{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T02:12:01Z","timestamp":1768097521175,"version":"3.49.0"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T00:00:00Z","timestamp":1647388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T00:00:00Z","timestamp":1647388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2019MF054"],"award-info":[{"award-number":["ZR2019MF054"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61902091"],"award-info":[{"award-number":["No.61902091"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Research Foundation of Harbin Institute of Technology","award":["HIT.NSRIF.2020099"],"award-info":[{"award-number":["HIT.NSRIF.2020099"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11042-022-12472-4","type":"journal-article","created":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T12:03:13Z","timestamp":1647432193000},"page":"21779-21810","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation"],"prefix":"10.1007","volume":"81","author":[{"given":"Xilin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiaojun","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Zhu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,16]]},"reference":[{"key":"12472_CR1","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography[D]. The University of Buckingham"},{"issue":"8","key":"12472_CR2","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems[J]. Int J Bifurc Chaos 16(8):2129\u20132151","journal-title":"Int J Bifurc Chaos"},{"issue":"3","key":"12472_CR3","first-page":"1727","volume":"79","author":"Z Azimi","year":"2019","unstructured":"Azimi Z, Apadpour S (2019) Color image encryption based on DNA encoding and pair coupled chaotic maps[J]. Multimedia Tools Appl 79(3):1727\u20131744","journal-title":"Multimedia Tools Appl"},{"issue":"6736","key":"12472_CR4","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/21092","volume":"39","author":"CT Celland","year":"1999","unstructured":"Celland CT, Risca V, Bancroft C (1999) Hiding messages in DNA microdots[J]. Nature 39(6736):533\u2013534","journal-title":"Nature"},{"key":"12472_CR5","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"XL Chai","year":"2017","unstructured":"Chai XL, Chen YR, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Opt Laser Eng 88:197\u2013213","journal-title":"Opt Laser Eng"},{"key":"12472_CR6","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"XL Chai","year":"2019","unstructured":"Chai XL, Fu XL, Gan ZH, Lu Y, Chen YR (2019) A color image cryptosystem based on dynamic DNA encryption and chaos[J]. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"issue":"1","key":"12472_CR7","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"XL Chai","year":"2019","unstructured":"Chai XL, Gan ZH, Yuan K, Chen YR, Liu XX (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems[J]. Neural Comput & Applic 31(1):219\u2013237","journal-title":"Neural Comput & Applic"},{"issue":"12","key":"12472_CR8","doi-asserted-by":"publisher","first-page":"8065","DOI":"10.1007\/s00521-019-04312-8","volume":"32","author":"XL Chai","year":"2020","unstructured":"Chai XL, Zheng XY, Gan ZH, Chen YR (2020) Exploiting plaintext-related mechanism for secure color image encryption[J]. Neural Comput Applic 32(12):8065\u20138088","journal-title":"Neural Comput Applic"},{"issue":"7","key":"12472_CR9","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.matcom.2014.11.006","volume":"112","author":"YM Chen","year":"2015","unstructured":"Chen YM, Yang QG (2015) A new Lorenz-type hyperchaotic system with a curve of equilibria[J]. Math Comput Simul 112(7):40\u201355","journal-title":"Math Comput Simul"},{"issue":"11","key":"12472_CR10","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"ZH Gan","year":"2019","unstructured":"Gan ZH, Chai XL, Han DJ, Chen YR (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation[J]. Neural Comput & Applic 31(11):7111\u20137130","journal-title":"Neural Comput & Applic"},{"issue":"9","key":"12472_CR11","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1049\/iet-ipr.2019.0051","volume":"13","author":"MM Guan","year":"2019","unstructured":"Guan MM, Yang XL, Hu WS (2019) Chaotic image encryption algorithm using frequency-domain DNA encoding[J]. IET Image Process 13(9):1535\u20131539","journal-title":"IET Image Process"},{"key":"12472_CR12","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"ZY Hua","year":"2018","unstructured":"Hua ZY, Fan J, Xu BX, Huang HJ (2018) 2D logistic-sine-coupling map for image encryption[J]. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"key":"12472_CR13","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"ZY Hua","year":"2016","unstructured":"Hua ZY, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map[J]. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"12472_CR14","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"ZY Hua","year":"2019","unstructured":"Hua ZY, Zhou YC, Huang HJ (2019) Cosine-transform-based chaotic system for image encryption[J]. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"key":"12472_CR15","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.optlaseng.2018.11.015","volume":"115","author":"LQ Huang","year":"2019","unstructured":"Huang LQ, Cai ST, Xiong XM, Xiao MQ (2019) On symmetric color image encryption system with permutation-diffusion simultaneous operation[J]. Optics Laser Eng 115:7\u201320","journal-title":"Optics Laser Eng"},{"key":"12472_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14495\/jsiaml.10.1","volume":"10","author":"A Iwasaki","year":"2018","unstructured":"Iwasaki A (2018) Analysis of NIST sp800-22 focusing on randomness of each sequence[J]. Jsiam Lett 10:1\u20134","journal-title":"Jsiam Lett"},{"key":"12472_CR17","doi-asserted-by":"publisher","first-page":"106139","DOI":"10.1016\/j.optlaseng.2020.106139","volume":"133","author":"AB Joshi","year":"2020","unstructured":"Joshi AB, Dhanesh K, Gaffar A, Mishra DC (2020) Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform[J]. Optics Laser Eng 133:106139","journal-title":"Optics Laser Eng"},{"key":"12472_CR18","doi-asserted-by":"publisher","first-page":"75834","DOI":"10.1109\/ACCESS.2018.2883690","volume":"6","author":"CQ Li","year":"2018","unstructured":"Li CQ, Lin DD, Feng BB, Lu JH, Hao F (2018) Cryptanalysis of chaotic image encryption algorithm based on information entropy[J]. IEEE Access 6:75834\u201375842","journal-title":"IEEE Access"},{"key":"12472_CR19","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ins.2020.12.002","volume":"553","author":"Q Li","year":"2021","unstructured":"Li Q, Wang XY, Wang XY, Ma B, Wang CP, Shi YQ (2021) An encrypted coverless information hiding method based on generative models[J]. Inf Sci 553:19\u201330","journal-title":"Inf Sci"},{"issue":"5","key":"12472_CR20","doi-asserted-by":"publisher","first-page":"2558","DOI":"10.1016\/j.ijleo.2015.11.221","volume":"127","author":"X Li","year":"2015","unstructured":"Li X, Wang LY, Yan YF, Liu P (2015) An improvement color image encryption algorithm based on DNA operations and real and chaotic systems[J]. Optik 127(5):2558\u20132565","journal-title":"Optik"},{"issue":"20","key":"12472_CR21","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li KD, Yin JJ (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform[J]. Multimedia Tools Appl 76(20):20739\u201320753","journal-title":"Multimedia Tools Appl"},{"key":"12472_CR22","first-page":"146","volume":"58","author":"X Liao","year":"2017","unstructured":"Liao X, Qin Z, Ding LP (2017) Data embedding in digital images using critical functions[J] signal processing-image. Communication 58:146\u2013156","journal-title":"Communication"},{"issue":"3","key":"12472_CR23","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu YB, Li B, Li ZP, Zheng Q (2020) A new payload partition strategy in color image steganography[J]. IEEE Trans Circ Syst Video Technol 30(3):685\u2013696","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"12472_CR24","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.sigpro.2015.01.016","volume":"113","author":"HJ Liu","year":"2015","unstructured":"Liu HJ, Kadir A (2015) Asymmetric color image encryption scheme using 2D discrete-time map[J]. Signal Process 113:104\u2013112","journal-title":"Signal Process"},{"issue":"5","key":"12472_CR25","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1049\/iet-ipr.2016.0040","volume":"11","author":"HJ Liu","year":"2017","unstructured":"Liu HJ, Kadir A, Sun XB (2017) Chaos-based fast colour image encryption scheme with true random number keys from environmental noise[J]. IET Image Process 11(5):324\u2013332","journal-title":"IET Image Process"},{"key":"12472_CR26","doi-asserted-by":"publisher","first-page":"1950016","DOI":"10.1142\/S0218127419500160","volume":"29","author":"X Liu","year":"2019","unstructured":"Liu X, Song YR, Jiang GP (2019) Hierarchical bit-level image encryption based on chaotic map and Feistel network[J]. Int J Bifurc Chaos 29:1950016","journal-title":"Int J Bifurc Chaos"},{"issue":"10","key":"12472_CR27","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"HJ Liu","year":"2010","unstructured":"Liu HJ, Wang XY (2010) Color image encryption based on one-time keys and robust chaotic maps[J]. Comput Math Appl 59(10):3320\u20133327","journal-title":"Comput Math Appl"},{"issue":"16\u201317","key":"12472_CR28","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"HJ Liu","year":"2011","unstructured":"Liu HJ, Wang XY (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system[J]. Opt Commun 284(16\u201317):3895\u20133903","journal-title":"Opt Commun"},{"issue":"5","key":"12472_CR29","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"HJ Liu","year":"2012","unstructured":"Liu HJ, Wang XY, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps[J]. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"issue":"3","key":"12472_CR30","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1007\/s11071-015-2067-4","volume":"81","author":"J Ma","year":"2015","unstructured":"Ma J, Chen ZQ, Wang ZL, Zhang Q (2015) A four-wing hyper-chaotic attractor generated from a 4-D memristive system with a line equilibrium[J]. Nonlinear Dyn 81(3):1275\u20131288","journal-title":"Nonlinear Dyn"},{"key":"12472_CR31","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata[J]. Optics Laser Eng 90:225\u2013237","journal-title":"Optics Laser Eng"},{"key":"12472_CR32","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.optlaseng.2018.11.017","volume":"115","author":"E Rasul","year":"2019","unstructured":"Rasul E, Frederico GG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using DNA sequence[J]. Opt Laser Eng 115:131\u2013140","journal-title":"Opt Laser Eng"},{"issue":"2","key":"12472_CR33","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s11071-018-4600-8","volume":"95","author":"SF Raza","year":"2019","unstructured":"Raza SF, Satpute V (2019) A novel bit permutation-based image encryption algorithm[J]. Nonlinear Dyn 95(2):859\u2013873","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"12472_CR34","doi-asserted-by":"publisher","first-page":"2105","DOI":"10.1007\/s11042-018-6346-1","volume":"78","author":"AU Rehman","year":"2019","unstructured":"Rehman AU, Liao XF (2019) A novel robust diffusion\/confusion encryption technique for color image based on chaos, DNA and SHA-2[J]. Multimedia Tools Appl 78(2):2105\u20132133","journal-title":"Multimedia Tools Appl"},{"key":"12472_CR35","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.ijleo.2018.01.064","volume":"159","author":"AU Rehman","year":"2018","unstructured":"Rehman AU, Liao XF, Ashraf R, Ullah S, Wang HW (2018) A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2[J]. Optik 159:348\u2013367","journal-title":"Optik"},{"issue":"15","key":"12472_CR36","doi-asserted-by":"publisher","first-page":"11859","DOI":"10.1007\/s00521-019-04668-x","volume":"32","author":"S Shelza","year":"2020","unstructured":"Shelza S, Ritu V (2020) A pareto-optimal evolutionary approach of image encryption using coupled map lattice and DNA[J]. Neural Comput & Applic 32(15):11859\u201311873","journal-title":"Neural Comput & Applic"},{"issue":"11","key":"12472_CR37","doi-asserted-by":"publisher","first-page":"2196","DOI":"10.1016\/j.ins.2010.01.030","volume":"180","author":"HJ Shiu","year":"2010","unstructured":"Shiu HJ, Ng KL, Fang JF, Lee RCT, Huang CH (2010) Data hiding methods based upon DNA sequences[J]. Inf Sci 180(11):2196\u20132208","journal-title":"Inf Sci"},{"issue":"4","key":"12472_CR38","doi-asserted-by":"publisher","first-page":"2333","DOI":"10.1007\/s11071-016-2648-x","volume":"84","author":"XJ Tong","year":"2016","unstructured":"Tong XJ, Zhang M, Wang Z, Ma J (2016) A joint color image encryption and compression scheme based on hyper-chaotic system[J]. Nonlinear Dyn 84(4):2333\u20132356","journal-title":"Nonlinear Dyn"},{"issue":"5","key":"12472_CR39","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1016\/j.sigpro.2012.11.008","volume":"93","author":"CK Volos","year":"2013","unstructured":"Volos CK, Kyprianidis IM, Stouboulos IN (2013) Image encryption process based on chaotic synchronization phenomena[J]. Signal Process 93(5):1328\u20131340","journal-title":"Signal Process"},{"key":"12472_CR40","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"XY Wang","year":"2019","unstructured":"Wang XY, Feng L, Zhao HY (2019) Fast image encryption algorithm based on parallel computing system[J]. Inf Sci 486:340\u2013358","journal-title":"Inf Sci"},{"key":"12472_CR41","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"XY Wang","year":"2020","unstructured":"Wang XY, Guo S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory[J]. Inf Sci 507:16\u201336","journal-title":"Inf Sci"},{"key":"12472_CR42","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","volume":"539","author":"XY Wang","year":"2020","unstructured":"Wang XY, Guo S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network[J]. Inf Sci 539:195\u2013214","journal-title":"Inf Sci"},{"key":"12472_CR43","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"XY Wang","year":"2015","unstructured":"Wang XY, Liu LT, Zhang YQ (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique[J]. Optics Laser Eng 66:10\u201318","journal-title":"Optics Laser Eng"},{"issue":"4","key":"12472_CR44","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"XY Wang","year":"2012","unstructured":"Wang XY, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos[J]. Signal Process 92(4):1101\u20131108","journal-title":"Signal Process"},{"key":"12472_CR45","doi-asserted-by":"publisher","first-page":"106355","DOI":"10.1016\/j.optlastec.2020.106355","volume":"132","author":"T Wang","year":"2020","unstructured":"Wang T, Wang MH (2020) Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding[J]. Opt Laser Technol 132:106355","journal-title":"Opt Laser Technol"},{"key":"12472_CR46","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.optlaseng.2019.06.015","volume":"122","author":"XY Wang","year":"2019","unstructured":"Wang XY, Wang Y, Unar S, Wang MX, Wang SB (2019) A privacy algorithm based on an improved chaotic system[J]. Opt Laser Eng 122:335\u2013346","journal-title":"Opt Laser Eng"},{"issue":"18","key":"12472_CR47","doi-asserted-by":"publisher","first-page":"26111","DOI":"10.1007\/s11042-019-07794-9","volume":"78","author":"XY Wang","year":"2019","unstructured":"Wang XY, Wang Y, Zhu XQ, Unar S (2019) Image encryption scheme based on chaos and DNA plane operations[J]. Multimedia Tools Appl 78(18):26111\u201326128","journal-title":"Multimedia Tools Appl"},{"key":"12472_CR48","doi-asserted-by":"publisher","first-page":"164884","DOI":"10.1016\/j.ijleo.2020.164884","volume":"217","author":"XY Wang","year":"2020","unstructured":"Wang XY, Yang JJ (2020) A novel image encryption scheme of dynamic S-boxes and random blocks based on spatiotemporal chaotic system[J]. Optik 217:164884","journal-title":"Optik"},{"issue":"3","key":"12472_CR49","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"XY Wang","year":"2010","unstructured":"Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model[J]. Nonlinear Dyn 62(3):615\u2013621","journal-title":"Nonlinear Dyn"},{"key":"12472_CR50","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations[J]. Opt Laser Eng 73:53\u201361","journal-title":"Opt Laser Eng"},{"issue":"3","key":"12472_CR51","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","volume":"16","author":"A Wolf","year":"1985","unstructured":"Wolf A, Swift JB, Swinney HL, Vastano JA (1985) Determining Lyapunov exponents from a time series[J]. Physica D 16(3):285\u2013317","journal-title":"Physica D"},{"key":"12472_CR52","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2017.04.006","volume":"141","author":"JH Wu","year":"2017","unstructured":"Wu JH, Liao XF, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ELGamal scheme[J]. Signal Process 141:109\u2013124","journal-title":"Signal Process"},{"key":"12472_CR53","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"JH Wu","year":"2018","unstructured":"Wu JH, Liao XF, Yang B (2018) Image encryption using 2D Henon-sine map and DNA approach[J]. Signal Process 153:11\u201312","journal-title":"Signal Process"},{"key":"12472_CR54","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"XJ Wu","year":"2018","unstructured":"Wu XJ, Wang KS, Wang XY (2018) Color image DNA encryption using NCA map-based CML and one-time keys[J]. Signal Process 148:272\u2013287","journal-title":"Signal Process"},{"key":"12472_CR55","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"YJ Xian","year":"2021","unstructured":"Xian YJ, Wang XY (2021) Fractal sorting matrix and its application on chaotic image encryption[J]. Inf Sci 547:1154\u20131169","journal-title":"Inf Sci"},{"issue":"S1","key":"12472_CR56","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.optlaseng.2016.06.006","volume":"89","author":"LL Yao","year":"2017","unstructured":"Yao LL, Yuan CJ, Qiang JJ, Feng ST, Nie SP (2017) An asymmetric color image encryption method by using deduced gyrator transform[J]. Optics Laser Eng 89(S1):72\u201379","journal-title":"Optics Laser Eng"},{"issue":"1","key":"12472_CR57","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1007\/s11071-018-4391-y","volume":"94","author":"GD Ye","year":"2018","unstructured":"Ye GD, Pan C, Huang XL, Mei QX (2018) An efficient pixel-level chaotic image encryption algorithm[J]. Nonlinear Dyn 94(1):745\u2013756","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"12472_CR58","doi-asserted-by":"publisher","first-page":"1850010","DOI":"10.1142\/S0218127418500104","volume":"28","author":"GD Ye","year":"2018","unstructured":"Ye GD, Pan C, Huang XL, Zhao ZY, He JQ (2018) A chaotic image encryption algorithm based on information entropy[J]. Int J Bifurc Chaos 28(1):1850010","journal-title":"Int J Bifurc Chaos"},{"key":"12472_CR59","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-box[J]. Inf Sci 450:361\u2013377","journal-title":"Inf Sci"},{"key":"12472_CR60","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.physa.2017.07.019","volume":"490","author":"YQ Zhang","year":"2018","unstructured":"Zhang YQ, He Y, Wang XY (2018) Spatiotemporal chaos in mixed linear-nonlinear two-dimensional coupled logistic map lattice[J]. Physica A 490:148\u2013160","journal-title":"Physica A"},{"key":"12472_CR61","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"WM Zhang","year":"2014","unstructured":"Zhang WM, Ma KD, Yu NH (2014) Reversibility improved data hiding in encrypted images[J]. Signal Process 94:118\u2013127","journal-title":"Signal Process"},{"key":"12472_CR62","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice[J]. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12472-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12472-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12472-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T07:10:36Z","timestamp":1653549036000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12472-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,16]]},"references-count":62,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["12472"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12472-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,16]]},"assertion":[{"value":"22 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}