{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T03:27:29Z","timestamp":1774236449421,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T00:00:00Z","timestamp":1678060800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T00:00:00Z","timestamp":1678060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s11042-023-14607-7","type":"journal-article","created":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T08:03:04Z","timestamp":1678089784000},"page":"33637-33662","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network"],"prefix":"10.1007","volume":"82","author":[{"given":"Priyansi","family":"Parida","sequence":"first","affiliation":[]},{"given":"Chittaranjan","family":"Pradhan","sequence":"additional","affiliation":[]},{"given":"Jafar A.","family":"Alzubi","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Javadpour","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5643-0021","authenticated-orcid":false,"given":"Mehdi","family":"Gheisari","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Cheng-Chi","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,6]]},"reference":[{"key":"14607_CR1","doi-asserted-by":"publisher","first-page":"3875","DOI":"10.1109\/ACCESS.2019.2958336","volume":"8","author":"RI Abdelfatah","year":"2019","unstructured":"Abdelfatah RI (2019) Secure image transmission using chaotic-enhanced elliptic curve cryptography. IEEE Access 8:3875\u20133890","journal-title":"IEEE Access"},{"issue":"7","key":"14607_CR2","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1007\/s00521-017-3195-1","volume":"31","author":"OM Al-Hazaimeh","year":"2019","unstructured":"Al-Hazaimeh OM, Al-Jamal MF, Alhindawi N, Omari A (2019) Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys. Neural Comput & Applic 31(7):2395\u20132405","journal-title":"Neural Comput & Applic"},{"key":"14607_CR3","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.cnsns.2017.12.017","volume":"60","author":"S Amina","year":"2018","unstructured":"Amina S, Mohamed FK (2018) An efficient and secure chaotic cipher algorithm for image content preservation. Commun Nonlinear Sci Numer Simul 60:12\u201332","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"14607_CR4","unstructured":"Brainpool ECC (2021) Elliptic Curve Cryptography(ECC) Brainpool Standard Curves and Curve Generation. Available online: https:\/\/tools.ietf.org\/html\/rfc5639\/ (Accessed on 20 May)."},{"key":"14607_CR5","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.future.2019.04.005","volume":"99","author":"A Broumandnia","year":"2019","unstructured":"Broumandnia A (2019) The 3D modular chaotic map to digital color image encryption. Futur Gener Comput Syst 99:489\u2013499","journal-title":"Futur Gener Comput Syst"},{"key":"14607_CR6","unstructured":"Brown D (2009) \u201cStandards for efficient cryptography, SEC 1: elliptic curve cryptography,\u201d Released Stand. Version, vol. 1"},{"key":"14607_CR7","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.chaos.2016.12.018","volume":"95","author":"\u00dc \u00c7avu\u0219o\u011flu","year":"2017","unstructured":"\u00c7avu\u0219o\u011flu \u00dc, Ka\u00e7ar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-Box. Chaos, Solitons Fractals 95:92\u2013101","journal-title":"Chaos, Solitons Fractals"},{"key":"14607_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"issue":"09","key":"14607_CR9","doi-asserted-by":"publisher","first-page":"1950115","DOI":"10.1142\/S0218127419501153","volume":"29","author":"G Cheng","year":"2019","unstructured":"Cheng G, Wang C, Chen H (2019) A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Int Bifurca 389 and Chaos 29(09):1950115","journal-title":"Int Bifurca 389 and Chaos"},{"issue":"09","key":"14607_CR10","doi-asserted-by":"publisher","first-page":"1950115","DOI":"10.1142\/S0218127419501153","volume":"29","author":"G Cheng","year":"2019","unstructured":"Cheng G, Wang C, Chen H (2019) A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Int J Bifurca Chaos 29(09):1950115","journal-title":"Int J Bifurca Chaos"},{"issue":"3","key":"14607_CR11","first-page":"349","volume":"30","author":"ZE Dawahdeh","year":"2018","unstructured":"Dawahdeh ZE, Yaakob SN, bin Othman RR (2018) A new image encryption technique combining elliptic curve cryptosystem with hill cipher. J King Saud Univ Inf Sci 30(3):349\u2013355","journal-title":"J King Saud Univ Inf Sci"},{"issue":"17","key":"14607_CR12","doi-asserted-by":"publisher","first-page":"14227","DOI":"10.1007\/s00521-020-04815-9","volume":"32","author":"FB Demir","year":"2020","unstructured":"Demir FB, Tuncer T, Kocamaz AF (2020) A chaotic optimization method based on logistic-sine map for numerical function optimization. Neural Comput & Applic 32(17):14227\u201314239","journal-title":"Neural Comput & Applic"},{"issue":"21","key":"14607_CR13","doi-asserted-by":"publisher","first-page":"27919","DOI":"10.1007\/s11042-018-5974-9","volume":"77","author":"Z Gan","year":"2018","unstructured":"Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three-dimensional brownian motion. Multimed Tools Appl 77(21):27919\u201327953","journal-title":"Multimed Tools Appl"},{"key":"14607_CR14","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.ijleo.2018.12.178","volume":"181","author":"C Han","year":"2019","unstructured":"Han C (2019) An image encryption algorithm based on modified logistic chaotic map. Optik 181:779\u2013785","journal-title":"Optik"},{"issue":"1","key":"14607_CR15","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/BF01608556","volume":"50","author":"M H\u00e9non","year":"1976","unstructured":"H\u00e9non M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50(1):69\u201377","journal-title":"Commun Math Phys"},{"issue":"1","key":"14607_CR16","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1049\/iet-ipr.2019.0123","volume":"14","author":"D Herbadji","year":"2020","unstructured":"Herbadji D, Belmeguenai A, Derouiche N, Liu H (2020) Colour image encryption scheme based on enhanced quadratic chaotic map. IET Image Process 14(1):40\u201352","journal-title":"IET Image Process"},{"issue":"8","key":"14607_CR17","doi-asserted-by":"publisher","first-page":"2554","DOI":"10.1073\/pnas.79.8.2554","volume":"79","author":"JJ Hopfield","year":"1982","unstructured":"Hopfield JJ (1982) Neural networks and physical systems with emergent collective computational abilities. Proc National Acad Sci, USA 79(8):2554\u20132558","journal-title":"Proc National Acad Sci, USA"},{"issue":"2","key":"14607_CR18","first-page":"95","volume":"6","author":"A Javadpour","year":"2016","unstructured":"Javadpour A, Mohammadi AR (Jun. 2016) Improving brain magnetic resonance image (MRI) segmentation via a novel algorithm based on genetic and regional growth. J Biomed Phys Eng 6(2):95\u2013108","journal-title":"J Biomed Phys Eng"},{"key":"14607_CR19","doi-asserted-by":"publisher","first-page":"106139","DOI":"10.1016\/j.optlaseng.2020.106139","volume":"133","author":"AB Joshi","year":"2020","unstructured":"Joshi AB, Kumar D, Gaffar A, Mishra DC (2020) Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform. Opt Lasers Eng 133:106139","journal-title":"Opt Lasers Eng"},{"issue":"177","key":"14607_CR20","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203\u2013209","journal-title":"Math Comput"},{"issue":"3","key":"14607_CR21","doi-asserted-by":"publisher","first-page":"3749","DOI":"10.1007\/s11042-020-09854-x","volume":"80","author":"V Kumar","year":"2021","unstructured":"Kumar V, Girdhar A (2021) A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach. Multimed Tools Appl 80(3):3749\u20133773","journal-title":"Multimed Tools Appl"},{"key":"14607_CR22","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","volume":"147","author":"DS Laiphrakpam","year":"2017","unstructured":"Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved ElGamal encryption technique. Optik (Stuttg) 147:88\u2013102","journal-title":"Optik (Stuttg)"},{"issue":"5","key":"14607_CR23","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1049\/iet-ipr.2016.0040","volume":"11","author":"H Liu","year":"2017","unstructured":"Liu H, Kadir A, Sun X (2017) Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Process 11(5):324\u2013332","journal-title":"IET Image Process"},{"key":"14607_CR24","doi-asserted-by":"publisher","first-page":"185796","DOI":"10.1109\/ACCESS.2019.2961164","volume":"7","author":"L Liu","year":"2019","unstructured":"Liu L, Zhang L, Jiang D, Guan Y, Zhang Z (2019) A simultaneous scrambling and diffusion color image encryption algorithm based on Hopfield chaotic neural network. IEEE Access 7:185796\u2013185810","journal-title":"IEEE Access"},{"issue":"2","key":"14607_CR25","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","volume":"20","author":"EN Lorenz","year":"1963","unstructured":"Lorenz EN (1963) Deterministic nonperiodic flow. J Atmos Sci 20(2):130\u2013141","journal-title":"J Atmos Sci"},{"key":"14607_CR26","doi-asserted-by":"publisher","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","volume":"8","author":"Q Lu","year":"2020","unstructured":"Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 8:25664\u201325678","journal-title":"IEEE Access"},{"issue":"4","key":"14607_CR27","doi-asserted-by":"publisher","first-page":"2293","DOI":"10.1007\/s11071-015-2481-7","volume":"83","author":"Y Luo","year":"2016","unstructured":"Luo Y, Cao L, Qiu S, Lin H, Harkin J, Liu J (2016) A chaotic map-control-based and the plain image-related cryptosystem. Nonlinear Dyn 83(4):2293\u20132310","journal-title":"Nonlinear Dyn"},{"issue":"20","key":"14607_CR28","doi-asserted-by":"publisher","first-page":"26191","DOI":"10.1007\/s11042-018-5844-5","volume":"77","author":"Y Luo","year":"2018","unstructured":"Luo Y, Zhou R, Liu J, Qiu S, Cao Y (2018) An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers. Multimed Tools Appl 77(20):26191\u201326217","journal-title":"Multimed Tools Appl"},{"key":"14607_CR29","doi-asserted-by":"publisher","first-page":"38507","DOI":"10.1109\/ACCESS.2019.2906052","volume":"7","author":"Y Luo","year":"2019","unstructured":"Luo Y, Ouyang X, Liu J, Cao L (2019) An image encryption method based on elliptic curve elgamal encryption and chaotic systems. IEEE Access 7:38507\u201338522","journal-title":"IEEE Access"},{"issue":"3","key":"14607_CR30","doi-asserted-by":"publisher","first-page":"274","DOI":"10.3390\/e22030274","volume":"22","author":"F Masood","year":"2020","unstructured":"Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A novel hybrid secure image encryption based on julia set of fractals and 3D Lorenz chaotic map. Entropy 22(3):274","journal-title":"Entropy"},{"issue":"11","key":"14607_CR31","doi-asserted-by":"publisher","first-page":"14867","DOI":"10.1007\/s11042-018-6827-2","volume":"78","author":"F Musanna","year":"2019","unstructured":"Musanna F, Kumar S (2019) A novel fractional order chaos-based image encryption using fisher yates algorithm and 3-D cat map. Multimed Tools Appl 78(11):14867\u201314895","journal-title":"Multimed Tools Appl"},{"key":"14607_CR32","first-page":"102470","volume":"52","author":"KAK Patro","year":"2020","unstructured":"Patro KAK, Soni A, Netam PK, Acharya B (2020) Multiple grayscale image encryption using cross-coupled chaotic maps. J Inf Secur Appl 52:102470","journal-title":"J Inf Secur Appl"},{"key":"14607_CR33","doi-asserted-by":"crossref","unstructured":"Ping P, Mao Y, Lv X, Xu v, Xu G (2015) \u201cAn image scrambling algorithm using discrete Henon map,\u201d in 2015 IEEE International Conference on Information and Automation, pp. 429\u2013432.","DOI":"10.1109\/ICInfA.2015.7279326"},{"issue":"1","key":"14607_CR34","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10044-018-0765-5","volume":"22","author":"AS Saljoughi","year":"2019","unstructured":"Saljoughi AS, Mirvaziri H (2019) A new method for image encryption by 3D chaotic map. Pattern Anal Applic 22(1):243\u2013257","journal-title":"Pattern Anal Applic"},{"issue":"9","key":"14607_CR35","doi-asserted-by":"publisher","first-page":"11675","DOI":"10.1007\/s11042-018-6711-0","volume":"78","author":"N Sasikaladevi","year":"2019","unstructured":"Sasikaladevi N, Geetha K, Sriharshini K, Aruna MD (2019) RADIANT-hybrid multilay391 ered chaotic image encryption system for color images. Multimed Tools Appl 392 78(9):11675\u201311700","journal-title":"Multimed Tools Appl 392"},{"key":"14607_CR36","unstructured":"C. Science, T. Dhaka (2015) \u201cRecognition paradigm using Multi-Layer Perceptorn Neural Network\u201d, pp. 21\u201323"},{"key":"14607_CR37","doi-asserted-by":"crossref","unstructured":"K. U. Shahna and A. Mohamed (2018) \u201cAn image encryption technique using logistic map and Z-order curve,\u201d in 2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR), pp. 1\u20136.","DOI":"10.1109\/ICETIETR.2018.8529138"},{"key":"14607_CR38","doi-asserted-by":"publisher","first-page":"106162","DOI":"10.1016\/j.asoc.2020.106162","volume":"90","author":"KU Shahna","year":"2020","unstructured":"Shahna KU, Mohamed A (2020) A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl Soft Comput 90:106162","journal-title":"Appl Soft Comput"},{"key":"14607_CR39","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.procs.2015.06.054","volume":"54","author":"LD Singh","year":"2015","unstructured":"Singh LD, Singh KM (2015) Image encryption using elliptic curve cryptography. Procedia Comput Sci 54:472\u2013481","journal-title":"Procedia Comput Sci"},{"issue":"11","key":"14607_CR40","doi-asserted-by":"publisher","first-page":"116117","DOI":"10.1117\/1.OE.56.11.116117","volume":"56","author":"S Sun","year":"2017","unstructured":"Sun S (2017) Chaotic image encryption scheme using two-by-two deoxyribonucleic acid complementary rules. Opt Eng 56(11):116117","journal-title":"Opt Eng"},{"key":"14607_CR41","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ins.2020.10.048","volume":"550","author":"MZ Talhaoui","year":"2021","unstructured":"Talhaoui MZ, Wang X (2021) A new fractional one dimensional chaotic map and its application in high-speed image encryption. Inf Sci (Ny) 550:13\u201326","journal-title":"Inf Sci (Ny)"},{"key":"14607_CR42","doi-asserted-by":"crossref","unstructured":"Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) \u201cImage encryption with double spiral scans and chaotic maps,\u201d Secur. Commun Networks, vol 2019.","DOI":"10.1155\/2019\/8694678"},{"key":"14607_CR43","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.sigpro.2017.06.010","volume":"141","author":"S Toughi","year":"2017","unstructured":"Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Signal Process 141:217\u2013227","journal-title":"Signal Process"},{"key":"14607_CR44","unstructured":"USC-SIPI Image Database (2021) USC Signal and Image Processing Insitute(SIPI) Image Database. Available online :http:\/\/sipi.usc.edu\/database\/(Accessed on 20 May, 2021)."},{"key":"14607_CR45","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.optlaseng.2018.11.010","volume":"115","author":"XY Wang","year":"2019","unstructured":"Wang XY, Li ZM (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107\u2013118","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"14607_CR46","doi-asserted-by":"publisher","first-page":"781","DOI":"10.3390\/app9040781","volume":"9","author":"X Wang","year":"2019","unstructured":"Wang X et al (2019) S-box based image encryption application using a chaotic system without equilibrium. Appl Sci 9(4):781","journal-title":"Appl Sci"},{"issue":"5","key":"14607_CR47","doi-asserted-by":"publisher","first-page":"6191","DOI":"10.1007\/s11042-018-6326-5","volume":"78","author":"X Wang","year":"2019","unstructured":"Wang X, Qin X, Liu C (2019) Color image encryption algorithm based on customized globally coupled map lattices. Multimed Tools Appl 78(5):6191\u20136209","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"14607_CR48","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1007\/s11071-017-3698-4","volume":"90","author":"X Wu","year":"2017","unstructured":"Wu X, Wang K, Wang X, Kan H (2017) Lossless chaotic color image cryptosystem based on DNA encryption and entropy. Nonlinear Dyn 90(2):855\u2013875","journal-title":"Nonlinear Dyn"},{"key":"14607_CR49","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"X Wu","year":"2018","unstructured":"Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272\u2013287","journal-title":"Signal Process"},{"issue":"10","key":"14607_CR50","doi-asserted-by":"publisher","first-page":"12349","DOI":"10.1007\/s11042-017-4885-5","volume":"77","author":"X Wu","year":"2018","unstructured":"Wu X, Kurths J, Kan H (2018) A robust and lossless DNA encryption scheme for color images. Multimed Tools Appl 77(10):12349\u201312376","journal-title":"Multimed Tools Appl"},{"issue":"16","key":"14607_CR51","doi-asserted-by":"publisher","first-page":"21803","DOI":"10.1007\/s11042-017-5590-0","volume":"77","author":"B Yang","year":"2018","unstructured":"Yang B, Liao X (2018) A new color image encryption scheme based on logistic map over the finite field ZN. Multimed Tools Appl 77(16):21803\u201321821","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"14607_CR52","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/TNNLS.2019.2899936","volume":"31","author":"S Yang","year":"2019","unstructured":"Yang S, Deng B, Wang J, Li H, Lu M, Che Y, Wei X, Loparo KA (2019) Scalable digital neuromorphic architecture for large-scale biophysically meaningful neural network with multi-compartment neurons. IEEE Transac Neural Netw Learn Syst 31(1):148\u2013162","journal-title":"IEEE Transac Neural Netw Learn Syst"},{"key":"14607_CR53","doi-asserted-by":"crossref","unstructured":"Yang S, Wang J, Hao X, Li H, Wei X, Deng B, Loparo KA (2021) BiCoSS: toward large-scale cognition brain with multigranular neuromorphic architecture. IEEE Transactions on Neural Networks and Learning Systems","DOI":"10.1109\/TNNLS.2020.3045492"},{"key":"14607_CR54","doi-asserted-by":"crossref","unstructured":"Yang S, Wang J, Zhang N, Deng B, Pang Y, Azghadi MR (2021) CerebelluMorphic: large-scale neuromorphic model and architecture for supervised motor learning. IEEE Transactions on Neural Networks and Learning Systems","DOI":"10.1109\/TNNLS.2021.3057070"},{"issue":"1","key":"14607_CR55","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/26\/1\/010501","volume":"26","author":"GD Ye","year":"2017","unstructured":"Ye GD, Huang XL, Zhang LY, Wang ZX (2017) A self-cited pixel summation based image encryption algorithm. Chinese Physics B 26(1):010501","journal-title":"Chinese Physics B"},{"key":"14607_CR56","doi-asserted-by":"publisher","first-page":"67085","DOI":"10.1109\/ACCESS.2020.2985839","volume":"8","author":"Z Yu","year":"2020","unstructured":"Yu Z, Abdulghani AM, Zahid A, Heidari H, Imran MA, Abbasi QH (2020) An overview of neuromorphic computing for artificial intelligence enabled hardware-based Hopfield neural network. IEEE Access 8:67085\u201367099. https:\/\/doi.org\/10.1109\/ACCESS.2020.2985839","journal-title":"IEEE Access"},{"key":"14607_CR57","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/j.compeleceng.2016.12.025","volume":"62","author":"X Zhang","year":"2017","unstructured":"Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and chaos. Comput Electr Eng 62:401\u2013413","journal-title":"Comput Electr Eng"},{"issue":"8","key":"14607_CR58","doi-asserted-by":"publisher","first-page":"80701","DOI":"10.1088\/1674-1056\/27\/8\/080701","volume":"27","author":"X-P Zhang","year":"2018","unstructured":"Zhang X-P, Guo R, Chen H-W, Zhao Z-M, Wang J-Y (2018) Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes. Chinese Phys B 27(8):80701","journal-title":"Chinese Phys B"},{"key":"14607_CR59","doi-asserted-by":"crossref","unstructured":"Zhang YQ, He Y, Li P, Wang XY (2020) A new color image encryption scheme based on 2DNLCML system and genetic operations.Optics and Lasers in Engineering, 128, 106040","DOI":"10.1016\/j.optlaseng.2020.106040"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14607-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14607-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14607-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T08:14:30Z","timestamp":1693642470000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14607-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,6]]},"references-count":59,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["14607"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14607-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,6]]},"assertion":[{"value":"1 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The paper does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}