{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:18:11Z","timestamp":1775323091703,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T00:00:00Z","timestamp":1645747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T00:00:00Z","timestamp":1645747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11042-022-12480-4","type":"journal-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T13:02:47Z","timestamp":1645794167000},"page":"14001-14022","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A dual layer security scheme for medical images using Hessenberg and singular value decompositions"],"prefix":"10.1007","volume":"81","author":[{"given":"Ahmed","family":"Elmoasry","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lal Said","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5454-3770","authenticated-orcid":false,"given":"Majid","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Iqtadar","family":"Hussain","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,2,25]]},"reference":[{"key":"12480_CR1","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In international conference on research in security standardisation","DOI":"10.1007\/978-3-319-14054-4_10"},{"key":"12480_CR2","doi-asserted-by":"publisher","first-page":"26583","DOI":"10.1109\/ACCESS.2021.3058112","volume":"9","author":"AS Alanazi","year":"2021","unstructured":"Alanazi AS (2021) A dual layer secure data encryption and hiding scheme for color images using the three-dimensional chaotic map and Lah transformation. IEEE Access 9:26583\u201326592","journal-title":"IEEE Access"},{"key":"12480_CR3","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1007\/s11042-020-09667-y","volume":"80","author":"N Alanazi","year":"2020","unstructured":"Alanazi N, Khan E, Gutub A (2020) Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimed Tools Appl 80:1403\u20131431","journal-title":"Multimed Tools Appl"},{"key":"12480_CR4","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.matcom.2020.05.016","volume":"177","author":"A Alghafis","year":"2020","unstructured":"Alghafis A, Firdousi F, Khan M, Batool SI, Amin M (2020) An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Math Comput Simul 177:441\u2013466","journal-title":"Math Comput Simul"},{"key":"12480_CR5","doi-asserted-by":"publisher","first-page":"32585","DOI":"10.1007\/s11042-019-07866-w","volume":"78","author":"KM Ali","year":"2019","unstructured":"Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl 78:32585\u201332604","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"12480_CR6","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for Chaos-based cryptosystems. Int J Bifurcation Chaos 16(8):2129\u20132151","journal-title":"Int J Bifurcation Chaos"},{"key":"12480_CR7","doi-asserted-by":"crossref","unstructured":"Arshad U, Khan M, Shaukat S, Amin M, Shah T (2020) An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation. Phys A Stat Mech Appl 546","DOI":"10.1016\/j.physa.2019.123458"},{"issue":"7","key":"12480_CR8","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1007\/s00521-014-1691-0","volume":"25","author":"SI Batool","year":"2014","unstructured":"Batool SI, Shah T, Khan M (2014) A color image watermarking scheme based on affine transformation and S4 permutation. Neural Comput Appl 25(7):2037\u20132045","journal-title":"Neural Comput Appl"},{"issue":"3","key":"12480_CR9","doi-asserted-by":"publisher","first-page":"2363","DOI":"10.1364\/OE.20.002015","volume":"20","author":"J-J Chen","year":"2012","unstructured":"Chen J-J, Zou H, Meng W-H, Zhan Y-F, Yu Y-W, Fu C (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363\u20132378","journal-title":"Opt Express"},{"key":"12480_CR10","doi-asserted-by":"publisher","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","volume":"99","author":"MAB Farah","year":"2020","unstructured":"Farah MAB, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn 99:3041\u20133064","journal-title":"Nonlinear Dyn"},{"key":"12480_CR11","doi-asserted-by":"publisher","first-page":"27919","DOI":"10.1007\/s11042-018-5974-9","volume":"77","author":"Z Gan","year":"2018","unstructured":"Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three dimensional brownian motion. Multimed Tools Appl 77:27919\u201327953","journal-title":"Multimed Tools Appl"},{"key":"12480_CR12","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s00521-018-3577-z","volume":"32","author":"YI He","year":"2020","unstructured":"He YI, Zhang YQ, Wang XY (2020) A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system. Neural Comput Applic 32:247\u2013260","journal-title":"Neural Comput Applic"},{"key":"12480_CR13","doi-asserted-by":"crossref","unstructured":"Jamal SS, Shah T, Attaullah A (2017) A group action method for construction of strong substitution box. 3D research","DOI":"10.1007\/s13319-017-0125-z"},{"issue":"4","key":"12480_CR14","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1007\/s11276-017-1606-y","volume":"25","author":"SS Jamal","year":"2019","unstructured":"Jamal SS, Shah T, Farwa S, Khan MU (2019) A new technique of frequency domain watermarking based on a local ring. Wirel Netw 25(4):1491\u20131503","journal-title":"Wirel Netw"},{"key":"12480_CR15","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","volume":"43","author":"M Kaur","year":"2020","unstructured":"Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 43:15\u201327","journal-title":"Arch Comput Methods Eng"},{"key":"12480_CR16","first-page":"27","volume":"15-43","author":"M Kaur","year":"2020","unstructured":"Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 15-43:27","journal-title":"Arch Comput Methods Eng"},{"issue":"3","key":"12480_CR17","first-page":"323","volume":"9","author":"PN Khade","year":"2012","unstructured":"Khade PN, Narnaware M (2012) 3D chaotic functions for image encryption. IJCSI Int J Comput Sci 9(3):323\u2013328","journal-title":"IJCSI Int J Comput Sci"},{"key":"12480_CR18","doi-asserted-by":"publisher","first-page":"77798","DOI":"10.1109\/ACCESS.2021.3083151","volume":"9","author":"I Khalid","year":"2021","unstructured":"Khalid I, Jamal SS, Shah T, Shah D, Hazzazi MM (2021) A novel scheme of image encryption based on elliptic curves isomorphism and substitution boxes. IEEE Access 9:77798\u201377810","journal-title":"IEEE Access"},{"key":"12480_CR19","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s11071-015-2173-3","volume":"82","author":"M Khan","year":"2015","unstructured":"Khan M (2015) A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear Dyn 82:527\u2013533","journal-title":"Nonlinear Dyn"},{"key":"12480_CR20","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s00521-016-2511-5","volume":"29","author":"M Khan","year":"2018","unstructured":"Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput & Applic 29:993\u2013999","journal-title":"Neural Comput & Applic"},{"key":"12480_CR21","doi-asserted-by":"publisher","first-page":"81333","DOI":"10.1109\/ACCESS.2019.2920383","volume":"7","author":"S Khan","year":"2019","unstructured":"Khan S, Han L, Lu HI, Butt KK, Bachira G, Khan NU (2019) A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI. IEEE Access 7:81333\u201381350","journal-title":"IEEE Access"},{"key":"12480_CR22","doi-asserted-by":"publisher","first-page":"30983","DOI":"10.1007\/s11042-020-09610-1","volume":"79","author":"M Khan","year":"2020","unstructured":"Khan M, Jamal SS, Waqas UA (2020) A novel combination of information hiding and confidentiality scheme. Multimed Tools Appl 79:30983\u201331005","journal-title":"Multimed Tools Appl"},{"key":"12480_CR23","doi-asserted-by":"publisher","first-page":"26203","DOI":"10.1007\/s11042-019-07818-4","volume":"358","author":"M Khan","year":"2019","unstructured":"Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 358:26203\u201326222","journal-title":"Multimed Tools Appl"},{"key":"12480_CR24","doi-asserted-by":"publisher","first-page":"11837","DOI":"10.1007\/s00521-019-04667-y","volume":"32","author":"M Khan","year":"2020","unstructured":"Khan M, Masood F, Alghafis A (2020) Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system. Neural Comput & Applic 32:11837\u201311857","journal-title":"Neural Comput & Applic"},{"key":"12480_CR25","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/s11071-013-1132-0","volume":"76","author":"M Khan","year":"2014","unstructured":"Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76:377\u2013382","journal-title":"Nonlinear Dyn"},{"key":"12480_CR26","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1007\/s00521-015-1887-y","volume":"27","author":"M Khan","year":"2016","unstructured":"Khan M, Shah T, Batool SI (2016) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput Appl 27:677\u2013685","journal-title":"Neural Comput Appl"},{"key":"12480_CR27","doi-asserted-by":"publisher","first-page":"24027","DOI":"10.1007\/s11042-016-4090-y","volume":"76","author":"M Khan","year":"2017","unstructured":"Khan M, Shah T, Batool SI (2017) A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimedia Tools Appl 76:24027\u201324062","journal-title":"Multimedia Tools Appl"},{"key":"12480_CR28","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1007\/s11071-013-0904-x","volume":"73","author":"M Khan","year":"2013","unstructured":"Khan M, Shah T, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73:1795\u20131801","journal-title":"Nonlinear Dyn"},{"key":"12480_CR29","first-page":"7836778378","volume":"7","author":"Z Liu","year":"2019","unstructured":"Liu Z, Wu C, Wang J, Hu Y (2019) A color image encryption using dynamic DNA and 4-D memristive hyper-chaos. IEEE Access 7:7836778378","journal-title":"IEEE Access"},{"key":"12480_CR30","doi-asserted-by":"publisher","first-page":"30344","DOI":"10.1109\/ACCESS.2019.2901302","volume":"7","author":"S Ma","year":"2019","unstructured":"Ma S, Zhang Y, Yang Z, Hu J (2019) A new pliantext-related image encryption scheme based on chaotic sequence. IEEE Access 7:30344\u201330360","journal-title":"IEEE Access"},{"key":"12480_CR31","doi-asserted-by":"publisher","first-page":"274","DOI":"10.3390\/e22030274","volume":"22","author":"F Masood","year":"2020","unstructured":"Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A novel hybrid secure image encryption based on Julia set of fractals and 3D Lorenz chaotic map. Entropy 22:274","journal-title":"Entropy"},{"key":"12480_CR32","doi-asserted-by":"publisher","first-page":"7858","DOI":"10.1016\/j.eswa.2014.06.011","volume":"41","author":"A Mishra","year":"2014","unstructured":"Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm. Exp Syst Appl Int J 41:7858\u20137867","journal-title":"Exp Syst Appl Int J"},{"key":"12480_CR33","doi-asserted-by":"publisher","first-page":"124072","DOI":"10.1016\/j.physa.2019.124072","volume":"550","author":"F \u00d6zkaynak","year":"2020","unstructured":"\u00d6zkaynak F (2020) On the effect of chaotic system in performance characteristics of chaos based s-box designs. Phys A Stat Mech Appl 550:124072","journal-title":"Phys A Stat Mech Appl"},{"key":"12480_CR34","unstructured":"Rukhin A, JuanSoto J, Nechvata J A statistical test suite for random and pseudorandom number generators for cryptographic applications"},{"issue":"1","key":"12480_CR35","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.eswa.2011.07.059","volume":"39","author":"RS Run","year":"2012","unstructured":"Run RS, Horng SJ, Lai J-L, Kao TW (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673\u2013689","journal-title":"Expert Syst Appl"},{"key":"12480_CR36","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1016\/j.cjph.2021.03.029","volume":"72","author":"L Said","year":"2021","unstructured":"Said L, Hazzazi MM, Khan M, Jamal SS (2021) A novel image encryption based on rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes. Chin J Phys 72:558\u2013574","journal-title":"Chin J Phys"},{"key":"12480_CR37","doi-asserted-by":"publisher","first-page":"117829","DOI":"10.1109\/ACCESS.2019.2936447","volume":"7","author":"E Tanyildizi","year":"2019","unstructured":"Tanyildizi E, \u00d6zkaynak F (2019) A New Chaotic S-Box Generation Method Using Parameter Optimization of One Dimensional Chaotic Maps. IEEE Access 7:117829\u2013117838","journal-title":"IEEE Access"},{"key":"12480_CR38","doi-asserted-by":"publisher","first-page":"5322","DOI":"10.3390\/s19235322","volume":"19","author":"T Unka\u0161evi\u2019c","year":"2019","unstructured":"Unka\u0161evi\u2019c T, Banjac Z, Milosavljevi\u2019c M (2019) A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments. Sensors 19:5322","journal-title":"Sensors"},{"key":"12480_CR39","doi-asserted-by":"publisher","first-page":"6891","DOI":"10.1007\/s11042-019-08570-5","volume":"79","author":"UA Waqas","year":"2020","unstructured":"Waqas UA, Khan M, Batool SI (2020) A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimedia Tools Appl 79:6891\u20136914","journal-title":"Multimedia Tools Appl"},{"issue":"12","key":"12480_CR40","doi-asserted-by":"publisher","first-page":"913","DOI":"10.3390\/e20120913","volume":"20","author":"I Younas","year":"2018","unstructured":"Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913","journal-title":"Entropy"},{"issue":"18","key":"12480_CR41","doi-asserted-by":"publisher","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Opt Int J Light Electron Opt 124(18):3596\u20133600","journal-title":"Opt Int J Light Electron Opt"},{"key":"12480_CR42","unstructured":"Zhang LY, Hu X, Liu Y, Wong K-W A chaotic image encryption scheme owning temp-value feedback. Cornell Univ J"}],"updated-by":[{"DOI":"10.1007\/s11042-022-12969-y","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T00:00:00Z","timestamp":1649808000000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12480-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12480-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12480-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T08:35:02Z","timestamp":1651048502000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12480-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,25]]},"references-count":42,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["12480"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12480-4","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11042-022-12969-y","asserted-by":"object"}]},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,25]]},"assertion":[{"value":"14 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2022","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-022-12969-y","URL":"https:\/\/doi.org\/10.1007\/s11042-022-12969-y","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}