{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:46:30Z","timestamp":1769283990112,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T00:00:00Z","timestamp":1647820800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T00:00:00Z","timestamp":1647820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11042-022-12750-1","type":"journal-article","created":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T09:02:45Z","timestamp":1647853365000},"page":"24665-24689","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["New technology of color image encryption based on chaos and two improved Vigen\u00e8re steps"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2785-6258","authenticated-orcid":false,"given":"Mohamed","family":"Jarjar","sequence":"first","affiliation":[]},{"given":"Said","family":"Hraoui","sequence":"additional","affiliation":[]},{"given":"Said","family":"Najah","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Zenkouar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,21]]},"reference":[{"key":"12750_CR1","unstructured":"Ali SMA (2019) Novel Encryption Algorithm for Securing Sensitive Information Based on Feistel Cipher \u00abTest engeenering managenment Page Number: 10\u201316 Publication Issue:19 Volume: 80 September\u2013October 2019"},{"key":"12750_CR2","unstructured":"Ali SMA (2019) Novel Encryption Algorithm for Securing Sensitive Information Based on Feistel Cipher Test engeenering managenment Page Number: 10\u201316 Publication Issue:19 Volume: 80 September\u2013October 2019"},{"key":"12750_CR3","doi-asserted-by":"crossref","unstructured":"Boussif M, Aloui N, Cherif A (2020) Securing DICOM images by a new encryption algorithm using Arnold transform and Vigenere cipher. IET DIGITAL LABRERY?","DOI":"10.1049\/iet-ipr.2019.0042"},{"key":"12750_CR4","doi-asserted-by":"crossref","unstructured":"Dawahdeh ZE et al (2017) A new image encryption technique combining elliptic curve cryptosystem with hill cipher. J King Saud Univ Comp Inf Sci","DOI":"10.1016\/j.jksuci.2017.06.004"},{"key":"12750_CR5","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"Z-h Gan","year":"2019","unstructured":"Gan Z-h (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput & Applic 31:7111\u20137130","journal-title":"Neural Comput & Applic"},{"key":"12750_CR6","doi-asserted-by":"crossref","unstructured":"Ge R et al (2019) A Novel Chaos-Based Symmetric Image Encryption Using Bit-Pair Level Process July 8, 2019, date of current version August 7, 2019","DOI":"10.1109\/ACCESS.2019.2927415"},{"issue":"37","key":"12750_CR7","doi-asserted-by":"publisher","first-page":"26927","DOI":"10.1007\/s11042-020-09058-3","volume":"79","author":"M Ghazvini","year":"2020","unstructured":"Ghazvini M, Mirzadi M, Parvar N (2020) A modified method for image encryption based on chaotic map and genetic algorithm. Multimed Tools Appl 79(37):26927\u201326950","journal-title":"Multimed Tools Appl"},{"key":"12750_CR8","volume-title":"ACS International Conference","author":"S Hraoui","year":"2013","unstructured":"Hraoui S, Gmira F, Jarar AO, Satori K, Saaidi A (2013) Benchmarking AES and chaos based logistic map for image encryption. Computer Systems and Applications (AICCSA). In: ACS International Conference"},{"issue":"1","key":"12750_CR9","first-page":"1","volume":"11","author":"IA Ismail","year":"2010","unstructured":"Ismail IA, Amin M, Diab H (2010) A digital image encryption algorithm based a composition of two chaotic logistic maps. IJ Netw Secur 11(1):1\u201310","journal-title":"IJ Netw Secur"},{"key":"12750_CR10","unstructured":"Jarjar A (2017) Improvement of hill' sclassical method in image cryptography. Int J Stat Appl Math 2(Issue 3, Part A)"},{"key":"12750_CR11","first-page":"000","volume":"00","author":"M JarJar","year":"2019","unstructured":"JarJar M (2019) Further improvement of the HILL method applied in image encryption. Proc Comput Sci 00:000\u2013000","journal-title":"Proc Comput Sci"},{"key":"12750_CR12","unstructured":"Kester Q-A (2012) A cryptosystem based on Vigenere cipher with varying key. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 1(10)"},{"key":"12750_CR13","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","volume":"30","author":"JS Khan","year":"2019","unstructured":"Khan JS (2019) Chaos based efficient selective image encryption. Multidim Syst Sign Process 30:943\u2013961","journal-title":"Multidim Syst Sign Process"},{"issue":"2","key":"12750_CR14","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","volume":"30","author":"JS Khan","year":"2019","unstructured":"Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidim Syst Sign Process 30(2):943\u2013961","journal-title":"Multidim Syst Sign Process"},{"key":"12750_CR15","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2018.12.002","volume":"115","author":"H Li","year":"2019","unstructured":"Li H, Wang Y, Zuo Z (2019) Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms. Opt Lasers Eng 115:197\u2013207","journal-title":"Opt Lasers Eng"},{"key":"12750_CR16","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H (2010) Color image encryption based on one-time keys and robust chaotics maps. Comput Math Appl 59:3320\u20133327","journal-title":"Comput Math Appl"},{"key":"12750_CR17","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457\u20131466","journal-title":"Appl Soft Comput"},{"issue":"35","key":"12750_CR18","doi-asserted-by":"publisher","first-page":"25613","DOI":"10.1007\/s11042-020-09237-2","volume":"79","author":"Y Niu","year":"2020","unstructured":"Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations. Multimed Tools Appl 79(35):25613\u201325633","journal-title":"Multimed Tools Appl"},{"issue":"35","key":"12750_CR19","doi-asserted-by":"publisher","first-page":"25635","DOI":"10.1007\/s11042-020-09233-6","volume":"79","author":"S Noshadian","year":"2020","unstructured":"Noshadian S, Ebrahim zade A, Kazemitabar SJ (2020) Breaking a chaotic image encryption algorithm. Multimed Tools Appl 79(35):25635\u201325655","journal-title":"Multimed Tools Appl"},{"key":"12750_CR20","doi-asserted-by":"crossref","unstructured":"Patidar U, Parek M, Purolit GK (2011) ud Optics communication 254 4331\u20134339","DOI":"10.1016\/j.optcom.2011.05.028"},{"key":"12750_CR21","first-page":"23","volume":"46","author":"KAK Patro","year":"2019","unstructured":"Patro KAK, Acharya B (2019) An efficient colour image encryption scheme based on 1-D chaotic maps. J Inform Secur Appl 46:23\u201341 518","journal-title":"J Inform Secur Appl"},{"key":"12750_CR22","unstructured":"Peng J, Liao X, Wu Z (2002) Digital image secure communication using Chebyshev map chaotic sequences. IEEE Secure Commun:492\u2013496"},{"key":"12750_CR23","unstructured":"Reddy VVK, Bhukya S (2018) ENCRYPT AND DECRYPT IMAGE USING VIGENERE CIPHER. Int J Pure Appl Math 118(24)"},{"key":"12750_CR24","unstructured":"Saputra I, Mesran, Hasibuan NA (2017) Vigenere Cipher Algorithm with Grayscale Image Key Generator for Secure Text File. International Journal of Engineering Research & Technology (IJERT) 6(01)"},{"key":"12750_CR25","first-page":"1","volume-title":"2016 10th international conference on telecommunication systems services and applications (TSSA)","author":"Y Sazaki","year":"2016","unstructured":"Sazaki Y, Putra RS (2016) Implementation of affine transform method and Advanced Hill cipher for securing digital images. In: 2016 10th international conference on telecommunication systems services and applications (TSSA), pp 1\u20135"},{"issue":"5","key":"12750_CR26","first-page":"0975","volume":"136","author":"A Shah","year":"2016","unstructured":"Shah A (2016) Enhancing Security of Vigenere Cipher using Modified RC4. Int J Comput Appl 136(5):0975\u20138887","journal-title":"Int J Comput Appl"},{"key":"12750_CR27","first-page":"631","volume":"3","author":"F Sum","year":"2008","unstructured":"Sum F, Lin S, Li Z (2008) Chaos Solution Fractal 3:631\u2013640","journal-title":"Chaos Solution Fractal"},{"key":"12750_CR28","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"I Wang","year":"2020","unstructured":"Wang I (2020) Image encryption algorithm for synchronously updating Boolean network based on matrix semi tensor product. Inf Sci 507:16\u201335","journal-title":"Inf Sci"},{"issue":"4","key":"12750_CR29","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","volume":"41","author":"LY Wang","year":"2009","unstructured":"Wang LY et al (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41(4):1773\u20131783","journal-title":"Chaos, Solitons Fractals"},{"key":"12750_CR30","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171\u20131186 558","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12750-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12750-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12750-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T08:37:02Z","timestamp":1656578222000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12750-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,21]]},"references-count":30,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["12750"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12750-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,21]]},"assertion":[{"value":"10 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}