{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:34:55Z","timestamp":1767141295420,"version":"build-2238731810"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T00:00:00Z","timestamp":1646956800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T00:00:00Z","timestamp":1646956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11042-022-12071-3","type":"journal-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T06:05:04Z","timestamp":1646978704000},"page":"20483-20508","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Image cryptosystem based on plain image correlation rate and selective chaotic maps"],"prefix":"10.1007","volume":"81","author":[{"given":"Ahmad Pourjabbar","family":"Kari","sequence":"first","affiliation":[]},{"given":"Ahmad Habibizad","family":"Navin","sequence":"additional","affiliation":[]},{"given":"Amir Massoud","family":"Bidgoli","sequence":"additional","affiliation":[]},{"given":"Mirkamal","family":"Mirnia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,11]]},"reference":[{"key":"12071_CR1","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.eij.2015.10.001","volume":"17","author":"NAM Abbas","year":"2016","unstructured":"Abbas NAM (2016) Image encryption based on independent component analysis and Arnold\u2019s cat map. Egypt Inform J 17:139\u2013146","journal-title":"Egypt Inform J"},{"key":"12071_CR2","doi-asserted-by":"publisher","first-page":"24801","DOI":"10.1007\/s11042-021-10695-5","volume":"80","author":"TA Al-Maadeed","year":"2021","unstructured":"Al-Maadeed TA, Hussain I, Anees A et al (2021) A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimed Tools Appl 80:24801\u201324822. https:\/\/doi.org\/10.1007\/s11042-021-10695-5","journal-title":"Multimed Tools Appl"},{"key":"12071_CR3","unstructured":"Al-Othmani AZ, Manaf AA, Zeki AM (2012) A survey on steganography techniques in real time audio signals and evaluation. IJCSI International Journal of Computer Science Issues 9(1, No 1):30\u201337, ISSN (Online): 1694\u20130814, License CC BY-NC-ND 4.0"},{"key":"12071_CR4","doi-asserted-by":"publisher","unstructured":"Amina S, Mohamed FK (2017) An efficient and secure chaotic cipher algorithm for image content preservation. Signal Process. https:\/\/doi.org\/10.1016\/j.cnsns.2017.12.017","DOI":"10.1016\/j.cnsns.2017.12.017"},{"issue":"6","key":"12071_CR5","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1016\/j.optlaseng.2013.01.001","volume":"51","author":"A Bakhshandeh","year":"2013","unstructured":"Bakhshandeh A, Eslami Z (2013) An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt Lasesr Eng 51(6):665\u2013673","journal-title":"Opt Lasesr Eng"},{"key":"12071_CR6","doi-asserted-by":"publisher","first-page":"25583","DOI":"10.1007\/s11042-021-10773-8","volume":"80","author":"B Bouteghrine","year":"2021","unstructured":"Bouteghrine B, Tanougast C, Sadoudi S (2021) Novel image encryption algorithm based on new 3-d chaos map. Multimed Tools Appl 80:25583\u201325605. https:\/\/doi.org\/10.1007\/s11042-021-10773-8","journal-title":"Multimed Tools Appl"},{"key":"12071_CR7","doi-asserted-by":"crossref","unstructured":"Chapaneri S, Chapaneri R, Sarode T (2014) Evaluation of chaotic map lattice systems for image encryption. Circuits, Systems, Communication and Information Technology Applications (CSCITA), 2014 International Conference on IEEE, pp 59\u201364","DOI":"10.1109\/CSCITA.2014.6839235"},{"issue":"3","key":"12071_CR8","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.cnsns.2014.06.032","volume":"20","author":"J-x Chen","year":"2015","unstructured":"Chen J-x, Zhu Z-l, Fu C et al (2015) A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun Nonlinear Sci Numer Simul 20(3):846\u2013860","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"12071_CR9","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.cnsns.2014.11.021","volume":"23","author":"J-x Chen","year":"2015","unstructured":"Chen J-x, Zhu Z-l, Fu C et al (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun Nonlinear Sci Numer Simul 23(1):294\u2013310","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"12071_CR10","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.optlaseng.2014.11.017","volume":"67","author":"J-x Chen","year":"2015","unstructured":"Chen J-x, Zhu Z-l, Fu C et al (2015) An efficient image encryption scheme using gray code based permutation approach. Opt Lasers Eng 67:191\u2013204","journal-title":"Opt Lasers Eng"},{"issue":"09","key":"12071_CR11","doi-asserted-by":"publisher","first-page":"1950115","DOI":"10.1142\/S0218127419501153","volume":"29","author":"G Cheng","year":"2019","unstructured":"Cheng G, Wang C, Chen H (2019) A novel color image encryption algorithm based on hyper chaotic system and permutation-diffusion architecture. Int J Bifurcat Chaos 29(09):1950115","journal-title":"Int J Bifurcat Chaos"},{"key":"12071_CR12","doi-asserted-by":"publisher","first-page":"31865","DOI":"10.1007\/s11042-021-11118-1","volume":"80","author":"S Chhikara","year":"2021","unstructured":"Chhikara S, Kumar R (2021) Image steganalysis with entropy hybridized with chaotic grasshopper optimizer. Multimed Tools Appl 80:31865\u201331885. https:\/\/doi.org\/10.1007\/s11042-021-11118-1","journal-title":"Multimed Tools Appl"},{"key":"12071_CR13","doi-asserted-by":"publisher","unstructured":"Darwis D, Junaidi A, Shofiana DA, Wamiliana (2021) A new digital image steganography based on center embedded pixel positioning. Cybern Inf Technol 21(2) Sofia. Print ISSN: 1311-9702; online ISSN: 1314-4081. https:\/\/doi.org\/10.2478\/cait-2021-0021","DOI":"10.2478\/cait-2021-0021"},{"issue":"3","key":"12071_CR14","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1093\/jigpal\/jzv013","volume":"23","author":"AM Del Rey","year":"2015","unstructured":"Del Rey AM, S\u00e1nchez GR, De La Villa Cuenca A (2015) A protocol to encrypt digital images using chaotic maps and memory cellular automata. Log J IGPL 23(3):485\u2013494","journal-title":"Log J IGPL"},{"key":"12071_CR15","doi-asserted-by":"publisher","first-page":"13821","DOI":"10.1007\/s11042-020-10429-z","volume":"80","author":"J Deng","year":"2021","unstructured":"Deng J, Zhou M, Wang C, Wang S, Xu C (2021) Image segmentation encryption algorithm with chaotic sequence generation participated by cipher and multi-feedback loops. Multimed Tools Appl 80:13821\u201313840. https:\/\/doi.org\/10.1007\/s11042-020-10429-z","journal-title":"Multimed Tools Appl"},{"key":"12071_CR16","doi-asserted-by":"publisher","unstructured":"Dhall S, Pal SK, Sharma K (2017) Cryptanalysis of image encryption based on a new 1D chaotic system. Signal Process. https:\/\/doi.org\/10.1016\/j.sigpro.2017.12.021","DOI":"10.1016\/j.sigpro.2017.12.021"},{"key":"12071_CR17","doi-asserted-by":"publisher","first-page":"24437","DOI":"10.1007\/s11042-021-10850-y","volume":"80","author":"Y Dou","year":"2021","unstructured":"Dou Y, Li M (2021) An image encryption algorithm based on a novel 1D chaotic map and compressive sensing. Multimed Tools Appl 80:24437\u201324454","journal-title":"Multimed Tools Appl"},{"key":"12071_CR18","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.image.2015.10.004","volume":"41","author":"S El Assad","year":"2016","unstructured":"El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144\u2013157","journal-title":"Signal Process Image Commun"},{"key":"12071_CR19","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois M, Grosges T, Barchiesi D et al (2012, 1910) Image encryption algorithm based on a chaotic iterative process. Appl Math 3(12)","DOI":"10.4236\/am.2012.312262"},{"issue":"8","key":"12071_CR20","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1016\/j.compbiomed.2013.05.005","volume":"43","author":"C Fu","year":"2013","unstructured":"Fu C, Meng W-h, Zhan Y-f et al (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000\u20131010","journal-title":"Comput Biol Med"},{"key":"12071_CR21","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","volume":"115","author":"L Gong","year":"2019","unstructured":"Gong L, Qiu K, Deng C, Zhou N (2019) An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt Laser Technol 115:257\u2013267","journal-title":"Opt Laser Technol"},{"key":"12071_CR22","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1515\/acss-2016-0014","volume":"20","author":"D Gribermans","year":"2016","unstructured":"Gribermans D, Jersovs A, Rusakovs P (2016) Development of requirements specification for steganographic systems. Appl Comput Syst 20:40\u201348. https:\/\/doi.org\/10.1515\/acss-2016-0014","journal-title":"Appl Comput Syst"},{"key":"12071_CR23","doi-asserted-by":"publisher","first-page":"6398","DOI":"10.1038\/s41598-021-85377-1","volume":"11","author":"Y He","year":"2021","unstructured":"He Y, Zhang Y-Q, He X, Wang X-Y (2021) A new image encryption algorithm based on the OF-LSTMS and chaotic sequences. Sci Rep 11:6398. https:\/\/doi.org\/10.1038\/s41598-021-85377-1","journal-title":"Sci Rep"},{"key":"12071_CR24","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.sigpro.2016.12.008","volume":"134","author":"T Hu","year":"2017","unstructured":"Hu T, Liu Y, Gong L-H, Guo S-F, Yuan H-M (2017) Chaotic image cryptosystem using DNA deletion and DNA insertion, 2017. Signal Process 134:234\u2013243","journal-title":"Signal Process"},{"key":"12071_CR25","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"X Huang","year":"2018","unstructured":"Huang X, Ye G (2018) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72:57\u201370","journal-title":"Multimed Tools Appl"},{"key":"12071_CR26","doi-asserted-by":"publisher","first-page":"105821","DOI":"10.1016\/j.optlaseng.2019.105821","volume":"124","author":"Z-J Huang","year":"2019","unstructured":"Huang Z-J, Cheng S, Gong L-H, Zhou N-R (2019) Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform. Opt Lasers Eng 124:105821","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"12071_CR27","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1007\/s13369-013-0713-z","volume":"39","author":"H Khanzadi","year":"2014","unstructured":"Khanzadi H, Eshghi M, Borujeni SE (2014) Image encryption using random bit sequence based on chaotic maps. Arab J Sci Eng 39(2):1039\u20131047","journal-title":"Arab J Sci Eng"},{"key":"12071_CR28","doi-asserted-by":"publisher","unstructured":"Lan R, He J, Wang S, Tianlong G, Luo X (2018) Integrated chaotic systems for image encrypion. Signal Process. https:\/\/doi.org\/10.1016\/j.sigpro.2018.01.026","DOI":"10.1016\/j.sigpro.2018.01.026"},{"key":"12071_CR29","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixellevel permutation and bit-level permutation. Opt Lasers Eng 90:238\u2013246","journal-title":"Opt Lasers Eng"},{"key":"12071_CR30","doi-asserted-by":"publisher","first-page":"107618","DOI":"10.1016\/j.asoc.2021.107618","volume":"110","author":"Q Li","year":"2021","unstructured":"Li Q, Wang X, Ma B, Wang X, Wang C, Xia Z, Shi Y (2021) Image steganography based on style transfer and quaternion exponent moments. Appl Soft Comput 110:107618. https:\/\/doi.org\/10.1016\/j.asoc.2021.107618","journal-title":"Appl Soft Comput"},{"issue":"9","key":"12071_CR31","doi-asserted-by":"publisher","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"X Liao","year":"2010","unstructured":"Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90(9):2714\u20132722","journal-title":"Signal Process"},{"issue":"3","key":"12071_CR32","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1016\/j.jss.2012.11.026","volume":"86","author":"H Liu","year":"2013","unstructured":"Liu H, Wang X (2013) Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J Syst Softw 86(3):826\u2013834","journal-title":"J Syst Softw"},{"issue":"4","key":"12071_CR33","doi-asserted-by":"publisher","first-page":"2241","DOI":"10.1007\/s11071-016-2642-3","volume":"84","author":"Y Liu","year":"2016","unstructured":"Liu Y, Zhang LY, Wang J, Zhang Y, Wong K-w (2016) Chosen-plaintext attack of an image encryption scheme based on modified permutation\u2013diffusion structure. Nonlinear Dynamics 84(4):2241\u20132250","journal-title":"Nonlinear Dynamics"},{"key":"12071_CR34","doi-asserted-by":"publisher","first-page":"24701","DOI":"10.1007\/s11042-018-5669-2","volume":"77","author":"G Maddodi","year":"2018","unstructured":"Maddodi G, Awad A, Awad D, Awad M, Lee B (2018) A new image encryption algorithm based on heterogeneous chaotic neural network generator and DNA encoding. Multimed Tools Appl 77:24701\u201324725. https:\/\/doi.org\/10.1007\/s11042-018-5669-2","journal-title":"Multimed Tools Appl"},{"key":"12071_CR35","doi-asserted-by":"publisher","first-page":"21955","DOI":"10.1007\/s11042-021-10757-8","volume":"80","author":"A Mansouri","year":"2021","unstructured":"Mansouri A, Wang X (2021) A novel block-based image encryption scheme using a new sine powered chaotic map generator. Multimed Tools Appl 80:21955\u201321978. https:\/\/doi.org\/10.1007\/s11042-021-10757-8","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"12071_CR36","first-page":"85","volume":"17","author":"FK Mohamed","year":"2014","unstructured":"Mohamed FK (2014) A parallel block-based encryption schema for digital images using reversible cellular automata. Eng Sci Technol Int J 17(2):85\u201394","journal-title":"Eng Sci Technol Int J"},{"key":"12071_CR37","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1016\/j.matcom.2021.06.008","volume":"190","author":"N Munir","year":"2021","unstructured":"Munir N, Khan M, Jamal SS, Hazzazi MM, Hussain I (2021) Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map. Mathematics and Computers in Simulation 190:826\u2013836. https:\/\/doi.org\/10.1016\/j.matcom.2021.06.008","journal-title":"Mathematics and Computers in Simulation"},{"issue":"3","key":"12071_CR38","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/s11042-013-1699-y","volume":"74","author":"B Norouzi","year":"2015","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S et al (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74(3):781\u2013811","journal-title":"Multimed Tools Appl"},{"key":"12071_CR39","doi-asserted-by":"publisher","first-page":"25367","DOI":"10.1007\/s11042-021-10660-2","volume":"80","author":"C Pak","year":"2021","unstructured":"Pak C, Kim J, Pang R, Song O, Kim H, Yun I, Kim J (2021) A new color image encryption using 2D improved logistic coupling map. Multimed Tools Appl 80:25367\u201325387","journal-title":"Multimed Tools Appl"},{"key":"12071_CR40","doi-asserted-by":"publisher","first-page":"2753","DOI":"10.1007\/s11042-020-09648-1","volume":"80","author":"A Pourjabbar Kari","year":"2020","unstructured":"Pourjabbar Kari A, Habibizad Navin A, Bidgoli AM, Mirnia M (2020) A new image encryption scheme based on hybrid chaotic maps. Multimed Tools Appl 80:2753\u20132772. https:\/\/doi.org\/10.1007\/s11042-020-09648-1","journal-title":"Multimed Tools Appl"},{"key":"12071_CR41","unstructured":"Ran J, Liu YM, Wang CF, Wang ZW (2008) Complexity analysis of two-dimensional discrete Lorenz chaotic system. J Zunyi Normal Univ, vol. 20, no. 4, pp. 81_82, and 99"},{"key":"12071_CR42","doi-asserted-by":"publisher","first-page":"22275","DOI":"10.1007\/s11042-021-10719-0","volume":"80","author":"V Rathore","year":"2021","unstructured":"Rathore V, Pal AK (2021) An image encryption scheme in bit plane content using Henon map based generated edge map. Multimed Tools Appl 80:22275\u201322300. https:\/\/doi.org\/10.1007\/s11042-021-10719-0","journal-title":"Multimed Tools Appl"},{"key":"12071_CR43","doi-asserted-by":"publisher","first-page":"15173","DOI":"10.1007\/s11042-020-10263-3","volume":"80","author":"Z Rim","year":"2021","unstructured":"Rim Z, Ridha E, Mourad Z (2021) An improved partial image encryption scheme based on lifting wavelet transform, wide range Beta chaotic map and Latin square. Multimed Tools Appl 80:15173\u201315191. https:\/\/doi.org\/10.1007\/s11042-020-10263-3","journal-title":"Multimed Tools Appl"},{"key":"12071_CR44","doi-asserted-by":"publisher","first-page":"24069","DOI":"10.1007\/s11042-021-10839-7","volume":"80","author":"M Roy","year":"2021","unstructured":"Roy M, Chakraborty S, Mali K (2021) A chaotic framework and its application in image encryption. Multimed Tools Appl 80:24069\u201324110. https:\/\/doi.org\/10.1007\/s11042-021-10839-7","journal-title":"Multimed Tools Appl"},{"key":"12071_CR45","doi-asserted-by":"publisher","unstructured":"Shahriyar T, Fathi MH, Sekhavat YA (2017, 2017) An image encryption scheme based on elliptic curve Pseudo random and advanced encryption system. Signal Process. https:\/\/doi.org\/10.1016\/j.sigpro.2017.06.010","DOI":"10.1016\/j.sigpro.2017.06.010"},{"key":"12071_CR46","doi-asserted-by":"publisher","first-page":"17983","DOI":"10.1007\/s11042-021-10584-x","volume":"80","author":"A Shakiba","year":"2021","unstructured":"Shakiba A (2021) A novel 2D cascade modulation couple hyperchaotic mapping for randomized image encryption. Multimed Tools Appl 80:17983\u201318006. https:\/\/doi.org\/10.1007\/s11042-021-10584-x","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"12071_CR47","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/584091.584093","volume":"5","author":"CE Shannon","year":"2001","unstructured":"Shannon CE (2001) A mathematical theory of communication. ACM SIGMOBILE Mob Comput Commun Rev 5(1):3\u201355","journal-title":"ACM SIGMOBILE Mob Comput Commun Rev"},{"key":"12071_CR48","doi-asserted-by":"publisher","first-page":"105816","DOI":"10.1016\/j.optlaseng.2019.105816","volume":"124","author":"N-RZ Sha-ShaYu","year":"2020","unstructured":"Sha-ShaYu N-RZ, Gong L-H, Nieb Z (2020) Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system. Opt Lasers Eng 124:105816","journal-title":"Opt Lasers Eng"},{"issue":"18","key":"12071_CR49","doi-asserted-by":"publisher","first-page":"3329","DOI":"10.1016\/j.ijleo.2012.11.002","volume":"124","author":"C-Y Song","year":"2013","unstructured":"Song C-Y, Qiao Y-L, Zhang X-Z (2013) An image encryption scheme based on new spatiotemporal chaos. Optik 124(18):3329\u20133334","journal-title":"Optik"},{"issue":"1","key":"12071_CR50","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s11071-016-2912-0","volume":"86","author":"A Souyah","year":"2016","unstructured":"Souyah A, Faraoun, Mohamed K (2016) An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn 86(1):639\u2013653","journal-title":"Nonlinear Dyn"},{"key":"12071_CR51","doi-asserted-by":"publisher","unstructured":"Li T , Du B , Liang X (2020) Image encryption algorithm based on logistic and two-dimensional Lorenz, IEEE Access, Special Section on emerging approaches to cyber security, Digital Object Identifier https:\/\/doi.org\/10.1109\/ACCESS.2020.2966264","DOI":"10.1109\/ACCESS.2020.2966264"},{"issue":"4","key":"12071_CR52","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1007\/s11071-014-1259-7","volume":"76","author":"X Wang","year":"2014","unstructured":"Wang X, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76(4):1943\u20131950","journal-title":"Nonlinear Dyn"},{"issue":"1\u20132","key":"12071_CR53","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s11071-013-1070-x","volume":"75","author":"X Wang","year":"2014","unstructured":"Wang X, Xu D (2014) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75(1\u20132):345\u2013353","journal-title":"Nonlinear Dyn"},{"key":"12071_CR54","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","volume":"342","author":"X Wang","year":"2015","unstructured":"Wang X, Zhang H-l (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51\u201360","journal-title":"Opt Commun"},{"key":"12071_CR55","doi-asserted-by":"publisher","unstructured":"Wang H, Xiao D, Chen X, Huang H (2017) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process. https:\/\/doi.org\/10.1016\/j.sigpro.2017.11.005","DOI":"10.1016\/j.sigpro.2017.11.005"},{"key":"12071_CR56","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2019","unstructured":"Wang XY, Zhang YQ, Bao XM (2019) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"12071_CR57","doi-asserted-by":"publisher","first-page":"013014-1","DOI":"10.1117\/1.JEI.21.1.013014","volume":"21","author":"Y Wu","year":"2012","unstructured":"Wu Y, Yang G, Jin H et al (2012) Image encryption using the two-dimensional logistic-Sine chaotic map. J Electron Imaging 21(1):013014-1\u2013013014-15","journal-title":"J Electron Imaging"},{"key":"12071_CR58","doi-asserted-by":"publisher","unstructured":"Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process. https:\/\/doi.org\/10.1016\/j.sigpro.2017.04.006","DOI":"10.1016\/j.sigpro.2017.04.006"},{"key":"12071_CR59","doi-asserted-by":"publisher","unstructured":"Wu J, Liao X, Yang B (2017) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process. https:\/\/doi.org\/10.1016\/j.sigpro.2017.06.014","DOI":"10.1016\/j.sigpro.2017.06.014"},{"key":"12071_CR60","doi-asserted-by":"publisher","unstructured":"Wu X, Zhu B, Hu Y, Ran Y (2017) A novel colour image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2017.2692043","DOI":"10.1109\/ACCESS.2017.2692043"},{"key":"12071_CR61","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"X Wu","year":"2019","unstructured":"Wu X, Kan H, Kurths J (2019) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24\u201339","journal-title":"Appl Soft Comput"},{"key":"12071_CR62","doi-asserted-by":"publisher","first-page":"22135","DOI":"10.1007\/s11042-021-10807-1","volume":"80","author":"H Xiang","year":"2021","unstructured":"Xiang H, Liu L (2021) A novel image encryption algorithm based on improved key selection and digital chaotic map. Multimed Tools Appl 80:22135\u201322162. https:\/\/doi.org\/10.1007\/s11042-021-10807-1","journal-title":"Multimed Tools Appl"},{"key":"12071_CR63","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu L, Gou X, Li Z et al (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41\u201352","journal-title":"Opt Lasers Eng"},{"key":"12071_CR64","doi-asserted-by":"crossref","unstructured":"Yavuz E, Yazici R, Kasapba\u015fi MC et al (2015) A chaos-based image encryption algorithm with simple logical functions. Comput Electric Eng","DOI":"10.1016\/j.compeleceng.2015.11.008"},{"key":"12071_CR65","doi-asserted-by":"crossref","unstructured":"Yu F , Li L , Tang Q , Cai S , Song Y, Xu Q (2019) A survey on true random number generators based on chaos, discrete dynamics in nature and society 2019, Article ID 2545123, 10 pages","DOI":"10.1155\/2019\/2545123"},{"issue":"12","key":"12071_CR66","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775\u20132780","journal-title":"Opt Commun"},{"issue":"1\u20132","key":"12071_CR67","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s11071-013-1068-4","volume":"75","author":"X Zhang","year":"2014","unstructured":"Zhang X, Zhao Z (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn 75(1\u20132):319\u2013330","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"12071_CR68","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.cnsns.2012.08.010","volume":"18","author":"W Zhang","year":"2013","unstructured":"Zhang W, Wong K-w, Yu H et al (2013) A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simul 18(3):584\u2013600","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"12071_CR69","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s11071-014-1435-9","volume":"78","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Xiao D, Wen W, Nan H (2014) Cryptanalysis of image scrambling based on chaotic sequences and vigen\u2019ere cipher. Nonlinear Dynamics 78(1):235\u2013240","journal-title":"Nonlinear Dynamics"},{"key":"12071_CR70","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.ins.2017.11.021","volume":"430","author":"LY Zhang","year":"2018","unstructured":"Zhang LY, Liu Y, Wang C, Zhou J, Zhang Y, Chen G (2018) Improved known-plaintext attack to permutation-only multimedia ciphers. Inf Sci 430:228\u2013239","journal-title":"Inf Sci"},{"key":"12071_CR71","first-page":"2593","volume":"124","author":"Q Zhang","year":"2020","unstructured":"Zhang Q, Guo L, Wei X (2020) A novel image fusion encryption algorithm based on DNA sequence operation and hyper chaotic system. Optik-Int J Light Electron Opt 124:2593\u20133002","journal-title":"Optik-Int J Light Electron Opt"},{"key":"12071_CR72","doi-asserted-by":"publisher","first-page":"105821","DOI":"10.1016\/j.optlaseng.2019.105821","volume":"124","author":"H Zhi-Jing","year":"2020","unstructured":"Zhi-Jing H, Cheng S, Li-Hua G, Nan-Run Z (2020) Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform. Opt Lasers Eng 124:105821","journal-title":"Opt Lasers Eng"},{"key":"12071_CR73","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"issue":"4","key":"12071_CR74","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1007\/s11128-015-0926-z","volume":"14","author":"NR Zhou","year":"2015","unstructured":"Zhou NR, Hua TX, Gong LH, Pei DJ, Liao QH (2015) Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf Process 14(4):1193\u20131213","journal-title":"Quantum Inf Process"},{"key":"12071_CR75","doi-asserted-by":"crossref","unstructured":"Zhou N, Yan X, Liang H, Tao X, Li G (2018) Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system, Quantum Inf Process 17(12):article id. 338, 36 pp","DOI":"10.1007\/s11128-018-2104-6"},{"issue":"6","key":"12071_CR76","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"Z-l Zhu","year":"2011","unstructured":"Zhu Z-l, Zhang W, Wong K-w et al (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171\u20131186","journal-title":"Inf Sci"}],"updated-by":[{"DOI":"10.1007\/s11042-022-13625-1","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T00:00:00Z","timestamp":1659916800000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12071-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12071-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12071-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T05:16:47Z","timestamp":1659935807000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12071-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,11]]},"references-count":76,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["12071"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12071-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,11]]},"assertion":[{"value":"15 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2022","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-022-13625-1","URL":"https:\/\/doi.org\/10.1007\/s11042-022-13625-1","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}