{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:43:21Z","timestamp":1755035001062},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"25","license":[{"start":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T00:00:00Z","timestamp":1659398400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T00:00:00Z","timestamp":1659398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11042-022-13535-2","type":"journal-article","created":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T05:02:45Z","timestamp":1659416565000},"page":"39653-39668","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Chaos cryptosystem with optimal key selection for image encryption"],"prefix":"10.1007","volume":"82","author":[{"given":"Supriya","family":"Khaitan","sequence":"first","affiliation":[]},{"given":"Shrddha","family":"Sagar","sequence":"additional","affiliation":[]},{"given":"Rashi","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,2]]},"reference":[{"key":"13535_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01177-2_56","volume-title":"Intelligent Computing. SAI 2018. Advances in intelligent systems and computing, vol 857","author":"SF Abbasi","year":"2019","unstructured":"Abbasi SF, Ahmad J, Khan JS, Khan MA, Sheikh SA (2019) Visual Meaningful Encryption Scheme Using Intertwining Logistic Map. In: Arai K, Kapoor S, Bhatia R (eds) Intelligent Computing. SAI 2018. Advances in intelligent systems and computing, vol 857. Springer. https:\/\/doi.org\/10.1007\/978-3-030-01177-2_56"},{"key":"13535_CR2","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s41870-018-0099-y","volume":"10","author":"M Ahmad","year":"2018","unstructured":"Ahmad M, Alam MZ, Umayya Z, Khan S, Ahmad F (2018) An image encryption approach using particle swarm optimization and chaotic map. Int J Inf Technol 10:247\u2013255. https:\/\/doi.org\/10.1007\/s41870-018-0099-y","journal-title":"Int J Inf Technol"},{"issue":"15","key":"13535_CR3","doi-asserted-by":"publisher","first-page":"16529","DOI":"10.1007\/s11042-016-3926-9","volume":"76","author":"R Bansal","year":"2017","unstructured":"Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and Vigenere scheme. Mu ltimed Tools Appl 76(15):16529\u201316562","journal-title":"Mu ltimed Tools Appl"},{"key":"13535_CR4","doi-asserted-by":"publisher","first-page":"27611","DOI":"10.1007\/s11042-019-07881-x","volume":"78","author":"SI Batool","year":"2019","unstructured":"Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimedia Tools and Appl 78:27611\u201327637. https:\/\/doi.org\/10.1007\/s11042-019-07881-x","journal-title":"Multimedia Tools and Appl"},{"key":"13535_CR5","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.future.2019.04.005","volume":"99","author":"A Broumandnia","year":"2019","unstructured":"Broumandnia A (2019) The 3D modular chaotic map to digital color image encryption. Futur Gener Comput Syst 99:489\u2013499","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"13535_CR6","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1007\/s10586-018-02895-w","volume":"22","author":"U Cavusogul","year":"2019","unstructured":"Cavusogul U, Kacar S (2019) A Novel Parallel Image Encryption Algorithm based on chaos. Clust Comput 22(4):1211","journal-title":"Clust Comput"},{"key":"13535_CR7","doi-asserted-by":"publisher","first-page":"2399","DOI":"10.1007\/s11071-018-4332-9","volume":"93","author":"J Chen","year":"2018","unstructured":"Chen J, Han F, Qian W (2018) Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map. Nonlinear Dyn 93:2399\u20132413","journal-title":"Nonlinear Dyn"},{"key":"13535_CR8","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1140\/epjp\/i2019-12776-9","volume":"134","author":"C Chen","year":"2019","unstructured":"Chen C, Sun HK, He SB (2019) A class of higher-dimensional hyperchaotic maps. Eur Phys J Plus 134:410","journal-title":"Eur Phys J Plus"},{"issue":"3","key":"13535_CR9","first-page":"216","volume":"35","author":"XH Deng","year":"2014","unstructured":"Deng XH, Zhu CX (2014) Image encryption algorithms based on chaos through dual scrambling of pixel position and bit. J Commun 35(3):216\u2013223","journal-title":"J Commun"},{"issue":"7","key":"13535_CR10","doi-asserted-by":"publisher","first-page":"e0158738","DOI":"10.1371\/journal.pone.0158738","volume":"11","author":"E Emary","year":"2016","unstructured":"Emary E, Zawbaa HM (2016) Impact of chaos functions on modern swarm optimizers. PloS ONE 11(7):e0158738","journal-title":"PloS ONE"},{"key":"13535_CR11","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1142\/S0218127403007230","volume":"13","author":"P G\u00f3ra","year":"2003","unstructured":"G\u00f3ra P, Boyarsky, Abraham (2003) On the Significance of the Tent Map. I. J. Bifurcation and Chaos 13:1299\u20131301","journal-title":"I. J. Bifurcation and Chaos"},{"key":"13535_CR12","unstructured":"Hao T, Bao-hua Z, Shi-xian W. (2010). \u201cChaos quantum genetic algorithm based on Tent map\u201d 2nd International Conference on Computer Engineering and Technology, 2570\u20132574"},{"key":"13535_CR13","doi-asserted-by":"publisher","unstructured":"Hegazy AE, Makhlouf\u00a0 MA, El-Tawel GS (2019) Feature selection using chaotic Salp swarm algorithm for data classification. Arabian Journal of Science and Engineering 44:3801\u20133816.\u00a0https:\/\/doi.org\/10.1007\/s13369-018-3680-6","DOI":"10.1007\/s13369-018-3680-6"},{"key":"13535_CR14","doi-asserted-by":"publisher","unstructured":"Kalra M, Katyal S, Singh R (2019) A tent map and logistic map based approach for chaos-based image encryption and decryption. Innovations in computer science and engineering. Lecture Notes in Networks and Systems, 74. https:\/\/doi.org\/10.1007\/978-981-13-7082-3_20","DOI":"10.1007\/978-981-13-7082-3_20"},{"issue":"2S7","key":"13535_CR15","first-page":"603","volume":"8","author":"S Khaitan","year":"2019","unstructured":"Khaitan S, Agarwal R, Kaur M (2019) Novel Method of Secure Communication using Logistic Map. Int J Recent Technol Eng 8(2S7):603\u2013607","journal-title":"Int J Recent Technol Eng"},{"key":"13535_CR16","doi-asserted-by":"publisher","first-page":"11837","DOI":"10.1007\/s00521-019-04667-y","volume":"32","author":"M Khan","year":"2020","unstructured":"Khan M, Masood F, Alghafis A (2020) Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system. Neural Comput and Applic 32:11837\u201311857. https:\/\/doi.org\/10.1007\/s00521-019-04667-y","journal-title":"Neural Comput and Applic"},{"key":"13535_CR17","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1142\/S0218127492000823","volume":"2","author":"LJ Kocarev","year":"1992","unstructured":"Kocarev LJ, Halle KS, Eckert K, Parlitz U, Chua LO (1992) Experimental demonstration of secure communications via chaotic synchronization. International Journal of Bifurcation Chaos 2:709\u2013713","journal-title":"International Journal of Bifurcation Chaos"},{"key":"13535_CR18","doi-asserted-by":"publisher","first-page":"2904","DOI":"10.1007\/s10773-018-3810-7","volume":"57","author":"X Li","year":"2018","unstructured":"Li X, Chen W, Wang Y (2018) Quantum image compression-encryption scheme based on quantum discrete cosine transform. Int J Theor Phys 57:2904\u20132919","journal-title":"Int J Theor Phys"},{"key":"13535_CR19","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"HJ Liu","year":"2010","unstructured":"Liu HJ, Wang XY (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59:3320\u20133327","journal-title":"Comput Math Appl"},{"key":"13535_CR20","doi-asserted-by":"publisher","first-page":"17669","DOI":"10.1007\/s11042-020-08645-8","volume":"79","author":"Y Liu","year":"2020","unstructured":"Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YS (2020) A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl 79:17669\u201317705","journal-title":"Multimed Tools Appl"},{"key":"13535_CR21","doi-asserted-by":"publisher","unstructured":"Lu Z, Hou Z, Du J (2006) Particle swarm optimization with adaptive mutation. Frontiers of Electrical and Electronic Engineering 1:99\u2013104. https:\/\/doi.org\/10.1007\/s11460-005-0021-9","DOI":"10.1007\/s11460-005-0021-9"},{"key":"13535_CR22","doi-asserted-by":"crossref","unstructured":"Mariot L, Leporati A. (2015). \u201cHeuristic search by particle swarm optimization of Boolean functions for cryptographic applications\u201d Genetic and Evolutionary Computation Conference","DOI":"10.1145\/2739482.2764674"},{"issue":"3","key":"13535_CR23","doi-asserted-by":"publisher","first-page":"274","DOI":"10.3390\/e22030274","volume":"22","author":"F Masood","year":"2020","unstructured":"Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map. Entropy 22(3):274. https:\/\/doi.org\/10.3390\/e22030274","journal-title":"Entropy"},{"issue":"1","key":"13535_CR24","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a \u201cchaotic\u201d encryption algorithm. Cryptologia 13(1):29\u201342","journal-title":"Cryptologia"},{"key":"13535_CR25","doi-asserted-by":"publisher","unstructured":"Pareek N, Patidar V, Sud KK (2011) Substitution-diffusion based Image Cipher. Int J Network Security Its Appl:3. https:\/\/doi.org\/10.5121\/ijnsa.2011.3212","DOI":"10.5121\/ijnsa.2011.3212"},{"issue":"1","key":"13535_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.optlaseng.2008.09.001","volume":"47","author":"V Rozouvan","year":"2009","unstructured":"Rozouvan V (2009) Modulo image encryption with fractal keys. Optics Lasers Eng 47(1):1\u20136","journal-title":"Optics Lasers Eng"},{"key":"13535_CR27","doi-asserted-by":"publisher","first-page":"3462","DOI":"10.1007\/s10489-018-1158-6","volume":"48","author":"GI Sayed","year":"2018","unstructured":"Sayed GI, Khoriba G, Haggag MH (2018) A novel chaotic salp swarm algorithm for global optimization and feature selection. Appl Intell 48:3462\u20133481","journal-title":"Appl Intell"},{"issue":"4","key":"13535_CR28","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. in The Bell System Technical Journal 28(4):656\u2013715. https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"in The Bell System Technical Journal"},{"key":"13535_CR29","doi-asserted-by":"publisher","first-page":"113122","DOI":"10.1016\/j.eswa.2019.113122","volume":"145","author":"M Tubishat","year":"2020","unstructured":"Tubishat M, Idris N, Shuib L, Abushariah MAM, Mirjalili S (2020) Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection. Expert Syst Appl 145:113122. https:\/\/doi.org\/10.1016\/j.eswa.2019.113122","journal-title":"Expert Syst Appl"},{"key":"13535_CR30","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","volume":"342","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang HL (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51\u201360","journal-title":"Opt Commun"},{"key":"13535_CR31","first-page":"296","volume":"221","author":"H Wang","year":"2013","unstructured":"Wang H, Wang W, Wu Z (2013) Particle swarm optimization with adaptive mutation for multimodal optimization. Appl Math Comput 221:296\u2013305","journal-title":"Appl Math Comput"},{"key":"13535_CR32","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"key":"13535_CR33","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2019.04.005","volume":"122","author":"X Wang","year":"2019","unstructured":"Wang X, Zhao H, Feng L, Ye X, Zhang H (2019) High-sensitivity image encryption algorithm with random diffusion based on dynamic-coupled map lattices. Opt Lasers Eng 122:225\u2013238","journal-title":"Opt Lasers Eng"},{"key":"13535_CR34","doi-asserted-by":"publisher","first-page":"6429","DOI":"10.1109\/ACCESS.2017.2692043","volume":"5","author":"X Wu","year":"2017","unstructured":"Wu X, Zhu B, Hu Y, Ran Y (2017) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5:6429\u20136436. https:\/\/doi.org\/10.1109\/ACCESS.2017.2692043","journal-title":"IEEE Access"},{"key":"13535_CR35","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"13535_CR36","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1016\/j.chaos.2006.04.057","volume":"34","author":"D Yang","year":"2007","unstructured":"Yang D, Li G, Cheng G (2007) \u201cOn the efficiency of chaos optimization algorithms for global optimization\u201d, Chaos. Solitons Fractals 34(4):1366\u20131375","journal-title":"Solitons Fractals"},{"issue":"10","key":"13535_CR37","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"M Yaobin","year":"2004","unstructured":"Yaobin M, Chen G, Lian S (2004) A Novel Fast Image Encryption Scheme Based On 3d Chaotic Baker Maps. Int J Bifurcation Chaos 14(10):3613\u20133624","journal-title":"Int J Bifurcation Chaos"},{"key":"13535_CR38","doi-asserted-by":"publisher","first-page":"2079","DOI":"10.1007\/s11071-012-0409-z","volume":"69","author":"G Ye","year":"2012","unstructured":"Ye G, Wong K (2012) An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn 69:2079\u20132087","journal-title":"Nonlinear Dyn"},{"key":"13535_CR39","doi-asserted-by":"publisher","first-page":"2693","DOI":"10.1007\/s11071-019-05157-5","volume":"97","author":"B Yosefnezhad Irani","year":"2019","unstructured":"Yosefnezhad Irani B, Ayubi P, Amani Jabalkandi F, Yousefi Valandar M, Jafari Barani M (2019) Digital image scrambling based on a new one-dimensional coupled sine map. Nonlinear Dyn 97:2693\u20132721. https:\/\/doi.org\/10.1007\/s11071-019-05157-5","journal-title":"Nonlinear Dyn"},{"key":"13535_CR40","doi-asserted-by":"publisher","unstructured":"Zhao, J.,(2011) \"Chaotic particle swarm optimization algorithm based on tent mapping for dynamic origin-destination matrix estimation,\" 2011 international conference on electric information and control engineering, Wuhan, 221-224, https:\/\/doi.org\/10.1109\/ICEICE.2011.5777924.","DOI":"10.1109\/ICEICE.2011.5777924"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13535-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13535-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13535-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T06:48:42Z","timestamp":1700894922000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13535-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,2]]},"references-count":40,"journal-issue":{"issue":"25","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["13535"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13535-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,2]]},"assertion":[{"value":"30 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}