-title":"Sensors"},{"key":"11687_CR37","doi-asserted-by":"crossref","unstructured":"Seyedzade SM, Mirzakuchaki S, Atani RE (2010) A novel image encryption algorithm based on hash function. In: 2010 6th Iranian conference on machine vision and image processing. IEEE, pp 1\u20136","DOI":"10.1109\/IranianMVIP.2010.5941167"},{"issue":"4","key":"11687_CR38","first-page":"656","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. BSTJAN 28(4):656\u2013715","journal-title":"BSTJAN"},{"key":"11687_CR39","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.procs.2015.06.054","volume":"54","author":"LD Singh","year":"2015","unstructured":"Singh LD, Singh KM (2015) Image encryption using elliptic curve cryptography. Procedia Comput Sci 54:472\u2013481","journal-title":"Procedia Comput Sci"},{"issue":"12","key":"11687_CR40","doi-asserted-by":"publisher","first-page":"7397","DOI":"10.1007\/s13369-018-3104-7","volume":"43","author":"LD Singh","year":"2018","unstructured":"Singh LD, Singh KM (2018) Visually meaningful multi-image encryption scheme. Arab J Sci Eng 43(12):7397\u20137407","journal-title":"Arab J Sci Eng"},{"key":"11687_CR41","unstructured":"Stallings W (2021) Cryptography and network security: principles and practice 0133354695, 9780133354690"},{"key":"11687_CR42","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.optlaseng.2017.05.019","volume":"98","author":"Y Su","year":"2017","unstructured":"Su Y, Tang C, Gao G, Gu F, Lei Z, Tang S (2017) Optical encryption scheme for multiple color images using complete trinary tree structure. Opt Lasers Eng 98:46\u201355","journal-title":"Opt Lasers Eng"},{"key":"11687_CR43","doi-asserted-by":"crossref","unstructured":"Suri S, Vijay R (2017) An AES-CHAOS-Based Hybrid approach to encrypt multiple images. In: Recent developments in intelligent computing, communication and devices. Springer, Singapore, pp 37\u201343","DOI":"10.1007\/978-981-10-3779-5_6"},{"key":"11687_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","volume":"80","author":"Z Tang","year":"2016","unstructured":"Tang Z, Song J, Zhang X, Sun R (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1\u201311","journal-title":"Opt Lasers Eng"},{"key":"11687_CR45","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.sigpro.2017.06.010","volume":"141","author":"S Toughi","year":"2017","unstructured":"Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo-random and advanced encryption system. Signal Process 141:217\u2013227","journal-title":"Signal Process"},{"issue":"2","key":"11687_CR46","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290\u2013299","journal-title":"J Syst Softw"},{"key":"11687_CR47","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using Latin squares. Inf Sci 264:317\u2013339","journal-title":"Inf Sci"},{"issue":"22","key":"11687_CR48","doi-asserted-by":"publisher","first-page":"31035","DOI":"10.1007\/s11042-018-7081-3","volume":"78","author":"Z Xiong","year":"2019","unstructured":"Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl 78(22):31035\u201331055","journal-title":"Multimed Tools Appl"},{"key":"11687_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2018.11.010","volume":"478","author":"M Xu","year":"2019","unstructured":"Xu M, Tian Z (2019) A novel image cipher based on 3D bit matrix and Latin cubes. Inf Sci 478:1\u201314","journal-title":"Inf Sci"},{"issue":"15","key":"11687_CR50","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1080\/09500340.2016.1154196","volume":"63","author":"S Yuan","year":"2016","unstructured":"Yuan S, Liu X, Zhou X, Li Z (2016) Multiple-image encryption scheme with a single-pixel detector. J Mod Opt 63(15):1457\u20131465","journal-title":"J Mod Opt"},{"key":"11687_CR51","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/j.compeleceng.2016.12.025","volume":"62","author":"X Zhang","year":"2017","unstructured":"Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and chaos. Comput Electr Eng 62:401\u2013413","journal-title":"Comput Electr Eng"},{"key":"11687_CR52","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.optlaseng.2016.12.005","volume":"92","author":"X Zhang","year":"2017","unstructured":"Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and permutation. Opt Lasers Eng 92:6\u201316","journal-title":"Opt Lasers Eng"},{"key":"11687_CR53","doi-asserted-by":"publisher","first-page":"70025","DOI":"10.1109\/ACCESS.2018.2879844","volume":"6","author":"X Zhang","year":"2018","unstructured":"Zhang X, Wang X (2018) Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem. IEEE Access 6:70025\u201370034","journal-title":"IEEE Access"},{"issue":"11","key":"11687_CR54","doi-asserted-by":"publisher","first-page":"660","DOI":"10.3390\/sym10110660","volume":"10","author":"X Zhang","year":"2018","unstructured":"Zhang X, Wang X (2018) Multiple-image encryption algorithm based on the 3D permutation model and chaotic system. Symmetry 10(11):660","journal-title":"Symmetry"},{"issue":"6","key":"11687_CR55","doi-asserted-by":"publisher","first-page":"7841","DOI":"10.1007\/s11042-018-6496-1","volume":"78","author":"X Zhang","year":"2019","unstructured":"Zhang X, Wang X (2019) Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimed Tools Appl 78(6):7841\u20137869","journal-title":"Multimed Tools Appl"},{"key":"11687_CR56","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.optlastec.2018.03.004","volume":"105","author":"L Zhang","year":"2018","unstructured":"Zhang L, Zhou Y, Huo D, Li J, Zhou X (2018) Multiple-image encryption based on double random phase encoding and compressive sensing by using a measurement array preprocessed with orthogonal-basis matrices. Opt Laser Technol 105:162\u2013170","journal-title":"Opt Laser Technol"},{"key":"11687_CR57","doi-asserted-by":"crossref","unstructured":"Zhao Z, Zhang X (2013) ECC-based image encryption using code computing. In: Proceedings of the 2012 international conference on communication, electronics and automation engineering. Springer, Berlin, pp 859\u2013865","DOI":"10.1007\/978-3-642-31698-2_121"},{"issue":"5","key":"11687_CR58","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1016\/j.optcom.2011.11.044","volume":"285","author":"Y Zhou","year":"2012","unstructured":"Zhou Y, Panetta K, Agaian S, Chen CP (2012) Image encryption using P-Fibonacci transform and decomposition. Opt Commun 285(5):594\u2013608","journal-title":"Opt Commun"},{"issue":"18","key":"11687_CR59","doi-asserted-by":"publisher","first-page":"5075","DOI":"10.1016\/j.ijleo.2014.06.054","volume":"125","author":"N Zhou","year":"2014","unstructured":"Zhou N, Zhang A, Wu J, Pei D, Yang Y (2014) Novel hybrid image compression-encryption algorithm based on compressive sensing. Optik-International Journal for Light and Electron Optics 125(18):5075\u20135080","journal-title":"Optik-International Journal for Light and Electron Optics"},{"issue":"1","key":"11687_CR60","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29\u201337","journal-title":"Opt Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11687-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11687-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11687-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T17:12:11Z","timestamp":1675962731000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11687-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,24]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["11687"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11687-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,24]]},"assertion":[{"value":"6 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}