{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T10:43:50Z","timestamp":1777718630536,"version":"3.51.4"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071088"],"award-info":[{"award-number":["62071088"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-14921-0","type":"journal-article","created":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T08:02:45Z","timestamp":1684828965000},"page":"4133-4149","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Security analysis of a color image encryption based on bit-level and chaotic map"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1178-4598","authenticated-orcid":false,"given":"Heping","family":"Wen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ruiting","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jieyi","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tianle","family":"Zheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiahao","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenxing","family":"Lin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Huilin","family":"Jian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4159-3132","authenticated-orcid":false,"given":"Yiting","family":"Lin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Linchao","family":"Ma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5766-2174","authenticated-orcid":false,"given":"Zhen","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0425-5919","authenticated-orcid":false,"given":"Chongfu","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,5,23]]},"reference":[{"issue":"27-28","key":"14921_CR1","doi-asserted-by":"publisher","first-page":"19853","DOI":"10.1007\/s11042-020-08850-5","volume":"79","author":"TS Ali","year":"2020","unstructured":"Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitution and boolean operation. Multimed Tools Appl 79 (27-28):19853\u201319873","journal-title":"Multimed Tools Appl"},{"key":"14921_CR2","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.ijleo.2017.09.099","volume":"153","author":"X Liao","year":"2018","unstructured":"Aqeel-ur-Rehman, Liao X, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using dna and chaos. Optik 153:117\u2013134","journal-title":"Optik"},{"issue":"17","key":"14921_CR3","doi-asserted-by":"publisher","first-page":"25583","DOI":"10.1007\/s11042-021-10773-8","volume":"80","author":"B Bouteghrine","year":"2021","unstructured":"Bouteghrine B, Tanougast C, Sadoudi S (2021) Novel image encryption algorithm based on new 3-d chaos map. Multimed Tools Appl 80(17):25583\u201325605","journal-title":"Multimed Tools Appl"},{"key":"14921_CR4","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Process 143:122\u2013133","journal-title":"Signal Process"},{"issue":"1","key":"14921_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"X Chai","year":"2019","unstructured":"Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on dna sequence operations and chaotic systems. Neural Comput Appl 31(1):219\u2013237","journal-title":"Neural Comput Appl"},{"key":"14921_CR6","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"X Chai","year":"2018","unstructured":"Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"14921_CR7","doi-asserted-by":"crossref","unstructured":"Dai J-Y, Ma Y, Zhou N-R (2021) Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4d hyper-chaotic henon map. Quantum Inf Process 20(7)","DOI":"10.1007\/s11128-021-03187-w"},{"key":"14921_CR8","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2015.10.027","volume":"355-356","author":"A-V Diaconu","year":"2016","unstructured":"Diaconu A-V (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355-356:314\u2013327","journal-title":"Inf Sci"},{"key":"14921_CR9","doi-asserted-by":"publisher","first-page":"105777","DOI":"10.1016\/j.optlastec.2019.105777","volume":"121","author":"MAB Farah","year":"2020","unstructured":"Farah MAB, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional fourier transform and dna sequence operation. Opt Laser Technol 121:105777","journal-title":"Opt Laser Technol"},{"issue":"6","key":"14921_CR10","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos Appl Sci Eng 8(6):1259\u20131284","journal-title":"Int J Bifurc Chaos Appl Sci Eng"},{"issue":"2","key":"14921_CR11","doi-asserted-by":"publisher","first-page":"770","DOI":"10.3390\/e16020770","volume":"16","author":"C Fu","year":"2014","unstructured":"Fu C, Huang J-B, Wang N-N, Hou Q-B, Lei W-M (2014) A symmetric chaos-based image cipher with an improved bit-level permutation strategy. Entropy 16(2):770\u2013788","journal-title":"Entropy"},{"issue":"27-28","key":"14921_CR12","doi-asserted-by":"publisher","first-page":"20263","DOI":"10.1007\/s11042-020-08879-6","volume":"79","author":"A Kamrani","year":"2020","unstructured":"Kamrani A, Zenkouar K, Najah S (2020) A new set of image encryption algorithms based on discrete orthogonal moments and chaos theory. Multimed Tools Appl 79(27-28):20263\u201379","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"14921_CR13","doi-asserted-by":"publisher","first-page":"19011","DOI":"10.1007\/s11042-021-10549-0","volume":"80","author":"AN Kengnou Telem","year":"2021","unstructured":"Kengnou Telem AN, Fotsin HB, Kengne J (2021) Image encryption algorithm based on dynamic dna coding operations and 3d chaotic systems. Multimed Tools Appl 80(12):19011\u201319041","journal-title":"Multimed Tools Appl"},{"key":"14921_CR14","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238\u2013246","journal-title":"Opt Lasers Eng"},{"issue":"16-17","key":"14921_CR15","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16-17):3895\u20133903","journal-title":"Opt Commun"},{"issue":"1","key":"14921_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a \u201cchaotic\u201d encryption algorithm. Cryptologia 13(1):29\u201342","journal-title":"Cryptologia"},{"key":"14921_CR17","doi-asserted-by":"crossref","unstructured":"Pak C, An K, Jang P, Kim J, Kim S (2019) A novel bit-level color image encryption using improved 1d chaotic map. Multimed Tools Appl 78(9)","DOI":"10.1007\/s11042-018-6739-1"},{"issue":"8","key":"14921_CR18","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1140\/epjp\/i2018-12138-3","volume":"133","author":"A Shafique","year":"2018","unstructured":"Shafique A, Shahid J (2018) Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. Eur Phys J Plus 133(8):331","journal-title":"Eur Phys J Plus"},{"issue":"4","key":"14921_CR19","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):655\u2013715. https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst Tech J"},{"issue":"2","key":"14921_CR20","doi-asserted-by":"publisher","first-page":"7201714","DOI":"10.1109\/JPHOT.2018.2817550","volume":"10","author":"S Sun","year":"2018","unstructured":"Sun S (2018) A novel hyperchaotic image encryption scheme based on dna encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics J 10 (2):7201714","journal-title":"IEEE Photonics J"},{"issue":"6","key":"14921_CR21","doi-asserted-by":"publisher","first-page":"6883","DOI":"10.1007\/s11042-017-4605-1","volume":"77","author":"L Teng","year":"2018","unstructured":"Teng L, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit-level permutation. Multimed Tools Appl 77(6):6883\u20136896","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"14921_CR22","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1140\/epjp\/i2017-11819-7","volume":"132","author":"D Valli","year":"2017","unstructured":"Valli D, Ganesan K (2017) Chaos based video encryption using maps and ikeda time delay system. Eur Phys J Plus 132(12):542","journal-title":"Eur Phys J Plus"},{"issue":"2","key":"14921_CR23","first-page":"1","volume":"13","author":"Y Wang","year":"2021","unstructured":"Wang Y, Li X-W, Wang Q-H (2021) Integral imaging based optical image encryption using ca-dna algorithm. IEEE Photo J 13(2):1\u201312","journal-title":"IEEE Photo J"},{"issue":"9-10","key":"14921_CR24","doi-asserted-by":"publisher","first-page":"6661","DOI":"10.1007\/s11042-019-08514-z","volume":"79","author":"L Wang","year":"2020","unstructured":"Wang L, Ran Q, Ma J (2020) Double quantum color images encryption scheme based on dqrci. Multimed Tools Appl 79(9-10):6661\u20136687","journal-title":"Multimed Tools Appl"},{"key":"14921_CR25","doi-asserted-by":"publisher","first-page":"105995","DOI":"10.1016\/j.optlaseng.2019.105995","volume":"128","author":"S Wang","year":"2020","unstructured":"Wang S, Wang C, Xu C (2020) An image encryption algorithm based on a hidden attractor chaos system and the knuth\u2013durstenfeld algorithm. Opt Lasers Eng 128:105995","journal-title":"Opt Lasers Eng"},{"key":"14921_CR26","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1016\/j.neucom.2017.09.068","volume":"275","author":"Y Wang","year":"2018","unstructured":"Wang Y, Zhao Y, Zhou Q, Lin Z (2018) Image encryption using partitioned cellular automata. Neurocomputing 275:1318\u20131332","journal-title":"Neurocomputing"},{"issue":"7","key":"14921_CR27","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1140\/epjp\/i2019-12797-4","volume":"134","author":"H Wen","year":"2019","unstructured":"Wen H, Yu S (2019) Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. Eur Phys J Plus 134(7):337","journal-title":"Eur Phys J Plus"},{"key":"14921_CR28","doi-asserted-by":"crossref","unstructured":"Wen H, Xu J, Liao Y, Chen R, Shen D, Wen L, Shi Y, Lin Q, Liang Z, Zhang S, Liu Y, Huo A, Li T, Cai C, Wen J, Zhang C (2021) A security-enhanced image communication scheme using cellular neural network. Entropy 23(8)","DOI":"10.3390\/e23081000"},{"key":"14921_CR29","doi-asserted-by":"publisher","first-page":"20481","DOI":"10.1109\/ACCESS.2021.3054952","volume":"9","author":"H Wen","year":"2021","unstructured":"Wen H, Zhang C, Chen P, Chen R, Xu J, Liao Y, Liang Z, Shen D, Zhou L, Ke J (2021) A quantum chaotic image cryptosystem and its application in iot secure communication. IEEE Access 9:20481\u201320492","journal-title":"IEEE Access"},{"key":"14921_CR30","doi-asserted-by":"crossref","unstructured":"Wen H, Zhang C, Huang L, Ke J, Xiong D (2021) Security analysis of a color image encryption algorithm using a fractional-order chaos. Entropy 23(2)","DOI":"10.3390\/e23020258"},{"issue":"3","key":"14921_CR31","doi-asserted-by":"publisher","first-page":"246","DOI":"10.3390\/e21030246","volume":"21","author":"H Wen","year":"2019","unstructured":"Wen H, Yu S, Luuml J (2019) Breaking an image encryption algorithm based on dna encoding and spatiotemporal chaos. Entropy 21(3):246","journal-title":"Entropy"},{"key":"14921_CR32","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Yang B (2018) Image encryption using 2d h\u00e9non-sine map and dna approach. Signal Process 153:11\u201323","journal-title":"Signal Process"},{"key":"14921_CR33","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","volume":"132","author":"EY Xie","year":"2017","unstructured":"Xie EY, Li C, Yu S, Lu J (2017) On the cryptanalysis of fridrich\u2019s chaotic image encryption scheme. Signal Process 132:150\u2013154","journal-title":"Signal Process"},{"key":"14921_CR34","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"14921_CR35","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/s11071-014-1331-3","volume":"77","author":"Y-Q Zhang","year":"2014","unstructured":"Zhang Y-Q, Wang X-Y (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687\u2013698","journal-title":"Nonlinear Dyn"},{"key":"14921_CR36","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.ins.2017.11.021","volume":"430-431","author":"LY Zhang","year":"2018","unstructured":"Zhang LY, Liu Y, Wang C, Zhou J, Zhang Y, Chen G (2018) Improved known-plaintext attack to permutation-only multimedia ciphers. Inf Sci 430-431:228\u2013239","journal-title":"Inf Sci"},{"issue":"1","key":"14921_CR37","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74\u201382","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"14921_CR38","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74\u201382","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"6","key":"14921_CR39","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"Z-L Zhu","year":"2011","unstructured":"Zhu Z-L, Zhang W, Wong K-W, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171\u20131186","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14921-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14921-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14921-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T05:17:26Z","timestamp":1704518246000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14921-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,23]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["14921"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14921-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,23]]},"assertion":[{"value":"2 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}