{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T17:45:42Z","timestamp":1758476742756},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T00:00:00Z","timestamp":1668038400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T00:00:00Z","timestamp":1668038400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Natural Science Foundation of Gansu Province","award":["20JR5RA531"],"award-info":[{"award-number":["20JR5RA531"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11042-022-14026-0","type":"journal-article","created":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T02:02:32Z","timestamp":1668045752000},"page":"21509-21534","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Dynamical analysis of four-dimensional chaotic system and its application in image encryption"],"prefix":"10.1007","volume":"82","author":[{"given":"Shaohui","family":"Yan","sequence":"first","affiliation":[]},{"given":"Binxian","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Ertong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,10]]},"reference":[{"key":"14026_CR1","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.sigpro.2019.06.013","volume":"164","author":"M Alawida","year":"2019","unstructured":"Alawida M, Teh JS, et al. (2019) An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process 164:249\u2013266","journal-title":"Signal Process"},{"key":"14026_CR2","doi-asserted-by":"publisher","first-page":"18043","DOI":"10.1007\/s11042-020-10288-8","volume":"80","author":"NR Babu","year":"2021","unstructured":"Babu NR, Kalpana M, et al. (2021) A novel audio encryption approach via finite-time synchronization of fractional order hyperchaotic system. Multimed Tools Appl 80:18043\u201318067","journal-title":"Multimed Tools Appl"},{"key":"14026_CR3","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/TII.2020.2992438","volume":"17","author":"H Bao","year":"2021","unstructured":"Bao H, Hua Z, et al. (2021) Initials-boosted coexisting chaos in a 2-D sine map and its hardware implementation. IEEE Trans Industr Inform 17:1132\u20131140","journal-title":"IEEE Trans Industr Inform"},{"key":"14026_CR4","doi-asserted-by":"publisher","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","volume":"99","author":"MA BenFarah","year":"2020","unstructured":"BenFarah MA, Farah A, et al. (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn 99:3041\u20133064","journal-title":"Nonlinear Dyn"},{"key":"14026_CR5","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1007\/s11042-015-3088-1","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76:1159\u20131175","journal-title":"Multimed Tools Appl"},{"key":"14026_CR6","doi-asserted-by":"publisher","first-page":"1706","DOI":"10.1631\/FITEE.1900360","volume":"20","author":"M Chen","year":"2019","unstructured":"Chen M, Ren X, et al. (2019) Periodically varied initial offset boosting behaviors in a memristive system with cosine memductance. Front Inform Technol Electron Eng 20:1706\u20131716","journal-title":"Front Inform Technol Electron Eng"},{"key":"14026_CR7","doi-asserted-by":"publisher","first-page":"127211","DOI":"10.1016\/j.optcom.2021.127211","volume":"499","author":"W Dong","year":"2021","unstructured":"Dong W, Li Q et al (2021) A robust and multi chaotic DNA image encryption with pixel-value pseudorandom substitution scheme. Opt Commun 499:127211","journal-title":"Opt Commun"},{"key":"14026_CR8","doi-asserted-by":"publisher","unstructured":"Feudjio ER, Tamba VK et al Dynamic analysis of a hyperchaotic hyperjerk circuit, FPGA implementation and its application in RNG for medical images encryption. Transactions of the Indian National Academy of Engineering. https:\/\/doi.org\/10.1007\/s41403-022-00326-2","DOI":"10.1007\/s41403-022-00326-2"},{"key":"14026_CR9","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","volume":"115","author":"L Gong","year":"2019","unstructured":"Gong L, Qiu K, et al. (2019) An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt Laser Technol 115:257\u2013267","journal-title":"Opt Laser Technol"},{"key":"14026_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.optlaseng.2019.03.006","volume":"121","author":"L Gong","year":"2019","unstructured":"Gong L, Qiu K, et al. (2019) An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt Lasers Eng 121:169\u2013180","journal-title":"Opt Lasers Eng"},{"key":"14026_CR11","doi-asserted-by":"publisher","first-page":"8603","DOI":"10.1007\/s11042-017-4754-2","volume":"77","author":"Y Himeur","year":"2018","unstructured":"Himeur Y, Boukabou A (2018) A robust encryption, secure key-frames based video watermarking system using chaotic. Multimed Tools Appl 77:8603\u20138627","journal-title":"Multimed Tools Appl"},{"key":"14026_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"ZY Hua","year":"2016","unstructured":"Hua ZY, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map. Inform Sci 339:237\u2013253","journal-title":"Inform Sci"},{"key":"14026_CR13","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1049\/iet-ipr.2019.0551","volume":"14","author":"H Huang","year":"2020","unstructured":"Huang H, Yang S, et al. (2020) Efficient symmetric image encryption by using a novel 2D chaotic system. IET Image Process 14:1157\u20131163","journal-title":"IET Image Process"},{"key":"14026_CR14","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2018.12.002","volume":"115","author":"H Li","year":"2019","unstructured":"Li H, Wang Y, Zuo Z (2019) Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms. Opt Lasers Eng 115:197\u2013207","journal-title":"Opt Lasers Eng"},{"key":"14026_CR15","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/JSTSP.2020.3002391","volume":"14","author":"X Liao","year":"2020","unstructured":"Liao X, Li K, et al. (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Selected Topics Signal Process 14:955\u2013968","journal-title":"IEEE J Selected Topics Signal Process"},{"key":"14026_CR16","first-page":"897","volume":"19","author":"X Liao","year":"2022","unstructured":"Liao X, Yin J, et al. (2022) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Depend Ana Secur Comput 19:897\u2013911","journal-title":"IEEE Trans Depend Ana Secur Comput"},{"key":"14026_CR17","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu Y, et al. (2020) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Vid Technol 30:685\u2013696","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"key":"14026_CR18","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.optlastec.2014.01.015","volume":"60","author":"Y Liu","year":"2014","unstructured":"Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60:111\u2013115","journal-title":"Opt Laser Technol"},{"key":"14026_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.ins.2021.02.022","volume":"563","author":"A Mansouria","year":"2021","unstructured":"Mansouria A, Wang X (2021) A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme. Inform Sci 563:91\u2013110","journal-title":"Inform Sci"},{"key":"14026_CR20","doi-asserted-by":"publisher","first-page":"105708","DOI":"10.1016\/j.cnsns.2021.105708","volume":"96","author":"S Moon","year":"2021","unstructured":"Moon S, Baik J et al (2021) Chaos synchronization in generalized Lorenz systems and an application to image encryption. Commun Nonlinear Sci Numer Simulat 96:105708","journal-title":"Commun Nonlinear Sci Numer Simulat"},{"key":"14026_CR21","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s40010-021-00763-8","volume":"91","author":"P Muthukumar","year":"2021","unstructured":"Muthukumar P, Babu NR, et al. (2021) Detecting critical point of fractional-order chemical system with synchronization and application to image enhancement technique. Proceedings of the National Academy of Sciences India Section A: Physical Sciences 91:661\u2013674","journal-title":"Proceedings of the National Academy of Sciences India Section A: Physical Sciences"},{"key":"14026_CR22","doi-asserted-by":"publisher","first-page":"165661","DOI":"10.1016\/j.ijleo.2020.165661","volume":"224","author":"SYD Nezhad","year":"2020","unstructured":"Nezhad SYD, Safdarian N et al (2020) New method for fingerprint images encryption using DNA sequence and chaotic tent map. Optik - International Journal for Light and Electron Optics 224:165661","journal-title":"Optik - International Journal for Light and Electron Optics"},{"key":"14026_CR23","doi-asserted-by":"publisher","first-page":"3979","DOI":"10.1007\/s11071-020-05719-y","volume":"100","author":"M Roohi","year":"2020","unstructured":"Roohi M, Zhang C, et al. (2020) Adaptive model free synchronization of different fractional order neural networks with an application in cryptography. Nonlinear Dyn 100:3979\u20134001","journal-title":"Nonlinear Dyn"},{"key":"14026_CR24","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.ins.2020.10.031","volume":"550","author":"A Sahasrabuddhe","year":"2021","unstructured":"Sahasrabuddhe A, Laiphrakpam DS (2021) Multiple images encryption based on 3D scrambling and hyper-chaotic system. Inform Sci 550:252\u2013267","journal-title":"Inform Sci"},{"key":"14026_CR25","doi-asserted-by":"publisher","first-page":"34773","DOI":"10.1007\/s11042-019-08071-5","volume":"78","author":"A Shakiba","year":"2019","unstructured":"Shakiba A (2019) A novel randomized one-dimensional chaotic Chebyshev mapping for chosen plaintext attack secure image encryption with a novel chaotic breadth first traversal. Multimed Tools Appl 78:34773\u201334799","journal-title":"Multimed Tools Appl"},{"key":"14026_CR26","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell System Tech J 27:379\u2013423","journal-title":"Bell System Tech J"},{"key":"14026_CR27","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ins.2020.10.048","volume":"550","author":"MZ Talhaouia","year":"2021","unstructured":"Talhaouia MZ, Wang X (2021) A new fractional one dimensional chaotic map and its application in high-speed image encryption. Inform Sci 550:13\u201326","journal-title":"Inform Sci"},{"key":"14026_CR28","doi-asserted-by":"publisher","first-page":"106837","DOI":"10.1016\/j.optlastec.2020.106837","volume":"138","author":"X Wang","year":"2021","unstructured":"Wang X, Chen S et al (2021) A chaotic image encryption algorithm based on random dynamic mixing. Opt Laser Technol 138:106837","journal-title":"Opt Laser Technol"},{"key":"14026_CR29","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.ijnonlinmec.2019.02.009","volume":"111","author":"M Wang","year":"2019","unstructured":"Wang M, Deng Y, et al. (2019) Dynamics and circuit implementation of a four-wing memristive chaotic system with attractor rotation. Int J Non-Linear Mech 111:149\u2013159","journal-title":"Int J Non-Linear Mech"},{"key":"14026_CR30","doi-asserted-by":"publisher","first-page":"2797","DOI":"10.1007\/s11071-018-4723-y","volume":"95","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, et al. (2019) A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn 95:2797\u20132824","journal-title":"Nonlinear Dyn"},{"key":"14026_CR31","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inform Sci 507:16\u201336","journal-title":"Inform Sci"},{"key":"14026_CR32","doi-asserted-by":"publisher","first-page":"105851","DOI":"10.1016\/j.optlaseng.2019.105851","volume":"125","author":"X Wang","year":"2020","unstructured":"Wang X, Wang Y et al (2020) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Opt Lasers Eng 125:105851","journal-title":"Opt Lasers Eng"},{"key":"14026_CR33","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"Y Xian","year":"2021","unstructured":"Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inform Sci 547:1154\u20131169","journal-title":"Inform Sci"},{"key":"14026_CR34","doi-asserted-by":"publisher","first-page":"124993","DOI":"10.1016\/j.physa.2020.124993","volume":"558","author":"B Xin","year":"2020","unstructured":"Xin B, Peng W et al (2020) A discrete fractional-order Cournot duopoly game. Physica A 558:124993","journal-title":"Physica A"},{"key":"14026_CR35","doi-asserted-by":"publisher","first-page":"125257","DOI":"10.1088\/1402-4896\/ac379b","volume":"96","author":"S Yan","year":"2021","unstructured":"Yan S, Wang E et al (2021) Analysis, circuit implementation and synchronization control of a hyperchaotic system. Phys Scr 96:125257","journal-title":"Phys Scr"},{"key":"14026_CR36","doi-asserted-by":"publisher","first-page":"106553","DOI":"10.1016\/j.optlastec.2020.106553","volume":"133","author":"Y Yang","year":"2021","unstructured":"Yang Y, Wanga L et al (2021) Dynamical analysis and image encryption application of a novel memristive hyperchaotic system. Opt Laser Technol 133:106553","journal-title":"Opt Laser Technol"},{"key":"14026_CR37","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1007\/s11071-019-05370-2","volume":"99","author":"X Ye","year":"2020","unstructured":"Ye X, Wang X, et al. (2020) A new chaotic circuit with multiple memristors and its application in image encryption. Nonlinear Dyn 99:1489\u20131506","journal-title":"Nonlinear Dyn"},{"key":"14026_CR38","doi-asserted-by":"publisher","first-page":"105905","DOI":"10.1016\/j.optlaseng.2019.105905","volume":"127","author":"X Ye","year":"2020","unstructured":"Ye X, Wang X et al (2020) A new random diffusion algorithm based on the multi-scroll Chua\u2019s chaotic circuit system. Opt Lasers Eng 127:105905","journal-title":"Opt Lasers Eng"},{"key":"14026_CR39","doi-asserted-by":"publisher","unstructured":"Yildirim M (2021) Optical color image encryption scheme with a novel DNA encoding algorithm based on a chaotic circuit. Chaos, Solitons Fractals. https:\/\/doi.org\/10.1016\/j.chaos.2021.111631","DOI":"10.1016\/j.chaos.2021.111631"},{"key":"14026_CR40","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-Box. Inform Sci 450:361\u2013377","journal-title":"Inform Sci"},{"key":"14026_CR41","doi-asserted-by":"publisher","first-page":"110761","DOI":"10.1016\/j.chaos.2021.110761","volume":"145","author":"S Zhang","year":"2021","unstructured":"Zhang S, Zheng J et al (2021) A novel no-equilibrium HR neuron model with hidden homogeneous extreme multistability. Chaos Solitons Fractals 145:110761","journal-title":"Chaos Solitons Fractals"},{"key":"14026_CR42","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1007\/s11071-019-04828-7","volume":"96","author":"L Zhou","year":"2019","unstructured":"Zhou L, Tan F (2019) A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks. Nonlinear Dyn 96:869\u2013883","journal-title":"Nonlinear Dyn"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14026-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-14026-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14026-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T09:19:32Z","timestamp":1685006372000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-14026-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,10]]},"references-count":42,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["14026"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-14026-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,10]]},"assertion":[{"value":"26 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}