{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T15:09:21Z","timestamp":1764601761154,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672124"],"award-info":[{"award-number":["61672124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund","award":["MMJJ20170203"],"award-info":[{"award-number":["MMJJ20170203"]}]},{"name":"Liaoning Province Science and Technology Innovation Leading Talents Program Project","award":["XLYC1802013"],"award-info":[{"award-number":["XLYC1802013"]}]},{"name":"Key R&D Projects of Liaoning Province","award":["2019020105-JH2\/103"],"award-info":[{"award-number":["2019020105-JH2\/103"]}]},{"name":"Jinan City 20 Universities Funding Projects Introducing Innovation Team Program","award":["2019GXRC031"],"award-info":[{"award-number":["2019GXRC031"]}]},{"name":"Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security","award":["MIMS20-M-02"],"award-info":[{"award-number":["MIMS20-M-02"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11042-022-13280-6","type":"journal-article","created":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T03:23:32Z","timestamp":1654572212000},"page":"407-426","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["A novel chaotic image encryption with FSV based global bit-level chaotic permutation"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1921-049X","authenticated-orcid":false,"given":"Yongjin","family":"Xian","sequence":"first","affiliation":[]},{"given":"Xingyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yingqian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaopeng","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Ziyu","family":"Leng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,7]]},"reference":[{"key":"13280_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","volume":"160","author":"M Alawida","year":"2019","unstructured":"Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45\u201358","journal-title":"Signal Process"},{"key":"13280_CR2","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.sigpro.2019.06.013","volume":"164","author":"M Alawida","year":"2019","unstructured":"Alawida M, Teh JS, Samsudin A, Alshoura W\u2019H (2019) An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process 164:249\u2013266","journal-title":"Signal Process"},{"issue":"8","key":"13280_CR3","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos 16(8):2129\u20132151","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"13280_CR4","doi-asserted-by":"publisher","first-page":"102472","DOI":"10.1016\/j.jisa.2020.102472","volume":"52","author":"P Ayubi","year":"2020","unstructured":"Ayubi P, Setayeshi S, Rahmani AM (2020) Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application. Journal of Information Security and Applications 52:102472","journal-title":"Journal of Information Security and Applications"},{"issue":"2","key":"13280_CR5","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.1007\/s11042-020-09775-9","volume":"80","author":"M Benssalah","year":"2021","unstructured":"M. Benssalah, Y. Rhaskali,\u00b7K. Drouiche. An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimed Tools Appl, 2021, 80(2): 2081\u20132107.","journal-title":"Multimed Tools Appl"},{"key":"13280_CR6","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao C, Sun KH, Liu WH (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122\u2013133","journal-title":"Signal Process"},{"key":"13280_CR7","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2015.10.027","volume":"355","author":"AV Diaconu","year":"2016","unstructured":"Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314\u2013327","journal-title":"Inf Sci"},{"issue":"5","key":"13280_CR8","doi-asserted-by":"publisher","first-page":"3829","DOI":"10.1007\/s00500-019-04151-8","volume":"24","author":"M Es-Sabry","year":"2020","unstructured":"Es-Sabry M, El Akkad N, Merras M et al (2020) A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft Comput 24(5):3829\u20133848","journal-title":"Soft Comput"},{"issue":"6","key":"13280_CR9","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8(6):1259\u20131284","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"13280_CR10","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"ZY Hua","year":"2016","unstructured":"Hua ZY, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"13280_CR11","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"ZY Hua","year":"2019","unstructured":"Hua ZY, Zhou YC, Huang HJ (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"key":"13280_CR12","doi-asserted-by":"crossref","unstructured":"A. Kovalchuk, N. Lotoshynska, M.G. ML, et al. An Approach towards an Efficient Encryption-Decryption of Grayscale and Color Images. Procedia Computer Science, 2019, 155: 630\u2013635.","DOI":"10.1016\/j.procs.2019.08.089"},{"key":"13280_CR13","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.procs.2019.11.059","volume":"160","author":"A Kovalchuk","year":"2019","unstructured":"Kovalchuk A, Izonin I, ML MG et al (2019) An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations. Procedia Computer Science 160:491\u2013496","journal-title":"Procedia Computer Science"},{"key":"13280_CR14","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/j.procs.2019.11.057","volume":"160","author":"A Kovalchuk","year":"2019","unstructured":"Kovalchuk A, Izonin I, ML MG et al (2019) Information Protection Service using Topological Image Coverage. Procedia Computer Science 160:503\u2013508","journal-title":"Procedia Computer Science"},{"key":"13280_CR15","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.procs.2019.11.043","volume":"160","author":"A Kovalchuk","year":"2019","unstructured":"Kovalchuk A, Izonin I, ML MG et al (2019) An Efficient Image Encryption Scheme using Projective Transformations. Procedia Computer Science 160:584\u2013589","journal-title":"Procedia Computer Science"},{"issue":"3","key":"13280_CR16","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MMUL.2017.3051512","volume":"24","author":"CQ Li","year":"2017","unstructured":"Li CQ, Lin DD, Lu JH (2017) Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE Multimedia 24(3):64\u201371","journal-title":"IEEE Multimedia"},{"key":"13280_CR17","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.optlaseng.2017.11.001","volume":"102","author":"JF Li","year":"2018","unstructured":"Li JF, Xiang SY, Wang HN et al (2018) A novel image encryption algorithm based on synchronized random bit generated in cascade-coupled chaotic semiconductor ring lasers. Opt Lasers Eng 102:170\u2013180","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"13280_CR18","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu YB, Li B et al (2020) A new payload partition strategy in color image steganography. IEEE Transactions on Circuits and Systems for Video Technology 30(3):685\u2013696","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"13280_CR19","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1142\/S0218127419500160","volume":"29","author":"X Liu","year":"2019","unstructured":"Liu X, Song YR, Jiang GP (2019) Hierarchical bit-level image encryption based on chaotic map and Feistel network. International Journal of Bifurcation and Chaos 29:2","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"9","key":"13280_CR20","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1109\/TIFS.2016.2566261","volume":"11","author":"B Ma","year":"2016","unstructured":"Ma B, Shi YQ (2016) A reversible data hiding scheme based on code division multiplexing. IEEE Transactions on Information Forensics and Security 11(9):1914\u20131927","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"13280_CR21","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"ZC Ni","year":"2006","unstructured":"Ni ZC, Shi YQ, Ansari N et al (2006) Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3):354\u2013362","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"13280_CR22","doi-asserted-by":"publisher","first-page":"102470","DOI":"10.1016\/j.jisa.2020.102470","volume":"52","author":"KAK Patro","year":"2020","unstructured":"Patro KAK, Soni A, Netam PK, Acharya B (2020) Multiple grayscale image encryption using cross-coupled chaotic maps. Journal of Information Security and Applications 52:102470","journal-title":"Journal of Information Security and Applications"},{"issue":"3","key":"13280_CR23","doi-asserted-by":"publisher","first-page":"2432","DOI":"10.1109\/JIOT.2019.2957747","volume":"7","author":"HP Peng","year":"2020","unstructured":"Peng HP, Yang B, Li LX et al (2020) Secure and traceable image transmission scheme based on semitensor product compressed sensing in telemedicine system. IEEE Internet Things J 7(3):2432\u20132451","journal-title":"IEEE Internet Things J"},{"key":"13280_CR24","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1038\/ncomms1078","volume":"1","author":"S Popoff","year":"2010","unstructured":"Popoff S, Lerosey G, Fink M, Boccara AC, Gigan S (2010) Image transmission through an opaque material. Nat Commun 1:81","journal-title":"Nat Commun"},{"issue":"1","key":"13280_CR25","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/s11042-020-09375-7","volume":"80","author":"A Sarkar","year":"2021","unstructured":"A. Sarkar,\u00b7B. K. Singh. A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function. Multimed Tools Appl, 2021, 80(1): 799\u2013829.","journal-title":"Multimed Tools Appl"},{"key":"13280_CR26","doi-asserted-by":"publisher","first-page":"106162","DOI":"10.1016\/j.asoc.2020.106162","volume":"90","author":"K Shahna","year":"2020","unstructured":"Shahna K, Mohamed A (2020) A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl Soft Comput 90:106162","journal-title":"Appl Soft Comput"},{"issue":"5\u20136","key":"13280_CR27","first-page":"3975","volume":"79","author":"R Shanthakumari","year":"2021","unstructured":"Shanthakumari R, Malliga S (2021) Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm. Multimed Tools Appl 79(5\u20136):3975\u20133991","journal-title":"Multimed Tools Appl"},{"key":"13280_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","volume":"80","author":"ZJ Tang","year":"2016","unstructured":"Tang ZJ, Song J, Zhang XQ et al (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1\u201311","journal-title":"Opt Lasers Eng"},{"key":"13280_CR29","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"XY Wang","year":"2020","unstructured":"Wang XY, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16\u201336","journal-title":"Inf Sci"},{"key":"13280_CR30","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","volume":"539","author":"XY Wang","year":"2020","unstructured":"Wang XY, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195\u2013214","journal-title":"Inf Sci"},{"key":"13280_CR31","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.dsp.2013.10.020","volume":"25","author":"XY Wang","year":"2014","unstructured":"Wang XY, Luan DP, Bao XM (2014) Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digital Signal Processing 25:244\u2013247","journal-title":"Digital Signal Processing"},{"key":"13280_CR32","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao WM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"issue":"12","key":"13280_CR33","doi-asserted-by":"publisher","first-page":"4440","DOI":"10.1109\/TCSVT.2019.2960507","volume":"30","author":"CP Wang","year":"2020","unstructured":"Wang CP, Wang XY, Xia ZQ et al (2020) Image description with polar harmonic Fourier moments. IEEE Transactions on Circuits and Systems for Video Technology 30(12):4440\u20134452","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"13280_CR34","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","volume":"142","author":"JH Wu","year":"2018","unstructured":"Wu JH, Liao XF, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292\u2013300","journal-title":"Signal Process"},{"key":"13280_CR35","doi-asserted-by":"publisher","first-page":"102505","DOI":"10.1016\/j.jisa.2020.102505","volume":"53","author":"M Yadollahi","year":"2020","unstructured":"Yadollahi M, Enayatifar R, Nematzadeh H, Lee M, Choi JY (2020) A novel image security technique based on nucleic acid concepts. Journal of Information Security and Applications 53:102505","journal-title":"Journal of Information Security and Applications"},{"key":"13280_CR36","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"issue":"3","key":"13280_CR37","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/s11071-014-1331-3","volume":"77","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dynamics 77(3):687\u2013698","journal-title":"Nonlinear Dynamics"},{"issue":"3","key":"13280_CR38","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.cnsns.2012.08.010","volume":"18","author":"W Zhang","year":"2013","unstructured":"Zhang W, Wong KW, Yu H, Zhu ZL (2013) A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simul 18(3):584\u2013600","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"6","key":"13280_CR39","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171\u20131186","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13280-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13280-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13280-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T01:15:30Z","timestamp":1672276530000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13280-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["13280"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13280-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,6,7]]},"assertion":[{"value":"12 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}