{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:50:07Z","timestamp":1762325407884,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T00:00:00Z","timestamp":1663977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T00:00:00Z","timestamp":1663977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11042-022-13910-z","type":"journal-article","created":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T00:02:26Z","timestamp":1663977746000},"page":"13881-13903","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An efficient hybrid encryption model based on deep convolutional neural networks, deoxyribonucleic acid computing and chaotic system"],"prefix":"10.1007","volume":"82","author":[{"given":"Nazish","family":"Iqbal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5454-3770","authenticated-orcid":false,"given":"Majid","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Khurram","family":"Khurshid","sequence":"additional","affiliation":[]},{"given":"Iqtadar","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,24]]},"reference":[{"key":"13910_CR1","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2003","unstructured":"Alvarez G, Li S (2003) Cryptographic requirements for chaotic secure communications. Int J Bifurc Chaos Appl Sci Eng 16:2129\u20132151","journal-title":"Int J Bifurc Chaos Appl Sci Eng"},{"key":"13910_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sigpro.2018.11.010","volume":"157","author":"M Asgari-Chenaghlu","year":"2019","unstructured":"Asgari-Chenaghlu M, Balafar MA, Feizi-Derakhshi MR (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process 157:1\u201313","journal-title":"Signal Process"},{"key":"13910_CR3","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.ins.2020.07.007","volume":"542","author":"M Asgari-Chenaghlu","year":"2021","unstructured":"Asgari-Chenaghlu M, Feizi-Derakhshi MR, Nikzad-Khasmakhi N, Feizi-Derakhshi AR, Ramezani M, Jahanbakhsh-Nagadeh Z, Rahkar-Farshi T, Zafarani-Moattar E, Ranjbar-Khadivi M, Balafar MA (2021) Cy: chaotic yolo for user intended image encryption and sharing in social media. Inf Sci 542:212\u2013227","journal-title":"Inf Sci"},{"key":"13910_CR4","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"X Chai","year":"2019","unstructured":"Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Applic 31:219\u2013237","journal-title":"Neural Comput Applic"},{"key":"13910_CR5","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"key":"13910_CR6","doi-asserted-by":"publisher","first-page":"107684","DOI":"10.1016\/j.sigpro.2020.107684","volume":"176","author":"X Chai","year":"2020","unstructured":"Chai X, Bi J, Gan Z, Liu X, Zhang Y, Chen Y (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176:107684","journal-title":"Signal Process"},{"key":"13910_CR7","doi-asserted-by":"publisher","first-page":"107340","DOI":"10.1016\/j.sigpro.2019.107340","volume":"168","author":"C Chen","year":"2020","unstructured":"Chen C, Sun K, He S (2020) An improved image encryption algorithm with finite computing precision. Signal Process 168:107340","journal-title":"Signal Process"},{"key":"13910_CR8","doi-asserted-by":"publisher","first-page":"5162","DOI":"10.3390\/s20185162","volume":"20","author":"CL Chowdhary","year":"2020","unstructured":"Chowdhary CL, Patel PV, Kathrotia KJ, Attique M, Perumal K, Ijaz MF (2020) Analytical study of hybrid techniques for image encryption and decryption. Sensors 20:5162","journal-title":"Sensors"},{"key":"13910_CR9","doi-asserted-by":"publisher","first-page":"7365","DOI":"10.1007\/s11042-021-11803-1","volume":"81","author":"U Erkan","year":"2020","unstructured":"Erkan U, Toktas A, Engino\u011flu S, Karabacak E, Thanh DN (2020) An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN. Multimed Tools Appl 81:7365\u20137391","journal-title":"Multimed Tools Appl"},{"key":"13910_CR10","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 83:1123\u20131136","journal-title":"Nonlinear Dyn"},{"key":"13910_CR11","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s11071-018-4573-7","volume":"95","author":"S Hanis","year":"2019","unstructured":"Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:421\u2013432","journal-title":"Nonlinear Dyn"},{"key":"13910_CR12","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s11071-016-3024-6","volume":"87","author":"T Hu","year":"2017","unstructured":"Hu T, Liu Y, Gong LH, Ouyang CJ (2017) An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dyn 87:51\u201366","journal-title":"Nonlinear Dyn"},{"key":"13910_CR13","doi-asserted-by":"publisher","first-page":"5455","DOI":"10.1007\/s11042-015-2515-7","volume":"75","author":"A Jain","year":"2016","unstructured":"Jain A, Rajpal N (2016) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed Tools Appl 75:5455\u20135472","journal-title":"Multimed Tools Appl"},{"key":"13910_CR14","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.sigpro.2018.01.026","volume":"147","author":"R Lan","year":"2018","unstructured":"Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133\u2013145","journal-title":"Signal Process"},{"key":"13910_CR15","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457\u20131466","journal-title":"Appl Soft Comput"},{"key":"13910_CR16","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.optlastec.2014.01.015","volume":"60","author":"Y Liu","year":"2014","unstructured":"Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60:111\u2013115","journal-title":"Opt Laser Technol"},{"key":"13910_CR17","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.sigpro.2019.03.022","volume":"161","author":"Y Luo","year":"2019","unstructured":"Luo Y, Lin J, Liu J, Wei D, Cao L, Zhou R, Cao Y, Ding X (2019) A robust image encryption algorithm based on Chua's circuit and compressive sensing. Signal Process 161:227\u2013247","journal-title":"Signal Process"},{"key":"13910_CR18","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a \u201cchaotic\u201d encryption algorithm. Cryptologia 13:29\u201342","journal-title":"Cryptologia"},{"key":"13910_CR19","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"2018","unstructured":"Menezes AJ, Van Oorschot PC, Vanstone SA (2018) Handbook of applied cryptography. CRC Press, Boca Raton"},{"key":"13910_CR20","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.jestch.2014.04.001","volume":"17","author":"FK Mohamed","year":"2014","unstructured":"Mohamed FK (2014) A parallel block-based encryption schema for digital images using reversible cellular automata. Eng Sci Technol an Int 17:85\u201394","journal-title":"Eng Sci Technol an Int"},{"key":"13910_CR21","doi-asserted-by":"publisher","first-page":"105678","DOI":"10.1109\/ACCESS.2021.3099004","volume":"9","author":"N Munir","year":"2021","unstructured":"Munir N, Khan M, Hazzazi MM, Aljaedi A, Haj Ismail AAK, Alharbi AR, Hussain I (2021) Cryptanalysis of internet of health things encryption scheme based on chaotic maps. IEEE Access 9:105678\u2013105685","journal-title":"IEEE Access"},{"key":"13910_CR22","doi-asserted-by":"publisher","first-page":"168989","DOI":"10.1016\/j.ijleo.2022.168989","volume":"259","author":"N Munir","year":"2022","unstructured":"Munir N, Khan M, Hussain I, Amin M (2022) Differential cryptanalysis of diffusion and confusion-based information confidentiality mechanism. Optik 259:168989","journal-title":"Optik"},{"key":"13910_CR23","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225\u2013237","journal-title":"Opt Lasers Eng"},{"key":"13910_CR24","first-page":"1663","volume":"223","author":"HT Panduranga","year":"2014","unstructured":"Panduranga HT, Kumar SN (2014) Image encryption based on permutation-substitution using chaotic map and latin square image cipher. Eur Phys J: Spec Top 223:1663\u20131677","journal-title":"Eur Phys J: Spec Top"},{"key":"13910_CR25","doi-asserted-by":"publisher","first-page":"67581","DOI":"10.1109\/ACCESS.2018.2879565","volume":"6","author":"P Ping","year":"2018","unstructured":"Ping P, Fan J, Mao Y, Xu F, Gao J (2018) A chaos based image encryption scheme using digit-level permutation and block diffusion. IEEE Access 6:67581\u201367593","journal-title":"IEEE Access"},{"key":"13910_CR26","first-page":"277","volume":"320","author":"AS Rajput","year":"2015","unstructured":"Rajput AS, Sharma M (2015) A novel image encryption and authentication scheme using chaotic maps. J Adv Comput Intell 320:277\u2013286","journal-title":"J Adv Comput Intell"},{"key":"13910_CR27","doi-asserted-by":"publisher","first-page":"4655","DOI":"10.1007\/s11042-013-1828-7","volume":"74","author":"A Rehman","year":"2015","unstructured":"Rehman A, Liao X, Kulsoom A, Abbas S (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74:4655\u20134677","journal-title":"Multimed Tools Appl"},{"key":"13910_CR28","doi-asserted-by":"publisher","first-page":"18762","DOI":"10.1109\/ACCESS.2021.3054250","volume":"9","author":"J Tamang","year":"2021","unstructured":"Tamang J, Dieu Nkapkop JD, Ijaz MF, Prasad PK, Tsafack N, Saha A, Kengne J, Son Y (2021) Dynamical properties of ion-acoustic waves in space plasma and its application to image encryption. IEEE Access 9:18762\u201318782","journal-title":"IEEE Access"},{"key":"13910_CR29","doi-asserted-by":"publisher","first-page":"493","DOI":"10.3390\/sym14030493","volume":"14","author":"CML Toundi","year":"2022","unstructured":"Toundi CML, Nkapkop JDD, Tsafack N, Ngono JM, Ele P, Wozniak M, Shafi J, Ijaz MF (2022) A novel compound-coupled hyperchaotic map for image encryption. Symmetry 14:493","journal-title":"Symmetry"},{"key":"13910_CR30","doi-asserted-by":"publisher","first-page":"6229","DOI":"10.1007\/s11042-016-3311-8","volume":"76","author":"X Wang","year":"2017","unstructured":"Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76:6229\u20136245","journal-title":"Multimed Tools Appl"},{"key":"13910_CR31","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Laser Technol 73:53\u201361","journal-title":"Opt Laser Technol"},{"key":"13910_CR32","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1038\/171737a0","volume":"171","author":"JD Watson","year":"1953","unstructured":"Watson JD, Crick FHC (1953) A structure for deoxyribose nucleic acid. Nature 171:737\u2013738","journal-title":"Nature"},{"key":"13910_CR33","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Sel Areas in Telecommun (JSAT) 1:31\u201338","journal-title":"J Sel Areas in Telecommun (JSAT)"},{"key":"13910_CR34","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Yang B (2018) Image encryption using 2D H\u00e9non-sine map and DNA approach. Signal Process 153:11\u201323","journal-title":"Signal Process"},{"key":"13910_CR35","doi-asserted-by":"publisher","first-page":"107373","DOI":"10.1016\/j.sigpro.2019.107373","volume":"169","author":"F Yang","year":"2020","unstructured":"Yang F, Mou J, Liu J, Ma C, Yan H (2020) Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application. Signal Process 169:107373","journal-title":"Signal Process"},{"key":"13910_CR36","doi-asserted-by":"publisher","first-page":"106553","DOI":"10.1016\/j.optlastec.2020.106553","volume":"133","author":"Y Yang","year":"2021","unstructured":"Yang Y, Wang L, Duan S, Luo L (2021) Dynamical analysis and image encryption application of a novel memristive hyperchaotic system. Opt Laser Technol 133:106553","journal-title":"Opt Laser Technol"},{"key":"13910_CR37","doi-asserted-by":"publisher","first-page":"24993","DOI":"10.1007\/s11042-020-09111-1","volume":"79","author":"EZ Zefreh","year":"2020","unstructured":"Zefreh EZ (2020) An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed Tools Appl 79:24993\u201325022","journal-title":"Multimed Tools Appl"},{"key":"13910_CR38","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.26.1.013021","volume":"26","author":"K Zhan","year":"2017","unstructured":"Zhan K, Wei D, Shi J, Yu J (2017) Cross-utilizing hyperchaotic and DNA sequences for image encryption. J Electron Imaging 26:013021","journal-title":"J Electron Imaging"},{"key":"13910_CR39","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1007\/s11071-014-1235-2","volume":"76","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Xiao D, Wen W, Li M (2014) Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Nonlinear Dyn 76:1645\u20131650","journal-title":"Nonlinear Dyn"},{"key":"13910_CR40","first-page":"Article ID 6102","volume":"2020","author":"X Zhang","year":"2020","unstructured":"Zhang X, Wang L, Wang Y, Niu Y, Li Y (2020) An image encryption algorithm based on hyperchaotic system and variable-step Josephus problem. Int J Optoelectron 2020:Article ID 6102824","journal-title":"Int J Optoelectron"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13910-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13910-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13910-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T10:27:22Z","timestamp":1679394442000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13910-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,24]]},"references-count":40,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["13910"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13910-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,9,24]]},"assertion":[{"value":"12 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}