{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T23:15:44Z","timestamp":1771888544625,"version":"3.50.1"},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T00:00:00Z","timestamp":1678060800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T00:00:00Z","timestamp":1678060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s11042-023-14948-3","type":"journal-article","created":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T06:02:28Z","timestamp":1678082548000},"page":"33607-33635","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An evolutionary image encryption system with chaos theory and DNA encoding"],"prefix":"10.1007","volume":"82","author":[{"given":"Mousomi","family":"Roy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3427-7492","authenticated-orcid":false,"given":"Shouvik","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Kalyani","family":"Mali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,6]]},"reference":[{"key":"14948_CR1","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1016\/j.aeue.2012.01.015","volume":"66","author":"AH Abdullah","year":"2012","unstructured":"Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU - Int J Electron Commun 66:806\u2013816. https:\/\/doi.org\/10.1016\/j.aeue.2012.01.015","journal-title":"AEU - Int J Electron Commun"},{"key":"14948_CR2","first-page":"91","volume":"29","author":"PT Akkasaligar","year":"2020","unstructured":"Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inf Secur J 29:91\u2013101","journal-title":"Inf Secur J"},{"key":"14948_CR3","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1080\/1369118X.2012.678878","volume":"15","author":"D Boyd","year":"2012","unstructured":"Boyd D, Crawford K (2012) Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Inf Commun Soc 15:662\u2013679. https:\/\/doi.org\/10.1080\/1369118X.2012.678878","journal-title":"Inf Commun Soc"},{"key":"14948_CR4","doi-asserted-by":"crossref","unstructured":"Chakraborty S (2020) An advanced approach to detect edges of digital images for image segmentation. In: Chakraborty S, Mali K (eds) Applications of advanced machine intelligence in computer vision and object recognition: emerging research and opportunities. IGI GLobal","DOI":"10.4018\/978-1-7998-2736-8.ch004"},{"key":"14948_CR5","unstructured":"Chakraborty S, Bhowmik S (2013) Job shop scheduling using simulated annealing. In: First International Conference on Computation and Communication Advancement. McGrawHill Publication, pp. 69\u201373"},{"key":"14948_CR6","doi-asserted-by":"crossref","unstructured":"Chakraborty S, Bhowmik S (2015) Blending roulette wheel selection with simulated annealing for job shop scheduling problem. In: Michael Faraday IET International Summit 2015. Institution of Engineering and Technology, pp 100 (7 .)-100 (7 .)","DOI":"10.1049\/cp.2015.1696"},{"key":"14948_CR7","doi-asserted-by":"publisher","unstructured":"Chakraborty S, Mali K (2022) SUFEMO: a superpixel based fuzzy image segmentation method for COVID-19 radiological image elucidation. Appl soft Comput 109625. https:\/\/doi.org\/10.1016\/J.ASOC.2022.109625","DOI":"10.1016\/J.ASOC.2022.109625"},{"key":"14948_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S10115-022-01659-8","volume":"2022","author":"S Chakraborty","year":"2022","unstructured":"Chakraborty S, Mali K (2022) Fuzzy modified cuckoo search for biomedical image segmentation. Knowl Inf Syst 2022:1\u201340. https:\/\/doi.org\/10.1007\/S10115-022-01659-8","journal-title":"Knowl Inf Syst"},{"key":"14948_CR9","unstructured":"Chakraborty S, Seal A, Roy M (2015) An elitist model for obtaining alignment of multiple sequences using genetic algorithm. In: 2nd National Conference NCETAS 2015. International Journal of Innovative Research in Science, Engineering and Technology, pp. 61\u201367"},{"key":"14948_CR10","doi-asserted-by":"publisher","unstructured":"Chakraborty S, Seal A, Roy M, Mali K (2016) A novel lossless image encryption method using DNA substitution and chaotic logistic map. Int J Secur its Appl 10:205\u2013216. https:\/\/doi.org\/10.14257\/ijsia.2016.10.2.19","DOI":"10.14257\/ijsia.2016.10.2.19"},{"key":"14948_CR11","doi-asserted-by":"publisher","unstructured":"Chakraborty S, Seal A, Roy M, Mali K (2016) A novel lossless image encryption method using DNA substitution and chaotic logistic map. Int J Secur its Appl 10. https:\/\/doi.org\/10.14257\/ijsia.2016.10.2.19","DOI":"10.14257\/ijsia.2016.10.2.19"},{"key":"14948_CR12","doi-asserted-by":"publisher","unstructured":"Chakraborty S, Chatterjee S, Dey N, et al (2017) Modified cuckoo search algorithm in microscopic image segmentation of hippocampus Microsc Res Tech 80. https:\/\/doi.org\/10.1002\/jemt.22900","DOI":"10.1002\/jemt.22900"},{"key":"14948_CR13","first-page":"17","volume-title":"Intelligent computing in medical imaging: a study. In: research anthology on multi-industry uses of genetic programming and algorithms","author":"S Chakraborty","year":"2020","unstructured":"Chakraborty S, Chatterjee S, Ashour AS et al (2020) Intelligent computing in medical imaging: a study. In: research anthology on multi-industry uses of genetic programming and algorithms. IGI Global, p 17"},{"key":"14948_CR14","doi-asserted-by":"publisher","unstructured":"Chakraborty S, Roy M, Chatterjee S, Mali K, Banerjee S (2022) Detection of HIV-1 progression phases from transcriptional profiles in ex vivo CD4+ and CD8+ T cells using meta-heuristic supported artificial neural network. Multimed tools Appl 2022 8111 81:15103\u201315126. https:\/\/doi.org\/10.1007\/S11042-022-12534-7","DOI":"10.1007\/S11042-022-12534-7"},{"key":"14948_CR15","unstructured":"CVG - UGR - Image database (n.d.) http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/g512.php. Accessed 15 Aug 2019"},{"key":"14948_CR16","doi-asserted-by":"publisher","first-page":"83","DOI":"10.6633\/IJNS.201901","volume":"21","author":"JC Dagadu","year":"2019","unstructured":"Dagadu JC, Li J, Aboagye EO, Deynu FK (2019) Medical image encryption scheme based on multiple Chaos and DNA coding. Int J Netw Secur 21:83\u201390. https:\/\/doi.org\/10.6633\/IJNS.201901","journal-title":"Int J Netw Secur"},{"key":"14948_CR17","doi-asserted-by":"crossref","unstructured":"Dai C, Luan H, Yu Q et al (2020) Change-encryption: encryption using spatiotemporal information as a function model. In: 2020 7th IEEE international conference on cyber security and cloud computing (CSCloud)\/2020 6th IEEE international conference on edge computing and scalable cloud (EdgeCom). IEEE, pp 281\u2013287","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00056"},{"key":"14948_CR18","doi-asserted-by":"publisher","unstructured":"De S, Bhaumik J, Giri D (2021) A secure image encryption scheme based on three different chaotic maps. Multimed tools Appl 2021 814 81:5485\u20135514. 81:5485\u20135514. https:\/\/doi.org\/10.1007\/S11042-021-11696-0","DOI":"10.1007\/S11042-021-11696-0"},{"key":"14948_CR19","doi-asserted-by":"publisher","first-page":"106881","DOI":"10.1016\/J.OPTLASENG.2021.106881","volume":"150","author":"CF Duan","year":"2022","unstructured":"Duan CF, Zhou J, Gong LH, Wu JY, Zhou NR (2022) New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt Lasers Eng 150:106881. https:\/\/doi.org\/10.1016\/J.OPTLASENG.2021.106881","journal-title":"Opt Lasers Eng"},{"key":"14948_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S12530-022-09443-3","volume":"2022","author":"ZK Eisham","year":"2022","unstructured":"Eisham ZK, Haque MM, Rahman MS, Nishat MM, Faisal F, Islam MR (2022) Chimp optimization algorithm in multilevel image thresholding and image clustering. Evol Syst 2022:1\u201344. https:\/\/doi.org\/10.1007\/S12530-022-09443-3","journal-title":"Evol Syst"},{"key":"14948_CR21","doi-asserted-by":"publisher","first-page":"180","DOI":"10.3390\/e22020180","volume":"22","author":"DH ElKamchouchi","year":"2020","unstructured":"ElKamchouchi DH, Mohamed HG, Moussa KH (2020) A bijective image encryption system based on hybrid chaotic map diffusion and DNA confusion. Entropy 22:180. https:\/\/doi.org\/10.3390\/e22020180","journal-title":"Entropy"},{"key":"14948_CR22","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1016\/j.optlaseng.2013.03.010","volume":"51","author":"R Enayatifar","year":"2013","unstructured":"Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Opt Lasers Eng 51:1066\u20131077. https:\/\/doi.org\/10.1016\/j.optlaseng.2013.03.010","journal-title":"Opt Lasers Eng"},{"key":"14948_CR23","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83\u201393. https:\/\/doi.org\/10.1016\/j.optlaseng.2013.12.003","journal-title":"Opt Lasers Eng"},{"key":"14948_CR24","doi-asserted-by":"publisher","first-page":"105777","DOI":"10.1016\/j.optlastec.2019.105777","volume":"121","author":"MAB Farah","year":"2020","unstructured":"Farah MAB, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:105777. https:\/\/doi.org\/10.1016\/j.optlastec.2019.105777","journal-title":"Opt Laser Technol"},{"key":"14948_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/SCIENTIFICAMERICAN0573-15","volume":"228","author":"H Feistel","year":"1973","unstructured":"Feistel H (1973) Cryptography and computer privacy. Sci Am 228:15\u201323. https:\/\/doi.org\/10.1038\/SCIENTIFICAMERICAN0573-15","journal-title":"Sci Am"},{"key":"14948_CR26","doi-asserted-by":"publisher","unstructured":"Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans Multimed 8:905\u2013917. https:\/\/doi.org\/10.1109\/TMM.2006.879919","DOI":"10.1109\/TMM.2006.879919"},{"key":"14948_CR27","doi-asserted-by":"publisher","unstructured":"Hammad BT, Sagheer AM, Ahmed IT, Jamil N (2020) A comparative review on symmetric and asymmetric DNA-based cryptography. Bull Electr Eng informatics 9:2484\u20132491. https:\/\/doi.org\/10.11591\/eei.v9i6.2470","DOI":"10.11591\/eei.v9i6.2470"},{"key":"14948_CR28","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.ijleo.2018.12.178","volume":"181","author":"C Han","year":"2019","unstructured":"Han C (2019) An image encryption algorithm based on modified logistic chaotic map. Optik (Stuttg) 181:779\u2013785. https:\/\/doi.org\/10.1016\/j.ijleo.2018.12.178","journal-title":"Optik (Stuttg)"},{"key":"14948_CR29","doi-asserted-by":"publisher","unstructured":"Hore S, Chakraborty S, Chatterjee S et al (2016) An integrated interactive technique for image segmentation using stack based seeded region growing and thresholding. Int J Electr Comput Eng 6:2773\u20132780. https:\/\/doi.org\/10.11591\/ijece.v6i6.11801","DOI":"10.11591\/ijece.v6i6.11801"},{"key":"14948_CR30","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/J.INS.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun C-M, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci (Ny) 297:80\u201394. https:\/\/doi.org\/10.1016\/J.INS.2014.11.018","journal-title":"Inf Sci (Ny)"},{"key":"14948_CR31","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/J.INS.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci (Ny) 480:403\u2013419. https:\/\/doi.org\/10.1016\/J.INS.2018.12.048","journal-title":"Inf Sci (Ny)"},{"key":"14948_CR32","doi-asserted-by":"publisher","first-page":"104207","DOI":"10.1016\/j.biosystems.2020.104207","volume":"197","author":"M Indrasena Reddy","year":"2020","unstructured":"Indrasena Reddy M, Siva Kumar AP, Subba Reddy K (2020) A secured cryptographic system based on DNA and a hybrid key generation approach. BioSystems 197:104207. https:\/\/doi.org\/10.1016\/j.biosystems.2020.104207","journal-title":"BioSystems"},{"key":"14948_CR33","doi-asserted-by":"publisher","first-page":"102428","DOI":"10.1016\/j.jisa.2019.102428","volume":"50","author":"KC Jithin","year":"2020","unstructured":"Jithin KC, Sankar S (2020) Colour image encryption algorithm combining, Arnold map, DNA sequence operation, and a Mandelbrot set. J Inf Secur Appl 50:102428. https:\/\/doi.org\/10.1016\/j.jisa.2019.102428","journal-title":"J Inf Secur Appl"},{"key":"14948_CR34","doi-asserted-by":"crossref","unstructured":"Kumar M, Saxena A, Vuppala SS (2020) A survey on chaos based image encryption techniques. In: Studies in Computational Intelligence. Springer, pp. 1\u201326","DOI":"10.1007\/978-3-030-38700-6_1"},{"key":"14948_CR35","doi-asserted-by":"crossref","unstructured":"Kumar M, Saxena A, Vuppala SS (2020) A survey on chaos based image encryption techniques. In: Studies in Computational Intelligence. Springer, pp. 1\u201326","DOI":"10.1007\/978-3-030-38700-6_1"},{"key":"14948_CR36","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1109\/TCSVT.2006.888840","volume":"17","author":"S Li","year":"2007","unstructured":"Li S, Chen G, Cheung A, Bhargava B, Lo KT (2007) On the design of perceptual MPEG-video encryption algorithms. IEEE Trans Circuits Syst Video Technol 17:214\u2013223. https:\/\/doi.org\/10.1109\/TCSVT.2006.888840","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"14948_CR37","doi-asserted-by":"crossref","unstructured":"Li S, Chen G, Zheng X (2019) Chaos-based encryption for digital images and videos. In: Multimedia Security Handbook. CRC Press, pp. 133\u2013167","DOI":"10.1201\/9781420038262-4"},{"key":"14948_CR38","doi-asserted-by":"publisher","first-page":"19999","DOI":"10.1007\/S11042-022-12765-8","volume":"81","author":"L Liu","year":"2022","unstructured":"Liu L, Wei ZX, Xiang H (2022) A novel image encryption algorithm based on compound-coupled logistic chaotic map. Multimed tools Appl 81:19999\u201320019. https:\/\/doi.org\/10.1007\/S11042-022-12765-8","journal-title":"Multimed tools Appl"},{"key":"14948_CR39","doi-asserted-by":"publisher","first-page":"21779","DOI":"10.1007\/S11042-022-12472-4","volume":"81","author":"X Liu","year":"2022","unstructured":"Liu X, Tong X, Wang Z, Zhang M (2022) A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation. Multimed tools Appl 81:21779\u201321810. https:\/\/doi.org\/10.1007\/S11042-022-12472-4","journal-title":"Multimed tools Appl"},{"key":"14948_CR40","doi-asserted-by":"publisher","unstructured":"Mali K, Chakraborty S, Seal A, Roy M (2015) An efficient image cryptographic algorithm based on frequency domain using Haar wavelet transform. Int J Secur its Appl 9:279\u2013288. https:\/\/doi.org\/10.14257\/ijsia.2015.9.12.26","DOI":"10.14257\/ijsia.2015.9.12.26"},{"key":"14948_CR41","first-page":"2321","volume":"3","author":"K Mali","year":"2015","unstructured":"Mali K, Chakraborty S, Roy M (2015) A study on statistical analysis and security evaluation parameters in image encryption. IJSRD-International J Sci Res Dev 3:2321\u20130613","journal-title":"IJSRD-International J Sci Res Dev"},{"key":"14948_CR42","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/e22020158","volume":"22","author":"HG Mohamed","year":"2020","unstructured":"Mohamed HG, ElKamchouchi DH, Moussa KH (2020) A novel color image encryption algorithm based on Hyperchaotic maps and mitochondrial DNA sequences. Entropy 22:158. https:\/\/doi.org\/10.3390\/e22020158","journal-title":"Entropy"},{"key":"14948_CR43","doi-asserted-by":"publisher","unstructured":"Ouyang X, Luo Y, Liu J et al (2020) A color image encryption method based on memristive hyperchaotic system and DNA encryption Int J Mod Phys B 34. https:\/\/doi.org\/10.1142\/S0217979220500149","DOI":"10.1142\/S0217979220500149"},{"key":"14948_CR44","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1080\/02564602.2019.1595751","volume":"37","author":"KAK Patro","year":"2020","unstructured":"Patro KAK, Acharya B, Nath V (2020) Secure, lossless, and noise-resistive image encryption using Chaos, hyper-chaos, and DNA sequence operation. IETE Tech Rev (Institution Electron Telecommun Eng India) 37:223\u2013245. https:\/\/doi.org\/10.1080\/02564602.2019.1595751","journal-title":"IETE Tech Rev (Institution Electron Telecommun Eng India)"},{"key":"14948_CR45","doi-asserted-by":"crossref","unstructured":"Ratheesh Kumar R, Mathew J (2020) Image encryption:traditional methods vs alternative methods. In: proceedings of the 4th international conference on computing methodologies and communication, ICCMC 2020. Institute of Electrical and Electronics Engineers Inc","DOI":"10.1109\/ICCMC48092.2020.ICCMC-000115"},{"key":"14948_CR46","doi-asserted-by":"publisher","first-page":"113428","DOI":"10.1016\/J.ESWA.2020.113428","volume":"155","author":"E Rodr\u00edguez-Esparza","year":"2020","unstructured":"Rodr\u00edguez-Esparza E, Zanella-Calzada LA, Oliva D, Heidari AA, Zaldivar D, P\u00e9rez-Cisneros M, Foong LK (2020) An efficient Harris hawks-inspired image segmentation method. Expert Syst Appl 155:113428. https:\/\/doi.org\/10.1016\/J.ESWA.2020.113428","journal-title":"Expert Syst Appl"},{"key":"14948_CR47","doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K et al (2019) A dual layer image encryption using polymerase chain reaction amplification and dna encryption. In: 2019 International conference on Opto-electronics and applied optics, Optronix 2019. Institute of Electrical and Electronics Engineers Inc","DOI":"10.1109\/OPTRONIX.2019.8862350"},{"key":"14948_CR48","doi-asserted-by":"crossref","unstructured":"Roy M, Mali K, Chatterjee S et al (2019) A study on the applications of the biomedical image encryption methods for secured computer aided diagnostics. In: 2019 Amity International conference on artificial intelligence (AICAI). IEEE, pp 881\u2013886","DOI":"10.1109\/AICAI.2019.8701382"},{"key":"14948_CR49","doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K et al (2020) Biomedical image security using matrix manipulation and DNA encryption","DOI":"10.1007\/978-981-15-0361-0_4"},{"key":"14948_CR50","doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K et al (2020) Biomedical image security using matrix manipulation and DNA encryption. In: Advances in Intelligent Systems and Computing. Springer, pp. 49\u201360","DOI":"10.1007\/978-981-15-0361-0_4"},{"key":"14948_CR51","doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K et al (2020) Data security techniques based on DNA encryption. In: Advances in Intelligent Systems and Computing. Springer, pp. 239\u2013249","DOI":"10.1007\/978-981-15-0361-0_19"},{"key":"14948_CR52","doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K (2020) A robust image encryption method using chaotic skew-tent map. In: Chakraborty S, Mali K (eds) Applications of Advanced Machine Intelligence in Computer Vision and Object Recognition: Emerging Research and Opportunities","DOI":"10.4018\/978-1-7998-2736-8.ch001"},{"key":"14948_CR53","doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K et al (2020) Data security techniques based on DNA encryption","DOI":"10.1007\/978-981-15-0361-0_19"},{"key":"14948_CR54","doi-asserted-by":"publisher","unstructured":"Roy S, Shrivastava M, Pandey CV, Nayak SK, Rawat U (2020) IEVCA: an efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimed tools Appl 2020 8021 80:31529\u201331567. 80:31529\u201331567. https:\/\/doi.org\/10.1007\/S11042-020-09880-9","DOI":"10.1007\/S11042-020-09880-9"},{"key":"14948_CR55","first-page":"289","volume-title":"Utilization of Hyperchaotic environment and DNA sequences for digital image security","author":"M Roy","year":"2021","unstructured":"Roy M, Chakraborty S, Mali K, Roy D (2021) Utilization of Hyperchaotic environment and DNA sequences for digital image security. Springer, Singapore, pp 289\u2013297"},{"key":"14948_CR56","first-page":"267","volume-title":"An image security method based on low dimensional chaotic environment and DNA encoding","author":"M Roy","year":"2021","unstructured":"Roy M, Chakraborty S, Mali K et al (2021) An image security method based on low dimensional chaotic environment and DNA encoding. Springer, Singapore, pp 267\u2013277"},{"key":"14948_CR57","doi-asserted-by":"publisher","unstructured":"Roy M, Chakraborty S, Mali K (2021) A chaotic framework and its application in image encryption. Multimed tools Appl 1\u201342. https:\/\/doi.org\/10.1007\/s11042-021-10839-7","DOI":"10.1007\/s11042-021-10839-7"},{"key":"14948_CR58","doi-asserted-by":"publisher","unstructured":"Roy M, Chakraborty S, Mali K, Roy D, Chatterjee S (2021) A robust image encryption framework based on DNA computing and chaotic environment. Microsyst Technol 1\u201311. https:\/\/doi.org\/10.1007\/s00542-020-05120-0, 27, 3617, 3627","DOI":"10.1007\/s00542-020-05120-0"},{"key":"14948_CR59","doi-asserted-by":"publisher","unstructured":"Roy M, Chakraborty S, Mali K (2021) The MSK: a simple and robust image encryption method. Multimed tools Appl 1\u201331. https:\/\/doi.org\/10.1007\/s11042-021-10761-y","DOI":"10.1007\/s11042-021-10761-y"},{"key":"14948_CR60","unstructured":"Seal A, Chakraborty S, Mali K (2017) A new and resilient image encryption technique based on pixel manipulation, value transformation and visual transformation utilizing single\u2013level haar wavelet transform"},{"key":"14948_CR61","doi-asserted-by":"publisher","first-page":"15901","DOI":"10.1007\/s11042-018-6407-5","volume":"79","author":"L Singh","year":"2020","unstructured":"Singh L, Singh AK, Singh PK (2020) Secure data hiding techniques: a survey. Multimed Tools Appl 79:15901\u201315921. https:\/\/doi.org\/10.1007\/s11042-018-6407-5","journal-title":"Multimed Tools Appl"},{"key":"14948_CR62","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1504\/IJICS.2020.105156","volume":"12","author":"S Suri","year":"2020","unstructured":"Suri S, Vijay R (2020) A coupled map lattice-based image encryption approach using DNA and bi-objective genetic algorithm. Int J Inf Comput Secur 12:199\u2013216. https:\/\/doi.org\/10.1504\/IJICS.2020.105156","journal-title":"Int J Inf Comput Secur"},{"key":"14948_CR63","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput J 11:514\u2013522. https:\/\/doi.org\/10.1016\/j.asoc.2009.12.011","journal-title":"Appl Soft Comput J"},{"key":"14948_CR64","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/J.OPTLASENG.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318. https:\/\/doi.org\/10.1016\/J.OPTLASENG.2014.08.005","journal-title":"Opt Lasers Eng"},{"key":"14948_CR65","doi-asserted-by":"publisher","first-page":"105851","DOI":"10.1016\/j.optlaseng.2019.105851","volume":"125","author":"X Wang","year":"2020","unstructured":"Wang X, Wang Y, Zhu X, Luo C (2020) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Opt Lasers Eng 125:105851. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105851","journal-title":"Opt Lasers Eng"},{"key":"14948_CR66","doi-asserted-by":"crossref","unstructured":"Wei X, Guo L, Zhang Q et al (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. In: Journal of Systems and Software. Elsevier, pp. 290\u2013299","DOI":"10.1016\/j.jss.2011.08.017"},{"key":"14948_CR67","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/J.INS.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci (Ny) 264:317\u2013339. https:\/\/doi.org\/10.1016\/J.INS.2013.11.027","journal-title":"Inf Sci (Ny)"},{"key":"14948_CR68","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/J.INS.2016.02.041","volume":"349\u2013350","author":"X Wu","year":"2016","unstructured":"Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci (Ny) 349\u2013350:137\u2013153. https:\/\/doi.org\/10.1016\/J.INS.2016.02.041","journal-title":"Inf Sci (Ny)"},{"key":"14948_CR69","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3390\/e22010005","volume":"22","author":"J Wu","year":"2019","unstructured":"Wu J, Shi J, Li T (2019) A novel image encryption approach based on a Hyperchaotic system, pixel-level filtering with variable kernels, and DNA-level diffusion. Entropy 22:5. https:\/\/doi.org\/10.3390\/e22010005","journal-title":"Entropy"},{"key":"14948_CR70","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"Y Xian","year":"2021","unstructured":"Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci (Ny) 547:1154\u20131169. https:\/\/doi.org\/10.1016\/j.ins.2020.09.055","journal-title":"Inf Sci (Ny)"},{"key":"14948_CR71","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S11042-022-13280-6","volume":"2022","author":"Y Xian","year":"2022","unstructured":"Xian Y, Wang X, Zhang Y, Yan X, Leng Z (2022) A novel chaotic image encryption with FSV based global bit-level chaotic permutation. Multimed Tools Appl 2022:1\u201320. https:\/\/doi.org\/10.1007\/S11042-022-13280-6","journal-title":"Multimed Tools Appl"},{"key":"14948_CR72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/J.INS.2018.11.010","volume":"478","author":"M Xu","year":"2019","unstructured":"Xu M, Tian Z (2019) A novel image cipher based on 3D bit matrix and latin cubes. Inf Sci (Ny) 478:1\u201314. https:\/\/doi.org\/10.1016\/J.INS.2018.11.010","journal-title":"Inf Sci (Ny)"},{"key":"14948_CR73","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1007\/s11042-019-08247-z","volume":"79","author":"A Yaghouti Niyat","year":"2020","unstructured":"Yaghouti Niyat A, Moattar MH (2020) Color image encryption based on hybrid chaotic system and DNA sequences. Multimed Tools Appl 79:1497\u20131518. https:\/\/doi.org\/10.1007\/s11042-019-08247-z","journal-title":"Multimed Tools Appl"},{"key":"14948_CR74","doi-asserted-by":"publisher","first-page":"105816","DOI":"10.1016\/J.OPTLASENG.2019.105816","volume":"124","author":"SS Yu","year":"2020","unstructured":"Yu SS, Zhou NR, Gong LH, Nie Z (2020) Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system. Opt Lasers Eng 124:105816. https:\/\/doi.org\/10.1016\/J.OPTLASENG.2019.105816","journal-title":"Opt Lasers Eng"},{"key":"14948_CR75","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/J.OPTLASENG.2017.04.009","volume":"96","author":"R Zahmoul","year":"2017","unstructured":"Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39\u201349. https:\/\/doi.org\/10.1016\/J.OPTLASENG.2017.04.009","journal-title":"Opt Lasers Eng"},{"key":"14948_CR76","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/J.INS.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-box. Inf Sci (Ny) 450:361\u2013377. https:\/\/doi.org\/10.1016\/J.INS.2018.03.055","journal-title":"Inf Sci (Ny)"},{"key":"14948_CR77","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284:2775\u20132780. https:\/\/doi.org\/10.1016\/j.optcom.2011.02.039","journal-title":"Opt Commun"},{"key":"14948_CR78","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/J.SIGPRO.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao Y, Zhu Z (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350. https:\/\/doi.org\/10.1016\/J.SIGPRO.2015.06.008","journal-title":"Signal Process"},{"key":"14948_CR79","doi-asserted-by":"publisher","first-page":"2310","DOI":"10.1049\/iet-ipr.2019.1340","volume":"14","author":"J Zheng","year":"2020","unstructured":"Zheng J, Liu L (2020) Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map. IET Image Process 14:2310\u20132320. https:\/\/doi.org\/10.1049\/iet-ipr.2019.1340","journal-title":"IET Image Process"},{"key":"14948_CR80","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TSMCB.2012.2210706","volume":"43","author":"Y Zhou","year":"2013","unstructured":"Zhou Y, Panetta K, Agaian S, Chen CLP (2013) (n, k, p)-gray code for image systems. IEEE Trans Cybern 43:515\u2013529. https:\/\/doi.org\/10.1109\/TSMCB.2012.2210706","journal-title":"IEEE Trans Cybern"},{"key":"14948_CR81","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/J.SIGPRO.2014.01.020","volume":"100","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Cao W, Philip Chen CL (2014) Image encryption using binary bitplane. Signal Process 100:197\u2013207. https:\/\/doi.org\/10.1016\/J.SIGPRO.2014.01.020","journal-title":"Signal Process"},{"key":"14948_CR82","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/J.INS.2010.11.009","volume":"181","author":"Z Zhu","year":"2011","unstructured":"Zhu Z, Zhang W, Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci (Ny) 181:1171\u20131186. https:\/\/doi.org\/10.1016\/J.INS.2010.11.009","journal-title":"Inf Sci (Ny)"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14948-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14948-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14948-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T08:13:37Z","timestamp":1693642417000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14948-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,6]]},"references-count":82,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["14948"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14948-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,6]]},"assertion":[{"value":"23 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}