{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T08:26:32Z","timestamp":1744964792922,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T00:00:00Z","timestamp":1647475200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T00:00:00Z","timestamp":1647475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFB1702902"],"award-info":[{"award-number":["2018YFB1702902"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862040"],"award-info":[{"award-number":["61862040"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61763028"],"award-info":[{"award-number":["61763028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11042-022-12239-x","type":"journal-article","created":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T20:02:51Z","timestamp":1647547371000},"page":"21975-21994","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A novel hyperchaotic image encryption algorithm with simultaneous shuffling and diffusion"],"prefix":"10.1007","volume":"81","author":[{"given":"Xiangquan","family":"Gui","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7251-8659","authenticated-orcid":false,"given":"Jun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shouliang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,17]]},"reference":[{"key":"12239_CR1","doi-asserted-by":"publisher","first-page":"174102","DOI":"10.1103\/PhysRevLett.88.174102","volume":"88","author":"C Bandt","year":"2002","unstructured":"Bandt C, Pompe B (2002) Permutation entropy: A natural complexity measure for time series. Phys Rev Lett 88:174102. https:\/\/doi.org\/10.1103\/PhysRevLett.88.174102","journal-title":"Phys Rev Lett"},{"key":"12239_CR2","doi-asserted-by":"publisher","unstructured":"Cai S, Huang L, Chen X, Xiong X (2018) A symmetric plaintext-related color image encryption system based on bit permutation. Entropy 20(4). https:\/\/doi.org\/10.3390\/e20040282","DOI":"10.3390\/e20040282"},{"key":"12239_CR3","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"X Chai","year":"2018","unstructured":"Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Sig Process 148:124\u2013144. https:\/\/doi.org\/10.1016\/j.sigpro.2018.02.007","journal-title":"Sig Process"},{"key":"12239_CR4","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic dna encryption and chaos. Sig Process 155:44\u201362. https:\/\/doi.org\/10.1016\/j.sigpro.2018.09.029","journal-title":"Sig Process"},{"issue":"4","key":"12239_CR5","doi-asserted-by":"publisher","first-page":"2399","DOI":"10.1007\/s11071-018-4332-9","volume":"93","author":"J Chen","year":"2018","unstructured":"Chen J, Han F, Qian W, Yao YD, Zhu ZL (2018) Cryptanalysis and improvement in an image encryption scheme using combination of the 1d chaotic map. Nonlinear Dyn 93(4):2399\u20132413. https:\/\/doi.org\/10.1007\/s11071-018-4332-9","journal-title":"Nonlinear Dyn"},{"key":"12239_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a dna sequence. Opt Lasers Eng 56:83\u201393. https:\/\/doi.org\/10.1016\/j.optlaseng.2013.12.003","journal-title":"Opt Lasers Eng"},{"issue":"37","key":"12239_CR7","doi-asserted-by":"publisher","first-page":"28225","DOI":"10.1007\/s11042-020-09324-4","volume":"79","author":"S Farwa","year":"2020","unstructured":"Farwa S, Bibi N, Muhammad N (2020) An efficient image encryption scheme using fresnelet transform and elliptic curve based scrambling. Multimed Tools Appl 79(37):28225\u201328238. https:\/\/doi.org\/10.1007\/s11042-020-09324-4","journal-title":"Multimed Tools Appl"},{"key":"12239_CR8","first-page":"403","volume":"32","author":"G Fei","year":"1992","unstructured":"Fei G, Shumao S (1992) Eigenvalues of non-linear equations and the feigenbaum formula. Comput Math Math Phys 32:403\u2013405","journal-title":"Comput Math Math Phys"},{"issue":"06","key":"12239_CR9","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation chaos 8 (06):1259\u20131284. https:\/\/doi.org\/10.1142\/S0218127498000978","journal-title":"Int J Bifurcation chaos"},{"key":"12239_CR10","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM, Chen CP (2015) 2d sine logistic modulation map for image encryption. Inform Sci 297:80\u201394. https:\/\/doi.org\/10.1016\/j.ins.2014.11.018","journal-title":"Inform Sci"},{"key":"12239_CR11","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2d logistic-adjusted-sine map. Inform Sci 339:237\u2013253. https:\/\/doi.org\/10.1016\/j.ins.2016.01.017","journal-title":"Inform Sci"},{"issue":"12","key":"12239_CR12","doi-asserted-by":"publisher","first-page":"4094","DOI":"10.1016\/j.cnsns.2014.04.012","volume":"19","author":"X Huang","year":"2014","unstructured":"Huang X, Ye G (2014) An efficient self-adaptive model for chaotic image encryption algorithm. Commun Nonlinear Sci Numer Simul 19 (12):4094\u20134104. https:\/\/doi.org\/10.1016\/j.cnsns.2014.04.012","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"9","key":"12239_CR13","doi-asserted-by":"publisher","first-page":"2576","DOI":"10.1016\/j.mcm.2013.01.009","volume":"57","author":"I Hussain","year":"2013","unstructured":"Hussain I, Shah T, Gondal MA (2013) Application of s-box and chaotic map for image encryption. Math Comput Model 57(9):2576\u20132579. https:\/\/doi.org\/10.1016\/j.mcm.2013.01.009","journal-title":"Math Comput Model"},{"issue":"2","key":"12239_CR14","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s11071-013-1214-z","volume":"76","author":"I Hussain","year":"2014","unstructured":"Hussain I, Gondal MA (2014) An extended image encryption using chaotic coupled map and s-box transformation. Nonlinear Dyn 76(2):1355\u20131363. https:\/\/doi.org\/10.1007\/s11071-013-1214-z","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"12239_CR15","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1007\/s11071-018-4426-4","volume":"94","author":"Z Li","year":"2018","unstructured":"Li Z, Peng C, Li L, Zhu X (2018) A novel plaintext-related image encryption scheme using hyper-chaotic system. Nonlinear Dyn 94(2):1319\u20131333. https:\/\/doi.org\/10.1007\/s11071-018-4426-4","journal-title":"Nonlinear Dyn"},{"key":"12239_CR16","doi-asserted-by":"publisher","unstructured":"Li S, Yin B, Ding W, Zhang T, Ma Y (2018) A nonlinearly modulated logistic map with delay for image encryption. Electronics 7(11). https:\/\/doi.org\/10.3390\/electronics7110326","DOI":"10.3390\/electronics7110326"},{"key":"12239_CR17","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.03.019","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"12239_CR18","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s11071-018-4056-x","volume":"92","author":"F \u00d6zkaynak","year":"2018","unstructured":"\u00d6zkaynak F (2018) Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn 92(2):305\u2013313. https:\/\/doi.org\/10.1007\/s11071-018-4056-x","journal-title":"Nonlinear Dyn"},{"key":"12239_CR19","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1d chaotic map. Sig Process 138:129\u2013137. https:\/\/doi.org\/10.1016\/j.sigpro.2017.03.011","journal-title":"Sig Process"},{"issue":"2","key":"12239_CR20","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/0375-9601(79)90150-6","volume":"71","author":"O Rossler","year":"1979","unstructured":"Rossler O (1979) An equation for hyperchaos. Phys Lett A 71 (2):155\u2013157. https:\/\/doi.org\/10.1016\/0375-9601(79)90150-6","journal-title":"Phys Lett A"},{"issue":"1","key":"12239_CR21","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.physleta.2013.10.035","volume":"378","author":"I Shevchenko","year":"2014","unstructured":"Shevchenko I (2014) Lyapunov exponents in resonance multiplets. Phys Lett A 378(1):34\u201342. https:\/\/doi.org\/10.1016\/j.physleta.2013.10.035","journal-title":"Phys Lett A"},{"issue":"22","key":"12239_CR22","doi-asserted-by":"publisher","first-page":"5411","DOI":"10.1016\/j.ijleo.2013.03.113","volume":"124","author":"G Tu","year":"2013","unstructured":"Tu G, Liao X, Xiang T (2013) Cryptanalysis of a color image encryption algorithm based on chaos. Optik 124(22):5411\u20135415. https:\/\/doi.org\/10.1016\/j.ijleo.2013.03.113","journal-title":"Optik"},{"key":"12239_CR23","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.ijleo.2017.09.099","volume":"153","author":"A Ur Rehman","year":"2018","unstructured":"Ur Rehman A, Liao X, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using dna and chaos. Optik - Int J Light Electron Opt 153:117\u2013134. https:\/\/doi.org\/10.1016\/j.ijleo.2017.09.099","journal-title":"Optik - Int J Light Electron Opt"},{"issue":"2","key":"12239_CR24","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S et al (2011) Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Sel Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"J Sel Areas Telecommun (JSAT)"},{"issue":"1","key":"12239_CR25","doi-asserted-by":"publisher","first-page":"013014","DOI":"10.1117\/1.JEI.21.1.013014","volume":"21","author":"Y Wu","year":"2012","unstructured":"Wu Y, Noonan JP, Yang G, Jin H (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1):013014. https:\/\/doi.org\/10.1117\/1.JEI.21.1.013014","journal-title":"J Electron Imaging"},{"key":"12239_CR26","doi-asserted-by":"publisher","first-page":"6429","DOI":"10.1109\/ACCESS.2017.2692043","volume":"5","author":"X Wu","year":"2017","unstructured":"Wu X, Zhu B, Hu Y, Ran Y (2017) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5:6429\u20136436. https:\/\/doi.org\/10.1109\/ACCESS.2017.2692043","journal-title":"IEEE Access"},{"key":"12239_CR27","doi-asserted-by":"publisher","first-page":"3089","DOI":"10.1016\/j.cnsns.2008.12.005","volume":"14","author":"Y Wang","year":"2009","unstructured":"Wang Y, Wong KW, Liao X, Xiang T (2009) A block cipher with dynamic s-boxes based on tent map. Commun Nonlinear Sci Numer Simul - Commun Nonlinear Sci Numer SI 14:3089\u20133099. https:\/\/doi.org\/10.1016\/j.cnsns.2008.12.005","journal-title":"Commun Nonlinear Sci Numer Simul - Commun Nonlinear Sci Numer SI"},{"issue":"4","key":"12239_CR28","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Sig Process 92(4):1101\u20131108. https:\/\/doi.org\/10.1016\/j.sigpro.2011.10.023","journal-title":"Sig Process"},{"key":"12239_CR29","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.optlaseng.2014.12.025","volume":"68","author":"XY Wang","year":"2015","unstructured":"Wang XY, Gu SX, Zhang YQ (2015) Novel image encryption algorithm based on cycle shift and chaotic system. Opt Lasers Eng 68:126\u2013134. https:\/\/doi.org\/10.1016\/j.optlaseng.2014.12.025","journal-title":"Opt Lasers Eng"},{"key":"12239_CR30","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2019.04.005","volume":"122","author":"X Wang","year":"2019","unstructured":"Wang X, Zhao H, Feng L, Ye X, Zhang H (2019) High-sensitivity image encryption algorithm with random diffusion based on dynamic-coupled map lattices. Opt Lasers Eng 122:225\u2013238. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.04.005","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"12239_CR31","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/s11042-020-09688-7","volume":"80","author":"X Wang","year":"2021","unstructured":"Wang X, Xue W, An J (2021) Image encryption algorithm based on ldcml and dna coding sequence. Multimed Tools Appl 80(1):591\u2013614. https:\/\/doi.org\/10.1007\/s11042-020-09688-7","journal-title":"Multimed Tools Appl"},{"key":"12239_CR32","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325. https:\/\/doi.org\/10.1016\/j.optlaseng.2015.09.007","journal-title":"Opt Lasers Eng"},{"key":"12239_CR33","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41\u201352. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.10.012","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"12239_CR34","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1177\/1077546314534717","volume":"22","author":"G Ye","year":"2016","unstructured":"Ye G, Huang X (2016) A feedback chaotic image encryption scheme based on both bit-level and pixel-level. J Vib Control 22(5):1171\u20131180","journal-title":"J Vib Control"},{"key":"12239_CR35","doi-asserted-by":"publisher","first-page":"105905","DOI":"10.1016\/j.optlaseng.2019.105905","volume":"127","author":"X Ye","year":"2020","unstructured":"Ye X, Wang X, Gao S, Mou J, Wang Z (2020) A new random diffusion algorithm based on the multi-scroll chua\u2019s chaotic circuit system. Opt Lasers Eng 127:105905. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105905","journal-title":"Opt Lasers Eng"},{"key":"12239_CR36","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic s-box. Inform Sci 450:361\u2013377. https:\/\/doi.org\/10.1016\/j.ins.2018.03.055","journal-title":"Inform Sci"},{"issue":"6","key":"12239_CR37","doi-asserted-by":"publisher","first-page":"6647","DOI":"10.1007\/s11042-017-4577-1","volume":"77","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77(6):6647\u20136669. https:\/\/doi.org\/10.1007\/s11042-017-4577-1","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12239-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12239-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12239-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T06:40:46Z","timestamp":1653547246000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12239-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,17]]},"references-count":37,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["12239"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12239-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,3,17]]},"assertion":[{"value":"4 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}