{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T19:59:13Z","timestamp":1766087953501,"version":"3.40.4"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T00:00:00Z","timestamp":1662163200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T00:00:00Z","timestamp":1662163200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11042-022-13727-w","type":"journal-article","created":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T05:02:31Z","timestamp":1662181351000},"page":"7621-7637","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Improved affine encryption algorithm for color images using LFSR and XOR encryption"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2829-9660","authenticated-orcid":false,"given":"Ay\u015feg\u00fcl","family":"Ihsan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8267-8469","authenticated-orcid":false,"given":"Nurettin","family":"Do\u011fan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,9,3]]},"reference":[{"issue":"5","key":"13727_CR1","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1109\/TCAD.2009.2015736","volume":"28","author":"AS Abu-Issa","year":"2009","unstructured":"Abu-Issa AS, Quigley SF (2009) Bit-swapping LFSR and scan-chain ordering: a novel technique for peak-and average-power reduction in scan-based BIST. IEEE Trans Comput Aided Des Integr Circ Syst 28(5):755\u2013759","journal-title":"IEEE Trans Comput Aided Des Integr Circ Syst"},{"issue":"4","key":"13727_CR2","first-page":"191","volume":"8","author":"MA Bani","year":"2008","unstructured":"Bani MA, Jantan A (2008) Image encryption using block-based transformation algorithm. IJCSNS Int J Comput Sci Netw Secur 8(4):191\u2013197","journal-title":"IJCSNS Int J Comput Sci Netw Secur"},{"issue":"9","key":"13727_CR3","doi-asserted-by":"publisher","first-page":"2429","DOI":"10.1016\/j.jss.2013.04.088","volume":"86","author":"S Behnia","year":"2013","unstructured":"Behnia S, Akhavan A, Akhshani A, Samsudin A (2013) Image encryption based on the Jacobian elliptic maps. J Syst Softw 86(9):2429\u20132438","journal-title":"J Syst Softw"},{"key":"13727_CR4","doi-asserted-by":"publisher","first-page":"106489","DOI":"10.1016\/j.optlastec.2020.106489","volume":"132","author":"AH Brahim","year":"2020","unstructured":"Brahim AH, Pacha AA, Said NH (2020) Image encryption based on compressive sensing and chaos systems. Opt Laser Technol 132:106489","journal-title":"Opt Laser Technol"},{"key":"13727_CR5","doi-asserted-by":"publisher","unstructured":"\u00c7elik H, Do\u011fan N (2021) A color image steganography using a chaotic map based on K-least significant bits. J Polytech (Politeknik Dergisi). https:\/\/doi.org\/10.2339\/politeknik.1008594","DOI":"10.2339\/politeknik.1008594"},{"issue":"2","key":"13727_CR6","doi-asserted-by":"publisher","first-page":"330","DOI":"10.3390\/app9020330","volume":"9","author":"H Chen","year":"2019","unstructured":"Chen H, Liu Z, Tanougast C, Ding J (2019) Optical hyperspectral image cryptosystem based on affine transform and fractional fourier transform. Appl Sci 9(2):330","journal-title":"Appl Sci"},{"issue":"13","key":"13727_CR7","doi-asserted-by":"publisher","first-page":"3143","DOI":"10.1049\/iet-ipr.2018.5654","volume":"14","author":"N Chidambaram","year":"2020","unstructured":"Chidambaram N, Raj P, Thenmozhi K, Amirtharajan R (2020) Advanced framework for highly secure and cloud-based storage of colour images. IET Image Process 14(13):3143\u20133153","journal-title":"IET Image Process"},{"issue":"13","key":"13727_CR8","doi-asserted-by":"publisher","first-page":"19803","DOI":"10.1007\/s11042-020-10308-7","volume":"80","author":"S Deb","year":"2021","unstructured":"Deb S, Bhuyan B (2021) Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR. Multimed Tools Appl 80(13):19803\u201319826","journal-title":"Multimed Tools Appl"},{"key":"13727_CR9","doi-asserted-by":"publisher","unstructured":"Do\u011fan N, \u00c7elik H (2021) A hybrid color image encryption method using a scan pattern. J Polytech (Politeknik Dergisi). https:\/\/doi.org\/10.2339\/politeknik.902661","DOI":"10.2339\/politeknik.902661"},{"issue":"2","key":"13727_CR10","first-page":"525","volume":"52","author":"S Etemadi Borujeni","year":"2013","unstructured":"Etemadi Borujeni S, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst 52(2):525\u2013537","journal-title":"Telecommun Syst"},{"key":"13727_CR11","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.vlsi.2021.05.007","volume":"81","author":"M Khan","year":"2021","unstructured":"Khan M, Jamal SS, Hazzazi MM, Ali KM, Hussain I, Asif M (2021) An efficient image encryption scheme based on double affine substitution box and chaotic system. Integration 81:108\u2013122","journal-title":"Integration"},{"key":"13727_CR12","first-page":"20","volume":"21","author":"M Kumar","year":"2014","unstructured":"Kumar M, Powduri P, Reddy A (2014) An RGB image encryption using diffusion process associated with chaotic map. J Inf Secur Appl 21:20\u201330","journal-title":"J Inf Secur Appl"},{"issue":"6","key":"13727_CR13","doi-asserted-by":"publisher","first-page":"1961","DOI":"10.1007\/s10773-017-3341-7","volume":"56","author":"P Li","year":"2017","unstructured":"Li P, Zhao Y (2017) A simple encryption algorithm for quantum color image. Int J Theor Phys 56(6):1961\u20131982","journal-title":"Int J Theor Phys"},{"issue":"16\u201317","key":"13727_CR14","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16\u201317):3895\u20133903","journal-title":"Opt Commun"},{"key":"13727_CR15","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.optlaseng.2019.05.027","volume":"122","author":"H Liu","year":"2019","unstructured":"Liu H, Kadir A, Liu J (2019) Color pathological image encryption algorithm using arithmetic over Galois field and coupled hyper chaotic system. Opt Lasers Eng 122:123\u2013133","journal-title":"Opt Lasers Eng"},{"key":"13727_CR16","first-page":"83","volume":"360","author":"H Liu","year":"2019","unstructured":"Liu H, Zhang Y, Kadir A, Xu Y (2019) Image encryption using complex hyper chaotic system by injecting impulse into parameters. Appl Math Comput 360:83\u201393","journal-title":"Appl Math Comput"},{"issue":"12","key":"13727_CR17","doi-asserted-by":"publisher","first-page":"2050173","DOI":"10.1142\/S0218127420501734","volume":"30","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. Int J Bifurcation Chaos 30(12):2050173","journal-title":"Int J Bifurcation Chaos"},{"issue":"10","key":"13727_CR18","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1080\/09500340.2021.1924885","volume":"68","author":"PN Lone","year":"2021","unstructured":"Lone PN, Singh D, Mir UH (2021) A novel image encryption using random matrix affine cipher and the chaotic maps. J Mod Opt 68(10):507\u2013521","journal-title":"J Mod Opt"},{"key":"13727_CR19","doi-asserted-by":"publisher","unstructured":"Masood F, Driss M, Boulila W et al (2021) A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations. Wirel Pers Commun. https:\/\/doi.org\/10.1007\/s11277-021-08584-z","DOI":"10.1007\/s11277-021-08584-z"},{"key":"13727_CR20","first-page":"903","volume":"12","author":"A Momeni Asl","year":"2021","unstructured":"Momeni Asl A, Broumandnia A, Mirabedini SJ (2021) Color image encryption using linear feedback shift registers by three dimensional permutation and substitution operations. Int J Nonlinear Anal Appl 12:903\u2013921","journal-title":"Int J Nonlinear Anal Appl"},{"key":"13727_CR21","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.sigpro.2014.10.033","volume":"109","author":"MA Murillo-Escobar","year":"2015","unstructured":"Murillo-Escobar MA, Cruz-Hern\u00e1ndez C, Abundiz-P\u00e9rez F, L\u00f3pez-Guti\u00e9rrez RM, Del Campo OA (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119\u2013131","journal-title":"Signal Process"},{"key":"13727_CR22","doi-asserted-by":"crossref","unstructured":"Naveenkumar SK, Panduranga HT (2013) Triple image encryption based on integer transform and chaotic map. In: 2013 International Conference on Optical Imaging Sensor and Security (ICOSS), 1-6","DOI":"10.1109\/ICOISS.2013.6678416"},{"key":"13727_CR23","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.chaos.2007.07.083","volume":"40","author":"R Rhouma","year":"2009","unstructured":"Rhouma R, Meherzi S, Belghith S (2009) OCML-based colour image encryption. Chaos, Solitons Fractals 40:309\u2013318","journal-title":"Chaos, Solitons Fractals"},{"issue":"18","key":"13727_CR24","doi-asserted-by":"publisher","first-page":"27829","DOI":"10.1007\/s11042-021-11003-x","volume":"80","author":"S Sabir","year":"2021","unstructured":"Sabir S, Guleria V (2021) Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map. Multimed Tools Appl 80(18):27829\u201327853","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"13727_CR25","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.eij.2020.07.002","volume":"22","author":"WS Sayed","year":"2021","unstructured":"Sayed WS, Radwan AG, Fahmy HA, Elsedeek A (2021) Trajectory control and image encryption using affine transformation of Lorenz system. Egypt Inform J 22(2):155\u2013166","journal-title":"Egypt Inform J"},{"key":"13727_CR26","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269\u201310278","journal-title":"IEEE Access"},{"issue":"6","key":"13727_CR27","doi-asserted-by":"publisher","first-page":"6883","DOI":"10.1007\/s11042-017-4605-1","volume":"77","author":"L Teng","year":"2018","unstructured":"Teng L, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit-level permutation. Multimed Tools Appl 77(6):6883\u20136896","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"13727_CR28","doi-asserted-by":"publisher","first-page":"3033","DOI":"10.32604\/cmc.2021.019153","volume":"69","author":"O Thinnukool","year":"2021","unstructured":"Thinnukool O, Panityakul T, Bano M (2021) Double encryption using trigonometric chaotic map and XOR of an image. CMC-Comput Mater Continua 69(3):3033\u20133046","journal-title":"CMC-Comput Mater Continua"},{"key":"13727_CR29","doi-asserted-by":"crossref","unstructured":"Wang H, Hu Y, Yu L, Wang Q (2018) The optimal scrambling algorithm based on zigzag and affine transformation. In: 2018 IEEE International Conference on Mechatronics and Automation (ICMA), 1189-1193","DOI":"10.1109\/ICMA.2018.8484423"},{"issue":"11","key":"13727_CR30","first-page":"3500","volume":"12","author":"SS Yadav","year":"2017","unstructured":"Yadav SS, Singh Y, Sriwas S (2017) Gray code (n, k, p) based pixel substitution and affine transform based gray code bit plane permutation technique for secure image encryption. ARPN J Eng Appl Sci 12(11):3500\u20133508","journal-title":"ARPN J Eng Appl Sci"},{"issue":"3","key":"13727_CR31","doi-asserted-by":"publisher","first-page":"361","DOI":"10.3390\/e23030361","volume":"23","author":"D Zhang","year":"2021","unstructured":"Zhang D, Chen L, Li T (2021) Hyper-chaotic color image encryption based on transformed zigzag diffusion and RNA operation. Entropy 23(3):361","journal-title":"Entropy"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13727-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13727-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13727-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:30:15Z","timestamp":1744205415000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13727-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,3]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["13727"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13727-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,9,3]]},"assertion":[{"value":"31 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}