{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:34:31Z","timestamp":1764333271319,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T00:00:00Z","timestamp":1679356800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T00:00:00Z","timestamp":1679356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11042-023-14794-3","type":"journal-article","created":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T07:02:50Z","timestamp":1679382170000},"page":"36793-36814","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Secured image storage and transmission technique suitable for IoT using Tangle and a novel image encryption technique"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2771-9950","authenticated-orcid":false,"given":"Rajitha","family":"B","sequence":"first","affiliation":[]},{"given":"Nishkarsh","family":"Makhija","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,21]]},"reference":[{"key":"14794_CR1","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16.08","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifur Chaos 16.08:2129\u20132151","journal-title":"Int J Bifur Chaos"},{"issue":"3","key":"14794_CR2","doi-asserted-by":"publisher","first-page":"033112","DOI":"10.1063\/1.2959102","volume":"18","author":"D Arroyo","year":"2008","unstructured":"Arroyo D, Rhouma R, Alvarez G, Li S, Fernandez V (2008) On the security of a new image encryption scheme based on chaotic map lattices. CHAOS: Interdiscip J Nonlinear Sci 18(3):033112","journal-title":"CHAOS: Interdiscip J Nonlinear Sci"},{"key":"14794_CR3","doi-asserted-by":"crossref","unstructured":"Bauer DP (2022) InterPlanetary file system. In: Getting started with ethereum. Apress, Berkeley, pp 83\u201396","DOI":"10.1007\/978-1-4842-8045-4_7"},{"key":"14794_CR4","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"key":"14794_CR5","doi-asserted-by":"publisher","first-page":"107684","DOI":"10.1016\/j.sigpro.2020.107684","volume":"176","author":"X Chai","year":"2020","unstructured":"Chai X, Bi J, Gan Z, Liu X, Zhang Y, Chen Y (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176:107684","journal-title":"Signal Process"},{"key":"14794_CR6","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"key":"14794_CR7","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21.3","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21.3:749\u2013761","journal-title":"Chaos, Solitons Fractals"},{"issue":"5","key":"14794_CR8","doi-asserted-by":"publisher","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","volume":"6","author":"HN Dai","year":"2019","unstructured":"Dai HN, Zheng Z, Zhang Y (2019) Blockchain for internet of things: a survey. IEEE Internet Things J 6(5):8076\u20138094","journal-title":"IEEE Internet Things J"},{"key":"14794_CR9","doi-asserted-by":"crossref","unstructured":"Elkandoz MT, Alexan W (2022) Image encryption based on a combination of multiple chaotic maps. Multimed Tools Appl, 1\u201322","DOI":"10.1007\/s11042-022-12595-8"},{"issue":"6","key":"14794_CR10","first-page":"360","volume":"8","author":"S Farwa","year":"2017","unstructured":"Farwa S, Shah T, Muhammad N, Bibi N, Jahangir A, Arshad S (2017) An image encryption technique based on chaotic S-box and Arnold transform. Int J Adv Comput Sci Appl 8(6):360\u2013364","journal-title":"Int J Adv Comput Sci Appl"},{"key":"14794_CR11","doi-asserted-by":"crossref","unstructured":"Fu C, Zhang G-y, Zhu M, Chen Z, Lei Wei-min (2018) A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy. Security and Communication Networks, 2018","DOI":"10.1155\/2018\/2708532"},{"issue":"3","key":"14794_CR12","doi-asserted-by":"publisher","first-page":"42","DOI":"10.4018\/IJISP.2018070104","volume":"12","author":"S Geetha","year":"2018","unstructured":"Geetha S, Punithavathi P, Infanteena AM, Sindhu SS (2018) A literature review on image encryption techniques. Int J Inform Secur Privacy (IJISP) 12(3):42\u201383","journal-title":"Int J Inform Secur Privacy (IJISP)"},{"key":"14794_CR13","doi-asserted-by":"publisher","first-page":"12452","DOI":"10.1109\/ACCESS.2020.2965740","volume":"8","author":"X Hu","year":"2020","unstructured":"Hu X, Wei L, Chen W, Chen Q, Guo Y (2020) Color image encryption algorithm based on dynamic chaos and matrix convolution. IEEE Access 8:12452\u201312466","journal-title":"IEEE Access"},{"issue":"3","key":"14794_CR14","doi-asserted-by":"publisher","first-page":"2557","DOI":"10.1109\/TIE.2017.2736515","volume":"65","author":"Z Hua","year":"2017","unstructured":"Hua Z, Zhou B, Zhou Y (2017) Sine-transform-based chaotic system with FPGA implementation. IEEE Trans Industr Electron 65(3):2557\u201366","journal-title":"IEEE Trans Industr Electron"},{"issue":"2","key":"14794_CR15","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1109\/TIE.2018.2833049","volume":"66","author":"Z Hua","year":"2018","unstructured":"Hua Z, Zhou B, Zhou Y (2018) Sine chaotification model for enhancing chaos and its hardware implementation. IEEE Trans Industr Electron 66 (2):1273\u201384","journal-title":"IEEE Trans Industr Electron"},{"issue":"1","key":"14794_CR16","doi-asserted-by":"publisher","first-page":"254","DOI":"10.3390\/s21010254","volume":"21","author":"K Javan","year":"2021","unstructured":"Javan K, Akbar A, Shoeibi A, Zare A, Izadi NH, Jafari M, Alizadehsani R, Moridian P, Mosavi A, Rajendra Acharya U, Nahavandi S (2021) Design of adaptive-robust controller for multi-state synchronization of chaotic systems with unknown and time-varying delays and its application in secure communication. Sensors 21(1):254","journal-title":"Sensors"},{"issue":"11","key":"14794_CR17","doi-asserted-by":"publisher","first-page":"3925","DOI":"10.3390\/s21113925","volume":"21","author":"AAK Javan","year":"2021","unstructured":"Javan AAK, Jafari M, Shoeibi A, Zare A, Khodatars M, Ghassemi N, Alizadehsani R, Gorriz JM (2021) Medical images encryption based on adaptive-robust multi-mode synchronization of chen hyper-chaotic systems. Sensors 21 (11):3925","journal-title":"Sensors"},{"issue":"2","key":"14794_CR18","first-page":"175","volume":"22","author":"PW Khan","year":"2020","unstructured":"Khan PW, Byun Y (2020) A blockchain-based secure image encryption scheme for the industrial. Intern Things Entropy 22(2):175","journal-title":"Intern Things Entropy"},{"issue":"18","key":"14794_CR19","doi-asserted-by":"publisher","first-page":"26203","DOI":"10.1007\/s11042-019-07818-4","volume":"78","author":"M Khan","year":"2019","unstructured":"Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78 (18):26203\u201326222","journal-title":"Multimed Tools Appl"},{"key":"14794_CR20","unstructured":"Lerner S (2015) Dagcoin draft. Online manuscript"},{"key":"14794_CR21","doi-asserted-by":"crossref","unstructured":"Li Y, Cao B, Peng M, Zhang L, Zhang L, Feng D, Yu J (2019) Direct acyclic graph based blockchain for internet of things: Performance and security analysis. arXiv:1905.10925","DOI":"10.1109\/CyberC.2019.00044"},{"issue":"9","key":"14794_CR22","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.1016\/j.imavis.2008.12.008","volume":"27","author":"C Li","year":"2009","unstructured":"Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27 (9):1371\u201381","journal-title":"Image Vis Comput"},{"issue":"3","key":"14794_CR23","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.1007\/s11071-013-0924-6","volume":"73","author":"C Li","year":"2013","unstructured":"Li C, Liu Y, Xie T, Chen MZQ (2013) Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlin Dynam 73 (3):2083\u20132089","journal-title":"Nonlin Dynam"},{"issue":"15","key":"14794_CR24","doi-asserted-by":"publisher","first-page":"16511","DOI":"10.1007\/s11042-016-3925-x","volume":"76","author":"L Liu","year":"2017","unstructured":"Liu L, Miao S (2017) An image encryption algorithm based on Baker map with varying parameter. Multimed Tools Appl 76(15):16511\u201316527","journal-title":"Multimed Tools Appl"},{"key":"14794_CR25","doi-asserted-by":"publisher","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","volume":"8","author":"Q Lu","year":"2020","unstructured":"Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 8:25664\u201325678","journal-title":"IEEE Access"},{"key":"14794_CR26","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.future.2019.09.050","volume":"102","author":"SN Mohanty","year":"2020","unstructured":"Mohanty SN, Ramya KC, Sheeba Rani S, Gupta D, Shankar K, Lakshmanaprabu SK, Khanna A (2020) An efficient lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Futur Gener Comput Syst 102:1027\u20131037","journal-title":"Futur Gener Comput Syst"},{"issue":"8","key":"14794_CR27","doi-asserted-by":"publisher","first-page":"10013","DOI":"10.1007\/s11042-018-6612-2","volume":"78","author":"YPK Nkandeu","year":"2019","unstructured":"Nkandeu YPK, Tiedeu A (2019) An image encryption algorithm based on substitution technique and chaos mixing. Multimed Tools Appl 78 (8):10013\u201310034","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"14794_CR28","doi-asserted-by":"publisher","first-page":"337","DOI":"10.5624\/isd.20210144","volume":"51","author":"K Orhan","year":"2021","unstructured":"Orhan K, Bayrakdar IS, Celik O, Ayan B, Polat E (2021) Can the blockchain-enabled interplanetary file system (Block-IPFS) be a solution for securely transferring imaging data for artificial intelligence research in oral and maxillofacial radiology? Imaging Sci Dent 51(3):337\u2013339","journal-title":"Imaging Sci Dent"},{"key":"14794_CR29","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.optlastec.2017.10.024","volume":"101","author":"R Parvaz","year":"2018","unstructured":"Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101:30\u201341","journal-title":"Opt Laser Technol"},{"key":"14794_CR30","unstructured":"Popov S (2018) The tangle. White paper, 1(3)"},{"key":"14794_CR31","doi-asserted-by":"publisher","first-page":"61334","DOI":"10.1109\/ACCESS.2021.3073514","volume":"9","author":"X Qian","year":"2021","unstructured":"Qian X, Qi Y, Li Q, Liu Q, Wu Y, Wang W (2021) A novel color image encryption algorithm based on three-dimensional chaotic maps and reconstruction techniques. IEEE Access 9:61334\u201361345","journal-title":"IEEE Access"},{"key":"14794_CR32","doi-asserted-by":"crossref","unstructured":"Sadeghi D, Shoeibi A, Ghassemi N, Moridian P, Khadem A, Alizadehsani R, Teshnehlab M et al (2022) An overview of artificial intelligence techniques for diagnosis of Schizophrenia based on magnetic resonance imaging modalities: methods, challenges, and future works. Computers in Biology and Medicine, 105554","DOI":"10.1016\/j.compbiomed.2022.105554"},{"issue":"5","key":"14794_CR33","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MNET.001.1800503","volume":"33","author":"M Shen","year":"2019","unstructured":"Shen M, Deng Y, Zhu L, Du X, Guizani N (2019) Privacy-preserving image retrieval for medical IoT systems: a blockchain-based approach. IEEE Netw 33(5):27\u201333","journal-title":"IEEE Netw"},{"key":"14794_CR34","doi-asserted-by":"crossref","unstructured":"Shoeibi A, Ghassemi N, Heras J, Rezaei M, Gorriz JM (2022) Automatic diagnosis of myocarditis in cardiac magnetic images using CycleGAN and deep PreTrained models. In: International work-conference on the interplay between natural and artificial computation. Springer, Cham, pp 145\u2013155","DOI":"10.1007\/978-3-031-06242-1_15"},{"key":"14794_CR35","doi-asserted-by":"crossref","unstructured":"Shoeibi A, Ghassemi N, Khodatars M, Moridian P, Khosravi A, Zare A, Gorriz JM, Chale-Chale AH, Khadem A, Acharya UR (2022) Automatic diagnosis of schizophrenia and attention deficit hyperactivity disorder in rs-fMRI modality using convolutional autoencoder model and interval type-2 fuzzy regression. arXiv:2205.15858","DOI":"10.1007\/s11571-022-09897-w"},{"key":"14794_CR36","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.future.2020.05.047","volume":"112","author":"WF Silvano","year":"2020","unstructured":"Silvano WF, Marcelino R (2020) Iota tangle: a cryptocurrency to communicate internet-of-things data. Futur Gener Comput Syst 112:307\u2013319","journal-title":"Futur Gener Comput Syst"},{"key":"14794_CR37","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.optlaseng.2016.11.022","volume":"91","author":"P Singh","year":"2017","unstructured":"Singh P, Yadav AK, Singh K (2017) Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt Lasers Eng 91:187\u2013195","journal-title":"Opt Lasers Eng"},{"key":"14794_CR38","first-page":"541","volume":"3027","author":"M Szydlo","year":"2004","unstructured":"Szydlo M (2004) Merkle tree traversal in log space and time. Eurocrypt 3027:541\u2013554","journal-title":"Eurocrypt"},{"key":"14794_CR39","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.optlastec.2019.02.009","volume":"115","author":"X Wang","year":"2019","unstructured":"Wang X, Zhao H, Wang M (2019) A new image encryption algorithm with nonlinear-diffusion based on multiple coupled map lattices. Opt Laser Technol 115:42\u201357","journal-title":"Opt Laser Technol"},{"key":"14794_CR40","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.optlaseng.2017.06.015","volume":"107","author":"X Wang","year":"2018","unstructured":"Wang X, Zhu X, Wu X, Zhang Y (2018) Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt Lasers Eng 107:370\u2013379","journal-title":"Opt Lasers Eng"},{"key":"14794_CR41","doi-asserted-by":"publisher","first-page":"23733","DOI":"10.1109\/ACCESS.2018.2805847","volume":"6","author":"X Wang","year":"2018","unstructured":"Wang X, Zhu X, Zhang Y (2018) An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6:23733\u201323746","journal-title":"IEEE Access"},{"key":"14794_CR42","first-page":"6429","volume":"5","author":"X Wu","year":"2017","unstructured":"Wu X, Zhu B, Hu Y, Ran Y (2017) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5:6429\u20136436","journal-title":"IEEE Access"},{"key":"14794_CR43","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","volume":"132","author":"EY Xie","year":"2017","unstructured":"Xie EY, Li C, Yu S, Jinhu L (2017) On the cryptanalysis of Fridrich\u2019s chaotic image encryption scheme. Signal Process 132:150\u2013154","journal-title":"Signal Process"},{"key":"14794_CR44","doi-asserted-by":"publisher","first-page":"53079","DOI":"10.1109\/ACCESS.2019.2911395","volume":"7","author":"L Yi","year":"2019","unstructured":"Yi L, Tong X, Wang Z, Zhang M, Zhu H, Liu J (2019) A novel block encryption algorithm based on chaotic S-box for wireless sensor network. IEEE Access 7:53079\u201390","journal-title":"IEEE Access"},{"issue":"6","key":"14794_CR45","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/s11128-017-1612-0","volume":"16","author":"N Zhou","year":"2017","unstructured":"Zhou N, Hu Y, Gong L, Li G (2017) Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations. Quantum Inf Process 16(6):164","journal-title":"Quantum Inf Process"},{"key":"14794_CR46","doi-asserted-by":"publisher","first-page":"18759","DOI":"10.1109\/ACCESS.2018.2817600","volume":"6","author":"C Zhu","year":"2018","unstructured":"Zhu C, Sun K (2018) Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps. IEEE Access 6:18759\u201318770","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14794-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14794-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14794-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T09:27:46Z","timestamp":1696325266000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14794-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,21]]},"references-count":46,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["14794"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14794-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,3,21]]},"assertion":[{"value":"27 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}