{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T00:54:02Z","timestamp":1772240042694,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T00:00:00Z","timestamp":1646438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T00:00:00Z","timestamp":1646438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11042-022-12604-w","type":"journal-article","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T12:02:52Z","timestamp":1646481772000},"page":"17245-17262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["An image block encryption algorithm based on hyperchaotic system and DNA encoding"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4339-464X","authenticated-orcid":false,"given":"Jie","family":"Fang","sequence":"first","affiliation":[]},{"given":"Minghao","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Nannan","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Da","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,5]]},"reference":[{"key":"12604_CR1","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.optlastec.2017.04.022","volume":"95","author":"A Akhava","year":"2017","unstructured":"Akhava A, Samsudi A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on DNA encoding. Opt Laser Technol 95:94\u201399. https:\/\/doi.org\/10.1016\/j.optlastec.2017.04.022","journal-title":"Opt Laser Technol"},{"key":"12604_CR2","doi-asserted-by":"publisher","first-page":"102390","DOI":"10.1016\/j.jisa.2019.102390","volume":"49","author":"R Anandkumar","year":"2019","unstructured":"Anandkumar R, Kalpana R (2019) Designing a fast image encryption scheme using fractal function and 3D Henon map. J Inf Secur Appl 49:102390. https:\/\/doi.org\/10.1016\/j.jisa.2019.102390","journal-title":"J Inf Secur Appl"},{"key":"12604_CR3","doi-asserted-by":"publisher","first-page":"106489","DOI":"10.1016\/j.optlastec.2020.106489","volume":"132","author":"AH Brahim","year":"2020","unstructured":"Brahim AH, Pacha AA, Said NH (2020) Image encryption based on compressive sensing and chaos systems. Opt Laser Technol 132:106489. https:\/\/doi.org\/10.1016\/j.optlastec.2020.106489","journal-title":"Opt Laser Technol"},{"key":"12604_CR4","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"XL Chai","year":"2019","unstructured":"Chai XL, Fu XL, Gan ZH, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362. https:\/\/doi.org\/10.1016\/j.sigpro.2018.09.029","journal-title":"Signal Process"},{"key":"12604_CR5","doi-asserted-by":"publisher","first-page":"107684","DOI":"10.1016\/j.sigpro.2020.107684","volume":"176","author":"XL Chai","year":"2020","unstructured":"Chai XL, Bi JQ, Gan ZH, Liu X, Zhang Y, Chen Y (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176:107684. https:\/\/doi.org\/10.1016\/j.sigpro.2020.107684","journal-title":"Signal Process"},{"key":"12604_CR6","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.ins.2020.10.007","volume":"556","author":"XL Chai","year":"2021","unstructured":"Chai XL, Wu HY, Gan ZH, Han D, Zhang Y, Chen Y (2021) An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf Sci 556:305\u2013340. https:\/\/doi.org\/10.1016\/j.ins.2020.10.007","journal-title":"Inf Sci"},{"key":"12604_CR7","doi-asserted-by":"publisher","first-page":"108041","DOI":"10.1016\/j.sigpro.2021.108041","volume":"183","author":"XL Chai","year":"2021","unstructured":"Chai XL, Zhi XC, Gan ZH, Zhang Y, Chen Y, Fu J (2021) Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process 183:108041. https:\/\/doi.org\/10.1016\/j.sigpro.2021.108041","journal-title":"Signal Process"},{"key":"12604_CR8","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.optlaseng.2018.11.017","volume":"115","author":"R Enayatifar","year":"2019","unstructured":"Enayatifar R, Guimar\u00e3es FG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt Lasers Eng 115:131\u2013140. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.11.017","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"12604_CR9","doi-asserted-by":"publisher","first-page":"30","DOI":"10.13306\/j.1672-3813.2021.01.005","volume":"18","author":"J Fang","year":"2021","unstructured":"Fang J, Jiang MH, An XY et al (2021) A novel laser complex chaotic system and its point multiplication function projection synchronization. Complex Syst Complex Sci 18(1):30\u201337. https:\/\/doi.org\/10.13306\/j.1672-3813.2021.01.005","journal-title":"Complex Syst Complex Sci"},{"key":"12604_CR10","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.optlastec.2018.01.007","volume":"103","author":"LH Gong","year":"2018","unstructured":"Gong LH, Deng CZ, Pan SM, Zhou N (2018) Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform. Opt Laser Technol 103:48\u201358. https:\/\/doi.org\/10.1016\/j.optlastec.2018.01.007","journal-title":"Opt Laser Technol"},{"issue":"2","key":"12604_CR11","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/S0303-2647(00)00091-5","volume":"57","author":"T Head","year":"2000","unstructured":"Head T, Rozenberg G, Bladergroen RS, Breek CKD, Lommerse PHM, Spaink HP (2000) Computing with DNA by operating on plasmids. BioSystems 57(2):87\u201393. https:\/\/doi.org\/10.1016\/S0303-2647(00)00091-5","journal-title":"BioSystems"},{"issue":"1","key":"12604_CR12","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/e17010028","volume":"17","author":"X Huan","year":"2015","unstructured":"Huan X, Sun TT, Li YX et al (2015) A color image encryption algorithm based on a fractional-order Hyperchaotic system. Entropy 17(1):28\u201338. https:\/\/doi.org\/10.3390\/e17010028","journal-title":"Entropy"},{"issue":"12","key":"12604_CR13","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.matcom.2020.07.007","volume":"178","author":"DS Malik","year":"2020","unstructured":"Malik DS, Shah T (2020) Color multiple image encryption scheme based on 3D-chaotic maps. Math Comput Simulat 178(12):646\u2013666. https:\/\/doi.org\/10.1016\/j.matcom.2020.07.007","journal-title":"Math Comput Simulat"},{"key":"12604_CR14","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.jisa.2019.01.010","volume":"45","author":"B Mondal","year":"2019","unstructured":"Mondal B, Singh S, Kumar P (2019) A secure image encryption scheme based on cellular automata and chaotic skew tent map. J Inf Secur Appl 45:117\u2013130. https:\/\/doi.org\/10.1016\/j.jisa.2019.01.010","journal-title":"J Inf Secur Appl"},{"issue":"5","key":"12604_CR15","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s11071-018-4056-x","volume":"92","author":"F \u00d6zkaynak","year":"2018","unstructured":"\u00d6zkaynak F (2018) Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn 92(5):305\u2013301. https:\/\/doi.org\/10.1007\/s11071-018-4056-x","journal-title":"Nonlinear Dyn"},{"key":"12604_CR16","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang LL (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137. https:\/\/doi.org\/10.1016\/j.sigpro.2017.03.011","journal-title":"Signal Process"},{"issue":"24","key":"12604_CR17","doi-asserted-by":"publisher","first-page":"240506","DOI":"10.7498\/aps.63.240506","volume":"63","author":"ZP Peng","year":"2014","unstructured":"Peng ZP, Wang CH, Lin Y et al (2014) A novel four-dimensional multi-wing hyper-chaotic attractor and its application in image encryption. Acta Phys Sin 63(24):240506. https:\/\/doi.org\/10.7498\/aps.63.240506","journal-title":"Acta Phys Sin"},{"key":"12604_CR18","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.amc.2018.03.019","volume":"332","author":"VM Silva-Garc\u00eda","year":"2018","unstructured":"Silva-Garc\u00eda VM, Flores-Carapia R, Renter\u00eda-M\u00e1rquez C, Luna-Benoso B, Aldape-P\u00e9rez M (2018) Substitution box generation using Chaos: An image encryption application. Appl Math Comput 332:123\u2013135. https:\/\/doi.org\/10.1016\/j.amc.2018.03.019","journal-title":"Appl Math Comput"},{"issue":"3","key":"12604_CR19","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.optlaseng.2018.10.002","volume":"113","author":"LS Sui","year":"2019","unstructured":"Sui LS, Zhang X, Huang CT et al (2019) Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Opt Lasers Eng 113(3):29\u201337. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.10.002","journal-title":"Opt Lasers Eng"},{"key":"12604_CR20","doi-asserted-by":"publisher","first-page":"26059","DOI":"10.1109\/ACCESS.2018.2832854","volume":"6","author":"HQ Tang","year":"2018","unstructured":"Tang HQ, Sun QF, Yang XL et al (2018) A network coding and DES based dynamic encryption scheme for moving target defense. IEEE Access 6:26059\u201326068. https:\/\/doi.org\/10.1109\/ACCESS.2018.2832854","journal-title":"IEEE Access"},{"issue":"1","key":"12604_CR21","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s11432-010-0010-3","volume":"53","author":"XJ Tong","year":"2010","unstructured":"Tong XJ, Cui MG (2010) Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation. Sci China Inform Sci 53(1):191\u2013202","journal-title":"Sci China Inform Sci"},{"key":"12604_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"JH Wu","year":"2018","unstructured":"Wu JH, Liao XF, Yang B (2018) Image encryption using 2D H\u00e9non-sine map and DNA approach. Signal Process 153:11\u201323. https:\/\/doi.org\/10.1016\/j.sigpro.2018.06.008","journal-title":"Signal Process"},{"key":"12604_CR23","doi-asserted-by":"publisher","first-page":"10949","DOI":"10.1007\/s11042-020-10218-8","volume":"80","author":"XP Yan","year":"2021","unstructured":"Yan XP, Wang XY, Xian YJ (2021) Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimed Tools Appl 80:10949\u201310983. https:\/\/doi.org\/10.1007\/s11042-020-10218-8","journal-title":"Multimed Tools Appl"},{"key":"12604_CR24","doi-asserted-by":"publisher","first-page":"106553","DOI":"10.1016\/j.optlastec.2020.106553","volume":"133","author":"Y Yang","year":"2021","unstructured":"Yang Y, Wang LD, Duan SK, Luo L (2021) Dynamical analysis and image encryption application of a novel memristive hyperchaotic system. Opt Laser Technol 133:106553. https:\/\/doi.org\/10.1016\/j.optlastec.2020.106553","journal-title":"Opt Laser Technol"},{"key":"12604_CR25","doi-asserted-by":"publisher","first-page":"105816","DOI":"10.1016\/j.optlaseng.2019.105816","volume":"124","author":"SS Yu","year":"2020","unstructured":"Yu SS, Zhou NR, Gong LH, Nie Z (2020) Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system. Opt Lasers Eng 124:105816. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105816","journal-title":"Opt Lasers Eng"},{"issue":"7","key":"12604_CR26","doi-asserted-by":"publisher","first-page":"106626","DOI":"10.1016\/j.optlaseng.2021.106626","volume":"143","author":"YB Zhang","year":"2021","unstructured":"Zhang YB, Zhang L, Zhong Z, Yu L, Shan M, Zhao Y (2021) Hyperchaotic image encryption using phase-truncated fractional Fourier transform and DNA-level operation. Opt Lasers Eng 143(7):106626. https:\/\/doi.org\/10.1016\/j.optlaseng.2021.106626","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"12604_CR27","doi-asserted-by":"publisher","first-page":"126086","DOI":"10.1016\/j.optcom.2020.126086","volume":"474","author":"SM Zhao","year":"2020","unstructured":"Zhao SM, Yu XD, Wang L, Li W, Zheng B (2020) Secure optical encryption based on ghost imaging with fractional Fourier transform. Opt Commun 474(5):126086","journal-title":"Opt Commun"},{"key":"12604_CR28","doi-asserted-by":"publisher","first-page":"107484","DOI":"10.1016\/j.sigpro.2020.107484","volume":"171","author":"MJ Zhou","year":"2020","unstructured":"Zhou MJ, Wang CH (2020) A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process 171:107484. https:\/\/doi.org\/10.1016\/j.sigpro.2020.107484","journal-title":"Signal Process"},{"issue":"9","key":"12604_CR29","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","volume":"45","author":"YC Zhou","year":"2015","unstructured":"Zhou YC, Hua ZY, Pun CM et al (2015) Cascade chaotic system with applications. IEEE Trans Cybern 45(9):2001\u20132012. https:\/\/doi.org\/10.1109\/TCYB.2014.2363168","journal-title":"IEEE Trans Cybern"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12604-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12604-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12604-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T10:33:18Z","timestamp":1651660398000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12604-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,5]]},"references-count":29,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["12604"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12604-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,5]]},"assertion":[{"value":"23 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare there is no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}