{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:35:36Z","timestamp":1772123736743,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s11042-022-13734-x","type":"journal-article","created":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T03:31:37Z","timestamp":1662003097000},"page":"9343-9360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Presentation of encryption method for RGB images based on an evolutionary algorithm using chaos functions and hash tables"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4253-0811","authenticated-orcid":false,"given":"Hesam","family":"Omranpour","sequence":"first","affiliation":[]},{"given":"Zeynab","family":"Mohammadi Ledari","sequence":"additional","affiliation":[]},{"given":"Masoumeh","family":"Taheri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,1]]},"reference":[{"issue":"10","key":"13734_CR1","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1016\/j.aeue.2012.01.015","volume":"66","author":"AH Abdullah","year":"2012","unstructured":"Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-Int J Electron Commun 66(10):806\u2013816. https:\/\/doi.org\/10.1016\/j.aeue.2012.01.015","journal-title":"AEU-Int J Electron Commun"},{"issue":"2","key":"13734_CR2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1080\/19393555.2020.1718248","volume":"29","author":"PT Akkasaligar","year":"2020","unstructured":"Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inf Secur J A Global Perspect 29(2):91\u2013101. https:\/\/doi.org\/10.1080\/19393555.2020.1718248","journal-title":"Inf Secur J A Global Perspect"},{"issue":"2","key":"13734_CR3","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s11227-009-0347-9","volume":"56","author":"WL Chang","year":"2011","unstructured":"Chang WL, Huang SC, Lin KW (2011) Fast parallel DNA-based algorithms for molecular computation: discrete logarithm. J Supercomput 56(2):129\u2013163. https:\/\/doi.org\/10.1007\/s11227-009-0347-9","journal-title":"J Supercomput"},{"issue":"9","key":"13734_CR4","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1016\/j.optlaseng.2013.03.010","volume":"51","author":"R Enayatifar","year":"2013","unstructured":"Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Opt Lasers Eng 51(9):1066\u20131077. https:\/\/doi.org\/10.1016\/j.optlaseng.2013.03.010","journal-title":"Opt Lasers Eng"},{"key":"13734_CR5","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83\u201393. https:\/\/doi.org\/10.1016\/j.optlaseng.2013.12.003","journal-title":"Opt Lasers Eng"},{"key":"13734_CR6","doi-asserted-by":"publisher","first-page":"105777","DOI":"10.1016\/j.optlastec.2019.105777","volume":"121","author":"MB Farah","year":"2020","unstructured":"Farah MB, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:105777. https:\/\/doi.org\/10.1016\/j.optlastec.2019.105777","journal-title":"Opt Laser Technol"},{"issue":"3","key":"13734_CR7","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 83(3):1123\u20131136. https:\/\/doi.org\/10.1007\/s11071-015-2392-7","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"13734_CR8","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.1007\/s12652-019-01493-x","volume":"11","author":"A Gupta","year":"2020","unstructured":"Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Humaniz Comput 11(3):1309\u20131324. https:\/\/doi.org\/10.1007\/s12652-019-01493-x","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"9","key":"13734_CR9","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1016\/j.physleta.2018.12.011","volume":"383","author":"D Huo","year":"2019","unstructured":"Huo D, Zhou DF, Yuan S, Yi S, Zhang L, Zhou X (2019) Image encryption using exclusive-OR with DNA complementary rules and double random phase encoding. Phys Lett A 383(9):915\u2013922. https:\/\/doi.org\/10.1016\/j.physleta.2018.12.011","journal-title":"Phys Lett A"},{"key":"13734_CR10","doi-asserted-by":"publisher","unstructured":"Jiao S, Goutte R (2008) Code for encryption hiding data into genomic DNA of living organisms. In 2008 9th international conference on signal processing (pp. 2166-2169). IEEE. https:\/\/doi.org\/10.1109\/ICOSP.2008.4697576","DOI":"10.1109\/ICOSP.2008.4697576"},{"issue":"5","key":"13734_CR11","doi-asserted-by":"publisher","first-page":"50007","DOI":"10.1209\/0295-5075\/95\/50007","volume":"95","author":"TV Laptyeva","year":"2011","unstructured":"Laptyeva TV, Flach S, Kladko K (2011) The weak-password problem: Chaos, criticality, and encrypted p-CAPTCHAs. EPL (Europhysics Letters) 95(5):50007. https:\/\/doi.org\/10.1209\/0295-5075\/95\/50007","journal-title":"EPL (Europhysics Letters)"},{"key":"13734_CR12","doi-asserted-by":"publisher","unstructured":"Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. In 2002 IEEE international symposium on circuits and systems. Proceedings (cat. No. 02CH37353) (Vol. 2, pp. II-II). IEEE. https:\/\/doi.org\/10.1109\/ISCAS.2002.1011451","DOI":"10.1109\/ISCAS.2002.1011451"},{"issue":"5","key":"13734_CR13","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240\u20131248. https:\/\/doi.org\/10.1016\/j.compeleceng.2012.02.007","journal-title":"Comput Electr Eng"},{"key":"13734_CR14","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.optlastec.2014.01.015","volume":"60","author":"Y Liu","year":"2014","unstructured":"Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60:111\u2013115. https:\/\/doi.org\/10.1016\/j.optlastec.2014.01.015","journal-title":"Opt Laser Technol"},{"key":"13734_CR15","doi-asserted-by":"publisher","first-page":"105818","DOI":"10.1016\/j.optlastec.2019.105818","volume":"121","author":"M Mahmud","year":"2020","unstructured":"Mahmud M, Lee M, Choi JY (2020) Evolutionary-based image encryption using RNA codons truth table. Opt Laser Technol 121:105818. https:\/\/doi.org\/10.1016\/j.optlastec.2019.105818","journal-title":"Opt Laser Technol"},{"key":"13734_CR16","volume-title":"Analysis of step-reduced SHA-256. In international workshop on fast software encryption (pp. 126-143)","author":"F Mendel","year":"2006","unstructured":"Mendel F, Pramstaller N, Rechberger C, Rijmen V (2006) Analysis of step-reduced SHA-256. In international workshop on fast software encryption (pp. 126-143). Springer, Berlin, Heidelberg"},{"key":"13734_CR17","doi-asserted-by":"publisher","first-page":"163505","DOI":"10.1016\/j.ijleo.2019.163505","volume":"202","author":"H Nematzadeh","year":"2020","unstructured":"Nematzadeh H, Enayatifar R, Yadollahi M, Lee M, Jeong G (2020) Binary search tree image encryption with DNA. Optik 202:163505. https:\/\/doi.org\/10.1016\/j.ijleo.2019.163505","journal-title":"Optik"},{"key":"13734_CR18","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.jisa.2019.02.006","volume":"46","author":"KAK Patro","year":"2019","unstructured":"Patro KAK, Acharya B (2019) An efficient colour image encryption scheme based on 1-D chaotic maps. J Inf Secur Appl 46:23\u201341. https:\/\/doi.org\/10.1016\/j.jisa.2019.02.006","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"13734_CR19","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1007\/s12652-019-01385-0","volume":"11","author":"PS Sneha","year":"2020","unstructured":"Sneha PS, Sankar S, Kumar AS (2020) A chaotic colour image encryption scheme combining Walsh\u2013Hadamard transform and Arnold\u2013tent maps. J Ambient Intell Humaniz Comput 11(3):1289\u20131308. https:\/\/doi.org\/10.1007\/s12652-019-01385-0","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"13734_CR20","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16\u201336. https:\/\/doi.org\/10.1016\/j.ins.2019.08.041","journal-title":"Inf Sci"},{"issue":"1","key":"13734_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1080\/02564602.2017.1393352","volume":"36","author":"X Wang","year":"2019","unstructured":"Wang X, Wang S, Wei N, Zhang Y (2019) A novel chaotic image encryption scheme based on hash function and cyclic shift. IETE Tech Rev 36(1):39\u201348. https:\/\/doi.org\/10.1080\/02564602.2017.1393352","journal-title":"IETE Tech Rev"},{"issue":"1","key":"13734_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-66486-9","volume":"10","author":"X Wang","year":"2020","unstructured":"Wang X, Guan N, Zhao H, Wang S, Zhang Y (2020a) A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Sci Rep 10(1):1\u201315. https:\/\/doi.org\/10.1038\/s41598-020-66486-9","journal-title":"Sci Rep"},{"key":"13734_CR23","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.future.2020.04.002","volume":"110","author":"J Wang","year":"2020","unstructured":"Wang J, Han K, Fan S, Zhang Y, Tan H, Jeon G, Pang Y, Lin J (2020b) A logistic mapping-based encryption scheme for wireless body area networks. Futur Gener Comput Syst 110:57\u201367. https:\/\/doi.org\/10.1016\/j.future.2020.04.002","journal-title":"Futur Gener Comput Syst"},{"issue":"12","key":"13734_CR24","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1007\/s11434-006-2012-5","volume":"51","author":"G Xiao","year":"2006","unstructured":"Xiao G, Lu M, Qin L, Lai X (2006) New field of cryptography: DNA cryptography. Chin Sci Bull 51(12):1413\u20131420. https:\/\/doi.org\/10.1007\/s11434-006-2012-5","journal-title":"Chin Sci Bull"},{"key":"13734_CR25","doi-asserted-by":"publisher","first-page":"102505","DOI":"10.1016\/j.jisa.2020.102505","volume":"53","author":"M Yadollahi","year":"2020","unstructured":"Yadollahi M, Enayatifar R, Nematzadeh H, Lee M, Choi JY (2020) A novel image security technique based on nucleic acid concepts. J Inf Secur Appl 53:102505. https:\/\/doi.org\/10.1016\/j.jisa.2020.102505","journal-title":"J Inf Secur Appl"},{"issue":"33","key":"13734_CR26","doi-asserted-by":"publisher","first-page":"24993","DOI":"10.1007\/s11042-020-09111-1","volume":"79","author":"EZ Zefreh","year":"2020","unstructured":"Zefreh EZ (2020) An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed Tools Appl 79(33):24993\u201325022. https:\/\/doi.org\/10.1007\/s11042-020-09111-1","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13734-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13734-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13734-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T09:37:02Z","timestamp":1677058622000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13734-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["13734"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13734-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]},"assertion":[{"value":"23 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Author declares that he has no conflict of interest. Ethical approval: This article does not contain any studies with human participants or animals performed by the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}